<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i10e32328</article-id>
      <article-id pub-id-type="pmid">34543228</article-id>
      <article-id pub-id-type="doi">10.2196/32328</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Ethics, Integrity, and Retributions of Digital Detection Surveillance Systems for Infectious Diseases: Systematic Literature Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Basch</surname>
            <given-names>Corey</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Igboeli</surname>
            <given-names>Okechukwu</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Benis</surname>
            <given-names>Arriel</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Benítez-Andrades</surname>
            <given-names>José Alberto</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Zhao</surname>
            <given-names>Ivy Y</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4597-8929</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Ma</surname>
            <given-names>Ye Xuan</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7609-2309</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Yu</surname>
            <given-names>Man Wai Cecilia</given-names>
          </name>
          <degrees>MBBS</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3413-8441</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Jia</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5357-2163</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Dong</surname>
            <given-names>Wei Nan</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3541-1649</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Pang</surname>
            <given-names>Qin</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6675-4006</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Lu</surname>
            <given-names>Xiao Qin</given-names>
          </name>
          <degrees>MM</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3453-9373</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author">
          <name name-style="western">
            <surname>Molassiotis</surname>
            <given-names>Alex</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6351-9991</ext-link>
        </contrib>
        <contrib id="contrib9" contrib-type="author">
          <name name-style="western">
            <surname>Holroyd</surname>
            <given-names>Eleanor</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2993-8823</ext-link>
        </contrib>
        <contrib id="contrib10" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Wong</surname>
            <given-names>Chi Wai William</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Department of Family Medicine and Primary Care</institution>
            <institution>Li Ka Shing Faculty of Medicine</institution>
            <institution>The University of Hong Kong</institution>
            <addr-line>3/F,  Ap Lei Chau Clinic</addr-line>
            <addr-line>161 Main Street, Ap Lei Chau</addr-line>
            <addr-line>Hong Kong SAR</addr-line>
            <country>China</country>
            <phone>86 2518 5657</phone>
            <email>wongwcw@hku.hk</email>
          </address>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2540-4055</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>WHO Collaborating Centre for Community Health Services</institution>
        <institution>School of Nursing</institution>
        <institution>The Hong Kong Polytechnic University</institution>
        <addr-line>Hong Kong SAR</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Family Medicine and Primary Care</institution>
        <institution>Li Ka Shing Faculty of Medicine</institution>
        <institution>The University of Hong Kong</institution>
        <addr-line>Hong Kong SAR</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Shenzhen Institute of Advanced Technology</institution>
        <institution>Chinese Academy of Sciences</institution>
        <addr-line>Shenzhen</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Information Technology</institution>
        <institution>University of Hong Kong-Shenzhen Hospital</institution>
        <addr-line>Shenzhen</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>School of General Practice and Continuing Education</institution>
        <institution>Capital Medical University</institution>
        <addr-line>Beijing</addr-line>
        <country>China</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>School of Clinical Sciences</institution>
        <institution>Auckland University of Technology</institution>
        <addr-line>Auckland</addr-line>
        <country>New Zealand</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Department of Family Medicine and Primary Care</institution>
        <institution>University of Hong Kong-Shenzhen Hospital</institution>
        <addr-line>Shenzhen</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Chi Wai William Wong <email>wongwcw@hku.hk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>10</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>10</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>10</issue>
      <elocation-id>e32328</elocation-id>
      <history>
        <date date-type="received">
          <day>23</day>
          <month>7</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>3</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>14</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>14</day>
          <month>9</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Ivy Y Zhao, Ye Xuan Ma, Man Wai Cecilia Yu, Jia Liu, Wei Nan Dong, Qin Pang, Xiao Qin Lu, Alex Molassiotis, Eleanor Holroyd, Chi Wai William Wong. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 20.10.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/10/e32328" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The COVID-19 pandemic has increased the importance of the deployment of digital detection surveillance systems to support early warning and monitoring of infectious diseases. These opportunities create a “double-edge sword,” as the ethical governance of such approaches often lags behind technological achievements.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim was to investigate ethical issues identified from utilizing artificial intelligence–augmented surveillance or early warning systems to monitor and detect common or novel infectious disease outbreaks.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>In a number of databases, we searched relevant articles that addressed ethical issues of using artificial intelligence, digital surveillance systems, early warning systems, and/or big data analytics technology for detecting, monitoring, or tracing infectious diseases according to PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, and further identified and analyzed them with a theoretical framework.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>This systematic review identified 29 articles presented in 6 major themes clustered under individual, organizational, and societal levels, including awareness of implementing digital surveillance, digital integrity, trust, privacy and confidentiality, civil rights, and governance. While these measures were understandable during a pandemic, the public had concerns about receiving inadequate information; unclear governance frameworks; and lack of privacy protection, data integrity, and autonomy when utilizing infectious disease digital surveillance. The barriers to engagement could widen existing health care disparities or digital divides by underrepresenting vulnerable and at-risk populations, and patients’ highly sensitive data, such as their movements and contacts, could be exposed to outside sources, impinging significantly upon basic human and civil rights.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Our findings inform ethical considerations for service delivery models for medical practitioners and policymakers involved in the use of digital surveillance for infectious disease spread, and provide a basis for a global governance structure.</p>
        </sec>
        <sec sec-type="trial registration">
          <title>Trial Registration</title>
          <p>PROSPERO CRD42021259180; https://www.crd.york.ac.uk/prospero/display_record.php?RecordID=259180</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>artificial intelligence</kwd>
        <kwd>electronic medical records</kwd>
        <kwd>ethics</kwd>
        <kwd>infectious diseases</kwd>
        <kwd>machine learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>In the wake of the global COVID-19 outbreak, there is growing pressure to improve our existing practice in the prevention and ongoing monitoring of emerging infectious diseases and the adoption of targeted interventions for emerging infectious diseases. Current infectious disease surveillance systems in most countries are remarkably similar. Once a case is clinically suspected and confirmed, there are multiple levels of reporting [<xref ref-type="bibr" rid="ref1">1</xref>]. Then, the accumulated information from local institutions is aggregated, processed, and defined at the population level before actions are subsequently disseminated through the system from a “top-down” approach. The existing process carries an inevitable time lag that can result in both reduced effectiveness for responsive public health interventions [<xref ref-type="bibr" rid="ref2">2</xref>] and opportunities for doctors and patients to negotiate reporting, which can have catastrophic results, as had been observed in the early COVID-19 outbreak in China [<xref ref-type="bibr" rid="ref3">3</xref>] and the Ebola outbreak in West Africa [<xref ref-type="bibr" rid="ref4">4</xref>]. The need for timely data collection or sharing, processing, decision making, and reporting in infectious disease surveillance has been identified as one of the main drivers for introducing artificial intelligence (AI) technology.</p>
      <p>With the establishment of electronic health records (EHRs), big data have been acquired, making it possible to build data-intensive infectious disease surveillance or early warning systems, pre-empt emergency response, and strengthen infection prevention and control. Machine learning (ML) technologies, a multiplying form of AI, has shown considerable potential in tracing the source and detecting potential outbreaks or novel infectious diseases using patients’ EHRs. By utilizing real-time digital data analysis, a fully automated system could be built to transmit, through extraction, structured data and doctors’ medical records in text, while new technologies, such as named entity recognition, would allow extraction of patient-related features from the unstructured text into predefined categories to support future infectious disease monitoring and surveillance [<xref ref-type="bibr" rid="ref5">5</xref>]. Examples of enhanced timeliness resulting from this approach in COVID-19 case tracing have been reported in China and several other Asian counties [<xref ref-type="bibr" rid="ref3">3</xref>]. When AI is being employed for infectious disease control (eg, using mobile phone apps to trace COVID-19 cases), potentially infected patients, their close contacts, and, at times, larger communities can be tracked, tested, and, if necessary, quarantined to prevent further outbreaks.</p>
      <p>Nonetheless, the advantages of big data and ML in infectious disease control need to be weighed against the considerable ethical and legal concerns pertaining to the protections and privacy of individuals and the public in respect to access, use, and sharing of large data sets of patients’ medical records. These kinds of AI interventions raise complex contemporary ethical questions regarding potential misuse of personal information and informed consent that have the potential to infringe on one’s human and civil rights. Furthermore, there is the heightened risk of patients’ personal information being leaked to social media when they have previously been assured of confidentiality and privacy [<xref ref-type="bibr" rid="ref6">6</xref>]. Reidentification of named patients is a major concern when databases are hacked [<xref ref-type="bibr" rid="ref7">7</xref>], and data custodians may sell data for financial gain to pharmaceutical, insurance, or software companies [<xref ref-type="bibr" rid="ref8">8</xref>]. Furthermore, the routine use of big data analytics (BDA) or the ethics and widespread moral implications of ML continue to be vigorously debated around the accuracy of reporting [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>], and the consequences of inaccuracies in the reporting of outbreaks are gaining considerable attention [<xref ref-type="bibr" rid="ref11">11</xref>]. These developments, often in rapid response situations, have sparked issues between optimizing population health outcomes informed by epidemiology and public health, and societal or individual ethical rights and protections that inform human rights and freedom of choice.</p>
      <p>Notwithstanding these debates, BDA is critical for managing communicable disease spread or outbreaks in today’s digital world where consistency in the application of regulations or rules of privacy, confidentiality, transparency, data handling, and security safeguards for ML transmission required to protect individuals’ rights is limited [<xref ref-type="bibr" rid="ref12">12</xref>]. This study set out to examine the ethical issues of using AI and identify an intersection or balance between the protection of individuals’ human rights and patients’ autonomy, and common good for population-based public health outcomes specific to infectious disease control and prevention with the aim of investigating ethical issues identified from utilizing AI-augmented surveillance or early warning systems to monitor and detect common or novel infectious disease outbreaks.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Search Strategy and Selection Criteria</title>
        <p>We searched broad search engines with no time restriction. CINAHL, PubMed, Science Direct, MEDLINE, Google Scholar, and Scopus, as well as legal and sociological databases were searched from database inception to December 8, 2020. Additionally, relevant articles from the documents’ bibliography and from other articles that cited the documents were retrieved. The following search terms and combination of terms were utilized: ethic* OR “data security” OR “data privacy” OR sensitiv* OR confidential* OR anonym* OR “personally identifiable information” OR privacy or “human right*” AND “electronic health records” OR ehr OR “Clinical decision support system” OR cdss OR “Artificial Intelligence” OR ai OR “augmented surveillance” OR surveillance OR “contact tracing” OR “Machine Learning” OR ml OR “deep learning” AND “Infectious Disease” OR “Communicable Diseases.” Prior to the searches, the authors reviewed all search terms. In order to identify all existing literature for this review, we considered all peer-reviewed empirical research articles, review reports, and grey reports. To enhance the rigor of the review, our approach followed the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
      </sec>
      <sec>
        <title>Inclusion and Exclusion Criteria</title>
        <p>There were no language restrictions placed on the literature search. To be included for further review, the collected articles must have addressed the ethical issues of using AI, digital surveillance systems, early warning systems, and/or BDA technology for detecting, monitoring, or tracing specifically infectious diseases.</p>
      </sec>
      <sec>
        <title>Literature Selection</title>
        <p>We selected literature for inclusion in 2 stages to ensure rigor. In the first stage, 2 authors (IYZ and YXM) independently screened the titles and abstracts of all citations for potentially relevant articles. In the second stage, the same 2 authors independently examined the full texts of these papers against prespecified inclusion criteria. Any discrepancies were resolved with input from a third author (EH). Of the 6714 titles and abstracts reviewed, we excluded 6668 articles that did not meet our eligibility criteria, resulting in 46 articles for full-text review. Additionally, 17 articles were excluded because they (1) were not related to digital surveillance systems, (2) did not focus on infectious diseases, or (3) lacked focus on ethical concerns. In all, 29 papers satisfied our eligibility criteria and were included by consensus agreement (<xref rid="figure1" ref-type="fig">Figure 1</xref>).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart of the literature review.</p>
          </caption>
          <graphic xlink:href="jmir_v23i10e32328_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Extraction, Quality Assessment, and Data Analysis</title>
        <p>All authors read and reviewed the 29 articles in order to summarize the approaches, methodologies, samples, and findings. Two authors (IYZ and YXM) undertook literature quality assessment, extracted data from the literature, included them into a spreadsheet, and analyzed the data independently. Discrepancies were resolved, and data were confirmed in several rounds of discussions with other team members. We evaluated study quality and methodological rigor for 5 empirical studies by using the modified mixed-methods appraisal tool (MMAT) [<xref ref-type="bibr" rid="ref14">14</xref>], which was not applicable for the remaining discussion papers. Lower quality scores did not result in exclusion of any articles. However, the findings of articles with lower quality scores were given less weight during data analysis.</p>
        <p>We structured our identified ethical issues using a theoretical framework developed by Asadi et al [<xref ref-type="bibr" rid="ref15">15</xref>], in which key concepts of prior BDA had been identified, defined, and examined using stakeholder theory and discourse ethics [<xref ref-type="bibr" rid="ref16">16</xref>]. Key themes from our review were discussed and summarized, and the gaps in the literature and methodologies were identified.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview and Participant Demographics</title>
        <p>Among the 29 included articles, 2 qualitative studies [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>], 2 quantitative studies [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>], 1 mixed methods study [<xref ref-type="bibr" rid="ref21">21</xref>], and 24 discussion papers were identified (<xref ref-type="table" rid="table1">Table 1</xref>). All of the selected articles were published between the years 2015 and 2021. The 5 empirical studies [<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref21">21</xref>] adopted a combination of focus groups, a Delphi approach, a database digital ethnography, and surveys as research methods, and they were all identified as high quality. Together they included 7331 participants. Of these 5 studies, 1 was conducted in South Korea [<xref ref-type="bibr" rid="ref21">21</xref>] and 4 in Australia [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Four studies [<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>] reported gender ratios and 3 [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>] demonstrated age ranges. Research participants were the general public; policymakers; and experts in infectious diseases, epidemiology, food safety, health informatics systems, and health and technology law.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Summary of ethical issues identified from utilizing digital surveillance systems for infectious diseases.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="130"/>
            <col width="0"/>
            <col width="80"/>
            <col width="0"/>
            <col width="120"/>
            <col width="0"/>
            <col width="120"/>
            <col width="0"/>
            <col width="130"/>
            <col width="0"/>
            <col width="130"/>
            <col width="0"/>
            <col width="110"/>
            <col width="0"/>
            <col width="150"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Article type, and<break/>authors and year</td>
                <td colspan="2">Country</td>
                <td colspan="2">Journal</td>
                <td colspan="2">1. Sampling frame<break/>2. Sample size<break/>3. Age<break/>4. Gender ratio (F:M)<break/>5. Sampling method</td>
                <td colspan="2">Study aim</td>
                <td colspan="2">Context of <break/> studies</td>
                <td colspan="2">Methodology and methods</td>
                <td>Key and relevant findings</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Journal articles (n=5)</bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Degeling et al (2020) [<xref ref-type="bibr" rid="ref17">17</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">BMC Medical Ethics</td>
                <td colspan="2">1. People who had previously volunteered to take part in research and topic-blinded social media advertising on Facebook<break/>2. n=50<break/>3. 18-34 y (n=15); 35-54 y (n=22); and &#62;55 y (n=11)<break/>4. 27:21<break/>5. Random sampling</td>
                <td colspan="2">Examine the public acceptability and ethical concerns of community juries on integration of big data analytics (BDA) into communicable disease control</td>
                <td colspan="2">BDA was perceived as intrusive and a threat to privacy.</td>
                <td colspan="2">Qualitative; deliberative group sessions; Delphi study approach</td>
                <td colspan="2">Almost all jurors supported data linkage for public health research and suggested deidentification practices. Three juries raised several conditions related to system oversight and security being met. One concern was about loss of privacy and mistrust in governments to run secure and effective systems.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kim et al (2021) [<xref ref-type="bibr" rid="ref18">18</xref>]</td>
                <td colspan="2">Korea</td>
                <td colspan="2">Social Science &#38; Medicine</td>
                <td colspan="2">1. Comments from January to May 2020 made by Korean mothers on 15 internet groups called “mom cafes”<break/>2. n=3729<break/>3. N/A<sup>a</sup><break/>4. Female<break/>5. Purposive sampling</td>
                <td colspan="2">Examine how Korean mothers understand morality in the context of COVID-19 contact-tracing surveillance</td>
                <td colspan="2">Korean mothers uploaded COVID-19 patient information on the boards of online groups for discussion.</td>
                <td colspan="2">Qualitative; database digital ethnography; reflexive thematic analysis</td>
                <td colspan="2">Nonmaleficence is the core morality considered by Korean mothers.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Degeling et al (2020) [<xref ref-type="bibr" rid="ref19">19</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">BMJ Open</td>
                <td colspan="2">1. The Australian general population<break/>2. n=2008<break/>3. Median 46 y (18-89 y)<break/>4. 1015:993<break/>5. Purposive sampling</td>
                <td colspan="2">Compare the value of core surveillance system attributes to the Australian public before and during the early stages of the COVID-19 pandemic</td>
                <td colspan="2">New technology raised concerns of privacy disclosure and misuse in the COVID-19 outbreak.</td>
                <td colspan="2">Quantitative; online survey</td>
                <td colspan="2">After the COVID-19 pandemic, participants demonstrated greater preference for a high data security surveillance system for public health.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Thomas et al (2020) [<xref ref-type="bibr" rid="ref20">20</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">JMIR Public Health Surveillance</td>
                <td colspan="2">
                  <list list-type="order">
                    <list-item>
                      <p>Australians (excluding health care professionals or people who had been tested for COVID-19)</p>
                    </list-item>
                    <list-item>
                      <p>n=1500</p>
                    </list-item>
                    <list-item>
                      <p>≥18 y</p>
                    </list-item>
                    <list-item>
                      <p>1:1</p>
                    </list-item>
                    <list-item>
                      <p>Purposive sampling</p>
                    </list-item>
                  </list>
                </td>
                <td colspan="2">Investigate the ethical issues of adopting the Australian government’s COVID safe app</td>
                <td colspan="2">App-based contact tracing for curbing the transmission of COVID-19 needs widespread adoption.</td>
                <td colspan="2">Quantitative; online national survey</td>
                <td colspan="2">Privacy, data storage, and technical functions are ethical issues that hinder contact-tracking apps.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Degeling et al (2019) [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">Health Research Policy and Systems</td>
                <td colspan="2">1. Australian-based policy makers and experts in infectious diseases, epidemiology, food safety, health informatics systems, and health and technology law<break/>2. n=44<break/>3. N/A<break/>4. N/A<break/>5. Purposive sampling</td>
                <td colspan="2">Identify ethical issues in the adoption and effective implementation of a digital surveillance tool</td>
                <td colspan="2">Early detection of infectious disease outbreaks involves lack of social license or ethical and legal considerations.</td>
                <td colspan="2">Mixed method; online survey; framework analysis</td>
                <td colspan="2">Infectious disease monitoring systems raise issues such as personal privacy, forensic risks, potential unintended consequences, and the weakening of public trust.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Reports (n=24)</bold>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td colspan="2">
                  <break/>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Sweeney (2020) [<xref ref-type="bibr" rid="ref22">22</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">Nature Machine Intelligence</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Balance protecting public health with safeguarding civil rights regarding contact-tracing apps</td>
                <td colspan="2">Contact-tracing apps were used in COVID-19 surveillance but were less understood by people.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Contact-tracing apps debate on protecting public health with safeguarding civil rights.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Gilbert et al (2019) [<xref ref-type="bibr" rid="ref6">6</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">Asian Bioethics Review</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Highlight the urgency of having an ethical framework to guide the use of new technologies in communicable disease surveillance and control</td>
                <td colspan="2">There is considerable public opposition to allowing public health authorities access to personal health data for infectious disease surveillance.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Informed public discussion, greater transparency, and an ethical framework will be essential to build public trust in the use of new technology for communicable disease control.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Schwalbe et al (2020) [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td colspan="2">United States</td>
                <td colspan="2">Lancet</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Artificial intelligence (AI) use in low- and middle-income countries</td>
                <td colspan="2">AI-driven intervention research in global health has less addressed ethical, regulatory, or practical considerations.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Addressing privacy and security in digital development involves careful consideration of which data are collected and how data are acquired, used, stored, and shared.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Garattini et al (2019) [<xref ref-type="bibr" rid="ref2">2</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">Philosophy &#38; Technology</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Provide a moral foundation for the societal acceptance and responsible development of technological advancement</td>
                <td colspan="2">There are many ethical impacts when applying BDA in infectious diseases.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Automation and algorithmic reliance impact freedom of choice; BDA complexity impacts informed consent; reliance on profiling impacts individual and group identities and justice/fair access; and increased surveillance and population intervention capabilities impact behavioral norms and practices.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Parker et al (2020) [<xref ref-type="bibr" rid="ref3">3</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">Journal of Medical Ethics</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Outline ethical considerations in the deployment of digital surveillance systems for public health response</td>
                <td colspan="2">Mobile phone contact-tracing apps have raised many ethical questions in the COVID-19 pandemic.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Privacy, liberty, responsibilities, data management, public trust and confidence, equity, fairness, justice, and data consistency need to be addressed in the deployment of mobile phone apps.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Katapally (2020) [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td colspan="2">Canada</td>
                <td colspan="2">Journal of Medical Internet Research</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Outline an evidence-based global digital citizen science policy, which provides a theoretical and methodological basis for ethically sourcing big data from citizens to tackle pandemics such as COVID-19</td>
                <td colspan="2">A cohesive societal effort with citizens’ full support is needed in pandemics.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">One of the biggest ethical challenges is data privacy and security. Individuals’ rights to privacy and anonymity through advanced encryption and secure server storage processes, informed consent, the ability to dropout and delete their own data, and data co-ownership, should be priorities.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Mbunge (2020) [<xref ref-type="bibr" rid="ref25">25</xref>]</td>
                <td colspan="2">Eswatini</td>
                <td colspan="2">Diabetes &#38; Metabolic Syndrome: Clinical Research &#38; Reviews</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Analyze the potential opportunities and challenges of integrating emerging technologies, including 5G technology, AI, and big data, into COVID-19 contact tracking</td>
                <td colspan="2">Contact-tracing technologies have limitations when used in the COVID-19 pandemic.</td>
                <td colspan="2">Literature review</td>
                <td colspan="2">Ethical or legal challenges might be socioeconomic inequalities in developing counties; security risks such as data security, confidentiality, integrity, and data availability of patients and contacts in COVID-19; the privacy issues of patients, which may lead to mental health problems; consent and voluntariness; and discrimination.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Garg et al (2020) [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td colspan="2">India</td>
                <td colspan="2">JMIR Public Health and Surveillance</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Describe Aarogya Setu, a first-of-its-kind participatory disease surveillance initiative in India and its ethical considerations</td>
                <td colspan="2">Opt-in, data integrity, and ethical concerns need to be addressed when using the new system for the COVID-19 pandemic.</td>
                <td colspan="2">Case report</td>
                <td colspan="2">The main ethical dilemma is how to ensure data protection and proper ethics while obtaining the benefits of public health surveillance, and how to ensure the ethical use of collected data and protect individual privacy.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Denecke (2017) [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td colspan="2">Switzerland</td>
                <td colspan="2">Life Sciences, Society and Policy</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Highlight the ethical issues that should be considered when integrating digital epidemiology with current practice and develop an ethical assessment model for digital disease detection (DDD) technologies</td>
                <td colspan="2">Usage of digital surveillance in epidemiology has different kinds of challenges.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">The model developed in this study might help to make aware the ethical aspects already in the development process, and possibly address them.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kostkova (2018) [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">Life Sciences, Society and Policy</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Outline 3 major ethical and governance challenges for digital epidemiology in the 21st century</td>
                <td colspan="2">Digital surveillance has created ethical, political, and legal challenges in infectious disease control.</td>
                <td colspan="2">Commentary report</td>
                <td colspan="2">Some of the ethical challenges of sharing data across various early warning tools to support risk assessment are ownership of personal data, transparency and clarity of public health data sharing, strong transparent disclosure, data privacy and security, and the balance between data sharing, personal data protection, stakeholder needs, and public good.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Vayena et al (2015) [<xref ref-type="bibr" rid="ref29">29</xref>]</td>
                <td colspan="2">Switzerland</td>
                <td colspan="2">PLoS Computational Biology</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Identify key ethical challenges associated with DDD activities and outline a framework for addressing them</td>
                <td colspan="2">DDD has many ethical challenges in infectious disease pandemics.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">The ethical challenges of DDD can be divided under 3 heads: context sensitivity (privacy and contextual integrity, transparency, and global justice); nexus of ethics and methodology (risk of harm, use of resources, trust, transparency, accountability); and legitimacy requirements (shared code of practice, mechanism for quick response to inaccuracies, addressing harms caused by DDD activities, common good).</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>De Jong et al (2019) [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td colspan="2">Belgium</td>
                <td colspan="2">Emerging Infectious Diseases</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Mitigate the ethical concerns of movement mapping of potentially infected persons</td>
                <td colspan="2">Mapping the movements of potentially infected persons has ethical challenges.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Ethical obstacles are privacy in relation to the principles of autonomy and nonmaleficence; and a balance between costs, risks, and benefits for participants and communities in relation to the principles of beneficence and justice, such as stigmatized community, data withholding, and whether and how to communicate information on hotspots to the general population.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Kind (2020) [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td colspan="2">United Kingdom<break/>  <break/>  </td>
                <td colspan="2">Patterns</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Examine societal, political, legal and ethical perspectives on symptom tracking, contact tracing, and immunity</td>
                <td colspan="2">The UK government asked for more information to decide the use of technology in the COVID-19 pandemic.</td>
                <td colspan="2">Rapid evidence review</td>
                <td colspan="2">The ethical issues of digital contact tracing are human rights and data protection, inequalities, data quality limitations, false reporting risks, and centralization of large amounts of personal data.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Park et al (2020) [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td colspan="2">Korea</td>
                <td colspan="2">JAMA</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Identify ethical concerns over privacy involving the information technology–based tracing strategy in response to COVID-19</td>
                <td colspan="2">South Korea extensively used digital tools for tracing COVID-19 patients.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Privacy controversies might unveil or infer embarrassing personal details, unwanted privacy invasion, public disdain, uneven scope, and granularity of disclosures by municipal and local governments.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Fraser et al (2020) [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">University of Oxford</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Minimize the invasion of privacy by using digital contact tracing</td>
                <td colspan="2">Contact tracing was used to assist people in receiving warnings about COVID-19.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">The ethical issues include sensitively and specifically identifying infectious individuals, user uptake and adherence, notification, integration with local health policy, and ability to evaluate effectiveness transparently.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cho et al (2020) [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td colspan="2">Singapore</td>
                <td colspan="2">ArXiv Preprint</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Discuss ways of ameliorating privacy concerns without decreasing the usefulness of contact-tracing apps</td>
                <td colspan="2">The Singaporean government released a mobile phone app to assist in tracking down exposures to COVID-19 patients, but there were privacy implications.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Privacy is a central feature of conversations around mobile contact-tracking apps. Some privacy trade-offs can be endured for public health.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Klenk et al (2020) [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td colspan="2">Netherlands</td>
                <td colspan="2">Ethics and Information Technology</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Identify factors that pose a risk for fair group composition</td>
                <td colspan="2">Digital tracing technologies for COVID-19 control were reported to have ethical risks.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Digital tracking apps will introduce new psychological, social, economic, and political risks.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>De Montjoye et al (2020) [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td colspan="2">United Kingdom</td>
                <td colspan="2">Computational Privacy Group Blog</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Propose 8 questions to assess privacy in contact-tracing apps.</td>
                <td colspan="2">A contact-tracing app was developed to assist with COVID-19 control, and record location or close contact data.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Privacy protection should rely on mathematical proof, and mitigation strategies should be considered only when necessary. We should focus on privacy and ensure security.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Bernier et al (2015) [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td colspan="2">Canada</td>
                <td colspan="2">University of New Brunswick Law Journal</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Highlight the personal privacy in electronic public health surveillance systems</td>
                <td colspan="2">Data surveillance has become a key component of pandemic response plans.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">The privacy governance framework is incomplete in ensuring the effective and protective use of personal information in response to epidemics.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Ienca et al (2020) [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td colspan="2">Switzerland</td>
                <td colspan="2">Nature Medicine</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Identify ethical issues when using digital surveillance systems in COVID-19</td>
                <td colspan="2">The COVID-19 emergency has used much more digital tools than previous outbreaks globally.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Best practices should be identified to protect privacy and public trust.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yasaka et al (2020) [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td colspan="2">United States</td>
                <td colspan="2">JMIR mHealth and uHealth</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Develop an effective contact-tracing smartphone app that respects user privacy by not collecting location information or other personal data</td>
                <td colspan="2">Smartphone-based contact tracing has been used in the COVID-19 pandemic to limit disease transmission.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Users may be uncomfortable with applications that track real-time locations.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Barbieri et al (2020) [<xref ref-type="bibr" rid="ref40">40</xref>]</td>
                <td colspan="2">Italy</td>
                <td colspan="2">Istituto Affari Internazionali</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Discuss the ethics of technological solutions to mitigate COVID-19</td>
                <td colspan="2">Technological solutions to mitigate the COVID-19 crisis have been implemented in China and South Korea.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">In a pandemic crisis, the balance between privacy and public health tends to tilt toward the latter. However, a strong legal framework should be established around any such data-driven policy, taking into account the transition to “postepidemic” life.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Chan et al (2020) [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                <td colspan="2">United States</td>
                <td colspan="2">arXiv</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Improve the privacy and anonymity standards of mobile contact tracing</td>
                <td colspan="2">The COVID-19 pandemic has been controlled by large-scale adoption of contact tracing.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">Ethical issues of privacy protection, transparency, and reidentification risks of anonymous information.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Peter (2020) [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
                <td colspan="2">Australia</td>
                <td colspan="2">The Guardian</td>
                <td colspan="2">N/A</td>
                <td colspan="2">Discuss the acceptability of a coronavirus tracing app by Australians and how to implement tracing technology successfully</td>
                <td colspan="2">The Australian public is seeking a way to manage the COVID-19 pandemic.</td>
                <td colspan="2">Discussion paper</td>
                <td colspan="2">The ultimate success of tracking technology will depend on confidence and mutual respect. The ultimate test of any tracking technology will be the strength of the relationship between the public and the government.</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Ethical Issues</title>
        <p><xref ref-type="boxed-text" rid="box1">Textbox 1</xref> shows the key ethical issues identified in the review summarized and clustered under individual, organizational, and societal levels with key themes presented under the corresponding concepts. Six domains, namely awareness of implementing digital infectious disease surveillance, digital integrity, trust, privacy and confidentiality, civil rights, and governance were highlighted.</p>
        <boxed-text id="box1" position="float">
          <title>Ethical issues in utilizing artificial intelligence–augmented infectious disease surveillance systems based on the ethical framework of Asadi et al [<xref ref-type="bibr" rid="ref15">15</xref>].</title>
          <p>
            <bold>Individual level</bold>
          </p>
          <p>Data ownership</p>
          <list list-type="bullet">
            <list-item>
              <p>Digital infectious disease surveillance systems challenge data ownerships rights</p>
            </list-item>
            <list-item>
              <p>Impacts of data ownership rights on public participation in digital infectious disease surveillance</p>
            </list-item>
          </list>
          <p>Data control</p>
          <list list-type="bullet">
            <list-item>
              <p>Inappropriate reidentification, sharing, or processing of personal information of infectious disease patients</p>
            </list-item>
          </list>
          <p>Awareness</p>
          <list list-type="bullet">
            <list-item>
              <p>Lack of understanding of data collection, access, processing, sharing, and storage of infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Lack of and inability to give consent when enrolled into infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Trust</p>
          <list list-type="bullet">
            <list-item>
              <p>Data governance, security, and data set bias undermines public trust</p>
            </list-item>
            <list-item>
              <p>Public mistrust in the necessity and effectiveness of contact-tracing technology for infectious diseases</p>
            </list-item>
            <list-item>
              <p>Public mistrust in governments’ strategies in using digital infectious disease surveillance</p>
            </list-item>
          </list>
          <p>Privacy</p>
          <list list-type="bullet">
            <list-item>
              <p>Concerns of privacy risks and allowance to infectious disease control</p>
            </list-item>
            <list-item>
              <p>Privacy risks on contact tracing for infectious diseases and social networks</p>
            </list-item>
            <list-item>
              <p>Disclosure of infectious disease information leads to business depletion, privacy invasion, and public disdain</p>
            </list-item>
            <list-item>
              <p>Necessity of infectious disease data anonymization and risk of reidentification</p>
            </list-item>
            <list-item>
              <p>Privacy and appropriate authority oversight on artificial intelligence (AI)-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Self-determination</p>
          <list list-type="bullet">
            <list-item>
              <p>Autonomy/personal liberty to participate in and use AI-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Fear</p>
          <list list-type="bullet">
            <list-item>
              <p>Fears of privacy violation, institutional control/penalties, and discriminatory/stigmatized effects when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>
            <bold>Organizational level</bold>
          </p>
          <p>Data quality</p>
          <list list-type="bullet">
            <list-item>
              <p>Data accuracy, validity, veracity, and integrity of AI-augmented infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Consequences of low data quality in AI-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Data sourcing</p>
          <list list-type="bullet">
            <list-item>
              <p>Vulnerable populations/key demographics underrepresented in data sourcing could lead to invalid infectious disease control</p>
            </list-item>
          </list>
          <p>Data sharing/disclosure</p>
          <list list-type="bullet">
            <list-item>
              <p>Data sharing/disclosure for unethical purpose when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Data disclosure needs clear standards and safeguards when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Algorithmic decision making</p>
          <list list-type="bullet">
            <list-item>
              <p>Reliability, validity, and consequences of algorithmic decision making for infectious disease outbreaks</p>
            </list-item>
            <list-item>
              <p>Vulnerability of machine learning processes for infectious disease surveillance</p>
            </list-item>
          </list>
          <p>Presentation</p>
          <list list-type="bullet">
            <list-item>
              <p>Needs for transparent and clear presentation of algorithms, data processing, and hotspots of infectious diseases</p>
            </list-item>
          </list>
          <p>Ethical capability</p>
          <list list-type="bullet">
            <list-item>
              <p>Lack of ethical training on data collection and disciplinary measures on poor data quality for infectious disease surveillance</p>
            </list-item>
          </list>
          <p>Ethical culture</p>
          <list list-type="bullet">
            <list-item>
              <p>Consideration of cultural contexts in data collection, processing, and decision making for infectious disease surveillance</p>
            </list-item>
          </list>
          <p>Ethical governance</p>
          <list list-type="bullet">
            <list-item>
              <p>Transparency of digital infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Lack of common technical or ethical standards for data usage in infectious disease surveillance</p>
            </list-item>
            <list-item>
              <p>Lack of an ethical governance framework to regulate algorithms, data collection, use, and management for infectious disease surveillance</p>
            </list-item>
          </list>
          <p>
            <bold>Societal level</bold>
          </p>
          <p>Power</p>
          <list list-type="bullet">
            <list-item>
              <p>Imbalanced power relations among decision makers, researchers, and citizens when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Unequal allocation and distribution of resources and benefits when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
          </list>
          <p>Social awareness</p>
          <list list-type="bullet">
            <list-item>
              <p>Social awareness in purpose, risks and benefits, and consequences when setting up infectious disease surveillance programs</p>
            </list-item>
          </list>
          <p>Surveillance</p>
          <list list-type="bullet">
            <list-item>
              <p>Ethical surveillance with full public engagement and incentives when using AI-augmented infectious disease surveillance systems</p>
            </list-item>
            <list-item>
              <p>Ensure infectious disease surveillance systems protect civil liberties and rights</p>
            </list-item>
          </list>
          <p>Principles and guidelines</p>
          <list list-type="bullet">
            <list-item>
              <p>Lack of legislation and guidelines for infectious disease outbreaks and protection of data security, individual privacy, and discrimination</p>
            </list-item>
          </list>
          <p>Authority</p>
          <list list-type="bullet">
            <list-item>
              <p>The possibility of data misuse by authorities/agencies without legal authorization</p>
            </list-item>
          </list>
          <p>Climate</p>
          <list list-type="bullet">
            <list-item>
              <p>Digital infectious disease surveillance in a social environment leads to social stigma, discrimination, rumors, and prejudice</p>
            </list-item>
          </list>
        </boxed-text>
        <sec>
          <title>Awareness of Implementing Digital Infectious Disease Surveillance</title>
          <p>The informants reported insufficient understanding at every stage of data collection and distribution of digital infectious disease surveillance systems. They felt they were not informed of their rights to refuse or their ability to withdraw consent. Irresponsible decision making was identified by infectious disease patients in relation to insufficient information provided about contact tracing technology. At the societal level, digital infectious disease surveillance based on BDA was poorly accepted by the general public due to their uncertainty about its purpose and the risks posed from the potential mitigation of data sharing. Consequently, they wanted more information about the digital infectious disease surveillance systems and wanted their associated ethical concerns and consequences addressed. They also expected organizations to make public and transparent the algorithms and data processes used, and use plain language when explaining infectious disease surveillance. Simultaneously, both the general public and field experts emphasized that governments or institutions should convey the importance of infectious disease outbreak control to communities without violating ethical principles.</p>
        </sec>
        <sec>
          <title>Data Integrity</title>
          <p>Data integrity weaknesses were identified as common in BDA. Unreliable or invalidated data sourcing or algorithms were seen to lead to inaccurate identification of outbreaks or infected individuals, false predication of an event’s trajectory or the likelihood of reoccurrence, and inaccurate notifications. The outcomes, such as inadequate data integrity, were further seen to continuously intensify economic losses to trade, tourism, and health services, causing unnecessary panic and the loss of public trust in health authorities. Some organizations and experts also worried that digital infectious disease surveillance systems would widen existing health care disparities or digital divides by underrepresenting vulnerable and at-risk populations such as older adults, children, and people in economically underresourced areas; for instance, data of COVID-19 hotspots influenced the allocation and distribution of resources [<xref ref-type="bibr" rid="ref25">25</xref>]. It was recommended that digital infectious disease surveillance applications should consider ethical requirements and the rights of people from diverse regions and communities.</p>
        </sec>
        <sec>
          <title>Trust</title>
          <p>Some people questioned the necessity and effectiveness of using contact-tracing technologies in an AI-assumed situation. They mistrusted the AI-augmented systems’ capacity to send correct notifications to infected individuals to instruct them to quarantine during an infectious disease outbreak in a timely manner. Emerging technology risks, such as data breaches or data set biases and government strategies of mandatory application of digital contact tracing, could further undermine public trust. Individuals and relevant experts called for an open debate or scrutiny, transparent procedures for data usage, and public consultation plans and privacy regulations.</p>
        </sec>
        <sec>
          <title>Privacy and Confidentiality</title>
          <p>Digital infectious disease surveillance was identified to pose considerable risks to an individual’s rights to privacy and confidentiality. Contact tracing that linked a potential infectious disease with patients’ movements, locations, or social networks was seen as a considerable threat to further disclosure of sensitive information. For example, personal social interactions and contact history, especially in the case of sexually transmitted infections or HIV, could be revealed. Individuals were concerned that third parties or malicious users might access large health data sets for profit and/or abuse. Disclosure of private information was seen to lead to business depletion, privacy invasion, and public discrimination and stigmatization. Data anonymity, robust encryption processes, and deidentified aggregate data were contended to be crucial to all data privacy and security procedures in compliance with data protection regulations.</p>
        </sec>
        <sec>
          <title>Civil Rights</title>
          <p>Data ownership rights for public health surveillance were regarded as a major ethical challenge. Some reported that authorities or institutions limited their rights to decide the adoption of digital infectious disease contact tracing or surveillance systems. Personal liberties were also impacted by movement mapping, cross-border sharing of personal health information, and frequent security checks using QR codes for filling in personal information. Countries using centralized contact-tracing apps and privacy-by-design apps were seen to have the potential to impose restrictions on civil liberties, which, in turn, impacted ethical engagement in digital health. Data co-ownership and strengthening of transparency were seen as helpful to encourage individuals to participate in data visualization, analysis, and knowledge translation, and balance the power dynamics among decision makers, researchers, and citizens.</p>
        </sec>
        <sec>
          <title>Governance</title>
          <p>Technical and ethical standards, as well as legislation and guidelines for infectious disease outbreaks, data security, protection of individual privacy, and avoidance of discrimination were considered poorly developed and incomplete. Technology companies were recommended to establish a mechanism to deal with inaccurate epidemic reporting and dissemination of misinformation, and were expected to develop rapid ethical assessment, training, and disciplinary measures for data collection or sharing. Governance institutions or bodies, such as national health commissions, medical councils, and company boards, were further recommended to provide appropriate oversight on the performance of algorithms and data usage. Some literature argued that an independent privacy audit was needed to secure a transparent approach for the public [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Both individuals and relevant experts also supported data sharing protocols to specify the scope and granularity of disclosure. An example provided was that personal names should not be publicly available, and personal information should only be gathered and shared within a period of time regulated by law and clearly justified based on population health needs.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Challenges of Using AI Surveillance Systems for Infectious Diseases</title>
        <p>The emergence of AI surveillance systems for infectious diseases promises tangible global public health benefits, but these are accompanied by significant ethical, political, and legal challenges, which span over a wide spectrum on 3 levels. Six main themes were generated from this systematic review, ranging from people’s awareness and knowledge of digital infectious disease surveillance systems and personal privacy on the individual level to organizational issues of maintaining data integrity and security, and the lens was extended upward to the societal level, involving public trust, civil rights, and the need for a governance framework with ethical oversights. Some of the challenges are inherent to public health practice and only heightened by the use of digital tools, and others, such as public trust and awareness of digital surveillance, algorithmic decision making, and data security, are specific to AI approaches and largely unprecedented. It is vital to consider these challenges to enhance individuals’ rights, privacy, public responsibilities, and optimal population health outcomes so that digital surveillance can tackle pandemics ethically.</p>
      </sec>
      <sec>
        <title>Strengths and Limitations</title>
        <p>Studies and position papers on the ethical implications of AI surveillance for infectious diseases have gained momentum since 2019 in response to the outbreak of the COVID-19 pandemic; the dearth of studies prior to this makes it challenging to reveal any time trends. Furthermore, most articles included in the review were discussion papers, limiting the ability to evaluate generalizability, transferability, and rigor or multiple stakeholders’ perspectives on the use of AI-augmented infectious disease surveillance. The 5 empirical studies had restricted sampling approaches both in terms of size and stakeholder representation (health professionals and community groups), with 4 of the studies being conducted in Australia alone. Few papers involved vulnerable or diverse populations, and none involved specific cultural or socioeconomic groups, further limiting the scope of the review. Furthermore, articles acknowledged the inherent strengths and weaknesses of the public health system operating at the location of the study.</p>
      </sec>
      <sec>
        <title>Retributions Versus Common Good for Public Health and Long-term Impacts</title>
        <p>The tensions between human and civil right discourses and the need for rapid public health responses are exacerbated with the use of BDA/AI in the context of a pandemic [<xref ref-type="bibr" rid="ref2">2</xref>]. There are medicolegal and moral retributions and concerns arising from utilizing available epidemiological information through a highly effective and responsive infectious disease surveillance method that could protect local and, potentially, global communities from serious infectious disease outbreaks [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. Conversely, routine collection and linkage of detailed personal information pose considerable risks for the violation of individual and civil freedoms of choice and privacy [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        <p>As of July 21, 2021, there have been 191 million confirmed cases and 4.11 million deaths globally from COVID-19 [<xref ref-type="bibr" rid="ref43">43</xref>]. Given that sound public health interventions are predicated upon promoting and protecting the health of communities, timely, cost-effective, and socioculturally informed primary care interventions, advocacy, and empowerment with long-term impact evaluations are required. There are strong reasons to develop an ethical governance framework to support AI-augmented infectious disease surveillance to achieve these outcomes. The question of how to balance what is needed for the “good of public health outcomes” and human rights in pandemic crisis situations is highlighted in the literature reviewed [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      </sec>
      <sec>
        <title>Trust Building and Privacy Protection</title>
        <p>Detection and notification of infectious disease outbreaks requires prompt accurate disease diagnosis and follow-up of infected individuals and their close contacts. An early AI-augmented warning system has exponential potential for implementing real-time, responsive, and adaptive calculations. This means that substantial personal information, such as names, ages, locations, and relevant heath data, will be accessed in a timely manner and collected by AI systems for calculation, analysis, and notification. Public opt-in and well-founded trust in the digital system, its implementation, and the governance framework are therefore essential factors regarding ethical issues at the organizational and societal levels for infectious disease surveillance, which could enable the acceptability and effectiveness of the system.</p>
        <p>Even with optimal technical standards to maximally reduce the risks and consequences of data misuse, data safety, security, and integrity cannot be guaranteed. The role of AI-augmented infectious disease surveillance might only be supplementary for public health, while ethical issues are carefully observed. One of the most important challenges facing AI is to design and develop appropriate methods to deidentify personal information and protect privacy, yet a greater risk of false positive and false negative notifications exists with higher-level deidentified data [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
        <p>Moreover, well-founded trust and confidence vary in different countries and between individuals. People in democratic countries tended to distrust AI-augmented surveillance systems by challenging them when personal information is reported to health authorities, often without appropriate informed consent [<xref ref-type="bibr" rid="ref3">3</xref>]. In contrast, Chinese citizens expressed their trust in the Chinese government’s response to COVID-19, which they felt had been highly successful in controlling the spread of the virus through the use of mobile phone data combined with intensive testing and restriction programs [<xref ref-type="bibr" rid="ref44">44</xref>]. Although there is no unified standard to establish trust, the need for effective, transparent, accountable, and independent oversight is very important.</p>
      </sec>
      <sec>
        <title>Generation of an Ethical Framework and Global Governance Structures</title>
        <p>Digital standards and guidelines for developing and evaluating the performance of infectious disease surveillance alone are insufficient. The scope of the ethical framework in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref> needs to be expanded globally. Cross-national and national governance structures; institutional systems with regulatory, medical, ethical, and legal frameworks; and benchmarking standards have essential roles to play in the development and deployment of these new health technology systems. However, this review identified the urgent need for an ethical framework to underscore all AI-augmented infectious disease surveillance systems [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Considering the rapid development of global trade supply chains, mass gatherings, and international travel, World Health Organization’s International Health Regulations in 2005 [<xref ref-type="bibr" rid="ref45">45</xref>] outlined the cross-border implications of a pandemic response and provided a framework for sharing, monitoring, and evaluating information from the sources of infections [<xref ref-type="bibr" rid="ref37">37</xref>]. In response to a pandemic emergency, cross-border sharing of personal health data is essential for tracing infectious disease patients and their contacts. At the same time, cross-border sharing further raises the heightened and unique risk for individual privacy and security breaches. In turn, a spectrum of actions regarding ethical, political, and legal implications must be framed within strict safeguards and needs to be mandated globally [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      </sec>
      <sec>
        <title>Implications</title>
        <p>A systematic medical, ethical, and legal framework is necessary for governance of AI-augmented infectious disease surveillance and the protection of personal privacy and data integrity. Public health systems should maximally increase the social awareness of AI surveillance and BDA for infectious diseases, and implement new technologies for infectious disease surveillance in a more person-centered and humane manner. Future research needs to focus on the setting up and implementation of an AI-augmented infectious disease surveillance system underscored by an ethical framework based on universal human rights. Decision makers should take into account varying and diverse population needs, sociocultural status, and regulatory and legal governance in order to promote trust building between end users, including infectious disease patients, doctors, and AI system implementers. This systematic review is intended to contribute to the development of a more comprehensive and concrete ethical framework for AI-augmented infectious disease surveillance, which will enable it to ultimately maximize public health responsiveness synergized within an ethical context.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist.</p>
        <media xlink:href="jmir_v23i10e32328_app1.docx" xlink:title="DOCX File , 31 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">BDA</term>
          <def>
            <p>big data analytics</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">EHR</term>
          <def>
            <p>electronic health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">ML</term>
          <def>
            <p>machine learning</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vlieg</surname>
              <given-names>WL</given-names>
            </name>
            <name name-style="western">
              <surname>Fanoy</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>van Asten</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pilot</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bijkerk</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>van der Hoek</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Krafft</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>van der Sande</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Comparing national infectious disease surveillance systems: China and the Netherlands</article-title>
          <source>BMC Public Health</source>
          <year>2017</year>
          <month>05</month>
          <day>08</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>415</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/s12889-017-4319-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12889-017-4319-3</pub-id>
          <pub-id pub-id-type="medline">28482830</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12889-017-4319-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC5423001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Garattini</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Raffle</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Aisyah</surname>
              <given-names>DN</given-names>
            </name>
            <name name-style="western">
              <surname>Sartain</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kozlakidis</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Big data analytics, infectious diseases and associated ethical impacts</article-title>
          <source>Philos Technol</source>
          <year>2019</year>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>69</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/31024785"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s13347-017-0278-y</pub-id>
          <pub-id pub-id-type="medline">31024785</pub-id>
          <pub-id pub-id-type="pii">278</pub-id>
          <pub-id pub-id-type="pmcid">PMC6451937</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Fraser</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Abeler-Dörner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bonsall</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Ethics of instantaneous contact tracing using mobile phone apps in the control of the COVID-19 pandemic</article-title>
          <source>J Med Ethics</source>
          <year>2020</year>
          <month>07</month>
          <day>04</day>
          <volume>46</volume>
          <issue>7</issue>
          <fpage>427</fpage>
          <lpage>431</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://jme.bmj.com/lookup/pmidlookup?view=long&#38;pmid=32366705"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/medethics-2020-106314</pub-id>
          <pub-id pub-id-type="medline">32366705</pub-id>
          <pub-id pub-id-type="pii">medethics-2020-106314</pub-id>
          <pub-id pub-id-type="pmcid">PMC7231546</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCarthy</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Slow response contributed to scale of west African Ebola epidemic, CDC concludes</article-title>
          <source>BMJ</source>
          <year>2016</year>
          <month>07</month>
          <day>08</day>
          <volume>354</volume>
          <fpage>i3814</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj.i3814</pub-id>
          <pub-id pub-id-type="medline">27401324</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Temko</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Marnane</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Boylan</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Lightbody</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Clinical implementation of a neonatal seizure detection algorithm</article-title>
          <source>Decis Support Syst</source>
          <year>2015</year>
          <month>03</month>
          <volume>70</volume>
          <fpage>86</fpage>
          <lpage>96</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25892834"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.dss.2014.12.006</pub-id>
          <pub-id pub-id-type="medline">25892834</pub-id>
          <pub-id pub-id-type="pii">S0167-9236(14)00284-X</pub-id>
          <pub-id pub-id-type="pmcid">PMC4394138</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Degeling</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Communicable disease surveillance ethics in the age of big data and new technology</article-title>
          <source>Asian Bioeth Rev</source>
          <year>2019</year>
          <month>6</month>
          <day>10</day>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>173</fpage>
          <lpage>187</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32218872"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s41649-019-00087-1</pub-id>
          <pub-id pub-id-type="medline">32218872</pub-id>
          <pub-id pub-id-type="pii">87</pub-id>
          <pub-id pub-id-type="pmcid">PMC7091643</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Singapore personal data hack hits 1.5m, health authority says</article-title>
          <source>BBC</source>
          <year>2018</year>
          <access-date>2021-04-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bbc.com/news/world-asia-44900507">https://www.bbc.com/news/world-asia-44900507</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tanner</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>How Your Medical Data Fuels a Hidden Multi-Billion Dollar Industry</article-title>
          <source>Time</source>
          <year>2017</year>
          <access-date>2021-04-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://time.com/4588104/medical-data-industry/">https://time.com/4588104/medical-data-industry/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lazer</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kennedy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>King</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Vespignani</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Big data. The parable of Google Flu: traps in big data analysis</article-title>
          <source>Science</source>
          <year>2014</year>
          <month>03</month>
          <day>14</day>
          <volume>343</volume>
          <issue>6176</issue>
          <fpage>1203</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1126/science.1248506</pub-id>
          <pub-id pub-id-type="medline">24626916</pub-id>
          <pub-id pub-id-type="pii">343/6176/1203</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vanessa</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Culnane</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rubinstein</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The simple process of re-identifying patients in public health records</article-title>
          <source>Pursuit</source>
          <year>2017</year>
          <access-date>2021-03-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pursuit.unimelb.edu.au/articles/the-simple-process-of-re-identifying-patients-in-public-health-records">https://pursuit.unimelb.edu.au/articles/the-simple-process-of-re-identifying-patients-in-public-health-records</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Floridi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Taddeo</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>What is data ethics?</article-title>
          <source>Philos Trans A Math Phys Eng Sci</source>
          <year>2016</year>
          <month>12</month>
          <day>28</day>
          <volume>374</volume>
          <issue>2083</issue>
          <fpage>20160360</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28336805"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rsta.2016.0360</pub-id>
          <pub-id pub-id-type="medline">28336805</pub-id>
          <pub-id pub-id-type="pii">rsta.2016.0360</pub-id>
          <pub-id pub-id-type="pmcid">PMC5124072</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Salerno</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Knoppers</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Hlaing</surname>
              <given-names>WM</given-names>
            </name>
            <name name-style="western">
              <surname>Goodman</surname>
              <given-names>KW</given-names>
            </name>
          </person-group>
          <article-title>Ethics, big data and computing in epidemiology and public health</article-title>
          <source>Ann Epidemiol</source>
          <year>2017</year>
          <month>05</month>
          <volume>27</volume>
          <issue>5</issue>
          <fpage>297</fpage>
          <lpage>301</lpage>
          <pub-id pub-id-type="doi">10.1016/j.annepidem.2017.05.002</pub-id>
          <pub-id pub-id-type="medline">28595734</pub-id>
          <pub-id pub-id-type="pii">S1047-2797(17)30001-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whittemore</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Knafl</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The integrative review: updated methodology</article-title>
          <source>J Adv Nurs</source>
          <year>2005</year>
          <month>12</month>
          <volume>52</volume>
          <issue>5</issue>
          <fpage>546</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2648.2005.03621.x</pub-id>
          <pub-id pub-id-type="medline">16268861</pub-id>
          <pub-id pub-id-type="pii">JAN3621</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>QN</given-names>
            </name>
            <name name-style="western">
              <surname>Fàbregues</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bartlett</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Boardman</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cargo</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dagenais</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gagnon</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Griffiths</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nicolau</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>O’Cathain</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rousseau</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vedel</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Pluye</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The Mixed Methods Appraisal Tool (MMAT) version 2018 for information professionals and researchers</article-title>
          <source>EFI</source>
          <year>2018</year>
          <month>12</month>
          <day>18</day>
          <volume>34</volume>
          <issue>4</issue>
          <fpage>285</fpage>
          <lpage>291</lpage>
          <pub-id pub-id-type="doi">10.3233/efi-180221</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Asadi</surname>
              <given-names>SI</given-names>
            </name>
            <name name-style="western">
              <surname>Breidbach</surname>
              <given-names>CF</given-names>
            </name>
            <name name-style="western">
              <surname>Davern</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Shanks</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Ethical implications of big data analytics</article-title>
          <year>2016</year>
          <conf-name>European Conference on Information Systems (ECIS)</conf-name>
          <conf-date>June 12-15, 2016</conf-date>
          <conf-loc>Istanbul, Turkey</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/ecis2016_rip/24/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Someh</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Davern</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Breidbach</surname>
              <given-names>CF</given-names>
            </name>
            <name name-style="western">
              <surname>Shanks</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Ethical issues in big data analytics: a stakeholder perspective</article-title>
          <source>CAIS</source>
          <year>2019</year>
          <fpage>718</fpage>
          <lpage>747</lpage>
          <pub-id pub-id-type="doi">10.17705/1cais.04434</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Degeling</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>van Oijen</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>McAnulty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sintchenko</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Braunack-Mayer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yarwood</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>GL</given-names>
            </name>
          </person-group>
          <article-title>Community perspectives on the benefits and risks of technologically enhanced communicable disease surveillance systems: a report on four community juries</article-title>
          <source>BMC Med Ethics</source>
          <year>2020</year>
          <month>04</month>
          <day>25</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-020-00474-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-020-00474-6</pub-id>
          <pub-id pub-id-type="medline">32334597</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-020-00474-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC7183724</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Korean mothers' morality in the wake of COVID-19 contact-tracing surveillance</article-title>
          <source>Soc Sci Med</source>
          <year>2021</year>
          <month>02</month>
          <volume>270</volume>
          <fpage>113673</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33453628"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.socscimed.2021.113673</pub-id>
          <pub-id pub-id-type="medline">33453628</pub-id>
          <pub-id pub-id-type="pii">S0277-9536(21)00005-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7833862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Degeling</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Brookes</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Thai</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Changes in public preferences for technologically enhanced surveillance following the COVID-19 pandemic: a discrete choice experiment</article-title>
          <source>BMJ Open</source>
          <year>2020</year>
          <month>11</month>
          <day>18</day>
          <volume>10</volume>
          <issue>11</issue>
          <fpage>e041592</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmjopen.bmj.com/lookup/pmidlookup?view=long&#38;pmid=33208337"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2020-041592</pub-id>
          <pub-id pub-id-type="medline">33208337</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2020-041592</pub-id>
          <pub-id pub-id-type="pmcid">PMC7677347</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Michaleff</surname>
              <given-names>ZA</given-names>
            </name>
            <name name-style="western">
              <surname>Greenwood</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Abukmail</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Glasziou</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Concerns and misconceptions about the Australian government's COVIDSafe app: cross-sectional survey study</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2020</year>
          <month>11</month>
          <day>04</day>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>e23081</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2020/4/e23081/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/23081</pub-id>
          <pub-id pub-id-type="medline">33048826</pub-id>
          <pub-id pub-id-type="pii">v6i4e23081</pub-id>
          <pub-id pub-id-type="pmcid">PMC7644267</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Degeling</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>GL</given-names>
            </name>
          </person-group>
          <article-title>Perspectives of Australian policy-makers on the potential benefits and risks of technologically enhanced communicable disease surveillance - a modified Delphi survey</article-title>
          <source>Health Res Policy Syst</source>
          <year>2019</year>
          <month>04</month>
          <day>04</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>35</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://health-policy-systems.biomedcentral.com/articles/10.1186/s12961-019-0440-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12961-019-0440-3</pub-id>
          <pub-id pub-id-type="medline">30947721</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12961-019-0440-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC6449976</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sweeney</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Tracking the debate on COVID-19 surveillance tools</article-title>
          <source>Nat Mach Intell</source>
          <year>2020</year>
          <month>06</month>
          <day>16</day>
          <volume>2</volume>
          <issue>6</issue>
          <fpage>301</fpage>
          <lpage>304</lpage>
          <pub-id pub-id-type="doi">10.1038/s42256-020-0194-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schwalbe</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wahl</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Artificial intelligence and the future of global health</article-title>
          <source>Lancet</source>
          <year>2020</year>
          <month>05</month>
          <day>16</day>
          <volume>395</volume>
          <issue>10236</issue>
          <fpage>1579</fpage>
          <lpage>1586</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32416782"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/S0140-6736(20)30226-9</pub-id>
          <pub-id pub-id-type="medline">32416782</pub-id>
          <pub-id pub-id-type="pii">S0140-6736(20)30226-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7255280</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Katapally</surname>
              <given-names>TR</given-names>
            </name>
          </person-group>
          <article-title>A global digital citizen science policy to tackle pandemics like COVID-19</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>05</month>
          <day>26</day>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>e19357</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/5/e19357/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/19357</pub-id>
          <pub-id pub-id-type="medline">32408267</pub-id>
          <pub-id pub-id-type="pii">v22i5e19357</pub-id>
          <pub-id pub-id-type="pmcid">PMC7284491</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mbunge</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Integrating emerging technologies into COVID-19 contact tracing: Opportunities, challenges and pitfalls</article-title>
          <source>Diabetes Metab Syndr</source>
          <year>2020</year>
          <volume>14</volume>
          <issue>6</issue>
          <fpage>1631</fpage>
          <lpage>1636</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32892060"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.dsx.2020.08.029</pub-id>
          <pub-id pub-id-type="medline">32892060</pub-id>
          <pub-id pub-id-type="pii">S1871-4021(20)30332-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC7833487</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Garg</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bhatnagar</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Gangadharan</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>A case for participatory disease surveillance of the COVID-19 pandemic in India</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2020</year>
          <month>04</month>
          <day>16</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>e18795</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2020/2/e18795/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18795</pub-id>
          <pub-id pub-id-type="medline">32287038</pub-id>
          <pub-id pub-id-type="pii">v6i2e18795</pub-id>
          <pub-id pub-id-type="pmcid">PMC7164788</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Denecke</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>An ethical assessment model for digital disease detection technologies</article-title>
          <source>Life Sci Soc Policy</source>
          <year>2017</year>
          <month>09</month>
          <day>20</day>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>16</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28929347"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s40504-017-0062-x</pub-id>
          <pub-id pub-id-type="medline">28929347</pub-id>
          <pub-id pub-id-type="pii">10.1186/s40504-017-0062-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC5605474</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kostkova</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Disease surveillance data sharing for public health: the next ethical frontiers</article-title>
          <source>Life Sci Soc Policy</source>
          <year>2018</year>
          <month>07</month>
          <day>04</day>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>16</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29971516"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s40504-018-0078-x</pub-id>
          <pub-id pub-id-type="medline">29971516</pub-id>
          <pub-id pub-id-type="pii">10.1186/s40504-018-0078-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC6029986</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Salathé</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Madoff</surname>
              <given-names>LC</given-names>
            </name>
            <name name-style="western">
              <surname>Brownstein</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>Ethical challenges of big data in public health</article-title>
          <source>PLoS Comput Biol</source>
          <year>2015</year>
          <month>02</month>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>e1003904</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pcbi.1003904"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pcbi.1003904</pub-id>
          <pub-id pub-id-type="medline">25664461</pub-id>
          <pub-id pub-id-type="pii">PCOMPBIOL-D-14-00778</pub-id>
          <pub-id pub-id-type="pmcid">PMC4321985</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>BC</given-names>
            </name>
            <name name-style="western">
              <surname>Gaye</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Luyten</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>van Buitenen</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>André</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Meehan</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>O'Siochain</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tomsu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Urbain</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Grietens</surname>
              <given-names>KP</given-names>
            </name>
            <name name-style="western">
              <surname>Njue</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pinxten</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Gehre</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nyan</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Buvé</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Roca</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ravinetto</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Antonio</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Ethical considerations for movement mapping to identify disease transmission hotspots</article-title>
          <source>Emerg Infect Dis</source>
          <year>2019</year>
          <month>07</month>
          <volume>25</volume>
          <issue>7</issue>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3201/eid2507.181421"/>
          </comment>
          <pub-id pub-id-type="doi">10.3201/eid2507.181421</pub-id>
          <pub-id pub-id-type="medline">31211938</pub-id>
          <pub-id pub-id-type="pmcid">PMC6590736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kind</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Exit through the App Store?</article-title>
          <source>Patterns (N Y)</source>
          <year>2020</year>
          <month>06</month>
          <day>12</day>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>100054</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2666-3899(20)30065-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.patter.2020.100054</pub-id>
          <pub-id pub-id-type="medline">32548597</pub-id>
          <pub-id pub-id-type="pii">S2666-3899(20)30065-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7291988</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information technology-based tracing strategy in response to COVID-19 in South Korea-privacy controversies</article-title>
          <source>JAMA</source>
          <year>2020</year>
          <month>06</month>
          <day>02</day>
          <volume>323</volume>
          <issue>21</issue>
          <fpage>2129</fpage>
          <lpage>2130</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2020.6602</pub-id>
          <pub-id pub-id-type="medline">32324202</pub-id>
          <pub-id pub-id-type="pii">2765252</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fraser</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Abeler-Dorner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ferretti</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kendall</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bonsall</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Digital contact tracing: comparing the capabilities of centralised and decentralised data architectures to effectively suppress the COVID-19 epidemic whilst maximising freedom of movement and maintaining privacy</article-title>
          <source>University of Oxford</source>
          <year>2020</year>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/y4bjggke">https://tinyurl.com/y4bjggke</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ippolito</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>YW</given-names>
            </name>
          </person-group>
          <article-title>Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs</article-title>
          <source>arXiv</source>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2003.11511">https://arxiv.org/abs/2003.11511</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klenk</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Duijf</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Ethics of digital contact tracing and COVID-19: who is (not) free to go?</article-title>
          <source>Ethics Inf Technol</source>
          <year>2020</year>
          <month>08</month>
          <day>24</day>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32863740"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10676-020-09544-0</pub-id>
          <pub-id pub-id-type="medline">32863740</pub-id>
          <pub-id pub-id-type="pii">9544</pub-id>
          <pub-id pub-id-type="pmcid">PMC7444677</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Montjoye</surname>
              <given-names>YA</given-names>
            </name>
            <name name-style="western">
              <surname>Houssiau</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Gadotti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Guepin</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask</article-title>
          <source>Computational Privacy Group</source>
          <year>2020</year>
          <access-date>2021-02-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cpg.doc.ic.ac.uk/blog/evaluating-contact-tracing-apps-here-are-8-privacy-questions-we-think-you-should-ask/">https://cpg.doc.ic.ac.uk/blog/evaluating-contact-tracing-apps-here-are-8-privacy-questions-we-think-you-should-ask/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bernier</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Fong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Banks</surname>
              <given-names>TM</given-names>
            </name>
          </person-group>
          <article-title>Pandemics in a Connected World: Integrating Privacy with Public Health Surveillance</article-title>
          <source>University of New Brunswick Law Journal</source>
          <year>2015</year>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.lib.unb.ca/index.php/unblj/article/view/29090">https://journals.lib.unb.ca/index.php/unblj/article/view/29090</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ienca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>On the responsible use of digital data to tackle the COVID-19 pandemic</article-title>
          <source>Nat Med</source>
          <year>2020</year>
          <month>04</month>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>463</fpage>
          <lpage>464</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32284619"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41591-020-0832-5</pub-id>
          <pub-id pub-id-type="medline">32284619</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41591-020-0832-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC7100462</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yasaka</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Lehrich</surname>
              <given-names>BM</given-names>
            </name>
            <name name-style="western">
              <surname>Sahyouni</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Peer-to-peer contact tracing: development of a privacy-preserving smartphone app</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>04</month>
          <day>07</day>
          <volume>8</volume>
          <issue>4</issue>
          <fpage>e18936</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/4/e18936/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18936</pub-id>
          <pub-id pub-id-type="medline">32240973</pub-id>
          <pub-id pub-id-type="pii">v8i4e18936</pub-id>
          <pub-id pub-id-type="pmcid">PMC7144575</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barbieri</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Darnis</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Technology: An Exit Strategy for COVID-19?</article-title>
          <source>Istituto Affari Internazionali</source>
          <year>2020</year>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.iai.it/en/pubblicazioni/technology-exit-strategy-covid-19">https://www.iai.it/en/pubblicazioni/technology-exit-strategy-covid-19</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Foster</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gollakota</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Horvitz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Jaeger</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kakade</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kohno</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Langford</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Larson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2004.03544">https://arxiv.org/abs/2004.03544</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Trust in the government is rising – but will Australians accept the coronavirus tracing app?</article-title>
          <source>The Guardian</source>
          <year>2020</year>
          <access-date>2021-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.theguardian.com/australia-news/commentisfree/2020/apr/20/trust-in-the-government-is-rising-but-will-australians-accept-the-coronavirus-tracing-app">https://www.theguardian.com/australia-news/commentisfree/2020/apr/20/trust-in-the-government-is-rising-but-will-australians-accept-the-coronavirus-tracing-app</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <article-title>WHO Coronavirus (COVID-19) Dashboard</article-title>
          <source>World Health Organization</source>
          <year>2021</year>
          <access-date>2021-02-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://covid19.who.int/">https://covid19.who.int/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <article-title>COVID-19 boosts Chinese citizens' trust in their government: survey</article-title>
          <source>Xinhua</source>
          <year>2021</year>
          <access-date>2021-07-11</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.china.org.cn/world/2021-05/14/content_77498248.htm">http://www.china.org.cn/world/2021-05/14/content_77498248.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <article-title>International Health Regulations</article-title>
          <source>World Health Organization</source>
          <access-date>2021-05-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/health-topics/international-health-regulations#tab=tab_1">https://www.who.int/health-topics/international-health-regulations#tab=tab_1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
