Abstract
Aim: This article looks at the societal impact of a research study 10 years after it obtained proof of concept as a prototype for surveillance. The solution was used to continuously monitor communication of a mobile device and intercommunication unit within a defined space. Introduction: Citations of a key reference article written on the use of Geofencing as a Security Strategy Model were retrieved and reviewed to assess its real-world use and societal penetration. Motivation: After nearly 10 years of publishing the first paper on Geofencing as a Security Strategy Model and launching the prototype for commercial purposes, this paper’s motive is to evaluate its societal impact. Problem statement: The impact of applied technological research can be obvious, but the benefits of basic research which this was as at the time can be difficult to assess. Approach: To standardize the collection of information related to the reference work, the review used keyword searches of academic repositories and electronic databases from September 2009 to February 2018, including Google Scholar. The survey was done in batches to enable ease of flow and analysis. Result: The model’s transferability and application have no limitations as the concept and its implementation are simple and draw on existing technologies which are available and at low cost. Conclusion: Key citations of a paper which uses surveillance technology written in 2009 have been gathered to ascertain past and future trends of its uses within academia and in practice.
Similar content being viewed by others
References
Akshay, S., & Apoorva, P. (2014) Security measures on mobile technology using software as a service. International Journal of Science and Research, 3(7). Available at https://www.researchgate.net/publication/318420882_Security_Measures_on_Mobile_Technology_Using_Software_as_a_Service_SaaS. Accessed 25 Mar 2018.
Anon. (2010). The technology is obviously beneficial, you should seek funding from the relevant government bodies to commercialise it (CPNI, Government Representative). Demonstration of Geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com
Ayub, I. (2015a). Cell phone service providers agree to share data with police. (2015). [Blog] Dawn. Available at https://www.dawn.com/news/1196936. Accessed 23 Mar 2018.
Ayub, I. (2015b). Police manage to access cell phone users’ data for high-profile cases. (2015). [Blog] Dawn. Available at https://www.dawn.com/news/1209575. Accessed 23 Mar 2018.
Biltgen, P. (2016). Activity-based intelligence: Principles and applications (The Artech House Electronic Warfare Library). Artech House, Norwood, MA.
Boselli, C., Danis, J., McQueen, S., Breger, A., Jiang, T., Looze, D., & Ni, D. (2016). Geo-fencing to secure airport perimeter against sUAS. International Journal of Intelligent Unmanned Systems, 5(4), 102–116. Available at: https://www.emeraldinsight.com/doi/pdfplus/10.1108/IJIUS-02-2017-0002. Accessed 25 Mar 2018.
Churchill, A. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Cirillo, F., Jacobs, T., Martin, M., & Szczytowski, P. (2014). Large scale indexing of geofences. Pdfs.semanticscholar.org. Available at https://pdfs.semanticscholar.org/0922/cc5c0b2420178a7de937b437d9e94eb6018d.pdf. Accessed 24 Mar 2018.
Dabhi, M. (2016). Geofencing: A generic approach to real time location based tracking system. [Online] Ijcnwc.org. Available at http://www.ijcnwc.org/papers/vol6no62016/6vol6no6.pdf. Accessed 24 Mar 2018.
Edtechmagazine.com. (2015). Resiliency, reliability and security are key concerns for maintaining network resources. Available at https://edtechmagazine.com/sites/default/files/88889-wp-g-networks-df.pdf. Accessed 23 Mar 2018.
Federal Register: The Daily Journal of the United States Government. (2015). Exemption to prohibition on circumvention of copyright protection systems for access control technologies. Available at https://www.federalregister.gov/documents/2015/10/28/2015-27212/exemption-to-prohibition-on-circumvention-of-copyright-protection-systems-for-access-control. Accessed 24 Mar 2018.
Fernandez, R., & Birse, S. (2014). Branch device geo-fencing pairing security. US20160078742A1.
Fisken, D. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Foeckl, R. (2015). Why geofencing will become the next endpoint security innovation (Vol. 5, pp. 2–4). SC Media. Available at https://www.scmagazineuk.com/why-geofencing-will-become-the-next-endpoint-security-innovation/article/537168/. Accessed 24 Mar 2018.
Geofencing 101. (2015). A beginners guide. [Blog] Zippr. Available at http://zip.pr/blog_full.php?id=1440060061. Accessed 26 Mar 2018.
Grosinger, M., & Hackett, C. (2014). The growth of geofence tools within the mapping technology sphere (Vol. 12, pp. 2–5). Available at https://www.pdvwireless.com/the-growth-of-geofence-tools-within-the-mapping-technology-sphere/. Accessed 24 Mar 2018.
Haddock, W. J. (2016). Geo-fencing technologies and security. Geo-fencing technologies and security. InfoSecWriters.com. Available at http://www.infosecwriters.com/articles/2016/06/27/geo-fencing-technologies-and-security. Accessed 24 Mar 2018.
HIPAA Journal. (2015). Mobile devices under HIPAA rules: Will geofencing boost data security. HIPAA Journal, 1–3. Available at https://www.hipaajournal.com/mobile-devices-hipaa-rules-geofencing-data-security-443/. Accessed 25 Mar 2018.
Ijeh, A. (2010a). Wireless security model. IPO UK Journal 6342, GB1018091.7.
Ijeh, A. (2010b). Geofencing security engineering. In: International multiconference of engineers and computer scientists (pp. 1–6). Hong Kong: IAENG. Available at https://pdfs.semanticscholar.org/21d5/409fd2087d1f8e311574a100dfd61cbca269.pdf. Accessed 25 Mar 2018.
Ijeh, A. (2010c). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Ijeh, A. (2011). Geofencing as a security strategy model. Professional Doctorate, University of East London.
Ijeh, A. (2015). Geofencing as a tool for participatory processes. In O. Saar (Ed.), E-governance and urban policy design for developing countries (15th ed., pp. 132–143). Nairobi: UN Habitat. Available at https://unhabitat.org/books/e-governance-and-urban-policy-design-in-developing-countries/. Accessed 25 Mar 2018.
Ijeh, A. (2016). Exploiting geographic information systems and remote sensing for flash floods in Oman. In International water conference 2016 on water resource in arid areas: The way forward (pp. 1–15). Muscat: Springer. Available at https://conference.squ.edu.om/Portals/49/AbstractBook.pdf. Accessed 25 Mar 2018.
Ijeh, A., Brimicombe, A., Preston, D., & Imafidon, C. (2009). Geofencing in a security strategy model. In International conference on global security, safety, and sustainability (pp. 104–111). Berlin: Springer. Available at https://link.springer.com/chapter/10.1007/978-3-642-04062-7_11. Accessed 24 Mar 2018.
Ikhalia, E. (2013). A new social media security model (SMSM). International Journal of Emerging Technology and Advanced Engineering, [online], 3(7), 1–6. Available at https://pdfs.semanticscholar.org/1e8f/a1a62da5e714efced6396927aa2c9afa1192.pdf.
Ikhalia, E., & Imafidon, C. (2013). The need for two factor authentication in social media. In Proceedings of the international conference on future trends in computing and communication 2013 (pp. 1–8). Bangkok: International Conference on Future Trends in Computing and Communication. Available at https://www.researchgate.net/publication/256667821_The_need_for_two_factor_authentication_in_social_media. Accessed 24 Mar 2018.
Jaltare, P., & Holey, A. (2016). Study of location tracking in geo-fencing services. International Journal of Advanced Innovative Technology, 1(2), 1–4. Available at http://www.garph.org/downloads/PGDCST_HVPM_IJAITE_SPECIAL_ISSUE/40.pdf. Accessed 25 Mar 2018.
Johansmeyer, M. (2013). Securing public safety vehicles: Reducing vulnerabilities by leveraging smart technology and design strategies. MSc, Naval Postgraduate School.
Korolov, M. (2015). Geofencing could add security layer for mobile devices (pp. 1–4). CSO. Available at https://www.csoonline.com/article/2891834/mobile-security/geofencing-could-add-security-layer-for-mobile-devices.html. Accessed 25 Mar 2018.
Long, D. (2013). Remote HMI panel having location based operational restrictions IN World Intellectual Property Organisation. WO/2013/191684.
Luxhoj, J. (2016). System safety modeling of alternative geofencing configurations for small UAS. International Journal of Aviation, Aeronautics, and Aerospace, 3(1), 1–27. Available at https://commons.erau.edu/cgi/viewcontent.cgi?article=1105&context=ijaaa. Accessed 25 Mar 2018.
Marchetti, J. (2014). Wearable-home integrated technology (WHIT) Project EDSGN 100, Section 009.
Marie, M. (2014). Indoor and outdoor social alarms: Understanding users’ perspectives. JMIR mHealth and uHealth, 2(1), 1–6. Available at https://mhealth.jmir.org/2014/1/e9/. Accessed 25 Mar 2018.
Meston, J. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Modali, P., Gadamsetty, U., & Wei, J. (2014). Context aware Geofencing related applications. WO2014200504A1.
Mullin, D. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Muriach, A. (2015). Information provision improvement with a geofencing event-based system. MSc, Universitat Jaume I Castelló, Spain.
Osborne, P.. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Parab, N., Koukoumidis, E., & Bryar, N. (2013). Geofence compositions. US20150148060A1.
Prabu, A., Kodavati, B., Appa Rao, T., Rambabu, E., & Sundar Tripathy, S. (2011). Telematics based security system. International Journal of Wireless & Mobile Networks (IJWMN), 3(2), 1–10. http://airccse.org/journal/jwmn/0411wmn12.pdf. Accessed 25 Mar 2018.
Pragnell, J. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Rahate, S., & Shaikh, M. (2016). Geo-fencing infrastructure: Location based service. International Research Journal of Engineering and Technology (IRJET), 3(11), 1–4. Available at https://www.irjet.net/archives/V3/i11/IRJET-V3I11194.pdf. Accessed 25 Mar 2018.
Swain, S. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Szczytowski, P. (2015). Geo-fencing based disaster management service. In Agent technology for intelligent mobile services and smart societies (Vol. 498, pp. 11–21). Berlin: Springer. Available at https://link.springer.com/chapter/10.1007/978-3-662-46241-6_2. Accessed 25 Mar 2018.
Tyler, A. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Van Raan, A. F. J. (2003). The use of bibliometric analysis in research performance assessment and monitoring of interdisciplinary scientific developments. Technikfolgenabschätzung-Theorie und Praxis/Technology Assessment-Theory and Practice, 1(12), 20–29.
Veira, M., & Tsotras, V. (2013). Flexible pattern queries. In M. Veira & V. Tsotras (Eds.), Spatio-temporal databases (1st ed., pp. 5–35). Berlin: Springer. Available at http://www.springer.com/gp/book/9783319024073. Accessed 25 Mar 2018.
Wynd, S. (2010). Demonstration of geofencing as a security strategy model at SITC innovation showcase and networking dinner, held at the DCC Academy, Shrivenham, UK. http://securityintech.com.
Zin, M., Nurji, M., Isa, A., & Isa, M. (2016). Geofencing-based auto-silent mode application. Journal of Telecommunication, Electronic and Computer Engineering, [online], 8(10), 1–6. Available at http://journal.utem.edu.my/index.php/jtec/article/viewFile/1398/880. Accessed 25 Mar 2018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Ijeh, A.C. (2018). Annotated Bibliography on the Impact of Geofencing as a Security Strategy Model. In: Carayannis, E., Campbell, D., Efthymiopoulos, M. (eds) Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-06091-0_63-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-06091-0_63-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06091-0
Online ISBN: 978-3-319-06091-0
eBook Packages: Springer Reference Economics and FinanceReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences