PeerJ Computer Science (Jan 2022)

Data privacy during pandemics: a systematic literature review of COVID-19 smartphone applications

  • Amany Alshawi,
  • Muna Al-Razgan,
  • Fatima H. AlKallas,
  • Raghad Abdullah Bin Suhaim,
  • Reem Al-Tamimi,
  • Norah Alharbi,
  • Sarah Omar AlSaif

DOI
https://doi.org/10.7717/peerj-cs.826
Journal volume & issue
Vol. 7
p. e826

Abstract

Read online Read online

Background On January 8, 2020, the Centers for Disease Control and Prevention officially announced a new virus in Wuhan, China. The first novel coronavirus (COVID-19) case was discovered on December 1, 2019, implying that the disease was spreading quietly and quickly in the community before reaching the rest of the world. To deal with the virus’ wide spread, countries have deployed contact tracing mobile applications to control viral transmission. Such applications collect users’ information and inform them if they were in contact with an individual diagnosed with COVID-19. However, these applications might have affected human rights by breaching users’ privacy. Methodology This systematic literature review followed a comprehensive methodology to highlight current research discussing such privacy issues. First, it used a search strategy to obtain 808 relevant papers published in 2020 from well-established digital libraries. Second, inclusion/exclusion criteria and the snowballing technique were applied to produce more comprehensive results. Finally, by the application of a quality assessment procedure, 40 studies were chosen. Results This review highlights privacy issues, discusses centralized and decentralized models and the different technologies affecting users’ privacy, and identifies solutions to improve data privacy from three perspectives: public, law, and health considerations. Conclusions Governments need to address the privacy issues related to contact tracing apps. This can be done through enforcing special policies to guarantee users privacy. Additionally, it is important to be transparent and let users know what data is being collected and how it is being used.

Keywords