Open access peer-reviewed chapter

Comprehensive Assistance System for Victims of Gender-Based Violence

Written By

Miguel Á. Domínguez, Raquel Pérez-Aloe, Bruno Pérez, Javier Lozano and Juan M. Carrillo

Submitted: 07 December 2022 Reviewed: 15 February 2023 Published: 14 March 2023

DOI: 10.5772/intechopen.110562

From the Edited Volume

An International Collection of Multidisciplinary Approaches to Violence and Aggression

Edited by Catherine Lewis

Chapter metrics overview

67 Chapter Downloads

View Full Metrics

Abstract

The system presented in this work is intended to be used by women who live with the domestic aggressor and therefore do not have a restraining order or judicial mechanisms that can protect them. It is based on the use of small wireless electronic devices, using a Bluetooth connection to send a message to a smartphone. One of the main features of the device is that it can be hidden in different accessories of the victims, such as brooches, necklaces, watches, bracelets, and belts. In this way, it can be customized according to the victim\'s personal preferences so that it can go completely unnoticed by the perpetrator. Besides, an application developed in Android and iOS is responsible for transmitting the alarm message to a central server, along with the GPS geolocation and the victim\'s identifier. A web service is run on the server that manages the entire alert system and, if necessary, notifies the police or protection services of this emergency. Several designs of electronic devices with panic button have been developed, along with the applications for the mobile phone and the programming of the web server.

Keywords

  • gender-based violence victims
  • assistance system
  • camouflaged electronic device
  • mobile apps
  • web service
  • control center

1. Introduction

In a society that is increasingly connected by new technologies at the service of communications, commerce, transport, entertainment, industry, or even things (Internet of Things, IoT), paradoxically, there is a serious problem of social isolation. Indeed, women who suffer harassment, aggression, and injuries that even eventually lead to death, often hide these circumstances, avoiding requesting the necessary help that would alleviate this serious situation of vulnerability and loneliness. Violence against women, especially intimate partner violence, is a human rights violation and one of the most serious public health problems. According to research by the United Nations Office on Drugs and Crime, released on the International Day for the Elimination of Violence against Women, a total of 87,000 women were intentionally murdered in 2017. Around a third (30,000) were killed by their present or former partner [1]. Recent research published in the journal Lancet has further revealed that more than one in four women in the world is estimated to have experienced gender-based violence by a partner or ex-partner in her lifetime. These new estimations indicate that, prior to the COVID-19 pandemic, 27% of women aged 15–49 who had ever been in a relationship, had suffered physical and/or sexual intimate partner violence in their lifetime, and one in seven (13%) had experienced recent intimate partner violence [2]. All these data show that violence against women is unfortunately an extremely common practice. So much so that the United Nations (UN) even referred to it in 2013 as “a global health problem of epidemic proportions”. Intimate partner violence can have major short-term and long-term physical and mental health effects, including injuries, depression, anxiety, unwanted pregnancies and abortions, and sexually transmitted infections among others, and can also lead to death [3].

Most international organizations have developed mechanisms to tackle the eradication of violence against women. It is worth mentioning the UN's contribution, within the framework of the Universal Declaration of Human Rights of December 10, 1948, which enshrines the right to equality, as well as to the achievement of fundamental rights and freedoms without any discrimination because of gender [4, 5, 6, 7, 8, 9].

Similarly, within the Council of Europe, numerous approaches have been taken to deal with all forms of violence against women [10, 11, 12, 13]. Spain, for example, had already focused its attention on this problem since the 1980s. At present, Spain has a wide range of regulations that provide, from a comprehensive point of view, for the prosecution and elimination of any form of violence against women, from a criminal, procedural, welfare, police, civil, administrative, educational, labor, health, and other approaches, with the aim of protecting and supporting women who have suffered violence in their recuperation. Also, these regulations promote the necessary changes in society to prevent it, reject it, and place it beyond the private sphere, making it a social problem [14, 15, 16, 17].

Since its implementation, many countries around the world have been interested in this system and have been inspired by it to develop similar legislation in their respective legal systems. In 2014, institutions such as the UN, the World Future Council, and the Inter-Parliamentary Union acknowledged Spain’s Organic Law 1/2004 as one of the most effective regulations in the world for combating gender-based violence.

Despite the different legislations, plans, and strategies approved for the eradication of violence against women, from 1 January 2003 to this day, 17 January 2023, 1186 women have been murdered by their partners or ex-partners. The annual reports issued by the Observatory against Domestic and Gender Violence highlight the need to keep on acting, through the coordination of police agents and the personalization of victim assistance. The Delegation of the Government for Gender Violence has been carrying out statistics since 2003, which provide information on women killed by gender violence. Within these victims, there were those who had previously denounced their aggressor and those who had not, victims who lived with their aggressor, etc. The collected data provide a profoundly social vision that endorses the necessity for everyone to become aware of the problem to try to eradicate it.

In relation to the complaints made, around 75% of the victims had not filed a complaint against their aggressor and 64.9% were still living with him at the time of the death. Regarding the resources used to provide an effective response to this problem, it is worth mentioning the “Protocol of Actions for the Monitoring by Telematic Means of the restraining orders prohibiting approximation to the Gender Violence Victim” [18]. The remote monitoring system makes it possible to supervise compliance with precautionary measures and restraining orders prohibiting approximation to the victim imposed by procedures against gender violence in cases where the courts approve their use for this purpose. Their main purpose, therefore, is to increase the safety and protection of victims. It provides permanently updated information about issues that affect compliance or noncompliance of precautionary measures or sentences, or any possible incidents, whether accidental or deliberate, in the operation of the equipment used.

The monitoring system consists of two essential elements: the devices for the victim and the perpetrator and the control center that is responsible for installation, maintenance, and removal of the devices, as well as handling any events they indicate (alarms, alerts, etc.). The electronic devices that are part of the monitoring system, as shown in Figure 1, are the following:

  1. Devices for the perpetrator:

    • The radio frequency (RF) transmitter, displayed in (Figure 1a), is a small, lightweight bracelet that emits a RF signal that is received by a second unit and incorporates sensors to detect tampering or breakage, as well as the absence of physical contact with the wearer.

    • The 2Track unit is a Global Position System (GPS) tracking device that incorporates the basic functionalities of a mobile phone in addition to the reception of the RF signal emitted by the RF transmitter. It can be seen in (Figure 1b).

  2. Device for the victim, shown in Figure 1c, is practically identical to the 2Track unit carried by the convicted person. It incorporates an external RF antenna that allows to detect the RF signal from the transmitter.

Figure 1.

Telematics system devices: for the perpretator a) and b), c) is the device for women.

The alerts can be generated for the following causes: entrance into an exclusion zone, detection of the RF signal by the victim's 2Track unit, low battery, breaking or distancing of the 2Track-bracelet unit, panic button press, and entrance into a proximity zone.

When an alarm occurs, the control center carries out the communications established in the Protocol of Actions for each type of alarm and prepares a report that will be sent to the police unit responsible for the protection of the victim, the judicial authority, and the public prosecutor's office. It should be noted that when the panic button is pressed by the victim, the control center contacts her to verify whether it is an accidental call or whether it is due to a situation of danger. If communication is not achieved or if a situation of danger is confirmed, the control center communicates the incident to the police forces, maintaining permanent communication with them to facilitate the location of the victim, and activating immediately the police protection operative.

Other resources 24-7-365 accessible to victims are the 016 service, which offers information and legal advice on issues of gender-based violence, and ATENPRO, which provides the victims immediate remote assistance by a mobile terminal that enables them to be in permanent contact with a support center that responds quickly to cope with any situation that may arise.

Although, as we have just seen, there are multiple mechanisms currently available to victims of gender-based violence to protect themselves and ask for help, the fact is that the number of fatal victims is not decreasing and remains very high. It is worth noting that in 2021, 48 women were murdered in Spain, of whom approximately 57.4% lived with the perpetrator and 80.9% had never filed a complaint against their aggressor. Therefore, the current concept of monitoring of the aggressor is insufficient for the real prevention of this kind of violence.

Advertisement

2. Proposed system

In an attempt to provide a possible solution to the above-mentioned problem, one of the nonprofit associations committed to eradicating gender-based violence, Asociación ALMA Contra la Violencia de Género (ALMA Association Against Gender Violence), carried out a study to detect possible weaknesses in the resources provided to a woman by the government [19]. The methodology followed in this study was, first, to interview women victims of gender-based violence who had filed a legal complaint, some of whom had a monitoring system, to find out what should be the most appropriate characteristics that the alarm devices ought to have. The study also focused on the fact that the number of complaints dismissed for lack of evidence is approximately 50% [20]. The two main characteristics highlighted by the victims were that the device could be easily concealed in some of the victim's accessories so that it could remain unnoticed by the aggressor and that the threats could be recorded to be used later as possible legal evidence. The next step was to examine existing alarm devices on the market, as well as those available through the legal system to determine whether they fulfilled the specifications demanded by the women. Regarding existing pocket alarms on the market, such as flic [21], HelpySafe [22], Minew SOS emergency button [23], or panic button bracelets such as Kwema [24] or Safelet [25], none of them met the requested requirements. These commercial devices are not miniaturized and therefore cannot be adapted and camouflaged in the victim's accessories to pass undetected by the aggressor.

Concerning the resources available under the laws, some features should be included so that they could meet the specifications most requested by the victims. Thus, it was concluded that it would be necessary to develop a new device that would widen the present coverage that is, currently provided to potential victims. For example, to use this new device, it would not be necessary to cohabit with the aggressor or to have filed a previous complaint. Figure 2 shows a comparison of the characteristics of the main governmental resources available to victims of gender-based violence and the proposed new system. To implement this new system, ALMA Association contacted the Electronic Technology Group of the Department of Electrical, Electronic, and Automatic Engineering of the University of Extremadura. As a result of this collaboration, a comprehensive assistance system for victims of gender violence has been proposed.

Figure 2.

Comparative characteristics of different systems for the prevention of gender-based violence.

The objectives to be achieved by the system to be developed were defined around six fundamental points to meet the required features:

  1. Miniaturization of the electronic device, which will allow for a versatile form of it, facilitating its use in different circumstances, characteristics, or personal limitations.

  2. Possibility for the electronic device to be camouflaged in the victim's accessories such as watches, bracelets, and belts. This will allow the device to be hidden from the aggressor and thus, being unaware of its physical morphology, which will prevent it from being located and neutralized.

  3. Following the recommendations of the bodies involved in the eradication of gender violence, a mechanism for collecting audio, that can be used as legal evidence, is incorporated. In this way, the large number of complaints of mistreatment that are not admitted for lack of evidence is avoided.

  4. Low power consumption, allowing a long battery life.

  5. Development of applications for mobile phones that register the sound of the victim's environment and send the alarm signal and the location of the victim to a control center.

  6. Creation of a control center for the monitoring and tracking of victims, which would be also responsible for coordinating the actions established in the protocols of action referred to police forces.

Figure 3 illustrates the block diagram of the proposed system that fulfills the objectives described above. As can be seen, it consists of three elements: one of them is called the camouflaged alarm device, which would be concealed in some of the victim's accessories in order to hide its true function, other components would be a smartphone, in the case that the victim had access to it, or another concealed device (modem) that would allow connection and sending of information to the third element, which is a control center in charge of monitoring victims. In this way, if the victim did not have a mobile phone (which is very common in this context), another camouflaged device could be provided to carry out the mission of launching the emergency call.

Figure 3.

Block diagram of the proposed alarm system.

Therefore, the main functions of the proposed system are:

  1. Activate the assistance warning: once the device receives the alert signal, it sends a message to the control center or official body, which is responsible for activating the assistance protocol and alerting at least one person in the victim's environment.

  2. Locate the emergency callvia GPS or connection antennas.

  3. Make an audio recording of the threats.

The proposed procedure is as follows: once the victim detects a possible situation of violence, she activates the panic button so that the alert protocol is initiated. This consists of activating the microphone installed in the camouflaged device to register the aggressor's threats, thus facilitating the processing of a possible complaint by having evidence, if any, of verbal aggression. The audio signal is sent to the mobile phone where it is recorded. In addition, the mobile phone sends a message requesting help to the control center with the coordinates of the victim's location. The control center will act according to the protocol foreseen for this type of situation, also notifying the police forces and a “lifesaver” from the victim's environment. It should be noted that both will have the GPS location of the victim so that they will be able, if necessary, to go to the victim's position. The protocol of actions that are initiated once the panic button is activated is illustrated in Figure 4.

Figure 4.

Protocol of action for the incorporation of the alarm device into the comprehensive assistance system.

Advertisement

3. Implemented system

3.1 Electronic device

As mentioned above, two of the objectives proposed in the design and development of the device were the low power consumption and miniaturization. To achieve these objectives, Bluetooth low energy (BLE) technology was chosen, due to its widespread availability on the market, the easy connectivity to a mobile phone, its reduced dimensions, and low power consumption. The core component of the electronic device is the nRF51822 System on Chip (SoC), from Nordic Semiconductor's nRF51 series [26]. The devices of the nRF51 family have a wide supply voltage range (1.8 V–3.6 V) and can be programmed in different ways from C code to Python, Mbed system, or Arduino kernel. In this design, it was decided to develop the code in C language as it is the most robust solution in terms of power consumption.

The firmware of the device is based on the central-peripheral paradigm of the Bluetooth protocol assigning, in this case, the role of peripheral to the device. In this configuration, to be able to connect the device to the mobile phone and subsequently carry out the synchronization, the device must first be in the state called “advertising” in which it sends messages globally so that the rest of the Bluetooth receivers can have access to them. The mobile phone can then detect the device and connect to it, then the message is no longer sent and the communication between devices is determined by the so-called connection parameters, which, among other settings, allows energy consumption to be adjusted. Once the device and mobile phone are paired, two features based on key functionalities of the Bluetooth protocol, services and their characteristics, are used:

  • Battery service, that has a universally unique identifier (UUID) predefined in the Bluetooth protocol so that it is recognizable by all devices subscribing to this standard.

  • Customer service, created in this application, with the purpose of controlling the actions that are performed once the alarm button has been pressed. In this case, the UUID of the service is not within the standard, so it will not be automatically identified by other devices.

The battery service allows all receivers that have access to the device to read the battery level. This is a representation of the battery capacity as a percentage, although the value provided by the chip is in a different format. The reading is carried out via an analog pin and is expressed in millivolts. Therefore, it is necessary to carry out a conversion by applying the necessary scaling factor so that 3.3 V (maximum value of the battery) corresponds to 100% and the minimum voltage, approximately 1.7 V refers to 0%, as at this voltage value the SoC would not operate properly. It is important to note that the battery value is read every 5 minutes and is only notified by the service characteristic if it changes from the previous value.

The customer service has its own characteristic without a predefined UUID, and its value can be read by any device. The values read consist of two bytes of information: one is for the alarm value and the other for additional information. In this characteristic, the state of the alert that the victim activates via the panic button is monitored. Three possible states have been defined:

  • NOTHING is the base state of the alert, in which no danger exists, and no further action is required. The value of the characteristic is the hexadecimal value FFCC.

  • WARNING is the danger state, it is activated by pressing the button with a short press (less than one second). In this case, data is sent to the mobile phone application. This state can be exited by means of the FALSE ALARM procedure or by switching to the ALARM state described below. The value of the characteristic is 0xFFAA.

  • ALARM is the state of alarm. It is activated by pressing the panic button with a long press (more than one second). In this case, data are also sent to the mobile phone application. This state can be accessed from either of the other two states and can only be exited by a RESET or by the FALSE ALARM procedure. The value of the characteristic is 0xFFBB.

Finally, the FALSE ALARM procedure is a mechanism that has been programmed to allow the victim to deactivate the alarm in case of accidental activation. This is done by simply pressing the panic button 10 times.

Since one of the key objectives of this design is to achieve a very small size so that it can be camouflaged in everyday objects worn by the victim, the Wafer Level Chip Scale Package (WLCSP) nRF51822 circuit has been used. It has its terminals arranged in the lower plane, making it the smallest in size of the series. The choice of this type of package also influences the choice of the balun. As can be seen in Figure 5, showing the schematic of the designed circuit, the ultraminiature balun BAL-NRF02D3 by ST Microelectronics is used, as recommended by the manufacturer [27]. The circuit also includes 16 MHz and 32 kHz quartz crystals and filters that attenuate noise in the controller.

Figure 5.

Schematic of the designed circuit.

The printed circuit board (PCB) has been designed with a shape that is similar to that of the nRF51822-beacon kit [28]. As a power supply, the device uses a CR1632 button cell battery. To increase the camouflage options of the device, two contacts have been added in which battery holders with different characteristics can be soldered to provide the device with greater autonomy or other necessary features. The antenna has been designed on the PCB, matching the impedance to the controller output by means of the balun. About the panic button, a model that slightly sacrifices the miniaturization of the design but achieves greater robustness is used. This prevents this element from breaking easily in stressful situations to which the victim may be exposed. For its placement, several contacts have been additionally included so that the panic button can be placed in another position or on the side of the device. The tab on the PCB has an essential role in the initial operation of the device and becomes irrelevant once the device has been programmed. It includes the contacts necessary for loading the executable file into the SoC, but once done and tested, it can be removed. Small holes have been included to facilitate the removal of the PCB tab.

Figure 6a shows the photograph of the assembled device where the panic button can be seen enclosed by a red line. Purple color has been chosen for the PCB because it is the color most associated with non-violence against women. The 3D-printed case that holds and allows the manipulation of the electronic device is shown in Figure 6b.

Figure 6.

Photograph of the designed prototype and case: a) electronic device and b) thermoplastic structure made using a 3D printer.

One of the main requirements of the device is that it can be hidden in different accessories of the victims, such as brooches, pendants, necklaces, earrings, watches, bracelets, and belts. The idea was that the device could be customized according to the victim's personal preferences in such a way that it could be incorporated into the victim's daily life and remain completely unnoticed by the aggressor. Because special attention must be paid to the coating materials of the device, as some problems have been reported with those with a high metal content, the designs have been made with this in mind. For example, the design of the pendant shown in Figure 7 has been handmade by a designer who uses metal-free salt paste in her work.

Figure 7.

Pendant made of metal-free material: a) front side and b) back side where the device is placed.

Other proposals compatible with the camouflage of the developed devices are collars that can be in line with market trends. For example, the left part of Figure 8 shows a design with details that make them suitable for different preferences. Figure 8b illustrates the prototype made in thermoplastic as it can be seen the electronic device can be concealed.

Figure 8.

Appearance of the necklace: a) proposed design and b) thermoplastic prototype with the hidden device.

However, other possibilities may be preferable for the woman, for example, the use of earrings or a belt. In the case of a belt, the design can be made with an outer circumference through which a ribbon can be threaded. This ribbon can also be of the user's choice. The designer's belt is shown in (Figure 9a) and the one made as a prototype in plastic in (Figure 9b) where the embedded electronic device can be seen. In this case, the nRF52832 Bluetooth® 5 SoC from Nordic Semiconductors has been used [29]. Among all its functionalities, the device can transmit sound to a mobile application using its microphone. This functionality has been exploited in this work in such a way that the audio signal is sent to the mobile phone, which starts recording and saving the conversation. For this purpose, two versions of the mobile phone application have been developed: one operating on Android and the other on IOs.

Figure 9.

Device hidden in a belt: a) design of the accessory and b) prototype made of plastic with the electronic device inserted.

Other proposals to camouflage the device have been based on the use of analog clocks. To the best of our knowledge, the current alarm devices available on the market are based solely on the use of digital clocks without the possibility of customization, so another line of research has consisted of integrating the designed device into analog clocks. Several prototypes have been developed, such as a watch face made from a double-sided PCB, an adapter that can be placed inside the watch, and a flexible PCB that serves as a watch strap and can hold as many panic buttons as needed [30, 31]. The fact that double-sided PCB acts both as a support for the electronic components of a Bluetooth communications system and as a face for the watch and helps to reduce the dimensions to a minimum. Figure 10 shows the portable device that has been designed so that it can be installed inside an analog watch without modifying its structure. In this way, its ability to go unnoticed is enhanced by the fact that it can be interchanged between different watches. It would thus be possible to have different watches in which to install the device that would be completely undetected by attackers. The mode of operation of these devices is like those described above, that is, in a situation of danger, and once the panic button inserted in the electronic device has been pressed, it sends a distress message to the control center. Similarly, other versions could be implemented in which the voice could be recorded in an internal storage memory, or the audio signal could be sent continuously (streaming) to the mobile phone for recording as possible legal evidence. The fundamental difference between the three versions lies in the battery life, which is maximum in the first version and minimum in the last one.

Figure 10.

Photograph of the designed watch adapter.

Regarding the device developed, as seen in Figure 10, the electronic components are distributed on a 0.4 mm thick PCB. The electronic circuitry, when the functionality is restricted to its use as a panic button, consists of the Fanstel’s BlueNor BC832 Bluetooth module, responsible for the wireless connection with the mobile phone [32]. This module, includes the Nordic Semiconductors nRF52832 SoC with ARM Cortex M4F microprocessor, flash memory of 512 kB, and a RAM of 64 kB. The operating power supply voltage can be adjusted in the range from 1.7 V to 3.6 V. Other components are a 32 kHz quartz clock, a push button that assumes the function of a camouflaged panic button, zinc-air batteries for power supply, and battery measurement and management electronics for detailed control of battery consumption.

The shape of the designed device is circular, with a central cavity of identical dimensions to those of the watch movement, so that it can be easily placed inside it. In this case, it is a standard one with the shape described in the figure, which corresponds to the Miyota 2035 type [33]. The dimensions reserved for its location are 18.20 mm x 14.11 mm and its height is 3.15 mm. In addition, it has a linear lateral room reserved for the placement of the watch stem (see the left side of Figure 10) so that it can be handled without difficulty. Figure 11 shows the assembly of all the parts of the watch described above.

Figure 11.

Assembly of all parts of the watch including the adapter.

3.2 Mobile phone application

The complete assistance system includes the use of mobile phone applications, which have been developed for both Android and iOS operating systems. These applications are designed to be used by the victim and thus must be implemented to work in the background so that their operation is completely unnoticed by the aggressor.

The flowchart of the mobile application's mode of operation is illustrated in Figure 12. As can be seen, the routine starts with the device in “advertising” mode trying to establish a connection with the mobile phone.

Figure 12.

Flowchart of the mobile phone application.

This procedure can be seen in Figure 13, where the screenshot of the mobile phone with the icon of the application developed for Android is shown (Figure 13a), as well as the one (Figure 13b) during the search for devices. Once they are located, it displays their Bluetooth identifier and the option to pair the device. If this option is selected, the application indicates on its screen that the connection was successful, as shown in Figure 13c. If the device fails to pair with the mobile phone, it sends an error message to the control center alerting about it and continuing the pairing process.

Figure 13.

Screenshot of the Android mobile phone application: a) application icon, b) searching for devices during the process of pairing and c) connection successfully established.

The device is initiated in the normal state, that is, no alert. Three configurable time parameters have been defined within the application: TN, TW, and TA. These parameters correspond to the time intervals in which the application notifies the NOTHING, WARNING, and ALARM status, respectively, together with the location of the victim, to the control center. That is, in the normal operating state the electronic device sends a message to the control center every certain TN time. These time parameters can be adjusted in the settings menu of the configuration screen shown in Figure 14a. Specifically, Figure 14b shows the settings display where the time interval in minutes for different device status notifications can be selected. Other configurable parameters have also been included for debugging purposes.

Figure 14.

Screenshots showing the configuration options of the Android application: a) configuration screen and b) configurable time parameters.

Furthermore, as can be seen in Figure 14a, the application provides for the possibility that, if the alarm state is active, sound recordings are made in the telephone that can be sent to the control center. This facilitates, on the one hand, to evaluate the degree of danger of the victim so that a decision on how to proceed can be taken and, on the other hand, they can be provided, if necessary, as evidence in legal proceedings.

If, for any reason, the electronic device loses the connection with the mobile phone, then it automatically switches to “advertising” mode to be reconnected. The application would detect this fact and send a disconnection warning message to the control center. Once both devices are again paired, the status of the device is read and, if there has not been a change during the disconnection time, it returns to the normal operating state. If during the disconnection time the device is in any other state due to a warning or alarm, the application will recognize this new state and will proceed to send the respective warning messages to the control center every TW or TA time interval.

In the case of the victim activating the WARNING or ALARM states by mistake, these states could be reversed by pressing the panic button for 10 times. Thus, the FALSE ALARM would be detected, and the sequence would start again in a normal mode.

3.3 Control and monitoring center

Another essential element for comprehensive and effective care for victims of gender violence is the control and monitoring center, which is responsible for managing the operations to be carried out once the alert call is received. Its mission is to coordinate the actions established in the protocols of action referring to the police forces. For this purpose, a web platform has been developed to manage victims' information, locate them in the event of an alarm, and continuously monitor the different alert devices. Additionally, it is also used to carry out the activation and deactivation of the devices in use, to obtain reports on their operation and to manage alerts and alarms.

The home page of the website is illustrated in Figure 15 where, as can be seen, access is requested through an e-mail address and a password and is restricted to website administrators only.

Figure 15.

Home page of the website.

Once logged in, the web administrator has access to the following options, as shown in Figure 16.

  • Configuration

  • Users

  • Victims

Figure 16.

Website administration panel.

The first two options are reserved for system administration and include information related to the control center contact details, system backups, system log files, and website access data. On the other hand, the victim’s section includes a listing of victims and the options to activate and deactivate them. The listing provides information on the victim's data, the telephone number to which the electronic device is associated, the information on the last connection, as well as the status of the connection. The platform also allows downloading the information from the list of victims in different formats (CSV, Excel, or PDF).

Advertisement

4. Experimental results

The circuitry has been designed using low-power consumption techniques to allow for a long battery life. Given the high-stress situations experienced by the victims, it is very important that the stress is not increased by the possibility of the alarm device losing its functionality due to battery discharge. Since the electronic warning device is continuously sending packets of information to the mobile phone to check and record its correct functioning, the wireless modules have been programmed to operate in ultra-low power (deep sleep) mode to achieve considerable energy savings.

The power consumption testing and monitoring were conducted with two main objectives: to characterize the current consumption of the device—and therefore the battery life—and to know the range of the Bluetooth signal. The power consumption tests were performed using LabVIEW software [34]. The instruments used include the NI USB-6221 data acquisition card [35] and the Agilent 34401A digital multimeter [36]. The idle current was measured with the digital multimeter due to its low sampling frequency, which prevents the detection of the current peaks associated with the sending of Bluetooth data packets. The idle current measured was about 2.5 μA. On the other hand, a routine was implemented in LabVIEW to detect the sending of data packets and measure the peaks of current. The test was carried out using two digital inputs on the data acquisition board: one to measure the device's current consumption and the other to monitor the voltage of the battery. Both inputs were configured as fully differential. To measure the current consumption, a 10 Ω resistor was placed between the button cell and the circuit to determine the voltage and then calculate the current. Figure 17 shows the oscilloscope screenshot corresponding to the voltage across the resistor. As can be derived from the measurement, the peak current is approximately 12 mA.

Figure 17.

Screenshot of the oscilloscope showing the demanded current peaks prior to sending information.

Similarly, battery life was also tested. Figure 18 illustrates the discharge plot of the CR1632 coin cell voltage versus time as a function of the number of transmissions per second. As can be seen, if the number of transmissions is limited to one per second, the battery has almost full capacity even after more than two months of operation and loses completely its functionality after approximately four months. As for the Bluetooth signal range, measurements were 10–12 meters indoors and about 45–50 meters outdoors, which is enough for the proposed application of the device.

Figure 18.

Battery discharge voltage curve versus time and number of transmissions/s: blue: 1 transmission/s, red: 5 transmissions/s, green: 10 transmissions/s, and yellow: 15 transmissions/s.

To validate the functionality of the entire implemented system, field tests were carried out with the assistance of the ALMA Association, which contacted some victims of gender-based violence. They volunteered to use both the camouflaged device and the mobile phone with the application developed to perform the tests. For this purpose, they were registered on the website that operates as a control center and included in a list of victims as shown in Figure 19. This screen also displays the telephone number to which the electronic device is associated, the data of the last connection, as well as the current connection status. In this case, the color codes used on the connection status buttons are green for NOTHING, yellow for WARNING, red for ALARM, and light blue for FALSE ALARM.

Figure 19.

Screen with the information of the victims list.

On the other hand, the right column shows the different options that can be accessed on this screen. From left to right, these options are as follows: location, which provides the victim's last location; view and edit, which allows the victim's information to be edited; and, finally, the icon to delete the victim, where the victim's data is deleted.

In case an alarm is activated, a window will pop up on the upper right-hand side of the screen, indicating the name of the victim and offering the option to determine the location, as depicted in Figure 20. Clicking on this option, the screen shown in Figure 21 will be displayed, where, in addition to the location of the victim, other information is included, such as the device's status history for the last 12 hours, the data corresponding to the level of mobile phone coverage, the charge level of its battery, and the battery level of the electronic device.

Figure 20.

Screen with a pop-up message of the victim in danger.

Figure 21.

Victim location window.

Additionally, two action buttons are displayed on the screen; one is intended to play the audio sent by the mobile phone application, and the other is used to contact the victim so that their level of distress can be determined.

The complete system is still in the testing phase, pending on the approval by all the responsible institutions of the state, autonomous communities, and local bodies involved in the subject of gender-based violence.

Advertisement

5. Conclusions

An integral assistance system for victims of gender-based violence has been designed. The system consists of a camouflaged electronic alarm device, which connects via Bluetooth Low Energy to a mobile phone that sends an alarm message to a control center in charge of monitoring the victims registered on its website. Along with the alarm signal, the location of the victim and an audio record of the threatening, which can be used as evidence in legal proceedings, are also sent so that police forces can assist the victim. The system has been developed paying special attention to a minimum power consumption requirement, a reduced size so that the electronic device can easily be camouflaged in any accessory of the victim's jewelry, and the option of audio recording among its possible features. The system is intended to be used by victims who still live with the aggressor and therefore have no other governmental protection mechanisms. These victims account for approximately 65% of all gender-based violence deaths.

Advertisement

Thanks

The authors are grateful to the nonprofit association ALMA for the invaluable assistance they provide to victims of gender-based violence and for supporting the development of this project. We would also like to thank the Government of Extremadura and the European Regional Development Fund (Fondo Europeo de Desarrollo Regional, FEDER) for financial help by project IB16211.

References

  1. 1. United Nations Office on Drugs and Crime. Global Study on Homicide. Vienna: United Nations Office on Drugs and Crime; 2018
  2. 2. Sardinha L, Maheu-Giroux M, Stöckl H, Meyer SR, García-Moreno C. Global, regional, and national prevalence estimates of physical or sexual, or both, intimate partner violence against women in 2018. Lancet. 2022;399:803-813. DOI: 10.1016/s0140-6736(21)02664-7
  3. 3. García-Moreno C, Pallitto C, Devries K, Stöckl H, Watts C, Abrahams N. Global and Regional Estimates of Violence against Women: Prevalence and Health Effects of Intimate Partner Violence and Non-Partner Sexual Violence. Switzerland: World Health Organization; 2013
  4. 4. United Nations. Universal Declaration of Human Rights [Internet]. 1948. Available from: https://www.un.org/en/about-us/universal-declaration-of-human-rights [Accessed: February 09, 2022]
  5. 5. United Nations. United Nation Entity for Gender Equality and the Empowerment of Woman. World Conference of the International Women's Year [Internet]. 1975. Available from: https://www.un.org/womenwatch/daw/beijing/mexico.html [Accessed: February 09, 2022]
  6. 6. United Nations. United Nation Entity for Gender Equality and the Empowerment of Woman. Convention on the Elimination of all forms of Discrimination Against Women [Internet]. 1979. Available from: https://www.un.org/womenwatch/daw/cedaw/cedaw.htm [Accessed: February 09, 2022]
  7. 7. United Nations. United Nation Entity for Gender Equality and the Empowerment of Woman. World Conference of the United Nations Decade for Women: Equality, Development and Peace [Internet]. 1980. Available from: https://www.un.org/womenwatch/daw/beijing/copenhagen.html [Accessed: February 09, 2022]
  8. 8. United Nations. United Nation Entity for Gender Equality and the Empowerment of Woman. World Conference to review and appraise the achievements of the United Nations Decade for Women: Equality, Development and Peace [Internet]. 1985. Available from: https://www.un.org/womenwatch/daw/beijing/nairobi.html [Accessed: February 09, 2022]
  9. 9. United Nations. United Nation Entity for Gender Equality and the Empowerment of Woman. Fourth World Conference on Women [Internet]. 1995. Available from: https://www.un.org/womenwatch/daw/beijing/fwcwn.html [Accessed: February 09, 2022]
  10. 10. Council of Europe. European Court of Human Rights. Convention for the Protection of Human Rights and Fundamental Freedoms [Internet]. 1950. Available from: https://www.echr.coe.int/Documents/Convention_ENG.pdf [Accessed: February 09, 2022]
  11. 11. European Parliament. Combating violence against women [Internet]. 2004. Available from: https://www.europarl.europa.eu/doceo/document/TA-6-2006-0038_EN.pdf [Accessed: February 09, 2022]
  12. 12. European Parliament. Elimination of violence against women [Internet]. 2009. Available from: https://www.europarl.europa.eu/doceo/document/TA-7-2009-0098_EN.html [Accessed: February 09, 2022]
  13. 13. European Parliament. Istanbul Convention: Convention on preventing and combating violence against women and domestic violence [Internet]. 2011. Available from: https://www.europarl.europa.eu/RegData/etudes/ATAG/2021/698801/EPRS_ATA(2021)698801_EN.pdf [Accessed: February 09, 2022]
  14. 14. Organic Law 1/2004 of 28 December, on Integral Protection Measures against Gender Violence
  15. 15. Organic Law 3/2007 of 22 March, for Effective Equality between Women and Men
  16. 16. Royal Decree - law 9/2018 of 3 August, on urgent measures for developing the State Pact against Gender Violence
  17. 17. Ministry of the Presidency, Relations with Parliament, and Equality. Secretary of State for Equality. Government Delegation for Gender-based Violence [Internet]. 2016. Available from: https://violenciagenero.igualdad.gob.es/planActuacion/estrategiaNacional/docs/Estrategia_Nacional_Ingles.pdf [Accessed: February 09, 2022]
  18. 18. Ministry of the Interior, Ministry of Equality, Judicial Council and Public Prosecutor's Office. Action Protocol for the Monitoring by Telematic Means of the Measures of Distance in Matters of Gender Violence. 2009
  19. 19. ALMA. Non-profit Association against Gender Violence [Internet]. 2016. Available from: https://www.asociacion-alma.es/proyecto-alma [Accessed: October 25, 2022]
  20. 20. Ministry of Equality. Government Delegation for Gender-based Violence. Statistical website [Internet]. 2021. Available from: https://violenciagenero.igualdad.gob.es/violenciaEnCifras/victimasMortales/fichaMujeres/home.htm [Accessed: October 25, 2022]
  21. 21. Flic. Simplify Life [Internet]. 2017. Available from https://flic.io/ [Accessed: December 22, 2022]
  22. 22. HelpySafe. Connected to life [Internet]. 2018. Available from https://helpysafe.com/ [Accessed: October 20, 2022]
  23. 23. Minew B10 Emergency Button [Internet]. 2018. Available from https://www.minew.com/product/b10-emergency-button/ [Accessed: September 11, 2018]
  24. 24. Kwema. La joya inteligente [Internet]. 2017. Available from https://rolograma.com/kwema-el-nuevo-invento-que-pretende-acabar-con-las-agresiones-y-la-violencia-de-genero/ [Accessed: December 03, 2018]
  25. 25. The S.O.S. Bracelet [Internet]. 2016. Available from https://safelet.com/es/home-es/ [Accessed: January 23, 2017]
  26. 26. Nordic Semiconductors. nRF51822 Bluetooth Low Energy and 2.4 GHz System on Chip [Internet]. 2012. Available from: https://www.nordicsemi.com/products/nrf51822 [Accessed: November 02, 2017]
  27. 27. ST Microelectronics. BAL-NRF02D3 [Internet]. 2016. Available from https://www.st.com/en/wireless-connectivity/bal-nrf02d3.html [Accessed: November 02, 2017]
  28. 28. Nordic Semiconductors. nRF51822 Bluetooth Smart Beacon Kit [Internet]. 2012. Available from: https://www.nordicsemi.com/Products/reference-designs/nrf51822-beacon-kit [Accessed: November 02, 2017]
  29. 29. Nordic Semiconductors. nRF52832 Versatile Bluetooth 5.3 supporting Bluetooth Low Energy, Bluetooth mesh and NFC System on Chip [Internet]. 2017. Available from: https://www.nordicsemi.com/products/nrf52832 [Accessed: December 22, 2018]
  30. 30. Domínguez Puertas M A, Pérez-Aloe Valverde R, Pérez González B M, Carrillo Calleja J M, Duque Carrillo J F, Valverde Valverde J M, Lozano Oliva J. Dispositivo inalámbrico de auxilio (Wireless Assistance Device). Spain Utility Model 1 261 088; 2021-05-10, 2021
  31. 31. Domínguez Puertas M A, Pérez-Aloe Valverde R, Pérez González B M, Carrillo Calleja J M, Duque Carrillo J F, Valverde Valverde J M, Lozano Oliva J. Correa de reloj electrónica para la solicitud de auxilio (Electronic watch strap for assistance request). Spain Utility Model 1 269 094; 2021-09-15, 2021
  32. 32. Fanstel. BC832, Micro BLE 5.2 Module for Wearable IoTs [Internet]. 2017. Available from: https://www.fanstel.com/bt832-1 [Accessed: January 28, 2019]
  33. 33. Miyota. Movement Cal.2025 Standard [Internet]. 2010. Available from: https://miyotamovement.com/product/Super+2035/ [Accessed: January 28, 2019]
  34. 34. LabVIEW. Entorno de Programación Gráfica [Internet]. 2011. Available from: https://www.ni.com/es-es/shop/labview.html [Accessed: February 28, 2017]
  35. 35. USB-6221. National Instruments [Internet]. 2012. Available from: https://www.ni.com/es-es/support/model.usb-6221.html [Accessed: March 19, 2016]
  36. 36. Keysight Agilent HP 34401A Multimeter [Internet]. 2002. Available from: https://www.keysight.com/us/en/products/digital-multimeters-dmm.html [Accessed: May 15, 2015]

Written By

Miguel Á. Domínguez, Raquel Pérez-Aloe, Bruno Pérez, Javier Lozano and Juan M. Carrillo

Submitted: 07 December 2022 Reviewed: 15 February 2023 Published: 14 March 2023