Author: Amour, Lamine; Quiniou, Matthieu; Tucci-Piergiovanni, Sara; Bourak, Hichem; Souihi, Sami
Title: uTakeCare: unlock full decentralization of personal data for a respectful decontainment in the context of COVID-19: toward a digitally empowered anonymous citizenship Cord-id: cdbrcv7c Document date: 2021_5_21
ID: cdbrcv7c
Snippet: To control coronavirus disease 2019 (COVID-19), most countries have opted for a containment policy. When a decision of decontainment has to be taken, a question emerges regarding the digital strategy to adopt: Should we track citizens? All of them or only persons who contracted COVID-19? Should we take measures to protect elderly people or people suffering from co-morbidities? Many applications and approaches have been proposed to ensure public safety in the context of COVID-19. In this chapter,
Document: To control coronavirus disease 2019 (COVID-19), most countries have opted for a containment policy. When a decision of decontainment has to be taken, a question emerges regarding the digital strategy to adopt: Should we track citizens? All of them or only persons who contracted COVID-19? Should we take measures to protect elderly people or people suffering from co-morbidities? Many applications and approaches have been proposed to ensure public safety in the context of COVID-19. In this chapter, we will start by making an inventory of these applications, discuss strategies and technologies adopted, and categorize them. Thereafter we will present an approach consisting in calculating a vulnerability score to propose a solution for protecting people at risk. Then, we will detail the architecture of “uTakeCare,†an open-source application that we have implemented, as well as the method used to calculate the vulnerability score. This method is based on a belief function theory and machine learning techniques. Finally, we will discuss the ethical and legal issues of this application and the methods to be used to address them (e.g., zero-knowledge proof, smart contracts, etc.) as a way to complement general data protection regulation (roadmap to develop personal data) requirements with ethics-by-design and self-sovereign identity solutions.
Search related documents:
Co phrase search for related documents- absolute error and additional approach: 1
- absolute error and additional source: 1
- absolute error and logistic model: 1
- absolute error and logistic regression: 1, 2, 3, 4
- absolute error and machine learning: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58
Co phrase search for related documents, hyperlinks ordered by date