2022
DOI: 10.1098/rsif.2022.0369
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and contact tracing efficacy

Abstract: As the COVID-19 pandemic emerged, public health authorities and software designers considered the possibility that smartphones could be used for contact tracing to control disease spread. Smartphone-based contact tracing was attractive in part because it promised to allow the tracing of contacts that might not be reported using traditional contact tracing methods. Comprehensive contact tracing raises distinctive privacy concerns, however, that have not been previously explored. Contacts outside of an individua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…It is the process of identifying all people with whom a Covid-19 patient has come in contact in the last two weeks. Contact tracing is a recognized method to reduce the infection spread and it is made easier nowadays thanks to smartphones [31]. People carried them everywhere so that their frequented places and pthe eople with whom they met could be recorded and analysed by health officials [32].…”
Section: Private Life and Covid-19mentioning
confidence: 99%
“…It is the process of identifying all people with whom a Covid-19 patient has come in contact in the last two weeks. Contact tracing is a recognized method to reduce the infection spread and it is made easier nowadays thanks to smartphones [31]. People carried them everywhere so that their frequented places and pthe eople with whom they met could be recorded and analysed by health officials [32].…”
Section: Private Life and Covid-19mentioning
confidence: 99%
“…Centralization in managing identities and authentication, while simplifying the login process, also increases the risk of unauthorized access to sensitive information [10]. The IdP, in traditional SSO systems, has the ability to track all the Service Providers (SPs) a user visits, potentially compromising user privacy [11]. Additionally, collusive SPs could exploit the centralized nature of SSO to create a comprehensive profile of a user's online activities by linking their identities across different platforms [12].…”
Section: Privacy Concerns In Traditional Sso Systemsmentioning
confidence: 99%