Using real-world contact networks to quantify the effectiveness of digital contact tracing and isolation strategies for Covid-19 pandemic ========================================================================================================================================= * G. Cencetti * G. Santin * A. Longa * E. Pigani * A. Barrat * C. Cattuto * S. Lehmann * B. Lepri ## ABSTRACT Contact tracing, both manual and potentially with digital apps, is considered a key ingredient in the control of infectious disease outbreaks, and in the strategies making it possible to alleviate the lock-down and to return to a quasi-normal functioning of society in the COVID-19 crisis.1,2 However, the current leading modeling framework for evaluating contact tracing1,3 is highly stylized, lacking important features and heterogeneities present in real-world contact patterns that are relevant for epidemic dynamics.4,5 Here, we fill this gap by considering a modeling framework extensively informed by real-world, high-resolution contact data to analyze the impact of digital (app-based) containment strategies for the COVID-19 pandemic. More specifically, we investigate how well contact tracing apps, coupled with the quarantine of identified contacts, can mitigate a spread in realistic scenarios such as a university campus, a workplace, or a high school. We find that restrictive policies are more effective in confining the epidemics but come at the cost of quarantining a large part of the population with a consequent social cost. It is possible to design less limiting policies, considering at risk only contacts with longer exposure and at shorter distance, in order to avoid this effect. Our results also show that isolation and tracing alone are unlikely to be sufficient to keep an outbreak under control, and additional measures need to be implemented simultaneously. Moreover, we confirm that a high level of app adoption is crucial to make digital contact tracing an effective measure. Finally, given the currently implemented infectiousness, we find that strategies focusing on long exposure times, even for weak links, perform better than approaches that emphasize close-range contacts for shorter time-periods. Our results have implications for the app-based contact tracing efforts currently being implemented across several countries worldwide.1,6–11 ## 1 Introduction As of mid-May 2020, the COVID-19 pandemic has reached almost 4.5 millions detected cases worldwide,12 overwhelming the healthcare capacities of many countries and thus presenting extraordinary challenges for governments and societies.13–16 At present, there are no known effective pharmaceutical treatments, and a vaccine is estimated to be approximately one year away.17 Non-pharmaceutical interventions (i.e. social distancing, wearing masks and reinforced hygiene) are therefore currently the main path towards mitigating the intensity of the pandemic and return society to near-normal functioning. In the early stages of the pandemic, rigorous restrictions have been effective in curbing the spread of SARS-CoV-2.13,18–25 Using lock-downs and quarantine, countries have managed to limit contagion and reduce the effective reproduction number *R*, lowering the number of daily new cases and hospitalizations. Many areas have now entered (or are entering) a transition phase, slowly lifting the mobility restrictions. The transition phase is potentially fragile, and an effective and affordable long-term plan is required to avoid resurgences of infections and new outbreaks.26 This is particularly pressing given the possibility that the COVID-19 pandemic will come in waves as anticipated by several early models,27,28 and since the number of people who have been infected is still far from ensuring herd immunity.16 Despite their efficacy, large-scale quarantine and lock-down strategies carry enormous costs and not all countries can afford such measures,19 due to their consequences on economic and social stability. Moreover, population-wide measures are non-specific: in a situation where most of the individuals are not infected, it is highly sub-optimal to lock-down the whole population, and interventions at smaller scale, selectively targeting individuals at higher risk of spreading the disease, are more desirable. While the testing and isolation of symptomatic cases is certainly crucial, it is insufficient in the case of SARS-CoV-2, since many contagion events take place before symptom onset1,29,30 and a substantial fraction of infected individuals do not develop symptoms at all.31,32 Thus, the identification and isolation of infected cases must be coupled with a strategy for tracing their contacts, who may either have transmitted the virus or have been infected before the onset of symptoms by the detected case, quarantining them and monitoring their health status.33 In this context, recent modeling studies have shown1,34–36 that contact tracing may reduce epidemic spreading and the efficacy of its realization – contagious contact identification and timing – plays a pivotal role. Contact tracing is typically performed manually, i.e. by direct interviews of cases. While this ensures a thorough assessment of the actual risk of individuals who have been in contact with these cases, it is a relatively slow process and is highly labor intensive:37–39 it can be efficiently implemented only when the number of infected individuals is low. In addition, the accuracy of manual tracing is limited by the ability to recall and identify close proximity contacts: brief contacts have a lower probability of being recalled and contact durations are in general overestimated in retrospective surveys.40, 41 Thus, technologies that use proximity sensors are currently being considered as fundamental tools to complement manual tracing. Specifically, the idea is to leverage the widespread dissemination of smartphones to develop proximity-sensing apps based on the exchange of Bluetooth signals between smartphones,1,6–11,42,43 which makes it possible to build privacy-preserving contact tracing frameworks.6 The efficacy of app-based contact tracing has been discussed in several recent papers.2,44–47 Here, we start from the work by Fraser et al.,3 recently adapted to the COVID-19 case.1 In short, the authors propose a mathematical model where the temporal evolution of a spreading process is determined by recursive equations that update the number of infected people in the population based on the (evolving) infectiousness of the infected individuals and on two parameters describing the interventions, *εI* and *εT*. These parameters represent the ability to identify and isolate infected people and the ability to correctly trace their contacts, respectively. Assuming an exponentially growing trend for the number of infected people (which is typically applicable in early phases of an epidemic outbreak) the authors identify a stationary solution and study how the growth rate depends on the intervention parameters. While this approach provides a simple way to quantify the effect of isolation and tracing strategies in an epidemiological model, it is subject to several limitations, both from the modeling and from the applicability point of view. First, the assumption of full homogeneous mixing in social networks is an important limitation in epidemic modeling,4,5,48,49 and realistic network architectures might be particularly important in the case of contact tracing.44 Second, the mathematical framework is limited to an exponential growth. Third, the parameters *εI* and *εT* are assumed to be independent. Here, to better understand the concrete efficacy of real-world contact tracing, we dramatically expand the realism of the approach described above on these three aspects. First, we provide a realistic quantification of the tracing ability by performing simulations of spreading processes and of contact tracing strategies on several real-world data sets collected across different social settings (i.e., a university campus, a workplace, a high school).50-52 This allows us to estimate the actual “tracing ability” parameter *εT* for different possible tracing policies (i.e., the thresholds considered to define a contact measured by the app as “at risk”) and for different values of *εI* (section 4.1). The parameter *εT* can then be inserted into the mathematical model to study the impact of the tracing policy on the spread. In order for app-based contact tracing to work properly, it is indeed necessary that the potential infection events detected by smartphones constitute a reasonable proxy for real-world infection dynamics. However, little is currently known about the relationship between actual biological infections and the type of proximity interactions detected using smartphones. Here, we assume that the probability of a contagion event occurring during a proximity event between a healthy and an infected individual depends both on the duration and on the distance between those individuals (along with other epidemiological variables such as the infectiousness of the individual – see Supplementary Information A). Note that, as Bluetooth signal strength is not trivially converted to a distance,53 we rely – as the apps being currently developed will do6 – on the received signal strength as a proxy for distance. Secondly, we restructure and generalize the mathematical framework of the approach1,3 to avoid assumptions regarding the functional form of the epidemic growth, which is therefore not assumed to be exponential. Moreover, we have modified the epidemiological part of the model according to recent literature on COVID-19,54–56 to fully consider asymptomatic cases and the delay in isolating individuals after their identification (Supplementary Information B). Our third key contribution concerns the modeling and the detailed investigation of the contact tracing procedure. We devote a particular attention to the tracing parameter *εT*, which unavoidably depends on the ability to detect infected people whose contacts can then be traced: in other words, *εT* is not independent from *εI*. Moreover, when gathering information on the recent contacts of an infected individual, it is obviously not possible to know which interactions, if any, really did correspond to a contagion event. Any contact tracing policy is thus based on thresholds on duration and proximity to define the risk associated with each contact. Among those, some are infected while others are not. The latter correspond to “false positives”, i.e., healthy individuals who will be preventively quarantined. Similarly, among the contacts considered as non-risky by the contact tracing, some might actually be infected (“false negatives”). The use of real-world data makes it possible to evaluate the number of false positives and false negatives for various policies, together with their effectiveness in containing the spread. The proportions of false positives and negatives represent crucial information as the acceptability of contact tracing apps depends on these outcomes. On the one hand, a low number of quarantined, or mis-calibrated policies that do not correctly identify the individuals with the highest probabilities of having contracted the virus, can unwittingly omit many potential spreaders. On the other hand, highly restrictive policies might require to quarantine large numbers of individuals, including healthy ones, with a consequent high social cost. Overall, our approach allows us to evaluate the effect of different contact tracing policies not only on the disease spread but also in terms of their impact on the number of quarantined individuals. By clearly identifying the relevant variables, we can show how to vary them separately and understand which measures the system is more sensitive to, providing insights on how to tune and adapt policies to be maximally effective. This novel combination of a well-established epidemic model with state-of-the-art, empirical interaction data collected via Bluetooth technologies or via similar radio-based proximity-sensing methods, allows us to understand the role played by intrinsic limitations of app-based tracing efforts, affording an unprecedented viewpoint on the ambition of achieving containment with app-based interventions. Namely, we are able to test and quantify the role that a real contact network plays both for the infectiousness of a contact and for the ability of a policy to detect it and to respond optimally. It is important to emphasize again that stylized mathematical models on the performance of app-based approaches disregard important heterogeneities of high-resolution contact network data – both topological and temporal – that are known to shape infectious disease dynamics.49 By studying contact tracing interventions on empirical data that include such complex features, we make a first step at bridging this gap, obtaining several new insights. First, we show that if the isolation of infected individuals is only implemented after symptom onset, the containment of the epidemic becomes challenging, due to the large fraction of asymptomatic individuals. The only way to stop the spreading in this case requires the maximum efficiency of both isolation and tracing procedures. On the other hand, a combination of self-reporting and randomized testing allows for the design of effective contact tracing policies. Finding a tracing policy that is able to contain the epidemic is a non-trivial task, and our aim is to quantify and describe the properties that makes a policy effective, in terms of duration and signal strength thresholds, tracing period of time and isolation efficiency. Furthermore, we show that isolation and tracing measures are only as effective as the technology they use: No tracing is possible if adequate spatial and temporal resolution are not available. Even if it is clear that the choice of a particular policy should be primarily guided by its effectiveness in containing the virus, we find that not all successful policies are equal. In particular, we demonstrate that beyond a certain accuracy, stricter policies do not improve the containment, while on the other hand a successful reduction of the number of non-quarantined infected people (and thus containment of the epidemic) is possible only if mirrored by a significant increase of the number of healthy people that are unnecessarily quarantined. Comparing policies also at this level allows to improve their design and to reduce their side effects. ## 2 Results and Discussion We evaluate the effect of measures based on the deployment of a digital contact tracing app on the mitigation of the Covid-19 pandemic. As we do not consider geography nor large-scale mobility, our modeling can be considered as referring to a limited geographical area, similarly to previous modeling efforts.1,35 In particular, we assume that two types of interventions are possible to limit the spread of the virus. First, infected individuals, who are either symptomatic and self-reporting or identified through randomized testing, are isolated. Second, individuals who have had a potentially contagious contact with those last are preventively quarantined. The last step is assumed to be implemented via an exposure notification app on their smartphone. Schematically, if a detected infected individual has the app, the anonymous keys that her/his device has been broadcasting through Bluetooth in the past few days are exposed. The app of the individuals with whom s/he has been in contact in the past days recognizes these keys as stored on their own device and calculates a *risk score*. If the risk score obtained by an individual is above a certain threshold (determined by the considered policy), the contact is “at risk” and the individual is quarantined, even if s/he does exhibit any symptom. We refer to6 for more details on the implementation on privacy preserving apps. Our research question is whether or not it is possible to contain a COVID-19 outbreak by means of these two measures. We introduce the concept of potentially contagious contact into a mathematical framework where the epidemic evolution is governed by a model based on recursive equations, inspired by the work of Fraser et al.,3 and recently adapted to the Covid-19 case.1 This model quantifies the number of newly infected people at each time interval, given a characterization of the disease in terms of infectiousness and manifestation of symptoms. The model is specifically designed to consider the two interventions described above, whose effectiveness are quantified by two parameters *εI*, *εT* varying from 0 to 1 (where *εI* = 0 means “no isolation” and *εI* = 1 represents a perfectly successful isolation of all individuals who are found to be infected, either via self-reporting or testing; *εT* quantifies instead the efficacy contact tracing). Here, particular attention is devoted to the study of the dependence of *εT* on *εI*, and to assess which policies are actually achievable given the realistically deployable technology and resources. Indeed, we couple this model with a realistic quantification of the effect of these two measures based on real-world contact and interaction data. The following results are obtained by the model and the simulation using the parameters defined in Supplementary Information A, and the Copenhagen Networks Study (CNS) dataset50 that describes real proximity relations of smartphone users measured via Bluetooth (see Section 4.1). In the Supplementary Information we address two different scenarios corresponding to two other datasets collected by the SocioPatterns collaboration using radio-frequency identification tags.51,52 We emphasize that a realistic quantification of the tracing ability is each time obtained by simulating the epidemics on a dataset, but the controllability of the disease is assessed by the general mathematical framework and is therefore not bounded by specific datasets. We consider five different policies (Table 1) that correspond to different threshold levels on the signal intensity, considered as a proxy of distance, and on the duration of the contact (recall that Bluetooth does not measure distances precisely so that all real-world implementations are based on thresholds on Received Singal Strength Indicator (RSSI) values). We additionally assume that the app of an individual keeps memory of the anonymous keys received from other apps, which represents a history of the past contacts, during n days. Here, we consider *n* = 7 days, as we found (Supplementary Information C.2) that a longer memory does not produce any significant improvement. Overall, this implies that we consider here a simplified version of the app, which does not compute risk scores but is simply able to remember the contacts corresponding to a sufficiently close and lasting-long proximity during n days, while contacts below the thresholds are not stored. In addition, each policy is tested with an isolation efficiency with values *εI* = 0.2, 0.5, 0.8, 1, which encodes isolation capacities ranging from rather poor to perfect isolation of any symptomatic or tested positive person. View this table: [Table 1:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T1) Table 1: Parameters defining the policies. A larger value of the magnitude of the signal strength tends to correspond to a larger distance, such that in the second column the thresholds go from the least to the most restrictive policy. A fundamental difference between the policies is in the fraction of contacts that are stored by the app. Figure 2 shows the distributions of the RSSI and the contact duration of all the interactions in the CNS dataset. It is clear that most of the contacts have short duration and low signal strength (and are thus likely random contacts), but long lasting durations are also observed, with overall a broad distribution of contact durations as typical from data on human interactions.53,57 ![Figure 1:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F1.medium.gif) [Figure 1:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F1) Figure 1: The contacts of an individual’s carrying an app-equipped smartphone with other app-adopters are registered through the app. As soon as an individual is detected as infected s/he is isolated, and the tracing and quarantine policy is implemented. Depending on the policy design, the number of false positives and false negatives may vary significantly. ![Figure 2:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F2.medium.gif) [Figure 2:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F2) Figure 2: Distribution of the duration (Figure 2c) and signal strength (taken as a proxy for proximity, Figure 2b) of the contacts in the CNS dataset. Figure 2a gives a scatterplot of signal strength vs duration for all contact events in the dataset, and displays the thresholds defining the various policies. The thresholds defined by the tracing policies in Table 1 determine the fraction of contacts that are traced by the app, and only the contacts within the specified regions are considered when determining who is alerted by the app and hence quarantined. Figure 2 highlights how both spatial and temporal resolutions exhibit a highly non-linear and non-trivial effect on the capability of tracing more individuals who have been in contact with an infected one. Panels 2b and 2c of Figure 2 also display the infectiousness curves (as functions of the signal strength and of the contact duration between individuals, see Supplementary Information A): even slight variations in the threshold used to implement the tracing policy may strongly influence the capacity to identify the contacts corresponding to the highest risks of infection. Two additional policies (Table 6), inspecting close range but short exposure interactions and long range but long exposure interactions, are defined and tested in Supplementary Information C.5. ### 2.1 There is no containment without randomized testing We first obtain an overview of how the control parameters impact the spread of the disease in an idealized model where *εI, εT* can take arbitrary values. In this way we can explore the full range of *εI* and *εT* and understand their effect – as in Ferretti et al.1 – while later we can derive sets of feasible configurations that can happen in reality from the network simulations. For each value of *εI*, *εT*, we use the model to predict the evolution of the number of new infected people *λ*(*t*) at time t up to a time *T* = 50 days, and we report the average growth or decline in the last 10 days. All numerical solutions of the continuous model reacg a stationary growth or decline regime (constant growth or decline rate of *λ*(*t*)). A negative number means that the epidemic is declining, while a positive one corresponds to growth (uncontained epidemics). An important ingredient of the model is given by the probability *s*(*τ*)for an infected individual to be recognized as infected within a period of time *τ*, either via self reporting after the symptoms onset, or via randomized testing.25 The ideal case in which all eventually infected people can be identified (*s*(*τ*) approaching 1 for large times) is reported in Figure 3a: this represents the best case scenario. We remark that this is the setting considered in the previous studies of this model.1,3 Next, we assume instead that 40% of infected individuals are asymptomatic1,31,32,58 and that only symptomatic individuals can be identified: no randomized testing is performed. We represent asymptomatics by considering that the probability of showing symptoms for infected people is a growing function of time that never reaches the value 1. In this case, the model predicts epidemic containment only if both *εI* and *εT* are very large, i.e., isolation and tracing of contacts are almost 100% effective (Figure 3b). Under this (realistic) assumption for the number of asymptomatic individuals, it is thus clear that essentially no epidemic containment can be obtained with only isolation and contact tracing policies: here, a randomized testing policy that increases the policy capability to detect infected people, beyond self reporting of symptomatic persons, is needed.25 In the following, we thus assume that, in addition to the symptomatic individuals (whose distribution of identification times follows the definition of *s*(*τ*) in Supplementary Information A), 50% of asymptomatic infected are identified by a policy of randomized testing. In addition, we take into account a delay of 2 days between the detection of an infected individual and the time this information becomes available to the health authorities. This corresponds to a delay in the tracing and isolation interventions. The resulting predictions of the model are plotted in Figure 3c. This is our baseline for the following investigations. ![Figure 3:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F3.medium.gif) [Figure 3:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F3) Figure 3: Growth or decrease rate of the number of newly infected individuals, assuming either that all the infected people can eventually be identified and isolated (Figure 3a); or that only symptomatic people can be isolated (Figure 3b, with 40% of infected individuals asymptomatic); or that symptomatic people can be isolated, and that an additional 50% of asymptomatic can be identified via randomized testing (Figure 3c), with a reporting delay of 2 days. We also note that achieving the detection of 50% of asymptomatics by randomized testing is actually not the only viable strategy to achieve this baseline. Indeed, if such an effective randomized testing policy is not possible, we found that an essentially equivalent base scenario can be obtained if other mitigation policies (mandatory mask wearing, enhanced hygiene, cancellation of large gatherings, etc) are in place and reduce the reproduction number *R* below a certain level (see Supplementary Information C.1). ### 2.2 Real data restrict the range of successful policies We have run numerical simulations of the disease spread on the CNS dataset, implementing the different policies to determine their impact in mitigating the epidemic. Figure 4 provides an illustration of the insights obtained by such simulations and the use of real contact data sets, by showing for Policy 5 and for *εI* = 0.8 the distribution of the time elapsed between an infection event and the successive contacts of the infected individual. Most contacts occur before infected individuals reach their largest infectiousness, but a non-negligible number of contacts occur as they are highly infectious. ![Figure 4:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F4.medium.gif) [Figure 4:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F4) Figure 4: Distribution of the time elapsed between the infection of an individual and their successive contacts. The black line shows the normalized infectiousness *ω*(*τ*) as a function of time, and the purple line is the cumulative probability to detect an infected person *s*(*τ*). The plot is obtained with *εI* = 0.8 and for Policy 5 in the CNS dataset. By considering the five different policies of Table 1 in terms of which contacts are considered at risk and thus kept by the app, and running corresponding simulations for *εI* = 0.2, 0.5, 0.8, 1, we can obtain in each case the actual value of *εT* that quantifies the quality of the tracing policy (see Section 4.1). This value therefore ceases to be an arbitrary parameter, but a direct consequence of the policy, the value of *εI* and the contact data. We can then plug the values (*εI, εT*) into the idealized model to simulate the spread of the epidemic, observe in which region of the diagrams of Figure 3 they fall, and deduce whether containment is achieved or not by this policy and this value of *εI*. The results, reported in Figure 5, clearly reveal that not all parameter configurations are reachable. In particular, the largest value of the tracing efficacy *εT* is possible only for Policies 4 and 5. Policies 2 and 3 still manage to reach the epidemic containment phase if *εI* is large enough, while Policy 1 is too restrictive in its definition of risky contacts and thus ineffective. We also note that Policies 4 and 5 do not differ in their results, although the number of contacts kept are quite different (as seen in Figure 2): once a certain amount of contacts is kept, keeping even more contacts (of lower duration or signal strength) does not improve the outcome. ![Figure 5:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F5.medium.gif) [Figure 5:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F5) Figure 5: Growth or decrease rate of the number of newly infected people assuming that symptomatic people can be isolated and that an additional 50% of asymptomatic can be identified via randomized testing. The points correspond to the parameter pairs such that *εI* is an input and *εT* an output of the simulations on real contact data, for the policies of Table 1. ### 2.3 Any effective containment comes at a cost Behind the scenes of the aggregated results of the previous section, there is a complex dynamic which merits further investigation. Indeed, the different tracing efficiencies that are observed are the macroscopic result of a different set of contacts considered as at risk. In some cases this produces the desirable effect of containing the spread, but side effects emerge as well. As mentioned in the introduction, indeed, some of the “at risk” contacts did not actually lead to a contagion event, while contacts classified as non risky might have, since the spreading process is inherently stochastic. It is thus important to quantify the ability of each policy to discriminate between contacts on which the disease spreads and the others, in terms of *false positives* (quarantined individuals who were not infected) and *false negatives* (non-quarantined infected individuals). To visualize this behavior, we focus on the case of *εI* = 0.8, since it is representative of a situation in which some policies are effective in containing the spread and others are ineffective (Figure 5): Figure 6 presents the corresponding time evolution of the average number of false negatives and of false positives for each policy. ![Figure 6:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F6.medium.gif) [Figure 6:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F6) Figure 6: Temporal evolution of the numbers of false negatives (Figure 6a) and false positives (Figure 6b) for the five different policies, assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation (shading) over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been unnecessarily quarantined (false positives) over the whole simulation timeline. What matters in terms of virus containment is to rapidly reduce the number of infected people that can have contacts and spread the virus. Independently of the policy, the curves of false negatives all peak after around 5 days, reaching similar levels. The curve drop to zero rapidly however only for the stricter policies, while for Policy 1 it remains at a high level for up to 15 days, corresponding to the fact that the spread is not contained early in the process. The smaller number of false negatives for the effective policies comes however at the cost of a significantly increased number of false positives, as shown in Figure 6b. In other words, as a policy becomes more effective in tracing actually infected people, it also leads to the quarantine of individuals that have not been infected but that had a contact classified as risky by the tracing policy. In all cases, a peak of the number of false positives is reached after around 15 days, but this number is very sensitive to the specific policy, contrarily to the number of false negatives. In particular, it appears from the analysis of Section 2.2 that Policies 4 and 5 have a similar effectiveness to contain the epidemic and Figure 6 shows that they yield indeed similar numbers of false negatives, but their undesired side costs are different, as the broader definition of risky contacts of Policy 5 produces a larger number of false positives. This highlights once more the importance of fine-tuning of the chosen policy. ### 2.4 Low app adoption levels impair any containment effort So far, we have assumed that the only limit to reach a perfect contact tracing resides in the technology specifications of each policy. This implies however that the totality of the population adopts the app, something which is clearly unrealistic in practice. We thus repeated our simulations assuming that only a fraction of the population uses the app, while the remaining individuals are outside the reach of the tracing and quarantining policies, but they are still isolated whenever detected because symptomatic or through random testing (see Supplementary Information 4.1.5). We found that assuming an app adoption of 60% (Figure 7a) implies that no tracing policy is effective: None of the feasible tracing efficiency values of *εT*, obtained by simulations on the real contact network dataset, reach the threshold required to contain the spread. Quite similarly, an 80% app adoption (Figure 7b) can be sufficient to stop the epidemic only if Policy 4 or Policy 5 are adopted and a perfect tracing efficiency (*εI* = 1) is in place. ![Figure 7:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F7.medium.gif) [Figure 7:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F7) Figure 7: Growth or decrease rate of the number of newly infected people, and real parameter pairs estimated from the network simulations for the policies of Table 1, assuming an app adoption level of 60% (Figure 7a) or 80% (Figure 7b), and an adoption of 80% with *R* = 1.6 (Figure 7c). In both cases, the effect of a limited app adoption on the tracing efficiency *εT* appears quadratic: a 60% app adoption reduces the efficiency roughly to its 35% percent, while an 80% adoption reduces it to the 60% percent (see Supplementary Information C.4). This effect is explained by the fact that to trace a contact between two individuals it is necessary that both have installed the app. We further investigate a setting where we assume that, in addition to a 50% randomized testing policy, other measures are in place so that the reproduction number is reduced to *R* = 1.6 (see Supplementary Information C.1 and Figure 7c. In this case, even an 80% adoption allows one to contain the contagion under a sufficiently strict digital tracing. Namely and remarkably, all the five policies are able to contain the virus if a perfect isolation (*εT* = 1) is in place. This scenario, however, is unrealistic, but it was not present in previous settings, and it highlights the fundamental benefit that a reduction of *R* by other measures can bring to digital tracing. If instead the isolation efficiency is less than perfect, several policies manage to stop the contagion: if *εI* is at least 0.8, then Policies 2, 3, 4, and 5 are effective. Smaller values of *εI* are instead insufficient. Figure 8a and Figure 8b offer an additional insight into the dynamics of the epidemic simulated on the contact network with an 80% app adoption, and reduced *R* = 1.6. In particular, Figure 8a shows the evolution of the numbers of false negatives (active infected) and Figure 8b of false positives (susceptible quarantined), where each color represents the corresponding policy. The less restrictive policy (green line) does not yield a rapid containment; the number of false negatives does not decrease rapidly but remains large over almost 15 days. The decrease is faster for the more restrictive policies. The evolution of the number of false positives shows here an interesting pattern with a double wave, particularly marked in the more restrictive policy. This is due to the fact that when people leave the quarantine after the first peak, a large number of non-traced infected individuals are still free to have contacts. This implies a new wave of infections and necessary quarantines. In practice, as only a fraction of the population can be quarantined, they are likely to be quarantined multiple times. ![Figure 8:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F8.medium.gif) [Figure 8:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F8) Figure 8: Temporal evolution of the numbers of false negatives (Figure 8a) and false positives (Figure 8b) for the five different policies, assuming an isolation efficiency of *εI* = 0.8, an 80% app adoption level, and a reduced *R* *=* 1.6 with 50% testing of asymptomatics. The graphs depict the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been unnecessarily quarantined (false positives) over the whole simulation timeline. ## 3 Conclusions In this study, we have analyzed the ability of digital tracing policies to contain the spread of Covid-19 outbreaks, using real interaction datasets to extract the main effective parameters and to shed light on the practical consequences of the implementation of various app policies. We found that the set of parameters that allow containment of the spread is strongly restricted by the fraction of asymptomatic cases. By first assuming an ideal setting where any pair of parameters *εI*, *εT* is possible, we showed (Figure 3) that perfect contact and isolation policies are required if only symptomatic people can be detected and a realistic fraction of asymptomatic cases (40%) is assumed. We have thus assumed in addition that 50% of the asymptomatic can be detected by randomized testing (see Figure 5). We remark that this is in contrast with the scenario considered in Fraser et al.3 and in Ferretti et al.,1 where all the infected population is eventually assumed to become symptomatic. We tested five policies to define risky contacts that should be traced (Table 1), with different restriction levels. When implemented on real contact data measured by Bluetooth, they allow us to estimate, for each value of *εI*, the actual value of *εT* and thus to determine the efficacy of each policy (colored points in Figure 5). Using these implementations on real data restricts the available values of the control parameters and, as a consequence, only the most restrictive policies lead to epidemic containment. Moreover, even for these policies, tracing is effective only if the isolation is effective: Policy 2 requires a perfectly effective isolation (*εI* = 1), while an 80% isolation is sufficient for Policies 3, 4, and 5 (Figure 5). In particular, better tracing policies may work with a less effective isolation strategy. Our results highlight how isolation and tracing come at a price, and allow us to quantify this price using real data: the policies that are able to contain the pandemic have the drawback that healthy persons are unnecessarily quarantined (Figure 6). In other words, achieving a rapid containment and a low number of false negatives requires accepting a high number of false positives. This stresses the importance of a fine tuning of the tracing and isolation policies, in terms of the definition of what represents a risky contact, to contain the social cost of quarantines. Finally, we have shown that an insufficient app adoption may render any digital tracing effort helpless on its own. In view of these results, bridging the gap between a realistic app adoption and the larger tracing capability required to contain the disease appears crucial. In particular, digital tracing in itself may not be enough if not complemented by a traditional manual tracing policy and/or other measures. This goal can be reached only with a joint effort of policy makers and health authorities in organizing an effective manual tracing, and of individual citizens in adopting the app. It is also important to mention that our study comes with a number of limitations. First of all we are focusing on a single kind of intervention in order to fight the spread of the epidemics, which is just based on isolation and tracing. This is in order to isolate the effect of an app-based containment, avoiding additional spurious effects. In order to see the effect of isolation and tracing when implemented with other restrictive measures, we applied the same numerical machinery to a setting with a reduced *R*, representing a general reduction of the epidemic spread. We did not consider specific containment measures like social distancing, travel restrictions, school closures, and so on. Moreover, we have considered data corresponding to a few limited social environments (a university campus, a high school and a workplace) and we cannot provide an overall general study that includes multiple and differentiated contexts and their mutual interplay. Our study is focused on the state of the art interaction datasets, which are nevertheless designed to capture a very limited social environment when compared e.g. with a real city. This limitation is then due to the lack of larger datasets (or synthetic social networks) involving people belonging to different environments, thus being able to represent the general interactions within the population of a city or a larger geographical area. In addition, the implemented policies have been necessarily tailored to this specific DTU dataset, depending on the available values of RSSI supported by the used smartphones. Those might therefore differ in actual implementations currently under development, probably relying on a more advanced technology than that of 2014. Finally, our study is limited by the state of the current knowledge of the contagion modalities of the COVID-19 virus, and in particular its dependence on physical distance among people and the duration of their contacts. The curve of infectiousness has been designed based on previous contagion studies and on reasonable assumptions. Should new insights emerge in the way the virus spreads, these could be easily incorporated into our model. ## 4 Data and Methods The mathematical model we use includes several parameters characterizing the epidemic, and we define them following the most recent literature. Although this is a mere literature survey step, it is nevertheless of fundamental importance. Indeed, as we will see in the following, different assumptions at this level may lead to different predictions. The main parameters are: * *s*(*τ*) which is the probability for an infected individual to be detected as infected (and thus isolated) within a time *τ* after infection, either via self reporting after the symptoms onset, or via randomized testing; * *β*(*τ*), which is the infectiousness of an infected individual at time t after infection: this is defined as the probability that an individual who is infected since a period of time *τ* infects a new susceptible individual upon contact, *ω*(*τ*), multiplied by the reproduction number, *R*; * *βdata* (*τ*, *s*, *e*), which is the analogous of *β* when applied to a real dataset: it depends on the duration *e* of a contact and on the strength *s* of the interaction, quantified by the strength of the signal exchanged by the devices registering the interaction. Details on these choices are discussed in Supplementary Information A. The realistic values for the parameters *εI*, *εT* and the interplay between the containment policies and the virus spread are estimated from real-world interaction datasets. Namely, we consider datasets describing networks of real contacts in a population, where interactions are determined by means of exchange of Bluetooth signals between smartphones. We develop a numerical simulation of the virus spread on this network, and in particular we implement a realistic notion of infection transmission upon contacts, which follows the parameters defined above. In this framework, we simulate isolation and tracing policies, where the tracing policy is implemented by defining sensors resolutions (e.g., a contact is detected if a minimal signal strength or a minimal contact duration are registered). It is also possible to model the rate of adoptions of the app, or the memory length of past traced contacts. The effect of these specifications on the actual effectiveness of the isolation and tracing policies are then obtained as output of the simulation: we obtain hence real-world estimations of the parameters *εT*, from the input value of *εI* (that encodes e.g. the testing capacity, or the effectiveness of tests). The details of this simulation, the definition of the policies, and the strategy used to estimate the control parameters are described in more detail in Section 4.1. In order to incorporate these data-dependent and possibly time-varying control parameters into the predictions, we develop a finer analysis of the continuous model and its discretization. In particular, both Fraser et al.3 and Ferretti et al.1 analyze the model prediction only in the limit of an infinite time horizon, and the first study3 furthermore assumes that the number of infected can only have an exponential behavior, either growing or declining. We instead consider the model at finite times and develop a new discretization of the continuous model that requires no assumptions on the functional form of the growth or decline of the contagion. This allows us to simulate more complex regimes and better quantify the effect of the control parameters, and in particular to align the model timescales with the simulation time, and thus to use the realistic parameters estimated from the simulations, including the implementation of time-dependent policies. This approach is presented in Supplementary Information B. The overall output of the model is the predicted number *λ*(*t*) of newly infected individuals at time t, and we are interested to study policies that contain the epidemic, i.e., such that *λ*(*t*) → 0 as *t* grows. ### 4.1 Policy evaluation from real datasets We describe here the network simulation that leads to the estimation of the parameter *εT*. #### 4.1.1 Description of the datasets For the simulations we use the interaction data from the Copenhagen Networks Study,50 which describes the interactions of 706 students, as registered by the exchange of Bluetooth signals between smartphones, for a period of one month. From the complete dataset we extract the proximity measures in the form of Bluetooth signal strength. #### 4.1.2 Definition of a contact and contagion probability At each time instant, and for each node in the graph which is currently infected, a probability distribution is used to decide whether or not the virus is spread to each of its contacts. This probability is the product of three components, i.e., ![Formula][1] and it quantifies what contacts are relevant for the disease transmission. The three components are: * *ω*(*τ*), the probability for an infected individual to transmit the disease at time *τ*, appearing in Figure 4 in the case of the dataset of the previous section; * *βexposure*(*e*), the probability for an infected individual to transmit the disease given the duration *e* of a contact, appearing in Figure 2; * *βdist*(*ss*), the probability for an infected individual to transmit the disease given the signal strength *ss* of a contact, appearing in Figure 2. We refer to Table 3 in Supplementary Information for the definition of each of these distributions. View this table: [Table 3:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T2) Table 3: Characteristic parameters of the disease. #### 4.1.3 Description of the spreading algorithm We develop an individual-based model for the virus spreading. Starting from the real contacts dataset, we construct a weighted temporal network, in which nodes represent people and edges stand for temporal and distance-weighted connections between them. The dynamics performed on the network is described by the following algorithm. We start at time *t* = 0 with an initial number *Yi* of infected people, each one infected from a time *t* = −*τi*, sampled from a uniform distribution ![Graphic][2]. Thereafter, at each time step *t* of size *δ* = 300*s*: * Each *T-i* value is incremented by 8. * If an individual *i* is neither isolated nor quarantined, s/he can infect each of her/his neighbors *j* of with a probability *βdata*(*τi, si,j, ei,j*) (see previous section). * Newly infected people are assigned *τ* = 0 and a time to onset symptoms *t* + *to*, where *to* is extracted from the distribution *onset time*(·) defined in Table 3. * If an individual is recognized as infected (either as symptomatic or by testing) but still not isolated, we isolate him/her with probability *εI* and we quarantine all her/his contacts according to a policy, that is, all her/his contacts above a spatio-temporal threshold (see the next section for a precise description of this policy). * If a quarantined individual becomes symptomatic, we quarantine all her/his previous contacts (i.e., before entering quarantine) according to the above-mentioned policy. #### 4.1.4 Policy implementation and evaluation In a realistic scenario the isolation efficiency *εI* or, in other words, the ability to identify and consequently isolate an infected individual, is set by the number of tests that are implemented and by their accuracy, features whose identification is out of the scope of this work. We mention that the adoption of an app might have a positive effect on this quantity if the possibility of self-reporting when symptoms appear is implemented in the device. Our main goal is to characterize the efficiency of contact tracing, quantified by *εT*. This is far more than a simple parameter that freely varies between 0 and 1. Its definition is indeed affected by multiple contributions, involving both the containment measures efficiency and the policy decisions. In a general setting we can easily identify two main dependencies: (*i*) the fraction of primary infected individuals who are actually identified, isolated and whose latest contacts are investigated (in other words, *εT* should be directly proportional to *εI*, approximately corresponding to the fraction of possibly secondary infections that a tracing policy can try to reconstruct); (*ii*) the real contact tracing, because once an infected individual is isolated the contact tracing will reach only part of her/his previous contacts, depending on the chosen policy. Indeed, if we choose a policy where all the contacts, even the most long range distance and irrelevant, of an infected individual are traced and quarantined, we would probably end up with a total lock-down of the entire population. There is therefore a social cost of this action that should be considered and possibly minimized. On the other side, when we decide to quarantine only people who had a large probability of having had a contagious contact, we are probably underestimating the infected people, leaving some of them outside of reach of the quarantine effort. The error that we introduce when we decide, for practical reasons, not to trace all the contacts of an infected individual represents an important contribution to the limitation of the tracing efficiency. This is quantified by *eT*(*t*), which takes values between 0 and 1 and is in general time-dependent. The value of *eT* is estimated from the numerical simulations on the real temporal networks of contacts as follows. Once an individual is isolated we trace her/his contacts according to the chosen policy, then we count the fraction of people that s/he has actually infected who remained outside of the quarantine. By averaging on individuals and time we obtain 〈*eT*〉. The obtained value thus encodes the contribution of the chosen policy, adoption rate, duration of the memory of contacts and potentially the warning of only the direct contacts or also of contacts of contacts. The tracing efficiency can therefore be defined as the product of the two independent factors: ![Formula][3] such that we obtain the maximum efficiency only if isolation is perfect and the quarantine error (eT) is zero. #### 4.1.5 Varying the app adoption levels When modeling different levels of adoption of the app we implement the following procedure: we extract at the beginning of each simulation a random list of users, that will act as non adopters. During the simulation these agents will contribute to the spread of the virus and will be subject to isolation whenever detected as infected, as any other individual, but in that case their contacts cannot be traced. Moreover they do never appear in any contact list, and thus they are never quarantined. In practice we simulate the fact that a contagious contact is recorded only if both the infectious and the infected have the app. We make the simplifying assumption that the app influences only the quarantining of individuals, but not the isolation policy. Namely, we assume to be able to detect and thus isolate an infected individual independently of the app, while we are able to trace the contacts only between pairs of app adopters. ## Data Availability All the data referred to in the manuscript are from public available datasets (Copenhagen Networks Study, SocioPatterns datasets) ## Supplementary Information ### A Definition of the characteristic parameters of the disease The choice of parameters and the source of their definition is described in Table 3. We here discuss the function infectiousness and its relation with the reproduction number *R*. #### A.1 Parameter tuning to validate the infection probabilities Since we couple a continuous model (see Section B in Supplementary Information) with a simulation on a dynamic network (see Section 4.1), we tune the epidemic parameters so that the spreading patterns of the virus are consistent in the two settings. Namely, while the infectiousness *β*(*T*) of the continuous model has an explicit dependence on the reproduction number *R* (that can thus be set to the desired value), the relation between the infectiousness of a contact *βdata* and the reproduction number is more implicit. Indeed, *βdata* depends on contagion probabilities as functions of the distance and duration of a contact (see Table 3), and the reproduction number is a consequence of the form of *βdata* and the contact data. We thus tune the parameters defining *βexposure* so that the empirical reproduction number ![Graphic][4] coincides with the actual R used in the continuous model. Although it is known that *R* has a large variability42,49 and some recent works42,62 suggest that the relationship between *R* and the real size of an outbreak is not trivial, the procedure to estimate ![Graphic][5] is a standard one.49 Each spreading simulation (see Section 4.1 in Supplementary Information) is started setting one random individual A as the only initially infected agent, and we count the number ![Graphic][6] of people that A infects over the simulation time. The simulation is repeated multiple times starting with different initial spreaders, and the average of all the computed numbers ![Graphic][7] gives an estimate of ![Graphic][8]. This estimate is computed for a range of different choices of *βexposure* in order to find a value of ![Graphic][9] close to *R* = 2. To do so, we fix ∆*t* = 60 sec and vary the value of *β*, and report in Table 4 the results of the simulation. View this table: [Table 4:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T3) Table 4: Values of the parameters defining *βexposure* that have been tested to find a correct value of ![Graphic][10], and the corresponding estimates of the mean and standard deviation of ![Graphic][11]. Since the simulations are stochastic in nature, we report the mean and standard deviation of ![Graphic][12]. As it is customary,49 we choose the set of parameters based on the mean of this distribution, and thus we choose the value *β* = 0.002, giving ![Graphic][13] = 2.26. ### B The continuous model and its discretization The epidemic model form1,3 (to which we refer for a precise derivation) provides a quantification of the number *Y*(*t*, *τ*, *τ*′) of people at time t that have been infected at time *t* − *τ* by people who have in turn been infected at time *t* − *τ′*. The model characterizes *Y* as a function of *s*(*τ*) and *β*(*τ*) (see Section A in Supplementary Information). Observe that both are quantities in [0,1], and that *s*(*τ*) is a non decreasing. The model then states that *Y*(*t*, 0, *t*) is a given initial value and that for 0 < *τ*< *t* it holds ![Formula][14] In the two cited papers the values of *εI*, *εT* ∊ [0,1] are fixed, while we assume from now on that they depend on *τ*. Observe that in the absence of containment policies (i.e., *εI* = *εT* = 0) the model predicts a behavior ![Formula][15] i.e., the new infected people are just given by the cumulative number of people who have been infected at previous times, weighted by the infectiousness of the disease. In other words, every previously infected person is a possible agent of new infection, and in this scenario an exponential growth is observed. The isolation and tracing measures, on the other hand, act as discounts on the number of available spreader of the epidemic. #### B.1 A more convenient form of the equations As mentioned before, the model was analyzed in1,3 by considering its asymptotic behavior as t grows to infinity. We instead need a finite-time model that allows a flexible treatment of real data. To this end, it is convenient to use the variable Λ(*t*,*τ*):= *Y*(*t*, 0, *τ*) (see3) which represents the number of people which are infected at time t by people who have been infected for time *τ′* ≤ *t*. With straightforward manipulations, equation (2) can be rewritten for 0 ≤ *τ* < *t* as follows ![Formula][16] where we changed the integration variable to *ρ*:= *τ*′ − *τ*, and we used the translational invariance of *Y*. In the variable Λ, this reads as ![Formula][17] Observe that this is an evolution equation that requires to define an initial number of infected people, i.e., we assume that the quantity Λ (0, 0):= Λ is a given number. The quantity of interest is then the total number ![Graphic][18] of newly infected people at time t. #### B.2 Discretization We fix a value *T* > 0 as the maximal simulation time and take *n* +1 points in [0, *T*] i.e., ![Graphic][19], 0 ≤ i ≤ *n*. We will approximate the values of Λ(*τk*, *τi*) for *k* = 1,…, *n* and *i* = 0,…, *k* − 1, while, according to,3 we set A(Tk, Ti) = 0 for all i > k. Moreover, we assume that the value Λ(*τ*1, *τ*) is given. Observe that this discretization is equivalent to assume that the number of new cases is measured only at equal discrete times (e.g., at the end of each day) rather than measured continuously. We show in the next section that the continuous model (3) can be approximated by defining a suitable value for Λ(*τ*1, *τ*), and then iteratively computing the values of Λ(*τk*, *τi*) by applying the simple formula ![Formula][20] where the matrix ![Graphic][21] is defined for 0 ≤ *i*, *j* ≤ *n* − 1 as ![Formula][22] We remark that this equation is a forward-in-time system, meaning that the computations of the values of Λ(*τ*, *t*) is obtained using only values of A for previous time steps, which have thus already been computed. This is in strong opposition with the case of1,3 where an eigenvalue equation has to be solved, and only the asymptotic state can be estimated. Moreover, we can use Λ to compute ![Formula][23] #### B.3 Derivation of the discretization We fix a value *T* > 0 as the maximal simulation time and take *n* + 1 points in [0, *T*] i.e., ![Graphic][24], 0 ≤ *i* ≤ *n*. The points will be used also to approximate integrals via a right-rectangle quadrature rule, i.e., ![Formula][25] The goal is to approximate the values of Λ(*τk*, *τi*) for *k* = 1,…, *n* and *i* = 0,…, *k* − 1, while, according to,3 we set Λ(*τk*, *τi*) = 0 for all *i* ≥ *k*. Moreover, we assume that the value Λ(*τ*1, *τ*) is given. For 1 ≤ *k* ≤ *n* we first evaluate (3) at the points, first in the variable t for 1 ≤ *k* ≤ *n*, i.e., ![Formula][26] and then in the variable *τ* for *τ* < *t*, that is for 0 ≤ *i* ≤ *k* ≤ *n*, i.e., ![Formula][27] Now observe that for 0 ≤ *i* < *k* ≤ *n* we have ![Formula][28] which ranges between *τk* for *i* = 0 and *τ*1 for *i* = *k*−1. The last equation becomes for 0 ≤ *i* ≤ *k* ≤ *n* ![Formula][29] We can then use the quadrature rule (5) to discretize the integral and obtain ![Formula][30] Observe that the upper limit in the sum has values 0 ≤ *k* − *i* − 1 ≤ *k* − 1 for 0 ≤ *i*< *k*. Moreover, in this case we have for 0 ≤ *j* ≤ *k* − *i* − 1 that ![Formula][31] which ranges between *τi* and *τk*−1. Inserting this into the last equation we get for 0 ≤ *i* < *k* ≤ *n* ![Formula][32] We can define the matrix ![Graphic][33] whose entries are defined for 0 ≤ *i, j* ≤ *n* − 1 as ![Formula][34] which has a triangular structure (the first row is nonzero, in the second row the last element is zero, …, in the last row only the first element is nonzero). With this matrix we can rewrite (6) as ![Formula][35] which is a recursive equation that determines the evolution of Λ(*t*, *τ*) once an initial condition is given. Assuming for now that these initial conditions are given, we can compute Λ(*τk*, *τi*) forward in k and backward in i. That is, after we computed Λ(*τℓ*, *τi*) for all *ℓ* = 1,…, *k* − 1, and for 0 ≤ *i* ≤ *ℓ*, we can use (7) to compute Λ(*τk*, *τi*) for 1 ≤ *i* < *k*, since in this case the right hand side contains values Λ(*τk−i*, *τj*) which have already been computed since 1 ≤ *k* − *i* ≤ *k* − 1 for 1 ≤ *i* < *k*. The only remaining case is *i* = 0, and in this case the formula (7) gives instead ![Formula][36] thus ![Formula][37] where ![Formula][38] and thus ![Formula][39] This term is positive if and only if ![Formula][40] Since the left hand side is at most *β*(*τ*), it is sufficient to require that *n/T* > *β*(*τ*), or *n* > *β*(*τ*)·*T*. In this way we defined Λ(*τk*, *τi*) for all values 1 ≤ *k* ≤ *n* and 0 ≤ *i* < *k*. It remains to assign the value Λ (*τ*1, *τ*), which can be fixed to the initial value Λ. ### C Evaluation of additional containment measures and refined policies Some extensions are possible to our current setting, and we report the most relevant ones in the following. Each consists in additional steps to either enhance an existing policy or to replace it in order to investigate the effect of other important aspects of the tracing procedure. #### C.1 Compensating a poor testing policy with a reduction of the reproduction number As our base setting we assumed that the number of asymptomatics reaches 40%, and that 50% of them can be detected by a randomized testing policy. With these assumptions, the possible scenarios of the epidemic containment are depicted in Figure 3c. We remark here that it is possible to reach a similar scenario without the need of randomized testing, provided other policies are in place. Namely, we found that assuming that other containment policies (such as masks, better hygiene, physical distancing) have the effect to reduce the reproduction number to *R* = 1.6, and with no testing, the behavior of the epidemic spread is similar. We report the results of the model predictions and the network simulations for this scenario in Figure 9a, which indeed provides an outcome very similar to the one of our main simulation (see Figure 5). ![Figure 9:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F9.medium.gif) [Figure 9:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F9) Figure 9: Growth or decrease rate of the number of newly infected people and efficiency of the containment policies assuming different scenarios: In Figure 9a only symptomatic people can be isolated, and a set of additional policies are in place so that the effective reproduction number is reduced to *R* *=* 1.6; In Figure 9b, in addition to the basic setting, the app keeps track of 10 days (instead of 7 days) of past contacts. #### C.2 Longer tracing memory The robustness of the tracing policies is also of fundamental interest, and indeed we introduced (Table 1) five different policies that cover a wide range of possible sensitivity levels, both in space and in time. It remains to explore how these policies depend on the memory length of the contact history, which is set to 7 days for all the policies (see Section 2). In particular, it is interesting to understand whether or not an increased memory would improve the effectiveness of each policy. We thus repeat the experiments assuming that the contacts of each individual are recorded for 10 days in the past, and report the results in Figure 9b. When compared with the original setting (see Figure 5), it is clear that the increased memory brings a negligible advantage (at the price of increased storage requirements). Indeed, the only visible improvement is a slight increase of the tracing effectiveness of Policy 4, which is now essentially equivalent to Policy 5. #### C.3 Second order tracing An additional possibility is to keep track of contacts in a recursive way. Namely, when an individual is isolated, not only its contacts are quarantined, but also its contacts’ contacts. This obviously means an enhanced risk in terms of preserving the privacy of individuals, and hence the major open question regarding this kind of policies is whether or not the increased intrusiveness into an individual’s social network provides a tangible improvement of the virus containment efforts. A complete study of this scenario is beyond the scope of this paper for two reasons. First, the continuous model (see Section B) does not take into consideration this kind of tracing, and there is thus no way to use in a meaningful way any information provided by the study of the dataset. Second, although the datasets we consider are the state of the art in interaction monitoring, they are still rather small to study in a realistic way the effect of a policy that rapidly traces a very large number of persons. Nevertheless, we find meaningful to report here a preliminary study of this additional, more intrusive tracing policy. The results are reported in Figure 10, where we show the time evolution of the number of false positives and false negatives (see Figure 6 for the analogous result in the standard setting). The plots show that, in the Copenhagen Study Dataset, the recursive tracing is sufficient to rapidly reduce to zero the number of false negatives (that is, the spread of the virus is stopped) with a number of false positives which is slightly lower than that obtained with the standard policies. Indeed, in this case the tracing is a very fast process (the maximum peak of quarantines is reached within 5 days after the beginning of the simulation), resulting in a massive quarantining. This considerably and rapidly reduces the amount of available susceptible individuals. As a consequence the active infected (false negatives) do not have enough contacts to infect and the spread is stopped. Basically, in this case the quarantines do not have the effect of isolating potential infected individuals but rather to reduce the number of susceptible individuals that could have a contact with potentially infected ones. As a result, almost all the individuals that we are quarantining are susceptible, i.e., we have a large amount of false positives and a negligible number of true positives (see Table in Fig.10). This result is in agreement with that obatined by Firth et al.47 We remark once more that the reliability of this result is limited, being linked to a specific dataset and not to a general theory. Our insight is that the efficiency of the procedure is due to the finite dimension of the agent sample, where such an immediate and preventive intervention is sufficient to cut all the links between infected and susceptible, resulting in a situation which is more akin to a lock-down than to actual contact tracing. ![Figure 10:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F10.medium.gif) [Figure 10:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F10) Figure 10: Temporal evolution of the numbers of false negative (Figure 10a) and false positive (Figure 10b) for the five different policies with second order tracing and assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been unnecessarily quarantined (false positives) over the whole simulation timeline. Moreover, we should mention the fact that we did not consider the effect of a lower app adoption in this case, assuming that 100% of the population can be correctly traced. Such a scenario is even more unrealistic when considering second order tracing, being a large compliance obtainable only if privacy is perfectly preserved.45 For these reasons we remark that the concept of second-order tracing, a topic of recent discussions, deserves further investigation and may possibly be expanded in a follow-up of this work. #### C.4 Effect of a reduced app adoption To complement the analysis of Section 2.4 on the effect of a limited app adoption, we provide here a numerical quantification of the reduction in the values of *εT*. For the five policies of Table 1 and for *εI* = 1, we report in Table 5 the ratio between the values of *εT* in the case of a limited appadoption (60% or 80%) and in the case of full app adoption (100%). Observe that the computed values are actually quite close to show a quadratic reduction effect, even if for most policies the reduction is actually slightly larger. View this table: [Table 5:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T4) Table 5: Ratio of the values of *εT* between a partial and a full app adoption, for the five policies of Table 1 and *εI* = 0.8. The values are rounded to the first decimal digit. #### C.5 Close-range short-exposure vs long range long-exposure interactions We test here two additional policies obtained by mixing a low space resolution and a high time resolution, and viceversa. The policies are defined in Table 6. Policy 6 has a signal strength of −70dBm and a duration of 10 minutes, resulting in a policy that captures short exposure but close range interactions. Policy 7 instead captures long exposure but long range interactions, having a threshold signal strength of −91dBm and a duration of 30 minutes. View this table: [Table 6:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T5) Table 6: Parameters defining the two additional policies. Figure 11, in analogy with Figure 2, shows the new policies overlaid to the histograms of duration and signal strength of the CNS dataset contacts. ![Figure 11:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F11.medium.gif) [Figure 11:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F11) Figure 11: Distribution of the duration (Figure 11c) and signal strength (taken as a proxy for proximity, Figure 11b) of the contacts in the CNS dataset. Figure 11a gives a scatterplot of signal strength vs duration, and displays the thresholds defining the two policies of Table 6. The values of the parameters (*εI*, *εT*) characterizing the numerical simulations for the new policies are shown in Figure 12 (see Figure 5 for a comparison with the policies of Table 1), and it is clear that Policy 7 is as effective as the most restrictive policies (Policy 4 and Policy 5), while Policy 6 fails to contain the virus for any value of the isolation efficiency. The efficiency of quarantines is assessed by the number of false positives and false negatives, reported in Figure 13. ![Figure 12:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F12.medium.gif) [Figure 12:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F12) Figure 12: Growth or decrease rate of the number of newly infected people assuming that symptomatic people can be isolated and that an additional 50% of asymptomatic cases can be identified via randomized testing. The points correspond to the parameter pairs such that *εI* is an input and *εT* an output of the simulations on real contact data, for the policies of Table 6. ![Figure 13:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F13.medium.gif) [Figure 13:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F13) Figure 13: Temporal evolution of the numbers of false negatives (Figure 13a) and false positives (Figure 13b) for the policies of Table 6, assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation (shading) over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been unnecessarily quarantined (false positives) over the whole simulation timeline. We deduce that the ability to control the contagion seems to be more sensitive to duration of contacts than to their spatial distance. Indeed, policies which capture close range but short exposure interactions happen to be less performative in quarantining people than those signaling long range interactions with long exposure. In other words, quarantining individuals who have had a short interaction with an infected one, even if at close-range, is unnecessary. On the other hand, it appears to be important to track contacts with a high spatial resolution, including the ones that happens at a rather long distance. If this is possible, there is no need to track short contacts, but it is sufficient to detect long ones However, we remark once more that these results are depending on the infectiousness model that we have here defined, and that they could possibly change in a different setting. Figures 14 and 15 refer to the more realistic case where the app adoption is reduced to 80% but the reproduction number *R* is reduced too. We also maintain random testing in order to have the possibility of isolating asymptomatic individuals. ![Figure 14:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F14.medium.gif) [Figure 14:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F14) Figure 14: Growth or decrease rate of the number of newly infected people assuming an 80% app adoption level, and a reduced *R* = 1.6 with 50% testing of asymptomatics. The points correspond to the parameter pairs such that *εI* is an input and *εT* an output of the simulations on real contact data, for the policies of Table 6. ![Figure 15:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F15.medium.gif) [Figure 15:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F15) Figure 15: Temporal evolution of the numbers of false negative (Figure 15a) and false positive (Figure 15b) for the policies of Table 6, assuming an isolation efficiency of *εI* = 0.8, an 80% app adoption level, and a reduced *R* = 1.6 with 50% testing of asymptomatics. The graphs depict the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been unnecessarily quarantined (false positives) over the whole simulation timeline. The case with second-order tracing for the two new policies is depicted in Figure 16, by showing false positives and false negatives in quarantines. Again, the effect of tracing is strong and immediate when having access to second order contacts, however the other side of the coin is represented by the fact that large part of the population is quarantined and almost all of the isolated individuals are not infected. ![Figure 16:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F16.medium.gif) [Figure 16:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F16) Figure 16: Temporal evolution of the numbers of false negatives (Figure 16a) and false positives (Figure 16b) for the policies of Table 6 with second order tracing and assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been wrongly quarantined (false positives) over the whole simulation timeline. ![Figure 17:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F17.medium.gif) [Figure 17:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F17) Figure 17: Distribution of the time since infection of the people having contacts, probability distribution *ω*(*τ*) (black line) determining the infectiousness as a function of time, and distribution *s*(*τ*) determining the cumulative probability to detect an infected person (purple line). The two plots are obtained with *εI* = 0.8 and Policy 5 for the *InVS15* (Figure 17a) and the High_School13 datasets (Figure 17b). ![Figure 18:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F18.medium.gif) [Figure 18:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F18) Figure 18: Growth or decrease rate of the number of newly infected people and efficiency of the policies for the *InVS15* dataset (Figure 18a) and the *High_School13* dataset (Figure 18b). ![Figure 19:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F19.medium.gif) [Figure 19:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F19) Figure 19: Temporal evolution of the numbers of false negatives (Figure 19a) and false positives (Figure 19b) of the *InVS15* dataset, for the five different policies and assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been wrongly quarantined (false positives) over the whole simulation timeline. ![Figure 20:](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/30/2020.05.29.20115915/F20.medium.gif) [Figure 20:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/F20) Figure 20: Temporal evolution of the numbers of false negatives (Figure 20a) and false positives (Figure 20b) of the *High_School13* dataset, for the five different policies and assuming an isolation efficiency of *εI* = 0.8. The graphs report the mean and standard deviation over 10 independent runs. The table reports mean and standard deviation of the total number of distinct individuals who have been quarantined and of those who have been wrongly quarantined (false positives) over the whole simulation timeline. ### D Extended results on SocioPatterns datasets In this section we present the results of simulations performed on two different datasets: (i) *High_School13*,52 collected in a French high school, and (ii) *InVS15*,51 collected in a French workplace. Both datasets have been collected using the sensing platform developed by the SocioPat terns collaboration1, which is based on wearable active Radio Frequency Identification (RFID) devices that exchange radio packets, detecting close proximity (≤ 1.5*m*) of individuals wearing the devices.57 These data do not contain information on the signal strength, but simply give a list of contacts between individuals with a resolution of 20 seconds. Both simulations and policies are thus defined only as a function of contact durations. In order to see the effectiveness of the policies and the spreading of the virus, it is needed that the length of the collected data is larger than 15 days. As the SocioPatterns data have a high temporal resolution (20 seconds) but were collected for shorter overall durations, we artificially extend the length of each dataset by replicating it (coping and pasting the entire dataset at the end of the dataset itself). Table 7 gives the number of nodes, the length of the dataset (in days) and the duration of the replicated data. View this table: [Table 7:](http://medrxiv.org/content/early/2020/05/30/2020.05.29.20115915/T6) Table 7: Number of nodes, days and extended days for each SocioPatterns dataset. ## Acknowledgements The authors would like to thank Esteban Moro, Alex Sandy Pentland, and Fabio Pianesi for early discussions and useful comments, Stefano Merler for the feedback on the design of the infectiousness parameters for COVID-19, and Valentina Marziano and Lorenzo Lucchini for the discussion and general support. ## Footnotes * 1 [http://www.sociopatterns.org/](http://www.sociopatterns.org/) * Received May 29, 2020. * Revision received May 29, 2020. * Accepted May 30, 2020. * © 2020, Posted by Cold Spring Harbor Laboratory This pre-print is available under a Creative Commons License (Attribution-NonCommercial-NoDerivs 4.0 International), CC BY-NC-ND 4.0, as described at [http://creativecommons.org/licenses/by-nc-nd/4.0/](http://creativecommons.org/licenses/by-nc-nd/4.0/) ## References 1. [1]. Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-Dorner, Michael Parker, David Bonsall, and Christophe Fraser Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science, 2020. 2. [2]. Christophe Fraser, Lucie Abeler-Dorner, Luca Ferretti, Michael Parker, Michelle Kendall, and David Bonsall Digital contact tracing: comparing the capabilities of centralised and decentralised data architectures to effectively suppress the COVID-19 epidemic whilst maximising freedom of movement and maintaining privacy. [https://github.com/BDl-pathogens/covid-19\_instant\_tracing](https://github.com/BDl-pathogens/covid-19_instant_tracing), 2020. 3. [3]. Christophe Fraser, Steven Riley, Roy M. Anderson, and Neil M. Ferguson. Factors that make an infectious disease outbreak controllable. Proceedings of the National Academy of Sciences, 101(16):6146—6151, 2004. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMToiMTAxLzE2LzYxNDYiO3M6NDoiYXRvbSI7czo1MDoiL21lZHJ4aXYvZWFybHkvMjAyMC8wNS8zMC8yMDIwLjA1LjI5LjIwMTE1OTE1LmF0b20iO31zOjg6ImZyYWdtZW50IjtzOjA6IiI7fQ==) 4. [4]. R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Phys. Rev. Lett., 86:3200–3203, 2001. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.86.3200&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=11290142&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F30%2F2020.05.29.20115915.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000167866300072&link_type=ISI) 5. [5]. Alain Barrat, Marc Barthelemy, and Alessandro Vespignani Dynamical processes on complex networks. Cambridge university press, 2008. 6. [6]. Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathe, James Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth Paterson, Srdjan Capkun, David Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, and Jose Pereira Decentralized privacy-preserving proximity tracing, 2020. 7. [7]. Alexis Dudden and Andrew Marks South Korea took rapid, intrusive measures against Covid-19 - and they worked. The Guardian, 20, 2020. 8. [8]. Nuria Oliver, Bruno Lepri, Harald Sterly, Renaud Lambiotte, Sebastien Delataille, Marco De Nadai, Emmanuel Letouze, Albert Ali Salah, Richard Benjamins, Ciro Cattuto, Vittoria Colizza, Nicolas de Cordes, Samuel P. Fraiberger, Till Koebe, Sune Lehmann, Juan Murillo, Alex Pentland, Phuong N Pham, Frederic Pivetta, Jari Saramaki, Samuel V. Scarpino, Michele Tizzoni, Stefaan Verhulst, and Patrick Vinck Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle. Science Advances, 2020. 9. [9]. Ramesh Raskar, Isabel Schunemann, Rachel Barbar, Kristen Vilcans, Jim Gray, Praneeth Vepakomma, Suraj Kapa, Andrea Nuzzo, Rajiv Gupta, Alex Berke, et al. Apps gone rogue: Maintaining personal privacy in an epidemic. *arXivpreprint arXiv:2003.08567*, 2020. 10. [10]. Saheli Roy Choudhury. Singapore says it will make its contact tracing tech freely available to developers. 11. [11].Kcore Analytics City College of New York. K-core tracing app. 12. [12].Center for Systems Science and Engineering (CSSE) at Johns Hopkins University. COVID-19 data repository. [https://github.com/CSSEGISandData/COVID-19](https://github.com/CSSEGISandData/COVID-19). 13. [13]. Ruoran Li, Caitlin Rivers, Qi Tan, Megan B Murray, Eric Toner, and Marc Lipsitch The demand for inpatient and ICU beds for COVID-19 in the US lessons from Chinese cities. *medRxiv*, 2020. 14. [14]. Nicole Winfield. Not a wave, a tsunami, 2020. 15. [15]. Marina Villeneuve and Michael Hill COVID-19 infections rise in New York with peak weeks away, 2020. 16. [16]. Henrik Salje, Cecile Tran Kiem, Noemie Lefrancq, Noemie Courtejoie, Paolo Bosetti, Juliette Paireau, Alessio Andronico, Nathanael Hoze, Jehanne Richet, Claire-Lise Dubost, Yann Le Strat, Justin Lessler, Daniel Levy-Bruhl, Arnaud Fontanet, Lulla Opatowski, Pierre-Yves Boelle, and Simon Cauchemez Estimating the burden of SARS-CoV-2 in France. Science, 2020. 17. [17]. Tung Thanh Le, Zacharias Andreadakis, Arun Kumar, Raul Gomez Roman, Stig Tollefsen, Melanie Saville, and Stephen Mayhew The COVID-19 vaccine development landscape. Nature Reviews Drug Discovery, 19:305–306, 2020. [PubMed](http://medrxiv.org/lookup/external-ref?access_num=http://www.n&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F30%2F2020.05.29.20115915.atom) 18. [18]. Giorgio Guzzetta, Flavia Riccardo, Valentina Marziano, Piero Poletti, Filippo Trentini, Antonino Bella, Xanthi Andrianou, Martina Del Manso, Massimo Fabiani, Stefania Bellino, Stefano Boros, Alberto Mateo Urdiales, Maria Fenicia Vescio, Andrea Piccioli, COVID-19 working group, Silvio Brusaferro, Giovanni Rezza, Patrizio Pezzotti, Marco Ajelli, and Stefano Merler The impact of a nation-wide lockdown on COVID-19 transmissibility in Italy, 2020. 19. [19]. Roy M Anderson, Hans Heesterbeek, Don Klinkenberg, and T Deirdre Hollingsworth. How will country-based mitigation measures influence the course of the COVID-19 epidemic? The Lancet, 395(10228):931–934, 2020. 20. [20]. Joel R Koo, Alex R Cook, Minah Park, Yinxiaohe Sun, Haoyang Sun, Jue Tao Lim, Clarence Tam, and Borame L Dickens. Interventions to mitigate early spread of SARS-CoV-2 in singapore: a modelling study. The Lancet Infectious Diseases, 2020. 21. [21]. Jayson S. Jia, Xin Lu, Yun Yuan, Ge Xu, Jianmin Jia, and Nicholas A. Christakis. Population flow drives spatio-temporal distribution of COVID-19 in China. Nature, 2020. 22. [22]. Juanjuan Zhang, Maria Litvinova, Yuxia Liang, Yan Wang, Wei Wang, Shanlu Zhao, Qianhui Wu, Stefano Merler, Cecile Viboud, Alessandro Vespignani, Marco Ajelli, and Hongjie Yu Changes in contact patterns shape the dynamics of the COVID-19 outbreak in China. Science, 2020. 23. [23]. Hao-Yuan Cheng, Shu-Wan Jian, Ding-Ping Liu, Ta-Chou Ng, Wan-Ting Huang, and Hsien-Ho Lin. Contact tracing assessment of COVID-19 transmission dynamics in Taiwan and risk at different exposure periods before and after symptom onset. JAMA Internal Medicine, 2020. 24. [24]. Per Block, Marion Hoffman, Isabel J Raabe, Jennifer Beam Dowd, Charles Rahal, Ridhi Kashyap, and Melinda C Mills. Social network-based distancing strategies to flatten the COVID 19 curve in a post-lockdown world. *arXivpreprintarXiv:2004.07052*, 2020. 25. [25]. Laura Di Domenico, Giulia Pullano, Chiara E. Sabbatini, Pierre-Yves Boelle, and Vittoria Colizza Expected impact of lockdown in ile-de-France and possible exit strategies. *medRxiv*, 2020. 26. [26]. Shengjie Lai, Nick W Ruktanonchai, Liangcai Zhou, Olivia Prosper, Wei Luo, Jessica R Floyd, Amy Wesolowski, Chi Zhang, Xiangjun Du, Hongjie Yu, et al. Effect of non-pharmaceutical interventions for containing the COVID-19 outbreak: an observational and modelling study. *medRxiv*, 2020. 27. [27]. Neil Ferguson, Daniel Laydon, Gemma Nedjati Gilani, Natsuko Imai, Kylie Ainslie, Marc Baguelin, Sangeeta Bhatia, Adhiratha Boonyasiri, ZULMA Cucunuba Perez, Gina Cuomo-Dannenburg, et al. Report 9: Impact of non-pharmaceutical interventions (NPIs) to reduce COVID19 mortality and healthcare demand. Technical report, Imperial College London, 2020. 28. [28]. Stephen M. Kissler, Christine Tedijanto, Edward Goldstein, Yonatan H. Grad, and Marc Lipsitch Projecting the transmission dynamics of SARS-CoV-2 through the postpandemic period. Science, 2020. 29. [29]. Shujuan Ma, Jiayue Zhang, Minyan Zeng, Qingping Yun, Wei Guo, Yixiang Zheng, Shi Zhao, Maggie H Wang, and Zuyao Yang Epidemiological parameters of coronavirus disease 2019: a pooled analysis of publicly reported individual data of 1155 cases from seven countries. *medRxiv*, 2020. 30. [30]. Tapiwa Ganyani, Cecile Kremer, Dongxuan Chen, Andrea Torneri, Christel Faes, Jacco Wallinga, and Niel Hens Estimating the generation interval for COVID-19 based on symptom onset data. *medRxiv*, 2020. 31. [31]. Enrico Lavezzo, Elisa Franchin, Constanze Ciavarella, Gina Cuomo-Dannenburg, Luisa Barzon, Claudia Del Vecchio, Lucia Rossi, Riccardo Manganelli, Arianna Loregian, Nicolo Navarin, et al. Suppression of COVID-19 outbreak in the municipality of Vo, Italy. *medRxiv*, 2020. 32. [32]. Francesco Pinotti, Laura Di Domenico, Ernesto Ortega, Marco Mancastroppa, Giulia Pullano, Eugenio Valdano, Pierre-Yves Boelle, Chiara Poletto, and Vittoria Colizza Lessons learnt from 288 COVID-19 international cases: importations over time, effect of interventions, underdetection of imported cases. *medRxiv*, 2020. 33. [33]. Yang Liu, Rosalind M Eggo, and Adam J Kucharski. Secondary attack rate and superspreading events for SARS-CoV-2. The Lancet, 395(10227):e47, 2020. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1016/S0140-6736(20)30462-1&link_type=DOI) 34. [34]. Lars Lorch, William Trouleau, Stratis Tsirtsis, Aron Szanto, Bernhard Scholkopf, and Manuel Gomez-Rodriguez. A spatiotemporal epidemic model to quantify the effects of contact tracing, testing, and containment. *arXivpreprint arXiv:2004.07641*, 2020. 35. [35]. Adam Kucharski, Petra Klepac, Andrew Conlan, Stephen Kissler, Maria Tang, Hannah Fry, Julia Gog, and John Edmunds Effectiveness of isolation, testing, contact tracing and physical distancing on reducing transmission of SARS-CoV-2 in different settings, 2020. 36. [36]. Robert Hinch, Will Probert, Anel Nurtay, Michelle Kendall, Chris Wymant, Matthew Hall, Katrina Lythgoe, Ana Bulas Cruz, Lele Zhao, Andrea Stewart, Michael Ferretti, Luca Parker, Ares Meroueh, Bryn Mathias, Scott Stevenson, Daniel Montero, James Warren, Nicole K Mather, Anthony Finkelstein, Lucie Abeler-Dorner, and Christophe Bonsall, David Fraser. Effective configurations of a digital contact tracing app: A report to nhsx, 2020. 37. [37].European Centre for Disease Prevention and Control. Resource estimation for contact tracing, quarantine and monitoring activities for COVID-19 cases in the eu/eea. 38. [38]. Don Klinkenberg, Christophe Fraser, and Hans Heesterbeek The effectiveness of contact tracing in emerging epidemics. PLOS ONE, 1(1):1–7, 12 2006. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1371/journal.pone.0000001&link_type=DOI) 39. [39]. Joel Hellewell, Sam Abbott, Amy Gimma, Nikos I Bosse, Christopher I Jarvis, Timothy W Russell, James D Munday, Adam J Kucharski, W John Edmunds, Fiona Sun, Stefan Flasche, Billy J Quilty, Nicholas Davies, Yang Liu, Samuel Clifford, Petra Klepac, Mark Jit, Charlie Diamond, Hamish Gibbs, Kevin [van Zandvoort], Sebastian Funk, and Rosalind M Eggo. Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts. The Lancet Global Health, 8(4):e488-e496, 2020. 40. [40]. Timo Smieszek, Stefanie Castell, Alain Barrat, Ciro Cattuto, Peter J White, and Gerard Krause Contact diaries versus wearable proximity sensors in measuring contact patterns at a conference: method comparison and participants’ attitudes. BMC infectious diseases, 16(1):341, 2016. 41. [41]. Rossana Mastrandrea, Julie Fournet, and Alain Barrat Contact patterns in a high school: a comparison between data collected using wearable sensors, contact diaries and friendship surveys. PloS one, 10(9), 2015. 42. [42]. Laurent Hebert-Dufresne, Benjamin M Althouse, Samuel V Scarpino, and Antoine Allard Beyond R0: Heterogeneity in secondary infections and probabilistic epidemic forecasting. *medRxiv*, 2020. 43. [43]. William J Bradshaw, Ethan C Alley, Jonathan H Huggins, Alun L Lloyd, and Kevin M Esvelt. Bidirectional contact tracing is required for reliable COVID-19 control. *medRxiv*, 2020. 44. [44]. Sadamori Kojaku, Laurent Hebert-Dufresne, and Yong-Yeol Ahn. The effectiveness of contact tracing in heterogeneous networks. *arXivpreprint arXiv:2005.02362*, 2020. 45. [45]. Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake Hofman, and Elissa M. Redmiles. How good is good enough for COVID19 apps? the influence of benefits, accuracy, and privacy on willingness to adopt. *arXiv*, 2020. 46. [46]. Hossein Gorji, Markus Arnoldini, David F Jenny, Wolf-Dietrich Hardt, and Patrick Jenny Stecc: Smart testing with contact counting enhances covid-19 mitigation by bluetooth app based contact tracing. *medRxiv*, 2020. 47. [47]. Josh A Firth, Joel Hellewell, Petra Klepac, Stephen M Kissler,, Adam J Kucharski, and Lewis G. Spurgin. Combining fine-scale social contact data with epidemic modelling reveals interactions between contact tracing, quarantine, testing and physical distancing for controlling covid-19. *medRxiv*, 2020. 48. [48]. A. L. Lloyd and R. M. May. How viruses spread among computers and people. Science, 292:1316–1317, 2001. [FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiRlVMTCI7czoxMToiam91cm5hbENvZGUiO3M6Mzoic2NpIjtzOjU6InJlc2lkIjtzOjEzOiIyOTIvNTUyMC8xMzE2IjtzOjQ6ImF0b20iO3M6NTA6Ii9tZWRyeGl2L2Vhcmx5LzIwMjAvMDUvMzAvMjAyMC4wNS4yOS4yMDExNTkxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=) 49. [49]. Anna Machens, Francesco Gesualdo, Caterina Rizzo, Alberto E Tozzi, Alain Barrat, and Ciro Cattuto An infectious disease model on empirical networks of human contact: bridging the gap between dynamic network data and contact matrices. BMC infectious diseases, 13(1):185, 2013. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1186/1471-2334-13-185&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=23618005&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F30%2F2020.05.29.20115915.atom) 50. [50]. Piotr Sapiezynski, Arkadiusz Stopczynski, David Dreyer Lassen, and Sune Lehmann Interaction data from the Copenhagen Networks Study. Scientific Data, 6(315), 2019. 51. [51]. Mathieu Genois and Alain Barrat Can co-location be used as a proxy for face-to-face contacts? EPJ Data Science, 7(1):11, 2018. 52. [52]. Rossana Mastrandrea, Julie Fournet, and Alain Barrat Contact patterns in a high school: a comparison between data collected using wearable sensors, contact diaries and friendship surveys. PloS one, 10(9), 2015. 53. [53]. Vedran Sekara and Sune Lehmann The strength of friendship ties in proximity sensor data. PloS one, 9(7):e100915, 2014. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1371/journal.pone.0100915&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=24999984&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F30%2F2020.05.29.20115915.atom) 54. [54]. Xi He, Eric HY Lau, Peng Wu, Xilong Deng, Jian Wang, Xinxin Hao, Yiu Chung Lau, Jessica Y Wong, Yujuan Guan, Xinghua Tan, et al. Temporal dynamics in viral shedding and transmissibility of COVID-19. Nature Medicine, pages 1-4, 2020. 55. [55]. Juanjuan Zhang, Maria Litvinova, Wei Wang, Yan Wang, Xiaowei Deng, Xinghui Chen, Mei Li, Wen Zheng, Lan Yi, Xinhua Chen, et al. Evolving epidemiology of novel coronavirus diseases 2019 and possible interruption of local transmission outside Hubei Province in China: a descriptive and modeling study. *medRxiv*, 2020. 56. [56]. D Cereda, M Tirani, F Rovida, V Demicheli, M Ajelli, P Poletti, and S Merler The early phase of the COVID-19 outbreak in lombardy, Italy, 2020. 57. [57]. Ciro Cattuto, Wouter Van den Broeck, Alain Barrat, Vittoria Colizza, Jean-Frangois Pinton, and Alessandro Vespignani. Dynamics of person-to-person interactions from distributed RFID sensor networks. PLOS ONE, 5(7):1–9, 07 2010. [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1371/journal.pone.0010840&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=20824070&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F30%2F2020.05.29.20115915.atom) 58. [58]. Hiroshi Nishiura, Tetsuro Kobayashi, Takeshi Miyama, Ayako Suzuki, Sungmok Jung, Katsuma Hayashi, Ryo Kinoshita, Yichi Yang, Baoyin Yuan, Andrei R Akhmetzhanov, et al. Estimation of the asymptomatic ratio of novel coronavirus infections (COVID-19). *medRxiv*, 2020. 59. [59]. Ying Liu, Albert A Gayle, Annelies Wilder-Smith, and Joacim Rocklov The reproductive number of covid-19 is higher compared to sars coronavirus. Journal of travel medicine, 2020. 60. [60]. Julie Fournet and Alain Barrat Epidemic risk from friendship network data: an equivalence with a non-uniform sampling of contact networks. Scientific reports, 6(1):1–11, 2016. 61. [61]. Juliette Stehle, Nicolas Voirin, Alain Barrat, Ciro Cattuto, Vittoria Colizza, Lorenzo Isella, Corinne Regis, Jean-Frangois Pinton, Nagham Khanafer, Wouter Van den Broeck, et al. Simulation of an seir infectious disease model on the dynamic contact network of conference attendees. BMC medicine, 9(1):87, 2011. 62. [62]. Quan-Hui Liu, Marco Ajelli, Alberto Aleta, Stefano Merler, Yamir Moreno, and Alessandro Vespignani Measurability of the epidemic reproduction number in data-driven contact networks. Proceedings of the National Academy of Sciences, 115(50):12680–12685, 2018. [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMjoiMTE1LzUwLzEyNjgwIjtzOjQ6ImF0b20iO3M6NTA6Ii9tZWRyeGl2L2Vhcmx5LzIwMjAvMDUvMzAvMjAyMC4wNS4yOS4yMDExNTkxNS5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=) [1]: /embed/graphic-10.gif [2]: /embed/inline-graphic-1.gif [3]: /embed/graphic-12.gif [4]: /embed/inline-graphic-2.gif [5]: /embed/inline-graphic-3.gif [6]: /embed/inline-graphic-4.gif [7]: /embed/inline-graphic-5.gif [8]: /embed/inline-graphic-6.gif [9]: /embed/inline-graphic-7.gif [10]: T3/embed/inline-graphic-8.gif [11]: T3/embed/inline-graphic-9.gif [12]: /embed/inline-graphic-10.gif [13]: /embed/inline-graphic-11.gif [14]: /embed/graphic-14.gif [15]: /embed/graphic-15.gif [16]: /embed/graphic-16.gif [17]: /embed/graphic-17.gif [18]: /embed/inline-graphic-12.gif [19]: /embed/inline-graphic-13.gif [20]: /embed/graphic-18.gif [21]: /embed/inline-graphic-14.gif [22]: /embed/graphic-19.gif [23]: /embed/graphic-20.gif [24]: /embed/inline-graphic-15.gif [25]: /embed/graphic-21.gif [26]: /embed/graphic-22.gif [27]: /embed/graphic-23.gif [28]: /embed/graphic-24.gif [29]: /embed/graphic-25.gif [30]: /embed/graphic-26.gif [31]: /embed/graphic-27.gif [32]: /embed/graphic-28.gif [33]: /embed/inline-graphic-16.gif [34]: /embed/graphic-29.gif [35]: /embed/graphic-30.gif [36]: /embed/graphic-31.gif [37]: /embed/graphic-32.gif [38]: /embed/graphic-33.gif [39]: /embed/graphic-34.gif [40]: /embed/graphic-35.gif