The document discusses Italy's "Immuni" contact tracing app in the context of balancing privacy and public health during the COVID-19 pandemic. It provides an overview of Immuni, including its decentralized design based on the Apple/Google exposure notification system, validation of positive diagnoses by health operators, and expiration of collected data by December 2020. While the open source code and focus on privacy protections were positives, some concerns remained around cybersecurity and delegation of database handling to third parties.
Generation of infectious disease alerts through the use of geolocationjournalBEEI
In recent years, there have been several cases of global epidemics such as influenza B or Ebola. In these cases, several factors are key to limit the effects of the epidemic and avoid contagion. Between of them is the speed of knowing which persons are infected, which persons has been in contact with any infected person or know what the focus of the epidemic. In general, obtaining this information requires a process of research among the first affected that can be slow and complicated. This article describes a tool that aims to generate alerts when there are data about an epidemic, and notify all persons who could be exposed to contagion and prevent new infections occurs.
COVID-19, an epidemic disease, has challenged human lives all over the world. Governments and scientific communities are trying their level best to help the masses. This disease which is caused by corona virus majorly attacks the upper respiratory system rendering the human immunity incapacitated and, in some cases, proving fatal. Therefore, it is very much important to identify the infected people quickly and accurately, so that it can be prevented from spread. Early addressal of the symptoms can help to prevent the disease to become severe for all mankind. This calls for the development of a decision-making system to help the medical fraternity for the timely action. This proposed fuzzy based system predicts Covid-19 based on individuals’ symptoms and parameters. It receives input parameters as fever, cough, breathing difficulty, muscle ache, sore throat, travel history, age, medical history in the form of different membership functions and generates one output that predicts the likelihood of a person being infected with COVID-19 using Mamdani fuzzy inference system. The timely prognosis of the disease at home isolation or at the security checks can help the patient to seek the medical treatment as early as possible. Patient case studies, real time observations, cluster cases were studied to create the rule base for FDMS. The results are validated by using real-time individuals test cases on the proposed system which yields 97.2% accuracy, 100% sensitivity and 96.2% specificity.
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...ijcisjournal
While the COVID-19 pandemic continues to be as complex as ever, the collection and exchange of data in the light of fighting coronavirus poses a major challenge for privacy systems around the globe. The disease’s size and magnitude are not uncommon but it appears to be at the point of hysteria surrounding it. Consequently, in a very short time, extreme measures for dealing with the situation appear to have become
the norm. Any such actions affect the privacy of individuals in particular. In some cases, there is intensive monitoring of the whole population while the medical data of those diagnosed with the virus is commonly circulated through institutions and nations. This may well be in the interest of saving the world from a deadly disease, but is it appropriate and right? Although creative solutions have been implemented in many countries to address the issue, proponents of privacy are concerned that technologies will eventually erode privacy, while regulators and privacy supporters are worried about what kind of impact this could bring. While that tension has always been present, privacy has been thrown into sharp relief by the sheer urgency
of containing an exponentially spreading virus. The essence of this dilemma indicates that establishing the right equilibrium will be the best solution. The jurisprudence concerning cases regarding the willingness of public officials to interfere with the constitutional right to privacy in the interests of national security or public health has repeatedly proven that a reasonable balance can be reached.
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...IJCI JOURNAL
This technical paper investigates the vulnerabilities and potential threats posed by emerging technologies, specifically Bluetoothenabled patient pacemakers. With the advancements in healthcare technology, pacemakers now utilize Bluetooth connectivity for real-time monitoring and data transmission, offering patients and healthcare providers an important convenience. However, this technology also introduces significant security risks, leaving these life-sustaining devices susceptible to malicious attacks.
Through an in-depth analysis of existing research, real-life incidents, and vulnerabilities identified by experts in the field, this paper will underscore the critical vulnerabilities present in pacemaker systems. Examples, including findings from researchers such as Billy Rios, Jonathon Butts, and Marie Moe, demonstrate the potential severity of these vulnerabilities. From remote control manipulation to unauthorized access to sensitive medical data, the threats posed by these vulnerabilities are substantial and potentially life-threatening.
Moreover, this paper outlines advanced mitigation strategies essential for protecting patient pacemakers against these security risks. Recommendations include end-to-end encryption, whitelist device pairing, intrusion detection systems, and regular firmware updates, highlight the collaborative efforts required from patients, healthcare providers, and manufacturers to mitigate these risks effectively. This paper’s findings underscore the urgent need for robust cybersecurity measures in the design, implementation, and maintenance of pacemaker systems. Addressing these vulnerabilities is key for ensuring patient safety, maintaining privacy, and building trust in healthcare technology. The implications of this research extend beyond pacemaker security, emphasizing the broader importance of cybersecurity in medical devices and the importance of ongoing research and regulatory initiatives to protect patient health.
The study aimed to investigate into the impact of a National COVID-19 Health contact tracing and monitoring system for Namibia. The study used qualitative methods as a research strategy. Qualitative data was collected
through zoom meeting and a Google form link was distributed to the participants. The findings of the study revealed
that a total of 18 participants responded to the semi-structured questions of which 38.9% represents male while
female 61.1%. The age group between 18–25 response rate were 22.2%, age group between 26–35 response rate were
55.6%, age group between 36–45 response rate were 16.7% and the age group between 46 and above response rate
was 10% represented in green colour to represent participants who fall in the age group between 46 and above
Generation of infectious disease alerts through the use of geolocationjournalBEEI
In recent years, there have been several cases of global epidemics such as influenza B or Ebola. In these cases, several factors are key to limit the effects of the epidemic and avoid contagion. Between of them is the speed of knowing which persons are infected, which persons has been in contact with any infected person or know what the focus of the epidemic. In general, obtaining this information requires a process of research among the first affected that can be slow and complicated. This article describes a tool that aims to generate alerts when there are data about an epidemic, and notify all persons who could be exposed to contagion and prevent new infections occurs.
COVID-19, an epidemic disease, has challenged human lives all over the world. Governments and scientific communities are trying their level best to help the masses. This disease which is caused by corona virus majorly attacks the upper respiratory system rendering the human immunity incapacitated and, in some cases, proving fatal. Therefore, it is very much important to identify the infected people quickly and accurately, so that it can be prevented from spread. Early addressal of the symptoms can help to prevent the disease to become severe for all mankind. This calls for the development of a decision-making system to help the medical fraternity for the timely action. This proposed fuzzy based system predicts Covid-19 based on individuals’ symptoms and parameters. It receives input parameters as fever, cough, breathing difficulty, muscle ache, sore throat, travel history, age, medical history in the form of different membership functions and generates one output that predicts the likelihood of a person being infected with COVID-19 using Mamdani fuzzy inference system. The timely prognosis of the disease at home isolation or at the security checks can help the patient to seek the medical treatment as early as possible. Patient case studies, real time observations, cluster cases were studied to create the rule base for FDMS. The results are validated by using real-time individuals test cases on the proposed system which yields 97.2% accuracy, 100% sensitivity and 96.2% specificity.
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...ijcisjournal
While the COVID-19 pandemic continues to be as complex as ever, the collection and exchange of data in the light of fighting coronavirus poses a major challenge for privacy systems around the globe. The disease’s size and magnitude are not uncommon but it appears to be at the point of hysteria surrounding it. Consequently, in a very short time, extreme measures for dealing with the situation appear to have become
the norm. Any such actions affect the privacy of individuals in particular. In some cases, there is intensive monitoring of the whole population while the medical data of those diagnosed with the virus is commonly circulated through institutions and nations. This may well be in the interest of saving the world from a deadly disease, but is it appropriate and right? Although creative solutions have been implemented in many countries to address the issue, proponents of privacy are concerned that technologies will eventually erode privacy, while regulators and privacy supporters are worried about what kind of impact this could bring. While that tension has always been present, privacy has been thrown into sharp relief by the sheer urgency
of containing an exponentially spreading virus. The essence of this dilemma indicates that establishing the right equilibrium will be the best solution. The jurisprudence concerning cases regarding the willingness of public officials to interfere with the constitutional right to privacy in the interests of national security or public health has repeatedly proven that a reasonable balance can be reached.
Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in H...IJCI JOURNAL
This technical paper investigates the vulnerabilities and potential threats posed by emerging technologies, specifically Bluetoothenabled patient pacemakers. With the advancements in healthcare technology, pacemakers now utilize Bluetooth connectivity for real-time monitoring and data transmission, offering patients and healthcare providers an important convenience. However, this technology also introduces significant security risks, leaving these life-sustaining devices susceptible to malicious attacks.
Through an in-depth analysis of existing research, real-life incidents, and vulnerabilities identified by experts in the field, this paper will underscore the critical vulnerabilities present in pacemaker systems. Examples, including findings from researchers such as Billy Rios, Jonathon Butts, and Marie Moe, demonstrate the potential severity of these vulnerabilities. From remote control manipulation to unauthorized access to sensitive medical data, the threats posed by these vulnerabilities are substantial and potentially life-threatening.
Moreover, this paper outlines advanced mitigation strategies essential for protecting patient pacemakers against these security risks. Recommendations include end-to-end encryption, whitelist device pairing, intrusion detection systems, and regular firmware updates, highlight the collaborative efforts required from patients, healthcare providers, and manufacturers to mitigate these risks effectively. This paper’s findings underscore the urgent need for robust cybersecurity measures in the design, implementation, and maintenance of pacemaker systems. Addressing these vulnerabilities is key for ensuring patient safety, maintaining privacy, and building trust in healthcare technology. The implications of this research extend beyond pacemaker security, emphasizing the broader importance of cybersecurity in medical devices and the importance of ongoing research and regulatory initiatives to protect patient health.
The study aimed to investigate into the impact of a National COVID-19 Health contact tracing and monitoring system for Namibia. The study used qualitative methods as a research strategy. Qualitative data was collected
through zoom meeting and a Google form link was distributed to the participants. The findings of the study revealed
that a total of 18 participants responded to the semi-structured questions of which 38.9% represents male while
female 61.1%. The age group between 18–25 response rate were 22.2%, age group between 26–35 response rate were
55.6%, age group between 36–45 response rate were 16.7% and the age group between 46 and above response rate
was 10% represented in green colour to represent participants who fall in the age group between 46 and above
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification SystemIJCSEA Journal
This paper describes the design, prototype implementation and performance characteristics of a Disease Outbreak Notification System (DONS). The prototype was implemented in a hybrid cloud environment as an online/real-time system. It detects potential outbreaks of both listed and unknown diseases. It uses data mining techniques to choose the correct algorithm to detect outbreaks of unknown diseases. Our experiments showed that the proposed system has very high accuracy rate in choosing the correct detection algorithm. To our best knowledge, DONS is the first of its kind to detect outbreaks of unknown diseases using data mining techniques.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
Sting Stigma Eradication Application forms the lifetime of fighting Stigma related to HIV/AIDS in Kenya and other developing countries in Africa. However, through this project there is remarkable improvement in approach of dealing with people affected or infected by HIV. It is therefore a turning point to a long journey of fighting the diseases in the entire continent. The IT initiative has encouraged various organizations to develop systems to facilitate their day to day operations. SSEA incorporates various modules for automating service delivery and enhancing communication between the concerned parties and thus help in saving time and operations thus increasing efficiency. The purpose of this solution is to present the software engineering approach for development which focuses on the set of activities and associated results to develop a Sting Stigma Eradication Application meant to perform some of services delivery necessary for individuals affected by HIV/AIDS automatically at their comfort by use of widely used technology, mobile and web technology.
Cloud Computing: A Key to Effective & Efficient Disease Surveillance Systemidescitation
Cloud computing, a future generation concept
characterized by three entities: Software, hardware &
network designed to enhance the capacity building
simultaneously increasing the throughput by extending the
reach for any system without having heavy investment of
infrastructure and training new personnel. It is becoming
a major building block for any sort of businesses across the
globe. This paper likes to propose a cloud as a solution for
having an effective disease surveillance system. Till now,
multiple surveillance systems come into play but still they
lack sensitivity, specificity & timeliness.
Covid-19 is the destructive world’s most recent pandemic that is experienced in every part of the world.
This deadly virus affects different people in different ways. Most infected people will develop mild to moderate
illness and recover without hospitalisation. Covid-19 most common symptoms include fever, dry and tiredness.
It is against this background that in Namibian health environment the country uses a manual system to record
public member’s demographic information when visiting public places which do not allow tracing and monitoring of every public member who visited the 14 regions in the country. Therefore, the present study developed a
National COVID-19 health contact tracing and monitoring system which will allow every public member who visits
an enclosed public place by capturing their demographic information as well as the date and time the facility was
visited. The system replaces the paper-based method of recording the information of people visiting public places
with an entrance that allows the coming in and out of people. The system will also allow for real-time monitoring of
temperature changes of individuals.
A CLOUD-BASED PROTOTYPE IMPLEMENTATION OF A DISEASE OUTBREAK NOTIFICATION SYS...IJCSEA Journal
This paper describes the design, prototype implementation and performance characteristics of a Disease Outbreak Notification System (DONS). The prototype was implemented in a hybrid cloud environment as an online/real-time system. It detects potential outbreaks of both listed and unknown diseases. It uses data mining techniques to choose the correct algorithm to detect outbreaks of unknown diseases. Our experiments showed that the proposed system has very high accuracy rate in choosing the correct detection algorithm. To our best knowledge, DONS is the first of its kind to detect outbreaks of unknown diseases using data mining techniques.
Comprehensive study: machine learning approaches for COVID-19 diagnosis IJECEIAES
Coronavirus disease 2019 (COVID-19) is caused a large number of death since has declared as an international pandemic in December 2019, and it is spreading all over the world (more than 200 countries). This situation puts the health organizations in an aberrant demand for urgent needs to develop significant early detection and monitoring smart solutions. Therefore, that new system or solution might be capable to identify COVID-19 quickly and accurately. Nowadays, the science of artificial intelligence (AI), and internet of things (IoT) techniques have an extensive range of applications, it can be initiated a possible solution for early detection and accurate decisions. We believe, combine both of the IoT revolution and machine learning (ML) methods are expected to reshape healthcare treatment strategies to provide smart (diagnosis, treatments, monitoring, and hospitals). This work aims to overview the recent solutions that have been used for early detection, and to provide the researchers a comprehensive summary that contribute to the pandemic control such AI, IoT, cloud, fog, algorithms, and all the dataset and their sources that recently published. In addition, all models, frameworks, monitoring systems, devices, and ideas (in four sections) have been sufficiently presented with all clarifications and justifications. Also, we propose a new vision for early detection based on IoT sensors data entry using 1 million patients-data to verify three proposed methods.
Smart solution for reducing COVID-19 risk using internet of thingsnooriasukmaningtyas
The article exposes a smart device designed for mitigating the coronavirus disease (COVID-19) risk using the internet of things. A portable smart alerting device is designed for ensuring safety in public places which can alert people when the guidelines given by the government were not followed and alert health authorities when any abnormalities found. By doing so, the spread of this fatal disease can be stopped. The modules of the proposed system include the face mask detection module, social distance alerting module, crowd detection and analysis module, health screening module and health assessment module. The proposed system can be placed in any public entrances to monitor people without human intervention. Firstly, the human face images are captured for face mask check, then the crowd analysis of the particular entrance where the person is entering is performed, thereafter health screening of the person is done and the values were imported to the health assessment module to check for any abnormalities. Finally, after all the conditions were met the door is opened automatically. The smart device can be installed and effectively used in many scenarios such as malls, stores, crowded places and campuses to avoid the risk of spread of the coronavirus.
Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspe...Simone Aliprandi
Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective -- Editors: Fabio Chiusi, Sarah Fischer, Matthias Spielkamp -- Published as part of the project Automating Society by AlgorithmWatch & Bertelsmann Stiftung -- 1 September 2020 -- Original source: https://algorithmwatch.org/automating-society-2020-covid19
Design and development of a fuzzy explainable expert system for a diagnostic ...IJECEIAES
Expert systems have been widely used in medicine to diagnose different diseases. However, these rule-based systems only explain why and how their outcomes are reached. The rules leading to those outcomes are also expressed in a machine language and confronted with the familiar problems of coverage and specificity. This fact prevents procuring expert systems with fully human-understandable explanations. Furthermore, early diagnosis involves a high degree of uncertainty and vagueness which constitutes another challenge to overcome in this study. This paper aims to design and develop a fuzzy explainable expert system for coronavirus disease-2019 (COVID-19) diagnosis that could be incorporated into medical robots. The proposed medical robotic application deduces the likelihood level of contracting COVID-19 from the entered symptoms, the personal information, and the patient's activities. The proposal integrates fuzzy logic to deal with uncertainty and vagueness in diagnosis. Besides, it adopts a hybrid explainable artificial intelligence (XAI) technique to provide different explanation forms. In particular, the textual explanations are generated as rules expressed in a natural language while avoiding coverage and specificity problems. Therefore, the proposal could help overwhelmed hospitals during the epidemic propagation and avoid contamination using a solution with a high level of explicability.
A new system to detect coronavirus social distance violation IJECEIAES
In this paper, a novel solution to avoid new infections is presented. Instead of tracing users’ locations, the presence of individuals is detected by analysing the voices, and people’s faces are detected by the camera. To do this, two different Android applications were implemented. The first one uses the camera to detect people’s faces whenever the user answers or performs a phone call. Firebase Platform will be used to detect faces captured by the camera and determine its size and estimate their distance to the phone terminal. The second application uses voice biometrics to differentiate the users’ voice from unknown speakers and creates a neural network model based on 5 samples of the user’s voice. This feature will only be activated whenever the user is surfing the Internet or using other applications to prevent undesired contacts. Currently, the patient’s tracking is performed by geolocation or by using Bluetooth connection. Although face detection and voice recognition are existing methods, this paper aims to use them and integrate both in a single device. Our application cannot violate privacy since it does not save the data used to carry out the detection and does not associate this data to people.
Online medical consultation: covid-19 system using software object-oriented a...riyaniaes
The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. Online expert review was conducted within 6 experts from health and academic industry to verify the model. Also, the system was validated by 11 users from heath and academic industry to confirm its usability. The statistical package for social science (SPSS 22) was used to analyze the collected data. The result of expert review confirmed that covid-19 system can help the patients. Also, the validity of the system was confirmed by 11 users from health and academic industry.
The EU ‘AI ACT’: a “risk-based” legislation for robotic surgeryFederico Costantini
The long-awaited European Union “Artificial Intelligence Act” has been recently approved (13rd of March 2024). Even though it has not been published – for this reason we still might recall it as COM(2021)206 – and despite the fact that it will come into force only after two years since its publication, it has drawn the attention from the international community of AI experts, due to the fact that it is the first piece of legislation worldwide regulating such technologies. This contribution aims at presenting the “AI ACT” with a focus on its most relevant features regarding robotic surgery. After a short overview on its background, which is brought by a very complex legal framework built within the last 25 years by the EU, I will offer a summary of its provisions, which are resulting from the “risk-based” approach adopted by the EU legislator. Then, I will address “high risk” AI systems, analysing both the obligations that not only manufacturers, but also providers will need to fulfil, highlighting those which are most challenging in the sector of robotic surgery. At the end I will offer a few conclusive remarks, concerns and recommendations.
Intervento al Webinar "Intelligenza Artificiale. Sfide, Opportunità ed Insidie", 6 novembre 2020, organizzato dal Comitato Italiano Ingegneria dell’Informazione, Consiglio Nazionale Ingegneri
More Related Content
Similar to COVID19 vs GDPR: the case of “Immuni” Italian app
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification SystemIJCSEA Journal
This paper describes the design, prototype implementation and performance characteristics of a Disease Outbreak Notification System (DONS). The prototype was implemented in a hybrid cloud environment as an online/real-time system. It detects potential outbreaks of both listed and unknown diseases. It uses data mining techniques to choose the correct algorithm to detect outbreaks of unknown diseases. Our experiments showed that the proposed system has very high accuracy rate in choosing the correct detection algorithm. To our best knowledge, DONS is the first of its kind to detect outbreaks of unknown diseases using data mining techniques.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
Sting Stigma Eradication Application forms the lifetime of fighting Stigma related to HIV/AIDS in Kenya and other developing countries in Africa. However, through this project there is remarkable improvement in approach of dealing with people affected or infected by HIV. It is therefore a turning point to a long journey of fighting the diseases in the entire continent. The IT initiative has encouraged various organizations to develop systems to facilitate their day to day operations. SSEA incorporates various modules for automating service delivery and enhancing communication between the concerned parties and thus help in saving time and operations thus increasing efficiency. The purpose of this solution is to present the software engineering approach for development which focuses on the set of activities and associated results to develop a Sting Stigma Eradication Application meant to perform some of services delivery necessary for individuals affected by HIV/AIDS automatically at their comfort by use of widely used technology, mobile and web technology.
Cloud Computing: A Key to Effective & Efficient Disease Surveillance Systemidescitation
Cloud computing, a future generation concept
characterized by three entities: Software, hardware &
network designed to enhance the capacity building
simultaneously increasing the throughput by extending the
reach for any system without having heavy investment of
infrastructure and training new personnel. It is becoming
a major building block for any sort of businesses across the
globe. This paper likes to propose a cloud as a solution for
having an effective disease surveillance system. Till now,
multiple surveillance systems come into play but still they
lack sensitivity, specificity & timeliness.
Covid-19 is the destructive world’s most recent pandemic that is experienced in every part of the world.
This deadly virus affects different people in different ways. Most infected people will develop mild to moderate
illness and recover without hospitalisation. Covid-19 most common symptoms include fever, dry and tiredness.
It is against this background that in Namibian health environment the country uses a manual system to record
public member’s demographic information when visiting public places which do not allow tracing and monitoring of every public member who visited the 14 regions in the country. Therefore, the present study developed a
National COVID-19 health contact tracing and monitoring system which will allow every public member who visits
an enclosed public place by capturing their demographic information as well as the date and time the facility was
visited. The system replaces the paper-based method of recording the information of people visiting public places
with an entrance that allows the coming in and out of people. The system will also allow for real-time monitoring of
temperature changes of individuals.
A CLOUD-BASED PROTOTYPE IMPLEMENTATION OF A DISEASE OUTBREAK NOTIFICATION SYS...IJCSEA Journal
This paper describes the design, prototype implementation and performance characteristics of a Disease Outbreak Notification System (DONS). The prototype was implemented in a hybrid cloud environment as an online/real-time system. It detects potential outbreaks of both listed and unknown diseases. It uses data mining techniques to choose the correct algorithm to detect outbreaks of unknown diseases. Our experiments showed that the proposed system has very high accuracy rate in choosing the correct detection algorithm. To our best knowledge, DONS is the first of its kind to detect outbreaks of unknown diseases using data mining techniques.
Comprehensive study: machine learning approaches for COVID-19 diagnosis IJECEIAES
Coronavirus disease 2019 (COVID-19) is caused a large number of death since has declared as an international pandemic in December 2019, and it is spreading all over the world (more than 200 countries). This situation puts the health organizations in an aberrant demand for urgent needs to develop significant early detection and monitoring smart solutions. Therefore, that new system or solution might be capable to identify COVID-19 quickly and accurately. Nowadays, the science of artificial intelligence (AI), and internet of things (IoT) techniques have an extensive range of applications, it can be initiated a possible solution for early detection and accurate decisions. We believe, combine both of the IoT revolution and machine learning (ML) methods are expected to reshape healthcare treatment strategies to provide smart (diagnosis, treatments, monitoring, and hospitals). This work aims to overview the recent solutions that have been used for early detection, and to provide the researchers a comprehensive summary that contribute to the pandemic control such AI, IoT, cloud, fog, algorithms, and all the dataset and their sources that recently published. In addition, all models, frameworks, monitoring systems, devices, and ideas (in four sections) have been sufficiently presented with all clarifications and justifications. Also, we propose a new vision for early detection based on IoT sensors data entry using 1 million patients-data to verify three proposed methods.
Smart solution for reducing COVID-19 risk using internet of thingsnooriasukmaningtyas
The article exposes a smart device designed for mitigating the coronavirus disease (COVID-19) risk using the internet of things. A portable smart alerting device is designed for ensuring safety in public places which can alert people when the guidelines given by the government were not followed and alert health authorities when any abnormalities found. By doing so, the spread of this fatal disease can be stopped. The modules of the proposed system include the face mask detection module, social distance alerting module, crowd detection and analysis module, health screening module and health assessment module. The proposed system can be placed in any public entrances to monitor people without human intervention. Firstly, the human face images are captured for face mask check, then the crowd analysis of the particular entrance where the person is entering is performed, thereafter health screening of the person is done and the values were imported to the health assessment module to check for any abnormalities. Finally, after all the conditions were met the door is opened automatically. The smart device can be installed and effectively used in many scenarios such as malls, stores, crowded places and campuses to avoid the risk of spread of the coronavirus.
Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspe...Simone Aliprandi
Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective -- Editors: Fabio Chiusi, Sarah Fischer, Matthias Spielkamp -- Published as part of the project Automating Society by AlgorithmWatch & Bertelsmann Stiftung -- 1 September 2020 -- Original source: https://algorithmwatch.org/automating-society-2020-covid19
Design and development of a fuzzy explainable expert system for a diagnostic ...IJECEIAES
Expert systems have been widely used in medicine to diagnose different diseases. However, these rule-based systems only explain why and how their outcomes are reached. The rules leading to those outcomes are also expressed in a machine language and confronted with the familiar problems of coverage and specificity. This fact prevents procuring expert systems with fully human-understandable explanations. Furthermore, early diagnosis involves a high degree of uncertainty and vagueness which constitutes another challenge to overcome in this study. This paper aims to design and develop a fuzzy explainable expert system for coronavirus disease-2019 (COVID-19) diagnosis that could be incorporated into medical robots. The proposed medical robotic application deduces the likelihood level of contracting COVID-19 from the entered symptoms, the personal information, and the patient's activities. The proposal integrates fuzzy logic to deal with uncertainty and vagueness in diagnosis. Besides, it adopts a hybrid explainable artificial intelligence (XAI) technique to provide different explanation forms. In particular, the textual explanations are generated as rules expressed in a natural language while avoiding coverage and specificity problems. Therefore, the proposal could help overwhelmed hospitals during the epidemic propagation and avoid contamination using a solution with a high level of explicability.
A new system to detect coronavirus social distance violation IJECEIAES
In this paper, a novel solution to avoid new infections is presented. Instead of tracing users’ locations, the presence of individuals is detected by analysing the voices, and people’s faces are detected by the camera. To do this, two different Android applications were implemented. The first one uses the camera to detect people’s faces whenever the user answers or performs a phone call. Firebase Platform will be used to detect faces captured by the camera and determine its size and estimate their distance to the phone terminal. The second application uses voice biometrics to differentiate the users’ voice from unknown speakers and creates a neural network model based on 5 samples of the user’s voice. This feature will only be activated whenever the user is surfing the Internet or using other applications to prevent undesired contacts. Currently, the patient’s tracking is performed by geolocation or by using Bluetooth connection. Although face detection and voice recognition are existing methods, this paper aims to use them and integrate both in a single device. Our application cannot violate privacy since it does not save the data used to carry out the detection and does not associate this data to people.
Online medical consultation: covid-19 system using software object-oriented a...riyaniaes
The internet has been a source of medical information, it has been used for online medical consultation (OMC). OMC is now offered by many providers internationally with diverse models and features. In OMC, consultations and treatments are available 24/7. The covid-19 pandemic across-the-board, many people unable to go to hospital or clinic because the spread of the virus. This paper tried to answer two research questions. The first one on how the OMC can help the patients during covid-19 pandemic. A literature review was conducted to answer the first research question. The second one on how to develop system in OMC related to covid-19 pandemic. The system was developed by Visual Studio 2019 using software object-oriented approach. Online expert review was conducted within 6 experts from health and academic industry to verify the model. Also, the system was validated by 11 users from heath and academic industry to confirm its usability. The statistical package for social science (SPSS 22) was used to analyze the collected data. The result of expert review confirmed that covid-19 system can help the patients. Also, the validity of the system was confirmed by 11 users from health and academic industry.
The EU ‘AI ACT’: a “risk-based” legislation for robotic surgeryFederico Costantini
The long-awaited European Union “Artificial Intelligence Act” has been recently approved (13rd of March 2024). Even though it has not been published – for this reason we still might recall it as COM(2021)206 – and despite the fact that it will come into force only after two years since its publication, it has drawn the attention from the international community of AI experts, due to the fact that it is the first piece of legislation worldwide regulating such technologies. This contribution aims at presenting the “AI ACT” with a focus on its most relevant features regarding robotic surgery. After a short overview on its background, which is brought by a very complex legal framework built within the last 25 years by the EU, I will offer a summary of its provisions, which are resulting from the “risk-based” approach adopted by the EU legislator. Then, I will address “high risk” AI systems, analysing both the obligations that not only manufacturers, but also providers will need to fulfil, highlighting those which are most challenging in the sector of robotic surgery. At the end I will offer a few conclusive remarks, concerns and recommendations.
Intervento al Webinar "Intelligenza Artificiale. Sfide, Opportunità ed Insidie", 6 novembre 2020, organizzato dal Comitato Italiano Ingegneria dell’Informazione, Consiglio Nazionale Ingegneri
Digital transformation: Smart Working, sicurezza e dati personaliFederico Costantini
Intervento nella V lezione «Il lavoro agile durante l’emergenza epidemiologica: opportunità, criticità e protocolli Covid-19», AGI, Ordine degli Avvocati di Udine, WEBINAR 7 luglio 2020 ore 15.30 – 16.30
Verso una Pubblica Amministrazione «Agile»? Organizzazione amministrativa, decentralizzazione, «gamification» , Seconda sessione: Algoritmi e organizzazione amministrativa / Deuxième session: Algorithmes et organisation administrative / Second session: Algorithms and administrative organization
Presiede/Présidence/Chair: Prof. Elena D’Orlando, Università degli Studi di Udine,
Venerdì 4 ottobre 2019, Aula Baratto, Università Cà Foscari, Venezia
COST Action CA16222 on Autonomous and Connected Transport –How block chain co...Federico Costantini
(1) INTRODUCTION
What is the problem with cars? What is the problem with ”smart cars”?
(2) COST ACTION 16222 “WISE-ACT"
Who are you? What are you doing?
(3) CURRENT STATUS OF AUTONOMOUS CONNECTED TRANSPORT (ACT)
What is the meaning of it? What is the state-of-the-art?
(4) ACT AND DECENTRALIZED2018
Why are you here? How blockchain could play a role? (Some examples)
(5) CONCLUSION
Where does “Philosophy of Blockchain” meets “Metaphysics of ACT”?
20181012 Intelligenza artificiale e soggezione all'azione amministrativa: il ...Federico Costantini
Seconda sessione: Algoritmi e azione amministrativa
Presidente: Prof.ssa Elena D’Orlando
Convegno internazionale:
Nuove prospettive dell’amministrazione digitale: open data e algoritmi
(1) «Social credit system»: la Cina è vicina?
Esempio di profilazione di massa nella sfera pubblica a titolo di introduzione
(2) Il problema: soggezione all’automazione nella P.A.
Formulazione del problema di fondo
(3) Il riferimento alla profilazione nell’azione amministrativa tradizionale
Dalle origini ad oggi (breve fenomenologia)
(4) GDPR, profilazione e decisioni automatizzate
Cenni alla nuova disciplina europea
(5) Azione amministrativa e “diritti” dell’interessato
Rimedi contro la profilazione
(6) Conclusione
Osservazioni finali
20180327 Intelligenza artificiale e “computabilità giuridica” tra diritto civ...Federico Costantini
<Introduzione>
Il contesto tecnologico (breve descrizione dello «stato dell’arte») </Introduzione>
<Problema>
Quale diritto per l’intelligenza artificiale? (schema complessivo)
</Problema>
<Premesse>
Cosa c’era «prima» dell’intelligenza artificiale?
</Premesse>
<Automatismo e diritto>
«Computabilità giuridica», «robo-lawyers, smart contracts </Automatismo e diritto>
<Automi e diritto>
«smart robots», smart cars
</Automi e diritto>
<Conclusioni>
Osservazioni finali
</Conclusioni>
20180914 “Inaction is not an option”. Informazione, diritto e società nella p...Federico Costantini
14 settembre 2018 – Workshop «Scienza e tecnologia»
(Coord. M.C. Tallacchini e P. Di Lucia)
(1) Il problema di fondo: Intelligenza «naturale» / «artificiale» in Europa
Fiducia nella tecnologia / sfiducia nell’essere umano?
(2) Quale «Europa?»
Inquadramento storico-teoretico
(3) Quale «Diritto?»
Inquadramento filosofico-giuridico
(4) Quale «Futuro?»
Inquadramento informatico-giuridico
(5) Conclusioni
20180220 PROFILI GIURIDICI DELLA SICUREZZA INFORMATICA NELL’INDUSTRIA 4.0Federico Costantini
(1) Introduzione
Premessa al modulo e alla lezione odierna
(2) Il problema dell’informazione
Concetto generale di «informazione» -> «Filosofia dell’Informazione»
(3) Il problema della «Società dell’Informazione»
Il modello tecnocratico di convivenza adottato nella UE
(4) Il problema della nozione di «sicurezza informatica»
Cosa si intende per «sicurezza» in ambito tecnologico
(5) Cyberwar / terrorismo informatico
Le iniziative adottate in ambito europeo e italiano
(6) Criminalità informatica
Computer crimes e cyber crimes
(7) Conclusioni
Valutazioni finali, discussione, domande
20171031 Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità ...Federico Costantini
31 ottobre 2017, Cosa vuol dire «essere avvocato» oggi? Il giurista tra «complessità giuridica» e «diritto computazionale»Scuola Forense 2017/2018, Ordine degli Avvocati di Verona
<1. Premessa>
Oggi è più difficile diventare avvocati, astronauti o … [X]?
<2. Complessità dell'ordinamento giuridico>
Il problema della complessità del diritto (a partire dalle sue fonti)
<3. Verso un diritto «artificiale»?>
Il problema della prospettiva del diritto «tecnologico»
<4. La tecnologia nel diritto>
Problemi concernenti le tecnologie applicate al diritto
<5. Conclusioni>
Take away
International Conference «Cross-Border Digital Forensics», Wednesday, 28 September 2017, University of Udine, Scuola Superiore
<1.- Introduction>
Ancient jurists against contemporary technocrats?
<2.- Law and complexity>
From “certainty” to “uncertainty” in law
<3.- Digital forensics>
Evidence as a technological artifact
<4.- Conclusion>
Cross-Border Digital Forensics
20170927 Introduzione ai problemi concernenti prova come “informazione” e “in...Federico Costantini
Introduzione ai problemi concernenti prova come “informazione” e “informazione” come prova, in Introduzione alla “Image Forensics”: questioni teoretiche e pratiche della “prova per immagini” Seminario "Scuola Superiore Università degli Studi di Udine" mercoledì 27 settembre 2017
<1.- Introduzione>
Questioni emergenti da un’immagine «ambigua»
<2.- Il problema della prova come «informazione»>
Una prospettiva «contemporanea» sull’idea di «prova»
<3.- Il problema dell’ «informazione» come prova>
Prova scientifica -> prova informatica -> prova per immagini
<4.- Conclusioni>
Alcune valutazioni conclusive
Social network, social profiling, predictive policing. Current issues and fut...Federico Costantini
BIG DATA: NEW CHALLENGES FOR LAW AND ETHICS - International scientific conference, 22 - 23 May 2017 - Faculty of Law, University of Ljubljana
22 may 2017, Big Data Policing, Session 4, Seminar room 5, 16:00 – 17:30
1.- Preliminary clarifications on “Predictive Policing”
2.- Predictive policing with Social Network Analysis
3.- What kind of «evidence» does «predictive policing» bring to us?
4.- What kind of «law» does «prediction» justify?
5.- What kind of penalty does «predictive policing» legitimate?
6.- Current issues and future perspectives (to take away)
"Società dell'Informazione", organizzazione del lavoro e "Risorse Umane"Federico Costantini
Lezione al master di I livello "Gestione delle Risorse Umane e Organizzazione del Lavoro", Università degli Studi di Udine, Consorzio Friuli Formazione, 28 gennaio 2017
Problemi inerenti la “sicurezza” negli “autonomous vehicles”Federico Costantini
Intervento svolto al Convegno annuale della Società Italiana di Informatica Giuridica «Internet of Things e i Diritti della Rete» tenutosi il 5 novembre 2016 presso il CIRSFID, Università degli Studi di Bologna.
Autori della ricerca: Federico Costantini, Pier Luca Montessoro
Intervento nel seminario "Introduzione alla digital forensics. Problemi teoretici e questioni pratiche tra informatica e diritto" tenutosi a Gorizia il 25 novembre 2016 nell'ambito delle iniziative inerenti all'aggiornamento professionale dell'Ordine degli Ingegneri di Gorizia.
«Information Society» and MaaS in the European Union: current issues and futu...Federico Costantini
Invited speech in the panel discussion: «MaaS Policy Aspects. New legal Framework and Liability? What are expected benefits for user and local authorities?».
International Conference “Intelligent Transport Systems: a Tool or a Toy?” 22/23 November 2016 - Žilina (Slovakia)
POSTER: "When an algorithm decides «who has to die». Security concerns in “A...Federico Costantini
Poster presented at the International Conference “Intelligent Transport Systems: a Tool or a Toy?”, held in Žilina (Slovakia), 22/23 November 2016.
Authors: Federico Costantini, Pier Luca Montessoro
Società dell’Informazione e “diritto artificiale”. Il problema del “controll...Federico Costantini
intervento al Workshop "Limiti del diritto e tecno-regolazione", Società Italiana di Filosofia del Diritto - XXX Congresso, Lecce, 15-17 settembre 2016 - “Limiti del diritto”, Venerdì 16 settembre ore 10.00 Complesso Ecotekne Facoltà di Giurisprudenza Via per Monteroni (Lecce)
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
1. 1
Prof. Aggr. FEDERICO COSTANTINI
University of Udine > Department of Law
EU GENERAL DATA PROTECTION REGULATION LECTURE
Dr. Erion Murati - Webinar 28 May 2020
Universität Hamburg
Fakultät für Rechtswissenschaft
COVID19 vs GDPR:
the case of “Immuni” Italian app
2. 2
Summary
(1) Introduction: tackling pandemies and other diseases
From «typhoid Mary» to contemporary outbreaks
(2) Different technological solutions: a short comparison
GSM / IP / GPS / Wifi / Bluetooth
(3) Different approaches to COVID19 (PROs / CONs)
Contact tracing / contact tracking / exposure notification
(4) COVID19 / GDPR (and mobile devices)
A difficult balance, not a conflict
(5) «Immuni»
The italian solution
(6) Conclusions
Take away, Q/A
</>
4. 4
(1) Introduction: tackling pandemies and other diseases
It is a current common understanding that in order
to tackle the outbreak of infectious diseases it is
required a combined strategy called “TTT”:
- Test people in order to find who is affected;
- Track how the disease is spreading;
- Trace personal contacts of infected patients
OECD Policy Responses to Coronavirus (COVID-19) Testing for COVID-19: A way
to lift confinement restrictions (4 May 2020) (http://www.oecd.org/coronavirus/policy-
responses/testing-for-covid-19-a-way-to-lift-confinement-restrictions-89756248/) https://commons.wikimedia.org/wiki/File:Mary_
Mallon_(Typhoid_Mary).jpg
This approach is based on modern scientific evidences and can be dated back to the
beginning of XX century,
as demonstrated by the famous case of “Typhoid Mary”,
a New York cook who (hiding from health authorities) infected the families where she
worked, until she was forced to live in quarantine for the rest of her life.
5. 5
(1) Introduction: tackling pandemies and other diseases
Unfortunately, in the world we are living, things get
more complicated by several factors which depend
on the kind of disease and on people behaviour.
Epidemiology can receive a huge contribution by
computer science.
The fact is that people is interconnected in a very
complex decentralized network of personal and
professional relations.
This network is constantly changing, so it is difficult
to test, treat and trace disease, both real and
”ficticious”.
Coronavirus: Learning How to Dance Part 1: A Dancing Masterclass, or What We Can Learn from Countries Around the World
https://medium.com/@tomaspueyo/coronavirus-learning-how-to-dance-b8420170203e
Coronavirus: The Basic Dance Steps Everybody Can Follow Part 2 of Coronavirus: Learning How to Dance
https://medium.com/@tomaspueyo/coronavirus-the-basic-dance-steps-everybody-can-follow-b3d216daa343
Coronavirus: How to Do Testing and Contact Tracing Part 3 of Coronavirus: Learning How to Dance
https://medium.com/@tomaspueyo/coronavirus-how-to-do-testing-and-contact-tracing-bde85b64072e
MUNZ, P., HUDEA, I., IMAD, J. & SMITH, R. J. S. 2009. When zombies attack!: Mathematical modelling of an outbreak of zombie infection. In:
TCHUENCHE, J. M. & CHIYAKA, C. (eds.) Infectious Disease Modelling Research Progress. Nova Science Publishers.
</>
BARAN, PAUL, On Distributed Communications Networks:
RAND, 1962, P-2626.
7. 7
(2) Different technological solutions: a short comparison
ICTs of course can help today.
Different technologies can be exploited in tackling outbreaks.
It is known that individuals can be located through the data shared by their mobile
devices.
Here I offer some quick examples.
8. 8
(2) Different technological solutions: a short comparison
GSM
Tower cells are commonly used to
pinpoint the location of individuals
(for example in criminal
investigations, or in emergency
calls)
Problems: not accurate (e.g. rural
areas)
9. 9
(2) Different technological solutions: a short comparison
IP addresses
If a device is connected to
Internet, it is identified by an IP
address, which is qualified as
personal data, allowing the
indirect identification of users.
Problems: not accurate, transition
IPv4-> IPv6
10. 10
(2) Different technological solutions: a short comparison
GPS
The position of a
device relies on a very
sophisticated and
worldwide satellite
system.
Problems: slow,
inefficacy inside
buildings
https://en.wikipedia.org/wiki/Global_Positioning_System
11. 11
(2) Different technological solutions: a short comparison
Wifi
Wi-Fi connections can
locate us very easily.
Problem: not accurate,
needs to be activated
12. 12
(2) Different technological solutions: a short comparison
Bluetooth
Bluetooth
technology
allows a more
detailed proximity
measurement
Problem: needs
to be activated
13. 13
(2) Different technological solutions: a short comparison
(Obvious) observation:
As a matter of fact, each technology has advantages and disadvantages.
Their utility depends on the purpose of their adoption.
There is no «one fits all» solution.
In ICTs, most of the implementations rely on the consent of the user.
Monitoring people through devices is difficult because:
- Not everybody owns a device (it is not mandatory to have a phone)
- Devices are different (manufacturer, O.S., new / old)
- Applications need to be activated and configured
- Applications need to be running
- There has to be an ecosystem which effectively processes all the data
- The battery of the devices is needs to be recharged often
</>
15. 15
(3) Different approaches to COVID19 (PROs / CONs)
There is a conceptual difference which is important to point out:
Contact tracking
The individual is tracked, which means that she/he is followed or monitored in its
movement while it is performed.
(es: mail tracking)
Contact tracing
The individual has already concluded its movement, and the analysis of its jouney
goes backwards.
(es: phone call tracing)
Exposure notification
The individual is neither traced nor tracked, but her/his contacts are logged.
(es: Google / Apple api)
16. 16
(3) Different approaches to COVID19 (PROs / CONs)
In general, we are in front of a sub-optimal choice, since there is not a specific
technology which is the best solution.
Localization (GPS) Proximity (BLE)
False
positive
(marked as
infected while
it is not)
Having been in an infected place
without becoming sick
Having been in contact with
someone infected without
becoming sick
False
negative
(marked as
healthy while
it is not)
Having been infected by someone
in a place considered «safe»
Having been infected by
someone not considered as
positive, or in an infected place.
17. 17
(3) Different approaches to COVID19 (PROs / CONs)
There is also an option which depends on the approach adopted by the lawmakers
and operated by the service providers.
Centralized reporting Decentralized reporting
Protocol Pan-European Privacy-Preserving Proximity Tracing Decentralized Privacy-Preserving
Proximity Tracing
Temporary Contact
Numbers Protocol
Model - User registration (pseudonimization)
- (if positive) upload contact log
- Centralized reporting server receives the logs
- Human in the loop check -> Health authorities verification
- Message sent to contacts
- User exchange ephemeral Ids ((EphID)
- Decentralized, since contact logs are stored
locally on the devices
- (if positive) report sent to a server and
distributed to other devices
- The device checks if there is a match with its
contact list
Key
features
- Risks of re-identification
- Lacks of transparency
- Contact logging and infection reporting are
separated
- Risk of attacks by third parties
18. 18
(3) Different approaches to COVID19 (PROs / CONs)
Apple / Google model of digital contact tracing (24 April 2020)
19. 19
(3) Different approaches to COVID19 (PROs / CONs)
Apple / Google model of digital contact tracing (24 April 2020)
- Decentralized as DP-3T
- Implemented at operating system level
- Interoperability (IOS / Android devices)
- Limitations by the operating systems (and thus the kind of devices)
- IOS 13.5
- Android Marshmallow and later
</>
20. 20
(3) Different approaches to COVID19 (PROs / CONs)
Why do they do that?
To collect data from other sources or in other ways …
https://blog.google/outreach-initiatives/small-
business/new-tools-help-businesses-during-covid-19/
</>
21. 21
(3) Different approaches to COVID19 (PROs / CONs)
Are there other approaches?
What about, instead of building an app,
to create an ecosystem?
The purpose is to combine GPS + BLE
in order to get the most benefits while
minimizing drawbacks
- Open code
- BLE contact tracing
- Decentralized logging of contacts
- Authorized verification of positives
- «Heat map» for healthcare authorities
</>
https://covidsafepaths.org/
23. 23
(4) COVID19 / GDPR (and mobile devices)
There was a time when GDPR was feared …
it was just two years ago …
With the outbreak of COVID19 the public opinion has
changed.
GDPR is considered from a twofold perspective:
- On one hand, as the last stronghold of
fundamental rights of the individual
- On the other hand, a useless regulation
hampering the enforcement of public health.
The common belief is that public health
is in contrast with individual privacy
https://www.facebook.com/VaronisSystems/photos/pb.
125005500878837.-
2207520000.1508767539./1549165935129446/?type=
3&theater
24. 24
(4) COVID19 / GDPR (and mobile devices)
KEY ASSUMPTIONS
(1) «Privacy» is about individual consent
(2) «data protection» is about security
CONSEQUENTLY
(1) GDPR is not about «privacy»
(2) «data protection» is not against public health
25. 25
(4) COVID19 / GDPR (and mobile devices)
- Art. 6 GDPR provides grounds for data processing of personal data (including geolocalization):
consent is only one among six conditions
- (among the conditions): Art. 6 § 2 lett. e) «processing is necessary for the performance of a task
carried out in the public interest or in the exercise of official authority vested in the controller»;
- Art. 9 GDPR provides grounds for data processing of «special categories of personal data»
(including health): consent is only one of many others exceptions
- (among the exeptions): (Art. 9 § 2 lett. i) «processing is necessary for reasons of public interest in
the area of public health, such as protecting against serious cross-border threats to health or
ensuring high standards of quality and safety of health care and of medicinal products or medical
devices, on the basis of Union or Member State law which provides for suitable and specific
measures to safeguard the rights and freedoms of the data subject, in particular professional
secrecy;»
- Further provision: art. 9 § 4: «Member States may maintain or introduce further conditions,
including limitations, with regard to the processing of genetic data, biometric data or data
concerning health».
26. 26
(4) COVID19 / GDPR (and mobile devices)
Keypoints of the European Data Protection Board
- Statement on the processing of personal data in the context of the
COVID-19 outbreak — 19/03/2020
- Mandate on the processing of health data for research purposes in the
context of the COVID-19 outbreak — 07/04/2020
- Mandate on geolocation and other tracing tools in the context of the
COVID-19 outbreak — 07/04/2020
- EDPB Letter concerning the European Commission's draft Guidance
on apps supporting the fight against the COVID-19 pandemic —
14/04/2020
«The EDPB notes that the mere fact that the use of the contact tracing takes place on a
voluntary basis, does not mean that the processing of personal data by public authorities
necessarily be based on the consent. When public authorities provide a service, based on
a mandate assigned by and in line with requirements laid down in law, it appears that the
most relevant legal basis for the processing is the necessity for the performance of
a task for public interest».
</>
28. 28
(5) «Immuni»
History
- 24-26 March 2020: «Fast call» from the Ministry of
innovation, 319 applicants
- 2 were in the final selection, 1 won: a consortium
between Bending Spoons and Centro Medico
Santagostino
- 16 April 2020: Contract with the winner signed for
free
- 29 April 2020: opinion of the Data Protection
Supervisor on the legislative proposal
- 13 May 2020: concerns expressed by the
Parliamentary Commission for national security
- 25 May 2020: open code released publicly
https://github.com/immuni-app/immuni-documentation https://innovazione.gov.it/source-code-immuni/
29. 29
(5) «Immuni»
Features (similar to Apple / Google platform)
«When two users come sufficiently close to each other for long enough, their devices record each other’s
rolling proximity identifier in local memory. Rolling proximity identifiers are generated from temporary
exposure keys and change multiple times each hour. Temporary exposure keys are generated randomly and
change once per day.
When a user tests positive for SARS-CoV-2, the virus causing COVID-19, they have the option to upload
to a server their recent temporary exposure keys. This operation can only happen with the validation of a
healthcare operator.
The app periodically downloads the new temporary exposure keys and uses them to derive the infected
users’ rolling proximity identifiers for the recent past. It then matches the identifiers against those stored in the
device’s memory and notifies the user if a risky exposure has occurred.
The system uses no geolocation data whatsoever, including GPS data. So, the app cannot tell where the
contact with a potentially contagious user took place, nor the identities of those involved.
Besides the temporary exposure keys, the Immuni app also sends to the server some analytics data.
These include epidemiological and operational information, and are sent for the purpose of helping the
National Healthcare Service (Servizio Sanitario Nazionale) to provide effective assistance to users».
https://github.com/immuni-app/immuni-documentation/blob/master/README.md
30. 30
(5) «Immuni»
Key findings
- The Italian Ministry of Health is the Data Controller
- Open source code: GNU Affero General Public License v3.0
- Decentrealized servers / encryption of data stored on the
devices
- Validation of health operator is intended to avoid the upload of
false positive in the database
- Upload of epidemiological information for health authorities
- Personal data erased on 31/12/2020
- Three regions selected for testing the app (Liguria, which
refused, Abruzzo and Puglia), not Ferrari (as it seemed at the
beginning)
https://github.com/immuni-app
31. 31
(5) «Immuni»
Legal Background
- Article 6, D.L. 30 aprile 2020, n. 28, Misure urgenti per la funzionalita' dei sistemi di intercettazioni di conversazioni e comunicazioni,
ulteriori misure urgenti in materia di ordinamento penitenziario, nonché disposizioni integrative e di coordinamento in materia di
giustizia civile, amministrativa e contabile e misure urgenti per l'introduzione del sistema di allerta Covid-19 (GU n.111 del 30-4-
2020):
- Comma 1: adoption of the exposure notification platform -> «Immuni»
- Comma 2: Data Impact Assessment (art. 35 GDPR) and Data Protection Authority
consultation
- Comma 3: exclusion of processing for different purposes
- Comma 4: no prejudice for non-adopters or opting-out
- Comma 5: servers in Italy, provider in Italy, open code
- Comma 6: expiration date of the data processing: 31/12/2020
- Comma 7: budget limit 1.500.000 euro
32. 32
(5) «Immuni»
Concerns
- Cybersecurity. 13 May 2020, report from the Italian Parliamentary National
Security Committee: company shareholders (not entirely Italians)
- Data Impact Assessment (Article. 35 GDPR) not yet released by Ministry of
Healtyù
- Database provider, the Ministry of Health will delegate the handling to third parties
(State-owned companies) which at the moment are not identified and the code has
not been still implemented.
- Limitations of liability for authors included in the License
- Transparency (as of today it seems that the code released is not the final version)
(https://www.infosec.news/2020/05/26/news/tecnologie-e-salute/sapete-che-con-immuni-non-ce-nessuna-garanzia-da-bending-
spoons/)
34. 34
(6) Conclusions
TAKE AWAY
(1) Privacy is not data protection, GDPR is not against healthcare
(2) The perception of privacy depends on culture (private / public)
(3) Individual usage is an issue (it is quite unlikely that these apps will be used by the
majority of the population)
(4) Some concerns have not raised the attention of the general public:
(1) Private contact tracing apps (employers / employees)
(2) Local contact tracing apps (municipalities, regions)
(3) Interoperability among different national apps (German, Austrian, Italian)
(5) COVID19 will pass (hopefully), but our society is changed quickly, deepl, and maybe
forever (welcome to the XXI Century)
</>