COVI White Paper

The SARS-CoV-2 (Covid-19) pandemic has caused significant strain on public health institutions around the world. Contact tracing is an essential tool to change the course of the Covid-19 pandemic. Manual contact tracing of Covid-19 cases has significant challenges that limit the ability of public health authorities to minimize community infections. Personalized peer-to-peer contact tracing through the use of mobile apps has the potential to shift the paradigm. Some countries have deployed centralized tracking systems, but more privacy-protecting decentralized systems offer much of the same benefit without concentrating data in the hands of a state authority or for-profit corporations. Machine learning methods can circumvent some of the limitations of standard digital tracing by incorporating many clues and their uncertainty into a more graded and precise estimation of infection risk. The estimated risk can provide early risk awareness, personalized recommendations and relevant information to the user. Finally, non-identifying risk data can inform epidemiological models trained jointly with the machine learning predictor. These models can provide statistical evidence for the importance of factors involved in disease transmission. They can also be used to monitor, evaluate and optimize health policy and (de)confinement scenarios according to medical and economic productivity indicators. However, such a strategy based on mobile apps and machine learning should proactively mitigate potential ethical and privacy risks, which could have substantial impacts on society (not only impacts on health but also impacts such as stigmatization and abuse of personal data). Here, we present an overview of the rationale, design, ethical considerations and privacy strategy of `COVI,' a Covid-19 public peer-to-peer contact tracing and risk awareness mobile application developed in Canada.

[1]  J. Burgess,et al.  A Contact-Tracing Procedure* , 1963, The British journal of venereal diseases.

[2]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychological review.

[3]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[4]  A. Bandura Self-efficacy: toward a unifying theory of behavioral change. , 1977, Psychology Review.

[5]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[6]  R. Heiner The Origin of Predictable Behavior , 1983 .

[7]  Matthew L Levine Contact tracing for HIV infection: a plea for privacy. , 1988, Columbia human rights law review.

[8]  William F Flanagan,et al.  Equality rights for people with AIDS: mandatory reporting of HIV infection and contact tracing. , 1989, McGill law journal. Revue de droit de McGill.

[9]  J. Rubenfeld The Right of Privacy , 1989 .

[10]  Geoffrey E. Hinton,et al.  The "wake-sleep" algorithm for unsupervised neural networks. , 1995, Science.

[11]  Michael Y. Li,et al.  Global stability for the SEIR model in epidemiology. , 1995, Mathematical biosciences.

[12]  Jakob Nielsen,et al.  Usability Metrics: Tracking Interface Improvements , 1996, IEEE Softw..

[13]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[14]  R. MacCallum,et al.  Chronic Stress Modulates the Immune Response to a Pneumococcal Pneumonia Vaccine , 2000, Psychosomatic medicine.

[15]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[16]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[17]  James Q. Whitman The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .

[18]  M Krajden,et al.  Assessment of in-flight transmission of SARS--results of contact tracing, Canada. , 2003, Canada communicable disease report = Releve des maladies transmissibles au Canada.

[19]  Ronald J. Williams,et al.  Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.

[20]  Angela Fagerlin,et al.  “Is 28% Good or Bad?” Evaluability and Preference Reversals in Health Care Decisions , 2004, Medical decision making : an international journal of the Society for Medical Decision Making.

[21]  S. Segerstrom,et al.  Psychological stress and the human immune system: a meta-analytic study of 30 years of inquiry. , 2004, Psychological bulletin.

[22]  FOR DISEASE CONTROL AND PREVENTION , 2006 .

[23]  H. Plessner,et al.  Implicit consumer preferences and their influence on product choice , 2006 .

[24]  M. Banaji,et al.  Easier done than undone: asymmetry in the malleability of implicit preferences. , 2006, Journal of personality and social psychology.

[25]  J. Krause,et al.  Social network theory in the behavioural sciences: potential applications , 2007, Behavioral Ecology and Sociobiology.

[26]  Herbert Gintis,et al.  Richard H. Thaler – Cass R. Sunstein: Nudge: Improving Decisions about Health, Wealth, and Happiness , 2008 .

[27]  Adam Kowol The theory of cognitive dissonance By , 2008 .

[28]  Angeliki Poulymenakou,et al.  Developing a Usability Evaluation Method for e-Learning Applications: Beyond Functional Usability , 2009, Int. J. Hum. Comput. Interact..

[29]  Christopher P. Furner,et al.  Privacy Assurance and Network Effects in the Adoption of Location-Based Services: an iPhone Experiment , 2010, ICIS.

[30]  P. Potter The Unbearable Lightness of Being , 2010, Emerging infectious diseases.

[31]  Simone Fischer-Hübner,et al.  Surveillance and Privacy , 2010, HCC.

[32]  Anil Kumar Understanding Privacy , 2010 .

[33]  Benno Torgler,et al.  The relationship between stress, strain and social capital , 2011 .

[34]  Alexander J. Rothman,et al.  Perceived susceptibility to breast cancer moderates the effect of gain- and loss-framed messages on use of screening mammography. , 2011, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[35]  S. Michie,et al.  A refined taxonomy of behaviour change techniques to help people change their physical activity and healthy eating behaviours: The CALO-RE taxonomy , 2011, Psychology & health.

[36]  Tom Jefferson,et al.  Physical interventions to interrupt or reduce the spread of respiratory viruses: systematic review , 2008, BMJ : British Medical Journal.

[37]  Alexander K. Koch,et al.  Self-Regulation Through Goal Setting , 2011, SSRN Electronic Journal.

[38]  Benjamin Greschbach,et al.  The devil is in the metadata — New privacy challenges in Decentralised Online Social Networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[39]  Anita M. McGahan,et al.  Innovation for Inclusive Growth: Towards a Theoretical Framework and a Research Agenda , 2012 .

[40]  Noel Ryan Willpower: Rediscovering the greatest human strength, by Roy F. Baumeister and John Tierney , 2012 .

[41]  Delia Grace,et al.  Development and delivery of evidence-based messages to reduce the risk of zoonoses in Nairobi, Kenya , 2012, Tropical Animal Health and Production.

[42]  Debra Revere,et al.  Public health communications and alert fatigue , 2013, BMC Health Services Research.

[43]  Yoshua Bengio,et al.  Estimating or Propagating Gradients Through Stochastic Neurons for Conditional Computation , 2013, ArXiv.

[44]  Matthias Hunger,et al.  Official statistics and claims data records indicate non-response and recall bias within survey-based estimates of health care utilization in the older population , 2013, BMC Health Services Research.

[45]  Max Welling,et al.  Auto-Encoding Variational Bayes , 2013, ICLR.

[46]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[47]  Dan Boneh,et al.  Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.

[48]  V. Liu,et al.  Data breaches of protected health information in the United States. , 2015, JAMA.

[49]  Peter A Hancock,et al.  State of science: mental workload in ergonomics , 2015, Ergonomics.

[50]  S. Segerstrom,et al.  Current Directions in Stress and Human Immune Function. , 2015, Current opinion in psychology.

[51]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[52]  Nickolai Zeldovich,et al.  Vuvuzela: scalable private messaging resistant to traffic analysis , 2015, SOSP.

[53]  Nickolai Zeldovich,et al.  Stadium: A Distributed Metadata-Private Messaging System , 2017, IACR Cryptol. ePrint Arch..

[54]  Pavani K. Ram,et al.  Behavior Change without Behavior Change Communication: Nudging Handwashing among Primary School Students in Bangladesh , 2016, International journal of environmental research and public health.

[55]  R. Kelly Garrett,et al.  The “Echo Chamber” Distraction: Disinformation Campaigns are the Problem, Not Audience Fragmentation , 2017 .

[56]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[57]  Ben Poole,et al.  Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.

[58]  C. Rossmann,et al.  Content Effects: Health Campaign Communication , 2017 .

[59]  A. Bauman,et al.  The use of smartphone health apps and other mobile health (mHealth) technologies in dietetic practice: a three country study , 2017, Journal of human nutrition and dietetics : the official journal of the British Dietetic Association.

[60]  Giuseppe A. Veltri,et al.  The impact of different forms of cognitive scarcity on online privacy disclosure , 2017, Comput. Hum. Behav..

[61]  Salah Chafik,et al.  Community trust reduces myopic decisions of low-income individuals , 2017, Proceedings of the National Academy of Sciences.

[62]  Steven Chan,et al.  Human Behavior with Mobile Health: Smartphone/ Devices, Apps and Cognition , 2018, Psychology and Cognitive Sciences - Open Journal.

[63]  Priscilla M. Regan Legislating Privacy: , 2018, The Handbook of Privacy Studies.

[64]  M. Turakhia,et al.  Using Digital Health Technology to Better Generate Evidence and Deliver Evidence-Based Care. , 2018, Journal of the American College of Cardiology.

[65]  Ronald J. Deibert,et al.  Advancing Human Rights-by-Design in the Dual-Use Technology Industry , 2018 .

[66]  William R. Frey,et al.  Artificial Intelligence and Inclusion: Formerly Gang-Involved Youth as Domain Experts for Analyzing Unstructured Twitter Data , 2018, Social science computer review.

[67]  Christopher Joseph Pal,et al.  Sparse Attentive Backtracking: Temporal CreditAssignment Through Reminding , 2018, NeurIPS.

[68]  Arieh Waldman Cognitive Biases, Dark Patterns, and the 'Privacy Paradox' , 2019, Current opinion in psychology.

[69]  Kim D Raine,et al.  Assessing general public and policy influencer support for healthy public policies to promote healthy eating at the population level in two Canadian provinces , 2019, Public Health Nutrition.

[70]  Chingching Chang,et al.  Self-Control-Centered Empowerment Model: Health Consciousness and Health Knowledge as Drivers of Empowerment-Seeking through Health Communication , 2019, Health communication.

[71]  Marshall D. Rice,et al.  Privacy in Doubt: An Empirical Investigation of Canadians' Knowledge of Corporate Data Collection and Usage Practices , 2019 .

[72]  Steve Whittaker,et al.  Progressive disclosure: empirically motivated approaches to designing effective transparency , 2019, IUI.

[73]  Suhail A R Doi,et al.  A unified framework for bias assessment in clinical research. , 2019, International journal of evidence-based healthcare.

[74]  R. Morgan,et al.  COVID-19: the gendered impacts of the outbreak , 2020, The Lancet.

[75]  Hannah R. Meredith,et al.  The Incubation Period of Coronavirus Disease 2019 (COVID-19) From Publicly Reported Confirmed Cases: Estimation and Application , 2020, Annals of Internal Medicine.

[76]  Alex 'Sandy' Pentland,et al.  Assessing Disease Exposure Risk with Location Data: A Proposal for Cryptographic Preservation of Privacy , 2020, 2003.14412.

[77]  Ramesh Raskar,et al.  Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic , 2020, ArXiv.

[78]  Yi-Feng Xu,et al.  Patients with mental health disorders in the COVID-19 epidemic , 2020, The Lancet Psychiatry.

[79]  Lucie Abeler-Dörner,et al.  Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.

[80]  Marc Lipsitch,et al.  Quantifying bias of COVID-19 prevalence and severity estimates in Wuhan, China that depend on reported cases in international travelers , 2020, medRxiv.

[81]  Dawn Song,et al.  Epione: Lightweight Contact Tracing with Strong Privacy , 2020, IEEE Data Eng. Bull..

[82]  T. Hollingsworth,et al.  How will country-based mitigation measures influence the course of the COVID-19 epidemic? , 2020, The Lancet.

[83]  Mikhail Prokopenko,et al.  Modelling transmission and control of the COVID-19 pandemic in Australia , 2020, Nature Communications.

[84]  Delan Devakumar,et al.  Racism and discrimination in COVID-19 responses , 2020, The Lancet.

[85]  Yiu Chung Lau,et al.  Temporal dynamics in viral shedding and transmissibility of COVID-19 , 2020, Nature Medicine.

[86]  Hyunghoon Cho,et al.  Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs , 2020, ArXiv.

[87]  Shane G. Henderson,et al.  Safe blues: a method for estimation and control in the fight against COVID-19 , 2020 .

[88]  L. Barajas-Nava,et al.  Physical interventions to interrupt or reduce the spread of respiratory viruses. , 2020, Boletin medico del Hospital Infantil de Mexico.

[89]  Dean P. Foster,et al.  PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..

[90]  Hayley McGuffie,et al.  NHS Covid 19 app , 2020 .

[91]  Nuno Fernandes,et al.  Economic Effects of Coronavirus Outbreak (COVID-19) on the World Economy , 2020, SSRN Electronic Journal.

[92]  R. C. Silver,et al.  The novel coronavirus (COVID-2019) outbreak: Amplification of public health consequences by media exposure. , 2020, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[93]  G. Leung,et al.  First-wave COVID-19 transmissibility and severity in China outside Hubei after control measures, and second-wave scenario planning: a modelling impact assessment , 2020, The Lancet.

[94]  Kenan Degirmenci,et al.  Mobile users' information privacy concerns and the role of app permission requests , 2020, Int. J. Inf. Manag..

[95]  Jason Bay,et al.  BlueTrace: A privacy-preserving protocol for community-driven contact tracing across borders , 2020 .

[96]  Bill Gates,et al.  Responding to Covid-19 - A Once-in-a-Century Pandemic? , 2020, The New England journal of medicine.

[97]  Ramesh Raskar,et al.  Assessing Disease Exposure Risk With Location Histories And Protecting Privacy: A Cryptographic Approach In Response To A Global Pandemic , 2020, ArXiv.

[98]  Daniel Blank,et al.  Slowing the Spread of Infectious Diseases Using Crowdsourced Data , 2020, IEEE Data Eng. Bull..

[99]  N. Kraguljac,et al.  COVID-19: Facts, Cultural Considerations, and Risk of Stigmatization , 2020, Journal of transcultural nursing : official journal of the Transcultural Nursing Society.

[100]  Lawrence O Gostin,et al.  Responding to Covid‐19: How to Navigate a Public Health Emergency Legally and Ethically , 2020, The Hastings Center report.

[101]  R. Brook,et al.  Response to COVID-19 in Taiwan: Big Data Analytics, New Technology, and Proactive Testing. , 2020, JAMA.

[102]  Carmela Troncoso,et al.  Decentralized Privacy-Preserving Proximity Tracing , 2020, IEEE Data Eng. Bull..