Skip to main content
IEEE - PMC COVID-19 Collection logoLink to IEEE - PMC COVID-19 Collection
. 2020 Sep 22;8:171325–171333. doi: 10.1109/ACCESS.2020.3025971

Balancing Personal Privacy and Public Safety During COVID-19: The Case of South Korea

Na Young Ahn 1, Jun Eun Park 2, Dong Hoon Lee 3,, Paul C Hong 4
PMCID: PMC8545276  PMID: 34786290

Abstract

There has been vigorous debate on how different countries responded to the COVID-19 pandemic. To secure public safety, South Korea actively used personal information at the risk of personal privacy whereas France encouraged voluntary cooperation at the risk of public safety. In this article, after a brief comparison of contextual differences with France, we focus on South Korea’s approaches to epidemiological investigations. To evaluate the issues pertaining to personal privacy and public health, we examine the usage patterns of original data, de-identification data, and encrypted data. Our specific proposal discusses the COVID index, which considers collective infection, outbreak intensity, availability of medical infrastructure, and the death rate. Finally, we summarize the findings and lessons for future research and the policy implications.

Keywords: COVID-19, COVID index, de-identification, epidemiological investigation, infectious diseases, pandemic, personal information, personal privacy, policy, public safety, South Korea

I. Introduction

Increasingly, the integration of big data and information and communications technology (ICT) promises enormous social value creation. In a pandemic crisis, public safety is a top priority. Simultaneously, we cannot ignore potential privacy breaches. The “old” debate over personal privacy and public security is still relevant. Since personal information is crucial to curtail the spread of a pandemic, policymakers and officials can more likely expect “implicit” consent. However, in the course of pursuing compelling public purpose, privacy rights may be at risk [1][3].

In general, any epidemiological study is subject to an ethics review to ensure privacy [4], [5]. For a face-to-face investigation, investigators respect confidentiality requirements. However, in view of the increasing social costs associated with the prevention and treatment of serious infectious diseases, there is a growing demand to gather accurate personal information in real time. For example, Gilbert Beebe suggested that in certain disastrous circumstances, public interest might be a higher priority than privacy issues [7]. The widespread flu epidemic in 2009 provided additional support for this line of reasoning. While conducting epidemiological investigations, researchers did not always obtain an individual’s explicit consent. In the United States, the Health Insurance Portability and Accountability Act (HIPAA) established the privacy rules that set limits on the use and disclosure of any personal health information [8], though aggregating personal information for public health purposes is a somewhat different matter [9].

COVID-19 is an extraordinary circumstance that poses enormous public health risks—potentially affecting millions of people worldwide [10][12]. Nations are at war with the coronavirus. In this context, what does it mean to balance personal privacy and public safety? What are the boundaries and acceptable norms? This study considers these questions and examines the actual cases of two countries—South Korea and France. The subsequent sections of this study proceed as follows. In Section 2, we discuss the characteristics of the virus that causes COVID-19. We then introduce an anti-displacement alternative to COVID-19. We further compare the results of the French and Korean governments’ quarantine measures against COVID-19. We apply the STRIDE Threat Model to perform a risk analysis of the Korean government’s quarantine system. Our specific proposal considers collective infection, outbreak intensity, availability of medical infrastructure, and the death rate. Based on our findings, we present lessons and implications for future epidemiological investigations.

II. COVID-19 Responses

A new type of coronavirus (SARS-CoV-2) was first reported in Wuhan, China, in December 2019. Since then, this respiratory infection epidemic, designated as COVID-19, spread throughout China and worldwide. Upon infection, after a 2- to 14-day incubation period, patients experience respiratory symptoms including high fever (about 37.5 degrees) and cough or dyspnea [13][19]. However, it seems that there are several cases of asymptomatic infections. On January 21, 2020, the Chinese government officially reported 15 confirmed cases of COVID-19 [20][23]. The medical staff involved in the incident became credible evidence of human-to-human transmission [24]. On January 30, 2020, the World Health Organization (WHO) declared the continual spread of this infection as an International Public Health Emergency (PHEIC). With an accelerating rate of confirmed patients worldwide, on March 11, 2020 the WHO declared the COVID-19 outbreak a pandemic [25].

COVID-19 is a respiratory virus that spreads primarily through droplets generated when an infected person coughs or sneezes, or through droplets of saliva or discharge from the nose. The infected patient’s saliva can be transmitted directly to another person’s eye or if a person rubs their eyes with a virus-contaminated hand [24]. The rapid spread of COVID-19 was expected to overwhelm limited medical equipment and facilities with the sudden increase in the explosive number of patients [26]. Consequently, the fight against COVID-19 requires contact tracing for close contacts of laboratory-confirmed or probable patients. In some countries, these responses were compulsory, while others implemented a voluntary system. Our study compares the cases of France and South Korea, with special focus on the South Korean government’s approaches in seeking the participation of its citizens.

A. Korean Government’s Approach

At first, the South Korean government did not respond appropriately by not knowing the precise nature of the COVID-19 pandemic. The initial optimism was based on confidence that Korea’s medical capabilities could handle any major public health challenges. Additionally, how to assess asymptomatic patients was determined somewhat later. For example, a Chinese woman who arrived from Wuhan on January 20, 2020 was identified as the first confirmed case. Until then, foreign tourists without fever were free to enter Korea, and there was not yet any serious effort to track asymptomatic patients.

However, upon understanding the significance of asymptomatic patients and the nature of droplet infection, the next task was to identify the pathogens of confirmed patients. Fig. 1 describes the essential elements of the Disease Health Integration System (DHIMS), which collects and uses epidemiological survey data. Local governments conduct tests for epidemiologic investigation. Medical staff at public health centers and diagnostic screening centers follow-up with the confirmed patients. Local governments are responsible for operating screening clinics through large scale drive-through or walk-through testing sites without harvesting virus transmission [27].

FIGURE 1.

FIGURE 1.

Disease health Integrated Management System for COVID-19.

If a person tests positive, then the health or diagnostic center immediately uploads the relevant personal information of the patient to the DHIMS. The health or diagnostic center immediately submits incident reports to the Korean Centers for Disease Control (KCDC). The local government health center also conducts an additional epidemiological investigation. The public safety law requires that confirmed patients disclose their recent movements and identify all contacted persons. The local government examines a confirmed patient’s recent usage information from mobile phones and credit cards and uploads all information about the contacted persons including their name, address, contact information, date of birth, gender, disease name, diagnosis date, age, occupation, place of residence, telephone number, and health status, to the DHIMS. In this way, a national database of epidemiological investigations maintains all the relevant information of the confirmed patient and all contacts.

A diagnostic test is performed immediately for persons with symptoms. According to the severity of the COVID-19 symptoms, the individuals are either self-quarantines or hospitalized. Recent contacts who have no symptoms are quarantined for 14 days from the contact date of the confirmed patient. Self-quarantined individuals are monitored daily at local government call centers. If the additional diagnostic test after 14 days shows that the individual is negative and he/she has no symptoms, then the individual is released.

The Korean government implemented a COVID-19 response system with 3P (Preemptive, Prompt, and Precise) and 3T (Trace, Test, Treat) plus P (Participate) quarantine response model [27]. It used innovative ICT systems such as self-isolation and diagnostic apps, drive-through and walk-through clinics, and mobile phone location information analysis. The Korean government also counted on voluntary participation by citizens to develop additional app capabilities. For example, using these aggregated epidemiological survey databases, real time COVID-19 maps and monitoring apps were developed to benefit society at large.

B. French Government’s Approach

France established Public Health France (PHF) on January 13, 2020 to monitor and respond to the COVID-19 epidemic [28], [29]. PHF’s Crisis Center monitors epidemiological prevention, mobilizes health protection organizations, manages the strategic resources of medical facilities, and offers support services. The PHF conducts daily epidemiological investigations and releases the aggregate details including the area, gender, and age group of COVID-19 patients [30], [31].

The PHF set up a surveillance system to monitor the epidemiological and clinical aspects of COVID-19 using urban medicine, measure the severity of the epidemic and its impact on the medical system, and report the fatality rate. The PHF took active preventative measures to control the spread of COVID-19 with the aim of reducing the risk of transmission by providing warning messages to people in affected areas. In addition, the precautionary measures aimed to help people maintain a better quality of life, even in social isolation.

The PHF also supported active health-related services by operating a remote support system. The PHF allows healthcare professionals (e.g., doctors, nurses, pharmacists, physical therapists, midwives, etc.) and health professionals (managers, supervisors, health facility personnel, and engineers) to be prepared for a request for help from the health center. The French government implemented quarantine measures since March 16, 2020. The PHF monitors the behavioral responses and mental health practices in response to these changes and assesses social anxiety levels. Certainly, the COVID-19 pandemic disrupted the French ways of life and restricted vital economic and social activities. From the early days of the outbreak, the PHF’s main challenge has been how to mobilize citizen participation in the fight against COVID-19.

C. Comparisons of France and South Korea

According to WHO data, the first confirmed case in South Korea was January 20, 2020. In France, the first reported case appeared on January 24, 2020. However, after little more than two months, these two countries showed a marked difference in terms of cumulative number of confirmed cases and total deaths [25]. As Table 1 (as of June 7, 2020) reports, the cumulative total of confirmed cases in Korea is 11,776 and 153,634 in France. The cumulative deaths are 273 and 29,143 for Korea and France, respectively.

TABLE 1. Comparison of COVID-19 Data for Korea and France.

Source Date: June 7, 2020 France South Korea
First Case Jan. 24, 2020 Jan. 20, 2020
Lockdown Mar. 16, 2020 Feb. 18, 2020
Total Confirmed Cases 153,634 11,776
Total Deaths 29,142 273
Population 65,273,512 51,269,183
Aged 65 Older(%) 19.718 13.914
Hospital Beds per Thousand 5.98 12.27

Korea’s population is 51,269,183, and France’s population is 65,273,512 as of June 7, 2020 [25], [32]. In France, 20% of the population is over the age of 65, while it is about 14% in Korea, indicating that France has many elderly people. In addition, the number of beds per 1,000 people is 5.98 in France and 12.27 in Korea. In general, mortality is closely related to the number of hospital beds and the elderly population [33], [34]. Therefore, when comparing the hospital bed and proportion of the elderly population, more deaths should be more likely in Korea than in France. Both countries encouraged their citizens to join the fight against COVID-19. Even so, France has relatively more fatalities than Korea. These differences deserve careful analysis of other preventive measures. In the next section, we examine the impact of the epidemiological investigation database and the ICT technology usage in Korea.

III. Security of the Korean Response System

It is beyond the scope of this study to describe the development of the Korean government’s quarantine system processes and its operational mechanisms fully. For the purpose of this research, we applied available response guidelines released by the Korean government and explored other documents about the quarantine system [35], [36].

A. Threat Analysis Using the Stride Threat Model

We evaluated security by applying the STRIDE threat model and examined the dynamic investigation data input and output of the DHIMS [27], [37].

Fig. 2 shows the sequence of on-line and off-line data collection, DHIMS storage, and third-party access. Potential data vulnerability spots are noted () in the process linkage sequences. Threats to data integrity occur in several ways. Despite Korea’s effective response to COVID-19 using epidemiological survey data, the entire process also contains potential privacy violations.

FIGURE 2.

FIGURE 2.

Potential data vulnerabilities in the system.

Identity Spoofing: The appropriate security level of the DHIMS system requires identity safeguarding and restricting access to epidemiological investigation data. After performing the basic authentication operation procedures, the relevant medical personnel, epidemiologists, government agencies, or civilians (i.e., third parties) are allowed to access the epidemiological investigation database. Identity spoofing; that is, misusing stolen identity data, is the most prevalent security risk attack.

Data Tampering: The on-line/off-line epidemiological data collection methods involve extensive personal information: name, address, contact information, gender, age, and phone number of the confirmed patient / all contacted. The DHIMS does not automatically de-identify such epidemiological survey data. During the data entry process, medical personnel or epidemiologists may make mistakes or arbitrarily change some of personal information content.

Repudiation: Because a legitimate user has access to the input and output of epidemiological survey data from the DHIMS, there must be sufficient correcting and checking procedures in the processing data operation. For example, what if the epidemiological investigation results in an offline state do not always exactly match the epidemiological data entered in an online state? Therefore, a repudiation option is necessary to ensure the integrity of the epidemiological investigation data.

Information Disclosure: The retention period for epidemiological data in DHIMS is permanent or semi-permanent. If the DHIMS has solid system security, then we can assume that all personal information is safe. However, when a third party requests a particular set of epidemiological investigation data, the DHIMS is supposed to conduct a de-identification process and offer specific numbers instead of names [37]. However, in the course of various information disclosures, an individual’s privacy might not always be well-respected.

Denial of Service/Elevation of Privilege: What might be problematic is the fact that these epidemiological investigation data have a legally permanent or semi-permanent retention period [37]. The DHIMS quality control measures require an application of relevant parameters (e.g., proper authorization and examination of usage patterns). Without the full operation of strict safeguarding measures when issuing permission or denial of personal information access, serous privacy risk concerns remain.

Table 2 summarizes the various types of threat and risk levels according to the DHIMS system access level.

TABLE 2. Threat Type and Threat Level.

Threat Type Threat Level
Identity Spoofing System Access Level
Data Tampering Input of epidemiological investigation data: Medical personnel or epidemiologists can make any change
Repudiation System Access Level
Information Disclosure System Access Level Epidemiological investigation data: privacy data, raw data Providing epidemiological survey data to the government and the private sector
Denial of Service System Access Level
Elevation of Privilege System Access Level

B. Personal Privacy vs. Public Safety

The Korean government disclosed the COVID-19 confirmatory movement paths and the addresses of quarantined buildings and enforced two weeks of self-containment for all confirmed patients and their contacts. In the early days of the epidemic, COVID-19 maps tracked the movements of these individuals, thus raising awareness of many people in affected areas.

In the digital age, balancing public safety and personal privacy is still enormously challenging [38][40]. With the rapid spread of COVID-19, unidentified aggregate information has little value. Public safety requires the “right to know” about the status of infection. Individuals may waive their privacy rights for public safety when it requires informing people about relevant COVID-19 infection information. The question is, “For legitimate public safety purposes, how do government authorities rightfully use personal information?”

C. Example of Big Data Use in the COVID-19 Pandemic

From the early stage of the outbreak, the Korean government collected detailed personal information about the confirmed patients. Using these data (e.g., credit cards, phone number, and address), investigators could specify the paths of infection, conduct disaster prevention, and implement self-containment measures of all contacts. Such active follow-up methods had a considerable success.

On February 18, 2020, Korea had its 31st confirmed patient from the Shincheonji church in the Daegu area. With the sudden increase in confirmed patients among Shincheonji church members, the Korean government changed its approach and implemented more aggressive follow-up measures [27]. Shincheonji church, as a new religious movement, employ somewhat controversial elements in their recruitment of new members and the education of its existing members. In particular, their regular mass meeting often occurs in an enormous, enclosed hall. Hundreds of the church’s leaders attended their international missionary outreach gathering in Wuhan, China and returned to Korea in January 2020. In the meantime, the number of confirmed patients increased explosively—up to 7,513 on March 10, 2020 [41][43].

Considering the rapid virus transmission among the church members, the Korean government took aggressive action. At the government’s request, the Shincheonji Church provided the social security and phone numbers of its members. Local governments called the church members in their region, looked for symptoms, and conducted COVID-19 tests. The Shincheonji church ledger has more than 200,000 people. Thus, nearly all the church’s members (about 212,000) were contacted and examined. The Korean government used this set of big data to prevent the COVID-19 pandemic. With the use of this data and follow-up testing, the government effectively contained one of the main sources of the widespread outbreak.

Fig. 3 shows a comparison of the cumulative deaths in Korea and France. The number of deaths before and after the COVID-19 pandemic, declared on March 11, shows a sharp difference. As we discussed in the case of Shincheonji church, Korea’s aggressive and extensive use of personal information made a significant difference. The question is, “What is the proper way to use personal information, even in this pandemic?” Here, we consider the value of using de-identified information.

FIGURE 3.

FIGURE 3.

Comparison of cumulative deaths in South Korea and France [44].

D. De-Identification in Epidemiological Investigations

As a proactive measure to contain and prevent the pandemic, the Korean government used epidemiological data through ICT. Medical testing equipment expedited massive COVID-19 testing, which was instrumental in reducing mortality. It is a public safety imperative to use personal information to control and prevent the spread of a pandemic. Managing personal information stored in big data sets requires appropriate privacy protection measures. Privacy violation is related to the use of identifiable personal information. Therefore, an effective safeguard of personal privacy requires the use of non-identifiable personal information. The right type of technological support is essential for such de-identification options.

In the United States, the HIPPA set national standards for the protection of an individual’s medical records and personal health information. It applies to health plans, health care information centers, and health care providers that transmit any health care transactions electronically. This rule requires appropriate safeguards to protect the privacy of personal health information, sets limits, and specifies the conditions for the use and disclosure of such information without patient consent and approval [9], [45].

However, the Korean government uses identifiable personal information with limited restrictions, potentially leading to serious violations of the privacy of patients and their contacts. Securing personal information for quarantine measures is appropriate. With respect to personal privacy, it is important to use the information gathered for the specific intended purpose only. Using identifiable personal information for any other purpose is a breach of confidence and trust. Moreover, the legal provision of keeping quarantine investigation data either permanently or semi-permanently is not reasonable at all. Requiring the de-identification of personal information and rapid-deployment-relevant technology is an urgent need [46].

IV. Adaptive Epidemiological Investigations

The purpose of conducting epidemiological investigations is to understand the nature of an epidemic and determine how to control the spread of infectious diseases for public safety [47]. However, public safety does not justify privacy infringement. In this section, we discuss the practical steps epidemiological investigations can take to achieve a balance between privacy and public health.

A. Classical Trade-Off Between Personal Privacy and Public Safety

The HIPAA’s privacy rules propose two approaches to the de-identification of personal health information: the safe harbor method and the expert determination method [45]. The safe harbor method deletes 18 personal identification variables such as name, social security number, contact information, IP address, fingerprints, photographs, and detailed address. The method of using experts is to process personal information using non-identifying algorithms.

The release and forget model, the data use agreement (DUA) model, and the enclave model are all useful to achieve effective control in data storage and usage processes. The general pre-sale model is to release unidentified personal information to the public by posting data online. A DUA establishes sharing rules between research collaborators who are covered entities under the HIPAA privacy rule. Only intended recipients can use certain information in a limited data set. The closed room model maintains a safe analytic environment that restricts unauthorized access and the export of personal information in its original form. It is a physical and technical control method to respond and export [48].

It is often challenging to enhance the scientific utilization value of data collected with de-identified personal information. An increasing level of de-identification is negatively related to the quality of the data and the precision of the research results. Conversely, higher data quality and outcome precision require lower levels of de-identification. A greater level of personal identification is related to a higher possibility of privacy infringement [49].

Therefore, individual researchers aiming to achieve more precise analysis results may prefer to use the original data, which contains identifiable personal information. On the other hand, reputable institutions satisfy personal privacy requirements by ensuring the anonymity of the data.

B. Balancing Personal Privacy and Public Safety

There are diverse approaches to data de-identification. In general, methods to determine the level of de-identification of personal information are known [48]. The National Institute of Standards and Technology (NIST) proposes a method determined by an expert and a safe hopper method for removing multiple identifiers [50], [51]. In recent years, differential privacy technology that adds noise to personal information has been attracting attention as a way to increase privacy in big data analysis [52], [53]. This differential privacy technique is a de-identification method that performs a kind of pseudonymization process.

With widely available de-identification technologies, it is difficult to prevent individuals from being re-identified from de-identification measures. Researchers at the Imperial College London, UK, conducted experiments with published data from the United States, Turkey, and other countries, and found certain attributes accurately even by using de-identified data [54]. Their machine learning model could identify individuals with 99.98% accuracy from anonymized data using only 15 demographic attributes (age, gender, marital status, etc.). This research team suggests a paradigm shift: “We need to de-identify, then move on. Anonymity is not a property of the data set. It depends on how the person who writes it uses it.” In other words, what matters is not anonymizing, but designing and organizing data to be useful and meaningful.

So then, what are the alternatives? It is time to move from the idea of de-identification to the application of appropriate technologies. The aim is to strike a balance between the public use of data and personal privacy [55], [56]. Technologies such as secure multi-party computation and homomorphic encryption are emerging. More innovations are certainly in progress in the post-COVID-19 world of new big data technologies and ICT applications [57], [58].

The development of these new technologies can increase our options when dealing with infectious diseases. It is imperative to balance personal privacy and public safety, even in the context of COVID-19. Personal information with individual consent may be used for specific research purposes.

C. The Need for an Index to Balance Personal Privacy and Public Safety

There has been serious debate over the value priorities of the epidemiological investigation. Healthcare policymakers are more likely to lean toward public safety goals. On the other hand, safeguarding personal privacy is important from the individual rights perspective. In this context, developing an effective mechanism for balancing public safety and personal privacy is important and timely. We present an index measure for balancing criteria. Our study provides a helpful practical tool in epidemiological investigations.

D. COVID Index for Epidemiological Investigation

By applying the concept of DREAD modeling in security engineering, we propose the COVID index as a method to balance public health and privacy in epidemiological investigations [35]. This COVID model uses five parameters: collective infection, outbreak intensity, viral tiler, infrastructure of medical faculties (e.g. number of medical beds per million people), and death rates (or fatality rate).

Table 3 illustrates how adaptive epidemiological investigations may use the COVID index. Here, C represents collective infection, O represents the outbreak intensity, and V represents the viral propagation power. Here, the value indicates the minimum concentration at which the virus infects the cell. I represents the level of medical infrastructure. D represents the mortality rate of the virus. The COVID index can be calculated as follows:

D.

TABLE 3. COVID Index for Intelligent Epidemiological Investigations.

Parameter Low High
C (Collective infection) 0 5
O (Outbreak intensity) 0 5
V (Viral tiler) 0 5
I (Infrastructure of medical faculties) 0 5
D (Death rates) 0 5

Values from 0 (low) to 5 (high) are assigned to each item. The values of each item are summed according to Equation 1, and the COVID index is determined as the average value of the results. The sum with be a value from 0 to 25, and the COVID index will therefore be a value 0, 1, 2, 3, 4, or 5. A high COVID index suggests a significant risk of the virus’s propagation power and public health and an urgent need to investigate the epidemiology. In this case, aggressive epidemiological investigations should be conducted by collecting original data. Aggressive epidemiological investigations minimize the incidence of additional confirmed patients from contact and suspected patients [59], [60]. Quarantine measures can rapidly contain a virus. Thus, deploying the available medical resources has the maximum prevention effect.

If the COVID index is greater than or equal to 2, then the epidemiological investigation should focus on collecting and using de-identified data. On the other hand, for a COVID index of either 0 or 1, researchers should collect and use encrypted data instead.

E. Suggestions to Strengthen Privacy in Epidemiological Investigations

The primary purpose of the epidemiological investigation is to minimize contact with a confirmed patient. Thus, isolating individuals that test positive for a disease is imperative to prevent the occurrence and spread of infectious diseases. Here, we suggest several practical suggestions to enhance security in the epidemiological investigations.

First, investigators should be required to obtain a personal consent forms and use personal information within a specific period. In the early breakout period of COVID-19, personal information was often collected without a proper personal consent process. Later, a mandatory requirement to specify the data storage period and usage patterns of personal information was put in place. If proper consent forms are not obtained, then the personal information collection process should stop. All personal information stored in the database should include the entry time and expiration date. The investigation system should automatically delete epidemiological survey data after the expiration date. Further steps may also be taken to remove personal information completely from other databases and thus guarantee personal privacy [61].

Second, we should explore other options to use identifiable personal information. What if de-identification is not practical for research purposes? Personal information is regarded as similar to the copyright concept. For the sale of any products with copyright, a certain amount of money is set aside to compensate the copyright holder. Similarly, it is plausible to compensate each individual for the use of their personal information for specific research purposes.

Third, we should address de-identification technology. An individual from the medical field or an epidemiologist may apply de-identification technology when storing personal information. When the required information is collected through off-line systems and then uploaded to a database, then the individual under investigation should be notified to check the accuracy and provide consent. Afterward, the offline information should be destroyed immediately and the individual should be notified of the destruction. Epidemiologists should do the same when they apply de-identification technology to store personal information collected online.

Fourth, researchers should establish conditions for third party access. Any personal information provided to a third party should be made available in the form of non-identifying numbers or symbols. In case a third party need to use identified personal information, they should require personal consent.

Fifth, researchers should design an operating system for personal privacy. Google and Apple recently released a tracking system with privacy features [62], [63]. Other scholars also introduced systems that encrypt data to ensure privacy in applications [64], [65]. These options offer additional safeguards for ensuring personal privacy.

Adaptive epidemiological surveys may still contain human errors in the course of using different types of technologies, including artificial intelligence (AI)-based epidemiological investigation systems. Implementing the suggestions above should aim to improve personal privacy in epidemiological investigations. In addition, our proposed COVID index can provide a basis for epidemiological investigations to support efforts to balance personal privacy and public safety.

F. Improving the Integrity of Offline Data in Epidemiological Investigations

People issues are too often related to data integrity and information quality. In epidemiological investigations, offline information gathering raises questions about the reliability. Incorrect information obtained from interviews with patients may lead to wrong assessment and evaluation about quarantine decisions. Therefore, it is important to check the quality and assure the integrity of offline epidemiological investigations. Specific security measures we propose are to strengthen an epidemiological investigation system. It is to cross-check the accuracy of offline information in real time using other online information sources (e.g., usage history of credit cards, bus and subway transportation cards). This will enhance the integrity of data gathering process. It will also prevent the rapid spread of infectious diseases through monitoring of the history of patients contacts and taking additional preventive measures for all those affected.

V. Conclusion

In the COVID-19 context, the Korean government actively used personal information and achieved fairly successful public safety outcomes. However, that is only part of the whole story. The extensive use of personal information may also negatively impact personal privacy. Therefore, practical safeguard measures, including clear communication of the scope of public disclosure and the de-identification of personal information are required. This paper examined how to implement personal consent procedures and the appropriate use of big data. Even in a devastating pandemic like COVID-19, balancing personal privacy and public safety is still very important. Future research may explore how to prepare for other pandemic outbreaks by combining the capabilities of governmental leadership, technological innovation, big data use, and societal cooperation. However, such aggressive epidemic control measures involve personal privacy concerns. Further investigations should consider cultural issues related to privacy and public safety in different national contexts.

Note of Appreciation

Authors of this article wish to express our deepest gratitude to all the dedicated medical practitioners and numerous patients worldwide who are at the frontline in the battle against COVID-19.

Biographies

graphic file with name ahn-3025971.gif

Na Young Ahn received the B.S. and M.S. degrees from the Department of Electrical Engineering, Korea University, South Korea, and the Ph.D. degree in cyber security. He has been a Patent Engineer at patent and law firms since 2005. He is currently a Postdoctoral Researcher with the Institute of Cyber Security and Privacy, Korea University. His articles have been published in journals including IEEE Access and Ad hoc and Sensor Wireless Networks. His research interests include physical-layer security in vehicular communications, biometric authentication, PoN based blockchain, and anti-forensics in flash memories.

graphic file with name park-3025971.gif

Jun Eun Park graduated from the Korea University College of Medicine in 1991, where he completed an Internship. From 1994 to early 1999, he completed Resident Course at the Asan Medical Center Hospital, Seoul. After working with the Dankook University Hospital until 2003, he has served as a Professor of pediatrics with the Ajou University School of Medicine from 2003 to mid-2020. He has served as the Educational Director for the Korean Society of Pediatric Hematologic Oncology (KSPHO) from September 2015 to mid-2020 and from August 2017 to mid-2020, and also served the Wilms Oncology Subcommittee for the Korean Pediatric Hematologic Oncology Group (KPHOG), from 2017 to 2019. Since July 2019, he has been the Chairman of the Korean Society of Pediatric Neuro-Oncology (KSPNO). He is currently a Medical Doctor (M.D.) majoring in pediatric hematology-oncology and hematopoietic stem cell transplantation. He is also a Professor of pediatrics with the Korea University College of Medicine.

graphic file with name lee-3025971.gif

Dong Hoon Lee (Member, IEEE) received the B.S. degree in economics from Korea University, Seoul, South Korea, in 1985, and the M.S. and Ph.D. degrees in computer science from the University of Oklahoma, Norman, OK, USA, in 1988 and 1992, respectively. Since 1993, he has been with the Faculty of Computer Science and Information Security, Korea University. His research interests include the design and analysis of cryptographic protocols in key agreement, encryption, signatures, embedded device security, and privacy-enhancing technology.

graphic file with name hong-3025971.gif

Paul C. Hong received the B.A. degree in economics from Yonsei University, South Korea, the M.A. degree in economics and the M.B.A. degree from Bowling Green State University, Bowling Green, OH, USA, and the Ph.D. degree in manufacturing management and engineering from The University of Toledo, Toledo, OH, USA. He is currently a Distinguished University Professor of Global Supply Chain Management and Asian Studies with The University of Toledo. His articles have been published extensively in journals, including the Journal of Operations Management, Journal of Supply Chain Management, International Journal of Production Research, International Journal of Production Economics, Journal of Engineering and Technology Management, British Journal of Educational Technology, and European Management Journal. His recent books include Rising Asia and American Hegemony (Springer, 2020) and Creative Innovative Firms (Springer, 2019). His research interests include global supply chain management, entrepreneurial innovation, and the interfaces of ToP and BoP.

Contributor Information

Dong Hoon Lee, Email: donghlee@korea.ac.kr.

Paul C. Hong, Email: paul.hong@utoledo.edu.

References

  • [1].Ienca M. and Vayena E., “On the responsible use of digital data to tackle the COVID-19 pandemic,” Nature Med., vol. 26, pp. 463–464, May 2020, doi: 10.1038/s41591-020-0832-5. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [2].Mittelstadt B., Benzler J., Engelmann L., Prainsack B., and Vayena E., “Is there a duty to participate in digital epidemiology?” Life Sci., Soc. Policy, vol. 14, no. 1, p. 9, Dec. 2018, doi: 10.1186/s40504-018-0074-1. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [3].Park A. and Conway M., “Tracking health related discussions on reddit for public health applications,” in Proc. Annu. Symp., 2017, pp. 1362–1371, 2018. [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5977623/ [PMC free article] [PubMed] [Google Scholar]
  • [4].Rothman K. J., “The epidemiologist’s lament,” Amer. J Public Health, vol. 71, no. 12, pp. 1309–1311, 1981. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [5].Hershey N., “Putting the lamentations of epidemiologists in perspective.,” Amer. J. Public Health, vol. 72, no. 10, pp. 1155–1157, Oct. 1982. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [6].Beebe G. W., “Long-term follow-up is a problem,” Am. J. Public Health, vol. 73, no. 3, pp. 245–246, 1983. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [7].Komatsu Y., “Public health research ethics: Clinical registries and informed consent,” Univ. North Carolina at Chapel Hill, Chapel Hill, NC, USA, Tehc. Rep., 2010, doi: 10.17615/nkn6-2p77. [DOI] [Google Scholar]
  • [8].US Dept of Health and Human Services. (2010). Tracking Healthy People 2010. [Online]. Available: https://www.cdc.gov/nchs/healthy_people/hp2010/hp2010_thp.htm
  • [9].Wartenberg D. and Thompson W. D., “Privacy versus public health: The impact of current confidentiality rules,” Amer. J. Public Health, vol. 100, no. 3, pp. 407–412, Mar. 2010, doi: 10.2105/AJPH.2009.166249. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [10].Han Q., Lin Q., Jin S., and You L., “Coronavirus 2019-nCoV: A brief perspective from the front line,” J. Infection, vol. 80, no. 4, pp. 373–377, Apr. 2020. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [11].Hellewell J., Abbott S., Gimma A., Bosse N. I., Jarvis C. I., Russell T. W., Munday J. D., Kucharski A. J., and Edmunds W. J., “Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts,” Lancet Glob. Health, vol. 8, pp. 488–496, Oct. 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214109X20300747 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [12].Babic B., Gerke S., Evgeniou T., and Cohen I. G., “Algorithms on regulatory lockdown in medicine,” Science, vol. 366, no. 6470, pp. 1202–1204, Dec. 2019, doi: 10.1126/science.aay9547. [DOI] [PubMed] [Google Scholar]
  • [13].Nishiura H., Linton N. M., and Akhmetzhanov A. R., “Serial interval of novel coronavirus (COVID-19) infections,” Int. J. Infectious Diseases, vol. 93, pp. 284–286, Apr. 2020, doi: 10.1016/j.ijid.2020.02.060. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [14].Sohrabi C., Alsafi Z., O’Neill N., Khan M., Kerwan A., Al-Jabir A., Iosifidis C., and Agha R., “World health organization declares global emergency: A review of the 2019 novel coronavirus (COVID-19),” Int. J. Surg., vol. 76, pp. 71–76, Apr. 2020, doi: 10.1016/j.ijsu.2020.02.034. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [15].Schwartz J., King C.-C., and Yen M.-Y., “Protecting healthcare workers during the coronavirus disease 2019 (COVID-19) outbreak: Lessons from Taiwan’s severe acute respiratory syndrome response,” Clin. Infectious Diseases, vol. 71, no. 15, pp. 858–860, Jul. 2020, doi: 10.1093/cid/ciaa255. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [16].Tay M. Z., Poh C. M., Rénia L., MacAry P. A., and Ng L. F. P., “The trinity of COVID-19: Immunity, inflammation and intervention,” Nature Rev. Immunol., vol. 20, no. 6, pp. 363–374, Jun. 2020, doi: 10.1038/s41577-020-0311-8. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [17].Chen C.-M., Jyan H.-W., Chien S.-C., Jen H.-H., Hsu C.-Y., Lee P.-C., Lee C.-F., Yang Y.-T., Chen M.-Y., Chen L.-S., Chen H.-H., and Chan C.-C., “Containing COVID-19 among 627,386 persons in contact with the diamond princess cruise ship passengers who disembarked in taiwan: Big data analytics,” J. Med. Internet Res., vol. 22, no. 5, May 2020, Art. no. e19540, doi: 10.2196/19540. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [18].Rothan H. A. and Byrareddy S. N., “The epidemiology and pathogenesis of coronavirus disease (COVID-19) outbreak,” J. Autoimmunity, vol. 109, May 2020, Art. no.102433, doi: 10.1016/j.jaut.2020.102433. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [19].Hoseinpour Dehkordi A., Alizadeh M., Derakhshan P., Babazadeh P., and Jahandideh A., “Understanding epidemic data and statistics: A case study of COVID–19,” J. Med. Virology, vol. 92, no. 7, pp. 868–882, Jul. 2020, doi: 10.1002/jmv.25885. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [20].Wang W., Tang J., and Wei F., “Updated understanding of the outbreak of 2019 novel coronavirus (2019–nCoV) in wuhan, China,” J. Med. Virology, vol. 92, no. 4, pp. 441–447, Apr. 2020, doi: 10.1002/jmv.25689. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [21].Zu Z. Y., Jiang M. D., Xu P. P., Chen W., Ni Q. Q., Lu G. M., and Zhang L. J., “Coronavirus disease 2019 (COVID-19): A perspective from China,” Radiology, vol. 296, no. 2, pp. 15–25, Aug. 2020, doi: 10.1148/radiol.2020200490. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [22].Zheng N., Du S., Wang J., Zhang H., Cui W., Kang Z., Yang T., Lou B., Chi Y., Long H., Ma M., Yuan Q., Zhang S., Zhang D., Ye F., and Xin J., “Predicting COVID-19 in China using hybrid AI model,” IEEE Trans. Cybern., vol. 50, no. 7, pp. 2891–2904, Jul. 2020, doi: 10.1109/TCYB.2020.2990162. [DOI] [PubMed] [Google Scholar]
  • [23].Al-qaness M. A. A., Ewees A. A., Fan H., and Abd El Aziz M., “Optimization method for forecasting confirmed cases of COVID-19 in China,” J. Clin. Med., vol. 9, no. 3, p. 674, Mar. 2020, doi: 10.3390/jcm9030674. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [24].Lai C.-C., Shih T.-P., Ko W.-C., Tang H.-J., and Hsueh P.-R., “Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) and coronavirus disease-2019 (COVID-19): The epidemic and the challenges,” Int. J. Antimicrobial Agents, vol. 55, no. 3, Mar. 2020, Art. no.105924, doi: 10.1016/j.ijantimicag.2020.105924. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [25].WHO. (2020). COVID-2019 Situation Reports. [Online]. Available: https://www.who.int/emergencies/diseases/novel-coronavirus-2019/situation-reports/
  • [26].Palacios Cruz M., Santos E., Velázquez Cervantes M. A., and León Juárez M., “COVID-19, a worldwide public health emergency,” Revista Clínica Española, Apr. 2020, doi: 10.1016/j.rceng.2020.03.001. [DOI] [PMC free article] [PubMed]
  • [27].(2020). Flattening the Curve on COVID-19. [Online]. Available: http://www.moef.go.kr/com/synap/synapView.do?atchFileId=ATCH_000000000013739&fileSn=2
  • [28].Accessed: Jun. 8, 2020. [Online]. Available: https://en.wikipedia.org/wiki/COVID-19_pandemic_in_France
  • [29].France Imposes 15-Day Lockdown as Part of Emergency Coronavirus Response, The Independent, Londo, U.K., Mar. 2020. [Google Scholar]
  • [30].Government F.. (2020). First Cases of Coronavirus Disease 2019 (COVID-19) in France: Surveillance, Investigations and Control Measures. [Online]. Available: https://www.santepubliquefrance.fr/maladies-et-traumatismes/maladies-et-infections-respiratoires/infection-a-coronavirus/documents/article/first-cases-of-coronavirus-disease-2019-covid-19-in-france-surveillance-investigations-and-control-measures-january-2020 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [31].(2020). Surveillance Epidemiologique du COVID-19. [Online]. Available: https://www.santepubliquefrance.fr/presse/2020/surveillance-epidemiologique-du-covid-19 [PubMed]
  • [32].Accessed: Jun. 8, 2020. [Online]. Available: https://github.com/owid/covid-19-data/blob/master/public/data/owid-covid-data.xlsx
  • [33].Boccia S., Ricciardi W., and Ioannidis J. P. A., “What other countries can learn from italy during the COVID-19 pandemic,” JAMA Internal Med., vol. 180, no. 7, p. 927, Jul. 2020, doi: 10.1001/jamainternmed.2020.1447. [DOI] [PubMed] [Google Scholar]
  • [34].Onder G., Rezza G., and Brusaferro S., “Case-fatality rate and characteristics of patients dying in relation to COVID-19 in italy,” JAMA, pp. 1775–1776, Mar. 2020, doi: 10.1001/jama.2020.4683. [DOI] [PubMed]
  • [35].Cagnazzo M., Hertlein M., Holz T., and Pohlmann N., “Threat modeling for mobile health systems,” in Proc. IEEE Wireless Commun. Netw. Conf. Workshops (WCNCW), Apr. 2018, pp. 314–319, doi: 10.1109/WCNCW.2018.8369033. [DOI] [Google Scholar]
  • [36].Tseng T. W., Wu C. T., and Lai F., “Threat analysis for wearable health devices and environment monitoring Internet of Things integration system,” IEEE Access, vol. 7, pp. 144983–144994, 2019. [Google Scholar]
  • [37].Accessed: Apr. 29, 2020. [Online]. Available: http://www.cdc.go.kr/npt/biz/npp/nppMain.do
  • [38].Price W. N. and Cohen I. G., “Privacy in the age of medical big data,” Nature Med., vol. 25, no. 1, pp. 37–43, Jan. 2019, doi: 10.1038/s41591-018-0272-7. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [39].Sun Z., Wang Y., Shu M., Liu R., and Zhao H., “Differential privacy for data and model publishing of medical data,” IEEE Access, vol. 7, pp. 152103–152114, 2019. [Google Scholar]
  • [40].Wang L. and Jones R., “Big data, cybersecurity, and challenges in healthcare,” in Proc. SoutheastCon, Huntsville, AL, USA, Apr. 2019, pp. 1–6. [Google Scholar]
  • [41].(2020). Press_Release_(March10)_Afternoon. [Online]. Available: http://ncov.mohw.go.kr/en/tcmBoardView.do?brdId=12&brdGubun=125&dataGubun=&ncvContSeq=1288&contSeq=1288&board_id=&gubun=
  • [42].Shahi P., Tamang P. D., and Rokaya Y. B., “What can other countries learn from South Korea’s COVID-19 responses?” Europasian J. Med. Sci., vol. 2, no. 1, pp. 90–93, May 2020, doi: 10.46405/ejms.v2i1.51. [DOI] [Google Scholar]
  • [43].Ramphul K. and Mejias S. G., “Coronavirus disease: A review of a new threat to public health,” Cureus, Mar. 2020, vol. 12, no. 3, Mar. 2020, Art. no. e7276, doi: 10.7759/cureus.7276. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [44].Roser M., Ritchie H., Ortiz-Ospina E., and Hasell J.. (2020). Coronavirus Pandemic (COVID-19). [Online]. [Online]. Available: https://ourworldindata.org/coronavirus [Google Scholar]
  • [45].Office for Civil Rights. Guidance Regarding Methods for De-Identification of Protected Health Information in Accordance With the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, Washington, DC, USA, 2010. [Google Scholar]
  • [46].Gilbert G. L., Degeling C., and Johnson J., “Communicable disease surveillance ethics in the age of big data and new technology,” Asian Bioethics Rev., vol. 11, no. 2, pp. 173–187, Jun. 2019, doi: 10.1007/s41649-019-00087-1. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [47].Friis R. H. and Sellers T., Epidemiology for Public Health Practice. Burlington, MA, USA: Jones & Bartlett Learning, 2020. [Google Scholar]
  • [48].Garfinkel S. L., De-identification of personal information (NISTIR 8053). Gaithersburg, MD, USA: NIST, 2015, doi: 10.6028/NIST.IR.8053. [DOI] [Google Scholar]
  • [49].Prasser F., Kohlmayer F., Spengler H., and Kuhn K. A., “A scalable and pragmatic method for the safe sharing of high-quality health data,” IEEE J. Biomed. Health Informat., vol. 22, no. 2, pp. 611–622, Mar. 2018, doi: 10.1109/JBHI.2017.2676880. [DOI] [PubMed] [Google Scholar]
  • [50].Kayaalp M., “Modes of de-identification,” AMIA Annu. Symp. Proc. 2017, vol. 2017, pp. 1044–1050. [PMC free article] [PubMed] [Google Scholar]
  • [51].Kayaalp M., “Patient privacy in the era of big data,” Balkan Med. J., vol. 35, no. 1, pp. 8–17, Jan. 2018, doi: 10.4274/balkanmedj.2017.0966. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [52].Devender M. S. V., Glisson W. B., Benton R., and Grispos G., “Understanding de-identification of healthcare big data,” in Proc. Amer. Conf. Inf. Syst., 2017, pp. 1–8. [Google Scholar]
  • [53].Lee H.-J., Cho S.-H., Seong J.-W., Lee S., and Lee W., “De-identification and privacy issues on bigdata transformation,” in Proc. IEEE Int. Conf. Big Data Smart Comput. (BigComp), Feb. 2020, pp. 514–519, doi: 10.1038/s41467-019-10933-3. [DOI] [Google Scholar]
  • [54].Rocher L., Hendrickx J. M., and Montjoye Y. D., “Estimating the success of re-identifications in incomplete datasets using generative models,” Nature Commun., vol. 10, Jul. 2019, Art. no. 3069, doi: 10.1038/s41467-019-10933-3. [Online]. Available: https://www.nature.com/articles/s41467-019-10933-3 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [55].Mendelson D. and Mendelson D., “Legal protections for personal health information in the age of big data—A proposal for regulatory framework,” Ethics, Med. Public Health, vol. 3, no. 1, pp. 37–55, Jan. 2017, doi: 10.1016/j.jemep.2017.02.005. [DOI] [Google Scholar]
  • [56].Klingler C., Silva D. S., Schuermann C., Reis A. A., Saxena A., and Strech D., “Ethical issues in public health surveillance: A systematic qualitative review,” BMC Public Health, vol. 17, no. 1, p. 295, Dec. 2017, doi: 10.1186/s12889-017-4200-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [57].Shaw R., Kim Y., and Hua J., “Governance, technology and citizen behavior in pandemic: Lessons from COVID-19 in East Asia,” Prog. Disaster Sci., vol. 6, Apr. 2020, Art. no.100090, doi: 10.1016/j.pdisas.2020.100090.S. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [58].Park S., Choi G. J., and Ko H., “Information Technology–based tracing strategy in response to COVID-19 in South Korea—Privacy controversies,” JAMA, vol. 323, no. 21, p. 2129, Jun. 2020, doi: 10.1001/jama.2020.6602. [DOI] [PubMed] [Google Scholar]
  • [59].Cavallo J. J., Donoho D. A., and Forman H. P., “Hospital capacity and operations in the coronavirus disease 2019 (COVID-19) Pandemic—Planning for the nth patient,” JAMA Health Forum, vol. 1, no. 3, Mar. 2020, Art. no. e200345, doi: 10.1001/jamahealthforum.2020.0345. [DOI] [PubMed] [Google Scholar]
  • [60].Hopman J., Allegranzi B., and Mehtar S., “Managing COVID-19 in low- and middle-income countries,” JAMA, vol. 323, no. 16, pp. 1549–1550, doi: 10.1001/jama.2020.4169. [DOI] [PubMed] [Google Scholar]
  • [61].Ahn N.-Y. and Lee D. H., “Schemes for privacy data destruction in a NAND flash memory,” IEEE Access, vol. 7, pp. 181305–181313, 2019, doi: 10.1109/ACCESS.2019.2958628. [DOI] [Google Scholar]
  • [62].Oliver N.et al. , “Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle,” Sci. Adv., vol. 6, no. 23, Jun. 2020, Art. no. eabc0764. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • [63].Apple and Google Partner on COVID-19 Contact Tracing Technology, Apple, Cupertino, CA, USA, 2020. [Google Scholar]
  • [64].Khan J., Li J. P., Ahamad B., Parveen S., Ul Haq A., Khan G. A., and Sangaiah A. K., “SMSH: Secure surveillance mechanism on smart healthcare IoT system with probabilistic image encryption,” IEEE Access, vol. 8, pp. 15747–15767, 2020, doi: 10.1109/ACCESS.2020.2966656. [DOI] [Google Scholar]
  • [65].Khatoon S., Rahman S. M. M., Alrubaian M., and Alamri A., “Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment,” IEEE Access, vol. 7, pp. 47962–47971, 2019, doi: 10.1109/ACCESS.2019.2909556. [DOI] [Google Scholar]

Articles from Ieee Access are provided here courtesy of Institute of Electrical and Electronics Engineers

RESOURCES