Abstract
There are a lot of women’s security applications similar to this which are available on the Internet, having the facility which is limited only to send alert messages to a set of people or to the nearest police station which will not be effective if the person receiving the alert message is not available to respond. JOJO gives the power to its every registered user to help the person who is under abuse, attack, ill-treatment (women, transgender and even men) or whosoever in danger. The application can be used in two ways. It can be used by the person who is in danger to send alert messages, and it can be used by the people who have always wanted to help but did not get the opportunity or have enough details. This application can be triggered by using the hardware device which could either be connected with the user’s mobile through Bluetooth or a wired network, and it works in coordination with the application. The application is triggered immediately either through the hardware or by shaking the phone vigorously. The application has a map in which the location of every user who has installed this app will be displayed in real time using a Marker, and when the victim triggers the app, the colour of the marker changes, and continuous vibrations are triggered in every available user’s mobile until they open the notification. The app redirects to Google Maps which provides the route to reach the victim. The main objective of JOJO is to provide the power of helping a victim to the general public as it increases the chance of the victim being saved exponentially. As the number of users increases, the chances of a victim being saved increase tremendously. Apart from this, JOJO is a full-scale social media application with a lot of engaging features such as the “Best Guardian” and Chat Box.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cao L (2012) Social security and social welfare data mining: an overview. IEEE Tran Syst Man Cybernet Part C (Appl Rev) 42(6):837–853
Tsikerdekis M, Zeadally S (2014) Multiple account identity deception detection in social media using nonverbal behavior. IEEE Trans Inf Forensics Secur 9(8):1311–1321
Kim JT, Lee JH, Lee HK, Paik EH (2010) Design and implementation of the location-based personalized social media service. In: 2010 Fifth international conference on internet and web applications and services, pp 116–121. IEEE
Monisha M, Mohan PS (2017) A novel IOT based approach to establish an ultra-low power self security system. In: 2017 International conference on innovations in information, embedded and communication systems (ICIIECS). IEEE, pp 1–6, Mar 2017
Castillo-Cara M, Mondragón-Ruíz G, Huaranga-Junco E, Antúnez EA, Orozco-Barbosa L (2019) SAVIA: Smart city citizen security application based on fog computing architecture. IEEE Lat Am Trans 17(07):1171–1179
Ruman MR, Badhon JK, Saha S (2019) Safety assistant and harassment prevention for women. In: 2019 5th International conference on advances in electrical engineering (ICAEE). IEEE, pp 346–350, Sept 2019
Akash SA, Al-Zihad M, Adhikary T, Razzaque MA, Sharmin A (2016) Hearme: a smart mobile application for mitigating women harassment. In: 2016 IEEE international WIE conference on electrical and computer engineering (WIECON-ECE). IEEE, pp. 87–90, Dec 2016
Yarrabothu RS, Thota B (2015) Abhaya: an Android App for the safety of women. In: 2015 annual IEEE India conference (INDICON). IEEE, pp 1–4, Dec 2015
Babu VH, Balaji K (2020) Survey on modular multilevel inverter based on various switching modules for harmonic elimination. In: Intelligent computing in engineering. Springer, Singapore, pp 451–458
Kumanan T (2020) Link quality and energy-aware metric-based routing strategy in WSNS. In: Intelligent computing in engineering. Springer, Singapore, pp 533–539
Manikandan G, Anand M (2020) Radix-2/4 FFT Multiplierless architecture using MBSLS in OFDM applications. In: Intelligent computing in engineering. Springer, Singapore, pp 553–559
Sundaram A, Ramesh GP (2020) Investigation of solar based SL-QZSI Fed sensorless control of BLDC motor. In: Intelligent computing in engineering. Springer, Singapore, pp 779–787
Snehalatha N, Shiny Angel TS, Amudha S (2016) Remote display access using remote frame buffer and IO streaming. Int J MC Square Sci Res 8(1):23–40
Rajesh D (2016) Ch panel based routing scheme for mobile wireless sensor network. Int J MC Square Sci Res 8(1):183–198
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pughazhendhi, A., Muruganandam, S.B., Sridevi, B. (2021). JOJO—A Social Media Application with a Live Map Interface to Advance Social Security. In: Kumar, R., Mishra, B.K., Pattnaik, P.K. (eds) Next Generation of Internet of Things. Lecture Notes in Networks and Systems, vol 201. Springer, Singapore. https://doi.org/10.1007/978-981-16-0666-3_37
Download citation
DOI: https://doi.org/10.1007/978-981-16-0666-3_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0665-6
Online ISBN: 978-981-16-0666-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)