Abstract
The COVID-19 pandemic has demonstrated the limitations of traditional contact tracing in containing infectious disease outbreaks due to both scalability issues and low adoption rates. To enhance proactive responses, this paper proposes a novel digital infection prevention system focused on identifying and mitigating threatening situations posing a risk of infection. Unlike contact tracing, this approach uses near real-time context-aware adaptation to evaluate and respond to immediate risks based on individual situational data and proximity to potential infection sources. The approach leverages digital contact tracing technologies, such as BLE-based distance estimation, but advances them by integrating context-aware adaptation that considers direct and indirect transmission paths. Prevention profiles provide the system with pathogen-specific guidelines for detecting and interpreting threat levels and recommending protection measures. An extensible ontology-based context model facilitates a uniform approach to represent situational information and adapts flexibly to evolving pathogen and environmental dynamics. This study also presents the architecture, data flow, and intervention cycle of the proposed system, validated by a prototype Android application. Findings suggest that the proposed approach is both feasible and promising for managing infectious disease threats. Future work could focus on improving sensor integration, ensuring privacy-preserving data sharing for epidemiological insights, and further empirical testing in real-world settings.
1 Introduction
In epidemiology, infectious diseases that lead to a temporally accumulated and not regionally limited illness of many people are referred to as pandemics. 1 , 2 , 3 There are numerous examples of pandemics in human history. The Spanish flu, for example, which killed an estimated 27–50 million people, is one of the most devastating examples of the 20th century. 4
1.1 Motivation
At the end of 2019, an increasing number of people in Wuhan (China) were diagnosed with pneumonia, the cause of which could be traced back to a previously unknown coronavirus. 5 Initially referred to as 2019-nCoV, this pathogen soon became known as Severe Acute Respiratory Syndrome Coronavirus Type 2 (SARS-COV-2) around the world 6 and is the cause of the infectious disease known as Coronavirus Disease 2019 (COVID-19). Due to the rapid increase in the number of infections 7 and the spread of the pathogen throughout the world, the secretary-general of the World Health Organization (WHO) officially declared the outbreak of COVID-19 as a pandemic on March 11, 2020. 8 By the beginning of 2024, more than 773 million people worldwide have been infected with SARS-COV-2 and more than 7 million people have died from COVID-19 or its consequences. 9
In order to bring the COVID-19 pandemic under control, various regulatory measures have been applied worldwide to keep infection chains as short as possible to make the transmission of SARS-COV-2 more difficult. In addition, the fight against the COVID-19 pandemic was also supported by technology. For the first time in human history, various approaches have been developed that are summarized under the term digital contact tracing in the literature. The aim of such approaches is to automate the tracing of close contacts with infected people in order to be able to identify close contacts that have taken place without the need for high personnel resources. This should enable systematic contact tracing, even if a pathogen spreads quickly. 10 , 11 , 12 To achieve this goal, a person’s smartphone is used to record data about encounters with other people and share this information in case the person is infected, so that the people encountered can be warned about a contact with them. 11 Although some individual approaches differ significantly in their architecture, the currently known solutions essentially estimate the distance between people and record the duration of encounters in order to be able to use this data to infer close contacts in the event of a confirmed infection. 10 The distance estimation is primarily done via Bluetooth Low Energy (BLE), 11 as it enables more accurate contact tracing indoors compared to Global Positioning System (GPS) or Wireless Local Area Network (WLAN) and is also available on most of the smartphones used today. 13 , 14
1.2 Problem
Although promising, digital contact tracing has not been able to effectively contain the spread of SARS-COV-2. One of the reasons for this is seen in the lack of acceptance among the population in many countries. 11 In addition to that, there are also publications that question the practicability of digital contact tracing based on BLE. In Ref. 15], for example, it is argued that a high degree of precision in distance estimation is required for useful contact tracing because epidemiological guidelines often require that a distance between two people must be less than a few meters in order to be able to assume close contacts at all. 16 , 17 , 18 Thus, deviations in the range of meters are not tolerable. With this in mind, BLE cannot achieve the required precision. Various papers have shown experimentally that deviations in the range of a few meters have to be expected when estimating distances via BLE. 14 , 19 , 20
Besides the precision, digital contact tracing also has the disadvantage that it does not sufficiently take the context of an encounter into account since it essentially uses the distance and the duration of an encounter to infer a close encounter. The context can be understood as a set of background information that can be helpful for understanding a situation. It plays an important role in the subsequent assessment of whether an encounter carries the risk of an infection and, as a result, is to be classified as a close contact. The Robert Koch-Institut (RKI), for example, clarifies that in order for an encounter between two people to be considered as a close contact, there must be a breach of distance without adequate protection. 17 Nevertheless, the principal disadvantage of digital contact tracing is that it is retrospective. For contact tracing to be effective, a close contact must have been occurred.
1.3 Objectives
In this paper, the fight against the spread of infectious diseases is considered from an alternative perspective, which is based on the following observation. The transmission of an infectious disease is contingent upon the presence of a threatening situation that may result in infection. Consequently, the likelihood of an individual falling ill is contingent upon the timely recognition and defusing of such a situation by applying protection measures. It can be posited that a forward-looking approach to infection prevention may prove more efficacious than a backward-looking contact tracing. An information system designed to support infection prevention must be able to assist a person in recognizing and defusing threatening situations. To do this, the system must be able to determine the person’s context, evaluate it with regard to the risk of infection and the person’s possible illness, and suggest adequate protection measures. In general, systems that can adapt their behavior depending on a context are referred to as context-sensitive systems and the adaptation process they use is called context-based adaptation. 21 Therefore, a system to support infection prevention is to be classified as a context-sensitive system. In this paper, a novel approach for such a digital infection prevention system is presented.
The remainder of this paper is organized as follows: The Sections 2–4 provide the essential foundation for understanding of the rest of the paper. In Section 5 the requirements to be met are identified. Section 6 describes the related work identified in the literature. Section 7 deals with the question of how the requirements can be met and presents a concept for a digital infection prevention. Section 8 then addresses the validation of the concept. Finally, Section 9 concludes this paper by summarizing the central results and suggesting further research.
2 Infectious diseases
Pathogens are microorganisms that can penetrate a human being and cause a disease. 3 A person can only become ill if a pathogen is able to penetrate its body. Therefore, the two terms infection and infectious disease are distinguished from one another in literature. 3 While infection refers to the penetration of a pathogen into a person’s body, regardless of whether or not it subsequently causes a disease, the term infectious disease refers to a pathogenic effect of a pathogen. Thus, an infectious disease always requires a previous infection. According to Ref. 3] the spread of a pathogen can be understood as a cyclic process of six successive phases, which are illustrated in Figure 1:
Tenacity phase: A pathogen is in an environment outside a person’s body. It must survive in this environment until it is transmitted.
Transmission phase: A pathogen is transmitted to a person’s body via a transmission path. Transmission paths can be direct or indirect. In the case of a direct transmission path, a pathogen is transmitted directly from one person to another, for example, through sexual contact. In the case of an indirect transmission path, a pathogen reaches a person by means of transmission factors. These can be vehicles or vectors. While vehicles refer to all non-living factors as intermediate carriers, vectors are all living beings that can act as intermediate hosts without becoming ill themselves.
Invasion phase: Once a pathogen has been successfully transmitted, it penetrates the body of a person. This can occur through natural openings in the body or by overcoming natural invasion barriers.
Establishment phase: A pathogen replicates itself in a person’s body.
Damage phase: If a pathogen has managed to replicate itself sufficiently without being killed by the immune system, a person will become ill.
Emission phase: A pathogen is emitted and passed on by a person in whom it has established itself. Depending on the transmission path, it is either passed directly on to the next person or first released into the environment, from where it can then get to the next person.

Spread of a pathogen.
To protect against infectious diseases, two types of infection prophylaxis can be distinguished from each other: exposure prophylaxis and disposition prophylaxis. 1 While exposure prophylaxis encompasses all measures that are intended to prevent contact with a pathogen, disposition prophylaxis refers to measures that are intended to prevent the outbreak of a disease.
3 Digital infection prevention
The aim of digital infection prevention, which will be referred to as infection prevention in the following, is to prevent infectious diseases from occurring. To achieve this, a person should be supported in the timely recognition and defusing threatening situations. For this purpose two definitions are made:
Definition 3.1
(Situation). A person’s situation consists of a set of events surrounding themselves at a specific and definable point in time.
Definition 3.2
(Threatening situation). A threatening situation is a situation in which a person is at risk of becoming infected, such that there is a possibility that the person may become ill.
Definition 3.2 uses two central elements that are necessary for a threatening situation to exist: risk of infection and risk of illness. While the risk of infection refers to the possibility of a pathogen penetrating a person’s body, the risk of illness requires that the pathogen can also cause illness (see Section 2). This takes into account that in real life a person can become infected with a harmless pathogen or be immune to a disease.
3.1 Sensors
Sensors are needed to digitally capture a person’s situation. They pick up signals from the person’s environment, process them and generate data that can be used to describe what is happening in a situation. The following definition is therefore made:
Definition 3.3
(Sensor). A sensor is an information technology unit that receives and processes signals from a person’s environment and generates data that can be used to describe the person’s situation.
Sensors can generate data on different semantic levels. A proximity sensor, for example, can output a distance or a classification of a distance. The question therefore is, on which semantic level the data generated by sensors must be located. In this paper, no restrictions are made in this regard and it will be discussed later how such differences can be taken into account.
3.2 Protection measures
Protection measures describe how threatening situations can be defused. The prerequisite for the emergence of such a situation is the risk of an infection if it can cause illness (see Definition 3.2). As described in Section 2 there are two types of measures when it comes down to protection against infectious diseases. They either address the contact with a pathogen or the outbreak of the corresponding disease, but neglect the fact that protection can also be achieved if a pathogen has been transmitted to the human body but is then prevented from penetrating it. Accordingly, the following definition is made:
Definition 3.4
(Protection measures). A protection measure is a measure that provides protection against one of the following aspects:
the transmission of a pathogen to a person’s body
the penetration of a pathogen into a person’s body
the outbreak of an infectious disease
4 Context-based adaptation
Context-sensitive systems use context-based adaptation to determine the context of an entity (e.g. a person, place, or object), process it and adjust their behavior depending on it. 21 , 22 In literature, the terms context and situation are often used interchangeably. 23 In this paper, however, they are distinguished from each other. Therefore, in the following Sections 4.1 and 4.2 the concept of context and the modeling of context are examined in more detail. Then a generic framework for determining and using context is presented in Section 4.3.
4.1 Notion of context
The concept of context has its origins in linguistics, where it refers to all aspects of a communication situation that influence the understanding of an utterance. 24 A similar understanding can also be found in social sciences and humanities, where context describes a framing with background information that is helpful for understanding something that is the focus of interest. 25 , 26 , 27
In computer science, the notion of context has its origins in the field of ubiquitous computing. In Ref. 28] it is argued that a constantly changing execution environment is an important aspect of which applications must be aware of in order to be able to react specifically to a changing environment. Therefore, context is defined there as “[…] where you are, who you are with, and what resources are nearby” 28], p. 85. Afterwards this definition is illustrated by an enumeration of some exemplary factors. However, due to the exemplary list, it is justifiably criticized in Ref. 23] where another definition is proposed for context:
[…] any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves. 23], pp. 306–307
Although this definition is more general, it does not specify whether an information must also be relevant for a specific objective. Therefore, context is defined as follows in this paper:
Definition 4.1
(Context). A context is a set of information that could be helpful in recognizing and defusing a threatening situation for a person.
The relationship between a context and a situation is illustrated in Figure 2. A person is in a current situation (white rectangle) and is surrounded by events that are described by information (circles). The situation itself follows on previous situations (gray rectangles). The person was also surrounded by events in these situations. Regardless of where a piece of information has its temporal origin, all information that could be relevant in the current situation belong to the person’s context (gray circles). This includes not only information about current events but also information about previous events.

Relationship between a situation and a context.
4.2 Modeling of context
When it comes down to modeling context, ontology-based models have proven themselves in comparison to other approaches. 29 In computer science, an ontology is a formal specification of knowledge for a specific domain. It defines the relevant vocabulary, which consists of classes, relations, functions and axioms. An ontology thus describes a section of the real world by defining the concepts relevant to the section, their properties, the relationships between them and the applicable axioms. 30 , 31 , 32 , 33 An established language for describing ontologies is Web Ontology Language (OWL), which is now available in version 2 and is standardized by the World Wide Web Consortium (W3C). 34 , 35 OWL has many parallels to object-oriented languages and consists of the following fundamental elements: 36
Classes: Classes describe sets of individuals. They are therefore abstract concepts and represent classes of objects in the same way as object-oriented languages.
Individuals: Individuals are concrete instances of classes. In contrast to many common object-orientated languages, however, ontologies allow individuals to belong to several classes at the same time.
Literals: Literals are data values such as strings or integers.
Object properties: Object properties describe relationships between individuals. They therefore represent the object relationships known from object-oriented languages, in which an object refers to another object.
Data properties: Data properties describe relationships between individuals and literals. They therefore represent the attributes of objects known from object-oriented languages.
In OWL all elements are identified by Internationalized Resource Identifiers (IRIs), which are a generalisation of the Uniform Resource Identifiers (URIs). 37 The elements of an ontology can be addressed by IRIs, in particular different ontologies can also refer to each other.
4.3 Determination and utilization of context
In Ref. 21] a generic and domain-independent framework for determining and using context is presented under the name Generic Context Framework (GCF) (see Figure 3). The GCF describes various aspects of context-based adaptation and structures them in four layers:
Knowledge Layer: The knowledge layer forms the basis of the GCF and provides the layers above it with a standardized and situation-independent Domain Model in which all relevant concepts of a domain are specified. Both the existing prior knowledge and existing Inference Rules are transferred into the model. While prior knowledge refers to all concepts to be included in the model, Inference Rules describe how concepts or relationships between them can be derived on the basis of the Domain Model. Prior knowledge can further be divided into abstract and concrete prior knowledge. While Abstract Predefined Knowledge includes information about classes of individuals as well as information about relationships between the classes, Concrete Predefined Knowledge contains information that only concerns specific individuals.
State Layer: In comparison to the knowledge layer, the state layer contains information about an ongoing situation that is merged into a current State. Sensing Rules are used to generate and update the State. They receive data generated by sensors and instantiate the Domain Model provided by the knowledge layer. At this point, it can now be explained how the possible semantic differences in the data, which could originate from different sensors (see Section 3.1) can be taken into account. The semantic differences are intercepted by the Sensing Rules as they map the input data to the standardized Domain Model. By integrating the sensor data into a State, there is also a decoupling from the current situation, which makes it possible to record both information about the current situation and information about previous situations in the State.
Context Layer: In the context layer, a slice of the current state is determined depending on a specific focus and stored as the context. The focus is a non-empty set of objects of the state that represent the current center of attention. The context is determined with the help of Contextualization Strategies, which, in addition to the pure selection of objects from the state, can also entail their interpretation and abstraction based on the Domain Model. This allows both the complexity and the size of the context to be reduced compared to the underlying state. As a result, the context includes the focus itself as well as all other information that could be relevant for the focus according to the Contextualization Strategies.
Adaptation Layer: On the basis of the determined context, adaptation rules that should be applied are selected in the adaptation layer. Adaptation Rules specify the necessary conditions that must be met for their selection and application and also indicate the adaptations that should be made to a system. The result of their application is the Adapted State, which can be understood as the subsequent state of the current state (see state layer).
![Figure 3:
A four-layered framework for context-based adaptation–generic context framework based on Ref. 21].](/document/doi/10.1515/icom-2024-0065/asset/graphic/j_icom-2024-0065_fig_003.jpg)
A four-layered framework for context-based adaptation–generic context framework based on Ref. 21].
The descriptions above already indicate the adaptation cycle that underlies the GCF and enables context-based adaptation. The knowledge layer provides the layers above it with a uniform conceptual basis. The state layer maintains a current State that contains information about both a current situation and previous situations. As a result, the State includes information about the events of a current situation as well as information about events that occurred earlier. This makes the State useful for determining the context in the context layer. There, the scope and complexity of the State are reduced to the currently relevant information by performing a selection and abstraction using Contextualization Strategies. The result is the context on the basis of which a selection of Adaptation Rules is made. After their application (or new sensor data), a subsequent State emerges and the cycle restarts.
5 Requirements analysis
In the following, the requirements for the digital infection prevention are set out. For this, the perspective of a person who should be supported in recognizing and defusing threatening situations is taken below. In order to better distinguish the identified requirements from the rest of the text, they are numbered sequentially from R1 to R18. As indicated above, from the perspective of a person there are two central areas that the approach must take into account: on the one hand, it must support the person in recognizing and, on the other hand, in defusing threatening situations. Before these areas are covered in more detail in the Sections 5.1 and 5.2, two general requirements can be identified for the approach. The person being supported must be independent of a central Service Provider (SP). Otherwise, a timely detection and defusing of a threatening situation could be jeopardized if, for example, the SP is too overloaded. This demand for an independent support is concretized by the following two requirements:
It must be possible to support a person in recognizing and defusing a threatening situation.
The support of recognizing and defusing a threatening situation must be independent of a central SP.
5.1 Recognizing threatening situations
In order for the person being supported to be able to apply protection measures and defuse a threatening situation, the person must become aware of such a situation.
It must be possible to alert the person being supported to a situation that is threatening for them.
The threat posed by a situation is influenced by protection measures that the person being supported has already applied. For example, an infection with SARS-COV-2 can be prevented, if the person is properly wearing a medical face mask.
The recognition and defusing of a threatening situation should be possible depending on the protection measures applied by the person being supported.
While protection measures can reduce the threat of a situation, the person’s pre-existing diseases can increase the threat of a situation.
The recognition and defusing of a threatening situation should be possible depending on the pre-existing diseases of the person being supported.
Whether a situation poses a threat also depends on the pathogen in relation to which the threat level should be assessed.
The recognition and defusing of a threatening situation should be possible depending on a pathogen.
As described in Section 3, a threatening situation can only arise if the person being supported is in a situation in which an infection can occur. In this regard a distinction must be made between different transmission paths (see Section 2). While a direct transmission path refers to a human-to-human transmission, an indirect transmission path refers to a vehicle-to-human or a vector-to-human transmission.
5.1.1 Human-to-human transmission
For a human-to-human transmission to be possible, at least one other person must be in the vicinity of the person being supported. The more people there are, the longer the encounter with them lasts and the shorter the distance to the person being supported is, the more likely an infection can occur.
The recognition and defusing of a threatening situation should be possible depending on the number of people in the vicinity of the person being supported.
The recognition and defusing of a threatening situation should be possible depending on the distance between the person being supported and the people around them.
The recognition and defusing of a threatening situation should be possible depending on the duration of encounters that the person being supported has with other people.
In general, the other people present in the vicinity of the person being supported will have different pasts before they encounter the person being supported. For example, a person may have had already numerous other encounters. From the perspective of the person being supported, a person’s past affects the likelihood that person could be infectious.
The recognition and defusing of a threatening situation should be possible depending on the past of a person who encountered the person being supported.
A person’s past includes, in particular, infection tests that the person has taken to determine or rule out the presence of an infection.
The recognition and defusing of a threatening situation should be possible depending on infections tests that a person had taken before encountering the person being supported.
5.1.2 Vehicle-to-human transmission
For a vehicle-to-human transmission to be possible, the person being supported must interact with a vehicle. For example, the person must touch a contaminated object. Here a distinction must be made between whether an infection can occur immediately after touching an object or not. If an immediate infection is possible, it must be possible to prevent the person being supported from touching a contaminated object, for example by pointing out its presence in their environment. In the case of an indirect infection, however, a contact may occur if the person being supported applies hygiene measures afterwards.
The recognition and defusing of a threatening situation should be possible depending on the number of objects surrounding the person being supported.
The recognition and defusing of a threatening situation should be possible depending on the distance that the person being supported has to the objects in their environment.
The recognition and defusing of a threatening situation should be possible depending on the objects that the person being supported touches.
Similar to the case of other people present in the environment of the person being supported, the past of an object also affects the probability that it could be contaminated. From the perspective of the person being supported, an object that has previously been touched by many other people is more likely to be contaminated than an object that has previously been disinfected.
The recognition and defusing of a threatening situation should be possible depending on the past of an object.
5.1.3 Vector-to-human transmission
For a vector-to-human transmission to be possible, there must also be an interaction between the person being supported and a vector. In contrast to a vehicle-to-human transmission, however, the role of the person being supported is usually passive here. For example, the person is bitten by an insect. Therefore, in comparison to a vehicle-to-human transmission, it does not make sense to consider each individual vector. Instead, it is sufficient to look at the location where the person being supported is staying. Just like objects, locations can also be contaminated and, from the perspective of the person being supported, the past of a location affects the probability that it could be contaminated.
The recognition and defusing of a threatening situation should be possible depending on the location of the person being supported.
The recognition and defusing of a threatening situation should be possible depending on the history of a location.
5.2 Defusing threatening situations
The protection measures that can be applied to defuse a threatening situation always depend on a pathogen. Also, in some circumstances, several protection measures may be possible. The person being supported should therefore be supported in dealing with a threatening situation.
The person being supported should be supported in dealing with a threatening situation depending on a pathogen.
6 Related work
At the time of writing this paper, no approaches for infection prevention based on context-based adaptation could be identified in the literature. However, similar approaches could be identified that also aim to support a person in recognizing and defusing threatening situations. In Ref. 38] the authors describe an approach which leverages BLE and an app to calculate a distance between two people and alert them when a distance violation has been recognized. A similar approach can also be found in Ref. 39]. In addition to Ref. 38] the authors describe how BLE can be used to determine if a person enters a high-occupied region in a building. The authors argue that such areas have a high risk of becoming infected with SARS-COV-2 and are therefore of interest. Focusing on buildings and limited areas the approaches presented in Refs. [40], [41], [42 use stationary cameras and techniques from the field of computer vision to identify distance violations. Although these approaches are independent of BLE they are limited to a stationary application. A different technology is used in Ref. 43]. There the authors describe how oscillating magnetic fields can be used to recognize distance violations between two people.
Although the different approaches use various technologies they focus on the detection of distance violations. Thereby they take requirement R8 into account, but neglect the remaining requirements from Section 5. In particular, the related approaches do not allow the recognition and defusing of a threatening situation depending on a pathogen (compare requirement R6).
7 Approach
In the following, the concept for the infection prevention, as described in Section 3, is presented. To introduce the concept, its essential elements are first briefly described in Section 7.1. Subsequently, the remaining Sections 7.2–7.6 examine the individual elements and their relationships in more detail.
7.1 Architecture
The central elements of the infection prevention are shown in Figure 4. The approach encompasses an app that is referred to as InfectPreventionApp in the following. In the approach a person must use the app in order to get supported in detecting and defusing threatening situations. Each person being supported (person symbol in Figure 4) requires its own instance of the app. It is assumed that a person being supported has a portable, individual device with BLE support (e.g. a smartphone) on which the app can be executed.

Architecture of the infection prevention.
The InfectPreventionApp periodically broadcasts a signal via BLE to inform nearby entities (cloud symbol in Figure 4) that are involved in the infection prevention about its presence. It is assumed that these entities also broadcast a signal via BLE so that the InfectPreventionApp can also detect their presence.
The app uses Sensors to capture the situation of the person being supported. Once the situation has been captured, it must be evaluated in regard to its threat level. The specific approach and the protection measures that should be suggested afterwards depend on a pathogen. According to the requirement R6, the app therefore needs specifications that allow it to identify what information has to be evaluated and how and what protection measures should be suggested to the person being supported. Such specifications are recorded in Prevention Profiles. The approach presented here envisages that Prevention Profiles are provided by profile creators (building symbol in Figure 4) who have expertise in an infectious disease. Profile creators can create Prevention Profiles independently of each other and are identified by Decentralized Identifiers (DIDs). These are identifiers that can be created decentrally and bound to public keys in a self-sovereign manner with the help of a Distributed Ledger Technology (DLT). 44 , 45 By using a DLT, the InfectPreventionApp can lookup the public key used by a profile creator to verify the signature of a Prevention Profile without the need for a Public Key Infrastruktur (PKI). Since the focus of this paper lies neither on DIDs nor on DLTs, these technologies will not be discussed further. It is assumed that a DLT is available that can be used jointly by profile creators and the InfectPreventionApp.
To enable a decentralized creation of Prevention Profiles, profile creators must know which interfaces they need to consider and which sensors can generate which data. They and the person being supported also need a common terminology when it comes down to possible pre-existing diseases, protection measures and pathogens. To create a common terminology, a Disease Catalog, a Protection Catalog and a Pathogen Catalog (see Figure 4) are used, in which the possible pre-existing diseases, protection measures and pathogens are defined.
A person’s situation can change over time. To enable a timely detection and defusing of threatening situations, the InfectPreventionApp leverages an Intervention Cycle. In this cycle, the sensor data is processed using the existing Prevention Profiles in order to assess the situation of the person being supported depending on a pathogen and to suggest protection measures to them. The assessment is based on the context (see Definition 4.1) of the person being supported, which requires an appropriate Context Representation. The result of the assessment and also of the cycle are Intervention Information which are generated based on the Prevention Profiles. The Intervention Information describe the threat posed by a situation and contain the protection measures that should be suggested to the person being supported. Thus, the requirements R1, R3 and R18 are addressed. In addition to that, Intervention Information can optionally include further data that describe a threat posed by the person being supported. If such data is available, it is made available by the InfectPreventionApp to other entities involved in the infection prevention via BLE in order to assist them in assessing the threat posed by the person being supported. Since the entire architecture does not rely on any central SP, requirement R2 is met.
7.2 Communication protocol
In order for the BLE information exchange described in Section 7.1 to take place in an organized way, a communication protocol is required, which is referred to below as Infect Prevention Information Exchange Protocol (IPEP) and is explained in more detail using Figure 5. The figure shows two entities (Alice and Bob) involved in the infection prevention. For Alice to be able to detect Bob’s presence in her environment, Bob must broadcast an ADVERTISEMENT message to his environment. If Alice can receive the message, she must be able to recognize that Bob is taking part in the infection prevention. Therefore, Bob must include a specific Universally Unique Identifier (UUID) in his ADVERTISEMENT message as an identifier for a BLE service that he offers (parameter infprevsrv_uuid). As it will become clearer later, this service is of particular importance, so that it is referred to below as Infect Prevention Service (IPS).

Infect Prevention Information Exchange Protocol.
Recognizing the mere presence of an entity is not sufficient. According to the requirements R7 and R12, Alice must be able to distinguish, for example, whether Bob is a person or an object. To enable her to make this distinction, Bob must transmit a code for the type of his entity in the ADVERTISEMENT message (parameter type_code).
As long as Alice is within the range of Bob, she can receive several ADVERTISEMENT messages from him. According to R7 and R12 the number of present entities and according to R9 (in the case an entity is a person) the duration of an encounter should be taken into account for the recognition and defusing a threatening situation. Therefore, Alice must be able to recognize Bob. For him to be recognizable, Bob must include a random identificator (ID) in his ADVERTISEMENT message (parameter id), so that Alice can assign various ADVERTISEMENT messages to him. However, since a constant ID would mean that a person would always be recognizable, which would have an impact on the person’s privacy, the present concept allows a person to periodically change their ID.
While Bob is within the range of Alice, Alice must be able to estimate the existing distance to him, since according to the requirements R8, R13 and R14 it should be possible to take the distance into account. In order for Alice to be able to estimate the distance to Bob based on BLE, she needs, in addition to the measured signal strength with which she received his ADVERTISEMENT message, a reference value that indicates the expected signal strength of Bob’s BLE transmitter at a known distance. The expected signal strength depends on the BLE chip used and must be provided by the chip manufacturer. It is assumed that the expected signal strength at a distance of 1 m is known so that Bob can include it in his ADVERTISEMENT message (parameter mPower).
In order for Alice to be able to establish a connection to Bob and request further, optional information from him after receiving an ADVERTISEMENT message, she needs his Media-Access-Control (MAC) address. Therefore, Bob must also include his currently used MAC address in the ADVERTISEMENT message (parameter mac_addr). The connection establishment is part of the BLE protocol stack 46 and is therefore not considered any further in this paper. Once the connection has been established, Alice must tell Bob which information she needs from him.
Since BLE requires that all data offered by an entity has to be organized hierarchically by services, characteristics and descriptors, 46 the IPEP specifies that Bob must offer all information about himself, which could be relevant for the infection prevention, under the IPS. For each Prevention Profile used, Bob must provide a characteristic whose value describes the risk of infection or contamination originating from him related to a pathogen. Since the characteristic value is calculated based on Bob’s context and Bob’s past is therefore also included in the calculation of the value, requirements R10 and R15 are met.
Bob must further assign a set of descriptors to each characteristic to describe the following aspects of a threat he poses: the pathogen’s ID according to the Pathogen Catalog, the Prevention Profile used to calculate the threat and its signature, the time of the calculation and whether the posed threat is increasing or decreasing (threat flank).
The actual request of the information takes place iteratively. First, Alice has to determine all UUIDs of the characteristics that Bob offers under the IPS. She therefore sends him a CHAR_DISCOVERY message with the UUID of the IPS (parameter infprevsrv_uuid). Bob replies to the message with a CHAR_LIST message in which he includes the previously transmitted UUID of the IPS (parameter infprevsrv_uuid) and a list with the UUIDs of the characteristics he offers (parameter char_uuids).
For each of the UUIDs contained in the list, Alice must next request the characteristic value. She therefore sends Bob a CHAR_READ message. In order for Bob to be able to assign the requested characteristic to a service, Alice must include both the UUID of the IPS and the UUID of the requested characteristic in her message. Bob replies to the message with a CHAR_VALUE message that contains the requested value (parameter char_value) as well as the UUIDs previously transmitted to him. This enables Alice to assign his message to one of her original CHAR_READ messages.
Next, Alice must request the descriptors assigned to the received characteristic. To do this, Alice must first determine their UUIDs. She therefore sends Bob a DESCR_DISCOVERY message. In order for Bob to be able to identify for which characteristic the UUIDs of the descriptors are needed, Alice must include both the UUID of the IPS (parameter infprevsrv_uuid) and the UUID of the corresponding characteristic (parameter char_uuid) in her message. Bob replies to the message with a DESCR_LIST message in which he includes the requested list with the UUIDs of the descriptors (parameter descr_uuids) as well as the UUIDs originally transmitted to him, so that Alice, in turn, can assign his message to one of her originally sent DESCR_DISCOVERY messages. Alice now goes through the received list and sends a DESCR_READ message to Bob for each of the UUIDs contained in it, which Bob answers in the same way as a CHAR_READ message.
7.3 Sensors
As part of the infection prevention, each sensor is given a unique name using an Uniform Resource Name (URN). In addition, in this concept, the data generated by the sensors, together with their type and the time of their generation, are referred to as sensor events. They also have an URN that describes their type. The data included in a sensor event is encoded as strings. This is done because sensor events are processed in the Intervention Cycle using existing Prevention Profiles, which can be created decentrally (see Section 7.1). To enable profile creators to develop their Prevention Profiles independently of individual sensors, a neutral encoding of the data they generate is required. In this concept, strings are used for this purpose.
The sensors required for the infection prevention can be derived from the requirements identified in Section 5. In R7 to R10 and R12 to R15, it is required that the recognition and defusing of threatening situations should be possible depending on the number, distance, duration and past of the entities present in the environment of the person being supported. To detect the presence of the entities and to be able to obtain the necessary information about them, a proximity sensor is used, which executes the IPEP described in Section 7.2. The requirement R16 demands that the location at which a person being supported is present should be considered. So a location sensor is used to determine the location. It uses the GPS module in the local device of the person being supported to collect location coordinates and their accuracy. It is assumed that such a module is available in the person’s device. In R4, R5 and R11, it is required that the protection measures applied by the person being supported, their health condition and infection tests carried out by them should be taken into account for the recognition and defusing of a threatening situation. The information needed for this is collected by a protection, disease and an infection test sensor, which all react to interactions of the person being supported with the InfectPreventionApp and generate corresponding sensor events when the person reveals the respective personal data.
7.4 Context representation
To assess the situation of the person being supported based on their context, the data collected by the sensors must be transferred to a context model. However, it must be taken into account that the person being supported may use different Prevention Profiles, meaning that different requirements may arise for the scope of a context model required by a Prevention Profile.
7.4.1 Model scope
To resolve the tension between the necessity for a context model on the one hand and the different possible requirements for its scope on the other, three basic approaches can be distinguished from each other:
World model: A world model is provided that captures all the realities of the real world and must be used by all profile creators.
Abandonment: No model is provided. Instead, all profile creators must create the models needed themselves for their Prevention Profiles.
Extensible domain model: Instead of a world model that has to take into account all eventualities, a domain model is provided, which can be used by profile creators but can be extended at certain points if necessary.
The world model has the advantage that it can serve as a basis for all Prevention Profiles, but it is unsuitable due to the scope and complexity associated with it. Not specifying a model at all has the advantage that profile creators can fully adapt the models they create to the needs of their Prevention Profiles. At the same time, however, this means a high implementation effort. From the perspective of the person being supported, a lack of a model has also the disadvantage that the entire responsibility for information processing is placed entirely into the hands of individual profile creators, which at the same time means a loss of control. Therefore, a complete abandonment of the specification of a model is also unsuitable. The only option that remains is to define an extensible domain model that can be used by profile creators as a basis for creating Prevention Profiles, but which can be extended if its scope is insufficient. This enables profile creators to save time and effort, since certain model elements already exist. On the other hand, it allows for various possible requirements regarding the scope of the model to be taken into account. In addition, the model provides a framework within which the information processing must take place, so that, in contrast to the aforementioned complete abandonment of a model, there is no complete loss of control of the information processing. Furthermore, an extensible domain model has the advantage that it provides an overarching semantic for the context of the person being supported. This makes it possible to exchange information between individual Prevention Profiles at the model level and to analyze data across different profiles. Thus, in this paper, an extensible domain model is designed as a core model, which can be used and extended by profile creators.
7.4.2 Core model
Since the ontology-based approach has proven itself for modeling context (see Section 4.2), an ontology-based core model is designed for the infection prevention, which is referred to below as Infect Prevention Core Model (IPCM) and is presented in Figure 6. There, all concepts included in the model are depicted as nodes (ellipses in Figure 6) and the relations between them are depicted as edges (arrows in Figure 6). It is defined that all concepts and relations may be extended. In the following, extensions of the IPCM are referred to as IPCM extensions. IRIs (see Section 4.2) are used to identify all model elements, and it is defined that all elements of the IPCM belong to a namespace abbreviated by the prefix core.

Infect Prevention Core Model.
A person is represented in the IPCM by the concept core:Person. Each core:Person can either be the person being supported or any other person, which is expressed by the concepts core:Me and core:Other, both of which extend the concept core:Person. A core:Person can be involved in various core:Interaction with themselves, another person or a core:Something. Alice can, for example, touch herself, meet Bob, enter a supermarket, put on a face mask or do an infection test. Every core:Person as well as each core:Something can have a threat, which is described by the concept core:Threat. A threat represents a risk of infection or contamination and can be further differentiated into an incoming and an outgoing threat. Thus, the concept core:Threat is extended by the two concepts core:IncomingThreat and core:OutgoingThreat. While an incoming threat describes a threat that exists at a given time for a core:Person or a core:Something, an outgoing threat describes a threat that a core:Something or a core:Person can pose to another core:Something or another core:Person. Since a threat of an entity can change over time and it is also important to be able to determine what threats existed at a particular point in time, a core:Interaction can have a reference to the threats that existed at the time of its occurrence. Each core:Interaction can also be further described by the concept core:InteractionDetail and each existing threat can have an impact on a core:Person or a core:Something, which is represented by the concept core:Impact. A person can have pre-existing diseases. Diseases are expressed by the concept core:Disease. As a person’s pre-existing diseases can have an influence on the possible severity of the course of an illness, every core:Disease can have an implication for an core:IncomingThreat (see relation core:hasImplicationFor). To protect themselves from an infection or the onset of an illness, a person can apply protection measures (see Section 3.2). These are expressed by the concept core:Protection. The relation core:isCapableOf is used to express which protection measures are possible for a core:Person. Similar to a pre-existing disease, a protection measure can also have an implication for an core:IncomingThreat. Since protection measures that have been applied can also protect others, a core:Protection can also have an implication for an core:OutgoingThreat. If Alice is infectious, for example, and is wearing a medical face mask correctly, this can make it more difficult for her to pass on a pathogen to other people around her.
7.4.3 Determining and evaluating the context
On the basis of the IPCM or its extension, the GCF presented in Section 4.3 is used to determine and evaluate the context of the person being supported. The concepts specified in the model and the relationships between them are instantiated with the help of Sensing Rules and are linked to the respective concept or relation of the model by an is-a relation. On the basis of the State that has been built up, Contextualization Strategies are then used to determine the context of the person being supported and record it in the Contextualized State. The Contextualized State contains information that could be useful for recognizing and defusing a threatening situation. To evaluate it and generate Intervention Information, Intervention Policies are used that correspond to the adaptation rules of the GCF.
7.5 Prevention profiles
Based on the considerations in Section 7.4, four central components of a Prevention Profile (see Figure 7) can be identified that must be provided by profile creators. As discussed in Section 7.1, Intervention Information describe a threat posed by a situation and contain protection measures to be suggested to the person being supported. This information always depend on a specific pathogen; therefore, to generate it, a Prevention Profile must include the Intervention Policy to be executed by the InfectPreventionApp. Since Intervention Policies are applied to a Contextualized State and since this state is generated by Contextualization Strategies, a Prevention Profile must also include these. Similarly, Contextualization Strategies require a State as an input, which is built up using Sensing Rules. Therefore, a Prevention Profile must also include the Sensing Rules to be executed by the InfectPreventionApp. Furthermore, since the previously presented components of a Prevention Profile may depend on an IPCM extension, a Prevention Profile must also include this.

Components of a Prevention Profile.
7.6 Intervention cycle
Now that all the key components of the approach have been presented in the previous Sections 7.1–7.5, they can be integrated into the Intervention Cycle shown in Figure 8. The cycle consists of four elements: the person being supported, a Sensing Component, an Intervention Component and a Situation Information Component.

Intervention Cycle.
The person being supported is the addressee of the Intervention Cycle. As a physical being, they have a location in the real world and are therefore surrounded by an environment. Depending on their actions, even if this means just passively staying at one place, the person may be affected by events in a current situation that could impact the threat the situation poses to them. The information about the situation is captured by the Sensing Component and transferred to a State with the help of the Sensing Rules defined in the existing Prevention Profiles. However, it must be taken into account that different Prevention Profiles could provide competing Sensing Rules. This must be addressed; otherwise, different profiles could interfere with each other in an unpredictable way. A similar argument can be made for the Contextualization Strategies. This problem can be avoided if all Prevention Profiles are considered as isolated components of the InfectPreventionApp. It follows that each Prevention Profile must have its own exclusive State and its own exclusive Contextualized State, so that there can’t be any interference between individual profiles. Therefore, the Sensing Rules contained in all Prevention Profiles are not used to establish a single global State; instead, a separate State and Contextualized State are generated for each profile.
The Intervention Component is responsible for generating the Intervention Information mentioned in Section 7.1. To do this, the component must first contextualize a State of a Prevention Profile using the Contextualization Strategies defined in it in order to generate a context (see Definition 4.1) of the person being supported that is relevant for the Prevention Profile. The Intervention Component is therefore notified by the Sensing Component as soon as all Sensing Rules of a Prevention Profile have been applied to a sensor event. As soon as all the Contextualization Strategies of a Prevention Profile have been executed and the Contextualized State is available, the Intervention Policy defined in the profile is finally executed to generate Intervention Information. All components of a Prevention Profile are executed in a sandbox. It is assumed that a sandbox is in place that blocks all network traffic and access to resources of other Prevention Profiles and the InfectPreventionApp unless the access is made by a service provided by the app that is known to the sandbox. In regard to the requirement R17, this allows profile creators to access third-party services in a controlled manner to determine the threat level of a given location based on its past. The generated Intervention Information must be returned by a profile creator as a string in JavaScript Object Notation (JSON), the structure of which is explained below using the example data shown in Listing 1. In the elements threatMe and threatOther, a profile creator must specify the threat posed to and posed by the person being supported. A threat must be described by its value (elements value), its flank (elements flank) and the time of its computation (element computationTime). To enable a uniform interpretation of threats, it is defined, based on membership functions from the field of fuzzy logic,[1] that the value of a threat must fall within the closed interval [0, 1]. For the flank of a threat, it is further defined that it is rising if its value is positive. It is falling if its value is negative and otherwise it is unchanged if its value is 0. The element threatOtherSignature contains the signature of the threat posed by the person being supported. In the element protectionSuggestions, a profile creator must finally suggest protection measures that the person being supported can apply to protect themselves. Each suggestion must consist of an ID of the protection measure according to the Protection Catalog (element measureID), a priority of the measure (element priority) and an indication of the maximum duration of its protective effect (element lifespan).

Structure and example data for Intervention Information.
The protection measures listed in the Intervention Information must not be passed on to the person being supported without being filtered. On the one hand, contradictory suggestions that may have arisen due to the execution of different Prevention Profiles must be identified and resolved. On the other hand, it must be ensured that the person being supported is not overwhelmed with too many suggestions. The Situation Information Component is responsible for selecting the protection measures that are actually suggested to the person being supported and also for informing them about a threat posed by a situation. The component is therefore notified by the Intervention Component as soon as new Intervention Information become available. The protection measures suggested by a Prevention Profile are then extracted from this information and filtered. Since the focus of this paper is not on the resolution of contradictory protection measures, it will not be discussed further at this point. Subsequently, the person being supported is informed about a threat posed by a situation and is shown by the (filtered) protection measures how they can defuse it. Thus, requirement R3 is addressed. If protection measures are applied or the situation of the person being supported changes in any other way, the Intervention Cycle restarts.
8 Validation
The concept presented in Section 7 was implemented as a prototype of an android app as part of a student’s master thesis at FernUniversität Hagen and functionally validated using two Prevention Profiles for SARS-COV-2 and the Norovirus via sixteen scenarios. 47 On the one hand, the scenarios selected for the validation describe both harmless and threatening situations for a person being supported. On the other hand, they also take into account situations in which a person being supported can themselves become a threat to others (compare threatMe and threatOther in Listing 1). To conduct the validation, the events described in the scenarios were simulated and it was subsequently checked whether the risk assessment was calculated correctly using the available Prevention Profiles and whether the protection measures specified therein were recommended. While the Prevention Profile for SARS-COV-2 was used to notify a person of upcoming social distance violations to other potentially infected people and to suggest appropriate protection measures, the Prevention Profile for the Norovirus was used to notify a person of touching potentially contaminated objects and also to suggest appropriate protection measures to them. Thereby it is shown in Ref. 47] that the presented concept in Section 7 is viable and can support a person in recognizing and defusing threatening situations, even if the approach has been only functionally validated through mocked sensor events. Figure 9a shows an example of a recognized threatening situation for SARS-COV-2 and Figure 9b suggests protection measures to defuse it.
![Figure 9:
InfectPreventionApp as implemented in Ref. 47].](/document/doi/10.1515/icom-2024-0065/asset/graphic/j_icom-2024-0065_fig_010.jpg)
InfectPreventionApp as implemented in Ref. 47].
9 Conclusion and future work
In this paper, a novel approach for digital infection prevention based on context-based adaptation was presented in order to support a person in recognizing and defusing threatening situations depending on a pathogen. Although the approach has been validated as part of a student’s master thesis, 47 where the concept has been shown to be feasible in principle, it remains to be seen whether the concept will work in practice. This requires further evaluation under real conditions with many people. Although the approach leverages BLE to discover and exchange information with entities involved in infection prevention, it is generic in terms of future technologies that could be useful for infection prevention. This is achieved through the use of Prevention Profiles that process the data generated by the available sensors in order to determine and evaluate the context of a person being supported and then propose protection measures to them. In this respect, future work could focus on the research of new sensors in order to be able to incorporate further helpful information into the context of a person. Such sensors, for example, could use techniques from the field of computer vision to estimate the distance to the surrounding people or objects. This would allow the person being supported to estimate the distance independently of BLE to their surrounding people or objects. Along with that techniques from the field of computer vision could also be used to recognize if other people have applied protection measures that can also protect the person being supported (e.g. wearing a mask).
Another aspect is the use of the presented approach to gather new epidemiological insights. In the presented concept, the Contextualized State was used to evaluate a situation and it was assumed that all data collected and used for the evaluation will remain locally on the device of the person being supported. The question of whether and which data should be shared with health authorities was not considered. In combination with the IPCM, however, this could open up new possibilities for the evaluation of decentrally collected data. The data could be used, for example, to identify the circumstances that favor the transmission of a pathogen or to explore which protection measures are effective and when.
-
Research ethics: Not applicable.
-
Informed consent: Not applicable.
-
Author contributions: All authors have accepted responsibility for the entire content of this manuscript and approved its submission.
-
Use of Large Language Models, AI and Machine Learning Tools: DeepL for language improvements.
-
Conflict of interest: The authors state no conflict of interest.
-
Research funding: None declared.
-
Data availability: The raw data can be obtained on request from the corresponding author.
References
1. Groß, U. Kurzlehrbuch Medizinische Mikrobiologie und Infektiologie, 2nd ed.; Thieme: Stuttgart, 2009.10.1055/b-002-37773Suche in Google Scholar
2. Witzel, S., Arnold, U., Nagel, G., Vettin, J., Wilck, A., Paul, T., Bach, M., Eds. Pschyrembel Klinisches Wörterbuch, 261st ed; de Gruyter: Berlin, New York, 2007.Suche in Google Scholar
3. Kiehl, W. Infektionsschutz und Infektionsepidemiologie: Fachwörter – Definitionen – Interpretationen; Robert Koch-Institut: Berlin, 2015.Suche in Google Scholar
4. Witte, W. Die Grippe-Pandemie 1918-20 in der medizinischen Debatte. Ber. Wissenschaftsgesch. 2006, 29 (1), 5–20. https://doi.org/10.1002/bewi.200501184.Suche in Google Scholar PubMed
5. Zhu, N.; Zhang, D.; Wang, W.; Li, X.; Yang, B.; Song, J.; Zhao, X.; Huang, B.; Shi, W.; Lu, R.; Niu, P.; Zhan, F.; Ma, X.; Wang, D.; Xu, W.; Wu, G.; Gao, G. F.; Tan, W. A Novel Coronavirus from Patients with Pneumonia in China, 2019. N. Engl. J. Med. 2020, 382 (8), 727–733; https://doi.org/10.1056/NEJMoa2001017.Suche in Google Scholar PubMed PubMed Central
6. Gorbalenya, A. E.; Baker, S. C.; Baric, R. S.; de Groot, R. J.; Drosten, C.; Gulyaeva, A. A.; Haagmans, B. L.; Lauber, C.; Leontovich, A. M.; Neuman, B. W.; Penzar, D.; Perlman, S.; Poon, L. L. M.; Samborskiy, D. V.; Sidorov, I. A.; Sola, I.; Ziebuhr, J. The Species Severe Acute Respiratory Syndromerelated Coronavirus: Classifying 2019-nCoV and Naming it SARS-CoV-2. Nat. Microbiol. 2020, 5 (4), 536–544; https://doi.org/10.1038/s41564-020-0695-z.Suche in Google Scholar PubMed PubMed Central
7. Li, Q.; Guan, X.; Wu, P.; Wang, X.; Zhou, L.; Tong, Y.; Ren, R.; Leung, K. S. M; Lau, E. H. Y.; Wong, J. Y.; Xing, X.; Xiang, N.; Wu, Y.; Li, C.; Chen, Q.; Li, D.; Liu, T.; Zhao, J.; Liu, M.; Tu, W.; Chen, C.; Jin, L.; Yang, R.; Wang, Q.; Zhou, S.; Wang, R.; Liu, H.; Luo, Y.; Liu, Y.; Shao, G.; Li, H.; Tao, Z.; Yang, Y.; Deng, Z.; Liu, B.; Ma, Z.; Zhang, Y.; Shi, G.; Lam, T. T. Y.; Wu, J. T.; Gao, G. F.; Cowling, B. J.; Yang, B.; Leung, G. M.; Feng, Z. Early Transmission Dynamics in Wuhan, China, of Novel Coronavirus-Infected Pneumonia. N. Engl. J. Med. 2020, 382 (13), 1199–1207; https://doi.org/10.1056/NEJMoa2001316.Suche in Google Scholar PubMed PubMed Central
8. WHO. Coronavirus Disease (COVID-19) Pandemic. https://www.who.int/europe/emergencies/situations/covid-19 (accessed 2024-03-21).Suche in Google Scholar
9. WHO. WHO Coronavirus (COVID-19) Dashboard, 2023. https://covid19.who.int/ (accessed 2024-01-16).Suche in Google Scholar
10. Legendre, F.; Humbert, M.; Mermoud, A.; Lenders, V. Contact Tracing: An Overview of Technologies and Cyber Risks. arXiv 2020. https://doi.org/10.48550/ARXIV.2007.02806.Suche in Google Scholar
11. Naous, D.; Bonner, M.; Humbert, M.; Legner, C. Learning from the Past to Improve the Future. Bus. Inf. Syst. Eng. 2022, 64 (5), 597–614. https://doi.org/10.1007/s12599-022-00742-2.Suche in Google Scholar
12. Martin, T.; Karopoulos, G.; Hernández-Ramos, J. L.; Kambourakis, G.; Nai Fovino, I. Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps. Wirel. Commun. Mob. Comput. 2020, 2020, 1–29. https://doi.org/10.1155/2020/8851429.Suche in Google Scholar
13. Trivedi, A.; Vasisht, D. Digital Contact Tracing: Technologies, Shortcomings, and the Path Forward. ACM SIGCOMM Comput. Commun. Rev. 2020, 50 (4), 75–81. https://doi.org/10.1145/3431832.3431841.Suche in Google Scholar
14. Faragher, R.; Harle, R. Location Fingerprinting with Bluetooth Low Energy Beacons. IEEE J. Sel. Areas Commun. 2015, 33 (11), 2418–2428. https://doi.org/10.1109/JSAC.2015.2430281.Suche in Google Scholar
15. Maccari, L.; Cagno, V. Do We Need a Contact Tracing App? Comput. Commun. 2021, 166, 9–18. https://doi.org/10.1016/j.comcom.2020.11.007.Suche in Google Scholar PubMed PubMed Central
16. WHO. The First Few X (FFX): Cases and Contact Investigation Protocol for 2019-Novel Coronavirus (2019-nCoV) Infection, 2020. https://www.who.int/docs/default-source/coronaviruse/20200129-generic-ffx-protocol-2019-ncov.pdf (accessed 2024-01-11).Suche in Google Scholar
17. RKI. Kontaktpersonen-Nachverfolgung (KP-N) bei SARS-CoV-2-Infektionen, 2022. https://www.rki.de/DE/Content/InfAZ/N/Neuartiges_Coronavirus/Kontaktperson/Management.html (accessed 2023-06-24).Suche in Google Scholar
18. IHD. Ireland’s Response to COVID-19 (Coronavirus), 2020. https://www.gov.ie/en/publication/a02c5a-what-is-happening/ (accessed 2024-11-19).Suche in Google Scholar
19. Katevas, K.; Haddadi, H.; Tokarchuk, L.; Clegg, R. G. Detecting Group Formations Using iBeacon Technology. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct; ACM, 2016; pp 742–752.10.1145/2968219.2968281Suche in Google Scholar
20. Naghdi, S.; O’Keefe, K. Detecting and Correcting for Human Obstacles in BLE Trilateration Using Artificial Intelligence. Sensors 2020, 20 (5), 1350. https://doi.org/10.3390/s20051350.Suche in Google Scholar PubMed PubMed Central
21. Haake, J. M.; Hussein, T.; Joop, B.; Lukosch, S.; Veiel, D.; Ziegler, J. Modeling and Exploiting Context for Adaptive Collaboration. Int. J. Coop. Inf. Syst. 2010, 19, 71–120. https://doi.org/10.1142/S0218843010002115.Suche in Google Scholar
22. Veiel, D. Eine Serviceorientierte Plattform Für Die Unterstützung Kontextbasierter Adaption Für Gruppen in Gemeinsamen Arbeitsbereichen; FernUniversität in Hagen, 2013. https://nbn-resolving.org/urn:nbn:de:hbz:708-29363 (accessed 2024-11-19).Suche in Google Scholar
23. Abowd, G. D.; Dey, A. K.; Brown, P. J.; Davies, N.; Smith, M.; Steggles, P. Towards a Better Understanding of Context and Context-Awareness. In Handheld and Ubiquitous Computing. International Conference on Ubiquitous Computing; Gellersen, H.-W., Ed. Lecture Notes in Computer Science; Springer: Berlin, Heidelberg, 1999; pp. 304–307.10.1007/3-540-48157-5_29Suche in Google Scholar
24. Bussmann, H., Ed. Lexikon der Sprachwissenschaft, 3rd ed.; Kröner: Stuttgart, 2002.Suche in Google Scholar
25. Wirtz, M. A., Ed. Dorsch – Lexikon der Psychologie, 20th ed.; Hogrefe: Bern, 2021.10.1024/85914-000Suche in Google Scholar
26. Prechtl, P., Burkard, F.-P., Eds. Metzler Lexikon Philosophie, 3rd ed.; J.B. Metzler: Stuttgart, 2008.10.1007/978-3-476-05469-2Suche in Google Scholar
27. Klimke, D., Lautmann, R., Stäheli, U., Weischer, C., Wienold, H., Eds. Lexikon zur Soziologie, 6th ed; Springer: Wiesbaden, 2020.10.1007/978-3-658-30834-6Suche in Google Scholar
28. Schilit, B.; Adams, N.; Want, R. Context-Aware Computing Applications. In 1994 First Workshop on Mobile Computing Systems and Applications, 1994; pp. 85–90.10.1109/WMCSA.1994.16Suche in Google Scholar
29. Strang, T.; Linnhoff-Popien, C. A Context Modeling Survey. In Workshop Proceedings. First International Workshop on Advanced Context Modelling, Reasoning And Management at UbiComp 2004: Nottingham, 2004. https://elib.dlr.de/7444/ (accessed 2024-11-19).Suche in Google Scholar
30. Gruber, T. R. A Translation Approach to Portable Ontology Specifications. Knowl. Acquis. 1993, 5 (2), 199–220. https://doi.org/10.1006/knac.1993.1008.Suche in Google Scholar
31. Hesse, W. Ontologie(n). Inform.-Spektrum 2002, 25 (6), 477–480. https://doi.org/10.1007/s002870200265.Suche in Google Scholar
32. Furrer, F. J. Eine kurze Geschichte der Ontologie. Inform.-Spektrum 2014, 37 (4), 308–317. https://doi.org/10.1007/s00287-012-0642-3.Suche in Google Scholar
33. Busse, J.; Humm, B.; Lübbert, C.; Moelter, F.; Reibold, A.; Rewald, M.; Schlüter, V.; Seiler, B.; Tegtmeier, E.; Zeh, T. Was Bedeutet Eigentlich Ontologie? Inform. Spektrum 2014, 37 (4), 286–297; https://doi.org/10.1007/s00287-012-0619-2.Suche in Google Scholar
34. W3C. OWL 2 Web Ontology Language Document Overview, 2nd ed., 2012. https://www.w3.org/TR/owl2-overview/ (accessed 2024-01-11).Suche in Google Scholar
35. Lamy, J.-B. Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2; Apress: Berkeley, 2021.Suche in Google Scholar
36. Bock, C.; Fokoue, A.; Haase, P.; Hoekstra, R.; Horrocks, I.; Ruttenberg, A.; Sattler, U.; Smith, M. OWL 2 Web Ontology Language Structural Specification and Functional-Style Syntax, 2nd ed., 2012. https://www.w3.org/TR/2012/REC-owl2-syntax-20121211 (accessed 2023-06-28).Suche in Google Scholar
37. Duerst, M.; Suignard, M. Internationalized Resource Identifiers (IRIs); RFC 3987, 2005. https://www.rfc-editor.org/rfc/rfc3987.txt (accessed 2024-01-07).10.17487/rfc3987Suche in Google Scholar
38. Kumar, S.; Gautam, V.; Kumar, A.; Kumari, P. Social Distancing Using Bluetooth Low Energy to Prevent the Spread of COVID-19. In 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence); IEEE, 2021; pp 563–567.10.1109/Confluence51648.2021.9377096Suche in Google Scholar
39. Arun, A.; Gupta, A.; Bhatka, S.; Komatineni, S.; Bharadia, D., Space-Time Social Distancing to Monitor the Spread of COVID-19. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems. SenSys ‘20: The 18th ACM Conference on Embedded Networked Sensor Systems; Virtual Event Japan: ACM, 2020; pp. 750–751 (accessed 2023-09-27).10.1145/3384419.3430601Suche in Google Scholar
40. Zualkernan, I.; Al-Kofahi, O.; Khan, A.; Imam Zaidi, S. R.; Hassan, K. Towards Automating Social Distance Violations Using AIoT. In 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI); IEEE, 2021; pp 524–528.10.1109/RTSI50628.2021.9597210Suche in Google Scholar
41. Gad, A.; ElBary, G.; Alkhedher, M.; Ghazal, M. Vision-based Approach for Automated Social Distance Violators Detection. In 2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT); IEEE, 2020; pp 1–5.10.1109/3ICT51146.2020.9311969Suche in Google Scholar
42. Giuliano, R.; Mazzenga, F.; Innocenti, E.; Vizzarri, A. Integration of Video and Radio Technologies for Social Distancing. IEEE Commun. Mag. 2021, 59 (9), 30–35. https://doi.org/10.1109/MCOM.011.2001216.Suche in Google Scholar
43. Bian, S.; Zhou, B.; Bello, H.; Lukowicz, P. A Wearable Magnetic Field Based Proximity Sensing System for Monitoring COVID-19 Social Distancing. In Proceedings of the 2020 ACM International Symposium on Wearable Computers; ACM, 2020; pp. 22–26. https://dl.acm.org/doi/10.1145/3410531.3414313 (accessed 2024–11–19).10.1145/3410531.3414313Suche in Google Scholar
44. Sporny, M.; Longley, D.; Sabadello, M.; Reed, D.; Steele, O.; Allen, C. Decentralized Identifiers (DIDs) v1.0, 2022. https://www.w3.org/TR/did-core/ (accessed 2023–04–12).Suche in Google Scholar
45. Sibirski, A. DLT-basiertes Identitätsmanagement: Selbstsouveräne Identitätsverwaltung Auf Basis von Hyperledger Indy. FernUniversität Hagen: Hagen, 2019.Suche in Google Scholar
46. SIG. Bluetooth Core Specification v5.4, 2023. https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc_id=556599 (accessed 2024-01-08).Suche in Google Scholar
47. Sibirski, A. Einsatz kontextbasierter Adaption zur Erkennung und Vermeidung bedrohlicher Situationen in Zeiten einer Pandemie am Beispiel von SARS-CoV-2. FernUniversität Hagen: Hagen, 2024.Suche in Google Scholar
© 2025 the author(s), published by De Gruyter, Berlin/Boston
This work is licensed under the Creative Commons Attribution 4.0 International License.
Artikel in diesem Heft
- Frontmatter
- Special Issue on “Usable Safety and Security”
- Editorial on Special Issue “Usable Safety and Security”
- The tension of usable safety, security and privacy
- Research Articles
- Keeping the human in the loop: are autonomous decisions inevitable?
- iSAM – towards a cost-efficient and unobtrusive experimental setup for situational awareness measurement in administrative crisis management exercises
- Breaking down barriers to warning technology adoption: usability and usefulness of a messenger app warning bot
- Use of context-based adaptation to defuse threatening situations in times of a pandemic
- Cyber hate awareness: information types and technologies relevant to the law enforcement and reporting center domain
- From usable design characteristics to usable information security policies: a reconceptualisation
- A case study of the MEUSec method to enhance user experience and information security of digital identity wallets
- Evaluating GDPR right to information implementation in automated insurance decisions
- Human-centered design of a privacy assistant and its impact on perceived transparency and intervenability
- ChatAnalysis revisited: can ChatGPT undermine privacy in smart homes with data analysis?
- Special Issue on “AI and Robotic Systems in Healthcare”
- Editorial on Special Issue “AI and Robotic Systems in Healthcare”
- AI and robotic systems in healthcare
- Research Articles
- Exploring technical implications and design opportunities for interactive and engaging telepresence robots in rehabilitation – results from an ethnographic requirement analysis with patients and health-care professionals
- Investigating the effects of embodiment on presence and perception in remote physician video consultations: a between-participants study comparing a tablet and a telepresence robot
- From idle to interaction – assessing social dynamics and unanticipated conversations between social robots and residents with mild cognitive impairment in a nursing home
- READY? – Reflective dialog tool on issues relating to the use of robotic systems for nursing care
- AI-based character generation for disease stories: a case study using epidemiological data to highlight preventable risk factors
- Research Articles
- Towards future of work in immersive environments and its impact on the Quality of Working Life: a scoping review
- A formative evaluation: co-designing tools to prepare vulnerable young people for participating in technology development
Artikel in diesem Heft
- Frontmatter
- Special Issue on “Usable Safety and Security”
- Editorial on Special Issue “Usable Safety and Security”
- The tension of usable safety, security and privacy
- Research Articles
- Keeping the human in the loop: are autonomous decisions inevitable?
- iSAM – towards a cost-efficient and unobtrusive experimental setup for situational awareness measurement in administrative crisis management exercises
- Breaking down barriers to warning technology adoption: usability and usefulness of a messenger app warning bot
- Use of context-based adaptation to defuse threatening situations in times of a pandemic
- Cyber hate awareness: information types and technologies relevant to the law enforcement and reporting center domain
- From usable design characteristics to usable information security policies: a reconceptualisation
- A case study of the MEUSec method to enhance user experience and information security of digital identity wallets
- Evaluating GDPR right to information implementation in automated insurance decisions
- Human-centered design of a privacy assistant and its impact on perceived transparency and intervenability
- ChatAnalysis revisited: can ChatGPT undermine privacy in smart homes with data analysis?
- Special Issue on “AI and Robotic Systems in Healthcare”
- Editorial on Special Issue “AI and Robotic Systems in Healthcare”
- AI and robotic systems in healthcare
- Research Articles
- Exploring technical implications and design opportunities for interactive and engaging telepresence robots in rehabilitation – results from an ethnographic requirement analysis with patients and health-care professionals
- Investigating the effects of embodiment on presence and perception in remote physician video consultations: a between-participants study comparing a tablet and a telepresence robot
- From idle to interaction – assessing social dynamics and unanticipated conversations between social robots and residents with mild cognitive impairment in a nursing home
- READY? – Reflective dialog tool on issues relating to the use of robotic systems for nursing care
- AI-based character generation for disease stories: a case study using epidemiological data to highlight preventable risk factors
- Research Articles
- Towards future of work in immersive environments and its impact on the Quality of Working Life: a scoping review
- A formative evaluation: co-designing tools to prepare vulnerable young people for participating in technology development