TY - CONF AV - none KW - Android (operating system); Authentication; Life cycle; Mobile security; Network security; Program debugging KW - Android applications; Dangerous situations; Hardware and software; Malaysia; Mobile applications; Personal safety; Personal security; Security methods; Smart phones; Woman safety KW - Smartphones TI - FRNDY: A Women's Safety App ID - scholars17280 N1 - cited By 1; Conference of 6th International Conference on Computing, Communication, Control and Automation, ICCUBEA 2022 ; Conference Date: 26 August 2022 Through 27 August 2022; Conference Code:186077 N2 - Women's security has always been a major concern, and numerous potential solutions have been discussed regarding how technology can be used to address the issue. Currently, the rapid rise in smartphone usage has made it possible to integrate personal security efficiently and effectively with the help of hardware and software. Existing security methods necessitate some form of human input and the use of only pre-selected contacts. When it comes to tragic occurrences involving women, the number is frighteningly high. Problems can arise from a variety of situations, including women walking on the street after work, going to the supermarket, or a variety of other reasons when they are alone. There has been a spike in women-related crimes in Malaysia as well. Therefore, to enhance women's safety in Malaysia this project suggests a mobile application that can come in handy for women who find themselves in dangerous situations. When the need arises, a single click on this application will recognize the location using GPS and will send a message to the registered contacts containing the location URL, as well as call the first registered contact to assist the user in a difficult situation. Authentication of their identity is also mandatory for this application. The primary goal of this study is to ensure and enhance personal safety. As a result, the primary goal of this project is to make it easier for users to get assistance promptly. In addition, a security pin is used as the login password to verify the user's identity and prevent an anonymous or malicious attack. This project makes use of the agile methodology to make certain that testing is carried out in each module. It creates opportunities to reevaluate the development lifecycle to make sure the entire project fulfills the outcome and operates well. After several iterations of refinement and debugging, the final system is deemed bug-free. © 2022 IEEE. SN - 9781665484510 PB - Institute of Electrical and Electronics Engineers Inc. Y1 - 2022/// UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-85147410626&doi=10.1109%2fICCUBEA54992.2022.10010815&partnerID=40&md5=f99c7f434cabd92899e1b440d2a9456e A1 - Premi, P. A1 - Savita, K.S. A1 - Millatina, N. ER -