Privacy Protection in COVID Data Tracking: Textual Analysis of the Literature

Abstract

The literary review presented in the following paper aims to analyze the tracking tools used in different countries during the period of the COVID-19 pandemic. Tracking apps that have been adopted in many countries to collect data in a homogeneous and immediate way have made up for the difficulty of collecting data and standardizing evaluation criteria. However, the regulation on the protection of personal data in the health sector and the adoption of the new General Data Protection Regulation in European countries has placed a strong limitation on their use. This has not been the case in non-European countries, where monitoring methodologies have become widespread. The textual analysis presented is based on co-occurrence and multiple correspondence analysis to show the contact tracing methods adopted in different countries in the pandemic period by relating them to the issue of privacy. It also analyzed the possibility of applying Blockchain technology in applications for tracking contagions from COVID-19 and managing health data to provide a high level of security and transparency, including through anonymization, thus increasing user trust in using the apps.

Share and Cite:

Massari, A. , D’Addosio, V. , De Nicolò, V. and L’Abbate, S. (2024) Privacy Protection in COVID Data Tracking: Textual Analysis of the Literature. Applied Mathematics, 15, 235-255. doi: 10.4236/am.2024.153013.

1. Introduction

December 2019 marked the beginning of a global challenge with the arrival of the SARS-Coronavirus, leading to sudden changes in the strategic, health and governance plans of several countries. Governments responded with lockdown policies and movement restrictions, which were effective in reducing the spread of the epidemic but proved socially and economically costly in the long run. The lack of established data and protocols prompted a search for new interpretive and predictive models to understand and contain the epidemic.

However, predictive models have faced limitations due to the scarcity of data, which are not always reliable, from different sources. The pandemic has highlighted the importance of data quality and availability, leading to the creation of tracking apps in various countries. The most effective contact tracing was found to be where there was greater population adherence to the use of such apps.

The paper examines different approaches used in contact tracing apps, highlighting critical issues and limitations, particularly related to privacy regulatory issues. It also illustrates blockchain technology whose mobile application may, in some ways, be perceived as more secure by end users for the protection and management of personal data, compared to traditional methods.

2. Approaches and Methodologies

2.1. Materials

In the present study, scientific output related to COVID-19 published between 2020 and 2022 was analyzed, with a focus on articles dealing with contact tracing methods and health data privacy. The search was initially conducted using the keywords “COVID-19” on Google Scholar, Pub Med, Scopus, and SIS, identifying articles that contained this word in their titles, abstracts, or keywords. The keywords “Sars” and “Cov2” were then added, resulting in a total of 333,175 articles. By applying filters to focus on articles related to contact tracing and that fell within the statistical scope, the number dropped to 1172. Finally, by introducing the keyword “privacy” as a filter, the number was further reduced to only 75 articles, from [1] - [75] .

A key point that emerged from the literature review is the importance of informed consent for the dissemination of health data, which is considered crucial when analyzing medical phenomena. Privacy protections can hinder complete and accurate data collection, making it difficult to build a comprehensive database on the phenomenon under study. The COVID-19 pandemic has highlighted the challenge of health data availability.

2.2. Textual Analysis

Textual analysis of the reviewed bibliography was conducted using TLab software. The first methodology considered was co-occurrence on the 75 selected articles through Sequence and Network analysis, Word Association, and Comparison of Word Pairs. Sequence and Network Analysis considers the positions of keywords within the sentences of each article. This allowed each text to be represented as a network of word relationships. The relationships between nodes in the network were connected one by one, also identifying predecessor and successor pairs through transition probabilities and Markov chains.

Through Word Association, associations between selected keywords and other words in the texts were checked. An association index was used to measure the degree of linkage between words. The results were represented through radial diagrams, in which the keywords are placed in the center and the other associated words are arranged around them at a distance proportional to the degree of association.

Using the Pairwise Comparison method, pairs of selected words were related to others in the texts. In this way it was possible to evaluate the relationships and associations between different word pairs.

Overall, these analyses provided an in-depth understanding of the relationships between keywords and others in the texts, enabling the identification of significant patterns, trends and correlations within the data.

Significant keywords for the study included “security”, “app”, “privacy”, “trust”, “interoperability”, “centralized”, and “decentralized”.

Multiple Correspondence Analysis (MCA) was used to analyze the patterns of categorical variables, such as keywords or elementary contexts, found in the analyzed texts. This multidimensional statistical technique aims to identify “interdependence” relationships among qualitative variables.

Through MCA, new variables can be extracted that neatly summarize the relevant information contained in the data. This analysis allows visualization of the relationships between the categories analyzed through a factorial plane.

3. Contact Tracing App

Manual tracing, previously effective in the SARS and MERS pandemics, revealed immediate limitations in the COVID-19 pandemic because of the rapid spread of infection. In this case, the contact tracing procedure involved identification of people exposed to the virus and follow-up for at least 14 days after the last exposure, but proved to be ineffective, especially for occasional contacts not easily identified in public places. In addition, the incubation period before symptoms onset made it difficult to map the network of possible exposed individuals and to identify the rate of virus transmission.

To overcome these challenges, many governments developed mobile apps for digital contact tracking during the COVID-19 pandemic. These apps aimed to immediately inform users of exposure to an infected person, expediting isolation, testing and quarantine measures. However, the effectiveness of the apps depended on their acceptance and dissemination, which had to reach at least 60 percent of the population. Unfortunately, most apps had significantly lower rates of use, leading to avoidance of broader restrictive measures.

The literature review revealed that the low uptake of apps was attributable to citizens’ concerns about information security and privacy protection, lack of trust in governments, and lack of understanding of the benefits of apps.

3.1. Analysis of Co-Occurrence

A co-occurrence analysis, using the pairwise comparison method “Figure 1”, showed that trust is closely related to the government and policies adopted, while security is associated with the digital capability of software in terms of

Figure 1. Co-occurrence analysis by comparison of word pairs with respect to the terms “Trust” and “Security”.

cyber and privacy protection of the information obtained. The difficulty in the dissemination of apps was most apparent in democratic countries, where privacy concerns were significant obstacles compared to countries outside the EU, and this was due to the presence of stringent regulations that did not allow the free flow of information. Thus, it was found that in most democratic countries, individual freedom of information circulation outweighed collective health protection, hindering both the monitoring of pandemic trends and the policy strategies to be applied.

The literature review identified several factors that may incentivize the spread of tracking apps during the COVID-19 pandemic. These include:

1) Age and Gender: demographic characteristics such as age and gender can influence the adoption of tracking apps.

2) Presence of comorbid illnesses or higher risk of infection: people with special health conditions or higher risk may be more likely to use the apps.

3) Familiarity with smartphone use: familiarity with smartphone technology may influence app adoption.

4) Trust in government: confidence in the government’s ability to protect the population may play a significant role in app acceptance.

5) Opt-in installation: the ability for users to voluntarily choose to install apps, rather than being forced to, may influence their acceptance.

6) Education level: a higher level of education may be associated with greater understanding and acceptance of tracking apps.

7) Psychological factors: elements such as fear of contagion to self, family, friends, and community of choice may influence app adoption.

8) Perception of benefits: perception of the benefits of using apps can positively influence their adoption.

9) Interoperability and usability: the ease of use and ability of apps to interact with other systems may contribute to their acceptance.

Focusing on users trust in apps, co-occurrence analysis through word associations “Figure 2” revealed that trust is mainly associated with the words “apps,” “governments,” and “participants.” This underscores the fact that users want secure apps that are guaranteed by governments committed to the protection of the public, and trustworthy participants who responsibly use the information they collect. Lack of trust was identified as a major barrier to the adoption of contact-tracking apps, while greater trust in government and technology was correlated with a greater propensity to install such apps.

Interoperability, that is, the ability of systems to exchange information and use it for research purposes, is crucial for the deployment of tracking apps. In this context, managing security and privacy issues is essential, and this can be addressed by improving information about data storage, sharing and use. This approach enables governance to maintain the trust of individuals [1] [2] .

As shown in “Figure 3”, what is most required in terms of interoperability is an information system based on system and information security. System security and information protection are key aspects of ensuring user trust and effective deployment of tracking apps.

In addition, app deployment has been limited by the presence of privacy

Figure 2. Co-occurrence analysis by word association with first-order association index cosine of the word “Trust”.

Figure 3. Co-occurrence analysis by word association with first-order cosine association index of the word “Interoperability”.

protection regulations and the General Data Protection Regulation (GDPR) in force in twenty-eight European Union member states, as well as Iceland, Liechtenstein, and Norway. The GDPR aims to protect personal data while preserving the confidentiality of the information released. Although the GDPR does not prohibit the use of personal data for analysis or other secondary purposes, it does require that technical and organizational measures be taken to protect the data. In addition, data should undergo a process of anonymization to ensure protection throughout the entire cycle of use.

To overcome these limitations, the shared platform called PanEuropean Privacy-Preserving Proximity Tracing (PEPP-PT) was developed. This platform, joined by more than 130 members from eight European countries, aims to identify technology solutions based on general standards for contact tracing, including proximity measurement using widespread devices such as smartphones, data encryption and anonymization, international interoperability, use of scalable architectures and technologies, and use of certified open-source code [3] .

All contact tracing apps (CTAs) developed required local installation on the devices, with the goal of tracking other smartphones and individuals in close physical proximity. In the event that the owner of one of these devices tested positive for COVID-19, the app sent an early warning to everyone in the vicinity, allowing them to isolate themselves and check whether they had contracted the virus [4] [5] [6] .

App-based contact tracking techniques were based on two main methodological approaches: location tracking via GPS and proximity tracking via Bluetooth. In the first mode, apps could track contacts based on location. In this case, a central server obtained the locations of each phone over time and used this information to identify contacts between patients and other users. Location information could be obtained from the cellular service provider or reported by apps that used GPS on smartphones. In the second mode, tracking was via Bluetooth Low-Energy beaconing (BLE) technology developed by Google and Apple. These companies introduced a protocol for tracking contacts through an exposure notification system that recorded contact between users, at what distance and for how long, via cell phone [7] [8] .

In addition, depending on how the sensed information was recorded on the server, two architectures emerged: centralized and decentralized. Both approaches ensured the protection of the personal information released.

The centralized approach involved sharing IDs with a central server operated by public health authorities, where they were matched with positive cases and triggered notifications. This allowed the authorities to have centralized control, as alerting was done by the central server in case of a match.

The textual analysis conducted on 75 items through Sequence and Network analysis showed that the centralized approach is opposed to the decentralized approach and has a strong connection with data protection servers and apps. “Figure 4” shows the relationships between the word “centralized” and associated words, highlighting connections with predecessors (in blue) and successors (in orange), calculated through transition probabilities (Markov chains).

With the decentralized approach, matching is done directly on the user’s smartphone, which compares IDs with a local list of IDs associated with positive

Figure 4. Co-occurrence analysis using the sequences and network analysis of the centralized approach.

cases. This method preserves the confidentiality of personal data, as no registration data is exchanged with the server unless the user has tested positive for COVID-19 and voluntarily decided to share this information.

The analysis shows that both approaches, centralized and decentralized, preserve the confidentiality of personal data, but the latter was considered more privacy friendly. In the decentralized case, information management takes place locally on the user’s device, and sensitive data is shared only in case of infection and with the user’s explicit consent.

In “Figure 5”, we show that the word “decentralized” is strongly associated with the words “app”, “tracking”, “privacy”, “architecture”, and “security systems”. This association once again emphasizes the importance placed on privacy, indicating that the focus is on preserving the confidentiality of information during the implementation of decentralized tracking apps.

To understand privacy connections, a co-occurrence analysis was conducted by word association using the first-order cosine association test. The analysis explored the main fears of potential users to assess the population’s concerns and resistance to installing the apps. “Figure 6” shows that the population desires protection and security for personal information released, requiring that the release of data has a positive impact on the entire community. Therefore, it seems essential that the population perceives an appropriate balance between the sacrifice in releasing personal information and the benefit in protecting the community.

Performing the Co-occurrence analysis by Word Association, but with the second-order index, again on the word privacy, “Figure 7” shows that in the 75 items analyzed, the words with a high similarity are “safety” and “security”.

Figure 5. Co-occurrence analysis using the sequences and network analysis of the decentralized approach.

Figure 6. Co-occurrence analysis with first-order cosine word association index “Privacy”.

Figure 7. Co-occurrence analysis with second-order word association index “Privacy”.

3.2. Multiple Correspondence Analysis

Finally, the patterns of categorical variables, keywords, or elementary contexts, were analyzed using Multiple Correspondence Analysis, a method of multidimensional statistical analysis of data with the aim of identifying “interdependence” relationships among the qualitative variables analyzed. Correspondence analysis makes it possible to extract new variables that have the property of summarizing relevant information in an orderly manner. A plot, factorial plane, is obtained, which allows us to appreciate all the intersections of the analyzed categories by identifying the relationships of similarity or difference between the linguistic entities considered.

As shown in “Figure 8”, the word “hospitalization” has a higher incidence than the other words, whose reciprocal position is calculated based on a similarity matrix and the frequencies present in each item examined. No words regarding privacy and contact tracing are present in the Cartesian plane, confirming that in the pandemic period, no special attention was paid to this important aspect. In fact, individual freedom allowed people not to share their health data while limiting the effectiveness of applications designed for tracing.

3.3. Comparison of Different Countries

In this section, different approaches in app implementation in various countries are illustrated. The NHS COVID-19 (National Health Service) app developed in the UK is based on the proximity and decentralized architecture developed by Apple and Google, which is considered by users to be more adherent to privacy regulations. It has been widely adopted, downloaded to 21 million devices out of

Figure 8. Multiple correspondence analysis of the word “hospitalization”.

a population of 34.3 million users; even more significant is the fact that at least 16.5 million people have used it regularly. This massive spread is attributable to the country’s high mortality rate in 2020, one of the highest in the world, which has made the local population more sensitive to the severity of the problem and more inclined to take measures to counter the spread of the virus [9] .

The app introduced in Norway took an approach that combined both Bluetooth Low Energy (BLE) technology and GPS for location tracking. Despite the significant number of downloads, amounting to 1.6 million, the National Institute of Public Health was forced to abandon the app after data protection authorities concluded that there was insufficient evidence of the app’s effectiveness in justifying the collection of people’s location data, with privacy and data protection concerns prevailing.

The COVID Tracker app developed in Ireland was used by a significant number of people roughly 1.3 million or 34 percent of the population over the age of 16 [10] .

Germany built the Corona-Warn app, using the platform developed by Google and Apple based on the decentralized DP-3T protocol, which operated on a voluntary basis and used Bluetooth Low Energy (BLE) to detect physical proximity between users, with 26.5 million downloads through March 2021 representing 44 percent of potential smartphone users. The implementation of additional features, such as the association of auxiliary apps, has encouraged their greater use by highlighting the importance of value-added services in increasing app usage [11] .

France with its TousAnti COVID app was the only country in Western Europe to implement a centralized approach to contact tracking built on the ROBUST protocol and ROBERT proximity tracking system to preserve user privacy.

In Italy, the Immuni app has been developed but has had very limited uptake. An online study conducted on a sample of 448 individuals during May-June 2020 investigated opinions regarding the willingness to vaccinate against COVID-19 and to use the app. The results indicated trust in politics and science and motivation, altruistic i.e., a willingness to protect not only oneself but especially others, as relevant factors.

A study conducted in Singapore showed a strong interest among the population in contributing to contact tracing efforts to combat the spread of COVID-19 through the use of the Trace Together app downloaded by more than 1.1 million users within a month of its launch, despite concerns about battery consumption and other technical limitations exhibited by the app.

Israel developed a GPS-based surveillance system that after one month of surveillance detected 36.8 percent of COVID-19 cases despite a false-positive detection rate of 5 percent. Interference with individual privacy rights in Israel, as in South Korea, was deemed necessary to address the health emergency caused by COVID-19.

Qatar implemented and enforced the app called “Ehteraz” (meaning “precaution” in Arabic). However, this app was found to have serious data security vulnerabilities.

Japan introduced the COCOA app in June 2020 based on Bluetooth technology with a decentralized architecture, promoted through various strategies including offering economic incentives such as issuing shopping tokens. An online survey found that the main factors related to the use of the app were community attachment, concern about health risks, and trust in government, factors whose weight varied according to the age of individuals. Older people showed greater sensitivity to health risks and were more likely to download the app to protect themselves and other community members. For middle-aged individuals, concerns about privacy and data security prevailed. For young people, an effective way to promote app adoption required developing a greater sense of community attachment, achievable using social media and other Web-based tools.

The textual examination conducted, using co-occurrence analysis and first-order cosine association index, with the keyword “app” showed strong links with the words “contact tracing”, “adoption”, and “participants” as shown in “Figure 9”, from this it follows that the success of a monitoring activity must rely on a large number of participants and ensure that the information provided through the apps is perceived as critical to safeguarding individual health.

4. Health Data Protection under the GDPR

Article 8 of the European Charter of Human Rights enshrines the right to respect for private life but recognizes that interference may be permitted if it is deemed necessary, proportionate and in accordance with the law. The General Data Protection Regulation (GDPR) protects principles such as purpose limitation, data minimization, and retention limitation, as well as guaranteeing the

Figure 9. Analysis of Co-occurrences word association index cosine word association “App”.

right of data subjects to exercise their rights. The GDPR states that the processing of data is lawful if it is necessary to protect the vital interest of the individual or for the performance of a task in the public interest.

As to health data, which are considered special under Article 9 of the GDPR, its processing is permitted only if necessary for reasons of substantial public interest, such as protecting against serious cross-border health threats or ensuring high standards of quality and safety of health care. Data anonymization is essential to respecting privacy, and the European Data Protection Board (EDPB) and the European Union Electronic Health Network have recommended a decentralized approach to contact record processing.

While the United States does not have a comprehensive federal data privacy law, it does have sector-specific regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), which establishes rules for the protection of individual health information. Data anonymization under HIPAA can be done through Safe Harbor or Expert Determination. To facilitate the deployment of tracking apps, eight comprehensive principles have been agreed upon that should guide the drafting of health data privacy regulations, including voluntariness, transparency, and fairness. However, to ensure real respect for privacy, it would be necessary to irreversibly anonymize data, but specific operational guidance is lacking in the GDPR [76] [77] .

Finally, to overcome data anonymity challenges and foster clinical research, it may be useful to inform people about the limits of anonymity, create open, privacy, and mixed experimental zones, and improve the clarity of privacy notices to ensure accessible understanding for all.

5. Blockchain and Future Developments

Blockchain represents a key technology for ensuring security and data integrity in mobile applications for tracking COVID-19 contagions and managing health data in general [78] . Its main features and applications involve the ability to create a distributed and transparent ledger through which the Blockchain creates a blockchain containing transactions, shared among all nodes in the network. This ledger is transparent and visible to all participants, and once data is written into the Blockchain, it cannot be changed without the consent of the network. This technology allows the immutability of the data; in fact, each block is identified by a unique hash, ensuring the uniqueness of the information and its immodifiability (any attempt to modify it would be detected immediately). In addition, the consensus for entering transactions into the registry is distributed across all nodes in the network, eliminating the need for a central authority and increasing the security of the system.

The application of this methodology in the health sector would enable the management of data, collected through a secure mechanism for sharing and transparency of health data. Data can be encrypted and shared between network participants securely, protecting patient privacy. In terms of infection tracking from COVID-19, Blockchain-based applications can allow anonymous contact tracking, with users being notified if they have been near an infected person but without revealing that person’s identity, thus containing the spread of the virus quickly and effectively. Blockchain ensures the immunity of clinical data, enabling healthcare professionals to access information in real time and ensuring the availability of the entire patient history in a secure manner. In this regard, see the survey proposed in [77] regarding the evaluation of the perception of safety in giving consent to the use of data by the population, in the pandemic period of COVID-19. The online experiment, conducted on an international sample, aimed to highlight the importance of ensuring data security so that the population would be incentivized to use mobile applications for monitoring of infections in the pandemic period. To do this, the perceived level of personal data protection was analyzed, demonstrating what was theorized. The results of the experiment offer important insights for managers and policy makers to incentivize the use of mobile applications based on Blockchain technology to prevent and contain the spread of COVID-19 contagions.

In conclusion, the use of Blockchain in COVID-19 infection tracking applications and health data management provides a high level of security and transparency, thus increasing user confidence in using apps.

Blockchain mechanisms play a crucial role in data security, providing a tamper-proof environment for transactions and ensuring maximum protection of sensitive data, such as personal or medical information. The following are some key points regarding the use of Blockchain to ensure data security:

1) Transaction storage: the Blockchain stores all transactions processed in chronological order in a set of computers, ensuring the integrity and unmodifiability of the data.

2.) Combination of Blockchain: you can use different types of Blockchain, both permissionless and permissioned, to take advantage of both types and ensure greater security and flexibility.

3) Interplanetary File System (IPFS): Blockchain is often combined with IPFS to store content and smart contracts to govern, manage and provide traceability and visibility in data history. This combination ensures originality and authenticity of the data.

4) Decentralized consensus mechanisms: Blockchain systems use decentralized consensus mechanisms, such as Proof of Work (Pow), which requires the solution of a computationally difficult puzzle to prove the credibility of data. These mechanisms eliminate the need for a trusted third-party authority and increase confidence in the system.

5) Security, reliability, and data assurance: the combination of these mechanisms ensures a very high level of security, reliability and data assurance, which are essential especially in sensitive contexts such as the management of health information during the COVID-19 pandemic.

The COVID-19 pandemic has affected consumer priorities, subverting traditional scales of importance of needs. In a state of emergency like the present one, safety and health protection have assumed a predominant role, influencing the intentions of using technologies, such as applications based on Blockchain.

6. Conclusions

Tracing apps are a crucial tool for monitoring pandemic phenomena such as COVID-19, but their effectiveness depends on the rate of use by the population. The experience of the pandemic has shown an inherent reluctance in populations to offer personal information without security guarantees, especially in western countries. To be effective, tracing technologies must first be understood and accepted by most of the population.

Individuals might be willing to sacrifice their privacy only when there is a significant health emergency, but they would be reluctant to share sensitive data, especially in democratic and neoliberal societies. Privacy concerns are influenced by trust in government and the use of data for secondary purposes. Trust in apps is related to trust in government, while security is more related to information protection.

It is important for policy makers to consider the demographics of the population when assessing the propensity to give consent to data processing. Some countries have conducted analyses to understand app acceptance, while others have overlooked privacy concerns to address the health emergency.

Apps should be designed with a privacy-protecting design that actively engages users and reassures them about data use. Users appreciate the timely communication of apps, but they should separate clinical data from personal information and use decentralized architectures.

Implementing additional features, such as the vaccination certificate, could make the apps more attractive and promote their uptake. In addition, AI and machine learning could be useful for monitoring pandemics and identifying hotspots. Devices such as the Internet of Medical Things enable the use of technologies such as thermal imaging to monitor positive cases.

The use of blockchain technology, ensuring anonymization of data and thus privacy protection, could increase people’s perception of safety and make it easier for them to give consent for health data processing.

This paper is only a starting point; it is a timely and necessary review of the literature for subsequent developments on the very important topic of health data processing and privacy protection. It provides an opportunity to reflect and thus, in a broader perspective, to highlight future directions to be taken for the improvement of tracking applications, that is indispensable for the progress of society and the health care system itself.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Naous, D., Bonner, M., Humbert, M. and Legner, C. (2022) Learning from the Past to Improve the Future: Value-Added Services as a Driver for Mass Adoption of Contact Tracing Apps. Business & Information Systems Engineering, 64, 597-614.
https://doi.org/10.1007/s12599-022-00742-2
[2] Sheikh, A., Anderson, M., Albala, S., et al. (2021) Health Information Technology and Digital Innovation for National Learning Health and Care Systems. The Lancet Digital Health, 3, e383-e396.
https://doi.org/10.1016/S2589-7500(21)00005-4
[3] Pititto, G. (2020) La Sfida Delle App Contro il COVID-19. GEOmedia, 24, 12-18.
[4] Alkhalifah, A. and Bukar, U.A. (2022) Examining the Prediction of COVID-19 Contact-Tracing App Adoption Using an Integrated Model and Hybrid Approach Analysis. Frontiers in Public Health, 10, Article 847184.
https://doi.org/10.3389/fpubh.2022.847184
[5] Ong, A.K.S., Prasetyo, Y.T., Yuduang, N., Nadlifatin, R., Persada, S.F., et al. (2022) Utilization of Random Forest Classifier and Artificial Neural Network for Predicting Factors Influencing the Perceived Usability of COVID-19 Contact Tracing “MorChana” in Thailand. International Journal Enviranmental Research and Public Health, 19, Article 7979.
https://doi.org/10.3390/ijerph19137979
[6] Deters, F.G., Meier, T., Milek, A. and Horn, A.B. (2021) Self-Focused and Other-Focused Health Concerns as Predictors of the Uptake of Corona Contact Tracing Apps: Empirical Study. Journal of Medical Internet Research, 23, e29268.
https://doi.org/10.2196/29268
[7] Ho, S.M., Liu, X., Seraj, M.S. and Dickey, S. (2022) Social Distance “Nudge:” A Context Aware Mhealth Intervention in Response to COVID Pandemics. Computational and Mathematical Organization Theory, 29, 391-414.
https://doi.org/10.1007/s10588-022-09365-0
[8] Nishiyama, Y., Murakami, H., Suzuki, R., Oko, K., Sukeda, I., et al. (2022) MOCHA: Mobile Check-In Application for University Campuses beyond COVID-19. ACM Digital Library, Seoul, 17-20 October 2022, 253-258.
https://doi.org/10.1145/3492866.3557736
[9] Verma, R., Yabe, T. and Ukkusuri, S.V. (2021) Spatiotemporal Contact Density Explains the Disparity of COVID-19 Spread in Urban Neighborhoods. Scientific Reports, 11, Article No. 10952.
https://doi.org/10.1038/s41598-021-90483-1
[10] O’Callaghan, M., Abbas, M., Buckley, J., Fitzgerald, B., Johnson, K., et al. (2022) Public Opinion of the Irish “COVID Tracker” Digital Contact Tracing App: A National Survey. Digital Health, 8, 1-12.
https://doi.org/10.1177/20552076221085065
[11] Kozyreva, A., Lorenz-Spreen, P., Lewandowsky, S., Garrett, P.M., et al. (2021) Psychological Factors Shaping Public Responses to COVID-19 Digital Contact Tracing Technologies in GERMANY. Scientific Reports, 11, Article No. 18716.
https://doi.org/10.1038/s41598-021-98249-5
[12] Akinbi, A., Forshaw, M. and Blinkhorn, V. (2021) Contact Tracing Apps for the COVID-19 Pandemic: A Systematic Literature Review of Challenges and Future Directions for Neo-Liberal Societies. Health Information Science and Systems, 9, Article No. 18.
https://doi.org/10.1007/s13755-021-00147-7
[13] Alarabi, L., Basalamah, S., Hendawi, A. and Abdalla, M. (2021) TraceAll: A Real-Time Processing for Contact Tracing Using Indoor Trajectories. Information, 12, Article 202.
https://doi.org/10.3390/info12050202
[14] Almalki, M. and Giannicchi, A. (2021) Health Apps for Combating Covid-19: Descriptive Review and Taxonomy. JMIR mHealth and uHealth, 9, e24322.
https://doi.org/10.2196/24322
[15] Ami, J., Ishii, K., Sekimoto, Y., Masui, H., Ohmukai, I., et al. (2021) Computation of Infection Risk via Confidential Locational Entries: A Precedent Approach for Contact Tracing with Privacy Protection. IEEE Access, 9, 87420-87433.
https://doi.org/10.1109/ACCESS.2021.3087478
[16] Ang, V. and Shar, L.K. (2021) COVID-19 One Year on—Security and Privacy Review of Contact Tracing Mobile Apps. IEEE Pervasive Computing, 20, 61-70.
https://doi.org/10.1109/MPRV.2021.3115478
[17] Avraam, D., Obradovich, N., Pescetelli, N., Cebrian, M. and Rutherford, A. (2021) The Network Limits of Infectious Disease Control via Occupation-Based Targeting. Scientific Reports, 11, Article No. 22855.
https://doi.org/10.1038/s41598-021-02226-x
[18] Barthe, G., Viti, R.D., Druschel, P., Garg, D., Gomez-Rodriguez, M., et al. (2022) Listening to Bluetooth Beacons for Epidemic Risk Mitigation. Scientific Reports, 12, Article No. 5558.
https://doi.org/10.1038/s41598-022-09440-1
[19] Blom, A.G., Wenz, A., Cornesse, C., Rettig, T., Fikel, M., et al. (2021) Barriers to the Large-Scale Adoption of a COVID-19 Contact Tracing App in Germany: Survey Study. Journal of Medical Internet Research, 23, e23362.
https://doi.org/10.2196/23362
[20] Bodini, A., Pasquali, S. and Pievatolo, A. (2022) Underdetection in a Stochastic SIR Model for the Analysis of the COVID-19 Italian Epidemic. Stochastic Environmental Research and Risk Assessment, 36, 137-155.
https://doi.org/10.1007/s00477-021-02081-2
[21] Boldrini, C., Passarella, A. and Conti, M. (2022) Models for Digitally Contact-Traced Epidemics. IEEE Access, 10, 106180-106190.
https://doi.org/10.1109/ACCESS.2022.3211425
[22] Caserotti, M., Girardi, P., Tasso, A., Rubaltelli, E., Lotto, L. and Gavaruzzi, T. (2022) Joint Analysis of the Intention to Vaccinate and to Use Contact Tracing App during the COVID-19 Pandemic. Scientific Reports, 12, Article No. 793.
https://doi.org/10.1038/s41598-021-04765-9
[23] Cicala, F., Wang, W., Wang, T., Li, N., Bertino, E., Liang, F. and Yang, Y. (2021) PURE: A Framework for Analyzing Proximity-Based Contact Tracing Protocols. ACM Computing Surveys, 55, Article No. 3.
https://doi.org/10.1145/3485131
[24] Daniore, P., Ballouz, T., Menges, D. and Wyl, V.V. (2021) The SwissCovid Digital Proximity Tracing App after One Year: Were Expectations Fulfilled? Swiss Medical Weekly, 151, 35-36.
https://doi.org/10.4414/SMW.2021.w30031
[25] Dave, R. and Gupta, R. (2021) Data Quality and Network Considerations for Mobile Contact Tracing and Health Monitoring. Frontiers in Digital Health, 3, Article 590194.
https://doi.org/10.3389/fdgth.2021.590194
[26] Dowthwaite, L., Fisher, J., Vallejos, E.P., Portillo, V., Nichele E., et al. (2021) Public adoption of and Trust in the NHS COVID-19 Contact Tracing App in the United Kingdom: Quantitative Online Survey Study. Journal of Medical Internet Research, 23, e29085.
https://doi.org/10.2196/29085
[27] Farkhondeh, H., Saeed, A. and Allen, C.J. (2021) Individuals’ Privacy Concerns and Adoption of Contact Tracing Mobile Applications in a Pandemic: A Situational Privacy Calculus Perspective. Journal of the American Medical Informatics Association, 28, 463-471.
https://doi.org/10.1093/jamia/ocaa240
[28] Fetzer, T. and Graeber, T. (2021) Measuring the Scientific Effectiveness of Contact Tracing: Evidence from a Natural Experiment. Proceedings of the National Academy of Sciences of the United States of America, 118, e2100814118.
https://doi.org/10.1073/pnas.2100814118
[29] Frimpong, J.A. and Helleringer, S. (2021) Strategies to Increase Downloads of COVID-19 Exposure Notification Apps: A Discrete Choice Experiment. PLOS ONE, 16, e0258945.
https://doi.org/10.1371/journal.pone.0258945
[30] Giustiniano, D., Bianchi, G., Conti, G., Bartoletti, G. and Blefari Melazzi N. (2021) 5G and Beyond for Contact Tracing. IEEE Communications Magazine, 59, 36-41.
https://doi.org/10.1109/MCOM.010.2001250
[31] Goenka, R., Cao, S.-J., Wong, C.-W., Rajwade, A. and Baron, D. (2021) Contact Tracing Enhances the Efficiency of Covid-19 Group Testing. IEEE International Conference on Acoustics, Speech and Signal Processing, Toronto, ON, 6-11 June 2021, 8168-8172.
https://doi.org/10.1109/ICASSP39728.2021.9414034
[32] Haggag, O., Haggag, S., Grundy, J. and Abdelrazek, M. (2021) COVID-19 vs Social Media Apps: Does Privacy Really Matter? IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Society, Madrid, 25-28 May 2021, 48-57.
https://doi.org/10.1109/ICSE-SEIS52602.2021.00014
[33] Huang, J., Kwan, M.P. and Kim, J. (2021) How Culture and Sociopolitical Tensions Might Influence People’s Acceptance of COVID-19 Control Measures that Use Individual-Level Georeferenced Data. ISPRS International Journal of Geo-Information, 10, Article 490.
https://doi.org/10.3390/ijgi10070490
[34] Jiang, T., Zhang, Y., Zhang, M.H., Yu, T., Chen, Y.Z., Lu, C.H., Zhang, J., et al. (2020) A Survey on Contact Tracing: The Latest Advancements and Challenges.
https://doi.org/10.48550/arXiv.2011.02094
[35] Jones, K. and Thompson, R. (2021) To Use or Not to Use a COVID-19 Contact Tracing App: Mixed Methods Survey in Wales. JMIR mHealth and uHealth, 9, e29181.
https://doi.org/10.2196/29181
[36] Kahnbach, L., Lehr, D., Brandenburger, J., Mallwitz, T., Jent, S., Hannibal, S., Funk, B. and Janneck, M. (2021) Quality and Adoption of Covid-19 Tracing Apps and Recommendations for Development: Systematic Interdisciplinary Review of European Apps. Journal of Medical Internet Research, 23, e27989.
https://doi.org/10.2196/27989
[37] Kaptchuk, G., Goldstein, D.G., Hargittai, E., Hofman, J.M. and Redmiles, E.M. (2022) How Good Is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids. ACM Digital Library, 3, Article No. 27.
https://doi.org/10.1145/3488307
[38] Krüger, N., Behne, A., Beinke, J.H., Stibe, A. and Teuteberg, F. (2022) Exploring User Acceptance Determinants of COVID-19-Tracing Apps to Manage the Pandemic. International Journal of Technology and Human Interaction (IJTHI), 18, 1-27.
https://doi.org/10.4018/IJTHI.293197
[39] Liccardi, I., Alekseev, J., Voltz, V.L.A., McLean, J.E. and Zurko, M.E. (2022) Public Willingness to Engage with Covid-19 Contact Tracing, Quarantine, and Exposure Notification. Public Health Reports, 137, 90S-95S.
https://doi.org/10.1177/00333549221125891
[40] Li, T., Yin, S., Yu, R., Feng, Y., Jiao, L., Shen, Y. and Ma, J. (2022) CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. IEEE Journal on Selected Areas in Communications, 40, 3191-3206.
https://doi.org/10.1109/JSAC.2022.3211547
[41] Liu, M., Zhou, S., Jin, Q., Nishimura, S. and Ogihara, A. (2022) Effectiveness, Policy, and User Acceptance of COVID-19 Contact-Tracing Apps in the Post-COVID-19 Pandemic Era: Experience and Comparative Study. JMIR Public Health and Surveillance, 8, e40233.
https://doi.org/10.2196/40233
[42] Maccari, L. and Cagno, V. (2021) Do We Need a Contact Tracing App? Computer Communications, 166, 9-18.
https://doi.org/10.1016/j.comcom.2020.11.007
[43] Mahmood, M., Mateu, J. and Hernández-Orallo, E. (2021) Contextual Contact Tracing Based on Stochastic Compartment Modeling and Spatial Risk Assessment. Stochastic Environmental Research and Risk Assessment, 36, 893-917.
https://doi.org/10.1007/s00477-021-02065-2
[44] Mahmood, M., Amaral, A.V.R., Mateu, J. and Moraga, P. (2022) Modeling Infectious Disease Dynamics: Integrating Contact Tracing-Based Stochastic Compartment and Spatio-Temporal Risk Models. Spatial Statistics, 51, Article 100691.
https://doi.org/10.1016/j.spasta.2022.100691
[45] Majeed, A. and Hwang, S.O. (2021) A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic. IEEE Access, 9, 164159-164187.
https://doi.org/10.1109/ACCESS.2021.3130610
[46] Martignoni, M.M., Renault, J., Baafi, J. and Hurford, A. (2022) Downsizing of COVID-19 Contact Tracing in Highly Immune Populations. PLOS ONE, 17, e0268586.
https://doi.org/10.1371/journal.pone.0268586
[47] Montagni, I., Roussel, N., Thiébaut, R. and Tzourio, C. (2021) Health Care Students’ Knowledge of and Attitudes, Beliefs, and Practices toward the French Covid-19 App: Cross-Sectional Questionnaire Study. Journal of Medical Internet Research, 23, e26399.
https://doi.org/10.2196/26399
[48] López, J.A.M., García, B,A., Bentkowski, P, Bioglio, L., et al. (2021) Anatomy of Digital Contact Tracing: Role of Age, Transmission Setting, Adoption, and Case Detection. Science Advances, 7, eabd8750.
https://doi.org/10.1126/sciadv.abd8750
[49] Nanni, M., Andrienko, G., Barabási, A.L., Boldrini, C., Bonchi, F., et al. (2021) Give More Data, Awareness and Control to Individual Citizens, and They Will Help COVID-19 Containment. Ethics and Information Technology, 23, 1-6.
https://doi.org/10.1007/s10676-020-09572-w
[50] Narayanan, H.T.S. (2021) Contact Tracing Solution for Global Community. The Computer Journal, 64, 1565-1574.
https://doi.org/10.1093/comjnl/bxab099
[51] O’Callaghan, M.E., Buckley, J., Fitzgerald, B., Johnson, K., et al. (2020) A National Survey of Attitudes to COVID-19 Digital Contact Tracing in the Republic of Ireland. Irish Journal of Medical Science, 190, 863-887.
https://doi.org/10.1007/s11845-020-02389-y
[52] O’Connell, J., Abbas, M., Beecham, S., Buckley, J., et al. (2021) Best Practice Guidance for Digital Contact Tracing Apps: A Cross-Disciplinary Review of the Literature. JMIR mHealth and uHealth, 9, e27753.
https://doi.org/10.2196/27753
[53] Parlamento Europeo e Consiglio (2016). GDPR-Regolamento (Ue) 2016/679. 4.5.2016 IT Gazzetta ufficiale dell’Unione europea L 119/1.
[54] Pepper, C., Reyes-Cruz, G., Pena, A.R., Dowthwaite, L., Babbage, C.M., et al. (2022) Understanding Trust and Changes in Use after a Year with the NHS COVID-19 Contact Tracing App in the United Kingdom: Longitudinal Mixed Methods Study. Journal of Medical Internet Research, 24, e40558.
https://doi.org/10.2196/40558
[55] Reid, M., Enanoria, W., Stoltey, G., Filippo, S., Fuchs, J., Lockwood, A., et al. (2021) The SARS-CoV-2 Pandemic: The Race to Trace: Contact Tracing Scale-Up in San Francisco—Early Lessons Learned. Journal of Public Health Policy, 42, 211-221.
https://doi.org/10.1057/s41271-021-00285-y
[56] Ritsema, F., Bosdriesz, J.R., Leenstra, T., Petrignani, M.W.F., et al. (2022) Factors Associated with Using the COVID-19 Mobile Contact-Tracing App among Individuals Diagnosed with SARS-CoV-2 in Amsterdam, the Netherlands: Observational Study. JMIR mHealth and uHealth, 10, e31099.
https://doi.org/10.2196/31099
[57] Riza, E., Kakalou, E., Nitsa, E., Hodges-Mameletzis, I., et al. (2021) Appraisal of a Contact Tracing Training Program for COVID-19 in Greece Focusing on Vulnerable Populations. International Journal Enviranmental Research and Public Health, 18, Article 9257.
https://doi.org/10.3390/ijerph18179257
[58] Rugani, G. (2020) Le Condizioni Ricavabili dal Regolamento generale sulla protezione dei dati per le applicazioni nazionali di tracciamento dei contatti: Alcune considerazioni. European Papers-Carnets Européens-Cuadernos Europeos-Quaderni Europei, 5, 633-644.
[59] Samhi, J., Allix, K., Bissyandé, T.F. and Klein, J. (2021) A first Look at Android Applications in Google Play Related to COVID-19. Empirical Software Engineering, 26, Article No. 57.
https://doi.org/10.1007/s10664-021-09943-x
[60] Saw, Y.E., Tan, E.Y., Liu, J.S. and Liu, J.C. (2021) Predicting Public Uptake of Digital Contact Tracing During the COVID-19 Pandemic: Results from a Nationwide Survey in Singapore. Journal of Medical Internet Research, 23, e24730.
https://doi.org/10.2196/24730
[61] Schultz, é., Touzani, R., Mancini, J. and Ward, J.K. (2022). From Contact Tracing to COVID-19 Pass Holder; The Tortured Journey of the FRENCH TousAntiCovid Contact Tracing App. Public Health, 206, 5-7.
https://doi.org/10.1016/j.puhe.2022.02.009
[62] Seberger, J.S. and Patil, S. (2021) Us and Them (and It): Social Orientation, Privacy Concerns, and Expected Use of Pandemic-Tracking Apps in the United States. ACM Digital Library, Yokohama, 8-13 May 2021, Article No. 65.
https://doi.org/10.1145/3411764.3445485
[63] Shahroz, M., Ahmad, F., Younis, M.S., Ahmad, N., Boulos, M.N.K., et al. (2021) COVID-19 Digital Contact Tracing Applications and Techniques: A Review Post Initial Deployments. Transportation Engineering, 5, Article 100072.
https://doi.org/10.1016/j.treng.2021.100072
[64] Shoji, M., Ito, A., Cato, S., Iida, T., Ishida, K., Katsumata, H. and McElwain, K.M. (2021) Prosociality and the Uptake of COVID-19 Contact Tracing Apps: Survey Analysis of Intergenerational Differences in Japan. JMIR mHealth and uHealth, 9, e29923.
https://doi.org/10.2196/29923
[65] Suver, C. and Kuwana, E. (2021) MHealth Wearables and Smartphone Health Tracking Apps: A Changing Privacy Landscape. Information Services & Use, 41, 71-79.
https://doi.org/10.3233/ISU-210114
[66] Szocska, M., Pollner, P., Schiszler, I., Joo, T., Palicz, T., et al. (2021) Countrywide Population Movement Monitoring Using Mobile Devices Generated (Big) Data during the COVID-19 Crisis. Scientific Reports, 11, Article No. 5943.
https://doi.org/10.1038/s41598-021-81873-6
[67] Tretiakov, A. and Hunter, I. (2021) User Experiences of the NZ COVID Tracer App in New Zealand: Thematic Analysis of Interviews. JMIR mHealth and uHealth, 9, e26318.
https://doi.org/10.2196/26318
[68] Tsinaraki, C., Mitton, I., Minghini, M., Micheli, M., Kotsev, A., et al. (2021) Mobile Apps to Fight the COVID-19 Crisis. Data 6, Article 106.
https://doi.org/10.3390/data6100106
[69] Utz, C., Becker, S., Schnitzler, T., Farke, F.M., Herbert, F., et al. (2021) Apps against the Spread: Privacy Implications and User Acceptance of COVID-19-Related Smartphone Apps on Three continents. ACM Digital Library, Yokohama, 8-13 May 2021, Article No. 70.
https://doi.org/10.1145/3411764.3445517
[70] Wilson, A.M., Aviles, N., Petrie, J.I., Beamer, P.I., Szabo, Z., Xie, M., et al. (2021) Quantifying SARS-CoV-2 Infection Risk within the Google/Apple Exposure Notification Framework to Inform Quarantine Recommendations. Risk Analysis, 42, 162-176.
https://doi.org/10.1111/risa.13768
[71] Wu, S., Neill, R., Foo, C.D., Chua, A.Q., Jung, A.S., Haldane, V., et al. (2021) Aggressive Containment, Suppression, and Mitigation of COVID-19: Lessons Learnt from Eight Countries. BMJ, 375, e067508.
https://doi.org/10.1136/bmj-2021-067508
[72] Wu, Y., Ye, Q., Shen, F., Zhang, Z. and Jiang, C.L. (2022) Country-and App-Level Factors Affecting the Adoption and Evaluation of COVID-19 Mobile Apps. BMC Public Health, 22, Article No. 2457.
https://doi.org/10.1186/s12889-022-14918-8
[73] Wymant, C., Ferretti, L., Tsallis, D., Charalambides, M., et al. (2021) The Epidemiological Impact of the NHS COVID-19 App. Nature, 594, 408-412.
https://doi.org/10.1038/s41586-021-03606-z
[74] Yuan, Y., Ding, J., Wang, H., Jin, D. and Li, Y. (2022) Activity Trajectory Generation via Modeling Spatiotemporal Dynamics. ACM Digital Library, Washington DC, 14-18 August 2022, 4752-4762.
https://doi.org/10.1145/3534678.3542671
[75] Zaidi, A., Ahuja, R. and Shahabi, C. (2022) Differentially Private Occupancy Monitoring from WiFi Access Points. IEEE International Conference on Mobile Data Management, Paphos, 6-9 June 2022, 361-366.
https://doi.org/10.1109/MDM55031.2022.00081
[76] Bradford, L., Aboy, M. and Liddell, K. (2020) COVID-19 Contact Tracing Apps: A Stress Test for Privacy, the GDPR, and Data Protection Regimes. Journal of Law and the Biosciences, 7, lsaa034.
https://doi.org/10.1093/jlb/lsaa034
[77] Sestino, A. and Merlo, V. (2021) Livello Percepito di Protezione dei dati Personali e Bisogno di Sicurezza dei Consumatori Come Predittori Dell’Intenzione All’Uso Di applicazioni Mobile per il Monitoraggio dei Contagi da COVID-19. Simposia, 1, 287-300.
[78] Merlo, V., Pio, G., Giusto, F. and Bilancia, M. (2023) On the Exploitation of the Blockchain Technology in the Healthcare Sector: A Systematic Review. Expert Systems with Applications, 213, Article 118897.
https://doi.org/10.1016/j.eswa.2022.118897

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.