| Literature DB >> 35084338 |
Damyanka Tsvyatkova1, Jim Buckley1,2, Sarah Beecham1, Muslim Chochlov1, Ian R O'Keeffe1, Abdul Razzaq1, Kaavya Rekanar1, Ita Richardson1,2, Thomas Welsh1, Cristiano Storni1,2,3.
Abstract
BACKGROUND: The silent transmission of COVID-19 has led to an exponential growth of fatal infections. With over 4 million deaths worldwide, the need to control and stem transmission has never been more critical. New COVID-19 vaccines offer hope. However, administration timelines, long-term protection, and effectiveness against potential variants are still unknown. In this context, contact tracing and digital contact tracing apps (CTAs) continue to offer a mechanism to help contain transmission, keep people safe, and help kickstart economies. However, CTAs must address a wide range of often conflicting concerns, which make their development/evolution complex. For example, the app must preserve citizens' privacy while gleaning their close contacts and as much epidemiological information as possible.Entities:
Keywords: COVID-19; contact tracing; digital contact tracing apps; digital health; evaluation; framework; health apps; mHealth; mobile health
Mesh:
Substances:
Year: 2022 PMID: 35084338 PMCID: PMC8919989 DOI: 10.2196/30691
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.947
Figure 1Phases and deliverables in the development of our Citizen-Focused Compare-and-Contrast Evaluation Framework (C3EF) for contact tracing apps (CTAs). mHealth: mobile health.
Distribution of team members as pillar owners and devil’s advocates in phase 2.
| Pillar name | Pillar owner(s) | Devil’s advocate(s) |
| (General) Characteristics | IO and SB | JB |
| Usability and Accessibility | CS, IR, and DT | IO and JB |
| Data Protection | TW | KR |
| Effectiveness | AR | DT |
| Technical Performance | MC | KR |
| Transparency | KR | MC |
| Citizen Autonomy | JB | IR |
The 7 pillars with their first- and second-level attributes (only).
| First-level attributes | Second-level attributes | |
|
| ||
|
| 1. General characteristics | |
|
|
| Name of app |
|
|
| Country |
|
|
| Current versions |
|
|
| Language support |
|
|
| Age of users |
|
| 2. Availability | |
|
|
| Internet connectivity: app (other) |
|
|
| Platform dependency |
|
| 3. Organizational reputation | |
|
|
| App status |
|
|
| Development |
|
| 4. App content | |
|
|
| Processing overview |
|
|
| Sensor employed |
|
|
| App running state |
|
|
| Contact tracing definition |
|
|
| App data |
|
|
| App permissions |
|
|
| Notification method |
|
|
| Diagnosis status |
|
| ||
|
| 1. Subjective satisfaction | |
|
|
| Rating |
|
|
| Motivations for high/low scores |
|
| 2. Universality | |
|
|
| Accessibility |
|
|
| Cultural universality |
|
| 3. Design effectiveness | |
|
|
| Completeness |
|
|
| Configurability |
|
|
| User interface |
|
|
| Helpfulness |
|
| 4. User interaction | |
|
|
| Efficiency |
|
|
| Robustness |
|
|
| Clarity of interaction with elements |
|
|
| Consistency of interaction with elements |
|
|
| Alerts and notifications messages |
|
| 5. Ongoing app evaluation | Frequency of upgrade |
|
| ||
|
| 1. Security | |
|
|
| STRIDEa taxonomy/vulnerabilities |
|
|
| CTb-specific threats |
|
|
| Software architecture security |
|
|
| SDLCc and security |
|
| 2. GDPRd | |
|
|
| Preliminaries |
|
|
| GDPR principles |
|
|
| Rights |
|
| ||
|
| 1. Effective reporting | |
|
|
| Detecting close contacts |
|
|
| Reporting positive close contacts |
|
|
| Reporting all close contacts |
|
|
| Reporting hotspots |
|
| 2. Effective results | |
|
|
| Users who share their data |
|
|
| Number of (additional) contacts/week found |
|
|
| Number of those contacts found positive |
|
|
| Relative effort per contact found versus manual CT |
|
| 3. Effective engagement | |
|
|
| Population uptake |
|
|
| Population retention |
|
|
| Population engagement |
|
| ||
|
| 1. App transparency | |
|
|
| App purpose |
|
|
| App permission |
|
| 2. User participation | App participation knowledge |
|
| 3. Data transparency | |
|
|
| Minimization, gathering, storing, accessibility, etc |
|
|
| GDPR applicability |
|
|
| Life cycle |
|
| ||
|
| 1. Speed | Response time (frontend) |
|
| 2. Efficiency | Response time |
|
| 3. Consumption | |
|
|
| Battery |
|
|
| Disk space |
|
| 4. Resource/troubleshooting and trust | |
|
|
| CPU/memory usage |
|
|
| Bandwidth usage |
|
|
| Throughput (backend) |
|
| ||
|
| 1. App discussion authority | |
|
|
| Official discussion forums |
|
|
| Empowered moderators |
|
| 2. Phone functionality | |
|
|
| GPS access |
|
|
| Bluetooth |
|
|
| ENSe access |
|
|
| Notifications |
|
|
| Microphone |
|
| 3. Data control | |
|
|
| Data upload authority |
|
|
| Uploaded data location visibility |
aSTRIDE: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
bCT: contact tracing.
cSDLC: Software Development Life Cycle.
dGDPR: General Data Protection Regulation.
eENS: Enhanced Network Selection.
Figure 2Example 1, PathCheck SafePlaces (United States) [87]: age in "Terms of Use." Example 2, Corona-Warn (Germany) [89]: understandability of interface elements. Example 3, NOVID app (United States) [88]: descriptions offered. Example 4, COVID Tracker app (Ireland) [86]: constraints for preventing errors.
Figure 3Example 5, COVID Tracker app (Ireland) [86]: inconsistency of feedback when clicking on the button “Enable”.
Comparison of Common Weakness Enumerators (CWEs) in the Corona-Warn [89] and MyTrace [97] apps.
| CWE | Corona-Warn | MyTrace |
| 89: A (SQLa) Command | Local SQL injection possible but data encrypted | Local SQL injection possible and data not encrypted |
| 276: Incorrect Default Permissions | N/Ab | Permissions for tasks, Bluetooth administration, and external storage |
| 295: Improper Certificate Validation | Vulnerable to SSLc MITMd attack | N/A |
| 532: Insertion of Sensitive Information into Log File | Sensitive information is encrypted | Excessive information logged |
| 327: Use of a Broken or Risky Cryptographic Algorithm | Weak hash function in SSL | N/A |
aSQL: Structured Query Language.
bN/A: not applicable.
cSSL: Secure Socket Layer.
dMITM: man in the middle.
Comparison of threats to Corona-Warn [89] and MyTrace [97] using the Common Weakness Enumerators (CWEs) listed in Table 3 (with a severity rating: H=high, M=medium, and L=low) against the common threat assessment model.
| Threat | Corona-Warn Matched CWEs | MyTrace Matched CWEs |
| Fake alert injection | N/Aa | CWE-327-H |
| False report | CWE-295-H, CWE-327-L | N/A |
| Proximity beacons altered | N/A | CWE-89-H |
| User can deny or retract infection report or contact details | CWE-295-H | N/A |
| Personal information disclosed | CWE-327-L, CWE295-H | CWE-89-H, CWE-276-H |
| User deanonymized and tracked | CWE327-L, CWE295-H | CWE-89-H, CWE-276-H, CWE-532-H |
| Energy resource drain attack | N/A | CWE-276-H |
| System resource contention | N/A | CWE276-H |
aN/A: not applicable.
Figure 4Electoral district–level COVID-19 statistics on the Health Service Executive's COVID Tracker app (Ireland) [86].
Figure 5The "pull requests" GitHub page [99] for the Health Service Executive's COVID Tracker app [86].