dsstodol@daimi.aau.dk (David S. Stodolsky) (09/28/90)
This is a selection of project ideas I prepared for our students. 3) Infection management and privacy There have been several attempts in recent years to develop concepts of infection management applicable to both electronic and biologic agents. These have for the most part been definitional (e. g., safe "HEX" vs. safe sex). Analysis of epidemics as social phenomenon, that include risk management and privacy dimensions, is one way to get meaningful integration and useful cross-fertilization of approaches and techniques. Infection management has acquired a new domain with the growth of computer networks and their now demonstrated vulnerability to "viruses" (McAfee, 1989) and "worms" (Spafford, 1989). Infectious disease continues to be a priority area in health care and is a major initiative area in health care research in Denmark. Mann (1990) suggests that a new AIDS like pandemic could occur unless some new approach is taken to manage infectious agents. Law suits may force health care organizations to adopt new methods for protection of persons from infection, even before infectious agents have been identified (Reuters, 1990). Particularly with the growth of the AIDS problem, the questions of privacy and individual integrity have assumed new importance. These developments suggest a move toward information intensive management strategies. Stodolsky (1989a, 1990) describes a way to use distributed databases and cryptographic methods to manage epidemics without compromising individual privacy. Stodolsky (1989b) describes how a related approach could be used to control the spread of infections on networks. The same theoretical models can be applied to control of infection in the blood supply (Stodolsky, 1987), to the spread of "inside" information on stock markets, and to the management of sensitive information in a variety of other settings. The number of reports of infections of computer systems has reached a level where they cannot be coped with manually. Some automated way of sorting and processing these reports (and taking appropriate emergency actions) is needed. It is likely that experience gained in control of infections on networks could be applied to human populations in the future, as personal computers become widespread. While truly secure systems require distributed database technology, valuable experience could be gained with centralized systems. For instance, a matchmaking (kontakt formidling) system using a voice message - telephone interface could be used to build up records permitting the tracing of chains of sexually transmitted infections (Stodolsky, 1989a). Several matchmaking systems are currently operating on the Internet, but their implementation make them inappropriate for the functions considered here. Project ideas: 3.1. Systemic control of infections on computer networks 3.2. Development of a group "calendar" (appointment diary) system 3.3. Using conditional privacy in screening telephone calls 3.4. Using conditional privacy in meeting management 3.5. Voice message simulation of distributed epidemiological control 3.6. Network matchmaker for infection control 3.7. Software for democratic drug trials References: Mann, J. (1990, June 30). The global lesson of AIDS. New Scientist, 30. McAfee, J. D. (1989, February 13). Managing the virus threat. ComputerWorld, 89-91, 93-96. Reuters. (1990, July 18). Aids victims sue Red Cross over infected blood. International Herald-Tribune, (33,402), 2. Spafford, E. H. (1989). The internet worm: Crisis and aftermath. Communication of the ACM, 32(6), 678-687. Stodolsky, D. (1987). Personlig integritet och blodkvalitet. Proposal submitted to Delegationen foer Social Forskning, Socialdepartementet, Stockholm. Stodolsky, D. S. (1989a). Brugerforvaltet datakommunikationssystem til bekaempelse af seksuelt overfoerbare infektionssygdomme [Secure Distributed Databases for Epidemiological Control] [Machine-readable file]. A. Walker (Ed.). (1989, November 9). Secure Distributed Databases for Epidemiological Control. Misc.security [Usenet]. (Available via anonymous file transfer protocol from PYRITE.RUTGERS.EDU: File name "~security/epidemic-control" or by electronic mail from security-request@rutgers.edu at Rutgers University, Piscataway, NJ, USA). Stodolsky, D. (1989b). Net hormones: Part 1 - Infection control assuming cooperation among computers [Machine-readable file]. Van Wyk, K. R. (1989, March 30). Several reports available via anonymous FTP. Virus-L Digest, 2(77). Abstract republished in van Wyk, K. R. (1989, April 24). Virus papers (finally) available on Lehigh LISTSERV. Virus-L Digest, 2(98). (Available via anonymous file transfer protocol from LLL-WINKEN.LLNL.GOV: File name "~ftp/virus-l/docs/net.hormones" at Livermore, CA: Lawrence Livermore National Laboratory, Nuclear Chemistry Division and IBM1.CC.LEHIGH.EDU: File name "HORMONES NET" at Bethlehem, PA: Lehigh University. And by electronic mail from LISTSERV@LEHIIBM1.BITNET: File name "HORMONES NET" at Lehigh University) Stodolsky, D. (1990, March 11). Toward Personal Risk Management: Information Technology Policy for the AIDS Pandemic. Comp.groupware [Usenet]. - -- David S. Stodolsky Office: + 45 46 75 77 11 x 21 38 Department of Computer Science Home: + 45 31 55 53 50 Bldg. 20.2, Roskilde University Center Internet: david@ruc.dk Post Box 260, DK-4000 Roskilde, Denmark Fax: + 45 46 75 74 01