COVI White Paper

The SARS-CoV-2 (Covid-19) pandemic has caused significant strain on public health institutions around the world. Contact tracing is an essential tool to change the course of the Covid-19 pandemic. Manual contact tracing of Covid-19 cases has significant challenges that limit the ability of public health authorities to minimize community infections. Personalized peer-to-peer contact tracing through the use of mobile apps has the potential to shift the paradigm. Some countries have deployed centralized tracking systems, but more privacy-protecting decentralized systems offer much of the same benefit without concentrating data in the hands of a state authority or for-profit corporations. Machine learning methods can circumvent some of the limitations of standard digital tracing by incorporating many clues and their uncertainty into a more graded and precise estimation of infection risk. The estimated risk can provide early risk awareness, personalized recommendations and relevant information to the user. Finally, non-identifying risk data can inform epidemiological models trained jointly with the machine learning predictor. These models can provide statistical evidence for the importance of factors involved in disease transmission. They can also be used to monitor, evaluate and optimize health policy and (de)confinement scenarios according to medical and economic productivity indicators. However, such a strategy based on mobile apps and machine learning should proactively mitigate potential ethical and privacy risks, which could have substantial impacts on society (not only impacts on health but also impacts such as stigmatization and abuse of personal data). Here, we present an overview of the rationale, design, ethical considerations and privacy strategy of `COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.

[1]  Nuno Fernandes,et al.  Economic Effects of Coronavirus Outbreak (COVID-19) on the World Economy , 2020, SSRN Electronic Journal.

[2]  Matthias Hunger,et al.  Official statistics and claims data records indicate non-response and recall bias within survey-based estimates of health care utilization in the older population , 2013, BMC Health Services Research.

[3]  Hayley McGuffie,et al.  NHS Covid 19 app , 2020 .

[4]  Arieh Waldman Cognitive Biases, Dark Patterns, and the 'Privacy Paradox' , 2019, Current opinion in psychology.

[5]  Daniel Blank,et al.  Slowing the Spread of Infectious Diseases Using Crowdsourced Data , 2020, IEEE Data Eng. Bull..

[6]  Peter A Hancock,et al.  State of science: mental workload in ergonomics , 2015, Ergonomics.

[7]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[8]  Kim D Raine,et al.  Assessing general public and policy influencer support for healthy public policies to promote healthy eating at the population level in two Canadian provinces , 2019, Public Health Nutrition.

[9]  Ronald J. Deibert,et al.  Advancing Human Rights-by-Design in the Dual-Use Technology Industry , 2018 .

[10]  Yoshua Bengio,et al.  Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.

[11]  J. Rubenfeld The Right of Privacy , 1989 .

[12]  Ramesh Raskar,et al.  Assessing Disease Exposure Risk With Location Histories And Protecting Privacy: A Cryptographic Approach In Response To A Global Pandemic , 2020, ArXiv.

[13]  R. Kelly Garrett,et al.  The “Echo Chamber” Distraction: Disinformation Campaigns are the Problem, Not Audience Fragmentation , 2017 .

[14]  Benno Torgler,et al.  The relationship between stress, strain and social capital , 2011 .

[15]  H. Plessner,et al.  Implicit consumer preferences and their influence on product choice , 2006 .

[16]  N. Kraguljac,et al.  COVID-19: Facts, Cultural Considerations, and Risk of Stigmatization , 2020, Journal of transcultural nursing : official journal of the Transcultural Nursing Society.

[17]  Jakob Nielsen,et al.  Usability Metrics: Tracking Interface Improvements , 1996, IEEE Softw..

[18]  Nickolai Zeldovich,et al.  Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.

[19]  T. Hollingsworth,et al.  How will country-based mitigation measures influence the course of the COVID-19 epidemic? , 2020, The Lancet.

[20]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[21]  S. Segerstrom,et al.  Psychological stress and the human immune system: a meta-analytic study of 30 years of inquiry. , 2004, Psychological bulletin.

[22]  Yi-Feng Xu,et al.  Patients with mental health disorders in the COVID-19 epidemic , 2020, The Lancet Psychiatry.

[23]  Marc Lipsitch,et al.  Quantifying bias of COVID-19 prevalence and severity estimates in Wuhan, China that depend on reported cases in international travelers , 2020, medRxiv.

[24]  Marshall D. Rice,et al.  Privacy in Doubt: An Empirical Investigation of Canadians' Knowledge of Corporate Data Collection and Usage Practices , 2019 .

[25]  William F Flanagan,et al.  Equality rights for people with AIDS: mandatory reporting of HIV infection and contact tracing. , 1989, McGill law journal. Revue de droit de McGill.

[26]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[27]  Debra Revere,et al.  Public health communications and alert fatigue , 2013, BMC Health Services Research.

[28]  J. Burgess,et al.  A Contact-Tracing Procedure* , 1963, The British journal of venereal diseases.

[29]  Steven Chan,et al.  Human Behavior with Mobile Health: Smartphone/ Devices, Apps and Cognition , 2018, Psychology and Cognitive Sciences - Open Journal.

[30]  Shane G. Henderson,et al.  Safe blues: a method for estimation and control in the fight against COVID-19 , 2020 .

[31]  Dawn Song,et al.  Epione: Lightweight Contact Tracing with Strong Privacy , 2020, IEEE Data Eng. Bull..

[32]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[33]  Noel Ryan Willpower: Rediscovering the greatest human strength, by Roy F. Baumeister and John Tierney , 2012 .

[34]  R. Brook,et al.  Response to COVID-19 in Taiwan: Big Data Analytics, New Technology, and Proactive Testing. , 2020, JAMA.

[35]  R. Morgan,et al.  COVID-19: the gendered impacts of the outbreak , 2020, The Lancet.

[36]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[37]  Dan Boneh,et al.  Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.

[38]  M. Turakhia,et al.  Using Digital Health Technology to Better Generate Evidence and Deliver Evidence-Based Care. , 2018, Journal of the American College of Cardiology.

[39]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[40]  Chris Del Mar,et al.  Physical interventions to interrupt or reduce the spread of respiratory viruses , 2011 .

[41]  L. Festinger A Theory of Cognitive Dissonance , 1957 .

[42]  Bill Gates,et al.  Responding to Covid-19 - A Once-in-a-Century Pandemic? , 2020, The New England journal of medicine.

[43]  Simone Fischer-Hübner,et al.  Surveillance and Privacy , 2010, HCC.

[44]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[45]  Suhail A R Doi,et al.  A unified framework for bias assessment in clinical research. , 2019, International journal of evidence-based healthcare.

[46]  Alexander J. Rothman,et al.  Perceived susceptibility to breast cancer moderates the effect of gain- and loss-framed messages on use of screening mammography. , 2011, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[47]  Michael Y. Li,et al.  Global stability for the SEIR model in epidemiology. , 1995, Mathematical biosciences.

[48]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[49]  J. Krause,et al.  Social network theory in the behavioural sciences: potential applications , 2007, Behavioral Ecology and Sociobiology.

[50]  Alexander K. Koch,et al.  Self-Regulation Through Goal Setting , 2011, SSRN Electronic Journal.

[51]  R. C. Silver,et al.  The novel coronavirus (COVID-2019) outbreak: Amplification of public health consequences by media exposure. , 2020, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[52]  Angela Fagerlin,et al.  “Is 28% Good or Bad?” Evaluability and Preference Reversals in Health Care Decisions , 2004, Medical decision making : an international journal of the Society for Medical Decision Making.

[53]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[54]  Tom Jefferson,et al.  Physical interventions to interrupt or reduce the spread of respiratory viruses: systematic review , 2008, BMJ : British Medical Journal.

[55]  C. Rossmann,et al.  Content Effects: Health Campaign Communication , 2017 .

[56]  G. Leung,et al.  First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: a modelling impact assessment , 2020, The Lancet.

[57]  Nickolai Zeldovich,et al.  Stadium: A Distributed Metadata-Private Messaging System , 2017, IACR Cryptol. ePrint Arch..

[58]  Kenan Degirmenci,et al.  Mobile users' information privacy concerns and the role of app permission requests , 2020, Int. J. Inf. Manag..

[59]  S. Segerstrom,et al.  Current Directions in Stress and Human Immune Function. , 2015, Current Opinion in Psychology.

[60]  Angeliki Poulymenakou,et al.  Developing a Usability Evaluation Method for e-Learning Applications: Beyond Functional Usability , 2009, Int. J. Hum. Comput. Interact..

[61]  Ronald J. Williams,et al.  Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.

[62]  Giuseppe A. Veltri,et al.  The impact of different forms of cognitive scarcity on online privacy disclosure , 2017, Comput. Hum. Behav..

[63]  S. Michie,et al.  A refined taxonomy of behaviour change techniques to help people change their physical activity and healthy eating behaviours: The CALO-RE taxonomy , 2011, Psychology & health.

[64]  Christopher P. Furner,et al.  Privacy Assurance and Network Effects in the Adoption of Location-Based Services: an iPhone Experiment , 2010, ICIS.

[65]  Salah Chafik,et al.  Community trust reduces myopic decisions of low-income individuals , 2017, Proceedings of the National Academy of Sciences.

[66]  William R. Frey,et al.  Artificial Intelligence and Inclusion: Formerly Gang-Involved Youth as Domain Experts for Analyzing Unstructured Twitter Data , 2018, Social science computer review.

[67]  Carmela Troncoso,et al.  Decentralized Privacy-Preserving Proximity Tracing , 2020, IEEE Data Eng. Bull..

[68]  Lawrence O Gostin,et al.  Responding to Covid‐19: How to Navigate a Public Health Emergency Legally and Ethically , 2020, The Hastings Center report.

[69]  A. Bauman,et al.  The use of smartphone health apps and other mobile health (mHealth) technologies in dietetic practice: a three country study , 2017, Journal of human nutrition and dietetics : the official journal of the British Dietetic Association.

[70]  R. MacCallum,et al.  Chronic Stress Modulates the Immune Response to a Pneumococcal Pneumonia Vaccine , 2000, Psychosomatic medicine.

[71]  Steve Whittaker,et al.  Progressive disclosure: empirically motivated approaches to designing effective transparency , 2019, IUI.

[72]  Eric Horvitz,et al.  PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..

[73]  Lucie Abeler-Dörner,et al.  Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.

[74]  Hannah R. Meredith,et al.  The Incubation Period of Coronavirus Disease 2019 (COVID-19) From Publicly Reported Confirmed Cases: Estimation and Application , 2020, Annals of Internal Medicine.

[75]  Jason Bay,et al.  BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders , 2020 .

[76]  Yiu Chung Lau,et al.  Temporal dynamics in viral shedding and transmissibility of COVID-19 , 2020, Nature Medicine.

[77]  Anil Kumar Understanding Privacy , 2010 .

[78]  Ben Poole,et al.  Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.

[79]  Christopher Joseph Pal,et al.  Sparse Attentive Backtracking: Temporal CreditAssignment Through Reminding , 2018, NeurIPS.

[80]  Geoffrey E. Hinton,et al.  The "wake-sleep" algorithm for unsupervised neural networks. , 1995, Science.

[81]  Ramesh Raskar,et al.  Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic , 2020, ArXiv.

[82]  M. Banaji,et al.  Easier done than undone: asymmetry in the malleability of implicit preferences. , 2006, Journal of personality and social psychology.

[83]  Matthew L Levine Contact tracing for HIV infection: a plea for privacy. , 1988, Columbia human rights law review.

[84]  Pavani K. Ram,et al.  Behavior Change without Behavior Change Communication: Nudging Handwashing among Primary School Students in Bangladesh , 2016, International journal of environmental research and public health.

[85]  Delia Grace,et al.  Development and delivery of evidence-based messages to reduce the risk of zoonoses in Nairobi, Kenya , 2012, Tropical Animal Health and Production.

[86]  孙昕昕,et al.  The Unbearable Lightness of Being: , 2010 .

[87]  V. Liu,et al.  Data breaches of protected health information in the United States. , 2015, JAMA.

[88]  James Q. Whitman The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .

[89]  Herbert Gintis,et al.  Richard H. Thaler – Cass R. Sunstein: Nudge: Improving Decisions about Health, Wealth, and Happiness , 2008 .

[90]  Chingching Chang,et al.  Self-Control-Centered Empowerment Model: Health Consciousness and Health Knowledge as Drivers of Empowerment-Seeking through Health Communication , 2019, Health communication.

[91]  Hyunghoon Cho,et al.  Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs , 2020, ArXiv.

[92]  Mikhail Prokopenko,et al.  Modelling transmission and control of the COVID-19 pandemic in Australia , 2020, Nature communications.

[93]  Alex 'Sandy' Pentland,et al.  Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy , 2020, 2003.14412.

[94]  M Krajden,et al.  Assessment of in-flight transmission of SARS--results of contact tracing, Canada. , 2003, Canada communicable disease report = Releve des maladies transmissibles au Canada.

[95]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[96]  R. Heiner The Origin of Predictable Behavior , 1983 .

[97]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[98]  Max Welling,et al.  Auto-Encoding Variational Bayes , 2013, ICLR.

[99]  Priscilla M. Regan Legislating Privacy: , 2018, The Handbook of Privacy Studies.

[100]  Delan Devakumar,et al.  Racism and discrimination in COVID-19 responses , 2020, The Lancet.

[101]  Anita M. McGahan,et al.  Innovation for Inclusive Growth: Towards a Theoretical Framework and a Research Agenda , 2012 .