Top

Digital Contact Tracing Effective Shield Against Pandemic

History tells us pandemics like COVID-19 can recur in some form or other. Their basic characteristics of mutating and spreading quickly among large populations are the biggest challenge to controlling them. Vaccines are effective in checking the spread but take time to get developed. In such a scenario, effective contact tracing plays a big role. Fortunately, technological tools are now available to ensure quick and effective contact tracing.

The traditional form of contact tracing is a labor-intensive process that depends on interviews and investigation. However, currently available technologies can improve the process by reducing the reliance on an individual’s ability to recall all those she/he met in the previous two weeks.

In the age of the connected world, where we carry smart devices with us almost everywhere, it is possible to enable the track-and-trace option embedded in smart devices such as smartphones, smartwatches, and smart bands.

Key technologies enabling digital contact tracing

  • Bluetooth Proximity Tracing: This is the most popular technology being used for the purpose. Bluetooth, or Bluetooth Low Energy, is used here to track the encounters between two smart devices while maintaining the anonymity of the identifiers of nearby devices. As soon as the user gets identified, an alarm notification is transmitted to other identified users based on the locally stored contact history log in an app. This solution has been implemented by Google and Apple for their contact-tracing app.
  • Location Tracking: This can be achieved by cellular triangulation of network towers or GNSS embedded in smart devices. The network tower-based tracking has the advantage of eliminating the need to download an app. However, it raises privacy concerns.
  • GEO-QR Code Tagging: This requires assigning a venue or a place to a QR code and asking people to scan the QR code using smartphones to tag their visit. No app is needed here to register the voluntary check-in and check-out from the location, hence enabling users to control their privacy. However, it increases the error margin in the tracking and tracing process. This method has been implemented by a few private sector entities in Malaysia, Australia, and New Zealand.
  • Ultrasound: Smartphones emit ultrasound signals which are detected by other smartphones. NOVID and SONAR-X are two digital contact tracing apps with sub-meter contact tracing capabilities that implement ultrasound.

Counterpoint-Digital Contact Tracing are Shields from Global Pandemic

A few real-life implementations:

  • India implemented Bluetooth proximity tracing with the Aarogya Setu app, which is now being used by almost 166 million of its citizens.
  • Italian company IK Multimedia has come up with a smart band, called Safe Spacer, with built-in memory to trace contacts, and time stamp collection to ensure social distancing.
  • Apart from IK Multimedia, brands like Fitbit and Samsung are also working for a similar purpose.
  • Some US military Academy cadets are donning smartwatches to evaluate their effectiveness in contact tracing. Since these devices contain no GNSS data, they will not hinder the cadets’ privacy.

Privacy concern over digital contact tracing:

The dilemma of social security and personal privacy has already been widely debated. Allowing apps to access your image gallery or camera is already a trade-off that you often sign up for in this age of connected devices.

Two of the major concerns over digital contact tracing are:

  • Bluetooth proximity tracing is designed to log a person’s contacts and send them to a centralized/decentralized database to work with apps developed by public health authorities. This raises privacy concerns over documentation of the time and date of your encounter along with the identity of another person. However, app developers and companies like Google and Apple want such data to be kept anonymous.
  • Location tracking creates a timeline of a person’s movement throughout the day. Such data can be misutilized in the wrong hands.

If the data is centralized, i.e. it is in control of an authoritative entity like a government, employer, or university, it may give officials undue power over an individual. However, even if the data is in good hands, it remains vulnerable to cyberattacks due to its single point of access, which can potentially result in data of all users being compromised in a single breach.

A blockchain-based decentralized approach gives users more control over the use of their information and reduces the risk of a wide-ranging breach or abuse.

Outlook:

Enabling contact tracing solutions through smartphones and smart wearables, along with maintaining the anonymity of the people, are crucial to effectively tracking and tracing the infected people and saving precious lives in any future outbreak.

Related Posts

Arushi Chawla is a Research Analyst with Counterpoint Technology Market Research, based out of Gurgaon (near New Delhi). Currently, she is dedicated to primary research of emerging technology like mobile phone device, consumer IoT, and other technology-associated segments. She also has a keen interest in researching the impact of mobile phone technology and the digital payment ecosystem on the economy. Arushi holds a Post Graduate Degree in Economics from Amity School of Economics and is a graduate in Economics from Delhi University.

Term of Use and Privacy Policy

Counterpoint Technology Market Research Limited

Registration

In order to access Counterpoint Technology Market Research Limited (Company or We hereafter) Web sites, you may be asked to complete a registration form. You are required to provide contact information which is used to enhance the user experience and determine whether you are a paid subscriber or not.
Personal Information When you register on we ask you for personal information. We use this information to provide you with the best advice and highest-quality service as well as with offers that we think are relevant to you. We may also contact you regarding a Web site problem or other customer service-related issues. We do not sell, share or rent personal information about you collected on Company Web sites.

How to unsubscribe and Termination

You may request to terminate your account or unsubscribe to any email subscriptions or mailing lists at any time. In accessing and using this Website, User agrees to comply with all applicable laws and agrees not to take any action that would compromise the security or viability of this Website. The Company may terminate User’s access to this Website at any time for any reason. The terms hereunder regarding Accuracy of Information and Third Party Rights shall survive termination.

Website Content and Copyright

This Website is the property of Counterpoint and is protected by international copyright law and conventions. We grant users the right to access and use the Website, so long as such use is for internal information purposes, and User does not alter, copy, disseminate, redistribute or republish any content or feature of this Website. User acknowledges that access to and use of this Website is subject to these TERMS OF USE and any expanded access or use must be approved in writing by the Company.
– Passwords are for user’s individual use
– Passwords may not be shared with others
– Users may not store documents in shared folders.
– Users may not redistribute documents to non-users unless otherwise stated in their contract terms.

Changes or Updates to the Website

The Company reserves the right to change, update or discontinue any aspect of this Website at any time without notice. Your continued use of the Website after any such change constitutes your agreement to these TERMS OF USE, as modified.
Accuracy of Information: While the information contained on this Website has been obtained from sources believed to be reliable, We disclaims all warranties as to the accuracy, completeness or adequacy of such information. User assumes sole responsibility for the use it makes of this Website to achieve his/her intended results.

Third Party Links: This Website may contain links to other third party websites, which are provided as additional resources for the convenience of Users. We do not endorse, sponsor or accept any responsibility for these third party websites, User agrees to direct any concerns relating to these third party websites to the relevant website administrator.

Cookies and Tracking

We may monitor how you use our Web sites. It is used solely for purposes of enabling us to provide you with a personalized Web site experience.
This data may also be used in the aggregate, to identify appropriate product offerings and subscription plans.
Cookies may be set in order to identify you and determine your access privileges. Cookies are simply identifiers. You have the ability to delete cookie files from your hard disk drive.