5. Example

178 Child Abuse and Neglect – A Multidimensional Approach

Battery charging

Latent battery

camera

Mic.

Watch, ring, necklace

4.2. Guideline for application design

Selective layout is possible.

Maximum number of characters within screen.


Informs when child breaks out of route.

Informs when detects change of moving speed.

**Table 14.** Guideline for figure design

Ubiquitous

Optional device

> Screen layout

> > Text

Electronic Tagging

Emergency service

Screw down type

> Use solar power

Self charged

General

General

Categories Features Characteristics

Stops criminals from forcible powering off of a child's mobile phone. There will be an interval time to power off

Should be sustained to enable communication with a child under any circumstances

Has enough power to transmits signal of one's position for a certain length of time even after the battery is removed

Report the threat automatically once child's mobile phone is removed by criminals

Cognition and operational skill of 6-9 and 9-11 year olds should be considered, respectively, for agespecific design. Using illustration is suggested over text for UI.

could be modified, if necessary.

types.

Should be able to give information with minimum number of letters; Korean 4-6, English 9 letters, and should be legible instantly (e.g., emergency)

Receives signal once Electronic Tag and a child falls within certain distance.

Warns guardians when child breaks time-based activity pattern.

When detecting dramatic change of speed; from 2- 3km/h (normal walking speed) to 30-60km/h or stop moving for long period.

kit Install portable or integrated self charger

Emergency Remotely collects data about the environment

Emergency Remotely collects data about the environment

phone call Video telephone

phone call Telephone

sound Siren Third party can remotely sound the alarm

waterproof Should operate under any circumstances

Font size can be adjusted. Suggests using 16 font of computer monitor and

Font type can be adjusted. Suggests using Gothic type, but may choose other

## 5.1. Device specification

The chapter introduces an example of a selective application of guidelines for a crimeprevention device for children.

1 Remote Control Camera - Parents/Guardian can check up the child's surrounding using the child's mobile phone

2 Full Touch Screen - The layout can be made to suit one's taste. If the child is too young, parents/guardian can set it up.

3 Emergency Speaker - In emergency situation where child needs help, siren blows to inform their location; parents /guardian can also remotely activate blow the siren

4 Power Button

5 Emergency Button - If the button is pressed in an emergency where a child needs help, pre-set dial is activated to seek help.

6 LED Lamp / Emergency Light - Acts as a lamp and is automatically turned on when a child is isolated in the dark or will blinks to draw attention in the face of danger.

7 Battery Cover - If the power is turned off or battery is removed deliberately, it reports to a preset number. Has a function that reports the location if the batter is removed.

**Figure 9.** Example of Device Specification

### 5.2. Age specified set-up

It is possible to set up the screen by age or taste. As users are aged 6 to 12, it has been divided into hotkey method and 10-key method based on children aged 9; however, can be set up in consideration of cognitive ability and manipulability.

After the setup, the device collects and records the routing of a child during a certain period. At that time, the direction and speed of movement are recorded by time and routes. The minimum unit of time is a week during a certain period and considerations are given for time of end of the class and after-school activities by day; learning schedule is designated by the week. Figure 12 below shows an example of recording changes in the daily movement of

**Figure 12.** Example of Collection of Routing Data by Time and Day

patternization of collected information.

Information collected for a week is recorded and the longer the period of data collection, more accurate patterns are displayed. The frequency of a child's movements are indicated as the thickness of a line and a private academy and a friend's house that have not been initially set up are recognized as abnormal routes to be reported to a protector for confirmation before the addition of the new destination and route. Figure 13 exhibits

a child.

**Figure 10.** Example of Age Specified Set-up

## 5.3. Initial route set-up

Because it is difficult for a child to conduct an initial setup for oneself, it can be set up with the help of parents as seen below. The initial setup is conducted based on synchronization of a device with a computer. Figure 11 provides an explanation for the initial setup. First, if the home address and school address (destination) are entered, movement section is indicated, and if a private academy or friends are added, destinations are additionally entered as well. At that time, a child enters all possible routes. Although all routings have not been entered, they can be added during the period of collection of data.

**Figure 11.** Example of Computer-Based Initial Setup Screen

After the setup, the device collects and records the routing of a child during a certain period. At that time, the direction and speed of movement are recorded by time and routes. The minimum unit of time is a week during a certain period and considerations are given for time of end of the class and after-school activities by day; learning schedule is designated by the week. Figure 12 below shows an example of recording changes in the daily movement of a child.

180 Child Abuse and Neglect – A Multidimensional Approach

**Figure 10.** Example of Age Specified Set-up

they can be added during the period of collection of data.

**Figure 11.** Example of Computer-Based Initial Setup Screen

Because it is difficult for a child to conduct an initial setup for oneself, it can be set up with the help of parents as seen below. The initial setup is conducted based on synchronization of a device with a computer. Figure 11 provides an explanation for the initial setup. First, if the home address and school address (destination) are entered, movement section is indicated, and if a private academy or friends are added, destinations are additionally entered as well. At that time, a child enters all possible routes. Although all routings have not been entered,

5.3. Initial route set-up

**Figure 12.** Example of Collection of Routing Data by Time and Day

Information collected for a week is recorded and the longer the period of data collection, more accurate patterns are displayed. The frequency of a child's movements are indicated as the thickness of a line and a private academy and a friend's house that have not been initially set up are recognized as abnormal routes to be reported to a protector for confirmation before the addition of the new destination and route. Figure 13 exhibits patternization of collected information.

smart phones as they are. In this regard, guidelines have been suggested through the

With regard to the effectiveness of the study, it seems desirable that the government, rather than private companies, take the initiative for the welfare of children. This is because more children from low income families could benefit from measures taken by the government as

In the process of conducting interviews at welfare facilities, it was found that more sexual assaults are committed by acquaintances than by strangers and unofficial small crimes are frequently committed by relatives, which has not been accurately reported to protect

According to the study, it is impossible to protect many children from acquaintances committing a crime; however, it is difficult to prevent ex-con acquaintances from accessing

In the process of conducting interviews with experts, other circumstances than usual situations were discussed with regard to evaluation of scenarios, which has been excluded

The longer the period for collecting data, the more sophisticated patterns; however, it might result in difficulties in preventing crimes that occur in the process of collecting data. Additionally, if it is difficult for parents to use a computer, it might be tricky to get help

The Legal Research and Training Institute, (2005-2008) White Paper on Crime, Ministry of

Laura e. Berk(translated by Nang J. Park) (2007) Infants & Children(5thedition), Jungmin-sa,

Sung Sim Han, Joo Mi Song, (2003),Child Welfare, Chang Ji-sa, ISBN-139788942602728, ISBN-

Chul Ok Cho (2009), General Studies crime rhetoric, ISBN-139788984683266;ISBN-

Shin Ah Jo, (2007), Research on Designing Customized Menu for Users in Mobile Phone, Dept. of

application of available technologies and functions based on collected information.

it incurs costs of purchasing and maintaining such devices.

6.2. Limitation of the study

children as they are acquainted with children.

as it appears difficult to consider each circumstance.

Justice Republic of Korea, Korea(South)

Digital Design, Kyung Sung Univ., Pusan

ISBN-139788958090687;ISBN-108958090685, Seoul

children.

immediately.

Author details

7. References

Euichul Jung and Joonbin Im Yonsei University, South Korea

10894260272X, Seoul

108984683264, 21seiki, Seoul

**Figure 13.** Example of Patternization Based on Collected Information

This figure refers to collecting routing and speed and direction of movement by unit time in addition to frequency of routing.

It senses abnormal changes in speed, long-time stoppage, and reverse-directional movement on the part of a child to report them to a protector for interaction.
