Analyzing Security and Privacy Concerns of Contact Tracing Applications

Author(s):  
Lorna Migiro ◽  
Hossain Shahriar ◽  
Sweta Sneha
Author(s):  
Md. Murshedul Arifeen ◽  
Abdullah Al Mamun ◽  
M Shamim Kaiser ◽  
Mufti Mahmud

Contact tracing has become an indispensable tool of various extensive measures to control the spread of COVID-19 pandemic due to novel coronavirus. This essential tool helps to identify, isolate and quarantine the contacted persons of a COVID-19 patient. However, the existing contact tracing applications developed by various countries, health organizations to trace down the contacts after identifying a COVID-19 patient suffers from several security and privacy concerns. In this work, we have identified those security and privacy issues of several leading contact tracing applications and proposed a blockchain-based framework to overcome the major security and privacy challenges imposed by the applications. We have discussed the security and privacy measures that are achieved by the proposed framework to show the effectiveness against the security and privacy issues raised by the existing mobile contact tracing applications.


2021 ◽  
pp. bmjinnov-2021-000669
Author(s):  
Mohammad Nazayer ◽  
Samaneh Madanian ◽  
Farhaan Mirza

BackgroundUsing different technologies for healthcare-related purposes has been significantly accelerated since the beginning of the COVID-19 pandemic. This outbreak highlighted the need for digital contact-tracing applications to effectively manage the pandemic by identifying positive case close contacts that might be the virus carriers.ObjectiveThe objective of this review is to examine design decisions related to COVID-19 contact-tracing applications and the implications of these decisions. This review can be a useful aid in navigating the existing approaches in COVID-19 digital contact tracing and their different aspects including the potential supported functions, privacy and security.MethodA narrative review was conducted using Google Scholar database from August to October 2020, limited to English language articles and reports published after 2010.Main outcomeDifferent technologies have been used for digital contact tracing. The choice of these technologies and their software architectures could influence different factors such as data collection accuracy and effectiveness of an application in identifying possible virus spread. Furthermore, different technologies require different levels of user interaction and have different security and privacy concerns which could potentially impact application adoption.ConclusionDigital contact tracing has been introduced as one of the easy and efficient methods to trace people in close contact with infected COVID-19 cases. This tracing could be an effective strategy to break the chain of infection transmission among people. However, based on the used technology and the software architecture, different contact-tracing applications offer different possible trade-offs that should be taken into account based on government’s objectives on contact tracing.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


Informatics ◽  
2021 ◽  
Vol 8 (3) ◽  
pp. 48
Author(s):  
My Villius Zetterholm ◽  
Yanqing Lin ◽  
Päivi Jokela

Digital contact tracing applications (CTAs) have been one of the most widely discussed technical methods of controlling the COVID-19 outbreak. The effectiveness of this technology and its ethical justification depend highly on public acceptance and adoption. This study aims to describe the current knowledge about public acceptance of CTAs and identify individual perspectives, which are essential to consider concerning CTA acceptance and adoption. In this scoping review, 25 studies from four continents across the globe are compiled, and critical topics are identified and discussed. The results show that public acceptance varies across national cultures and sociodemographic strata. Lower acceptance among people who are mistrusting, socially disadvantaged, or those with low technical skills suggest a risk that CTAs may amplify existing inequities. Regarding determinants of acceptance, eight themes emerged, covering both attitudes and behavioral perspectives that can influence acceptance, including trust, privacy concerns, social responsibility, perceived health threat, experience of and access to technologies, performance expectancy and perceived benefits, and understanding. Furthermore, widespread misconceptions about the CTA function are a topic in need of immediate attention to ensure the safe use of CTAs. The intention-action gap is another topic in need of more research.


2012 ◽  
Vol 3 (2) ◽  
pp. 36-49 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Osamah Ghaleb

This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this relation. Discussion, conclusion and future work are stated at the end of this paper.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2020 ◽  
Author(s):  
Yong Weixiong ◽  
Kohei Dozono ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.


2021 ◽  
Author(s):  
Sonia Sousa ◽  
Tiina Kalju

BACKGROUND The COVID-19 pandemic has caused changes on how we use technology across the world, both socially and economically. Due to the urgency and severity of the crisis different virus control measures were explored. One of the means how technology could help in this situation was by helping trace the contacts of people to prevent the spread of the disease. Many governments and public health authorities across the world have launched a number of contact tracing mobile apps (CTA). By the end of 2020, there are more than 50 contact tracing apps in both Google Play and iOS App Store [1]. Despite the wide availability, the download rates are low and usage rates are even lower [2][3]. There could be many reasons why the adoption is so low, but most certainly one variable that has been overlooked is the level of trust that potential users need to feel comfortable using an app. In Estonia, the CTA named HOIA has been developed as a means of digital contact tracing. By the middle of January 2021, there have been approximately 250 000 downloads but only 1763 (around 4,7% of all COVID-19 positive in Estonia by that time) people have registered as being tested COVID-19 positive [4]. It shows that HOIA has not proved to be efficient means to reduce the spread of the pandemic. Modeling evidence suggests that in order to be effective, the use of contact tracing apps would need to be very high, at least 80% of smartphone users to stop the pandemic [5]. 40% of Estonian people who don’t have HOIA do not believe that HOIA is effective and does what is promised. The concern about security and privacy was in the second place [6]. OBJECTIVE The goal of this study was to assess Estonian's trust towards the HOIA app and what has caused the shortage in trust. Namely, assess how much Estonians trust Covid-19 contact tracing app HOIA and what aspects are perceived as distrust by them. The study contributes to designers' understanding and awareness of designing trustworthy technology. METHODS The study comprised of measuring trust in HOIA CTA application using human-computer Trust psychometric scale [22]. A convenience sample was used in data collection, this includes all potential HOIA among the Estonian population. RESULTS Results indicate significant positive correlations between participants' trust towards the Estonian COVID tracing application (HOIA) and their perceptions of risk (p-value 0.000), competency (P-value 0.000), Benevolence (P-value=0.025), and reciprocity (P-value 0.015). CONCLUSIONS With the COVID-19 crisis, the new phenomenon of contact tracing apps was introduced to fight against the pandemic. CTAs were hoped to be a technological breakthrough to decrease the spread of the virus. However, this has not happened around the world. The same has happened in Estonia and evidence shows, that one of the reasons could be the low level of trust. The results of the study confirm, that trust in HOIA among Estonian habitants does affect their predisposition to use and indicated that participants do not believe HOIA is able to fulfill the main goal and decrease the spread of the virus. The result of this work is not only limited to HOIA but can be implemented by other CTAs as well. The results of this study contribute to designers' understanding and awareness of designing trustworthy technology. Eventually helps to provide design recommendations that ensure trustworthiness in the CTAs AI ability to use highly sensitive data and serve society. Regarding the limitations of this study, the survey was able to gather insight about the perceptions of HOIA, was enough to make a statistical generalization about the users’ perception and usage habits but more data needs to be collected if the intention is to generalize the results to the whole population of Estonia. Also, we should pay attention to the different minority groups to reach a valid conclusion. CLINICALTRIAL no trial registration.


Author(s):  
Greg Gogolin

This chapter looks at security and privacy concerns of virtual worlds by investigating the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, and virtual worlds. Security and privacy concerns will be investigated in the context of exploits and IT-related security risks, access management and confidentiality, reputation and product risk management, resource management, financial considerations and accountability, and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security -confidentiality, integrity, and availability - provide an overall framework for the chapter.


Sign in / Sign up

Export Citation Format

Share Document