SlideShare a Scribd company logo
Enhanced Contact Tracing (ECT)
ECT was founded on an existing all source intelligence platform
called the i2 Enterprise Insight Analysis (EIA) which is used
worldwide by intelligence analysts to more effectively use
their own proprietary data feeds and enrich with OSINT as
analysts may choose. ECT takes a familiar intelligence process
and applies it in a pandemic context, ultimately leveraging this
existing solution to enhance pandemic analysis capabilities
through data that clients independently source and manage
pursuant to applicable laws and regulations.
The ECT capability focuses on actions and potential exposure
of individuals and is not to be confused with dashboard metrics
or business intelligence applications. It enables analysts to use
their proprietary data feeds and OSINT to identify unforeseen
connections, patterns, anomalies and trends contained in the
data being examined that are easily overlooked. ECT is designed
specifically for the purposes of empowering analysts to identify
critical answers of the questions being asked of the data. In
essence, ECT enables analysts to become faster, more accurate
and identify critical aspects in flattening the exposure cure,
as explained below.
– ECT can ingest structured and unstructured data, expediting
analyst’s abilities to conduct a variety of pandemic analytical
methods such as, geo-spatial, temporal, link analysis, and
social network analysis.
– The productivity of analysts’ speed and effectiveness may
be significantly enhanced by reducing the amount of time
spent reading and helping to collate information and produce
pandemic related information products more rapidly
and holistically.
– Productivity and effectiveness can be increased by
significantly reducing the amount of time spent reading
and collating COVID-19 related information and producing
pandemic intelligence related products.
Using i2 to help
fight disease
with data
Overview
The concept of Enhanced Contact Tracing (ECT) is proposed
to significantly enhance analysts’ capabilities of pandemic
related analysis through the use of a cognitive solution
developed by IBM and traditionally used in an all source
intelligence capacity.
ECT is the process by which the contacts of an individual who
may have inadvertently relayed the COVID-19 virus may be
rapidly identified to enable testing, diagnosis, treatment and/
or isolation as directed by relevant authorities. IBM respects
privacy rights, and clients will independently source and
review data to help track the COVID-19 virus in ways that
are consistent with local laws and regulations.
There is an immense amount of time and resources involved
in the existing manual process of contact tracing analysis of
exposed COVID-19 patients. The key challenge in this type
of analysis is the ability to minimize the time and increase
the accuracy of identification to flatten the exposure curve.
Privacy
Analysts, through ECT, are able to federate their queries of data;
specifically, analysts are enabled “on demand” to query external
data sources and bring back only the information needed that
is connected to an active case. This is vitally important from a
privacy perspective as the ECT targeted data request capability
avoids the need for mass collection on individuals to perform
analysis. (As a reminder, clients need to confirm that the use
of ECT with their data sets is consistent with applicable laws
and regulations.)
© Copyright IBM Corporation 2020. IBM, the IBM logo, ibm.com, and IBM Security, and IBM X-Force are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.html.
Data Fusion
A primary capability, which is essential to achieving success, is ECT’s capability of ingesting
multiple disparate data sources which need to be fused together. Each data source poses its
own complex positive and negative factors to include incomplete data at some level, which
impacts ECT’s overall viability; however, the application of federated analysis of all the
sources of data will help minimize the gaps in information. As doctors and scientists
have stated, as more data becomes available, the need to analyze it and project
future waves may become a matter of life and death.
ECT includes technical solutions to ingest multiple forms of data and fuse
it together (all pursuant to applicable permissions).
Want More Information?
Bob Thimsen
Global i2 Tech Sales Leader, IBM Security
thimsen@us.ibm.com | +1 919-215-5781
Jeremy Rodgers
North America i2 Technical Practice Leader, IBM Security
jerrod@us.ibm.com | +1 954-263-7428
Structured Data
Structured data like spreadsheets and databases can be easily integrated into the
solution either in real time or through a scheduled ETL ingestion process
Unstructured Data
Data that is in narrative form is automatically integrated into the solution, thereby
saving time of having to read and build the entity relationships so the analytics
process can start immediately
Link Analysis
Establishing links of those exposed becomes critical to preventing further exposure.
The key question becomes - Now that a positive case has been identified, how far
and wide is the exposure?
Advanced Analysis
Contact Tracing analysis may be used to answer important questions as referenced
by Centers for Disease Control and Prevention (cdc.gov/coronavirus/2019-ncov/php/
principles-contact-tracing.html) using advanced techniques like geospatial and
temporal analysis.
Outcome
The project can result in significant improvement in the quality and productivity of the data
analysis, enabling a more rapid response to the departmental stakeholders as they identify
those at risk of COVID-19 transmission based on their contact with infected individuals.
Using i2 to help
fight disease
with data

More Related Content

PPTX
Pharmaceutical companies and security
DOCX
1639(pm proofreading)(tracked)
PDF
Dlp notes
PDF
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
PDF
Computer forensic
PPTX
626 Information leakage and Data Loss Prevention Tools
DOCX
Security and privacy preserving challenges of e-health solutions in cloud com...
PDF
Symantec Webinar: GDPR 1 Year On
Pharmaceutical companies and security
1639(pm proofreading)(tracked)
Dlp notes
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
Computer forensic
626 Information leakage and Data Loss Prevention Tools
Security and privacy preserving challenges of e-health solutions in cloud com...
Symantec Webinar: GDPR 1 Year On

What's hot (20)

PDF
N018138696
DOC
Cyb 610 Enhance teaching / snaptutorial.com
PDF
Power of Health IT Touch
DOC
Csec 610 Enhance teaching / snaptutorial.com
PDF
Security issues and framework of electronic medical record: A review
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
DOC
Cst 610 Enhance teaching / snaptutorial.com
DOC
Case Study
PDF
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
DOCX
Running head hardware and software security14 hardware an
DOCX
CSEC 610 Education Specialist / snaptutorial.com
PPTX
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
PPTX
Top cited managing information technology articles
PDF
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
PDF
Managed Detection and Response (MDR) Whitepaper
PDF
Electronic Healthcare Record Security and Management in Healthcare Organizations
DOCX
CST 610 Effective Communication/tutorialrank.com
DOCX
CYB 610 Effective Communication/tutorialrank.com
DOCX
Cyb 610Education Specialist / snaptutorial.com
DOCX
CST 610 RANK Redefined Education--cst610rank.com
N018138696
Cyb 610 Enhance teaching / snaptutorial.com
Power of Health IT Touch
Csec 610 Enhance teaching / snaptutorial.com
Security issues and framework of electronic medical record: A review
The Practical Data Mining Model for Efficient IDS through Relational Databases
Cst 610 Enhance teaching / snaptutorial.com
Case Study
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
Running head hardware and software security14 hardware an
CSEC 610 Education Specialist / snaptutorial.com
Open Source Insight: Drupageddon, Heartbleed Problems & Open Source 360 Surve...
Top cited managing information technology articles
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Managed Detection and Response (MDR) Whitepaper
Electronic Healthcare Record Security and Management in Healthcare Organizations
CST 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
Cyb 610Education Specialist / snaptutorial.com
CST 610 RANK Redefined Education--cst610rank.com
Ad

Similar to i2 Contact Tracing One Pager (20)

PPTX
Steps for Effective Patient and Staff Contact Tracing to Defend Against COVID...
PDF
Clinical Research Informatics Year-in-Review 2021
PPTX
Disease Surveillance Monitoring and Reacting to Outbreaks (like Ebola) with a...
PDF
Integrating GIS and Remote Sensing Technology In Contact Tracing Of Ebola Vir...
PDF
Using Neo4j 4.0 to Maintain Security with COVID-19 HealthCheck
PDF
Discover how Covid-19 is accelerating the need for healthcare interoperabilit...
PPTX
Surveillance and contact tracing
PDF
An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...
DOCX
CANCER DATA COLLECTION6The Application of Data to Problem-So
PPTX
NCATS CTSA N3C
DOCX
Suggested ResourcesThe resources provided here are optional. You.docx
PDF
16072 emc-healthcare idc-ebook-1.27
PDF
16072-EMC-HealthcareIDC-eBook-1.27
PDF
Data analytics and Access Program Recommendations
PDF
Connected Platform for Contact Tracing
PDF
Connected Platform for Contact Tracing
PDF
Panorama_Marketing_Flyer
PDF
Hcd wp-2012-howan enterprisedatawarehousecanmake
PDF
TS Brochure_ Arch Strategy
PPTX
Sean Cassidy: The Naked Health Information Exchange
Steps for Effective Patient and Staff Contact Tracing to Defend Against COVID...
Clinical Research Informatics Year-in-Review 2021
Disease Surveillance Monitoring and Reacting to Outbreaks (like Ebola) with a...
Integrating GIS and Remote Sensing Technology In Contact Tracing Of Ebola Vir...
Using Neo4j 4.0 to Maintain Security with COVID-19 HealthCheck
Discover how Covid-19 is accelerating the need for healthcare interoperabilit...
Surveillance and contact tracing
An Investigation Into the Impacts of ICT in the Compacting of COVID-19: A Nam...
CANCER DATA COLLECTION6The Application of Data to Problem-So
NCATS CTSA N3C
Suggested ResourcesThe resources provided here are optional. You.docx
16072 emc-healthcare idc-ebook-1.27
16072-EMC-HealthcareIDC-eBook-1.27
Data analytics and Access Program Recommendations
Connected Platform for Contact Tracing
Connected Platform for Contact Tracing
Panorama_Marketing_Flyer
Hcd wp-2012-howan enterprisedatawarehousecanmake
TS Brochure_ Arch Strategy
Sean Cassidy: The Naked Health Information Exchange
Ad

Recently uploaded (20)

PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
project resource management chapter-09.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
WOOl fibre morphology and structure.pdf for textiles
DP Operators-handbook-extract for the Mautical Institute
Group 1 Presentation -Planning and Decision Making .pptx
cloud_computing_Infrastucture_as_cloud_p
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Web App vs Mobile App What Should You Build First.pdf
Enhancing emotion recognition model for a student engagement use case through...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
project resource management chapter-09.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
TLE Review Electricity (Electricity).pptx
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1 - Historical Antecedents, Social Consideration.pdf
Chapter 5: Probability Theory and Statistics
Getting started with AI Agents and Multi-Agent Systems
Final SEM Unit 1 for mit wpu at pune .pptx

i2 Contact Tracing One Pager

  • 1. Enhanced Contact Tracing (ECT) ECT was founded on an existing all source intelligence platform called the i2 Enterprise Insight Analysis (EIA) which is used worldwide by intelligence analysts to more effectively use their own proprietary data feeds and enrich with OSINT as analysts may choose. ECT takes a familiar intelligence process and applies it in a pandemic context, ultimately leveraging this existing solution to enhance pandemic analysis capabilities through data that clients independently source and manage pursuant to applicable laws and regulations. The ECT capability focuses on actions and potential exposure of individuals and is not to be confused with dashboard metrics or business intelligence applications. It enables analysts to use their proprietary data feeds and OSINT to identify unforeseen connections, patterns, anomalies and trends contained in the data being examined that are easily overlooked. ECT is designed specifically for the purposes of empowering analysts to identify critical answers of the questions being asked of the data. In essence, ECT enables analysts to become faster, more accurate and identify critical aspects in flattening the exposure cure, as explained below. – ECT can ingest structured and unstructured data, expediting analyst’s abilities to conduct a variety of pandemic analytical methods such as, geo-spatial, temporal, link analysis, and social network analysis. – The productivity of analysts’ speed and effectiveness may be significantly enhanced by reducing the amount of time spent reading and helping to collate information and produce pandemic related information products more rapidly and holistically. – Productivity and effectiveness can be increased by significantly reducing the amount of time spent reading and collating COVID-19 related information and producing pandemic intelligence related products. Using i2 to help fight disease with data Overview The concept of Enhanced Contact Tracing (ECT) is proposed to significantly enhance analysts’ capabilities of pandemic related analysis through the use of a cognitive solution developed by IBM and traditionally used in an all source intelligence capacity. ECT is the process by which the contacts of an individual who may have inadvertently relayed the COVID-19 virus may be rapidly identified to enable testing, diagnosis, treatment and/ or isolation as directed by relevant authorities. IBM respects privacy rights, and clients will independently source and review data to help track the COVID-19 virus in ways that are consistent with local laws and regulations. There is an immense amount of time and resources involved in the existing manual process of contact tracing analysis of exposed COVID-19 patients. The key challenge in this type of analysis is the ability to minimize the time and increase the accuracy of identification to flatten the exposure curve. Privacy Analysts, through ECT, are able to federate their queries of data; specifically, analysts are enabled “on demand” to query external data sources and bring back only the information needed that is connected to an active case. This is vitally important from a privacy perspective as the ECT targeted data request capability avoids the need for mass collection on individuals to perform analysis. (As a reminder, clients need to confirm that the use of ECT with their data sets is consistent with applicable laws and regulations.)
  • 2. © Copyright IBM Corporation 2020. IBM, the IBM logo, ibm.com, and IBM Security, and IBM X-Force are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.html. Data Fusion A primary capability, which is essential to achieving success, is ECT’s capability of ingesting multiple disparate data sources which need to be fused together. Each data source poses its own complex positive and negative factors to include incomplete data at some level, which impacts ECT’s overall viability; however, the application of federated analysis of all the sources of data will help minimize the gaps in information. As doctors and scientists have stated, as more data becomes available, the need to analyze it and project future waves may become a matter of life and death. ECT includes technical solutions to ingest multiple forms of data and fuse it together (all pursuant to applicable permissions). Want More Information? Bob Thimsen Global i2 Tech Sales Leader, IBM Security thimsen@us.ibm.com | +1 919-215-5781 Jeremy Rodgers North America i2 Technical Practice Leader, IBM Security jerrod@us.ibm.com | +1 954-263-7428 Structured Data Structured data like spreadsheets and databases can be easily integrated into the solution either in real time or through a scheduled ETL ingestion process Unstructured Data Data that is in narrative form is automatically integrated into the solution, thereby saving time of having to read and build the entity relationships so the analytics process can start immediately Link Analysis Establishing links of those exposed becomes critical to preventing further exposure. The key question becomes - Now that a positive case has been identified, how far and wide is the exposure? Advanced Analysis Contact Tracing analysis may be used to answer important questions as referenced by Centers for Disease Control and Prevention (cdc.gov/coronavirus/2019-ncov/php/ principles-contact-tracing.html) using advanced techniques like geospatial and temporal analysis. Outcome The project can result in significant improvement in the quality and productivity of the data analysis, enabling a more rapid response to the departmental stakeholders as they identify those at risk of COVID-19 transmission based on their contact with infected individuals. Using i2 to help fight disease with data