{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:07:19Z","timestamp":1771700839130,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001848","name":"Indian Council of Social Science Research","doi-asserted-by":"publisher","award":["IMPRESS\/P497 \/140\/18-19\/ICSSR"],"award-info":[{"award-number":["IMPRESS\/P497 \/140\/18-19\/ICSSR"]}],"id":[{"id":"10.13039\/501100001848","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3076016","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:21:15Z","timestamp":1619554875000},"page":"66188-66207","source":"Crossref","is-referenced-by-count":37,"title":["A Holistic Framework for Crime Prevention, Response, and Analysis With Emphasis on Women Safety Using Technology and Societal Participation"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8186-502X","authenticated-orcid":false,"given":"Meetha V.","family":"Shenoy","sequence":"first","affiliation":[]},{"given":"Smriti","family":"Sridhar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1663-4748","authenticated-orcid":false,"given":"Girish","family":"Salaka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6320-556X","authenticated-orcid":false,"given":"Anu","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Rajiv","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"zurbar\u00e1n","year":"2018","journal-title":"PostGIS Cookbook"},{"key":"ref38","author":"pimpler","year":"2017","journal-title":"Building Web and Mobile ArcGIS Server Applications With JavaScript"},{"key":"ref33","year":"2020","journal-title":"SIM808 SIMCom GSM\/GPRS+GNSS Module Product Specifications"},{"key":"ref32","year":"2018","journal-title":"ESP32-WROOM-32D & ESP32-WROOM-32U Datasheet"},{"key":"ref31","year":"2020","journal-title":"Firebase security and rules"},{"key":"ref30","year":"2020","journal-title":"Firebase Authentication"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/9780470987193"},{"key":"ref36","author":"leitner","year":"2015","journal-title":"Crime Modeling and Mapping Using Geospatial Technologies SE - 5"},{"key":"ref35","first-page":"1","author":"rastogi","year":"2020","journal-title":"Proc Syst Inf Eng Design Symp (SIEDS)"},{"key":"ref34","author":"chang","year":"2016","journal-title":"Introduction to Geographic Information Systems"},{"key":"ref10","year":"2020","journal-title":"Wearable Technologies for Safety"},{"key":"ref40","year":"2020","journal-title":"Deploying an Existing Django Project on PythonAnywhere |PythonAnywhere Help"},{"key":"ref11","year":"2020","journal-title":"Wearable Panic Button & Safety Button"},{"key":"ref12","year":"2020","journal-title":"Sound Grenade a Non-Violent Device for Personal Safety&#x2014;The Orion"},{"key":"ref13","author":"gorr","year":"2018","journal-title":"GIS Tutorial for Crime Analysis"},{"key":"ref14","first-page":"2319","article-title":"Crime against women in Chandigarh: A GIS analysis","volume":"3","author":"kahlon","year":"2018","journal-title":"Int J Manage Social Sci Res"},{"key":"ref15","first-page":"1","article-title":"Girl walk: Identity, GIS technology and safety in the city for women and girls","author":"nicole","year":"2017","journal-title":"Proc 8th State Austral Cities Nat Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00069"},{"key":"ref17","article-title":"Crime mapping and analysis using GIS","volume":"1","author":"kedia","year":"2016"},{"key":"ref18","author":"gupta","year":"2016","journal-title":"Crime Analysis GIS A Gateway to Safe City Geospatial World"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/su11184889"},{"key":"ref28","year":"2020","journal-title":"Comparison of Geographic Information Systems Software"},{"key":"ref4","year":"2020","journal-title":"Safelet&#x2014;The SOS-Bracelet"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s12517-017-3296-2"},{"key":"ref3","year":"2020","journal-title":"Orange the World&#x2014;Apps for Women&#x2019;s Safety in India"},{"key":"ref6","author":"brooke","year":"2020","journal-title":"Meet Siren a Ring Designed to Prevent Assault&#x2014;Fashionista"},{"key":"ref29","year":"2020","journal-title":"Scale With Multiple Databases |Firebase Realtime Database"},{"key":"ref5","year":"2020","journal-title":"Spotnsave Your Ultimate Guarded Security Device"},{"key":"ref8","author":"sciarretto","year":"2020","journal-title":"This Charm Could Save You From Assault"},{"key":"ref7","author":"carter","year":"2020","journal-title":"Meet the Millennial Who Created Athena A Safety Wearable for the 21st Century"},{"key":"ref2","year":"2020","journal-title":"10 Safety Apps for Women"},{"key":"ref9","year":"2020","journal-title":"Sonata ACT&#x2014;The Safety Watch for Women"},{"key":"ref1","year":"2020","journal-title":"Violence Against Women a Barrier to Peaceful Future for All"},{"key":"ref20","first-page":"1","article-title":"Detecting hot spots using cluster analysis and GIS","author":"grubesic","year":"2001","journal-title":"Proc 5th Annu Int Crime Mapping Res Conf"},{"key":"ref22","first-page":"147","article-title":"A Web-based geographical information system for crime mapping and decision support","author":"zhou","year":"2012","journal-title":"Proc Int Conf Comput Problem-Solving (ICCP)"},{"key":"ref21","volume":"1","author":"mitchell","year":"1999","journal-title":"The ESRI guide to GIS analysis geographic patterns & relationships"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2019.8729221"},{"key":"ref23","year":"2020","journal-title":"Differences Between Point Line and Kernel Density-ArcGIS Pro |Documentation"},{"key":"ref26","author":"bradt","year":"2008","journal-title":"A Comparison of Open Source GIS Packages"},{"key":"ref25","article-title":"Web GIS tools for crime mapping in Toronto","author":"lockyer-cotter","year":"2013"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09416659.pdf?arnumber=9416659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:50Z","timestamp":1639770950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9416659\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3076016","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}