Abstract
Infectious diseases, like COVID-19, pose serious challenges to university campuses, which typically adopt closure as a non-pharmaceutical intervention to control spread and ensure a gradual return to normalcy. Intervention policies, such as remote instruction (RI) where large classes are offered online, reduce potential contact but also have broad side-effects on campus by hampering the local economy, students’ learning outcomes, and community wellbeing. In this paper, we demonstrate that university policymakers can mitigate these tradeoffs by leveraging anonymized data from their WiFi infrastructure to learn community mobility —- a methodology we refer to as WiFi mobility models (WiMob). This approach enables policymakers to explore more granular policies like localized closures (LC). WiMob can construct contact networks that capture behavior in various spaces, highlighting new potential transmission pathways and temporal variation in contact behavior. Additionally, WiMob enables us to design LC policies that close super-spreader locations on campus. By simulating disease spread with contact networks from WiMob, we find that LC maintains the same reduction in cumulative infections as RI while showing greater reduction in peak infections and internal transmission. Moreover, LC reduces campus burden by closing fewer locations, forcing fewer students into completely online schedules, and requiring no additional isolation. WiMob can empower universities to conceive and assess a variety of closure policies to prevent future outbreaks.
Competing Interest Statement
The authors have declared no competing interest.
Funding Statement
This paper is based on work partially supported by the NSF (Expeditions CCF-1918770, CAREER IIS-2028586, RAPID IIS-2027862, RAPID IIS-2027689, Medium IIS-1955883, NRT DGE-1545362, CCF-2115126), CDC MInD program, ORNL, and Semiconductor Research Corporation (in collaboration with Intel Labs). Some research personnel were supported by internal seed funding from the Georgia Institute of Technology and Georgia Tech Research Institute. Other computing resources were provided by the Office of Information Technology at Georgia Tech.
Author Declarations
I confirm all relevant ethical guidelines have been followed, and any necessary IRB and/or ethics committee approvals have been obtained.
Yes
The details of the IRB/oversight body that provided approval or exemption for the research described are given below:
Central Institutional Review Board (IRB), Georgia Institute of Technology
I confirm that all necessary patient/participant consent has been obtained and the appropriate institutional forms have been archived, and that any patient/participant/sample identifiers included were not known to anyone (e.g., hospital staff, patients or participants themselves) outside the research group so cannot be used to identify individuals.
Yes
I understand that all clinical trials and any other prospective interventional studies must be registered with an ICMJE-approved registry, such as ClinicalTrials.gov. I confirm that any such study reported in the manuscript has been registered and the trial registration ID is provided (note: if posting a prospective study registered retrospectively, please provide a statement in the trial ID field explaining why the study was not registered in advance).
Yes
I have followed all appropriate research reporting guidelines and uploaded the relevant EQUATOR Network research reporting checklist(s) and other pertinent material as supplementary files, if applicable.
Yes
Footnotes
- The title of the paper has been modified to attract the right audience - The abstract has been modified to represent the acronyms correctly - Figure 1 has been modified with additional sub figures to better summarize the paper - Figure 2 has been modified by reorganizing the subfigures to take less space - A few other sentences in the main text have changed - The results and key findings of the paper remain UNCHANGED
Data Availability
Deidentified version of this data can be requested by interested parties through appropriate data use agreements