Serveur d'exploration sur les relations entre la France et l'Australie

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Epidemic Contact Tracing via Communication Traces

Identifieur interne : 002B61 ( Pmc/Corpus ); précédent : 002B60; suivant : 002B62

Epidemic Contact Tracing via Communication Traces

Auteurs : Katayoun Farrahi ; Rémi Emonet ; Manuel Cebrian

Source :

RBID : PMC:4006791

Abstract

Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.


Url:
DOI: 10.1371/journal.pone.0095133
PubMed: 24787614
PubMed Central: 4006791

Links to Exploration step

PMC:4006791

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Epidemic Contact Tracing via Communication Traces</title>
<author>
<name sortKey="Farrahi, Katayoun" sort="Farrahi, Katayoun" uniqKey="Farrahi K" first="Katayoun" last="Farrahi">Katayoun Farrahi</name>
<affiliation>
<nlm:aff id="aff1">
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Emonet, Remi" sort="Emonet, Remi" uniqKey="Emonet R" first="Rémi" last="Emonet">Rémi Emonet</name>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Cebrian, Manuel" sort="Cebrian, Manuel" uniqKey="Cebrian M" first="Manuel" last="Cebrian">Manuel Cebrian</name>
<affiliation>
<nlm:aff id="aff3">
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff4">
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff5">
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</nlm:aff>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">PMC</idno>
<idno type="pmid">24787614</idno>
<idno type="pmc">4006791</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4006791</idno>
<idno type="RBID">PMC:4006791</idno>
<idno type="doi">10.1371/journal.pone.0095133</idno>
<date when="2014">2014</date>
<idno type="wicri:Area/Pmc/Corpus">002B61</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">002B61</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a" type="main">Epidemic Contact Tracing via Communication Traces</title>
<author>
<name sortKey="Farrahi, Katayoun" sort="Farrahi, Katayoun" uniqKey="Farrahi K" first="Katayoun" last="Farrahi">Katayoun Farrahi</name>
<affiliation>
<nlm:aff id="aff1">
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Emonet, Remi" sort="Emonet, Remi" uniqKey="Emonet R" first="Rémi" last="Emonet">Rémi Emonet</name>
<affiliation>
<nlm:aff id="aff2">
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</nlm:aff>
</affiliation>
</author>
<author>
<name sortKey="Cebrian, Manuel" sort="Cebrian, Manuel" uniqKey="Cebrian M" first="Manuel" last="Cebrian">Manuel Cebrian</name>
<affiliation>
<nlm:aff id="aff3">
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff4">
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</nlm:aff>
</affiliation>
<affiliation>
<nlm:aff id="aff5">
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</nlm:aff>
</affiliation>
</author>
</analytic>
<series>
<title level="j">PLoS ONE</title>
<idno type="eISSN">1932-6203</idno>
<imprint>
<date when="2014">2014</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">
<p>Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.</p>
</div>
</front>
<back>
<div1 type="bibliography">
<listBibl>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Freifeld, Cc" uniqKey="Freifeld C">CC Freifeld</name>
</author>
<author>
<name sortKey="Mekaru, Sr" uniqKey="Mekaru S">SR Mekaru</name>
</author>
<author>
<name sortKey="Tomasulo, Af" uniqKey="Tomasulo A">AF Tomasulo</name>
</author>
<author>
<name sortKey="Brownstein, Js" uniqKey="Brownstein J">JS Brownstein</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Vespignani, A" uniqKey="Vespignani A">A Vespignani</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Goncalves, B" uniqKey="Goncalves B">B Gonçalves</name>
</author>
<author>
<name sortKey="Hu, H" uniqKey="Hu H">H Hu</name>
</author>
<author>
<name sortKey="Ramasco, Jj" uniqKey="Ramasco J">JJ Ramasco</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Balcan, D" uniqKey="Balcan D">D Balcan</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
<author>
<name sortKey="Goncalves, B" uniqKey="Goncalves B">B Gonçalves</name>
</author>
<author>
<name sortKey="Hu, H" uniqKey="Hu H">H Hu</name>
</author>
<author>
<name sortKey="Ramasco, Jj" uniqKey="Ramasco J">JJ Ramasco</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eagle, N" uniqKey="Eagle N">N Eagle</name>
</author>
<author>
<name sortKey="Pentland, As" uniqKey="Pentland A">AS Pentland</name>
</author>
<author>
<name sortKey="Lazer, D" uniqKey="Lazer D">D Lazer</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Jones, Jj" uniqKey="Jones J">JJ Jones</name>
</author>
<author>
<name sortKey="Settle, Je" uniqKey="Settle J">JE Settle</name>
</author>
<author>
<name sortKey="Bond, Rm" uniqKey="Bond R">RM Bond</name>
</author>
<author>
<name sortKey="Fariss, Cj" uniqKey="Fariss C">CJ Fariss</name>
</author>
<author>
<name sortKey="Marlow, C" uniqKey="Marlow C">C Marlow</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Jones, Jh" uniqKey="Jones J">JH Jones</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Salathe, M" uniqKey="Salathe M">M Salathé</name>
</author>
<author>
<name sortKey="Kazandjieva, M" uniqKey="Kazandjieva M">M Kazandjieva</name>
</author>
<author>
<name sortKey="Lee, Jw" uniqKey="Lee J">JW Lee</name>
</author>
<author>
<name sortKey="Levis, P" uniqKey="Levis P">P Levis</name>
</author>
<author>
<name sortKey="Feldman, Mw" uniqKey="Feldman M">MW Feldman</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Stehle, J" uniqKey="Stehle J">J Stehlé</name>
</author>
<author>
<name sortKey="Voirin, N" uniqKey="Voirin N">N Voirin</name>
</author>
<author>
<name sortKey="Barrat, A" uniqKey="Barrat A">A Barrat</name>
</author>
<author>
<name sortKey="Cattuto, C" uniqKey="Cattuto C">C Cattuto</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Isella, L" uniqKey="Isella L">L Isella</name>
</author>
<author>
<name sortKey="Romano, M" uniqKey="Romano M">M Romano</name>
</author>
<author>
<name sortKey="Barrat, A" uniqKey="Barrat A">A Barrat</name>
</author>
<author>
<name sortKey="Cattuto, C" uniqKey="Cattuto C">C Cattuto</name>
</author>
<author>
<name sortKey="Colizza, V" uniqKey="Colizza V">V Colizza</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Wesolowski, A" uniqKey="Wesolowski A">A Wesolowski</name>
</author>
<author>
<name sortKey="Eagle, N" uniqKey="Eagle N">N Eagle</name>
</author>
<author>
<name sortKey="Tatem, Aj" uniqKey="Tatem A">AJ Tatem</name>
</author>
<author>
<name sortKey="Smith, Dl" uniqKey="Smith D">DL Smith</name>
</author>
<author>
<name sortKey="Noor, Am" uniqKey="Noor A">AM Noor</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Eames, Kt" uniqKey="Eames K">KT Eames</name>
</author>
<author>
<name sortKey="Keeling, Mj" uniqKey="Keeling M">MJ Keeling</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Crandall, Dj" uniqKey="Crandall D">DJ Crandall</name>
</author>
<author>
<name sortKey="Backstrom, L" uniqKey="Backstrom L">L Backstrom</name>
</author>
<author>
<name sortKey="Cosley, D" uniqKey="Cosley D">D Cosley</name>
</author>
<author>
<name sortKey="Suri, S" uniqKey="Suri S">S Suri</name>
</author>
<author>
<name sortKey="Huttenlocher, D" uniqKey="Huttenlocher D">D Huttenlocher</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Tsimring, L" uniqKey="Tsimring L">L Tsimring</name>
</author>
<author>
<name sortKey="Huerta, R" uniqKey="Huerta R">R Huerta</name>
</author>
</analytic>
</biblStruct>
<biblStruct>
<analytic>
<author>
<name sortKey="Madan, A" uniqKey="Madan A">A Madan</name>
</author>
<author>
<name sortKey="Cebrian, M" uniqKey="Cebrian M">M Cebrian</name>
</author>
<author>
<name sortKey="Moturu, S" uniqKey="Moturu S">S Moturu</name>
</author>
<author>
<name sortKey="Farrahi, K" uniqKey="Farrahi K">K Farrahi</name>
</author>
<author>
<name sortKey="Pentland, S" uniqKey="Pentland S">S Pentland</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<pmc article-type="research-article">
<pmc-dir>properties open_access</pmc-dir>
<front>
<journal-meta>
<journal-id journal-id-type="nlm-ta">PLoS One</journal-id>
<journal-id journal-id-type="iso-abbrev">PLoS ONE</journal-id>
<journal-id journal-id-type="publisher-id">plos</journal-id>
<journal-id journal-id-type="pmc">plosone</journal-id>
<journal-title-group>
<journal-title>PLoS ONE</journal-title>
</journal-title-group>
<issn pub-type="epub">1932-6203</issn>
<publisher>
<publisher-name>Public Library of Science</publisher-name>
<publisher-loc>San Francisco, USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="pmid">24787614</article-id>
<article-id pub-id-type="pmc">4006791</article-id>
<article-id pub-id-type="publisher-id">PONE-D-13-30076</article-id>
<article-id pub-id-type="doi">10.1371/journal.pone.0095133</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Research Article</subject>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Biology and Life Sciences</subject>
<subj-group>
<subject>Population Biology</subject>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Computer and Information Sciences</subject>
<subj-group>
<subject>Computer Modeling</subject>
</subj-group>
<subj-group>
<subject>Information Technology</subject>
<subj-group>
<subject>Data Mining</subject>
</subj-group>
</subj-group>
<subj-group>
<subject>Network Analysis</subject>
<subj-group>
<subject>Social Networks</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Engineering and Technology</subject>
<subj-group>
<subject>Signal Processing</subject>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Medicine and Health Sciences</subject>
<subj-group>
<subject>Epidemiology</subject>
<subj-group>
<subject>Infectious Disease Epidemiology</subject>
<subject>Social Epidemiology</subject>
<subject>Spatial Epidemiology</subject>
</subj-group>
</subj-group>
</subj-group>
<subj-group subj-group-type="Discipline-v2">
<subject>Social Sciences</subject>
<subj-group>
<subject>Sociology</subject>
<subj-group>
<subject>Communications</subject>
<subject>Social Mobility</subject>
</subj-group>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Epidemic Contact Tracing via Communication Traces</article-title>
<alt-title alt-title-type="running-head">Epidemic Contact Tracing via Communication Traces</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Farrahi</surname>
<given-names>Katayoun</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="corresp" rid="cor1">
<sup>*</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Emonet</surname>
<given-names>Rémi</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cebrian</surname>
<given-names>Manuel</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<xref ref-type="aff" rid="aff5">
<sup>5</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>1</label>
<addr-line>Department of Computing, Goldsmiths, University of London, London, United Kingdom</addr-line>
</aff>
<aff id="aff2">
<label>2</label>
<addr-line>Department of Machine Learning, Laboratoire Hubert Curien, Saint-Etienne, France</addr-line>
</aff>
<aff id="aff3">
<label>3</label>
<addr-line>Media Laboratory, Massachusetts Institute of Technology, Cambridge, Massachusetts, United States of America</addr-line>
</aff>
<aff id="aff4">
<label>4</label>
<addr-line>Department of Computer Science and Engineering, University of California at San Diego, La Jolla, California, United States of America</addr-line>
</aff>
<aff id="aff5">
<label>5</label>
<addr-line>National Information and Communications Technology Australia, Melbourne, Victoria, Australia</addr-line>
</aff>
<contrib-group>
<contrib contrib-type="editor">
<name>
<surname>Lambiotte</surname>
<given-names>Renaud</given-names>
</name>
<role>Editor</role>
<xref ref-type="aff" rid="edit1"></xref>
</contrib>
</contrib-group>
<aff id="edit1">
<addr-line>University of Namur, Belgium</addr-line>
</aff>
<author-notes>
<corresp id="cor1">* E-mail:
<email>k.farrahi@gold.ac.uk</email>
</corresp>
<fn fn-type="conflict">
<p>
<bold>Competing Interests: </bold>
The authors have declared that no competing interests exist.</p>
</fn>
<fn fn-type="con">
<p>Conceived and designed the experiments: KF RE MC. Performed the experiments: KF RE. Analyzed the data: KF RE MC. Wrote the paper: KF RE MC.</p>
</fn>
</author-notes>
<pub-date pub-type="collection">
<year>2014</year>
</pub-date>
<pub-date pub-type="epub">
<day>1</day>
<month>5</month>
<year>2014</year>
</pub-date>
<volume>9</volume>
<issue>5</issue>
<elocation-id>e95133</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>7</month>
<year>2013</year>
</date>
<date date-type="accepted">
<day>24</day>
<month>3</month>
<year>2014</year>
</date>
</history>
<permissions>
<copyright-year>2014</copyright-year>
<copyright-holder>Farrahi et al</copyright-holder>
<license>
<license-p>This is an open-access article distributed under the terms of the
<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License</ext-link>
, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.</license-p>
</license>
</permissions>
<abstract>
<p>Traditional contact tracing relies on knowledge of the interpersonal network of physical interactions, where contagious outbreaks propagate. However, due to privacy constraints and noisy data assimilation, this network is generally difficult to reconstruct accurately. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network, and they may provide a valuable tool for contact tracing. Motivated by this assumption, we propose a model for contact tracing, where an infection is spreading in the physical interpersonal network, which can never be fully recovered; and contact tracing is occurring in a communication network which acts as a proxy for the first. We apply this dual model to a dataset covering 72 students over a 9 month period, for which both the physical interactions as well as the mobile communication traces are known. Our results suggest that a wide range of contact tracing strategies may significantly reduce the final size of the epidemic, by mainly affecting its peak of incidence. However, we find that for low overlap between the face-to-face and communication interaction network, contact tracing is only efficient at the beginning of the outbreak, due to rapidly increasing costs as the epidemic evolves. Overall, contact tracing via mobile phone communication traces may be a viable option to arrest contagious outbreaks.</p>
</abstract>
<funding-group>
<funding-statement>Manuel Cebrian is funded by the Australian Government as represented by The Department of Broadband, Communications and the Digital Economy, and The Australian Research Council through the ICT Centre of Excellence program. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.</funding-statement>
</funding-group>
<counts>
<page-count count="11"></page-count>
</counts>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>There is great potential to deepen our understanding of disease dynamics through the analysis of digital traces of individual and collective behaviour
<xref rid="pone.0095133-Salath1" ref-type="bibr">[1]</xref>
<xref rid="pone.0095133-Christakis1" ref-type="bibr">[7]</xref>
. This is because, traditionally, the collection of how epidemics propagate in a population has been based on individual self-reporting, known to be severely biased
<xref rid="pone.0095133-Eagle1" ref-type="bibr">[8]</xref>
<xref rid="pone.0095133-Jones1" ref-type="bibr">[10]</xref>
. The bias is documented both at the individual level, self-reporting of symptoms, but also about the recollection of recent face-to-face interactions that potentially lead to contagion
<xref rid="pone.0095133-Pentland1" ref-type="bibr">[11]</xref>
. Increasing awareness of personal data privacy are unlikely to lighten this limitation in the near future
<xref rid="pone.0095133-Barabsi1" ref-type="bibr">[12]</xref>
.</p>
<p>We already have some examples in the digital epidemiology direction which use large-scale digital traces for simulation. For instance, a large-scale sociotechnological network based on Facebook data was used to study the role of community structure in disease dynamics
<xref rid="pone.0095133-Salath3" ref-type="bibr">[13]</xref>
. Also, close proximity interactions (CPIs) captured using wireless sensors were able to map the fine-grained, face-to-face interactions of a community
<xref rid="pone.0095133-Salath4" ref-type="bibr">[14]</xref>
. By studying the CPIs on an American high school community and recovering the contact network, new prevention strategies were designed with the potential to be more effective than random immunization. Infectious disease dynamics have been simulated focusing on the temporal and heterogeneity aspects considering CPIs sensed over a two day period at a conference using RFID tags
<xref rid="pone.0095133-Stehl1" ref-type="bibr">[15]</xref>
.</p>
<p>While these previously investigated sources of digital sensing (Facebook and CPIs from wearable badges) are advantageous in that they capture large scale interactions in a continuous manner giving a more complete estimate of human interactions in reality, they also present some limitations. Online social networks represent online social behaviours which differ from physical proximity interactions whereby disease transmission occurs and may fail to capture the fine-grained, face-to-face interaction dynamics relevant for disease transmission
<xref rid="pone.0095133-Jones1" ref-type="bibr">[10]</xref>
. CPI monitoring using wearable badges is a costly and limited resource requiring participants to wear an additional sensing device and therefore cannot readily be extended to the population at large; CPIs may not be readily extended to larger scales in the immediate future (e.g. Salathé
<italic>et al.</italic>
consider one school day
<xref rid="pone.0095133-Salath4" ref-type="bibr">[14]</xref>
, Stehlé
<italic>et al.</italic>
consider two conference days
<xref rid="pone.0095133-Stehl1" ref-type="bibr">[15]</xref>
, and Isella
<italic>et al.</italic>
consider one week
<xref rid="pone.0095133-Isella1" ref-type="bibr">[16]</xref>
).</p>
<p>In this regard, mobile phones provide a promising resource as they are ubiquitously carried by the population, irrespectively of socio-economic status, and provide a much larger-scale, data-driven opportunity for epidemiology. Further, mobile phones are carried by people when they travel overseas, potentially serving as a global physical proximity sensor. Its pervasiveness in countries under development, where pandemic prevention is most critical, makes then a viable option
<xref rid="pone.0095133-Wesolowski1" ref-type="bibr">[17]</xref>
.</p>
<p>Our present effort focuses on exploiting these phone communication and interaction traces for epidemic simulation and contact tracing
<xref rid="pone.0095133-Eames1" ref-type="bibr">[18]</xref>
. Communication traces obtained by mobile phones are known to be good proxies for the physical interaction network
<xref rid="pone.0095133-Crandall1" ref-type="bibr">[19]</xref>
<xref rid="pone.0095133-Cho1" ref-type="bibr">[21]</xref>
, and therefore our goal is to consider how to simulate a contact tracing model over mobile sensed interaction data. We aim at exploring the potential of communication datasets to serve as a realistic cue for physical proximity interactions at large.</p>
<p>We develop a model where the infection takes place over the close-proximity physical network (which can never be fully recovered in reality), and assume contact tracing occurs on a differing network, in this case a communication (phone, sms) inferred one. We explore the contact tracing model proposed in detail, particularly focusing on tracing efforts on noisy networks, representing a perturbed subset of the ideal network. Finally, we simulate our proposed model over the real mobile phone interaction data dynamics, demonstrating mobile phone interactions are a promising tool for large-scale epidemic simulations, and mobile phone communication logs can be used as a concrete source for contact tracing reducing the effects of an epidemic. Just as optimizing immunization strategies is of great interest if only incomplete immunization is possible
<xref rid="pone.0095133-Salath4" ref-type="bibr">[14]</xref>
, optimizing contact tracing is of great interest if tracing with incomplete or noisy information is the only possibility. In this regard, we also consider the complex relationship between physical and digital interaction overlap and contact tracing effort. This study can inform health policies aiming to use communication traces for contact tracing.</p>
</sec>
<sec sec-type="methods" id="s2">
<title>Methods</title>
<sec id="s2a">
<title>Contact Tracing</title>
<p>We consider a population of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e001.jpg"></inline-graphic>
</inline-formula>
individuals whose connections to each other form a graph. The degree
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e002.jpg"></inline-graphic>
</inline-formula>
of a node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e003.jpg"></inline-graphic>
</inline-formula>
is the number of links between
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e004.jpg"></inline-graphic>
</inline-formula>
and the other individuals in the population. The mean degree of the network is represented by
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e005.jpg"></inline-graphic>
</inline-formula>
and in random graphs, this degree distribution is Poissonian. Therefore, we do not assume that all nodes have the same degree: the overall node degree distribution forms a Poisson distribution. Individuals can be in one of four different states, susceptible (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e006.jpg"></inline-graphic>
</inline-formula>
), infected (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e007.jpg"></inline-graphic>
</inline-formula>
), traced (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e008.jpg"></inline-graphic>
</inline-formula>
), or recovered (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e009.jpg"></inline-graphic>
</inline-formula>
). The following state transitions are then defined as in the contact tracing model by Tsimring and Huerta
<xref rid="pone.0095133-Tsimring1" ref-type="bibr">[22]</xref>
, and the symbols are defined in
<xref ref-type="table" rid="pone-0095133-t001">Table 1</xref>
. Following, we summarize the contact tracing model.</p>
<table-wrap id="pone-0095133-t001" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.t001</object-id>
<label>Table 1</label>
<caption>
<title>Dual model symbol description.</title>
</caption>
<alternatives>
<graphic id="pone-0095133-t001-1" xlink:href="pone.0095133.t001"></graphic>
<table frame="hsides" rules="groups">
<colgroup span="1">
<col align="left" span="1"></col>
<col align="center" span="1"></col>
</colgroup>
<tbody>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e010.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">population size</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e011.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">a small interval of time.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e012.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">constant determining infection rate.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e013.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">the ideal network in which the epidemic is actually spreading.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e014.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">the number of infected neighbours of node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e015.jpg"></inline-graphic>
</inline-formula>
in network
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e016.jpg"></inline-graphic>
</inline-formula>
.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e017.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">constant determining random tracing rate.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e018.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">constant determining contact tracing rate.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e019.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">the dual network which is used for contact tracing.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e020.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">the number of traced neighbours of node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e021.jpg"></inline-graphic>
</inline-formula>
in network
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e022.jpg"></inline-graphic>
</inline-formula>
.</td>
</tr>
<tr>
<td align="left" rowspan="1" colspan="1">
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e023.jpg"></inline-graphic>
</inline-formula>
</td>
<td align="left" rowspan="1" colspan="1">tracing-policy constant controlling the fading time for contact tracing.</td>
</tr>
</tbody>
</table>
</alternatives>
</table-wrap>
<sec id="s2a1">
<title>
<bold>Infection</bold>
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e024.jpg"></inline-graphic>
</inline-formula>
</title>
<p>Initially, the whole population is susceptible to infection. One node is subsequently randomly infected, which then starts to infect its neighbours and may initiate an outbreak. The probability that a susceptible node becomes infected is given by
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e025.jpg"></inline-graphic>
</inline-formula>
, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e026.jpg"></inline-graphic>
</inline-formula>
represents the number of infectious neighbours of node n and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e027.jpg"></inline-graphic>
</inline-formula>
is a small time interval.</p>
</sec>
<sec id="s2a2">
<title>
<bold>Tracing</bold>
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e028.jpg"></inline-graphic>
</inline-formula>
</title>
<p>We assume there is no spontaneous recovery, and individuals becomes traced for a certain period of time after which recovery takes place and the individual becomes removed. There are two types of tracing efforts to identify infected individuals, random checking and contact tracing. Random checking is done by choosing an arbitrary node with probability
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e029.jpg"></inline-graphic>
</inline-formula>
. Contact tracing of a node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e030.jpg"></inline-graphic>
</inline-formula>
is done with probability
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e031.jpg"></inline-graphic>
</inline-formula>
, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e032.jpg"></inline-graphic>
</inline-formula>
is the number of neighbours of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e033.jpg"></inline-graphic>
</inline-formula>
which are in the traced state
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e034.jpg"></inline-graphic>
</inline-formula>
. For simplification, traced people can no longer infect other nodes. Additionally, if an infectious individual does not become traced, in the current model it remains infected. An infected node cannot recover (or become removed) unless it is traced.</p>
</sec>
<sec id="s2a3">
<title>
<bold>Removal</bold>
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e035.jpg"></inline-graphic>
</inline-formula>
</title>
<p>Traced individuals are transformed into the removed state, or recovered state, and are unable to become infected again. A node can recover from the traced state with a probability given by
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e036.jpg"></inline-graphic>
</inline-formula>
.</p>
<p>The contact tracing model can be summarized by the following equations.
<disp-formula id="pone.0095133.e037">
<graphic xlink:href="pone.0095133.e037.jpg" position="anchor" orientation="portrait"></graphic>
<label>(1)</label>
</disp-formula>
<disp-formula id="pone.0095133.e038">
<graphic xlink:href="pone.0095133.e038.jpg" position="anchor" orientation="portrait"></graphic>
<label>(2)</label>
</disp-formula>
<disp-formula id="pone.0095133.e039">
<graphic xlink:href="pone.0095133.e039.jpg" position="anchor" orientation="portrait"></graphic>
<label>(3)</label>
</disp-formula>
</p>
</sec>
</sec>
<sec id="s2b">
<title>Dual Model for Contact Tracing</title>
<p>We first study a dual network topology which accounts for differing edge formations between the infection and tracing networks. Given the contact tracing model defined by
<xref ref-type="disp-formula" rid="pone.0095133.e037">equations 1</xref>
<xref ref-type="disp-formula" rid="pone.0095133.e039">3</xref>
, the underlying assumption traditionally is that
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e040.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e041.jpg"></inline-graphic>
</inline-formula>
are obtained from one network
<xref rid="pone.0095133-Tsimring1" ref-type="bibr">[22]</xref>
. Here, we propose to extend this assumption to introduce two networks, one in which disease is spreading, used in
<xref ref-type="disp-formula" rid="pone.0095133.e037">equation 1</xref>
, and one in which tracing occurs, used in
<xref ref-type="disp-formula" rid="pone.0095133.e038">equation 2</xref>
. Our proposed extension, which we refer to as the dual model since it considers two differing networks, represents a more realistic situation in practice which we simulate and validate using a concrete data source from mobile sensed interactions.</p>
<p>We define the network of physical interactions as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e042.jpg"></inline-graphic>
</inline-formula>
. This is the network in which infection transmission takes place. It is also the network from which the number of infected nodes in proximity with node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e043.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e044.jpg"></inline-graphic>
</inline-formula>
, is obtained. In this paper, we assume that this network can never be fully recovered due to, for example, people forgetting whom they interacted with, contagion through strangers and objects, or the impossibility of ever obtaining a complete network of face to face interactions of a population at large
<xref rid="pone.0095133-Pentland1" ref-type="bibr">[11]</xref>
. We therefore assume the existence of a dual network,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e045.jpg"></inline-graphic>
</inline-formula>
, which is a noisy subset of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e046.jpg"></inline-graphic>
</inline-formula>
. The derivation of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e047.jpg"></inline-graphic>
</inline-formula>
for simulation purposes is described in section “Dual Network Topology”. We assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e048.jpg"></inline-graphic>
</inline-formula>
can be obtained by concrete means since it is the network from which tracing will take place. We consider a novel and automatic means of obtaining
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e049.jpg"></inline-graphic>
</inline-formula>
in this paper, by considering
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e050.jpg"></inline-graphic>
</inline-formula>
to be taken from ubiquitously sensed interactions obtained by people’s mobile phones. The parameter
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e051.jpg"></inline-graphic>
</inline-formula>
is taken from the dual network
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e052.jpg"></inline-graphic>
</inline-formula>
, which differs from
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e053.jpg"></inline-graphic>
</inline-formula>
(in
<xref rid="pone.0095133-Tsimring1" ref-type="bibr">[22]</xref>
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e054.jpg"></inline-graphic>
</inline-formula>
is taken from the same network as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e055.jpg"></inline-graphic>
</inline-formula>
).</p>
<p>Next, we propose a formal method for obtaining
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e056.jpg"></inline-graphic>
</inline-formula>
from
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e057.jpg"></inline-graphic>
</inline-formula>
, and later demonstrate the differences in simulating such a dual network topology in comparison to an ideal topology. We then demonstrate the successful use of contact tracing on the dual network based on phone call history by simulating the dual network topology over real interaction and communication patterns obtained by a community’s mobile phone logs.</p>
</sec>
<sec id="s2c">
<title>Dual Network Topology</title>
<p>We define below the process by which we generate the dual network from the ideal network. By removing a portion of the actual ties we simulate a scenario in which the communication traces are only capturing a subset of the actual links. By adding new ties, we simulate the case where communication traces provide dyadic interactions that do not happen in the real world, only in the digital realm. One important measure for our study is the overlap between the two networks, which corresponds to the proportion of links that are present in both networks. The dual network topology is generated as follows:</p>
<list list-type="order">
<list-item>
<p>First generate the physical proximity network,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e058.jpg"></inline-graphic>
</inline-formula>
, in which disease is spreading.</p>
<list list-type="bullet">
<list-item>
<p>Generate the proximity network of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e059.jpg"></inline-graphic>
</inline-formula>
nodes. We assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e060.jpg"></inline-graphic>
</inline-formula>
in all of our
<italic>simulated</italic>
experiments.</p>
</list-item>
<list-item>
<p>Generate N*K unique links, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e061.jpg"></inline-graphic>
</inline-formula>
is the average outgoing node degree. This results in
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e062.jpg"></inline-graphic>
</inline-formula>
bi-directional links, i.e. the disease can propagate in both directions.</p>
</list-item>
</list>
</list-item>
<list-item>
<p>Second, generate the dual network,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e063.jpg"></inline-graphic>
</inline-formula>
, which is a noisy version of the physical proximity network</p>
<list list-type="bullet">
<list-item>
<p>Remove
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e064.jpg"></inline-graphic>
</inline-formula>
links (and thus
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e065.jpg"></inline-graphic>
</inline-formula>
bi-directional links) from the network, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e066.jpg"></inline-graphic>
</inline-formula>
is the average number of forgotten links (per node) which cannot be traced for some arbitrary reason.</p>
</list-item>
<list-item>
<p>Add
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e067.jpg"></inline-graphic>
</inline-formula>
new links which were not among the original ones.</p>
</list-item>
</list>
</list-item>
</list>
<p>In the reported experiments we used
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e068.jpg"></inline-graphic>
</inline-formula>
. The first motivation to having
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e069.jpg"></inline-graphic>
</inline-formula>
is to be able to vary the overlap between networks while keeping a constant size (number of links) for the tracing network. We thus do not need to apply a corrective factor the
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e070.jpg"></inline-graphic>
</inline-formula>
parameters. The second motivation comes from the observation that in real applications,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e071.jpg"></inline-graphic>
</inline-formula>
can be either greater than
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e072.jpg"></inline-graphic>
</inline-formula>
(e.g., if the contact tracing uses a highly connected online social network) or less than
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e073.jpg"></inline-graphic>
</inline-formula>
(e.g., if we use meeting agendas of people). Even if we use
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e074.jpg"></inline-graphic>
</inline-formula>
, we provide in
<xref ref-type="fig" rid="pone-0095133-g001">figure 1</xref>
an example of the impact of varying
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e075.jpg"></inline-graphic>
</inline-formula>
in the case of an overlap of 8%.</p>
<fig id="pone-0095133-g001" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g001</object-id>
<label>Figure 1</label>
<caption>
<title>Average maximum and total infected over
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e076.jpg"></inline-graphic>
</inline-formula>
.</title>
<p>Average maximum and total number of infected people for a network overlap
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e077.jpg"></inline-graphic>
</inline-formula>
, while varying the ratio
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e078.jpg"></inline-graphic>
</inline-formula>
between the number of removed and added edges. The known network (used for contact tracing) is supposed to be a noisy version of the real network (in which epidemics spread), obtained by removing some edges and adding new ones.</p>
</caption>
<graphic xlink:href="pone.0095133.g001"></graphic>
</fig>
<p>Note that
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e079.jpg"></inline-graphic>
</inline-formula>
is a noise factor parameter used to generate the dual network. This parameter
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e080.jpg"></inline-graphic>
</inline-formula>
is related to the percentage of overlap,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e081.jpg"></inline-graphic>
</inline-formula>
, between
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e082.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e083.jpg"></inline-graphic>
</inline-formula>
using the following relation:
<disp-formula id="pone.0095133.e084">
<graphic xlink:href="pone.0095133.e084.jpg" position="anchor" orientation="portrait"></graphic>
<label>(4)</label>
</disp-formula>
</p>
<p>These equations can be re-derived with the help of
<xref ref-type="fig" rid="pone-0095133-g002">figure 2</xref>
.</p>
<fig id="pone-0095133-g002" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g002</object-id>
<label>Figure 2</label>
<caption>
<title>Overlap illustration.</title>
<p>Illustration of the overlap in terms of links between the ideal network and the dual network depending on
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e085.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e086.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e087.jpg"></inline-graphic>
</inline-formula>
. The intersection of the two networks, in blue, is of size
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e088.jpg"></inline-graphic>
</inline-formula>
and the union is of size
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e089.jpg"></inline-graphic>
</inline-formula>
.</p>
</caption>
<graphic xlink:href="pone.0095133.g002"></graphic>
</fig>
</sec>
<sec id="s2d">
<title>Dataset</title>
<p>We present the dataset that motivates our dual model, and whose parameters, network structure, and dynamics is used in the rest of this paper. The participants in the study represent
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e090.jpg"></inline-graphic>
</inline-formula>
of the total population of an undergraduate dormitory in a North American university previously explored for other applications
<xref rid="pone.0095133-Madan1" ref-type="bibr">[23]</xref>
. The dataset consists of the mobile phone logs of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e091.jpg"></inline-graphic>
</inline-formula>
participants, roughly equally distributed across all four academic years, and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e092.jpg"></inline-graphic>
</inline-formula>
male. The participants used Windows Mobile devices for data collection as their primary phones with their existing voice plans. Data was collected over a
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e093.jpg"></inline-graphic>
</inline-formula>
month period between October 2008– June 2009. The data used in this study consists of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e094.jpg"></inline-graphic>
</inline-formula>
Bluetooth interactions,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e095.jpg"></inline-graphic>
</inline-formula>
phone call records, and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e096.jpg"></inline-graphic>
</inline-formula>
SMS records. The study had IRB approval by the Massachusetts Institute of Technology Committee on the Use of Humans as Experimental Subjects (MIT COUHES) and written informed consent from participants; further details of the dataset can be found here
<xref rid="pone.0095133-Madan1" ref-type="bibr">[23]</xref>
.</p>
<p>We consider interaction data logged by the mobile phones. Bluetooth sensors monitored the physical proximity interaction. Other non-physical interactions were monitored by phone communication logs including phone calls and SMS activity. We only consider phone communication and proximity interaction with other study participants (known devices to the study). The data has been previously studied in the framework of real-life health and obesity diffusion
<xref rid="pone.0095133-Madan1" ref-type="bibr">[23]</xref>
,
<xref rid="pone.0095133-Madan2" ref-type="bibr">[24]</xref>
, opinion diffusion
<xref rid="pone.0095133-Madan3" ref-type="bibr">[25]</xref>
, as well as community relationship and interaction pattern analysis
<xref rid="pone.0095133-Farrahi1" ref-type="bibr">[26]</xref>
.</p>
<p>For each of the mobile phone proximity interaction (Bluetooth) and communication (call and SMS) events sensed, we consider the number of events (regardless of their duration), including missed calls. Users correspond to nodes, and undirected edges to interactions. The edges are weighed by the number of events. By considering the number of events, we can readily combine the two types of phone communication logs (calls and SMS). By considering undirected interactions, the proximity interactions can be easily compared to the communication data since phone communication is directed but Bluetooth is undirected. The data is therefore symmetrized, and we assume undirected links. The static average daily networks for the phone communication and physical proximity interactions can be seen in
<xref ref-type="fig" rid="pone-0095133-g003">figure 3</xref>
(a) and (b), respectively. Note, the nodes are consistent between the two visualizations and the physical proximity represents a highly connected network in comparison to the phone communication network. In this paper (in section “Contact tracing with empirical data in a dual network configuration”), we show that simulating the epidemic spread on network (b) though including its dynamic nature and tracing only based on network (a) suffices in reducing the effects of an epidemic, even given its sparse nature in this dataset.</p>
<fig id="pone-0095133-g003" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g003</object-id>
<label>Figure 3</label>
<caption>
<title>Static network visualizations of the data.</title>
<p>The static networks obtained by the overall average number of daily mobile phone (a) communication (call and sms) and (b) physical proximity interactions.</p>
</caption>
<graphic xlink:href="pone.0095133.g003"></graphic>
</fig>
<p>Next, we consider the overlap between the real physical proximity and communication networks (
<xref ref-type="fig" rid="pone-0095133-g003">figure 3</xref>
(a) and (b)) in more detail. We obtain the percentage of overlap between the communication network,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e097.jpg"></inline-graphic>
</inline-formula>
, and the physical proximity network,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e098.jpg"></inline-graphic>
</inline-formula>
, in
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
, representing a key parameter for our dual model. For each participant, we compute the percentage of overlap within their community, which can be found using the relation
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e099.jpg"></inline-graphic>
</inline-formula>
. We plot the distribution of the average user’s overlap on a log-log scale. In
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
(a), the overlap is considered over an accumulated static network over the entire duration of the study, whereas in (b) the monthly accumulated static networks are considered. First we consider the overall networks. The maximum overlap is
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e100.jpg"></inline-graphic>
</inline-formula>
, meaning one user communicates by phone with about a quarter of the people they interacted with in the community over the duration of the study. There is never more than
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e101.jpg"></inline-graphic>
</inline-formula>
overlap between these networks. The minimum is no overlap (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e102.jpg"></inline-graphic>
</inline-formula>
), meaning some users never called anyone within the community of people they interacted with. The overall network overlap (in terms of common edges) between the mobile phone network and the Bluetooth interaction network is
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e103.jpg"></inline-graphic>
</inline-formula>
. We consider this overlap between the two networks obtained by mobile phone sensed data as an approximate realistic measure for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e104.jpg"></inline-graphic>
</inline-formula>
, where we set
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e105.jpg"></inline-graphic>
</inline-formula>
as a lower bound of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e106.jpg"></inline-graphic>
</inline-formula>
to account for additional measurement error. We can see from
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
(a), that the probability of having less than
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e107.jpg"></inline-graphic>
</inline-formula>
overlap is quite high, and drops significantly for greater than
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e108.jpg"></inline-graphic>
</inline-formula>
overlap. We do not assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e109.jpg"></inline-graphic>
</inline-formula>
to be equivalent to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e110.jpg"></inline-graphic>
</inline-formula>
, however, as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e111.jpg"></inline-graphic>
</inline-formula>
can never be fully obtained in reality, we use the mobile phone data to obtain an estimate of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e112.jpg"></inline-graphic>
</inline-formula>
. Our experimental results are presented over a range of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e113.jpg"></inline-graphic>
</inline-formula>
, though
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e114.jpg"></inline-graphic>
</inline-formula>
is used as a data-driven approximation and is the focus for the discussion.</p>
<fig id="pone-0095133-g004" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g004</object-id>
<label>Figure 4</label>
<caption>
<title>Real data-driven network overlap.</title>
<p>(a) Distribution of % overlap between the overall communication and Bluetooth networks on a log-log scale. (b) Monthly variations in the % overlap between the communication and Bluetooth networks averaged over all users.</p>
</caption>
<graphic xlink:href="pone.0095133.g004"></graphic>
</fig>
<p>In
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
(b) we plot the monthly variations in the overlap between the phone and Bluetooth networks. We plot three curves: (1) ‘overall’ is the mean overall average overlap between
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e115.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e116.jpg"></inline-graphic>
</inline-formula>
computed over the
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e117.jpg"></inline-graphic>
</inline-formula>
months from (a), (2) ‘monthly’ is only considering the interactions which occurred over the specified month, and (3) ‘cum mo’ is the cumulative monthly, and is all the interactions which occurred up until the specified month. We can see in a specific month, the overlap between these networks is much lower than the average. With the data we are using, we can see that the cumulative monthly approaches the overall monthly after about
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e118.jpg"></inline-graphic>
</inline-formula>
months. This indicates that with our data we approach the mean after about
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e119.jpg"></inline-graphic>
</inline-formula>
months.</p>
</sec>
</sec>
<sec id="s3">
<title>Simulation Results</title>
<sec id="s3a">
<title>Dual Networks</title>
<p>First we simulate the various network configurations to compare the spread of infection characteristics over the full range of the overlap parameter
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e120.jpg"></inline-graphic>
</inline-formula>
. For simulation, we assume a population of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e121.jpg"></inline-graphic>
</inline-formula>
nodes and plot results as averages over
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e122.jpg"></inline-graphic>
</inline-formula>
random trials. The model parameters are as follows,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e123.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e124.jpg"></inline-graphic>
</inline-formula>
, and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e125.jpg"></inline-graphic>
</inline-formula>
to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e126.jpg"></inline-graphic>
</inline-formula>
. We assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e127.jpg"></inline-graphic>
</inline-formula>
. This corresponds to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e128.jpg"></inline-graphic>
</inline-formula>
days,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e129.jpg"></inline-graphic>
</inline-formula>
days, and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e130.jpg"></inline-graphic>
</inline-formula>
ranging over 10 to 0 days and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e131.jpg"></inline-graphic>
</inline-formula>
is chosen to be less than 1 second. These parameters correspond to a familiar SIR-type model with rescaled parameters and similar dynamics as in
<xref rid="pone.0095133-Tsimring1" ref-type="bibr">[22]</xref>
. For comparison, the realistic infectious periods for various infectious diseases can be found in Table 5.1 in
<xref rid="pone.0095133-Stehl2" ref-type="bibr">[27]</xref>
. The optimal network case (considered in
<xref rid="pone.0095133-Tsimring1" ref-type="bibr">[22]</xref>
) occurs at
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e132.jpg"></inline-graphic>
</inline-formula>
, representing 100% overlap between the infectious and tracing networks. The minimal network overlap,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e133.jpg"></inline-graphic>
</inline-formula>
, suggested by real data is also highlighted in the results. For every simulation, there is one initial randomly selected infectious case. In the theoretical simulations (not using the real data), we assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e134.jpg"></inline-graphic>
</inline-formula>
.</p>
<sec id="s3a1">
<title>Impact of tracing and network overlap on the size of the outbreak</title>
<p>
<xref ref-type="fig" rid="pone-0095133-g005">Figure 5</xref>
presents how the peak of the epidemic is affected by the overlap
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e135.jpg"></inline-graphic>
</inline-formula>
, with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e136.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e137.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e138.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e139.jpg"></inline-graphic>
</inline-formula>
. We are considering in
<xref ref-type="fig" rid="pone-0095133-g005">figure 5</xref>
(a) the value of the peak of the epidemic (i.e., the maximum value in curves such as in
<xref ref-type="fig" rid="pone-0095133-g006">figure 6</xref>
). In general, the greater the overlap between the tracing and disease spreading networks, the more effective contact tracing is. More precisely, the maximum number of infected people decays exponentially with the network overlap (linear slope in a log scale). The intensity of decay increasing with the contact tracing rate
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e140.jpg"></inline-graphic>
</inline-formula>
.</p>
<fig id="pone-0095133-g005" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g005</object-id>
<label>Figure 5</label>
<caption>
<title>Theoretical epidemic simulations over varying tracing efforts and network overlap.</title>
<p>(a) The maximum number of infected individuals (representing the peak of the epidemic), (b) its time of occurrence, and (c)-(d) the overall number of infected individuals on log and non-log scales, respectively; all plotted as a function of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e141.jpg"></inline-graphic>
</inline-formula>
, with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e142.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e143.jpg"></inline-graphic>
</inline-formula>
. The legend shows the range of contact tracing effort, with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e144.jpg"></inline-graphic>
</inline-formula>
to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e145.jpg"></inline-graphic>
</inline-formula>
. We can see in (a) that contact tracing is effective in reducing the peak number of infected people with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e146.jpg"></inline-graphic>
</inline-formula>
to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e147.jpg"></inline-graphic>
</inline-formula>
times fewer maximum infected cases between
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e148.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e149.jpg"></inline-graphic>
</inline-formula>
. We plot a line at
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e150.jpg"></inline-graphic>
</inline-formula>
, representing a minimal network overlap which corresponds to the values suggested by the analysis of mobile phone data (see
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
). The greater the overlap between the tracing and disease spreading networks, the more effective the tracing. At the ideal but unrealistic case of 100% overlap, a
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e151.jpg"></inline-graphic>
</inline-formula>
of 2.5 allows to get
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e152.jpg"></inline-graphic>
</inline-formula>
times fewer maximum infected people in comparison to the case with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e153.jpg"></inline-graphic>
</inline-formula>
. A low overlap such as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e154.jpg"></inline-graphic>
</inline-formula>
has little effect on the size of the outbreak (the overall number of infected individuals does not decrease much), but still the peak number of infected cases is lowered. With higher overlap, the peak of infections not only decreases in intensity but also gets delayed (c).</p>
</caption>
<graphic xlink:href="pone.0095133.g005"></graphic>
</fig>
<fig id="pone-0095133-g006" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g006</object-id>
<label>Figure 6</label>
<caption>
<title>Time varying simulation results of the ideal network scenario and the proposed dual network topology.</title>
<p>The infected population plot as a function of time for (a)
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e164.jpg"></inline-graphic>
</inline-formula>
and (b) a network overlap of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e165.jpg"></inline-graphic>
</inline-formula>
, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e166.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e167.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e168.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e169.jpg"></inline-graphic>
</inline-formula>
. Contact tracing is always beneficial, even when there is a small overlap between
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e170.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e171.jpg"></inline-graphic>
</inline-formula>
. We observe that contact tracing becomes increasingly effective as the number of infections increases in both network topologies (a) and (b). However, contact tracing becomes decreasingly effective as the number of infections decreases, particularly in the dual network topology case. This can be seen by the worsened effects of the second and sometimes third peaks for the dual network case (e.g., with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e172.jpg"></inline-graphic>
</inline-formula>
).</p>
</caption>
<graphic xlink:href="pone.0095133.g006"></graphic>
</fig>
<p>However, plots from
<xref ref-type="fig" rid="pone-0095133-g005">figures 5</xref>
(c) and 5 (d) suggest that the total number of infected people behaves differently from the peak value of the epidemic. With a small network overlap (e.g.,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e155.jpg"></inline-graphic>
</inline-formula>
), an increased contact tracing rate only slightly changes the total number of infected people. It is only with higher overlap (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e156.jpg"></inline-graphic>
</inline-formula>
) that the contact tracing rate becomes a key factor in reducing the total size of the epidemic.</p>
<p>We are showing, in
<xref ref-type="fig" rid="pone-0095133-g005">figure 5</xref>
(b), the time at which the peak of the epidemic occurs. This peak occurs earlier when the contact tracing rate is increased. This is due to the fact that the peak is smaller and thus reached earlier. When the tracing rate is high (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e157.jpg"></inline-graphic>
</inline-formula>
), we observe that an increased overlap tends to delay the occurrence of the peak. This reflects the ability of contact tracing (with strong overlap) to effectively slow down the spread of the disease.</p>
</sec>
<sec id="s3a2">
<title>Temporal impact of contact tracing</title>
<p>The time-varying nature of the epidemic can be seen in
<xref ref-type="fig" rid="pone-0095133-g006">figures 6</xref>
and
<xref ref-type="fig" rid="pone-0095133-g007">7</xref>
where the log of the average number of infected individuals is plot over time.
<xref ref-type="fig" rid="pone-0095133-g006">Figure 6</xref>
shows the case with full overlap (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e158.jpg"></inline-graphic>
</inline-formula>
) in comparison to the case with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e159.jpg"></inline-graphic>
</inline-formula>
overlap, which is the lower bound on the actual average network overlap found in the real social interaction networks (see
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
). We can see that even with such a low percentage of network overlap, contact tracing continues to be effective as it notably reduces the outbreak of the epidemic. In general, we observe that contact tracing becomes increasingly effective as the number of infected cases increases. In many of the cases there are two to three peaks in the epidemic and the number of infected individuals over time. The differences between the two network configurations
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e160.jpg"></inline-graphic>
</inline-formula>
(
<xref ref-type="fig" rid="pone-0095133-g006">figure 6</xref>
(a)) and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e161.jpg"></inline-graphic>
</inline-formula>
(
<xref ref-type="fig" rid="pone-0095133-g006">figure 6</xref>
(b)) becomes increasingly apparent as the amount of tracing increases whereby in reality, the more realistic network configuration (b) shows even a decreased amount of tracing
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e162.jpg"></inline-graphic>
</inline-formula>
may result in fewer cases and a more optimal tracing scenario. This occurs due to the fact that there is no second epidemic peak in this scenario (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e163.jpg"></inline-graphic>
</inline-formula>
), though with larger tracing effort, the epidemic is reduced significantly rapidly, leaving a great deal of the population susceptible for a second peak of infections.</p>
<fig id="pone-0095133-g007" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g007</object-id>
<label>Figure 7</label>
<caption>
<title>Time varying simulation results of our proposed contact tracing dual network topology while varying network overlap,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e183.jpg"></inline-graphic>
</inline-formula>
.</title>
<p>We observe the changing effects of the time-varying spread over
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e184.jpg"></inline-graphic>
</inline-formula>
. The difference in infectious spread over time becomes more apparent in the cases with two peaks, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e185.jpg"></inline-graphic>
</inline-formula>
particularly after the second peak, where an increase in network overlap results in fewer infected cases. Note, the log scale employed to make the graphs easily comparable tends to attenuate the differences between curves within a graph.</p>
</caption>
<graphic xlink:href="pone.0095133.g007"></graphic>
</fig>
<p>In
<xref ref-type="fig" rid="pone-0095133-g007">figure 7</xref>
we consider four cases of fixed
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e173.jpg"></inline-graphic>
</inline-formula>
to observe the difference in the effects of the percentage of network overlap in contact tracing. Again,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e174.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e175.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e176.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e177.jpg"></inline-graphic>
</inline-formula>
. We see the worst case occurs for no contact tracing based on social interactions (plot (a) where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e178.jpg"></inline-graphic>
</inline-formula>
). Different amounts of contact tracing have differing time-varying effects on the disease spreading. For small amounts of contact tracing there is only one peak ((b)
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e179.jpg"></inline-graphic>
</inline-formula>
). However as soon as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e180.jpg"></inline-graphic>
</inline-formula>
increases beyond that point, there are two peaks ((c)
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e181.jpg"></inline-graphic>
</inline-formula>
, (d)
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e182.jpg"></inline-graphic>
</inline-formula>
). This is due to the contact tracing becoming so effective that the number of cases drops rapidly, resulting in tracing becoming less effective. Note, this effect is much more attenuated in the dual network case (
<xref ref-type="fig" rid="pone-0095133-g006">figure 6</xref>
(a) versus (b)) which is the scenario closer to reality due to incomplete network information. This is due to having a smaller probability of tracing effectively (i.e. tracing an infected contact) given the smaller number of infectious cases, whereas in an optimal network case there is a higher chance of effective tracing given a smaller number of infections.</p>
</sec>
<sec id="s3a3">
<title>Why does contact tracing work with such low overlap?</title>
<p>Our results have shown that even with very small overlap between the two networks, contact tracing was still effective in limiting the peak size of the epidemic. With low overlap this behaviour might be surprising. It is actually explained by a simple fact: when using contact tracing, an increase in the number of infected people causes an increase in the tracing effort. This adaptation phenomenon is not present when only random tracing is used. We aim here at quantifying whether it is still worth doing contact tracing with a relatively small network overlap or if increasing random tracing is preferable.</p>
<p>We measure the tracing effort defined as the sum of the effort due to random tracing and the effort due to contact tracing:
<disp-formula id="pone.0095133.e186">
<graphic xlink:href="pone.0095133.e186.jpg" position="anchor" orientation="portrait"></graphic>
<label>(5)</label>
</disp-formula>
</p>
<p>What the formula encodes is that the random tracing (with intensity
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e187.jpg"></inline-graphic>
</inline-formula>
) is done on the population of both infected and susceptible nodes, as we cannot know in advance who is infected when doing tracing. Similarly, the effort due to contact tracing (with intensity
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e188.jpg"></inline-graphic>
</inline-formula>
) targets a population made of all the neighbours (in the tracing network) of traced nodes that are still either susceptible or infected.</p>
<p>In
<xref ref-type="fig" rid="pone-0095133-g008">figure 8</xref>
, we plot both the number of infected nodes and the total tracing effort. Results are presented for the low network overlap case,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e189.jpg"></inline-graphic>
</inline-formula>
, unless specified otherwise. The three dotted curves represent the tracing effort profile when no contact tracing is used. Considering the dotted blue curve with only random tracing,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e190.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e191.jpg"></inline-graphic>
</inline-formula>
, the tracing effort starts at 200 (1000 individuals times 0.20), and the number of infected nodes grows up to 300 (not shown), then it decreases greatly at the end of the epidemic. Generally, the tracing effort is smaller at the end of the epidemic because the traceable (susceptible and infected) population is reduced. Now, with the addition of contact tracing (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e192.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e193.jpg"></inline-graphic>
</inline-formula>
), the tracing effort increases greatly as the epidemic grows, however there is a significant reduction in the number of infected cases (below
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e194.jpg"></inline-graphic>
</inline-formula>
cases as opposed to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e195.jpg"></inline-graphic>
</inline-formula>
).</p>
<fig id="pone-0095133-g008" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g008</object-id>
<label>Figure 8</label>
<caption>
<title>Average temporal evolution of the tracing effort and the number of infected people with or without contact tracing.</title>
<p>Only the last curve considers the case with complete network overlap (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e196.jpg"></inline-graphic>
</inline-formula>
) while all other curves are with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e197.jpg"></inline-graphic>
</inline-formula>
.</p>
</caption>
<graphic xlink:href="pone.0095133.g008"></graphic>
</fig>
<p>Comparing the solid green curve (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e198.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e199.jpg"></inline-graphic>
</inline-formula>
) with the dotted red curve (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e200.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e201.jpg"></inline-graphic>
</inline-formula>
),
<xref ref-type="fig" rid="pone-0095133-g008">figure 8</xref>
results show that it can preferable to design a tracing policy that employs a lower random tracing rate but that uses contact tracing (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e202.jpg"></inline-graphic>
</inline-formula>
, even with an overlap of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e203.jpg"></inline-graphic>
</inline-formula>
). There is a trade-off to consider in terms of tracing effort over time, maximum tracing effort, and peak in number of infected individuals. While at the peak of the epidemic, the tracing effort does increase beyond the case with random tracing alone, this increase in tracing effort is not constant. The effort is less than for the random tracing effort alone at the start and end of the epidemic. Further, the peak of the epidemic is reduced when considering the addition of contact tracing with reduced random tracing (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e204.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e205.jpg"></inline-graphic>
</inline-formula>
vs.
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e206.jpg"></inline-graphic>
</inline-formula>
,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e207.jpg"></inline-graphic>
</inline-formula>
). A similar trend is observed for varying the level of random tracing, and considering a reduced random tracing with the inclusion of contact tracing. In
<xref ref-type="fig" rid="pone-0095133-g008">figure 8</xref>
, the case of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e208.jpg"></inline-graphic>
</inline-formula>
illustrates the positive impact of having perfect knowledge of the spreading network. We observe that better knowledge of the network highly reduces the size of the outbreak down to 26, while allowing for very low random tracing (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e209.jpg"></inline-graphic>
</inline-formula>
instead of, e.g.,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e210.jpg"></inline-graphic>
</inline-formula>
).</p>
<p>In general, contact tracing does not require a great effort at the beginning of the outbreak, but rapidly becomes costly when the epidemic evolves. However, it is effective in reducing the size of an epidemic with low network overlap, as is random tracing alone. An optimal solution to consider in future work may be to consider varying the random and contact tracing efforts over time to optimize costs as the epidemic evolves. A tracing policy including contact tracing allows to both adapt tracing to the number of infected people and exploit the known information about people’s interaction. Such policies have the potential of reducing the constant efforts required by random tracing and considering the use of contact tracing at particular intervals while containing an epidemic outbreak with minimal cost.</p>
</sec>
<sec id="s3a4">
<title>Relative proportion of contact tracing and random tracing</title>
<p>We observed that one benefit of contact tracing over pure random tracing is that it adapts the tracing effort to the number of detected infections and thus has a varying effort (and cost) over time. To further explore the role of contact tracing, we consider a setup where we assume a fixed amount of tracing effort is available. In such a case, we expect and observe that contact tracing with a low overlap is not advantageous.</p>
<p>In the simulation, we allow a fixed tracing budget (400 units). We allocate a fixed part of this budget to random tracing, the rest goes to contact tracing. In practice, we continuously adapt the
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e211.jpg"></inline-graphic>
</inline-formula>
parameters to spread the tracing budget between contact tracing and random tracing, in the desired proportions. A special case happens at instants when no individual is in state T (traced after being infected), mostly at the beginning of the epidemic. In this case, the full budget goes to random tracing.</p>
<p>
<xref ref-type="fig" rid="pone-0095133-g009">Figure 9</xref>
shows the average maximum (and total) number of infected people depending on the part of the budget dedicated to random tracing. We provide curves with two different network overlaps (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e212.jpg"></inline-graphic>
</inline-formula>
(left),
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e213.jpg"></inline-graphic>
</inline-formula>
(right)). With complete overlap, we clearly observe that contact tracing is strongly beneficial. Even with this perfect knowledge of the network, results show that spending more than half of the budget in contact tracing is not providing improvement (nor degradation). With low overlap (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e214.jpg"></inline-graphic>
</inline-formula>
), simulation results show that doing some contact tracing is better than not doing any but that it soon becomes detrimental. From these experiments we can conclude that, with low overlap, the biggest cause of the previously observed positive impact of contact tracing is actually the adaptive tracing effort.</p>
<fig id="pone-0095133-g009" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g009</object-id>
<label>Figure 9</label>
<caption>
<title>Average maximum and total numbers of infected people against the amount of random tracing effort.</title>
<p>Simulations consider a network overlap of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e215.jpg"></inline-graphic>
</inline-formula>
(left) and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e216.jpg"></inline-graphic>
</inline-formula>
(right), when the total tracing effort is constant (400).</p>
</caption>
<graphic xlink:href="pone.0095133.g009"></graphic>
</fig>
</sec>
</sec>
<sec id="s3b">
<title>Contact Tracing with Empirical Data in a Dual Network Configuration</title>
<p>In this section, we consider experiments on the real data. We apply the dual contact tracing model on the full empirical interaction and communication dataset obtained by mobile sensing. While the physical interactions obtained by Bluetooth are not a complete picture of the interaction history, they do represent a large portion of the interactions (subjects were explicitly asked to leave their Bluetooth on all the time). We consider two timescales over which the real interaction data is aggregated, daily and weekly. The two timescales are chosen to consider the time-specific nature of real data in our evaluation and to simulate the dynamics from real data considering two easily interpretable timescales. The results referred to as practice (as opposed to theory), are simulated only considering the empirical data (daily and weekly); the real interaction events occurring within the community are used to model the dynamics of the parameters
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e217.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e218.jpg"></inline-graphic>
</inline-formula>
. The interactions obtained by the Bluetooth physical proximity are aggregated over weekly and daily intervals and used directly for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e219.jpg"></inline-graphic>
</inline-formula>
to simulate the epidemic. Similarly, the interactions obtained by Bluetooth are first used directly to define the tracing effort (i.e. to determine
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e220.jpg"></inline-graphic>
</inline-formula>
) on weekly and daily timescales in
<xref ref-type="fig" rid="pone-0095133-g010">figure 10</xref>
, considering the case where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e221.jpg"></inline-graphic>
</inline-formula>
. Next, the tracing effort (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e222.jpg"></inline-graphic>
</inline-formula>
) is only determined by interactions occurring in the phone communication network to determine the effects of tracing from the phone communication network in
<xref ref-type="fig" rid="pone-0095133-g011">figure 11</xref>
. In this case
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e223.jpg"></inline-graphic>
</inline-formula>
, which is the real overlap between these networks inherent to the dataset. The interactions are weighed according to the following equations.
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e224.jpg"></inline-graphic>
</inline-formula>
, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e225.jpg"></inline-graphic>
</inline-formula>
represents the total number of interaction events between node
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e226.jpg"></inline-graphic>
</inline-formula>
and its infectious neighbours within the specified time frame and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e227.jpg"></inline-graphic>
</inline-formula>
is the average weight over all connected participants.
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e228.jpg"></inline-graphic>
</inline-formula>
in all simulation results presented. Overall,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e229.jpg"></inline-graphic>
</inline-formula>
(in
<xref ref-type="disp-formula" rid="pone.0095133.e037">equation 1</xref>
) is the mean degree of the infectious interaction network, which is a reweighing of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e230.jpg"></inline-graphic>
</inline-formula>
(used in the theoretical simulations) according to the real data. Similarly,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e231.jpg"></inline-graphic>
</inline-formula>
.</p>
<fig id="pone-0095133-g010" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g010</object-id>
<label>Figure 10</label>
<caption>
<title>Simulation of contact tracing over the empirical data with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e232.jpg"></inline-graphic>
</inline-formula>
.</title>
<p>Only the real physical proximity interactions are used to obtain
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e233.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e234.jpg"></inline-graphic>
</inline-formula>
. The physical proximity interactions are obtained by the mobile phone Bluetooth data and are incorporated on (a) a weekly scale, and (b) a daily scales.</p>
</caption>
<graphic xlink:href="pone.0095133.g010"></graphic>
</fig>
<fig id="pone-0095133-g011" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g011</object-id>
<label>Figure 11</label>
<caption>
<title>Dual network scenario simulated over the real mobile phone data.</title>
<p>Bluetooth physical proximity is used for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e235.jpg"></inline-graphic>
</inline-formula>
, phone communication logs are used for tracing,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e236.jpg"></inline-graphic>
</inline-formula>
.</p>
</caption>
<graphic xlink:href="pone.0095133.g011"></graphic>
</fig>
<p>First, we evaluate the difference between using the physical proximity data in an ideal network scenario in comparison to the theoretical case by comparing the model outputs on this community of
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e237.jpg"></inline-graphic>
</inline-formula>
participants (note
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e238.jpg"></inline-graphic>
</inline-formula>
in this section). The contact tracing model results obtained over the data-driven proximity network are labeled as weekly data and daily data in
<xref ref-type="fig" rid="pone-0095133-g012">figure 12</xref>
. For the case
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e239.jpg"></inline-graphic>
</inline-formula>
, the interactions for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e240.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e241.jpg"></inline-graphic>
</inline-formula>
are both taken from the physical proximity data since we are assuming perfect network overlap. We assume
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e242.jpg"></inline-graphic>
</inline-formula>
to remove the additional effects of tracing in the comparison. What we refer to as the theoretical case is the contact tracing model simulated according to
<xref ref-type="disp-formula" rid="pone.0095133.e037">equations (1</xref>
)-(3) without any real data for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e243.jpg"></inline-graphic>
</inline-formula>
and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e244.jpg"></inline-graphic>
</inline-formula>
. For the theoretical case, the mean degree of the physical proximity network is used to set the network weights;
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e245.jpg"></inline-graphic>
</inline-formula>
, where
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e246.jpg"></inline-graphic>
</inline-formula>
is the overall node degree of the mobile phone proximity network (refer to
<xref ref-type="supplementary-material" rid="pone.0095133.s001">figure S1</xref>
).
<xref ref-type="fig" rid="pone-0095133-g012">Figure 12</xref>
shows the difference between the theoretical case and the contact tracing model run over the physical proximity network. We observe the results considering the weekly aggregated interactions are in close agreement with the theoretical case. This confirms the Bluetooth interaction data collected for this community considered on a weekly scale to be in good agreement with the theoretical model, though not equivalent. The incorporation of daily interaction data results in almost an order of magnitude difference in the peak of the epidemic illustrating the models generally over estimate in theory due to less sparse weekly interaction patterns in reality. Precise details of the simulation scenario can be found in “Simulation Details” in
<xref ref-type="supplementary-material" rid="pone.0095133.s005">File S1</xref>
.</p>
<fig id="pone-0095133-g012" orientation="portrait" position="float">
<object-id pub-id-type="doi">10.1371/journal.pone.0095133.g012</object-id>
<label>Figure 12</label>
<caption>
<title>Theory versus practice.</title>
<p>Considering the ideal network scenario, we run the simulated contact tracing model with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e247.jpg"></inline-graphic>
</inline-formula>
set to the average daily (and weekly) node degree of the data (see
<xref ref-type="supplementary-material" rid="pone.0095133.s001">figure S1</xref>
), but consider a simulated network (labeled as
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e248.jpg"></inline-graphic>
</inline-formula>
). Two data-driven models are considered with the interactions taken from the Bluetooth proximity logs. For all cases,
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e249.jpg"></inline-graphic>
</inline-formula>
, and therefore
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e250.jpg"></inline-graphic>
</inline-formula>
. The real data is considered on weekly and daily scales, and
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e251.jpg"></inline-graphic>
</inline-formula>
are the real physical interactions logged by the community’s Bluetooth sensors.</p>
</caption>
<graphic xlink:href="pone.0095133.g012"></graphic>
</fig>
<p>After making a comparison of the theoretical case with the data-driven case, whereby only the physical proximity network is considered in simulating infectious spread, we evaluate the proposed dual network methodology entirely on the real dataset. First we consider the single network case (with
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e252.jpg"></inline-graphic>
</inline-formula>
) in
<xref ref-type="fig" rid="pone-0095133-g010">figure 10</xref>
. Again, the real physical proximity interaction network is the underlying network both for infection spread and contact tracing, considering (a) weekly aggregated interactions and (b) daily aggregated interactions. In these simulations, we are evaluating the effect of tracing on Bluetooth physical proximity data which could potentially be available for tracing by service providers. We observe that contact tracing is very effective in reducing the effects of the epidemic both on a weekly and daily rate. In
<xref ref-type="fig" rid="pone-0095133-g010">figure 10</xref>
(a) we observe an optimal tracing strategy occurs on this dataset for
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e253.jpg"></inline-graphic>
</inline-formula>
, which demonstrates maximizing tracing efforts is not always the best strategy, tracing efficiently is more important. There is no significant difference in the number of infected cases over time when
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e254.jpg"></inline-graphic>
</inline-formula>
or
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e255.jpg"></inline-graphic>
</inline-formula>
, meaning this additional effort is wasted in comparison to
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e256.jpg"></inline-graphic>
</inline-formula>
. The number of interactions occurring on a daily scale diminishes in comparison to the weekly case, and therefore the tracing effort reaches its lower bound sooner (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e257.jpg"></inline-graphic>
</inline-formula>
). However, even on such a fine-grained timescale of one day, contact tracing based on the Bluetooth physical interactions captured by the mobile phone plays a significant role in reducing the effects of the epidemic. Next, we consider tracing based on only the phone calling records obtained in the data collection.</p>
<p>In
<xref ref-type="fig" rid="pone-0095133-g011">figure 11</xref>
we consider the dual network case on the mobile phone data, where the infection spreads on the physical proximity network, and the tracing occurs only on the phone communication network. In
<xref ref-type="fig" rid="pone-0095133-g011">figure 11</xref>
(a) the weekly aggregated physical proximity and phone communication networks are considered and in (b) the overall aggregated daily networks are considered. While we demonstrate in
<xref ref-type="fig" rid="pone-0095133-g004">figure 4</xref>
the overall average overlap between these networks is
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e258.jpg"></inline-graphic>
</inline-formula>
, we see the effect of the epidemic is greatly reduced by tracing using the phone call records of the mobile phone users. These effects are less visible on the daily scale than the weekly scale which is due to the small number of daily phone communication traces made in the dataset (see
<xref ref-type="supplementary-material" rid="pone.0095133.s001">figure S1</xref>
(a)). The results of tracing on the phone communication records illustrate that a very small tracing effort (
<inline-formula>
<inline-graphic xlink:href="pone.0095133.e259.jpg"></inline-graphic>
</inline-formula>
) is sufficient in reducing the effects of the epidemic and is further a concrete and easily obtainable source for tracing. Note, the participants in this community are more likely to make fewer calls to one another since they are living together in a dormitory. However even given this challenging data collection, the results are still very significant, particularly on a weekly scale, whereby tracing based on users’ phone call records over a given week results in the reduction in the effects of an epidemic outbreak.</p>
</sec>
</sec>
<sec id="s4">
<title>Discussion</title>
<p>We explore a data-driven avenue for contact tracing in epidemic prevention using social interaction data from mobile phones. A medium-sized real communitys data is considered to get insight into the relationship between physical interactions and mobile phone communication, and whether the latter can be exploited to perform contact tracing on the former. We explore the effectivity of such a strategy using data-driven simulations with realistic parameters extracted from the social network dataset, first, and then the full dual realistic network model of physical and communication interactions. Across multiple realistic scenarios for contact tracing, we find that contact tracing is an effective means for epidemic prevention, even when there exists a low overlap between the physical and communication networks. When considering tracing effort, we observe that contact tracing is greatly beneficial when the epidemic is starting, however, this effort will increase greatly as the epidemic grows. With low overlap between the physical and communication networks, we find that this effect is mainly due to the automatic adaptation of the tracing effort to the amount of infected people. We also uncover the relationship between the network overlap and the proportion of effort spent in random tracing versus contact tracing. The study thus gives insight into what proportion of the effort should be spent in contact tracing depending on the estimated network overlap (how much we trust the communication network represents the interaction network). While contact tracing is effective in reducing the number of infected cases, a dynamic approach considering a time-evolving combination of random and contact tracing is most promising, and optimization of costs as a function of varying random and contact tracing efforts over time will be considered in future work. We are also able to uncover the nonlinear relationship between overlap (between physical and communication networks) and contact tracing effort. This is important, as different communication technologies, present and future, are likely to have a different link to physical interactions. Quantifying how the overlap interacts with the tracing effort can inform public health policies aiming to exploit digital communication traces for epidemiology. Overall, we find interactions sensed by mobile phones to be a promising tool for epidemic simulation, particularly for future large-scale scenarios, for example city-scale infectious disease transmission. This work demonstrates mobile phone communication history to be a useful data source in disease prevention by obtaining contact information readily for epidemic contact tracing.</p>
</sec>
<sec sec-type="supplementary-material" id="s5">
<title>Supporting Information</title>
<supplementary-material content-type="local-data" id="pone.0095133.s001">
<label>Figure S1</label>
<caption>
<p>
<bold>Averaged user node degree per individual days (or weeks) in the study.</bold>
These node degree distributions are plot on a daily basis (a)–(b) and on a weekly basis (c)–(d). The node degrees averaged over the users and over the days (or weeks) are used to simulate the epidemic in
<xref ref-type="fig" rid="pone-0095133-g012">figure 12</xref>
.</p>
<p>(EPS)</p>
</caption>
<media xlink:href="pone.0095133.s001.eps">
<caption>
<p>Click here for additional data file.</p>
</caption>
</media>
</supplementary-material>
<supplementary-material content-type="local-data" id="pone.0095133.s002">
<label>Figure S2</label>
<caption>
<p>
<bold>Number of events logged over time.</bold>
We observe that SMS activity is equally important to consider as call activity in mobile phone communication data. Bluetooth interaction data is highly dependent on time, more so than the phone activity, which remains more constant over time.</p>
<p>(EPS)</p>
</caption>
<media xlink:href="pone.0095133.s002.eps">
<caption>
<p>Click here for additional data file.</p>
</caption>
</media>
</supplementary-material>
<supplementary-material content-type="local-data" id="pone.0095133.s003">
<label>Figure S3</label>
<caption>
<p>
<bold>Community’s overall network structure.</bold>
The average node degree as a function of the minimum edge weight for (a) the communication network (call and SMS) and (b) the physical proximity interaction network. Edge weight is defined as the minimum number of events necessary for an edge to connect two nodes in both networks indicating the tie strength between the pair of nodes. The units in both cases are the number of events.</p>
<p>(EPS)</p>
</caption>
<media xlink:href="pone.0095133.s003.eps">
<caption>
<p>Click here for additional data file.</p>
</caption>
</media>
</supplementary-material>
<supplementary-material content-type="local-data" id="pone.0095133.s004">
<label>Figure S4</label>
<caption>
<p>
<bold>Node degree distributions.</bold>
Accumulated node degree distribution over the study duration for (a) the phone network and (b) the physical proximity interaction network. Each individual user’s node degree is obtained as an accumulation over the 9 month period, and the distribution is plot given one overall node degree per user. The node degree for the accumulated static phone network is 7∶3 and for the Bluetooth network is 67∶25.</p>
<p>(EPS)</p>
</caption>
<media xlink:href="pone.0095133.s004.eps">
<caption>
<p>Click here for additional data file.</p>
</caption>
</media>
</supplementary-material>
<supplementary-material content-type="local-data" id="pone.0095133.s005">
<label>File S1</label>
<caption>
<p>(PDF)</p>
</caption>
<media xlink:href="pone.0095133.s005.pdf">
<caption>
<p>Click here for additional data file.</p>
</caption>
</media>
</supplementary-material>
</sec>
</body>
<back>
<ack>
<p>We would like to thank Anmol Madan and Alex Pentland for collecting and providing the empirical dataset, as well as Juliette Stehlé for help with the network simulation procedure.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="pone.0095133-Salath1">
<label>1</label>
<mixed-citation publication-type="other">Salathé M, Bengtsson L, Bodnar TJ, Brewer DD, Brownstein JS, et al. (2012) Digital epidemiology. PLoS Computational Biology 8.</mixed-citation>
</ref>
<ref id="pone.0095133-Salath2">
<label>2</label>
<mixed-citation publication-type="journal">
<name>
<surname>Salathé</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Freifeld</surname>
<given-names>CC</given-names>
</name>
,
<name>
<surname>Mekaru</surname>
<given-names>SR</given-names>
</name>
,
<name>
<surname>Tomasulo</surname>
<given-names>AF</given-names>
</name>
,
<name>
<surname>Brownstein</surname>
<given-names>JS</given-names>
</name>
(
<year>2013</year>
)
<article-title>Inuenza a (h7n9) and the importance of digital epidemiology</article-title>
.
<source>New England Journal of Medicine</source>
<volume>369</volume>
:
<fpage>401</fpage>
<lpage>404</lpage>
<pub-id pub-id-type="pmid">23822655</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Holme1">
<label>3</label>
<mixed-citation publication-type="other">Holme P, Liljeros F (2013) Beginning and end times of dyadic relationships control disease spreading in empirical contact data. arXiv preprint arXiv: 13076436.</mixed-citation>
</ref>
<ref id="pone.0095133-Balcan1">
<label>4</label>
<mixed-citation publication-type="journal">
<name>
<surname>Balcan</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Vespignani</surname>
<given-names>A</given-names>
</name>
(
<year>2011</year>
)
<article-title>Phase transitions in contagion processes mediated by recurrent mobility patterns</article-title>
.
<source>Nature physics</source>
<volume>7</volume>
:
<fpage>581</fpage>
<lpage>586</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Balcan2">
<label>5</label>
<mixed-citation publication-type="journal">
<name>
<surname>Balcan</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Gonçalves</surname>
<given-names>B</given-names>
</name>
,
<name>
<surname>Hu</surname>
<given-names>H</given-names>
</name>
,
<name>
<surname>Ramasco</surname>
<given-names>JJ</given-names>
</name>
,
<name>
<surname>Colizza</surname>
<given-names>V</given-names>
</name>
,
<etal>et al</etal>
(
<year>2010</year>
)
<article-title>Modeling the spatial spread of infectious diseases: the GLobal Epidemic and Mobility computational model</article-title>
.
<source>Journal of com-putational science</source>
<volume>1</volume>
:
<fpage>132</fpage>
<lpage>145</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Balcan3">
<label>6</label>
<mixed-citation publication-type="journal">
<name>
<surname>Balcan</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Colizza</surname>
<given-names>V</given-names>
</name>
,
<name>
<surname>Gonçalves</surname>
<given-names>B</given-names>
</name>
,
<name>
<surname>Hu</surname>
<given-names>H</given-names>
</name>
,
<name>
<surname>Ramasco</surname>
<given-names>JJ</given-names>
</name>
,
<etal>et al</etal>
(
<year>2009</year>
)
<article-title>Multiscale mobility networks and the spatial spreading of infectious diseases</article-title>
.
<source>Proceedings of the National Academy of Sciences of the United States of America</source>
<volume>106</volume>
:
<fpage>21484</fpage>
<lpage>21489</lpage>
<pub-id pub-id-type="pmid">20018697</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Christakis1">
<label>7</label>
<mixed-citation publication-type="other">Christakis NA, Fowler JH (2009) Connected: The surprising power of our social networks and how they shape our lives. Hachette Digital, Inc.</mixed-citation>
</ref>
<ref id="pone.0095133-Eagle1">
<label>8</label>
<mixed-citation publication-type="journal">
<name>
<surname>Eagle</surname>
<given-names>N</given-names>
</name>
,
<name>
<surname>Pentland</surname>
<given-names>AS</given-names>
</name>
,
<name>
<surname>Lazer</surname>
<given-names>D</given-names>
</name>
(
<year>2009</year>
)
<article-title>Inferring friendship network structure by using mobile phone data</article-title>
.
<source>Proceedings of the National Academy of Sciences</source>
<volume>106</volume>
:
<fpage>15274</fpage>
<lpage>15278</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Margolin1">
<label>9</label>
<mixed-citation publication-type="other">Margolin D, Lin YR, Brewer D, Lazer D (2013) Matching data and interpretation: Towards a rosetta stone joining behavioral and survey data. In: Seventh International AAAI Conference on Weblogs and Social Media.</mixed-citation>
</ref>
<ref id="pone.0095133-Jones1">
<label>10</label>
<mixed-citation publication-type="journal">
<name>
<surname>Jones</surname>
<given-names>JJ</given-names>
</name>
,
<name>
<surname>Settle</surname>
<given-names>JE</given-names>
</name>
,
<name>
<surname>Bond</surname>
<given-names>RM</given-names>
</name>
,
<name>
<surname>Fariss</surname>
<given-names>CJ</given-names>
</name>
,
<name>
<surname>Marlow</surname>
<given-names>C</given-names>
</name>
,
<etal>et al</etal>
(
<year>2013</year>
)
<article-title>Inferring tie strength from online directed behavior</article-title>
.
<source>PloS one</source>
<volume>8</volume>
:
<fpage>e52168</fpage>
<pub-id pub-id-type="pmid">23300964</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Pentland1">
<label>11</label>
<mixed-citation publication-type="other">Pentland AS (2008) Honest Signals: How They Shape Our World. The MIT Press.</mixed-citation>
</ref>
<ref id="pone.0095133-Barabsi1">
<label>12</label>
<mixed-citation publication-type="other">Barabási AL (2013) Scientists must spearhead ethical use of big data. Politico.</mixed-citation>
</ref>
<ref id="pone.0095133-Salath3">
<label>13</label>
<mixed-citation publication-type="journal">
<name>
<surname>Salathé</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Jones</surname>
<given-names>JH</given-names>
</name>
(
<year>2010</year>
)
<article-title>Dynamics and control of diseases in networks with community structure</article-title>
.
<source>PLoS Comput Biol</source>
<volume>6</volume>
:
<fpage>e1000736</fpage>
<pub-id pub-id-type="pmid">20386735</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Salath4">
<label>14</label>
<mixed-citation publication-type="journal">
<name>
<surname>Salathé</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Kazandjieva</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Lee</surname>
<given-names>JW</given-names>
</name>
,
<name>
<surname>Levis</surname>
<given-names>P</given-names>
</name>
,
<name>
<surname>Feldman</surname>
<given-names>MW</given-names>
</name>
,
<etal>et al</etal>
(
<year>2010</year>
)
<article-title>A high-resolution human contact network for infectious disease transmission</article-title>
.
<source>Proceedings of the National Academy of Sciences</source>
<volume>107</volume>
:
<fpage>22020</fpage>
<lpage>22025</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Stehl1">
<label>15</label>
<mixed-citation publication-type="journal">
<name>
<surname>Stehlé</surname>
<given-names>J</given-names>
</name>
,
<name>
<surname>Voirin</surname>
<given-names>N</given-names>
</name>
,
<name>
<surname>Barrat</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Cattuto</surname>
<given-names>C</given-names>
</name>
,
<name>
<surname>Colizza</surname>
<given-names>V</given-names>
</name>
,
<etal>et al</etal>
(
<year>2011</year>
)
<article-title>Simulation of an seir infectious disease model on the dynamic contact network of conference attendees</article-title>
.
<source>BMC medicine</source>
<volume>9</volume>
:
<fpage>87</fpage>
<pub-id pub-id-type="pmid">21771290</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Isella1">
<label>16</label>
<mixed-citation publication-type="journal">
<name>
<surname>Isella</surname>
<given-names>L</given-names>
</name>
,
<name>
<surname>Romano</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Barrat</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Cattuto</surname>
<given-names>C</given-names>
</name>
,
<name>
<surname>Colizza</surname>
<given-names>V</given-names>
</name>
,
<etal>et al</etal>
(
<year>2011</year>
)
<article-title>Close encounters in a pediatric ward: Measuring face-to-face proximity and mixing patterns with wearable sensors</article-title>
.
<source>PLoS ONE</source>
<volume>6</volume>
:
<fpage>e17144</fpage>
<pub-id pub-id-type="pmid">21386902</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Wesolowski1">
<label>17</label>
<mixed-citation publication-type="journal">
<name>
<surname>Wesolowski</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Eagle</surname>
<given-names>N</given-names>
</name>
,
<name>
<surname>Tatem</surname>
<given-names>AJ</given-names>
</name>
,
<name>
<surname>Smith</surname>
<given-names>DL</given-names>
</name>
,
<name>
<surname>Noor</surname>
<given-names>AM</given-names>
</name>
,
<etal>et al</etal>
(
<year>2012</year>
)
<article-title>Quantifying the impact of human mobility on malaria</article-title>
.
<source>Science</source>
<volume>338</volume>
:
<fpage>267</fpage>
<lpage>270</lpage>
<pub-id pub-id-type="pmid">23066082</pub-id>
</mixed-citation>
</ref>
<ref id="pone.0095133-Eames1">
<label>18</label>
<mixed-citation publication-type="journal">
<name>
<surname>Eames</surname>
<given-names>KT</given-names>
</name>
,
<name>
<surname>Keeling</surname>
<given-names>MJ</given-names>
</name>
(
<year>2003</year>
)
<article-title>Contact tracing and disease control</article-title>
.
<source>Proceedings of the Royal Society of London Series B: Biological Sciences</source>
<volume>270</volume>
:
<fpage>2565</fpage>
<lpage>2571</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Crandall1">
<label>19</label>
<mixed-citation publication-type="journal">
<name>
<surname>Crandall</surname>
<given-names>DJ</given-names>
</name>
,
<name>
<surname>Backstrom</surname>
<given-names>L</given-names>
</name>
,
<name>
<surname>Cosley</surname>
<given-names>D</given-names>
</name>
,
<name>
<surname>Suri</surname>
<given-names>S</given-names>
</name>
,
<name>
<surname>Huttenlocher</surname>
<given-names>D</given-names>
</name>
,
<etal>et al</etal>
(
<year>2010</year>
)
<article-title>Inferring social ties from geographic coincidences</article-title>
.
<source>Proceedings of the National Academy of Sciences</source>
<volume>107</volume>
:
<fpage>22436</fpage>
<lpage>22441</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Wang1">
<label>20</label>
<mixed-citation publication-type="other">Wang D, Pedreschi D, Song C, Giannotti F, Barabasi AL (2011) Human mobility, social ties, and link prediction. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 1100–1108.</mixed-citation>
</ref>
<ref id="pone.0095133-Cho1">
<label>21</label>
<mixed-citation publication-type="other">Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: user movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 1082–1090.</mixed-citation>
</ref>
<ref id="pone.0095133-Tsimring1">
<label>22</label>
<mixed-citation publication-type="journal">
<name>
<surname>Tsimring</surname>
<given-names>L</given-names>
</name>
,
<name>
<surname>Huerta</surname>
<given-names>R</given-names>
</name>
(
<year>2003</year>
)
<article-title>Modeling of contact tracing in social networks</article-title>
.
<source>Physika A</source>
<volume>325</volume>
:
<fpage>33</fpage>
<lpage>39</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Madan1">
<label>23</label>
<mixed-citation publication-type="journal">
<name>
<surname>Madan</surname>
<given-names>A</given-names>
</name>
,
<name>
<surname>Cebrian</surname>
<given-names>M</given-names>
</name>
,
<name>
<surname>Moturu</surname>
<given-names>S</given-names>
</name>
,
<name>
<surname>Farrahi</surname>
<given-names>K</given-names>
</name>
,
<name>
<surname>Pentland</surname>
<given-names>S</given-names>
</name>
(
<year>2012</year>
)
<article-title>Sensing the health state of a community</article-title>
.
<source>IEEE Pervasive Computing</source>
<volume>11</volume>
:
<fpage>36</fpage>
<lpage>45</lpage>
</mixed-citation>
</ref>
<ref id="pone.0095133-Madan2">
<label>24</label>
<mixed-citation publication-type="other">Madan A, Cebrián M, Lazer D, Pentland A (2010) Social sensing for epidemiological behavior change. In: Ubiquitous Computing (UbiComp). Copenhagen, Denmark, 291–300.</mixed-citation>
</ref>
<ref id="pone.0095133-Madan3">
<label>25</label>
<mixed-citation publication-type="other">Madan A, Farrahi K, Gatica-Perez D, Pentland AS (2011) Pervasive sensing to model political opinions in face-to-face networks. In: Pervasive Computing, Springer. 214–231.</mixed-citation>
</ref>
<ref id="pone.0095133-Farrahi1">
<label>26</label>
<mixed-citation publication-type="other">Farrahi K, Emonet R, Ferscha A (2012) Socio-technical network analysis from wearable interactions. In: Wearable Computers (ISWC), 2012 16th International Symposium on. IEEE, 9–16.</mixed-citation>
</ref>
<ref id="pone.0095133-Stehl2">
<label>27</label>
<mixed-citation publication-type="other">Stehlé J (2012) Réseaux de proximité humaine: analyse, modélisation et processus dynamiques. Ph.D. thesis, Aix-Marseille Université.</mixed-citation>
</ref>
</ref-list>
</back>
</pmc>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Asie/explor/AustralieFrV1/Data/Pmc/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 002B61 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd -nk 002B61 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Asie
   |area=    AustralieFrV1
   |flux=    Pmc
   |étape=   Corpus
   |type=    RBID
   |clé=     PMC:4006791
   |texte=   Epidemic Contact Tracing via Communication Traces
}}

Pour générer des pages wiki

HfdIndexSelect -h $EXPLOR_AREA/Data/Pmc/Corpus/RBID.i   -Sk "pubmed:24787614" \
       | HfdSelect -Kh $EXPLOR_AREA/Data/Pmc/Corpus/biblio.hfd   \
       | NlmPubMed2Wicri -a AustralieFrV1 

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Dec 5 10:43:12 2017. Site generation: Tue Mar 5 14:07:20 2024