2.1. Characteristics of a child

A child refers to the ages between 6 and 12. During this period, a child learns similar tasks that he or she must perform once they become an adult<sup>1</sup>. Child development is often discussed from the perspective of developmental psychology and paediatrics and is defined from biological and psychological perspectives. Child development is believed to have characteristics of dependency, continuous development, susceptibleness, demand, and adaptability<sup>2</sup>. Table 1 summarizes research conducted Sigmund Freud, Erick Erikson and Jean Piaget with regard to the psychological cognitive development of children.


**Table 1.** Characteristics of child by Freud, Erikson, and Piaget

Jean Piaget's "concrete operations stage," which is third of four stages of development applies to 7-11-year-old children. Children in this stage can perform simple operations and logical reasoning replaces intuitive thinking, which means that children can operate a mobile phone. However, how well a child can operate a mobile phone in case of an emergency must be carefully examined.

Therefore, the following needs to be considered when designing a device for kids. Although child in the concrete operations stage can perform operations that requires quite

<sup>1</sup> Laura E. Berk, translated by Nang Ja Park, Infants & Children.

<sup>2</sup> Sung Sim Han, Joo Mi Song, 'Child Welfare', Chang Ji, 2003, page 12.

complicated and logical thinking, it must be designed so a child can operate quickly in case of emergency. Table 2 shows a list to consider in accordance with the characteristics of children.


**Table 2.** List of considered device designs in accordance with the characteristics of a child

## 2.2. Characteristics of Child Abuse

Based on the analysis of precedents, what marks the child abuse is that most crimes involve sexual motivation, although some lead to the murder of a child. For the crime from occuring, there must be three prerequisites: (1) crime will, (2) victim, and (3) crime scene.

Once these are satisfied, there are five phases to commit a crime; crime prerequisite → approaching → luring and kidnapping → movement → committing the crime.


**Table 3.** Process of Crime

162 Child Abuse and Neglect – A Multidimensional Approach

This chapter analyzes children's performances and circumstantial judgments through literature and studies on preventing methods through understanding the procedure and

A child refers to the ages between 6 and 12. During this period, a child learns similar tasks that he or she must perform once they become an adult<sup>1</sup>. Child development is often discussed from the perspective of developmental psychology and paediatrics and is defined from biological and psychological perspectives. Child development is believed to have characteristics of dependency, continuous development, susceptibleness, demand, and adaptability<sup>2</sup>. Table 1 summarizes research conducted Sigmund Freud, Erick Erikson and

Jean Piaget's "concrete operations stage," which is third of four stages of development applies to 7-11-year-old children. Children in this stage can perform simple operations and logical reasoning replaces intuitive thinking, which means that children can operate a mobile phone. However, how well a child can operate a mobile phone in case of an

Therefore, the following needs to be considered when designing a device for kids. Although child in the concrete operations stage can perform operations that requires quite

Libido is repressed and the child develops superego.the child acquires social value through playing with same age group with same sex and adults other than family members.

Children develop competence and cooperation skills in school. Complex develop through negative experiences in the family or when experiencing incompetence in school or among same age group.

A child can conduct logical reasoning what regard to specific cases and is able to divide objects into different categories (i.e., children can conduct operation). In this stage, the child which performs concrete operational reasoning, but cannot perform reasoning that requires algebraic equations because it require advanced abstract thinking.

characteristics of precedents of crimes against child over the past seven years.

Jean Piaget with regard to the psychological cognitive development of children.

Psychologists Development Stages Characteristics

Latency Stage 6-11 year old

Industry vs. Inferiority Latency Stage 6-11 year old

Concrete Operations Stage 7-11 year old

**Table 1.** Characteristics of child by Freud, Erikson, and Piaget

2. Theoretical background

2.1. Characteristics of a child

Freud Psychosexual

Erikson Psychosocial

Piaget Stages of

Development

Development

Development

emergency must be carefully examined.

<sup>1</sup> Laura E. Berk, translated by Nang Ja Park, Infants & Children. <sup>2</sup> Sung Sim Han, Joo Mi Song, 'Child Welfare', Chang Ji, 2003, page 12. The intention of classification of a crime is to extract the Design Specification of the device for children to respond to each phase of the crime and prevent it the crime from occuring.

First the prevention of the first phase, crime prerequisite, has been conducted in the West in various ways.

Nevertheless, criminals continue to approach victims, wearing electronic Tagging. Criminals lure victims using feigned identity or by asking for directions. Criminals may also capture victims by force and move to a certain spot to commit the crime.

In the Kim Kil-Tae case, the preschool, the crime scene, and the criminal's house were located within 300m. This shows that many crimes are committed within the child's home

environment. On study showed that the luring point and crime scene are only 30 min. away (i.e. within 2km).

Interaction Design for Preventing Child Abuse 165

**Figure 2.** Physical differences between a victim and a pertpetrator

Preventive means can be divided into individual and social means. As seen in the Figure 3, the social means are characterized by handling a situation after the fact. As it is difficult to protect many and unspecified persons, an emphasis is placed on preventing the recurrence of crimes that center on ex-cons. However, it is difficult to protect victims prior to a crime. Individual means are characterized by prevention that is focused on self-protective instincts

According to Table 5, which compares the domestic and foreign prevention system, the domestic system shows more favor to the rights of the criminal than those of the victims or the many and unspecified possible victims. Under certain circumstances, prevention

aimed to protect oneself and one's family from many and unspecified persons.

2.3. Prevention system and current technologies

**Figure 3.** Characteristics of individual and social means

becomes essential.


**Table 4.** Counter measures for each crime phases

According to a survey, cases where the victim's house, crime scene, lure place, victim's school and perpetrator's house were located within 2 km and accounted for 50% or more of crimes. Findings also revealed that a perpetrator searched for the subject of the crime in surrounding areas and the crime scene was a familiar environment. In addition, the lure place was not the same as the crime scene, and a perpetrator lured the child to another place to commit the crime. In these cases, it is the only time when a child can be rescued. Of note, 2 km takes up to 30 minutes to traverse on foot.

**Figure 1.** Distance from victim's house, crime scene, lure place, victim's school, and perpetrator's house.

A main characteristic of crimes against children is that it is impossible for children to protect themselves or ask for help when they perceive a crime because of physical differences between the child and perpetrator. Accordingly, it has been perceived that the intervention of a third party, who can immediately extend a helping hand to children, is desperately needed. Therefore, this study focuses on determining measures to achieve such an intervention.

**Figure 2.** Physical differences between a victim and a pertpetrator

## 2.3. Prevention system and current technologies

164 Child Abuse and Neglect – A Multidimensional Approach

**Table 4.** Counter measures for each crime phases

2 km takes up to 30 minutes to traverse on foot.

(i.e. within 2km).

Crime prerequisite

house.

intervention.

environment. On study showed that the luring point and crime scene are only 30 min. away

Approaching Alert the child's parent by receiving signals from the Electronic Tagging of

Luring Educating the child about the action guide and letting them avoid the crime scene. Kidnapping Informing the third party about the danger using an emergency button or strap

Movement Collecting all data about a child's routine pattern and alerting the parents when

According to a survey, cases where the victim's house, crime scene, lure place, victim's school and perpetrator's house were located within 2 km and accounted for 50% or more of crimes. Findings also revealed that a perpetrator searched for the subject of the crime in surrounding areas and the crime scene was a familiar environment. In addition, the lure place was not the same as the crime scene, and a perpetrator lured the child to another place to commit the crime. In these cases, it is the only time when a child can be rescued. Of note,

**Figure 1.** Distance from victim's house, crime scene, lure place, victim's school, and perpetrator's

A main characteristic of crimes against children is that it is impossible for children to protect themselves or ask for help when they perceive a crime because of physical differences between the child and perpetrator. Accordingly, it has been perceived that the intervention of a third party, who can immediately extend a helping hand to children, is desperately needed. Therefore, this study focuses on determining measures to achieve such an

Need for systematic measures to block any attempts for crime will, victim, crime scene.

recidivism through a device for children.

when captured by force.

their child strays from the routine.

Phase Counter Measures

Preventive means can be divided into individual and social means. As seen in the Figure 3, the social means are characterized by handling a situation after the fact. As it is difficult to protect many and unspecified persons, an emphasis is placed on preventing the recurrence of crimes that center on ex-cons. However, it is difficult to protect victims prior to a crime. Individual means are characterized by prevention that is focused on self-protective instincts aimed to protect oneself and one's family from many and unspecified persons.

**Figure 3.** Characteristics of individual and social means

According to Table 5, which compares the domestic and foreign prevention system, the domestic system shows more favor to the rights of the criminal than those of the victims or the many and unspecified possible victims. Under certain circumstances, prevention becomes essential.


/Electronic Tagging

○ (when kidnapped)

It is a current measure that is systematically utilized. There is limits to prevention of crimes against people with no criminal records. May not expect any prevention when intentionally detached and committing a crime

Mobile phone LBS Electronic positioning system

approaching - - -

movement ○ ○ ○

phase ○ ○ ○

**Table 6.** Assessment of effectiveness of prevention technologies regarding each crime phase.

children, it is necessary to integrate mobile phone ubiquitous and LBS.

2.4. The current design of mobile phones for kids

features that are needed for this population of users.

It is concluded that mobile phone SOS features, LBS, Electronic Tagging are ineffective for luring and kidnapping because a child is not aware of it; however, it is effective for movement after kidnapping. In addition, to find a solution for preventing crimes against

The evaluation of precedents of existing mobile phones for kids was conducted to analyze


security company

will be turned on


sounds alarm in emergency to inform





model Image Characteristics

○ (when kidnapped)

Not a user friendly interface when using the service through a mobile phone; requires frequently resetting the settings. High cost for extra device and fees can be a burden on users when using a satellite-based system

Phases SOS feature of

○ (when kidnapped)

Informs guardians in case of an emergency. Frequently unintended operation causes loss of reliability

Phase 1 :

Phase 2 : luring and kidnapping

Phase 3:

Post crime

Characteristics

Company

Verizon Migo

Kyocera Mamorino cell phone for kids

**Table 5.** Comparison of domestic and foreign systems and victims' and perpetrators' human rights

The followings are current technologies used for crime prevention.


**Figure 4.** Example of setting up an ADT mobile phone - service name : Taxi care

3. Electronic Tagging: Domestically, electronic tagging of ex-convicts uses an LBS system. Legislation regarding adherence to Electronic Tagging for specific sexual offenders was enacted in April, 2007. After its revision in May 2008, electronic tagging was effective starting September 1st, which is an another use of LBS. Thus, if inspectors and mobile phones for children can detect the signal of the Electronic Tagging, it would provide a significant solution for preventing crimes against child.

Table 6. summarizes the results of the analysis of utilization of applicable systems and technologies through an assessment of effectiveness of each crime phase.


**Table 6.** Assessment of effectiveness of prevention technologies regarding each crime phase.

It is concluded that mobile phone SOS features, LBS, Electronic Tagging are ineffective for luring and kidnapping because a child is not aware of it; however, it is effective for movement after kidnapping. In addition, to find a solution for preventing crimes against children, it is necessary to integrate mobile phone ubiquitous and LBS.

## 2.4. The current design of mobile phones for kids

166 Child Abuse and Neglect – A Multidimensional Approach

• Child safety guards • Amber alert • Electronic Tagging

• Genetic database (U.K.)

The followings are current technologies used for crime prevention.

• Amber alert

• Posting identities of sexual offenders

• Isolation policy of the sexual offenders (U.S)

• Posting sexual abuse record/ identities(U.S.) • Surgical or drug castration of sexual offenders(U.S.)

the Fig. 2, this is problematic because it is not a kid friendly interface.

**Figure 4.** Example of setting up an ADT mobile phone - service name : Taxi care

significant solution for preventing crimes against child.

technologies through an assessment of effectiveness of each crime phase.

3. Electronic Tagging: Domestically, electronic tagging of ex-convicts uses an LBS system. Legislation regarding adherence to Electronic Tagging for specific sexual offenders was enacted in April, 2007. After its revision in May 2008, electronic tagging was effective starting September 1st, which is an another use of LBS. Thus, if inspectors and mobile phones for children can detect the signal of the Electronic Tagging, it would provide a

Table 6. summarizes the results of the analysis of utilization of applicable systems and

**Table 5.** Comparison of domestic and foreign systems and victims' and perpetrators' human rights

1. SOS feature on mobile phones: Transmits the signal to five or six people who are registered by users in case of emergency and are available for only limited mobile

2. LBS (Location Based Service): Electronic Tagging of ex-convicts; this has been adopted in many different fields. The security company ADT uses LBS-based mobile service for crime prevention. Users can set up an ETA (Estimated Time of Arrival) and if the users do not arrive on time, the company dispatched their men. If users enter the plate number of a taxi, the company will do the background check. However, as seen from

Domestic System

Foreign System

phones.

type Measures Comparison

Victim's human right < perpetrator's human right

Victim's human right > perpetrator's human right

> The evaluation of precedents of existing mobile phones for kids was conducted to analyze features that are needed for this population of users.









plastic model company Bandai

even raising Damagochi (function of fun)


papers, animation, icon, button sound.

Easy operation for various ages and children with disabilities. Can maximize battery by allowing limited number of phone numbers to be saved and prevent unnecessary calls and harmful content.

Informs the current situation and self location to the preregistered person in case of an emergency

out to preregistered numbers

Can notify one's location without any power in certain time intervals

on the settings

If a situation doesn't allow a child to a press button, he/she can pull the strap, which will sound the alarm and send out a text message to the preregistered numbers

when the child approaches a specific location

mobile phone using DB for kids.

meticulous UI design

and emergency button

company

The precedent analysis showed that it is not easy for a child to control the device in an emergency and protecting a child through third party involvement seems an easy task. However, some features of these devices were useful such as A5520SA from AU, which informs parents when a child is approaching a specific location and informs the child's location at specific time intervals, even if the power is off. Additionally, Chitterchatter's wearing method was found useful. Table 8 summarizes useful features for preventing

Location Button Can inform self location at any time

Lamp Lamp When a child is trapped in dark area, the lights will be turned on based

Battery Cover When the battery cover is forcibly removed, a warning sign will be sent

GPS Parents can confirm their child's location any time and will be notified

DB Parents can protect their child from harmful content and decorate the

Willcom Papipo

Dmodo M900

crimes against children.

Specified Key

Emergency Button

Notifying Self

Powerless Positioning Signal

Button

Power

App.

Emergency Strap

**Table 7.** Precedents of existing mobile phone for kids

Categories Functions Contents

**Table 8.** Useful current technologies to prevent crimes against children


**Table 7.** Precedents of existing mobile phone for kids


manipulation

connection

dome design

a computer at any time

company Gigabyte

security company

of fire or illness

the power is off

which ensures safe use for kids


location















child under 10 or person with disability

on neck or worn on the wrist

Cingular Firefly

Willcom Nico

Gigabyte Sergeant Keroro, Doraemon

> au A5520SA

Hop-on chitterchatter The precedent analysis showed that it is not easy for a child to control the device in an emergency and protecting a child through third party involvement seems an easy task. However, some features of these devices were useful such as A5520SA from AU, which informs parents when a child is approaching a specific location and informs the child's location at specific time intervals, even if the power is off. Additionally, Chitterchatter's wearing method was found useful. Table 8 summarizes useful features for preventing crimes against children.



The users have a need for normalization and avoiding admitting that they are special<sup>3</sup>. Thus, mobile phones for kids that are currently available have very small LCDs or none at all; nevertheless, designs for both specified-key mode and 10-key mode would be viable by parents setting up the key-type screens based on the Full Touch Technology and adjusted for their children's age-specific cognition levels.

Interaction Design for Preventing Child Abuse 171

crime

Emergency button / Alarm/ lighting

Kidnapping recognize danger category 2

Kidnapping recognize danger category 4

Does not

Detecting any abnormal activities (route, speed, etc.)

perceive Recognize

3.1. Categories of scenario for child crimes

to support reasons for necessary device features.

Category 1 : Without Electronic Tagging and Luring

Perpetrator 40 year old, less than two

Victim 6-12 year old girl /

playground

Detecting any abnormal activities (route, speed, etc.)

**Table 10.** Category 1: Criminal without Electronic Tagging and Luring

**Table 9.** Setting up four categories

suggestion.

she is in danger.

victim.

Function of mobile phone

The following scenario was written based on crime categorization of Table 9 and was used

Less than two previous conviction Luring does not perceive danger category 1

More than two previous conviction Luring does not perceive danger category 3

This scenario was established based on a previous research and has the following conditions. It has been sub-divided into the following crime stages: crime prerequisite → approaching → luring and kidnapping → movement → committing crime before

First, perpetrators are divided into ex-cons and first offenders and this scenario is related to the application of electric tagging. Some criminals attempt to commit a crime after removing electronic tagging; these are regarded as first offenders. These criminals are divided into luring and kidnapping and luring refers to as a situation where a child is unable to be exposed to a crime; kidnapping refers to as a circumstance where a child perceives that he or

Category 1 of Table 10 describes the role of mobile phone for each phase under the premises that a 40-year-old man with less than two previous convictions targets a 12-year-old female

Category 1 Setting Phase 1 Phase 2 Phase 3 Phase 4


The worst case is Category 1 because the perpetrator can hide intention and the child may never recognize the danger until right before the crime. In such a case, parents can be informed about abnormal activity of their child such as different routine pattern or sudden acceleration of speed and detect changes in mode of transportation; they can also confirm

Does not Perceive /wariness

previous convictions Approaching Luring Movement Commit a

Does not perceive

Criminal records Methods Cognition Categories

## 2.5. Summary


According to an inquiry into preventive technologies, many useful technologies and functions have been found with mobile phones and include such diversified technologies as LBS and SOS functions. However, they may have problems because children are unable to perceive situations where they are exposed to crimes or there are difficulties in helping them directly or indirectly when they ask for help even thought they have perceived a crime.
