| Literature DB >> 33840865 |
Samuel Ribeiro-Navarrete1, Jose Ramon Saura2, Daniel Palacios-Marqués1.
Abstract
Controlling the coronavirus pandemic is triggering a cross-border strategy by which national governments attempt to control the spread of the COVID-19 pandemic. A response based on sharing facts about millions of private movements and a call to study information behavior during the global health crisis has been advised worldwide. The present study aims to identify the technologies to control the COVID-19 and future pandemics with massive data collection from users' mobile devices. This research undertakes a Systematic Literature Review (SLR) of the studies about the currently available methods, strategies, and actions to collect and analyze data from users' mobile devices. In a total of 76 relevant studies, 13 technologies that are classified based on the following aspect of data and data management have been identified: (1) security; (2) destruction; (3) voluntary access; (4) time span; and (5) storage. In addition, in order to understand how these technologies can affect user privacy, 25 data points that these technologies could have access to if installed through mobile applications have been detected. The paper concludes with a discussion of important theoretical and practical implications of preserving user privacy and curbing COVID-19 infections in the global public health emergency situation.Entities:
Keywords: COVID-19; Data management; Mass data-collection; Mobile devices; User privacy
Year: 2021 PMID: 33840865 PMCID: PMC8019834 DOI: 10.1016/j.techfore.2021.120681
Source DB: PubMed Journal: Technol Forecast Soc Change ISSN: 0040-1625
Main characteristics of the data collection processes.
| Data privacy | Level of data which the application will have access to. Personal data such as age, gender or gender, among others. Anonymous use of these data and indication of the management to third parties. |
| Data security | Level and quality of implementation of application security against possible attacks that may steal data collected by the application. There are security level protocols to evaluate the management of user data. |
| Data destruction | Time span during which the data will be stored on servers of private companies or public institutions that collect the data. The deletion of the data must be certified anonymously, and users should be informed who would have access their data before they are deleted. |
| Voluntary access | There must be protocols that indicate whether the collection of their data through an application is voluntary or mandatory for its use. The data that the application collects must be specified so that users voluntarily accept the said collection. |
| Time span | The frequency with which the data are collected. Ranges from weekly or monthly to real-time data. The latter allows the automatic management of data with the use of AI applications. |
| Storage | The type of data storage. The data can be stored on a server or be part of the software that users use to access services on the Internet, such as cookies or the cache of browsers and applications. The user must be informed if these data should be deleted by him/herself or by companies within the indicated time frame. |
| Technology | Technology used to access and collect user data. Depending on the sophistication of the given technology, the speed of data collection and the amount may be truncated. |
Privacy levels according to type of data collection and user privacy.
| PII | Personally identifiable information, or PII, is the data set that can be used to identify, contact, or locate a user. It is also the data set that allows one to differentiate one individual from another. |
| PHI | Personal health information, or PHI, is the data related to the medical history information of a user or individual. It is also the set of information collected from medical sources and health treatments that can identify a user. |
| PIFI | Personally identifiable financial information, or PIFI, is related to the collection of information in financial and accounting terms, such as credit cards, bank accounts, and their details and other data that affect the economic health of the individual. |
| SR | Educational (Student) records, or SR, are the set of data that identifies the level of training of a user, as well as individual's grades, transcripts, billing details, and other educational records. These data may segment the user and his/her interests. |
| Non-sensitive PII | It is a set of information that is already in the public domain and, therefore, is not sensitive to the user. However, if it is combined with PII, it can offer information about the user or individual. |
| Non-PII | Non-personally identifiable information (Non-PII) is data that cannot be used in any way to identify a person. The most common examples are the ID of the connected devices, cookies, or the like. However, both types of information may offer clues as to who the user or individual is. |
Search terms used in the SLR.
| data collection | AND | mobile devices | ACM Digital Library | Title, |
* These terms were only used when the search of the terms.
“data collection” AND “mobile devices” did not obtain the expected results.
Categories used in article classification.
| Article classification | Description |
| Technical | Technical process to study a data-collection technology |
| Theory | Theoretical framework of a data-collection technology |
| Privacy | Analytical focus on technology privacy |
| Experiment | The experimental perspective on a data-collection technology |
| Method | The method used to develop a data-collection technology used and collect data has been analyzed |
Relevant papers found in the Systematic Literature Review (SLR).
| Journal of Structural Geology | Geology | ● | ○ | ||||
| IEEE Transactions on Instrumentation and Measurement | Electrical & Electronic Engineering | ○ | |||||
| IEICE TRANSACTIONS on Information and Systems | Computer Sci. & Information Systems | ● | ○ | ||||
| Journal of Intelligent Transportation Systems | Transport. Science & Technology | ○ | ● | ||||
| ACM Transactions on Data Science | Computer Sciences & Information System | ● | ○ | ||||
| ACM Transactions on Knowledge Discovery from Data | Computer Science | ○ | ● | ||||
| Cabalquinto et al. (2020) | Telematics and Informatics | Information Science & Library Science | ○ | ● | |||
| Journal of Network and Computer Applications | Public, Environmental & Occu. Health | ○ | ● | ||||
| Proceedings of the VLDB Endowment | Computer Science | ● | ○ | ||||
| Electronic Journal of Statistics | Statistics & Probability | ○ | ● | ||||
| Proceedings of the VLDB Endowment | Computer Science | ○ | |||||
| Communications of the Association for Information Systems | Information Systems | ○ | |||||
| IEEE Internet of Things Journal | Information System & Management | ○ | |||||
| Choi et al. (2019) | Journal of Public Economics | Economics and Econometrics | ○ | ● | |||
| Journal of Public Economics | Business & Economics | ○ | ● | ||||
| Journal of Network and Computer Applications | Computer Science Applications | ○ | ● | ||||
| Environmental Modelling & Software | Environmental Science | ○ | ● | ||||
| Heliyon | Multidisciplinary | ● | ○ | ||||
| Digital Investigation | Computer Science Applications | ○ | ● | ||||
| IEEE Access | Computer Science | ○ | |||||
| Pacific Asia Journal of the Association for Information Systems | Computer Sciences & Information System | ○ | |||||
| ACM Transactions on Intelligent Systems and Technology | Artificial Intelligence | ○ | ● | ||||
| ACM Transactions on Database Systems | Information Systems | ● | ○ | ||||
| BMJ Global Health | Public, Environmental & Occu. Health | ○ | ● | ||||
| Procc. ACM on Interactive, Mobile, Wearable & Ubi. Tech. | Engineering | ○ | ● | ||||
| AIS Transactions on Human-Computer Interaction | Computer Sciences Applications | ○ | ● | ||||
| Future Generation Computer Systems | Computer Network & Communications | ● | ○ | ||||
| IEEE Communications Letters | Telecommunications | ○ | ● | ||||
| ACM Transactions on Multimedia Computing, Comm., and Appli. | Computer Networks & Communications | ○ | ● | ||||
| IEEE Transactions on Intelligent Transportation Systems | Computer Science Applications | ○ | |||||
| Science China Information Sciences | Computer Sci. & Information Systems | ● | ○ | ||||
| IEEE Transactions on Computers | Computer Science | ● | ○ | ||||
| Information & Management | Information Systems & Management | ● | ○ | ||||
| Procc. ACM on Interactive, Mobile, Wearable & Ubi. Tech. | Engineering | ○ | ● | ||||
| Pervasive and Mobile Computing | Computer Science | ○ | ● | ||||
| Applied Geography | Social Sciences | ○ | ● | ||||
| Proceedings of the VLDB Endowment | Computer Science | ● | ○ | ||||
| ACM Transactions on Sensor Networks | Computer Networks & Communications | ● | ○ | ||||
| Internet of Things | Internet of Things Applications | ● | ○ | ||||
| ACM Transactions on Internet Technology | Computer Networks and Communications | ○ | ● | ||||
| Information Fusion | Information Systems | ● | ○ | ||||
| Ravenscroft (2017) | Journal of Computing Sciences in Colleges | Computer Science | ○ | ||||
| Robertson (2019) | Common Market Law Review | International Relations | ○ | ● | |||
| Computers & Security | Computer Sci. & Information Systems | ○ | ● | ||||
| Computers & Security | Computer Science | ● | ○ | ||||
| Communications of the Association for Information Systems | Information Systems | ○ | |||||
| ACM Transactions on Intelligent Systems and Technology | Artificial Intelligence | ○ | ● | ||||
| International Journal of Environmental Research and Public Health | Public, Environmental & Occu. Health | ○ | ● | ||||
| ACM Computing Surveys | Computer Science | ○ | |||||
| IEEE Transactions on Mobile Computing | Computer Network & Communications | ○ | ○ | ||||
| Telecommunications Policy | Information Systems | ○ | |||||
| AIS Transactions on Human-Computer Interaction | Computer Science | ● | ○ | ||||
| Politics, Philosophy & Economics | Ethics and Political Science | ○ | |||||
| AIS Transactions on Replication Research | Computer Sciences | ● | ○ | ||||
| Journal of Information Technology Theory and Application | Computer Sciences & Information System | ○ | ● | ||||
| Computer Methods and Programs in Biomedicine | Computer Science Application Software | ○ | ● | ||||
| IEEE/ACM Transactions on Networking | Computer Science Applications | ● | ○ | ||||
| ACM Transactions on Multi. Computing, Comm., and Appl. | Computer Networks and Communications | ● | ○ | ||||
| IEEE Access | Computer Science | ● | ○ | ||||
| ACM Transactions on Sensor Networks | Computer Networks and Communications | ○ | ● | ||||
| Digital Communications and Networks | Computer Network and Communications | ● | ○ | ||||
| Communications of the Association for Information Systems | Information Systems | ○ | ○ | ||||
| ACM Transactions on Intelligent Systems and Technology | Artificial Intelligence | ○ | |||||
| IEEE Journal of Selected Topics in Signal Processing | Engineering | ○ | ● | ||||
| Geospatial Health | Public, Environmental & Occu. Health | ○ | ● | ||||
| Yang et al. (2019) | IEEE Transactions on Vehicular Technology. | Engineering | ○ | ● | |||
| IEEE Transactions on Information Forensics and Security | Computer Networks and Communications | ○ | |||||
| Digital Government: Research and Practice | Information systems, Law | ○ | ● | ||||
| ACM Transactions on Knowledge Discovery from Data | Computer Science | ○ | |||||
| Computer Networks | Computer Networks and Communications | ○ | ● | ||||
| Communications of the Association for Information Systems | Information Systems | ○ | ● | ||||
| Procc. ACM on Interactive, Mobile, Wearable & Ubi. Tech. | Engineering | ● | ○ | ||||
| ACM Transactions on Knowledge Discovery from Data | Computer Science | ○ | ● | ||||
○ Research article main topic analyzed.
● Secondary focus on which the article has been analyzed.
Ø Analysis approach for sub-theme analyzed in the same article (methods).
* When an article is classified as an experiment, the method may or may not be analyzed, because sometimes the experiment may or may not represent a monitoring strategy for pandemic systems or user location.
Fig. 1Results of the HOMALS analysis.
Technologies to track pandemics symptoms tracking user's mobile devices.
| Location | Location-based services (LBS) use real-time data (RTD) and geo-data from a mobile device or smartphone to provide information. | CLO / DC | OV / DE | RE | RTD | EX |
| Bluetooth | It is a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic device that can share information, documents, images and other files. | TO / CLO | OV / DE | RE | BP | EX |
| GPS | Global Positioning System (GPS) is a radio navigation system that uses radio waves between satellites and a receiver inside smartphones to provide location and time information. | DC / TO | OV / DE | RE | RTD | LO / EX |
| External API | Third party applications can join external APIs like Apple and Google are developing worldwide. It lets iOS and Android software communicate with each other over Bluetooth technology, allowing developers to build a contact tracing app that will work for both. | TO / DC | OV / DE | RE | RTD | EX |
| DP-3T | It is a decentralized privacy-preserving proximity tracing. DP-3T is an open-source protocol for Bluetooth-based tracking where an individual phone's contact logs are stored only locally, so no central authority can know who has been exposed. | DC / M-F | DE / PD | OP / RE | BP | LO |
| ID Network Location | The ID network is a mobile virtual provider individually per one smartphone. This ID can be tracked using provider data. | DC / TO | OV | CO | RTD | EX |
| Textual Analysis | It consists of the analysis of keywords found in conversations in mobile applications and publications on the Internet and that can segment advertising, send notifications on specific topics, and listen to user conversations. | DC | OV | RE | RTD | LO |
| Logbook systems | It is a computer-based software program for recording (logging) states, events, or simply conditions used for complex machines. | DC / TO | OV / DE | OP | BP | LO |
| Meta data | Meta data provide information about other data such as descriptions, interests, behaviors or details about the user who is surfing the Internet. | DC | DE | CO | BP | LO |
| Data Logging | Automatic Location Communicators (ALC) automatically log data through positioning and communications technology. They allow for remote observation through recording. | CLO / DC | OV / DE | OP | RTD | EX |
| Online Tracking | When users access a web page, they create data related to psychographic, behavioral, geographic and lifestyle indicators. These can be remotely monitored. | CLO / DC | OV | RE / CO | RTD | LO |
| Third-party sources | Third-party data can be used to from data aggregators to expand a dataset. Data aggregators are used to increase the quality of data from different sources of information. | CLO / DC | OV/ DE | OP | BP | LO |
| Mobile Crowd-sending (MCS) | It is a technique where a group of users with mobile devices collectively send and analyze data to share information to measure, map, or predict actions. | CLO / TO / DC | OV | OP | BP | LO / EX |
If it does not depend on the user, the destruction of the data by third parties is usually based on OV or DH. PH can be used when the user him/herself can destroy his/her storage device.
There is no option to use a terminal connected to the coverage system and the Internet without being assigned an ID Network Location.
Classification elements for the identified technologies.
| Security | Cloud (CLO), Tokenization (TO), Data Classification (DC), Multiple-Factors Authentication (M-F) |
| Destruction | Overwriting (OV), Degaussing (DE), Physical destruction (PD) |
| Voluntary access | Optional (OP), Required (RE), Compulsory (CO) |
| Time span | Real-time data (RTD), Batch Processing (BP) |
| Storage | Local (LO), External (EX) |
Location-based classification terms found in SLR.
| LBSN | Location-based social networks are social networks that use features such as GPS or similar to broadcast the user location in stream. These networks can be mobile applications or web apps. |
| LBS | Location-based services are software services that use geographic data and user information and that may or may not be applications. |
| LBMS | Location-based mobile services focus on using the geolocation of a device (e.g., a smartphone or any other connected device) to provide the trace of the location information of the user who uses this device. |
User data points accessible through mobile applications.
| Age | User age based on the content they enjoy and the type of media consumed on the terminal. |
| Gender | User gender based on the applications and content they enjoy on the terminal. |
| Location | Access to user location through GPS applications or geolocation access points. |
| Household income | User income level based on the analysis of purchases made and bank applications by social class. |
| Marital status | User marital status based on contact lists, social media statuses, or emergency contacts. |
| Family size | User family size based on subscriptions to family platforms or activation of user-safe browsing. |
| Interests | User interests based on the type of installed applications, browsing history, messages sent through chats, etc. |
| Preferences | User preferences for the A / B test comparison of decisions made in the device. |
| Opinions and commenting | User opinions through the analysis of applications intended for this use and textual analysis techniques on product reviews or email meta data. |
| Browsing history | User browsing history based on the identification of the main sources of information or categories of sites visited. |
| Purchase history | User purchase history and categories of purchases made (retail, alcohol, sports, health, etc. |
| Social network use | Type of social networks used, time of use, and type of use. |
| Ad interactions | User interaction and engagement with advertising banners and percentage of return on investment of each user |
| Newsletter sign-ups | Type of subscriptions to which the user is registered |
| Types of media being consumed | Type of media content consumed on the device. |
| Search terms used | Words used in search engines; identification of patterns of user behavior. |
| Bank company | User bank account based on the analysis of banking applications installed on the device. |
| Sports | Type of sport based on interests, consumed media, and installed applications. |
| Nearby cell phone towers | Analysis of the phones with which a user has been in contact by messaging, Bluetooth or other networks |
| Nearby Wi-Fi routers | User location identification based on the Wi-Fi points to which the terminal connects automatically. |
| Music liked | Accessing application information to listen to music or to files saved on the device |
| Level of education | Analyzing applications related to the university education sector, educational techniques, professional field, and so on. |
| Health information | If a user has an illness, based on the type of mHealth app that s/he uses to control symptoms and carries out treatment, s/he can give information about symptoms or habits. |
| Political ideology | User political ideology depending on the type of newspaper applications installed or the browsing history of these websites. |
| Photos | Many applications request information from the terminal images to be shared with other users. The use and access of this must be monitored. |
| Text messages | Photos are a source of information regarding promotions and newsletter subscriptions. Text messages can be used to obtain account verification and for payment information. Test messages also provide information about the email account or the bank card used. |
| Microphone | Many applications request information from the microphone in order to make audio notes or recordings. Sometimes these applications segment advertising based on active listening in the background. |