SAPP: The game-changer in Nigeria’s battle against insecurity and emergency delays
DOI:
https://doi.org/10.21834/e-bpj.v9iSI18.5458Keywords:
Safety and Security, Nigeria Insurgency, Emergency concerns, Security Application, Real-time trackingAbstract
In Nigeria, pervasive insecurity, characterized by Boko Haram massacres, suicide bombings, Fulani herder genocides, abductions, and armed robberies, has led to massive loss of life and property. Traditional approaches like curfews, states of emergency, and military checkpoints have proven inadequate, primarily due to late emergency call responses caused by the inability to quickly identify dangerous zones. Utilizing a Design Science Research methodology, this study designs, develops, and evaluates the Security and Prompt Protection (SAPP) mobile application. SAPP is engineered to bridge these security gaps by enabling victims in perilous situations to instantly alert both loved ones and security agencies, while simultaneously providing their real-time geographical location for immediate, targeted assistance
References
Acheampong, R. A. (2021). Societal impacts of smart, digital platform mobility services—an em-pirical study and policy implications of passenger safety and security in ride-hailing. Case Studies on Transport Policy, 9(1), 302–314. https://doi.org/10.1016/j.cstp.2021.01.008 DOI: https://doi.org/10.1016/j.cstp.2021.01.008
Adebakin, M. A. Raimi, L. (2012). National Security Challenges and Sustainable Economic Development: Evidence from Nigeria. Journal of Studies in Social Sciences ISSN 2201-4624 Vol-ume 1 (2012), Number 1, 1-30, 1(1), 1–30.
Adesoji, A. (2010). The Boko Haram uprising and Islamic revivalism in Nigeria. Africa Spectrum, 45(2), 95–108. https://doi.org/10.1177/000203971004500205 DOI: https://doi.org/10.1177/000203971004500205
Afzal, M. (2020). From “Western education is forbidden” to the world’s deadliest terrorist group. Foreign Policy at Brookings, April, 2–28.
Dah, J., & Hussin, N. (2021). A Conceptual Framework of a Streamlined Extended Technology Acceptance Model for Mobile Application Adoption. International Journal of Social Sci-ence Research, 9(2). https://doi.org/10.5296/ijssr.v9i2.18649 DOI: https://doi.org/10.5296/ijssr.v9i2.18649
Giovanni, J. Di. (2014). The Deadly Mission of Boko Haram; The kidnapping of 276 Nigerian girls has put Islamist militants Boko Haram on the map. What do they want? Newsweek, 162(21). https://go.gale.com/ps/i.do?p=HRCA&sw=w&issn=00289604&v=2.1&it=r&id=GALE%7CA371931741&sid=googleScholar&linkaccess=fulltext
Global Terrorism Index. (2018). 2018 Global Terrorism Index. http://visionofhumanity.org/app/uploads/2019/01/GTI2018-A3-poster-wall-chart.pdf
Global Kidnapping Epidemic | LinkedIn. (n.d.). Retrieved August 30, 2022, from https://www.linkedin.com/pulse/global-kidnapping-epidemic-scott-bernstein/
Grevet, C., Choi, D., Kumar, D., & Gilbert, E. (2014). Overload is overloaded: Email in the age of gmail. Conference on Human Factors in Computing Systems - Proceedings, 793–802. https://doi.org/10.1145/2556288.2557013 DOI: https://doi.org/10.1145/2556288.2557013
James, A. (2013). A seminar report on Accident Detection and Reporting System using GPS , GPRS and GSM Technology Submitted by. IEEE/OSA/IAPR International Conference on Informatics, Electronics & Vision Accident, September 2013, 29.
Javale, D., Mohsin, Mohd., Nandanwar, S., & Shingate, M. (2013). Home automation and security system using IoT. International Journal of Electronics Communication and Computer Tech-nology, 3(2), 21–24. https://doi.org/10.18280/ria.330104
Khawas, C., & Shah, P. (2018). Application of Firebase in Android App Development-A Study. Article in International Journal of Computer Applications, 179(46), 975–8887. https://doi.org/10.5120/ijca2018917200 DOI: https://doi.org/10.5120/ijca2018917200
Lacatus, C., Akopian, D., & Shadaram, M. (2012). Reduced complexity crosscorrelation interfer-ence mitigation in GPS-enabled collaborative ad-hoc wireless networks - Theory. Computers and Electrical Engineering, 38(3), 603–615. https://doi.org/10.1016/j.compeleceng.2011.05.001 DOI: https://doi.org/10.1016/j.compeleceng.2011.05.001
Miriyala, G. P., Sunil, P. V. V. N. D. P., Yadlapalli, R. S., Pasam, V. R. L., Kondapalli, T., & Miri-yala, A. (2016). Smart Intelligent Security System for Women. International Journal of Electronics and Communication Engineering & Technology (IJECET), 7(2), 41–46.
Moroney, L. (2017). The Firebase Realtime Database. The Definitive Guide to Firebase, 51–71. https://doi.org/10.1007/978-1-4842-2943-9_3 DOI: https://doi.org/10.1007/978-1-4842-2943-9_3
Nya. (2018). Kidnap for Ransom Global Trends 2017. April.
Qureshi, K. N., Naveed, A., Kashif, Y., & Jeon, G. (2021). Internet of Things for education: A smart and secure system for schools monitoring and alerting. Computers and Electrical En-gineering, 93(March), 107275. https://doi.org/10.1016/j.compeleceng.2021.107275 DOI: https://doi.org/10.1016/j.compeleceng.2021.107275
Ribeiro, A., Ferreira, J. F., & Mendes, A. (2021). EcoAndroid: An Android Studio Plugin for Developing Energy-Efficient Java Mobile Applications. IEEE International Conference on Software Quality, Reliability and Security, QRS, 2021-December, 62–69. https://doi.org/10.1109/QRS54544.2021.00017 DOI: https://doi.org/10.1109/QRS54544.2021.00017
Saigh, M. M., Kevin Richard Arndt, & Saigh, A. V. (2014). PERSONAL SAFETY MOBILE NOTIFICATION SYSTEM. United States Patent, 1–23.
Sheriff F. Folarin, P. (2014). Cultural Plurality, National Integration and The Security Dilemma In Nigeria. Covenant University Journal of Politics and International Affairs, 2(1), 81–92.
Singh, R. (2014). An Overview of Android Operating System and Its Security Features. Journal of Engineering Research and Applications Www.Ijera.Com, 4(2), 519–521. http://ptcoresec.eu/2013/05/02/part-1-getting
Sweidan, S. Z., Saifan, R., Darabkh, K. A., Abu-Kaff, S., & Al-Ali, S. (2017). Kids’ Tracker: An Android Application for Tracking Children. Journal of Software Engineering and Applica-tions, 10(13), 907–924. https://doi.org/10.4236/jsea.2017.1013052 DOI: https://doi.org/10.4236/jsea.2017.1013052
Varsha, S., & Srikanth, U. (2017). A Survey On Android Applications For Personal Security. International Journal of Modern Trends in Engineering & Research, 4(2), 1–7. https://doi.org/10.21884/ijmter.2017.4043.sgbkp DOI: https://doi.org/10.21884/IJMTER.2017.4043.SGBKP
Vijayakumar, P., Pandiaraja, P., Karuppiah, M., & Jegatha Deborah, L. (2017). An efficient secure communication for healthcare system using wearable devices. Computers and Electrical Engineering, 63, 232–245. https://doi.org/10.1016/j.compeleceng.2017.04.014 DOI: https://doi.org/10.1016/j.compeleceng.2017.04.014
Wu, D., Moody, G. D., Zhang, J., & Lowry, P. B. (2020). Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use in-tention. Information and Management, 57(5), 103235. https://doi.org/10.1016/j.im.2019.103235 DOI: https://doi.org/10.1016/j.im.2019.103235
Wu, S., Sun, W., Liu, X., & Zhang, Y. (2018). Forensics on twitter and wechat using a customised android emulator. 2018 IEEE 4th International Conference on Computer and Communica-tions, ICCC 2018, 602–608. https://doi.org/10.1109/COMPCOMM.2018.8781056 DOI: https://doi.org/10.1109/CompComm.2018.8781056
Yang, Q., Li, Z., Liu, Y., Long, H., Huang, Y., He, J., Xu, T., & Zhai, E. (2019). Mobile gaming on personal computers with direct android emulation. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. https://doi.org/10.1145/3300061.3300122 DOI: https://doi.org/10.1145/3300061.3300122
Yarrabothu, R. S., & Thota, B. (2016). Abhaya: An Android App for the safety of women. 12th IEEE International Conference Electronics, Energy, Environment, Communication, Comput-er, Control: (E3-C3), INDICON 2015, 3–6. https://doi.org/10.1109/INDICON.2015.7443652
Yi, H., Qian, H., Yubin, W., & Zhiyong, X. (2014). Research on Global Positioning System in Mobile Communication Equipment Based on Android Platform. 888.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 John Dah, Norhayati Hussin, Muhamad Khairulnizam Zaini, Divine Senanu Ametefe

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.