2020 7th International Conference on Behavioural and Social Computing (BESC) 2020
DOI: 10.1109/besc51023.2020.9348293
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Taxonomy for Evaluating Societal Concerns of Contact Tracing Apps

Abstract: Contact Tracing (CT) is seen as a key tool in reducing the propagation of viruses, such as Covid-19. Given near ubiquitous societal usage of mobile devices, governments globally are choosing to augment manual CT with CT applications (CTAs) on smart phones. While a plethora of solutions have been spawned, their overall effectiveness is based on majority population uptake. Unfortunately, their rapid deployment and the nature of the information they gather has prompted a variety of user concerns such as informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 16 publications
(10 reference statements)
0
6
0
Order By: Relevance
“…They are scoped to ensure that CTAs are compared fairly, such that security vulnerabilities related to software or system components that cannot be changed by the CTA development are not considered; for example, those related to the system security of third-party providers (third-party vendors are noted in “General Characteristics,” under “development partners,” so that an indirect warning flag is retained). These attributes incorporate a novel approach to CTA evaluation that was developed to ensure a lightweight comparison using the potentially incomplete data available for each app: analyzing vulnerabilities of distinct app functionalities against a common threat assessment model [ 96 ]. Attributes under Security (namely, STRIDE [Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege] taxonomy/vulnerabilities, contact tracing–specific threats, software architecture security, and Software Development Life Cycle [SDLC] and Security) are designed to indicate whether these vulnerabilities are bugs in the code, which can be fixed or would require a redesign of the architecture to address.…”
Section: Resultsmentioning
confidence: 99%
“…They are scoped to ensure that CTAs are compared fairly, such that security vulnerabilities related to software or system components that cannot be changed by the CTA development are not considered; for example, those related to the system security of third-party providers (third-party vendors are noted in “General Characteristics,” under “development partners,” so that an indirect warning flag is retained). These attributes incorporate a novel approach to CTA evaluation that was developed to ensure a lightweight comparison using the potentially incomplete data available for each app: analyzing vulnerabilities of distinct app functionalities against a common threat assessment model [ 96 ]. Attributes under Security (namely, STRIDE [Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege] taxonomy/vulnerabilities, contact tracing–specific threats, software architecture security, and Software Development Life Cycle [SDLC] and Security) are designed to indicate whether these vulnerabilities are bugs in the code, which can be fixed or would require a redesign of the architecture to address.…”
Section: Resultsmentioning
confidence: 99%
“…DCTA user experience considerations can be thought of as those relating to universality and those relating to user engagement. Multimedia Appendix 7 [ 29 , 32 , 36 , 38 , 39 , 42 , 69 , 96 - 104 , 106 , 107 , 110 - 118 , 180 - 182 ] provides an overview of the key academic literature [ 75 , 96 - 105 ], gray literature [ 106 , 107 ], regulations [ 42 , 108 - 111 ], guidelines [ 112 , 113 , 180 ], and assessments of existing DCTAs [ 29 , 32 , 38 , 114 - 118 ] that support these recommendations.…”
Section: Resultsmentioning
confidence: 99%
“…A collaborative cross-disciplinary approach (Multimedia Appendix 1 [32,[36][37][38][39]) was used to derive best practice guidance for designing the IDCTA. The cross-disciplinary team included specialists from computer science, engineering, clinical medicine, medical technology, and psychology.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…A construct validity issue [26] is that the data obtained may not be to-tally correct: User opinions may be informed by hearsay and users are not always in an ideal position to report on quality aspects like data protection, or performance [27]. To mitigate against this the analysis focused on sentiments that were more pervasive across the data-set and brought to bear considerable knowledge of the app itself, the researchers having studied it as part of the project goal to derive the pillars beforehand.…”
Section: Limitations and Threats To Validitymentioning
confidence: 99%