{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:43:22Z","timestamp":1765889002764,"version":"3.40.3"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031194283"},{"type":"electronic","value":"9783031194290"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19429-0_17","type":"book-chapter","created":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T12:03:07Z","timestamp":1668859387000},"page":"270-294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Use of a User-Centric Smart Mobile Application Prototype for Supporting Safety and Security in a City: A Design Science Method"],"prefix":"10.1007","author":[{"given":"Maxine","family":"Mathijssen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9230-7672","authenticated-orcid":false,"given":"Maureen","family":"Tanner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,20]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10630732.2014.942092","volume":"22","author":"V Albino","year":"2015","unstructured":"Albino, V., Berardi, U., Dangelico, R.: Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1), 3\u201321 (2015)","journal-title":"J. Urban Technol."},{"key":"17_CR2","unstructured":"City of Cape Town. Five-Year Integrated Development Plan 2012\u20132017. 2015\/2016 Review and Amendments (2016)"},{"issue":"7","key":"17_CR3","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1016\/j.jbusres.2015.01.024","volume":"68","author":"SB Letaifa","year":"2015","unstructured":"Letaifa, S.B.: How to strategize smart cities: revealing the SMART model. J. Bus. Res. 68(7), 1414\u20131419 (2015)","journal-title":"J. Bus. Res."},{"issue":"6","key":"17_CR4","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1093\/scipol\/sct070","volume":"40","author":"G Galdon-Clavell","year":"2013","unstructured":"Galdon-Clavell, G.: (Not so) smart cities?: the drivers, impact and risks of surveillance-enabled smart environments. Sci. Public Policy 40(6), 717\u2013723 (2013)","journal-title":"Sci. Public Policy"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Oliveira, \u00c1., Campolargo, M.: From smart cities to human smart cities. In:\u00a02015 48th Hawaii International Conference on System Sciences, pp. 2336\u20132344. IEEE (2015)","DOI":"10.1109\/HICSS.2015.281"},{"key":"17_CR6","unstructured":"Deloitte. Africa is ready to leapfrog the competition through Smart Cities Technology. Johannesburg (2014)"},{"key":"17_CR7","unstructured":"Backhouse, J.: Smart city agendas of African cities. In:\u00a0Proceedings of 1st African Conference on Information Systems and Technology (ACIST), Accra\u00a0(pp. 7\u20138) (2015)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Ni Loideain, N.: Cape Town as a smart and safe city: implications for governance and data privacy.\u00a0J. Int. Data Priv. Law, (41) (2017, forthcoming)","DOI":"10.2139\/ssrn.3035336"},{"issue":"2","key":"17_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1177\/095624780401600201","volume":"16","author":"C Lemanski","year":"2004","unstructured":"Lemanski, C.: A new apartheid? The spatial implications of fear of crime in Cape Town South Africa. Environ. Urbanization 16(2), 101\u2013112 (2004)","journal-title":"Environ. Urbanization"},{"key":"17_CR10","unstructured":"Bornheim, M., Fletcher, M.: Public safety digital transformation: the internet of things (IoT) and emergency services. In: 2020 Predations Document IoT and Emergency Services 3 European Emergency Number Association (2020)"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.proeng.2017.06.090","volume":"192","author":"M Lacin\u00e1k","year":"2017","unstructured":"Lacin\u00e1k, M., Ristvej, J.: Smart city, safety and security. Procedia Eng. 192, 522\u2013527 (2017)","journal-title":"Procedia Eng."},{"key":"17_CR12","unstructured":"Isafiade, O.E.: Ubiquitous intelligence for smart cities: a public safety approach (2017)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kadar, C., Te, Y.F., Ros\u00e9s Br\u00fcngger, R., Pletikosa Cvijikj, I.: Digital neighborhood watch: to share or not to share? In:\u00a0Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2148\u20132155 (2016)","DOI":"10.1145\/2851581.2892400"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Ariffin, I., Solemon, B., Bakar, W.M.L.W.A.: An evaluative study on mobile crowdsourcing applications for crime watch. In:\u00a0Proceedings of the 6th International Conference on Information Technology and Multimedia, pp. 335\u2013340. IEEE (2014)","DOI":"10.1109\/ICIMU.2014.7066655"},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.trf.2016.10.005","volume":"43","author":"OT McCarthy","year":"2016","unstructured":"McCarthy, O.T., Caulfield, B., O\u2019Mahony, M.: How transport users perceive personal safety apps. Transport. Res. F: Traffic Psychol. Behav. 43, 166\u2013182 (2016)","journal-title":"Transport. Res. F: Traffic Psychol. Behav."},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1002\/say.30186","volume":"19","author":"S McGrath","year":"2016","unstructured":"McGrath, S.: Mobile apps can enhance personal safety efforts. Student Aff. Today 19(1), 6 (2016)","journal-title":"Student Aff. Today"},{"issue":"2","key":"17_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1177\/1077801219832124","volume":"26","author":"L Maxwell","year":"2020","unstructured":"Maxwell, L., Sanders, A., Skues, J., Wise, L.: A content analysis of personal safety apps: are they keeping us safe or making us more vulnerable? Violence Against Women 26(2), 233\u2013248 (2020)","journal-title":"Violence Against Women"},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.afjem.2018.11.001","volume":"9","author":"A Jabar","year":"2019","unstructured":"Jabar, A., Bjorkman, S., Matzopoulos, R.: Modified delphi study to determine optimal data elements for inclusion in a pilot violence and injury observatory in Cape Town, South Africa. Afr. J. Emerg. Med. 9(1), 30\u201335 (2019)","journal-title":"Afr. J. Emerg. Med."},{"key":"17_CR19","unstructured":"UNFPA United Nations Population Fund (2020). https:\/\/www.unfpa.org\/"},{"key":"17_CR20","first-page":"1","volume":"9","author":"R Giffinger","year":"2007","unstructured":"Giffinger, R., Fertner, C., Kramar, H., Meijers, E.: City-ranking of European medium-sized cities. Cent. Reg. Sci. Vienna UT 9, 1\u201312 (2007)","journal-title":"Cent. Reg. Sci. Vienna UT"},{"issue":"1","key":"17_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40965-016-0005-0","volume":"1","author":"J Choi","year":"2016","unstructured":"Choi, J., Hwang, M., Kim, G., Seong, J., Ahn, J.: Supporting the measurement of the United Nations\u2019 sustainable development goal 11 through the use of national urban information systems and open geospatial technologies: a case study of south Korea. Open Geospatial Data, Softw. Stan. 1(1), 1\u20139 (2016). https:\/\/doi.org\/10.1186\/s40965-016-0005-0","journal-title":"Open Geospatial Data, Softw. Stan."},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Kloppers, J.: Citizen engagement in Cape Town's transition towards a smart city. In:\u00a02016 IST-Africa Week Conference, pp. 1\u201313. IEEE (2016)","DOI":"10.1109\/ISTAFRICA.2016.7530614"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Nam, T., Pardo, T. A.: Conceptualizing smart city with dimensions of technology, people, and institutions. In:\u00a0Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, pp. 282\u2013291 (2011)","DOI":"10.1145\/2037556.2037602"},{"issue":"5","key":"17_CR24","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2017.1600271","volume":"55","author":"A Walid","year":"2017","unstructured":"Walid, A., Kobbane, A., Ben-Othman, J., El Koutbi, M.: Toward eco-friendly smart mobile devices for smart cities. IEEE Commun. Mag. 55(5), 56\u201361 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"17_CR25","first-page":"1","volume":"3","author":"R Novotn\u00fd","year":"2014","unstructured":"Novotn\u00fd, R., Kuchta, R., Kadlec, J.: Smart city concept, applications and services. J. Telecommun. Syst. Manage. 3(2), 1\u20135 (2014)","journal-title":"J. Telecommun. Syst. Manage."},{"key":"17_CR26","unstructured":"Brodie, N.: Understanding crime statistics in South Africa - what you need to know (2015). http:\/\/www.unfpa.org\/swop"},{"key":"17_CR27","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.habitatint.2014.09.009","volume":"44","author":"ISA Baud","year":"2014","unstructured":"Baud, I.S.A., Scott, D., Pfeffer, K., Sydenstricker-Neto, J., Denis, E.: Digital and spatial knowledge management in urban governance: emerging issues in India, Brazil, South Africa, and Peru. Habitat Int. 44, 501\u2013509 (2014)","journal-title":"Habitat Int."},{"key":"17_CR28","unstructured":"SAPS South Africa SAPS Crime Statistics (2020). https:\/\/www.saps.gov.sa\/"},{"issue":"13","key":"17_CR29","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1080\/00420980120094551","volume":"38","author":"I Turok","year":"2001","unstructured":"Turok, I.: Persistent polarisation post-apartheid? Progress towards urban integration in Cape Town. Urban Stud. 38(13), 2349\u20132377 (2001)","journal-title":"Urban Stud."},{"key":"17_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102023","volume":"55","author":"J Laufs","year":"2020","unstructured":"Laufs, J., Borrion, H., Bradford, B.: Security and the smart city: a systematic review. Sustain. Cities Soc. 55, 102023 (2020)","journal-title":"Sustain. Cities Soc."},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Ahir, S., Kapadia, S., Chauhan, J., Sanghavi, N.: The personal stun-a smart device for women's safety. In:\u00a02018 International Conference on Smart City and Emerging Technology (ICSCET), pp. 1\u20133. IEEE (2018)","DOI":"10.1109\/ICSCET.2018.8537376"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Moreira, B., Cacho, N., Lopes, F., Cavalcante, E.: Towards civic engagement in smart public security. In:\u00a02017 International Smart Cities Conference (ISC2), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ISC2.2017.8090818"},{"issue":"5","key":"17_CR33","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/S0047-2352(02)00148-4","volume":"30","author":"DM Austin","year":"2002","unstructured":"Austin, D.M., Furr, L.A.: The effects of neighborhood conditions on perceptions of safety. J. Crim. Just. 30(5), 417\u2013427 (2002)","journal-title":"J. Crim. Just."},{"key":"17_CR34","unstructured":"Waters, J., Neale, R.H., Mears, K.: Perceptions of personal safety in relation to the physical environment of university campuses. In:\u00a0CIB Joint Symposium on Advancing Facilities Management and Construction through Innovation,\u00a0pp. 230\u2013242) (2005)"},{"key":"17_CR35","unstructured":"Bilsky, W., Pfeiffer, C., Wetzels, P. Feelings of personal safety, fear of crime and violence and the experience of victimization amongst elderly people: research instrument and survey design.\u00a0Fear Crime Crim. Victimization, 245\u2013267 (1993)"},{"issue":"1","key":"17_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1093\/bjc\/azq066","volume":"51","author":"E Gray","year":"2011","unstructured":"Gray, E., Jackson, J., Farrall, S.: Feelings and functions in the fear of crime: applying a new approach to victimisation insecurity. Br. J. Criminol. 51(1), 75\u201394 (2011)","journal-title":"Br. J. Criminol."},{"key":"17_CR37","doi-asserted-by":"crossref","unstructured":"Ceccato, V., Nalla, M.K.:\u00a0Crime and fear in public places: towards safe, inclusive and sustainable cities, p. 486. Taylor & Francis (2020).","DOI":"10.4324\/9780429352775"},{"issue":"1","key":"17_CR38","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1177\/1470412908100900","volume":"8","author":"A Wallace","year":"2009","unstructured":"Wallace, A.: Mapping city crime and the new aesthetic of danger. J. Vis. Cult. 8(1), 5\u201324 (2009)","journal-title":"J. Vis. Cult."},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Wortmann F, Fl\u00fcchter K.: Internet of Things Technology and Value Added. Springer Fachmedien Wiesbaden. Online (2015) ISSN, 57, 221.","DOI":"10.1007\/s12599-015-0383-3"},{"key":"17_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78132-3","volume-title":"An Introduction to Design Science","author":"P Johannesson","year":"2014","unstructured":"Johannesson, P., Perjons, E.: An Introduction to Design Science. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-030-78132-3"},{"key":"17_CR41","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"17_CR42","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.compedu.2012.12.003","volume":"63","author":"R Cheung","year":"2013","unstructured":"Cheung, R., Vogel, D.: Predicting user acceptance of collaborative technologies: an extension of the technology acceptance model for e-learning. Comput. Educ. 63, 160\u2013175 (2013)","journal-title":"Comput. Educ."},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Iriberri, A., Leroy, G., Garrett, N.: Reporting on-campus crime online: user intention to use. In:\u00a0Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006), vol. 4, pp. 82a-82a. IEEE (2006)","DOI":"10.1109\/HICSS.2006.416"},{"issue":"2","key":"17_CR44","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Blom, J., Viswanathan, D., Spasojevic, M., Go, J., Acharya, K., Ahonius, R.: Fear and the city: role of mobile services in harnessing safety and security in urban use contexts. In:\u00a0Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1841\u20131850 (2010)","DOI":"10.1145\/1753326.1753602"},{"key":"17_CR46","first-page":"26","volume":"08","author":"A Yu","year":"2008","unstructured":"Yu, A., Bamis, A., Lymberopoulos, D., Teixeira, T., Savvides, A.: Personalized awareness and safety with mobile phones as sources and sinks. UrbanSense 08, 26 (2008)","journal-title":"UrbanSense"},{"key":"17_CR47","unstructured":"Mancini, F., et al.: New technology and the prevention of violence and conflict.\u00a0Int. Peace Inst. UNDP, USAID (2013) (2013)"},{"issue":"4","key":"17_CR48","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1108\/JSIT-06-2016-0039","volume":"18","author":"K Domdouzis","year":"2016","unstructured":"Domdouzis, K., Akhgar, B., Andrews, S., Gibson, H., Hirsch, L.: A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations. J. Syst. Inf. Technol. 18(4), 364\u2013382 (2016)","journal-title":"J. Syst. Inf. Technol."},{"issue":"1","key":"17_CR49","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1177\/089124301015001005","volume":"15","author":"JA Hollander","year":"2001","unstructured":"Hollander, J.A.: Vulnerability and dangerousness: the construction of gender through conversation about violence. Gend. Soc. 15(1), 83\u2013109 (2001)","journal-title":"Gend. Soc."}],"container-title":["IFIP Advances in Information and Communication Technology","Freedom and Social Inclusion in a Connected World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19429-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T12:09:32Z","timestamp":1668859772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19429-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031194283","9783031194290"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19429-0_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICT4D","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Implications of Computers in Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsicdc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/qasifip.ue.edu.pe\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}