[comp.virus] Infection management and privacy

dsstodol@daimi.aau.dk (David S. Stodolsky) (09/28/90)

This is a selection of project ideas I prepared for our students.

3) Infection management and privacy

There have been several attempts in recent years to develop concepts
of infection management applicable to both electronic and biologic
agents. These have for the most part been definitional (e. g., safe
"HEX" vs. safe sex).  Analysis of epidemics as social phenomenon, that
include risk management and privacy dimensions, is one way to get
meaningful integration and useful cross-fertilization of approaches
and techniques.

Infection management has acquired a new domain with the growth of
computer networks and their now demonstrated vulnerability to
"viruses" (McAfee, 1989) and "worms" (Spafford, 1989). Infectious
disease continues to be a priority area in health care and is a major
initiative area in health care research in Denmark. Mann (1990)
suggests that a new AIDS like pandemic could occur unless some new
approach is taken to manage infectious agents. Law suits may force
health care organizations to adopt new methods for protection of
persons from infection, even before infectious agents have been
identified (Reuters, 1990).  Particularly with the growth of the AIDS
problem, the questions of privacy and individual integrity have
assumed new importance. These developments suggest a move toward
information intensive management strategies. Stodolsky (1989a, 1990)
describes a way to use distributed databases and cryptographic methods
to manage epidemics without compromising individual privacy. Stodolsky
(1989b) describes how a related approach could be used to control the
spread of infections on networks. The same theoretical models can be
applied to control of infection in the blood supply (Stodolsky, 1987),
to the spread of "inside" information on stock markets, and to the
management of sensitive information in a variety of other settings.

The number of reports of infections of computer systems has reached a
level where they cannot be coped with manually.  Some automated way of
sorting and processing these reports (and taking appropriate emergency
actions) is needed.  It is likely that experience gained in control of
infections on networks could be applied to human populations in the
future, as personal computers become widespread.

While truly secure systems require distributed database technology,
valuable experience could be gained with centralized systems. For
instance, a matchmaking (kontakt formidling) system using a voice
message - telephone interface could be used to build up records
permitting the tracing of chains of sexually transmitted infections
(Stodolsky, 1989a). Several matchmaking systems are currently
operating on the Internet, but their implementation make them
inappropriate for the functions considered here.

Project ideas:

3.1.	Systemic control of infections on computer networks
3.2.	Development of a group "calendar" (appointment diary) system
3.3.	Using conditional privacy in screening telephone calls
3.4.	Using conditional privacy in meeting management
3.5.	Voice message simulation of distributed epidemiological control
3.6.	Network matchmaker for infection control
3.7.	Software for democratic drug trials

References:

Mann, J. (1990, June 30). The global lesson of AIDS. New Scientist, 30.

McAfee, J. D. (1989, February 13). Managing the virus threat.
ComputerWorld, 89-91, 93-96.

Reuters. (1990, July 18). Aids victims sue Red Cross over infected
blood.  International Herald-Tribune, (33,402), 2.

Spafford, E. H. (1989). The internet worm: Crisis and aftermath.
Communication of the ACM, 32(6), 678-687.

Stodolsky, D. (1987). Personlig integritet och blodkvalitet. Proposal
submitted to Delegationen foer Social Forskning, Socialdepartementet,
Stockholm.

Stodolsky, D. S. (1989a). Brugerforvaltet datakommunikationssystem til
bekaempelse af seksuelt overfoerbare infektionssygdomme [Secure
Distributed Databases for Epidemiological Control] [Machine-readable
file]. A. Walker (Ed.). (1989, November 9). Secure Distributed
Databases for Epidemiological Control. Misc.security [Usenet].
(Available via anonymous file transfer protocol from
PYRITE.RUTGERS.EDU: File name "~security/epidemic-control" or by
electronic mail from security-request@rutgers.edu at Rutgers
University, Piscataway, NJ, USA).

Stodolsky, D. (1989b). Net hormones: Part 1 - Infection control
assuming cooperation among computers [Machine-readable file]. Van Wyk,
K. R. (1989, March 30). Several reports available via anonymous FTP.
Virus-L Digest, 2(77).  Abstract republished in van Wyk, K. R. (1989,
April 24). Virus papers (finally) available on Lehigh LISTSERV.
Virus-L Digest, 2(98). (Available via anonymous file transfer protocol
from LLL-WINKEN.LLNL.GOV: File name "~ftp/virus-l/docs/net.hormones"
at Livermore, CA: Lawrence Livermore National Laboratory, Nuclear
Chemistry Division and IBM1.CC.LEHIGH.EDU: File name "HORMONES NET" at
Bethlehem, PA: Lehigh University. And by electronic mail from
LISTSERV@LEHIIBM1.BITNET: File name "HORMONES NET" at Lehigh
University)

Stodolsky, D. (1990, March 11). Toward Personal Risk Management:
Information Technology Policy for the AIDS Pandemic. Comp.groupware
[Usenet].

- --
David S. Stodolsky                  Office: + 45 46 75 77 11 x 21 38
Department of Computer Science                Home: + 45 31 55 53 50
Bldg. 20.2, Roskilde University Center        Internet: david@ruc.dk
Post Box 260, DK-4000 Roskilde, Denmark        Fax: + 45 46 75 74 01