Contact Tracing and COVID-19 Containment

1.0 Introduction

1.1 Background

The most current threat to health and economic sectors in the world is the SARS-CoV- 2 coronaviruses (COVID-19). The symptoms of this infection continue to escalate and affect more people every second, and if untreated deaths are estimated at 40 million. The primary and secondary interactions of confirmed COVID-19 cases using contact tracing technologies and instruments are one of the most successful ways of reducing the propagation of this infection. China has managed the spread of COVID-19 with this tracing technology quite successfully. Given the urgent need to extend the COVID-19 alternative for tracing infections in other developing countries, it is very enthusiastic to use smartphones and equipment to prevent the spread of the disease and to increase the availability of therapy. The number of technologies for COVID-19 tracing infections has increased rapidly. These now provide tools for closeness monitoring using location-based (GPS) or Bluetooth technology for tracking the movements of people who might be exposed to an infected person. Self-reported signs and symptoms are collected through other technologies, such as characteristic monitoring tools to measure the magnitude of the likelihood of COVID19 infections. These instruments may also be helpful when incorporated in the method of touch monitoring. Although COVID-19 infection tracing technologies may help to limit the spread of the virus, some people are concerned that the smartphone mobiles of users might access other personal information. That means that majority of the people willing to use this application are worried about their privacy or the government getting involved and accessing their data. Moreover, while safety and efficiency are key, enhanced COVID-19 tracing technology regulation did not resolve any other major ethical challenges such as privacy and informed consent. The use of such technology in developing countries may be protected by legislation on the security of personal data, informed consent and use of well-established health technologies and devices. However, there are no uniform standards to ensure the consistency of these gold-standard tracing technologies and applications. Besides, several ethical difficulties in tracing infections with COVID-19 are caused by human rights problems. The goal of this study was therefore to detect COVID-19's acceptability as an example to developing countries for contact-tracing technology and ethical uses in the UK. Since COVID19 has spread globally, many countries around the world have been implementing their testing, tracking and trace services. Some have established what has been known as COVID tracing applications from these various national contexts. Although these programs operated somewhat differently – in what the Israel Democracy Institute called the "Central Mandatory Mass Surveillance Scheme," Israel uses its intelligence and security service Shin Bet and the emergency rule, other systems are functioning in the Republic of Ireland, Australia, Singapore, Germany, Switzerland, South Korea and elsewhere. The frameworks underlying the app have combined two broad approaches (Horalek, & Sobeslav, 2017). The decentralized approach (as promoted jointly by big technology companies Google and Apple) stores data locally on phones and a centralized approach reports data to a centralized server that is likely to be controlled by the government. The discrepancies between these methods have led to hot discussions about privacy and where confidence can be put in the processing of sensitive data by large digital systems (Trenfield et al., 2019). In comparison to the neighbouring countries of Europe, the United Kingdom Government, which has been locked up late already, has not so far been able to produce a national track and trace app. That is in support of a large recruitment campaign for hiring thousands of monitoring and tracking staff to call and lead the people in contact who have been screened for the virus. Although some university research groups have created their software that can be downloaded and used, there are technical questions to the UK's initial proposal for a National App — piloted on White Islands and built with the NHS NHSX digital unit —. Its design was also contentious, as an open letter signed by a group of information security and cyber-security experts express various concerns, including the likelihood of a mass-social surveillance application provided that the application may have detailed information via social connections (the "social diagram"). Others expressed concern that the app would not be commonly used by the poorest or most disadvantaged, maybe without access to smartphones, who would not be able to afford data planning, who share a lack of confidence in public and state authorities or structures already excluded by them (Horalek, & Sobeslav, (2017, August).

Whatsapp

Personal data collected via the App in the centralized architecture was managed by the government. These applications adopt primarily the PEPP-PT protocol, but the technical community is agreed that this method is too academic to develop in practice. Personal data are only contained or monitored by persons on personal devices for the decentralized approach. These Apps are based on the data protection approach recently developed by the European Academics DP-3T (Decentralized Privacy-Preserving Proximity Tracking). But this system is only partly decentralized, i.e. only infected individuals have an anonymous centralized database. An exclusive and decentralized architecture, which is more consistent with the Android and the iOS systems is being developed in May by Google and Apple in collaboration. GPS is focused on a mass mapping of the technology and infrastructure underpinning the two architectures to monitor COVID-19 spread, while the scanning method for QR codes is combined with measuring physical temperature equipment or thermal imaging cameras to track public transport movements for safe or contaminated persons (Trenfield et al., 2019). The Bluetooth method detects other devices which are stored within a certain period and notify devices with appropriate communication with the device of the infected person, if the persons infected report their anonymous infection status on the App. Recently Oxford researchers have modelled and suggested an active usage rate threshold (at least 60%) for the App to provide the government with valued insights into the virus. Globally and in particular in Europe, a rising trend is likely to be favouring decentralized architecture (Horalek, & Sobeslav, (2017, August). This project will examine user criteria for creating an efficient tracking and tracking system for all the various user types: media, tracers and their supervisors reporting bodies, testing authorities, etc.

1.2 Stakeholder Analysis

This project has certain stakeholders that have an interest or participation in the final solution. This segment will discuss the effects of the project on individual stakeholders. This section will also address the various positions of the stakeholders concerning the creation of the project and the required degree of commitment to meet their needs (Murphy, 2018). Besides, this section will examine the existing challenges faced by individual stakeholders and how they can be solved. Research to see who the real stakeholders will be was undertaken for this project. The project customer, who is a big player, was asked to comment on this. Four key stakeholders were listed after discussion of potential stakeholders. When the interested parties were listed, methods to include the various categories of stakeholders were considered based on their overall project impact (Trenfield et al., 2019).

1.3 The Stakeholders

The government, users, IT agency, regulators and management are some of the stakeholders in this project. Since the contact trace and monitoring of COVID-19 infected people is a challenge to these sectors. The following figure indicates the whole community of stakeholders who are completely involved in creating this application. This portion of the community believes the software will solve the contact tracking issue. This will help them monitor pathogens and reduce them (Murphy, 2018). Reduced infections will avoid the spread and so most cities will not be locked up. This is because the administration can quite easily control this party.

Stakeholder power interest group

1.4 Current Stakeholder Problems

The Government is overwhelmed with difficulties when it comes to contacting tracing because manually it is very difficult to do so. Contact monitoring Apps have come into existence in recent months and moved the line of developments in reaction to coronavirus outbreak (COVID-19) A Contact Tracking App is a mobile tool for identifying individuals who may come into contact with an infected individual and then gathering information on these contacts to control the spread of the virus (Murphy, 2018). This app should be a simple one that would not challenge anybody to use, also it must be ethically responsible. This is to protect people's right to privacy. There is a continuous discussion about the implementation of apps concerning their technology environment, which includes centralized versus decentralized, as well as their respective sensor technologies, i.e. a globally integrated GPS for scanning and big data analyzes of Quick Response (QR) codes versus Bluetooth wireless devices that are supported by a microwave and mm-wave communications. This would improve or meet the user requirements in developing and implementing this application (Vander Stichele et al, 2021). Comprehension of obstacles and facilitators includes the full spectrum of variables that can impact the usage and interaction of all applications. In the COM-B context, people need the capability, incentive and motivation to produce behaviour (b) (e.g. download of the Digital Communication Tracking Application). Capacity (C) includes psychological and physical factors (e.g. knowledge, awareness and skills) (e.g. dexterity, disability) (Huang et al., 2017). Opportunities (O) include social and physical variables (e.g. social standards) (e.g. time and resources). Motivation (M) involves reflective and automated processes (e.g. confidence in app advantages and its safety) (e.g. emotion and habit). Users are primarily concerned about their privacy and hence should e the major focus of this application (Bolte, & Goll, 2020). The latest fast evidence analysis from the Institution Ada Lovelace highlights several issues, including whether the application is necessary or optional to be used, the quality of the touch detection test, the collection and access by and who of the data and how data will be used to provide information relevant to the application. In addition to these technological and functional problems, the usefulness of this method is primarily dependent on sufficient uptake (e.g. whether user downloads and registrations are included) and commitment (e.g. the extent of usage of the application or its components over time). Approximately 60 per cent of the population have been estimated to be needed to use the NHSX application to minimize the spread of COVID-19 effectively. We need to understand therefore the extent and factors that influence, take up and involve digital tracing applications to take effective steps to mitigate these problems (Bird, 2020, July). To track and split transmission chains of COVID-19, touch tracking is necessary in addition to the case finding. WHO offers professional advice on contact tracing discusses the contacts, how contacts are identified and how contacts can best be tracked in the quarantine. Contact tracing can sever the transmission chains and will avoid the transmission of the virus. Thus, contact tracking is an important method for the management of infectious diseases in public health (Filer, & Gheorghiu, 2020).

1.5 Systematic Mapping of the Global Deployment Status for the COVID-19 Contact-tracing Appsutbreaks, such as COVID-19.

For global COVID-19 contact-tracking apps we create the first geolocation mapping, in the following figure with country name format codes, app name, number of users, download times and basic technologies (GPS, QR codes, Bluetooth). The colour of the country is the frame used, i.e. red is centralist, while green is decentralised. The colour of the country (or is migrating into the decentralised framework, e.g. Austria, Swiss, Estonia, Finland, Germany, Alberta of Canada, and Vietnam) (Pi, L., Expert et al., 2021)

A systemic mapping analysis on the global usage of COVID-19 Contact Tracking Apps

The vulnerabilities of 10 contact-tracking applications are analyzed and outlined below according to a software vulnerability analysis paradigm. For example, for the UK NHS COVC-19 tracking app, one of the main questions is the positive defects (i.e. what if people report positive misgivings using the App without any consideration for the COVID-19), and the negative errors (i.e. what if infected people do not report their cases in the App) (Pi, L., Expert et al., 2021). The Chinese Health Code for Alipay (QR code and centralized Big Data) has reached 63% of the population and 100% of the traveller population. But for the temperature measuring devices, adds considerable costs (Alangot, & Achuthan, 2017, August). Many workers participate in the control room at home and support people without the digital application. The StayHomeSafe, which is used by Hongkong and CN (Bluetooth, GPS and WiFi) is only for self-quarantined people living in their homes. If people take the wristband off together and phone out, it is susceptible to the risk (Meraviglia, 2018). The Austria Red Cross-Stopp Corona (Bluetooth-based, decentralized) is an ID-rolling device, with users representing 4.5% of the population (i.e. the public key and the private key). A more unified technical structure needs to be discussed in the Bluetooth signal distance connection and the related risk level specification (Bocek et al., 2017).

1.6 SWOT Analysis

SWOT is a method to classify strengths, weaknesses, opportunities and risks for a project. In this project, the SWOT analysis was used to decide if the concept for the project was valuable and useful in the real world. After the details in the Analytical Table for SWOT was reviewed, the developers realized that the project value. The framework should, in future, extend its functionality not only to concentrate on university projects but also on any form of a project to combat the weaknesses identified in the SWOT table. It is difficult to fight against the challenge in the SWOT table since some people would simply like to sue other systems, so only so much can be done to alter people's preferences, so after the system is gone for some time and has become more common, more users will be attracted to it.

SWOT analysis

1.7 Aims and Objectives

The ultimate purpose of this project is to provide the government with a contact and tracking system to help cover the Covid-19 spread. This scheme helps the government as well as the public; it also helps the government and people to try a lot. This project will examine user criteria for creating an efficient tracking and tracking system for all the various user types: media, tracers and their supervisors reporting bodies, testing authorities, etc.

1.8 Objectives

One objective is to develop a database to store user information important to both patients such as account details and also to protect their privacy. Exploration of problems in the implementation of an efficient track system for all different types of users. The database also conserves large amounts of patient data including all perpetrators.

1.9 Project deliverables

Projects generate outputs that are either project results or project processes. This means that the deliverable can be as big as the purpose of reporting the larger project itself. Another way is to say that inputs and outputs are available in every form of the project. This is what you put into the project, such as knowledge, money, etc., and then the results. In other words, these are the stage of events that will bring the track and trace project to a successful conclusion.

Project deliverables

10.1 Ethics

The monitoring and tracking software stores patient information and also meets the GDPR. The GDPR takes account of recent techniques and how people use data following the GDPR rule. It allows the use of user data more restrictive for companies and it expands people's access and control privileges to user data. If a user asks to delete his data from the system, it must be deleted by statute. The GDPR could enforce penalties and fines. The maximum GDPR fines amount to up to 4% or 20 million euros of global annual sales (whichever is greater). Data must also be safely and securely maintained in the APP to avoid unauthorized access by third parties. The chance of breaking the GDPR will be mitigated as the software uses fictional open-source data sets that are available and accessible to anyone on the internet. During the pandemic related to the use of the COVID-19 contact tracing application, many ethical questions are raised. These issues are advantages, confidentiality, voluntariness and incentives (which benefit from the data). The current study found that knowledge benefit is one of the concerns of most participants (82.5 per cent) (Jørgensen et al., 2020). As for the benefits of this technology, current research participants show that the contact tracking technology of COVID-19 is capable of decreasing infection rates, reaching vulnerable people and providing appropriate data, having a better result than other methods based on non-technology. Under Cole, Stevenson and Aitken (2019) gains calls for interventions that make reasons for the adoption of individual behaviour can be generally interpreted as calls. The first considerations for participants are to consent to install the software on behalf of their needs, a decision facilitated by the cost-benefit assessment. On the other hand, according to (Alfian et al., 2017) and (Banerjee, 2018), a decision that is guided by the impetus to conform to social norms or altruism is a matter of alienation of human interests and priority given to other people. Saberi et al., (2019) states that approval and investigation have been conducted in various areas, such as healthcare technology, into how consumers gain benefits from using an app. As this technology is advantageous for the user and the society as a whole, the decisions of well-informed people on installing the app do not meet consumers' usual motivations, but also show self-beneficial/prosocial behavior (Wang et al., 2019). Consequently, in determining which benefits to highlight, policymakers need to use benefit appeals to market the app. This study informs the literature on confidential data and privacy by demonstrating how the design of privacy affects the acceptance of the application by the users. Privacy and confidentiality is another big concern for participants in this research. In our case, the privacy of persons is the right to maintain their health and privacy, while confidentiality relates to the obligation to maintain the privacy of other information (Kamath, 2018). It is worth noting that all information present on the phone, such as images and social media containing sensible information, is still accessible in this application (Chang et al., 2019).

2.0 Literature review

In developing an efficient COVID-19 vaccine, researchers worldwide are developing and evaluating new technologies for 'digital contact tracking to help to transform emergency lockout measures. It is recommended that citizens be able to move freely during this transition time while maintaining constant surveillance and swift action to resolve any new COVID-19 outbreaks (Kruger, 2018). Digital contact tracking applications are apps that can be installed on a personal device of the user like a smartphone to alert the user of contact with SARS-CoV-2 infectors (Behnke & Janssen, 2020). If contact is made, the applicant will be informed of the future contact and further guidance will be given (e.g., to self-isolate). Additionally, certain applications inform the public health authority concerned. When they are published, the NHS touch tracing app (NHSX) is currently being developed in various stages of development and testing worldwide (Albert et al., 2020). To date, in Singapore, India, Israel and South Korea four forms of digital contact tracing applications and the UK-based Royal Air Forces NHS software has been tested. Due to the recent introduction of COVID-19 automated contact monitoring applications, data on user adoption and participation is likely to be minimal. However, the health improvements are handled by a vast range of smartphone apps for individuals (e.g. smoking, physical activity, diet, disease management) (Wang et al., 2019). Knowing the key obstacles and facilitators for the implementation of current medical applications and interaction with them will enable us to inform the future design and implementation of digital contact tracing applications. The following literature review is supporting the importance of this application and hence encouraging us to continue working on the project (Halewood et al., 2018).

2.1 Epidemic Control using Technology

2.2 Quantifying SARS-CoV-2 Transmission

The authors estimated the main parameters of the SARS-CoV-2 (COVID-19) epidemic in this study using the analytically solvable model of the exponential spreading stage and the influence of the interventions. Their approach indicates that there are pre-symptomatic individuals between one third and a half of transmissions. Their infectiousness model indicates that the overall pre-symptomatic R05 contribution is 0.9 (0.2 to 1.1) almost all that is required to maintain a single epidemic (Lin et al., 2020). The transmission that occurs quickly and before the presentation of symptoms means that the disease itself is very unlikely to be present (Zhu & Kouhizadeh, 2019). Two approaches were modelled by the authors,) isolating symptomatic individuals; ii) tracing and quarantining contacts with symptomatic events. Delays in these measures have made the outbreak ineffective, and conventional manual contact tracing procedures have been argued not to be sufficiently fast for SARS-CoV-2 (Zhao et al., 2019). Given their quantification of transmission from SARS-CoV-2, the authors propose that the application of cell phones could minimize transmission enough to achieve R1 and sustained suppression of the epidemic, preventing the virus from further spreading (Blossey et al., 2019). On confirmation of the situation, a mobile app will immediately render contact tracing and notification. By keeping a temporary record of events of proximity among individuals, it can warn and insulate recent contacts of diagnosed cases (Blossey et al., 2019). The authors suggest that the delay in developing symptoms decreases with the faster test protocols and can indeed prove immediate if a presumptive COVID-19 symptom-based diagnosis is recognized in high-progress areas (Guo et al., 2018). Epidemics without the need for mass quarantine ('lock-downs) dangerous for society can be controlled by targeting advice only to those at risk (Verhoeven et al., 2018). It is argued that among many general population prevention initiatives like physical distancing, enhanced hand and respiratory hygienics, and routine decontamination, the application should be one method (Francisco & Swanson, 2018). The authors argue that people should have the right to vote on this forum democratically. The authors argue that effective and sufficient use of the Application is dependent on strong public faith and trust in ethical considerations (Rathee et al., 2019). This refers to the program itself and the collected data. It is argued that the following are likely to refer to the conditions for ethical interference which can command public trust:

Supervision by an open and inclusive consultative committee with representatives of the public;

The approval and publication of the ethical principles underlying the intervention;

usage of an algorithm that is straightforward and auditable;

Integrating assessment and investigation into the intervention to notify successful administration of future major outbreaks;

Sharing knowledge with other countries, especially countries with low and medium revenue.

2.3: Digital Contact Tracing App:

The authors propose techniques in this study that could minimize the number of people who have quarantined while preserving sustainable outbreak management after 'lockdown' has been removed. It has been suggested that digital contact tracing will restrict quarantine requests to those at greatest risk of virus transmission and thus minimize the quarantine amount (Mackey & Nayyar, 2017). It is argued that a performance metric for automated communication monitoring was the degree to which the virus was minimized and the number of people in quarantine was simultaneously minimized (Jeong & Yoon, 2017). Cases will most likely be highly successful in recognizing themselves through self-reporting symptoms before they transmit. Before this, pre-symptomatic contacts include. A rapid monitor of index cases that could release whole clusters or networks of contacts may achieve significant reductions in uninfected persons' proportion during quarantine (Pharmasetiawan, 2019, November). The authors argue that the epidemic can be effectively suppressed by the practical contact trace app and need a straightforward (1) epidemiologically sound algorithm, (2) simulations with a comprehensive sensitivity analysis have been evaluated and (3) data can be audited and optimized when an app comes to the disposition and epidemic develops. A population of 1 million people was simulated by the authors (Wang et al., 2019). Infections with COVID-19 were placed in a modelled population and distributed across the network of interactions. The transmission of COVID-19 without intervention was supposed to take an epidemic duration of 6 days, an average of three to 3.5 days with an epidemic period of R 0 of 3.4 and 3 respectively. It is assumed that when 1 per cent of the population is contaminated, a 35-day lockout takes place. Persons over 70 are required to auto-isolate in compliance with the 'protecting' policy of the UK (Williamson& Piattoeva, 2019). This gives this vulnerable category added security, which is less likely to use smartphones. The proposed application starts gathering information seven days before lockout expires and starts tracking contacts when the lock ends (Feng et al., 2020). Contacts from the last 7 days are examined while measuring the likelihood of a transmission resulting from a communication self-diagnosis. Once notification has been issued, 100% of individuals have been believed to self-isolate at an exit rate of 2% per day. As far as different situations are concerned, both configurations result in a considerable reduction of the accidents of the application, hospitalisations and ICU admissions and significant lives being saved, relative to releases from the lockout with the self-isolation of symptomatic persons only. Direct contact with the app only under positive expectations of epidemic development maintains an epidemic reduction (doubling times of 3.5 days, generation time of 5 days) (Frost et al., 2019). Allowing a recursive contact tracking of first-order contacts in households controls the epidemic even under the most pessimistic assumptions of development. Nevertheless, it still quarantines the highest number of uninfected individuals with just 50% fewer people under quarantine than lock-downs (Tseng et al., 2018). The authors found that combining the app with group testing of index cases has a major impact on quarantine number when the outcomes of the modelled scenarios were compared. Index cases still trigger self-reporting contact tracking in this scenario, but they are followed up by virological tests which release them and their quarantined contact, if negative. To achieve this, a high number of tests are required (estimated as approximately 100,000 tests per day for the UK, pro-rata, this is approximately 7,500 for Ireland). The simulation shows that large numbers of people can be released through group tests (Feng et al., 2020). The authors discuss in one example contact tracing only on a positive test as many continental European countries are currently preparing. Only quarantined contacts that have proven positive after the Index Case do not reach the quarantine peak right after closure, although the delay results in further contact transmission during the pre-symptomatic phase and a total higher number of cases and deaths compared to the scenario in which the quarantine contacts have been confirmed positive (24 hours after self-diagnosis). The authors investigated the reliance on the application's variable usage (Rathee et al., 2021). They conclude that 80 per cent of all users of smartphones use the app, or56 per cent of the general population, will eliminate the epidemic (no more lockdowns needed). The delay of app coverage to a second lockdown was lower. Lockdowns shall begin with 1% of the overall population prevalence. The authors suggest the use of risk scoring to improve the security of the app by controlling the means number of quarantine notifications initiated from a single index case, in the context of public-health responses and based on the current definition of close contact (ECDC), and maintain that once the app has been in operation for weeks, the risk scoring method can be improved through the analysis (Tijan et al., 2019). In comparison to shorter contacts, it would be possible to test for example the relative value of very long contacts such as in the house (Ahmad et al., 2021). The distance dependency of the contacts may be tested or the contacts inside and outside can be compared. Machine learning methods are also suggested to enhance forecasting. The higher the forecasts of high-risk touch, the more accurately the quarantine reports can be aimed. As the authors point out, except for the shelter of more than 70 years, it is important to remember that app-based contact tracing is similar to the pre-lock-out time in the sense of the social mix (Tijan et al., 2019). They, therefore, claim that it is feasible to loosen a lockout so that the scenarios investigated in this paper might be negative about the epidemic (Davies et al., 2019).

2.4: Digital Response to Spread of COVID-19

This paper maintains that constructive use of purposely built technologies should promote voluntary engagement on the part of the public to achieve the aims of "smart testing," the efficient allocation of the resources and relaxing some of the physical distance steps (Davies et al., 2019). 'Intelligent testing' uses software to priority persons likely to experience the highest risk of infection based on their prior proximity to a diagnosed individual (Tijan et al., 2019). Because the individuals in question receive notification shortly after the diagnosis has been made, this procedure reduces the risk of infection and makes it possible for health care providers to quickly suppress the virus. In combination with other initiatives, such as healthcare worker priority testing, an intelligent testing strategy focuses on testing resources where much of the public good is created (Kamilaris et al., 2019). The technique needed for "intelligent testing" is a continuous testing and detection process for contaminated persons, the discovery of those who have been in touch with, quarantining and testing COVID-positive persons and the identification of those recovered so that they can function safely in the economy. With this process, the infection rate can be held as low as possible to dealing with the medical system and to keep the economy free from lock-down (Park et al., 2019). There are several attributes of digital smart testing that have advantages over visual manual touch tracking. The following are:

Increased reliability. It doesn't depend on memory to build a contact list;

Pace. A list of warnings can be produced and shipped almost immediately;

Cost is minimal. There is no need for qualified interviewers and follow-ups will automatically be carried out if medical treatment is not needed;

In contrast to manual touch paths that have proved inadequate in theoretical and practical terms to contain COVID-19.

Digital contact tracing was an important part of slowing the spread of COVID19 in countries such as Taiwan and South Korea. Currently, the outbreaks are managed by a combination of contact tracing and other interventions (Xie et al., 2020). In addition to these advantages, the ECDC states that digital contact monitoring on an application enables contacts to be tracked that are unfamiliar to the case. Broad smartphone use provides smart testing possibilities that have not existed in the past and can reduce limitations of conventional touch tracking that make COVID-19 unsuitable to combat (Andon et al., 2019). The more devices are saturated and pick smart tests are possible, the more powerful the deletion algorithms are. About 70% of the population optimally use the software but less penetration can be paired with more touch tracing. They argue that it is possible, to avoid another wave of contamination or continuous shutting down, to deploy voluntary systems, protect the privacy and agencies and resist fraud and violence (Perera et al., 2020). To promote free adoption, people need to be clear that a technological solution would help resolve and bear witness to the problems they are facing. They argue that it is important to value the privacy of technology to protect people against unnecessary data collection and the possible loss of agencies, particularly in the long term. Controls on privacy which include complete voluntary use, robust data protection, de-identification, verifiable retaining, etc. are needed to protect society and allow confidential adoption (Frizzo-Barker et al., 2020). It is argued that a great deal of consideration will be taken to ensure that data collection is proportionate, completely legitimated and has a set end time limit. Not only must priority be paid to building a structure in which individuals are willing to be involved first. It also should be genuinely safe and confidential in the long run so that errors will not result in the mass dismissal of technology or health-related applications, which will have detrimental health effects (Yang, 2019).

2.5 Peer-to-Peer Contact Tracing

Smartphone monitoring is a good tool to restrict the spread of diseases during an outbreak or pandemic. It is a very effective tool. However, there are essential data protection issues about personal data collection as well as the location of contact tracing applications. The purpose of the study is to create an efficient smartphone contact monitoring app respecting the privacy of users by not collecting local information or other personal data (Cartier et al., 2018). A new way of monitoring the contacts is to use an anonymized interpersonal interaction graph and authors have developed a mobile proof-of-concept app that implements the approach. This study proposes. With this smartphone app, you can build contact tracking "checkpoints," check your risk level based on your previous experiences and report your pair's network with anonymous positive status. To demonstrate the effectiveness of their proposal on influenza or pandémic outbreak trajectories at multiple adopts speeds, they have also developed a computer simulation model 12. Figure one presents a comparison of simulations produced by their simulation model with different adoption levels (Singh & Kim, 2018). Results show that the adoption rate is essential to the effect of an outbreak that an application may have. Even a 25% adoption will visually suppress the infection curve as opposed to no adoption. More significant changes are, however, found in the outbreak trajectory at higher adoption levels.

Effect of the adoption rate of the app on the proportion of the population infected

2.6 Potential complications and reasons for failure

Tracking locations is a form of data gathering that many may prevent the use of an app, particularly if this data is gathered or shared with governmental agencies. Therefore, the proposed app must remove this possible obstacle to acceptance by not requiring access to location data (Cartier et al., 2018). User registration is an extra entry hurdle, which can sometimes be ignored. By registering, you refer to the creation of a web service account often with a password and an e-mail address. Some persons are abstaining from this procedure because of reservations about disclosure of their email address or other personal data such as the name or address them. For some, the mechanism is turned into an obstacle simply because of the disadvantages involved. Regardless of the motivating factor, registration of users would probably be important when assessing their acceptance (Horalek, & Sobeslav, 2017, August).

2.7 Development Time and Complexity

Development time and difficulty are two dimensions of the development of mobile apps that are frequently overlooked. Not only does complex software take longer, but it is much more likely to crash. COVID-19 is a time-sensitive public health problem that needs to be developed in a way that is not only fast but also stable. Any technical solution applied to this crisis (Horalek, & Sobeslav, 2017, August).

2.8 Conclusion

From the literature review almost we can conclude that almost all the authors agree that this is an effective tool but their major concern is the privacy issues. They have also managed to give us an overview of how some of these aspects can be addressed. The application needs to be designed in such a way that it protects or holds data for a short period. This would avoid privacy concerns or issues among the users, also the government should be given limited access to the patient's information.

3.0 Methodology

The project methodology defines the framework used to handle the tasks necessary for effective project development. The Agile Management Methodology can be used for this project. The Agile Approach divides projects into tiny, regularly concluded pieces of work. Plan, coding and integration are the task forms completed. Sprints are called these periodic sessions. This approach is intended to concentrate on the final result and, where possible, provide minimum preparation (Horalek, & Sobeslav, 2017). The Agile method is usually adaptable. It operates in gradual development cycles and can therefore be modified if necessary for the project performance. There will probably be improvements to the project deliverables during the implementation of this project (Bolte & Goll, 2020). Different tasks can need to be performed back and forth, and an agile development strategy is well adapted to project adjustments (Murphy, 2018). The Waterfall development approach needs to be considered when it comes to product development planning systems. The waterfall approach divides project activities into sequential items. Each process is dependent on the completion of the previous stage deliverables (Bird, 2020, July). If the previous deliverable is incomplete, the next deliverable cannot be moved. The Waterfall method is based on several steps which keep people moving forward. There is no space for unforeseeable changes in the technique (Filer, & Gheorghiu, 2020). During the construction of this project, changes and revisions are likely to occur. It would be impossible if the project was using this protocol and the measures followed toward the end of the project, but then there would be an unexpected scenario needing a shift. Project deliverables may have made the previous work obsolete, which may lead to delays in completing the project deliverables overall as well as the entire project (Bird, 2020).

The following phases can be divided into this creation of this project:

APP Design & Development

Database Design & Development

Documentation

Requirements Gathering

The completion of the three project phases can be scheduled for completion in the order that they are listed above. However, we tried to work on multiple stages simultaneously. It was necessary to iterate back and forth between the stages.

Step 1 requires the customer to collect the consumer specifications. The ERD design of the database is needed in phase

Step 2. The database construction began once it has been completed.

Step 3 requires wireframes for the software to be developed and the app has then been created. The database was also integrated into the app.

Step 4 refers to the documents needed for this project, but this will be a normal continuation of any of the other three phases.

3.1 Design

The exact and structural design used to complete this work is discussed in this chapter. The design aspects of Track and Trace systems are explored and illustrated in this Chapter. This subject will consist of concrete steps to carry out the design process and will include the following four aspects in the content of this chapter:

Data Modelling.

Process Modelling.

User Interface.

Wireframe

3.3 UML Diagram

The first step in the design process was to construct a class diagram. This diagram is a fixed structure that emphasizes the dependencies of each class and helps to change the user requirements. The aim is to show the principal classes and attributes in the method. Figure 4.1 gives the context of what the database looks like.

The following groups are included:

Users Infected users Non-Infected users Employees Tracers Tracer Managers Data Analysts Administrators Registered locations High-risk locations Clinics Test Bookings Tested Bodies Reported Bodies Results

UML Class diagram

3.4 Entity Relationship Diagram

This is called an Entity Relation Diagram ERD, and the step after the class charts is the same with additional characteristics such as the relationships between the classes in the database system. Used for a basis for a relational database, this simulation methodology. The figure below is therefore an ERD designed to demonstrate the relationship between the track applications entities.

Entry diagram

3.6 Activity Diagram

An Activity Diagram (object-oriented flowchart) is used to provide a visual interaction the users can have with the system to display its behaviour. This will provide a step-by-step narrative of any of the user activities, as well as the backend tasks occurring behind the scenes.

3.7 Sequence Diagram

A sequence diagram represents processes and procedures visually – from the machine perspective. These tasks take place in a certain order and help the developer to understand how the system interacts and meets the needs of the user. This offers a glimpse of how the device operates. Objects represent the actions involved in the process, the rectangle boxes at the top of the diagram.

3.8 Wireframes

Wireframes are user interface graphic layouts used for visualization of the entire interface. Many factors, such as user retention, accessibility and usability, need to be assessed when building wireframes. These should be considered, analyzed and influenced based on the decisions taken during the process of designing the lower quality wireframe i.e. the Sketch and the following wireframe.

4.0 Scripting Languages

4.1 HTML

Mark-up of hypertext Language is the default language for documents that are intended to be viewed in a web browser. Technologies like Cascading Style Sheets and scripting languages like JavaScript can be used. The material shown on the system was designed using HTML.

4.2 CSS

Cascading Style Sheets is a language that can modify how an HTML layout, font, colour and many other esthetic variations are viewed. CSS was used for the decoration of device contents. The application's architecture was inspired by existing listing systems and the system's wireframes. The mobile interface was first developed using CSS. The first mobile design approach was used because most people (especially the project's target users) use their telephones to access testing services (Alangot, & Achuthan, (2017, August).

4.3 PHP

PHP will be used for backend communications that handle the database using phpMyAdmin, by developing, deleting, renaming, copying and adding the database/table. It can also be used for general purposes of programming. To link to data in the database, PHP has been used either to return website information or to retrieve data to appear on the website.

4.4 JavaScript

JavaScript is a web page dynamic programming language that is considered as one of the three most important Web development technologies in combination with HTML and CSS. The Drop-Down Calendar Framework Type Feature is using Javascript (Bird, 2020, July).

4.5 SQL

The structured query language is used for data management in relational database management and data management system processing. This language offers many features, including data insert, edit and delete, tables created, updated, deleted, records displayed and comparted.

Order Now

5.0 Discussion

To understand the rates of infection, the efficiency of social distance directives, and disease transmission factors, governments and private institutions dependent on the region, health care and population data during the COVID-19 pandemic. Ethical, rigorous and open use of these data is needed to prevent mass cynicism, the breach of privacy and the potential establishment of dictatorial police following the outbreak of COVID-19.

5.1 Technology acceptance

Our commitment to understanding the use of tracking technologies through COVID-19 offers personal as well as social benefits. The diverse benefits of these technologies provided an individual with the location and contact information for tracking COVID-19 cases. More than 70% of the people accepted using this technology, the results of this study showed. This demonstrates UK's optimistic attitudes to the application of such COVID-19 management technologies. However, the actual user of this technology was just 37.5% of the participants. Via governmental outlets and media, people would probably need more incentive to download such applications. This study shows a similar acceptance rate as recorded in other countries including China and Singapore. Around one-third of the literature of this study showed that privacy issues are the main aspects that most of the clients or users are concerned about. According to () past research indicates that in circumstances where people can be made accountable for not engaging in a combined effort such as the tracing of touch applications, the utility of self-gaining attraction can fail. They found that no individual profit inspired installation, whether as a specific attraction or in combination with a societal attraction (based on past research) (an extension of earlier research). In the event of pandemics benefits, appeals are effective only if they are beneficial in favour of people's altruistic and combined efforts. The COVID-19 pandemic could speed up the acceptance of these measures which would normally be rejected by the public. This technology will be generally adopted by the public if the application is applied in a way that decreases the number of infections and subsequently deaths. Nevertheless, the large-scale application of such a strategy exposes extremely unrealistic moral challenges concerning the form of monitoring technology. In the sense of pandemic risk, people may consider it appropriate for their governments to adopt techniques for monitoring and probably managing the spread of the outbreak.

Dig deeper into Urban Pollution and TRAP’s Health Effects with our selection of articles.

6.0 Conclusion

The contribution of COVID-19 contact trace technology to the understanding of technology adoption provides both personal and societal benefits. However, several ethical issues can arise from the implementation of such technologies, including confidentiality, profit and voluntaries. The acceptability to use COVID-19 touch monitoring was high, but the actual use of the technology was relatively limited. User requirements and data security were developed to support the application. However, for recording variant types of the virus, the promoter should consider adding a segment as the virus continues to mutate.

7.0 Reference

Swales, L. Using Technology to Track and Trace in the COVID-19 Era: An Analysis of South Africa’s Legal Framework. Responses in the Time of Pandemic, 78.

Trenfield, S. J., Tan, H. X., Awad, A., Buanz, A., Gaisford, S., Basit, A. W., & Goyanes, A. (2019). Track-and-trace: Novel anti-counterfeit measures for 3D printed personalized drug products using smart material inks. International journal of pharmaceutics, 567, 118443.

Bolte, N. O., & Goll, D. C. (2020). Potential analysis of track-and-trace systems in the outbound logistics of a Swedish retailer.

Huang, Y., Zhu, D., Qian, Y., Zhang, Y., Porter, A. L., Liu, Y., & Guo, Y. (2017). A hybrid method to trace technology evolution pathways: a case study of 3D printing. Scientometrics, 111(1), 185-204.

Pi, L., Expert, P., Clarke, J. M., Jauneikaite, E., & Costelloe, C. E. (2021). Electronic health record enabled track and trace in an urban hospital network: implications for infection prevention and control. medRxiv.

Bocek, T., Rodrigues, B. B., Strasser, T., & Stiller, B. (2017, May). Blockchains everywhere-a use-case of blockchains in the pharma supply-chain. In 2017 IFIP/IEEE symposium on integrated network and service management (IM) (pp. 772-777). IEEE.

Cole, R., Stevenson, M., & Aitken, J. (2019). Blockchain technology: implications for operations and supply chain management. Supply Chain Management: An International Journal.

Alfian, G., Rhee, J., Ahn, H., Lee, J., Farooq, U., Ijaz, M. F., & Syaekhoni, M. A. (2017). Integration of RFID, wireless sensor networks, and data mining in an e-pedigree food traceability system. Journal of Food Engineering, 212, 65-75.

Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2019). Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research, 57(7), 2117-2135.

Chang, S. E., Chen, Y. C., & Lu, M. F. (2019). Supply chain re-engineering using blockchain technology: A case of smart contract based tracking process. Technological Forecasting and Social Change, 144, 1-11.

Wang, Y., Han, J. H., & Beynon-Davies, P. (2019). Understanding blockchain technology for future supply chains: a systematic literature review and research agenda. Supply Chain Management: An International Journal.

Behnke, K., & Janssen, M. F. W. H. A. (2020). Boundary conditions for traceability in food supply chains using blockchain technology. International Journal of Information Management, 52, 101969.

Halewood, M., Chiurugwi, T., Sackville Hamilton, R., Kurtz, B., Marden, E., Welch, E., ... & Powell, W. (2018). Plant genetic resources for food and agriculture: opportunities and challenges emerging from the science and information technology revolution. New Phytologist, 217(4), 1407-1419.

Lin, C., Braund, W. E., Auerbach, J., Chou, J. H., Teng, J. H., Tu, P., & Mullen, J. (2020). Policy decisions and use of information technology to fight coronavirus disease, Taiwan. Emerging infectious diseases, 26(7), 1506.

Francisco, K., & Swanson, D. (2018). The supply chain has no clothes: Technology adoption of blockchain for supply chain transparency. Logistics, 2(1), 2.

Verhoeven, P., Sinn, F., & Herden, T. T. (2018). Examples from blockchain implementations in logistics and supply chain management: exploring the mindful use of a new technology. Logistics, 2(3), 20.

Wang, P., Yao, J., Wang, G., Hao, F., Shrestha, S., Xue, B., ... & Peng, Y. (2019). Exploring the application of artificial intelligence technology for identification of water pollution characteristics and tracing the source of water quality pollutants. Science of the Total Environment, 693, 133440.

Feng, H., Wang, X., Duan, Y., Zhang, J., & Zhang, X. (2020). Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges. Journal of cleaner production, 260, 121031.

Frost, G. J., McKeen, S. A., Smith, N., Barnet, C. D., Ahmadov, R., Pierce, R. B., ... & Bourgeois, I. (2018, December). Characterizing Tropospheric Trace Gas Retrievals from the Cross-track Infrared Sounder. In AGU Fall Meeting Abstracts (Vol. 2018, pp. IN44B-06).

Rathee, G., Balasaraswathi, M., Chandran, K. P., Gupta, S. D., & Boopathi, C. S. (2021). A secure IoT sensors communication in industry 4.0 using blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 12(1), 533-545.

Tijan, E., Aksentijević, S., Ivanić, K., & Jardas, M. (2019). Blockchain technology implementation in logistics. Sustainability, 11(4), 1185.

Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., ... & Peacock, A. (2019). Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable Energy Reviews, 100, 143-174.

Xie, J., Tang, H., Huang, T., Yu, F. R., Xie, R., Liu, J., & Liu, Y. (2019). A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Communications Surveys & Tutorials, 21(3), 2794-2830.

Perera, S., Nanayakkara, S., Rodrigo, M. N. N., Senaratne, S., & Weinand, R. (2020). Blockchain technology: Is it hype or real in the construction industry?. Journal of Industrial Information Integration, 17, 100125.

Yang, C. S. (2019). Maritime shipping digitalization: Blockchain-based technology applications, future improvements, and intention to use. Transportation Research Part E: Logistics and Transportation Review, 131, 108-117.

Horalek, J., & Sobeslav, V. (2017, August). Track & Trace System with Serialization Prototyping Methodology for Pharmaceutical Industry in EU. In International Conference on Mobile Web and Information Systems (pp. 177-186). Springer, Cham.

Blossey, G., Eisenhardt, J., & Hahn, G. (2019, January). Blockchain technology in supply chain management: an application perspective. In Proceedings of the 52nd Hawaii international conference on system sciences.

Bird, D. (2020, July). Distributed Test, Track and Trace System as a Contributor to Epidemic Containment Management. In 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (pp. 722-729). IEEE.

Sitejabber
Google Review
Yell

What Makes Us Unique

  • 24/7 Customer Support
  • 100% Customer Satisfaction
  • No Privacy Violation
  • Quick Services
  • Subject Experts

Research Proposal Samples

It is observed that students are not able to pull out the task of completing their dissertation, so in that scenario, they prefer taking the help of the Dissertation Writer, who provides the best and top-notch Essay Writing Service and Thesis Writing Services to them. All the Dissertation Samples are cost-effective for the students. You can place your order and experience amazing services.


DISCLAIMER : The dissertation help samples showcased on our website are meant for your review, offering a glimpse into the outstanding work produced by our skilled dissertation writers. These samples serve to underscore the exceptional proficiency and expertise demonstrated by our team in creating high-quality dissertations. Utilise these dissertation samples as valuable resources to enrich your understanding and enhance your learning experience.