2020
DOI: 10.1109/access.2020.2998042
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating How Smartphone Contact Tracing Technology Can Reduce the Spread of Infectious Diseases: The Case of COVID-19

Abstract: Detecting and controlling the diffusion of infectious diseases such as COVID-19 is crucial to managing epidemics. One common measure taken to contain or reduce diffusion is to detect infected individuals and trace their prior contacts so as to then selectively isolate any individuals likely to have been infected. These prior contacts can be traced using mobile devices such as smartphones or smartwatches, which can continuously collect the location and contacts of their owners by using their embedded localisati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
100
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 128 publications
(100 citation statements)
references
References 32 publications
0
100
0
Order By: Relevance
“…For example, when a tagged user A emits a wireless signal, the receiving users in proximity could first estimate the distance based on a number of available characteristics as presented in [14]. In case the distance is lower than a predefined threshold, e.g., the value is lower than 2 m, as the safety threshold adopted by many research papers [2], [15], [16], then the receiving user will store the anonymized ID from user tagged user and the corresponding timestamps. Therefore, a ledger of neighboring users could be created per node.…”
Section: Contact-tracing Applicationmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, when a tagged user A emits a wireless signal, the receiving users in proximity could first estimate the distance based on a number of available characteristics as presented in [14]. In case the distance is lower than a predefined threshold, e.g., the value is lower than 2 m, as the safety threshold adopted by many research papers [2], [15], [16], then the receiving user will store the anonymized ID from user tagged user and the corresponding timestamps. Therefore, a ledger of neighboring users could be created per node.…”
Section: Contact-tracing Applicationmentioning
confidence: 99%
“…Many mobile health companies, hospital healthcare centers, and remote diagnostics startups have proved a high ability to respond promptly during a real epidemic. They have motivated the researchers worldwide to find efficient technology-based complementary solutions for disease prevention and control during the past half-year [2]- [5]. It is essential to note that none of the technological solutions are meant to replace the mitigation measures recommended by epidemiologists and exerts from the medical domain, yet technological advances can complement the existing manual ones and assist in implementing social distancing measures as described in [6].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The existing contact tracing apps use various communication technologies such as cellular networks, GPS, Bluetooth, WiFi. An epidemic model has been designed to evaluate the efficient contact tracing app and those communication technologies have been applied for simulation purposes [39]. The contact tracing app has some attributes such as data management, system architecture, privacy, proximity, security estimation and vulnerability [40].…”
Section: Literature Reviewmentioning
confidence: 99%