Skip to main content

Table 4 App features and functionality

From: The use of mobile phone applications to enhance personal safety from interpersonal violence – an overview of available smartphone applications in the United Kingdom

 

N

% apps with attribute

% of all apps

Incident assistance

72

 

83.7

Alarm systems

19

 

22.1

 Siren

19

100.0

22.1

 Flashing light

2

10.5

2.3

Evasive action

14

 

16.3

 Diversion Calla

6

42.9

7.0

 Duress pinb

8

57.1

9.3

Alert systems

61

 

70.9

Alert activation

 Button press

53

86.9

61.6

  (in app)

48

78.7

55.8

  (external button)

17

27.9

19.8

 Location/movement sensorc

9

14.8

10.5

 Paired device

10

16.4

11.6

 Pre-Set timer

8

13.1

9.3

 Voice controlled

5

8.2

5.8

Alert recipient(s)

 Designated contact(s)

61

100.0

70.9

 Emergency service operator

10

16.4

11.6

 Nearby app users

1

1.6

1.2

Method of sending alert to recipient(s)d

 SMS

43

70.5

50.0

 Call

13

21.3

15.1

 Email

11

18.0

12.8

 Social media

3

4.9

3.5

 In app notification (to other app users)

11

18.0

12.8

Alert content

 Location

50

82.0

58.1

 Safety check-in

16

26.2

18.6

 Othere

4

6.6

4.7

Evidence capture

29

 

33.7

 Photo capture

22

75.9

25.6

 Video recording

18

62.1

20.9

 Audio recording

11

37.9

12.8

 Otherf

4

13.8

4.7

 Remote Storage

10

34.5

11.6

Information generation and dissemination

56

 

65.1

Monitoring others

45

 

52.3

 Location tracking

36

80.0

41.9

 Geofence alert

5

11.1

5.8

 Check-in (location)

20

44.4

23.3

 Parental controlg

3

6.7

3.5

Educational Information

22

 

25.6

 Service/support contact information

5

22.7

5.8

 Violence prevention adviceh

14

63.6

16.3

 Violence mitigation and first aid

3

13.6

3.5

 Game play

4

18.2

4.7

  1. a Fake call to the user’s phone
  2. b Fake pin code sends an alert
  3. c Including accident/fall detection
  4. d Some apps use multi-methods
  5. e SOS message without location, accident/fall alert, live video stream
  6. f Storage of other evidence including messages, emails, and social media
  7. g App blocker/monitor, screen time limit
  8. h Incident mapping, safety audit, recognising signs of violence