Skip to main content

ORIGINAL RESEARCH article

Front. Public Health, 15 November 2021
Sec. Digital Public Health

Online User Information Sharing and Government Pandemic Prevention and Control Strategies-Based on Evolutionary Game Model

  • 1Center for Innovation and Development Studies, Beijing Normal University, Zhuhai, China
  • 2Economics and Resource Management, Beijing Normal University, Beijing, China
  • 3School of Business, Ningbo University, Ningbo, China
  • 4School of Statistics, Tianjin University of Finance and Economics, Tianjin, China

Background: The sharing and utilization of online users' information has become an important resource for governments to manage COVID-19; however, it also involves the risk of leakage of users' personal information. Online users' sharing decisions regarding personal information and the government's COVID-19 prevention and control decisions influence each other and jointly determine the efficiency of COVID-19 control and prevention.

Method: Using the evolutionary game models, this paper examines the behavioral patterns of online users and governments with regard to the sharing and disclosure of COVID-19 information for its prevention and control.

Results: This paper deduce the reasons and solutions underlying the contradiction between the privacy risks faced by online users in sharing information and COVID-19 prevention and control efforts. The inconsistency between individual and collective rationality is the root cause of the inefficiency of COVID-19 prevention and control.

Conclusions: The reconciliation of privacy protection with COVID-19 prevention and control efficiency can be achieved by providing guidance and incentives to modulate internet users' behavioral expectations.

Introduction

Information sharing and utilization by online users has become an important resource for governments to manage the spread of COVID-19. In 2020, the rapid proliferation of the virus severely tested the national governance capacity of global countries. Owing to the continuous development and penetration of the Internet in recent years, big data, cloud computing, artificial intelligence, and other scientific technologies are being widely used in all aspects of COVID-19 prevention and control; to this end, extensive collection, processing, and investigation of online users' personal information are currently underway. Governments in all countries have attached great importance to the collection, sharing, and disclosure of COVID-19 information. Personal information regarding confirmed patients, suspected patients, and close contacts is collected, collated, and disseminated to society through appropriate channels, to mitigate public panic and simultaneously remind the public to be actively alert and take protective measures. These initiatives have played an important role in enhancing the timeliness and accuracy of the execution of COVID-19 prevention and control measures. Although the sharing and utilization of COVID-19 data can certainly contribute to combating the pandemic, the continuous release of such information by governments increases the risk of personal information being leaked (1). As a result of this illegal disclosure of personal information, the private lives of many citizens especially the patients have been severely affected, with incidents of individuals being bombarded with text messages, abusive phone calls, and even personal attacks reported. With the deepening of the pandemic, more and more cases of discrimination against citizens especially patients have been reported.

Therefore, there is a trade-off between the precise and effective prevention and control of COVID-19 (by governments) and the protection of public personal information. The government may collect personal information related to COVID-19 through apps online. If online users take the initiative to download the app and fill in or share personal details, the government can collect more accurate information about the users and manage the spread of COVID-19 more effectively and precisely. However, some online users may not voluntarily provide personal information to the government, especially those who realize that the government may disclose their personal information. Although the government will offer anonymization of user information, the possibility of data breaches is still high especially in the digital era. Therefore, some online users do not provide personal information to the government, which, in turn, affects the effectiveness of COVID-19 prevention and control. Furthermore, the effectiveness of COVID-19 management may affect users' willingness to share personal information. Thus, the online users also face a trade-off between protecting their interests (sharing personal information with the government) and the effective management of COVID-19 (which ultimately safeguards their health). The benefits and decisions of online users and governments are interlinked, and the mutual decisions also affect the effectiveness of COVID-19 prevention and control.

The nature of the game relationship between online users and the government renders the game theory model especially the evolutionary game theory models effective for studying the decisions of multiple interested parties. Evolutionary game theory abandons the assumption of perfect rationality in classical game theory, and replaces it with the assumption of limited rationality (2). The assumption is that the participants are not rational individuals with infinite reasoning abilities. They cannot precisely calculate the Nash equilibrium strategy and make the corresponding choice, like individuals in traditional games (3); however, they can learn and adjust their own strategies and gradually converge to a stable Nash equilibrium strategy according to the results of each game in the process of continuous repetition (4). Based on the idea of evolution in biology, the evolutionary game theory adopts the strategy type that participants can choose as the gene type, and expresses “fitness” through the income obtained by participants on selecting a certain strategy. Individuals with limited rationality determine the probability of a strategy being selected based on the principle of pursuing the maximization of interests to replace natural selection in biological evolution: the greater the benefit of a strategy, the greater the probability that the strategy will be selected again; that is, corresponding to the “heredity” in biology, the participants will constantly adjust their strategy according to the size of the benefit, until all participants no longer adjust their strategies. Therefore, by constructing an evolutionary game model of the government's COVID-19 prevention and control strategies and the sharing of personal information by online users, the complexity and uncertainty in the decision problem of COVID-19 prevention and control and the sharing of personal information by online users can be accurately portrayed. The evolutionary game model can also provide a good analytical framework for studying the problem of COVID-19 management and online user privacy protection.

Literature Analysis

The issue of COVID-19 prevention and control and the protection of personal information of online users has become a widely discussed topic in current academic research. Research has been conducted in three main areas.

(1) Precise digital management of COVID-19 from the perspective of anonymization technologies for online user personal information: Zhiwei et al. (5), Cheng and Hao (6), and Elkhodr et al. (7) all argue that privacy protection issues have become a major obstacle to the adoption of COVID-19 tracing apps and big data technologies which aimed at curbing the spread of the pandemic. Targeted improvement of data anonymization techniques in these apps and big data technologies can achieve precise COVID-19 management while protecting personal privacy information as well. Sharma et al. (8) investigated the use and permissions of user personal information on 50 apps related to the COVID-19 information collection and determined their impact on related user privacy protection laws. Wu et al. (9) and Gerke et al. (10) assessed the levels of security and privacy protection on current mainstream COVID-19 tracing apps by using various methods. (2) Privacy protection in the prevention and control of COVID-19 from the perspective of reconstructing the data collection rules or privacy protection laws: Vitak and Zimmer (11) advocated the construction of an entire personal information protection framework from privacy protection-oriented perspectives. They insisted that this framework be applied to data collection, processing, and other uses in the context of COVID-19 prevention and control. The framework is expected to form a benign ecology of legal personal information protection and ensure the responsible use of personal information. Newlands et al. (12) investigated digital surveillance technologies implemented during COVID-19 and their impact on personal information privacy through case studies. They explored the ways to accelerate the creation of privacy assessment standards to establish regulatory technologies and laws that can effectively mitigate privacy risks. Azad et al. (13) conducted an analysis of a large set of smartphone applications designed to curb the spread of COVID-19. They argued that user privacy can be ensured by regulating the types of licenses, permissions, and security regulations for data application and analysis across applications, thus allowing people to return to normal life. (3) Analysis of online users' preferences and choices of COVID-19 information tracing apps and behaviors such as information sharing: Sharma et al. (8) assessed the privacy control status of COVID-19 tracing apps through questionnaires and further explored the online users' preferences for the apps. They found that the degree of privacy protection was a determining factor for online users in choosing a COVID-19 tracing app. Meanwhile, Klar and Lanzerath (14) argued that the deployment of COVID-19 tracing apps that are effective in preventing the spread of the virus and it greatly benefits society; however, the fear of privacy breaches leads to reluctance in acceptance by many users, making it difficult to effectively manage the virus. He advocated an ethical approach to micro-force public acceptance of apps. Hohman et al. (15) studied the selection behavior of COVID-19 tracing apps of specific populations and argued that a combination of effective communication strategies and maintaining appropriate social distance could facilitate the popularity of the apps and thus, improve the prevention and control of the pandemic. Wottrich et al. (16) drew on Roger's Protection Motivation Theory (PMT) to analyze the preferences and choices of 1,593 Western European COVID-19 tracing app users and found that users' self-efficacy, vulnerability, and level of privacy concern influence their choice of application, and frequency and depth of use. Based on privacy calculation theory, Yue (17) studied the privacy disclosure behaviors of web or app users, and found that users usually weigh privacy disclosure risks and benefits when making decisions on whether to disclose private information or not. The results of their calculations and weightage revealed different levels of privacy concerns, which in turn played a key role in users' privacy disclosure behavior. Other scholars (1822) have argued that, as a type of user privacy behavior, internet users' privacy disclosure behavior is closely related to their privacy concerns; thus, all these studies conclude that there is a high correlation between information privacy concerns and personal information disclosure behavior. However, there is no agreement on whether this correlation is positive or negative. Other scholars (23, 24) have denied that privacy concerns have an impact on users' personal information disclosure behavior; that is, the privacy paradox, where users' privacy concerns are inconsistent with their personal information disclosure behaviors or are irrelevant. Users express concern about their data leakage on the one hand, but actively disclose a large amount of personal information on the other hand (25, 26). Some scholars have used rational choice models in economics to study the personal information disclosure behaviors of online users. Social benefits, personalized services, and privacy benefits are the main factors determining whether users share their personal information through apps or other Internet platforms (2734). Therefore, rewards and privacy policies can all influence online users' privacy-sharing decisions (21, 35, 36). However, whether online users remain completely rational in their decision-making processes remains debatable (37). There is also a considerable amount of research examining the personal information sharing behavior of online users from a psychological perspective, arguing that the users' privacy sensitivity, desire for privacy protection, personality, and emotions can have a significant impact on their personal information sharing behavior (3842).

It is sure that the government can help control the spread of COVID-19 through the collection and use of related personal information from online users, the privacy of online users can also be protected to some extent through improved data anonymization techniques. However, there remains a paradox that the greater the degree of anonymity of user information, the lower the effectiveness of COVID-19 management. The government not only collects user information online for precise resource allocation and to take appropriate measures to manage COVID-19, but also responds to the pandemic by disclosing the collected information to the public to remind them to proactively plan their activities, especially travel. The disclosure of anonymized online user information protects user privacy but weakens the management of COVID-19. Therefore, there is a trade-off between privacy protection and disclosure of user information for COVID-19 management, which requires further investigation. Most current studies on privacy protection and the management of COVID-19 mainly focus on the study of online users' privacy information sharing behavior or view online users as rational or irrational individuals, from economic, psychological, and sociological perspectives. Few scholars consider the government's behaviors and decisions regarding privacy protection and COVID-19 management. In particular, under the premise that the behaviors and decisions of the government and the public interact with each other, there are almost no scholars who have included both aspects—COVID-19 management by the government and user privacy protection—in the same framework to study the final results of their mutual influence and the corresponding social efficiency. Therefore, this study makes the following marginal contributions to the existing literature: First, we adopt a game theory model to include both the government and online users into the analytical framework. The information sharing decisions of online users, as well as the government's prevention and control decisions of COVID-19 are analyzed, as are the equilibrium outcomes of their mutual games and the corresponding social efficiency. Second, drawing on the assumption of irrational individuals in psychology, we adopt evolutionary game theory models to analyze the learning and adjustment process of government's prevention and control decisions, and online users' information sharing decisions.

Research Design

Model Building

In this section, a framework of evolutionary game theory is used to construct an evolutionary game model that involves online users and the government to analyze the interactions between online users' decisions on information sharing and the government's decisions on pandemic prevention and control. Concerning the behavior patterns of the participants, the government and online users, the following assumptions are made.

In choosing whether to share personal information with the government for the sake of pandemic control, online users seek to maximize their self-interest. When the pandemic is under control, the personal benefits to users increases. However, the sharing of personal information also increases risks of privacy breach.

The government chooses whether to disclose personal information collected from the users, thereby helping the general public deal with the pandemic by arranging their daily lives and travel plans rationally or adopting corresponding measures. Nevertheless, even if the users do not share personal information, the government will collect their information through other means, albeit with lower information precision. The government is an entity that maximizes the public interest in society, by handling the pandemic, maintaining social stability, and ensuring the stability of the economy. However, as the government discloses user information related to the pandemic, it has to bear the financial and time costs incurred by legal disputes concerning matters such as privacy leakage.

The factors related to the process of pandemic prevention, control, and sharing of privacy are quantified to analyze the behavior decisions of online users and the government as follows: When online users do not share personal information with the government, the government can still collect, with a certain accuracy, users' personal information through some channels; when the government also decides not to disclose the information it collected on the epidemic to the public, that is, in the state of (not sharing, not disclosing), the total value of the information to the society is V. When online users share personal information with the government, the government obtains more accurate and thus more valuable user information, so that the total value of the information generated to the society is αV, where α> 1 indicating that the value generated by the personal information shared by the users is higher compared to the government's own collection. The more accurate the personal information shared by the users, the greater the value produced to the society, that is, α would be greater. Therefore, in the state of (sharing, not disclosing), the total value of the information to the whole society is αV, because when the government discloses the collected user information to the general public, the public can plan their personal life and travel in a way that is more conducive to epidemic control. Suppose the extra value created by the government disclosing the collected user information is L. However, the disclosure of user information also leads to social cost, which contains two parts borne by the user and the government respectively. First, users' interest is hurt by the government's disclosure of their private information. Second, the government, after being blamed by the users for the disclosure, not only suffers a loss of its image but has to spend time and money in dealing with various privacy disputes. Therefore, in the state of (no sharing, disclosure), the total social value generated by the information is (V+L) −C. When the government collects the epidemic information shared by online users and discloses it, the total social value generated is α(V+L), but as the information thus shared and disclosed is more precise, namely, more private, the disclosure leads to higher social costs γC, where γ > 1, and the more precise the information shared by users, the greater the social costs, that is, would be greater. For online users, this means a greater loss to personal interests because the shared information can be misused by others or certain companies, whereas the government is more likely to not only suffer more accusations and criticisms but also get involved in more privacy disputes. Therefore, in the (share, disclose) state, the total social value generated by the information is α(V+L)−γC. To simplify the model, this paper further assumes that the total social value generated by the epidemic information is distributed between online users and the government according to an unchanged ratio β/(1-β).

Therefore, based on the above assumptions, the payoff matrix of the game of the government and online users can be calculated, as shown in Table 1. This study further assumes that the government and users are bounded rationality agents, who constantly adjust their strategies to maximize self-interest based on the information they obtain. Therefore, there are uncertainties in their decisions, that change continuously according to the other players' strategies. It is assumed that an online user chooses to share personal information with the government with a probability denoted by, and constantly adjusts the probability to maximize their self-interest. It is also assumed that the government chooses to disclose user information to society with a probability denoted by y, thereby preventing and controlling the pandemic more effectively and constantly adjusting the probability to maximize its self-interest. The replicator equation is employed to adjust the shifts in the government's strategies and online users, and is expressed as follows (43).

F(xv)=dxvdt=xv[E(xv)-E¯]

where xv denotes the probability of a player adopting a strategy v, E(xv) denotes the player's expected payoff in adopting the strategy v, E¯ denotes the average payoff gained as the player adopts all possible strategies.

TABLE 1
www.frontiersin.org

Table 1. Payoff matrix of the game of the government and online users in information sharing and disclosure.

Model Solving

Using the payoff matrix of the game of the government and online users, together with the replicator equation, a replicator equation that describes the strategy adjustments of online users and the government can be obtained.

(1) Set Up, 0 as the expected payoff when an online user chooses to share personal information, Up, 1 as the expected payoff when the online user chooses not to share personal information, and Up as the average payoff gained by the online user.

Among them,

Up,0=y[αβ(V+L)-γβC]+(1-y)αβV    (1)
Up,1=y[β(V+L)-βC]+(1-y)βV    (2)
Up=xUp,0+(1-x)Up,1    (3)

Thus, the replicator equation that describes the strategy adjustment of online users is as follows:

dxdt=x(Up,0Up)=x(1x){[(α1)βL(γ1)βC]y            +(α1)βV}    (4)

When the strategy adjustment of the online user tends to stabilize, that is, when dxdt=0,

x1*=0,x2*=1,y3*=b=(α-1)βV(α-1)βL-(γ-1)βC    (5)

(2) Set Ug, 0 as the expected payoff when the government chooses to disclose the personal information of the online user, Ug, 1 as the expected payoff when the government chooses not to disclose the personal information of the online user, and Ug as the average payoff gained by the government.

Ug,0=x[(1β)α(V+L)(1β)γC]+(1x)[(1β)               (V+L)(1β)C]    (6)
Ug,1=x(1-β)αV+(1-x)[(1-β)V]    (7)

Similarly, the replicator equation that describes the government's strategy adjustment is as follows:

dydt=y(Ug,0Ug)=y(1y){x(1β)[(α1)L(γ1)C]           +(1β)(LC)}    (8)

When the strategy adjustment of the government tends to be stable, that is, when dydt=0,

y1*=0,y2*=1,x3*=a=L-C(α-1)L-(γ-1)C    (9)

When dxdt=0 and dydt=0, four equilibrium points exist in the evolutionary game of the government and online users regarding information disclosure and pandemic prevention and control; the points are (0, 0), (0, 1), (1, 0), (1, 1), and (a, b) respectively.

Stability Analysis of the Equilibrium Solution

According to the analysis in the previous section, the dynamic adjustment process of online user and government strategies can be represented by the following set of differential equations that form a two-dimensional dynamical system with five equilibrium points: (0, 0), (0, 1), (1, 0), (1, 1), and (a, b).

F(x,y)=dxdt=x(1x){[(α1)βL(γ1)βC]y                     +(α1)βV}    (10)
G(x,y)=dydt=y(1y){x(1β)[(α1)L(γ1)C                     +(1β)(LC)}    (11)

To determine the stability of the equilibrium points in a two-dimensional non-linear dynamical system, a first-order Taylor expansion must be performed at each equilibrium point (x*, y*) for F(x, y) and G(x, y) through a linear approximation, that is,

dxdt=Fx(x*,y*)(x-x*)+Fy(x*,y*)(y-y*)    (12)
dxdt=Gx(x*,y*)(x-x*)+Gy(x*,y*)(y-y*).    (13)

Then, the coefficient matrix of this two-dimensional dynamical system (the Jacobi matrix) is denoted by

J=[F(x,y)xF(x,y)yG(x,y)xG(x,y)y]=[c11c12c21c22],    (14)

where

c11=(1-2x){[(α-1)βL-(γ-1)βC]y+(α-1)βV}    (15)
c12=x(1-x)[(α-1)βL-(γ-1)βC]    (16)
c21=y(1-y)(1-β)[(α-1)L-(γ-1)C]    (17)
c22=(12y){x(1β)[(α1)L(γ1)C]           +(1β)(LC)}    (18)

The stability of the equilibrium point is determined by the eigenroots of the Jacobi matrix J. We denote the eigenroots by λ1 and λ2, which are determined by the characteristic equation of the Jacobi matrix J.

det(J-λI)=0    (19)

By including the elements of the Jacobi matrix J in Equation (19), the above characteristic equation can be expressed as

λ2-(c11+c22)λ+c11c22-c12c21=0    (20)

The solution of the above two-dimensional dynamical system in the vicinity of the equilibrium point (x*, y*)can be expressed as

(x(t)y(t))=(b11b21)eλ1t+(b12b22)eλ2t+(x*y*)    (21)

In the game between the government and online users, only the stable equilibrium points are considered, while the unstable ones are difficult to retain. Therefore, this study only focuses on stable equilibrium points while excluding the unstable points, such as saddle points. According to Equation (21), the two-dimensional dynamical system converges to the stable equilibrium point (x*, y*) only when λ1 < 0 and λ2 < 0 (In the application setting of evolutionary games, imaginary characteristic roots are almost unlikely to appear, so only the real characteristic root case is discussed in this paper).

From the characteristic Equation (20), it follows that

λ1+λ2=c11+c22    (22)
λ1λ2=c11c22-c12c21    (23)

Therefore, the necessary and sufficient conditions to ensure that λ1 < 0 and λ2 < 0 are

c11+c22<0    (24)
c11c22-c12c21<0    (25)

According to the Jacobian matrix of the replicator equation, Table 2 can be obtained:

TABLE 2
www.frontiersin.org

Table 2. Analysis of local equilibrium points.

According to the stability conditions of the equilibrium solution in the evolutionary game, we determine the stability condition of each equilibrium point:

(1) When (α−1)β(V+L) < (γ−1)βC, L>C, αLC, c11(0, 1) < 0, c22(0, 1) < 0, λ1(0, 1) < 0, λ2(0, 1) < 0, then the equilibrium point (0,1) is a stable and the only equilibrium point.

According to this condition, the coefficients of the above two-dimensional dynamic system are assigned as V = 1, L = 0.2, C = 0.1, α = 1.05, β = 0.5, γ = 2, and the vector diagram of the two-dimensional dynamic system is drawn using MATLAB (Figure 1).

FIGURE 1
www.frontiersin.org

Figure 1. Vector diagram of two-dimensional dynamic system of the game between the government and online users.

In the context of the pandemic and online users' comfort levels with assenting to their information being shared, the government's disclosure of the user's information will lead to a situation in which the value generated by the disclosure of the information is higher than the social costs caused by the disclosure. Therefore, the government will eventually choose to disclose the collected user information to better manage the spread of the pandemic. For the online user, when the personal interest gained by sharing personal information is less than the personal cost incurred by the government's disclosure of the user's information, the online user will choose not to share personal information with the government.

(2) When (α−1)β(V+L) < (γ−1)βC, L>C, αL < γC, c11(0, 1) < 0, c22(0, 1) < 0, c11(1, 0) < 0, c22(1, 0) < 0, λ1(0, 1) < 0, λ2(0, 1) < 0, λ1(1, 0) < 0, λ2(1, 0) < 0, λ1(a, b2(a, b) < 0, then the equilibrium points (0,1) and (1,0) are the stable equilibrium points, and (a,b) are saddle points.

Figure 2 shows the phase diagram of government and online user decision-making. According to this condition, the coefficients of the above two-dimensional dynamic systems are assigned: V = 1, L = 0.2, C = 0.1, α = 1.1, β = 0.5, γ = 2.5. The vector diagram of the two-dimensional dynamic system was drawn using MATLAB (Figure 3).

FIGURE 2
www.frontiersin.org

Figure 2. Phase diagram of two-dimensional dynamic system of game between the government and online users.

FIGURE 3
www.frontiersin.org

Figure 3. Vector diagram of two-dimensional dynamic system of game between the government and online users.

The result indicates that when the user refrains from sharing personal information, the government's disclosure of the user information will lead to a situation where the value generated by the disclosure of the information is higher than the social costs associated with the disclosure (L>C). Conversely, when the user shares personal information, the government's disclosure of user information leads to a situation in which the additional value generated by disclosing the information is lower than the social costs associated with the disclosure (αL < γC). Furthermore, when the personal interest gained by the user in sharing personal information is less than the personal cost incurred because of the government's disclosure of the user's information, the user and the government will eventually choose the strategy profiles of (not to share, to disclose) or (to share, not to disclose) and the decisions remain unchanged.

For H coordinates marked as (a,b) in the phase diagram, the probability of it converging to the equilibrium point C (0,1) is

PC=SOHBC=12a+12(1-b)=12+L-C-(α-1)V(α-1)V-(γ-1)C

The probability of the two converging to the equilibrium point B (0,1) in the game is PB = 1−SOHBC, where a higher L leads to a higher PC, and the evolutionary game of the online user and the government have a higher probability of converging to the strategy profile of (not to share, to disclose) eventually. That is, when the additional value generated by the government's disclosure of user information is higher, the government will be more inclined to disclose user information. However, simultaneously, the user will be more inclined to refrain from sharing personal information to avoid loss caused by privacy leakage.

It can be seen from PCα=V(γC-L)[(α-1)V-(γ-1)C]2 that when γC>L, that is, when the government's disclosure of the personal information shared by the user leads to a situation in which the additional social costs caused by privacy leakage are higher than the additional value generated by the disclosure of information, then PCα>0. Further, if the value generated by the user's sharing of personal information for pandemic prevention and control increases, the probability of the evolutionary game of the user and the government to converge to (not to share, to disclose) will increase, whereas the probability of it converging to (to share, not to disclose) will decrease. When γC< L, PCα< 0, and if the value generated by the user's sharing of personal information for pandemic prevention and control increases, the probability of the evolutionary game of the user and the government to converge to (not to share, to disclose) will decrease, whereas the probability of it converging to (to share, not to disclose) will increase.

(3) When (α−1)β(V+L)>(γ−1)βC, αLC, c11(1, 1) < 0, c22(1, 1) < 0, and λ1(1, 1) < 0, λ2(1, 1) < 0, then the equilibrium point (1,1) is a stable, and it is the only one equilibrium point. According to this condition, the coefficients of the above two-dimensional dynamic system are assigned V = 1, L = 0.2, C = 0.1, α = 1.1, β = 0.5, γ = 1.1. The vector diagram of the two-dimensional dynamic system is drawn using MATLAB (Figure 4).

FIGURE 4
www.frontiersin.org

Figure 4. Vector diagram of two-dimensional dynamic system of the game between government and online users.

The result indicates that in the prevention and control of the pandemic, the personal interest gained by the online user upon sharing personal information is larger than the personal cost caused by the government's disclosure of the user's information. When the government's disclosure of personal information leads to a situation in which the additional value generated by the disclosure of the information is higher than the social costs incurred by the disclosure (αLC), the evolutionary game of the user and the government will eventually choose the strategy profile of (to share, disclose) and remain unchanged.

Discussion

The previous Section “Research Design” analyzed the equilibrium results of the game of the government and online users regarding information sharing and pandemic prevention and control under different conditions. However, whether the equilibrium results represent the social optima, or in other words, the expected results of the people, remains inconclusive. In many cases, individual rationality and collective rationality diverge. When the game results of individual rationality do not lead to social optima, the Pareto improvement of the game results can be achieved through government intervention and guidance. Therefore, this section focuses on discussing the social efficiency of the equilibrium results in the games mentioned above.

(1) According to the analysis in the previous section, when (α−1)β(V+L) < (γ−1)βC, L>C, and αLC, the final result of the evolutionary game between online users and the government is (not shared, disclosed). From the perspective of social efficiency, the game results in total social efficiency is U1, 0 = Up, 1+Ug, 0 = (V+L)−C. When the online user and the government choose the strategies of (to share, disclose), the total social efficiency is U0, 0 = Up, 0+Ug, 0 = α(V+L)−γC. When the online user and government choose the strategies of (to share, not disclose), the total social efficiency is U0, 1 = Up, 0+Ug, 1 = αV. When the online user and the government choose the strategies of (not to share, not to disclose), the total social efficiency is U1, 1 = Up, 1+Ug, 1 = V.

From (α−1)β(V+L) < (γ−1)βC⇔α(V+L)−γC < (V+L)−C, then U0, 0< U1, 0, such that when (α-1)< L-CV, then U1, 0>U0, 1>U1, 1, the game result of the online user and the government (not to share, to disclose) is the social optimum state. To elaborate, when the personal information shared by online users with the government generates a value that is too small for the government's prevention and control of the pandemic, it achieves the social optimum state when the user refrains from sharing personal information as the individual maximizes his/her personal interest. On the contrary, when the personal information shared by users is very conducive to the government's prevention and control of the pandemic, it can, in turn, promote the overall social benefits. If the user is dissuaded from sharing personal information by the loss caused by privacy leakage, and chooses not to share personal data, the social optimum cannot be achieved. In contrast, there is a conflict between individual and collective rationality. Consequently, when the value generated by online users' sharing of personal information with the government is sufficiently high enough to facilitate the government's prevention and control of the pandemic, and leads to a result in which the game results of the two players are not consistent with the social optimum, incentive policies designed for online users can be introduced to induce sharing of personal information. This is so that the game results of the two players approach the situation expected by society.

(2) According to the analysis in the previous section, when (α−1)β(V+L) < (γ−1)βC, L>C, and αL < γC, the final result of the evolutionary game between online users and the government is (no sharing, disclosure) or (sharing, no disclosure). From the perspective of social efficiency, when (α-1)< L-CV, U1, 0>U0, 1, the equilibrium point (not to share, to disclose) is more optimal than (to share, not to disclose), and the equilibrium point (not to share, to disclose) is also the social optimum state. When (α-1)>L-CV, U1, 0< U0, 1, the evolutionary game of online users and the government leads to the equilibrium point (to share, not disclose) being more optimal than (not to share, to disclose), while (to share, not to disclose) is also the social optimum state. When γC< L and when the personal information shared by online users with the government generates a value that is relatively high for the government's prevention and control of the pandemic, that is, when (α−1) is higher, then the probability of the evolutionary game of online users and the government to converge to optimal social equilibrium is also higher. Consequently, individual rationality and collective rationality do not necessarily align in this situation. However, if the government intervenes and guides users' behavioral expectations, the game results of the two players would approach the social optimum state.

(3) According to the analysis in the previous section, when (α−1)β(V+L)>(γ−1)βC, αLC, the final result of the evolutionary game between online users and the government is (sharing, disclosure). From the perspective of social efficiency, the total value of sharing personal information with society is greater than the total cost incurred by privacy leakage. Therefore, (to share, disclose), which is the game result of the two players, is the social optimum state. In addition to this, from the perspective of individuals, the sharing of personal information results in privacy leakage of online users. However, sharing personal information also brings extremely high value in terms of the prevention and control of the pandemic. Furthermore, users can benefit greatly from this. From the government's perspective, the personal information shared by users is extremely conducive to the prevention and control of the pandemic. Additionally, it helps stabilize the economy and build a positive reputation for the government. In this case, individual rationality and collective rationality work in the same direction. Therefore, relying solely on individual rationality in the absence of any intervention, society can achieve the expected result.

Conclusion and Implications

Big data technology has been widely used in the prevention and control of the COVID-19 pandemic. Further, the disclosure of pandemic information has improved prevention and control efficiency. However, frequent data leaks have caused conflicts between pandemic information disclosure and privacy protection. Using the evolutionary game model, this study examines the laws of behavior in the sharing and disclosure of pandemic information of the users and the government in disease prevention and control, and attempts to explain and provide solutions for the conflicts mentioned above.

Implications for Research

During the prevention and control of the pandemic, when the government's disclosure of the personal information of online users leads to a situation in which the additional value generated is higher than the social costs caused by the disclosure, the government will inevitably choose to disclose users' personal information to the public in order to improve the efficiency of pandemic prevention and control. As to the users, when the personal interest gained by sharing personal information may not compensate for the cost of privacy leakage, they would refrain from sharing personal information. From the perspective of overall social efficiency, the game result (not to share, to disclose) is not necessarily inefficient. It is related to the value brought to the prevention and control of the pandemic by online users' sharing of personal information: on one hand, when the value of personal information shared by online users generates a social value that is higher than a certain critical value, the government's disclosure of the person's pandemic prevention information shared by online users can improve the efficiency of pandemic prevention. However, as the online users are worried about the loss caused by privacy leakage and choose not to share personal data, the game result of the two players cannot reach the social optimum, which reflects the conflicts between individual rationality and collective rationality. On the other hand, when the social value generated by online sharing of personal pandemic information is lower than a certain critical value, it will not be the best result for society if the government chooses to control the pandemic effectively at the expense of public privacy. The social optimum and the consistence of the individual rationality and collective rationality would be reached if the users choose not to share personal information while the government chooses to disclose the information.

There are two stable equilibria exist in the evolutionary game of the public and the government: (not to share, to disclose) and (to share, not to disclose). More specifically, first, when users choose not to share personal information and the government collects user information by itself, the value of the government's disclosure of the information to the society is less than the social cost. Second, when users choose to share personal information, the value of the government's disclosure of user information to society is greater than the social cost. From the perspective of social efficiency, which one of the game results is more optimal still depends on the value generated by online sharing of personal pandemic information for pandemic prevention and control: when the personal information shared by online users generates a value that is higher than a certain critical value for pandemic prevention and control, the equilibrium of (to share, not to disclose) is more optimal than (not to share, to disclose).The equilibrium of (to share, not to disclose) is also the social optimum, the government and the online users are more inclined to converge to the status of (to share, not to disclose) with the increase of the value. The results also indicates that consciously sharing the personal information is useful to improve the efficiency of the prevention and control of the pandemic and avoid the costs of privacy leakage if the government does not disclose the public's personal information. If the situation is reversed, then (not to share, to disclose) will be more optimal than (to share, not to disclose). The value generated by sharing online users' personal pandemic information is too low for pandemic prevention and control, while the risks of privacy leakage is much higher. The government and the online users are more inclined to converge to the status of (not to share, to disclose) with the decrease of the value.

When the users' personal interests from sharing personal pandemic information are greater than the personal costs incurred, and the value generated by the government's disclosure of the information is greater than the social cost it generates, the users will eventually choose to share personal pandemic information, the government will also choose to disclose the information. The result of the evolutionary game is the optimal social result, that the individual rational choice is consistent with the collective rational choice.

Implications for Practice

Based on the above conclusions, to improve the efficiency of pandemic prevention and control, protect user privacy, and realize the unity of individual and collective rationality, the following policy suggestions are posited:

(1) Establish comprehensive rules of disclosing personal pandemic information, which offers the greatest possible protection for personal privacy rights while ensuring the government's effective use of personal information and the provision of incentives for online users to encourage sharing of personal information. In the fight against the COVID-19 pandemic, frequent information leakage incidents have exposed conflicts between information disclosure and privacy protection. The risks of privacy breach have, to some extent, discouraged the public from sharing personal information related to the pandemic. Therefore, the construction of a comprehensive disclosure mechanism of personal pandemic information, improvement in the identification of information precision, and effective technology for the concealment of privacy information can offer the greatest possible protection for personal privacy rights. For example, on March 19, 2020, the European Commission for Data Protection (EDPB) issued a statement on “personal data processing in the context of COVID-19,” which stressed that data controllers and processors must protect the personal data.

(2) Strengthen the supervision and punishment against privacy infringements related to the disclosure of online users' pandemic information. For example, data protection agencies in EU countries have stressed that the governments and enterprises should follow the privacy protection principles determined by the EU General Data Protection Regulation (GDPR) and other laws. Although the disclosure of users' information related to the pandemic can improve the efficiency of prevention and control, users pay the price as their privacy may be abused for other purposes. Therefore, for better protection of users' privacy and to improve the efficiency of pandemic prevention and control, enterprises or individuals who profit by abusing people's information related to the pandemic should be put under strict supervision and punishment. Further, their acts must be rigorously regulated to ease the worries of users. Simultaneously, they share personal information related to the pandemic and enhance their initiatives to share personal information related to the same. Therefore, as information disclosure is inevitable in preventing and controlling the spread of the virus, the best way to protect personal privacy is to strictly supervise the entities that disclose the information and hold them strictly accountable for illegal acts.

Limitations and Further Research

Using the evolutionary game models, this study incorporates the government prevention and control decisions and online user information sharing decisions into one framework to analyze and expand existing research on the interactions between prevention and control of the pandemic and privacy protection issues. Notwithstanding, more research directions can be explored.

First, for the behavior decisions of online users, the assumption of this study focuses on whether or not to share personal information, while the precision of private information shared or disclosed by users and the government can be further incorporated into the analysis framework in the future. At the same time, the paper assumes that the distribution ratio of the value generated by the epidemic information between the government and online users remains constant. For future study, a distribution ratio that varies with the government and online users' strategies can be further explored.

Second, when constructing an evolutionary game model between government and online users, this study does not consider the interacting topology among individuals or between the individual and the government. The interacting topology between game participants will have a certain impact on the equilibrium result and the convergence process of the game (44, 45). Therefore, a consideration of the interactive topology among individuals, or between the individual and the government, will be our scope of future work.

Third, this paper describes the dynamic game process between the government and online users through replicator dynamic equations, with an awareness that the distinction between the evolutionary and the traditional games can be more fully presented by various other means. Therefore, future research should explore simulating the convergence process of the government and online users' strategies through Monte Carlo simulation, or numerical simulation, or other similar methods.

Data Availability Statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.

Author Contributions

YX and QP conducted the modeling and data analysis and drafted of the manuscript. WX, SZ, and QP conceptualized the study, designed the experiment, and contributed to the manuscript. YX, WX, and QP contributed to the acquisition and computation of data. All authors critically revised the manuscript for important intellectual content and approved the final version.

Funding

This work was supported by Statistical Scientific Key Research Project of China (2021LZ33) and Statistical Scientific Key Research Project of Zhejiang (21TJZZ25).

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's Note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Acknowledgments

The authors thank the editors and reviewers for their constructive comments.

References

1. Fahey RA, Hino A. COVID-19, digital privacy, and the social limits on data-focused public health responses. Int J Inf Manage. (2020) 55:102181. doi: 10.1016/j.ijinfomgt.2020.102181

PubMed Abstract | CrossRef Full Text | Google Scholar

2. Smith JM, Price GR. The logic of animal conflict. Nature. (1973) 246:15–8. doi: 10.1038/246015a0

CrossRef Full Text | Google Scholar

3. Maynard Smith. J. Evolution and the Theory of Games. Cambridge: Cambridge University Press (1982).

Google Scholar

4. Hofoauer J, Siglnund K. Evolutionary game dynamies. Bull Am Math Soc. (2003) 40:479–520. doi: 10.1090/S0273-0979-03-00988-1

CrossRef Full Text | Google Scholar

5. Zhiwei W, Zhang Y, Jiangfeng CAO, Rui H, Jiabin U. The application of privacy protection and artificial intelligence technology in the information auxiliary system of the prevention and control of COVID-19. Chin J Med Sci Res Manag. (2020) 33:E011. doi: 10.3760/cma.j.cn113565-20200216-00014

CrossRef Full Text | Google Scholar

6. Cheng W, Hao C. Case-initiated COVID-19 contact tracing using anonymous notifications. JMIR mHealth and uHealth. (2020) 8:e20369. doi: 10.2196/20369

PubMed Abstract | CrossRef Full Text | Google Scholar

7. Elkhodr M, Mubin O, Iftikhar Z, Masood M, Alsinglawi B, Shahid S, et al. COVID-19 mobile apps for contact tracing: a review on technology, privacy and user opinions (Preprint). J Med Int Res. (2020) 23:9–20. doi: 10.2196/23467

PubMed Abstract | CrossRef Full Text | Google Scholar

8. Sharma T, Wang T, Bashir M. Advocating for users' privacy protections: a case study of COVID-19 apps. Mobile HCI. (2020) 12:1–4. doi: 10.1145/3406324.3410711

CrossRef Full Text | Google Scholar

9. Wu J, Wang J, Nicholas S, Maitland E, Fan Q. Application of big data technology for COVID-19 prevention and control in China: lessons and recommendations. J Med Internet Res. (2020) 22:21980. doi: 10.2196/21980

PubMed Abstract | CrossRef Full Text | Google Scholar

10. Gerke S, Carmel S, Chai PR, Cohen IG. Regulatory, safety, and privacy concerns of home monitoring technologies during COVID-19.? Nat Med. (2020) 26:1176–82. doi: 10.1038/s41591-020-0994-1

PubMed Abstract | CrossRef Full Text | Google Scholar

11. Vitak J, Zimmer M. More than just privacy: using contextual integrity to evaluate the long-term risks from COVID-19 surveillance technologies. Social Media Soc. (2020) 6:205630512094825. doi: 10.1177/2056305120948250

PubMed Abstract | CrossRef Full Text | Google Scholar

12. Newlands G, Lutz C, Tamlands GLA, Villaronga EF, Harasgama R, Scheitlin G. Innovation under pressure: implications for data privacy during the Covid-19 pandemic. Big Data Soc. (2020) 7:2053951720976680. doi: 10.1177/2053951720976680

CrossRef Full Text | Google Scholar

13. Azad MA, Arshad J, Akmal A, Riaz F, Abdullah S, Imarn M, et al. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Intern Things J. (2020) 9:99. doi: 10.1109/JIOT.2020.3024180

CrossRef Full Text | Google Scholar

14. Klar R, Lanzerath D. The ethics of COVID-19 tracking apps-challenges and voluntariness. Research ethics. (2020) 16:1–9. doi: 10.1177/1747016120943622

CrossRef Full Text | Google Scholar

15. Hohman M, Mcmaster F, Woodruff SI. Contact tracing for covid-19: the use of motivational interviewing and the role of social work. Clin Soc Work J. (2021) 1–10. doi: 10.1007/s10615-021-00802-2

PubMed Abstract | CrossRef Full Text | Google Scholar

16. Wottrich VM, Van R, Smit EG. App users unwittingly in the spotlight: a model of privacy protection in mobile apps. J Cons Affairs. (2019) 53:1–26. doi: 10.1111/joca.12218

CrossRef Full Text | Google Scholar

17. Yue L. User control of personal information concerning mobile-app: notice and consent? Comp Law Secur Rev. (2014) 30:521–9. doi: 10.1016/j.clsr.2014.07.008

CrossRef Full Text | Google Scholar

18. Milne GR, Culnan MJ. Strategies for reducing online privacy risks: why consumers read (or don't read) online privacy notices. J Interact Mark. (2004) 18:15–29. doi: 10.1002/dir.20009

CrossRef Full Text | Google Scholar

19. Phelps J, Nowak G, Ferrell E. Privacy concerns and consumer willingness to provide personal information. J Public Policy Market. (2013) 19:27–41. doi: 10.1509/jppm.19.1.27.16941

CrossRef Full Text | Google Scholar

20. Bansal G, Zahedi FM, Gefen D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Dec Supp Syst. (2010) 49:138–50. doi: 10.1016/j.dss.2010.01.010

CrossRef Full Text | Google Scholar

21. Wu KW, Huang SY, Yen DC, Popova I. The effect of online privacy policy on consumer privacy concern and trust. Comp Hum Behav. (2012) 28:889–97. doi: 10.1016/j.chb.2011.12.008

CrossRef Full Text | Google Scholar

22. Alashoor T, Han S, Joseph RC. Familiarity with big data, privacy concerns, and self-disclosure accuracy in social networking websites: an APCO model. Commun Assoc Inform Syst. (2017) 41:62017) doi: 10.17705/1CAIS.04104

CrossRef Full Text | Google Scholar

23. Hughes-Roberts T. Privacy and social networks: is concern a valid indicator of intention and behaviour? IEEE Int Conf Soc Comput. (2013) 9:8–14. doi: 10.1109/SocialCom.2013.140

CrossRef Full Text | Google Scholar

24. Hallam C, Zanella G. Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput Human Behav. (2017) 68:217–27. doi: 10.1016/j.chb.2016.11.033

CrossRef Full Text | Google Scholar

25. Pentina I, Zhang L, Bata H, Chen Y. Exploring privacy paradox in information-sensitive mobile app adoption. Comput Hum Behav. (2016) 65:409–419. doi: 10.1016/j.chb.2016.09.005

CrossRef Full Text | Google Scholar

26. Kokolakis S. Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput Secur. (2017) 64:122. doi: 10.1016/j.cose.2015.07.002

CrossRef Full Text | Google Scholar

27. Ensen C, Potts C, Jensen C. Privacy practices of internet users: self-reports versus observed behavior. Int J Hum Comput Stud. (2005) 63:203–27. doi: 10.1016/j.ijhcs.2005.04.019

CrossRef Full Text | Google Scholar

28. Lee D, Larose R. The impact of personalized social cues of immediacy on consumers' information disclosure: a social cognitive approach. Cyberpsychol Behav Soc Network. (2011) 14:337. doi: 10.1089/cyber.2010.0069

PubMed Abstract | CrossRef Full Text | Google Scholar

29. Benndorf V, Kübler D, Normann HT. Privacy concerns, voluntary disclosure of information, and unraveling: an experiment. Eur Econ Rev. (2015) 75:43–59. doi: 10.1016/j.euroecorev.2015.01.005

CrossRef Full Text | Google Scholar

30. Rui J, Stefanone MA. Strategic self-presentation online: a cross-cultural study. Comput Human Behav. (2013) 29:110–8. doi: 10.1016/j.chb.2012.07.022

CrossRef Full Text | Google Scholar

31. Lee E, Ahn J, Kim YJ. Personality traits and self-presentation at Facebook. Pers Individ Dif. (2014) 69:162–7. doi: 10.1016/j.paid.2014.05.020

CrossRef Full Text | Google Scholar

32. Lee-Won RJ, Shim M, Joo YK, Park SG. Who puts the best “face” forward on Facebook?: positive self-presentation in online social networking and the role of self-consciousness, actual-to-total friends ratio, and culture. Comput Hum Behav. (2014) 39:413–23. doi: 10.1016/j.chb.2014.08.007

CrossRef Full Text | Google Scholar

33. Wang T, Duong TD, Chen CC. Intention to disclose personal information via mobile applications: a privacy calculus perspective. Int J Inf Manage. (2016) 36:531–42. doi: 10.1016/j.ijinfomgt.2016.03.003

CrossRef Full Text | Google Scholar

34. Shane-Simpson C, Manago A, Gaggi N, Gillespie-Lynch K. Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Comput Human Behav. (2018) 86:276–88. doi: 10.1016/j.chb.2018.04.041

CrossRef Full Text | Google Scholar

35. Stutzman F, Capra R, Thompson J. Factors mediating disclosure in social network sites. Comput Human Behav. (2011) 27:590–8. doi: 10.1016/j.chb.2010.10.017

CrossRef Full Text | Google Scholar

36. Taddei S, Contena B. Privacy, trust and control: which relationships with online self-disclosure? Comput Hum Behav. (2013) 29:821–6. doi: 10.1016/j.chb.2012.11.022

CrossRef Full Text | Google Scholar

37. Acquisti A. Nudging privacy: the behavioral economics of personal information. IEEE Educ Activ Depart. (2009) 7:82–5. doi: 10.1109/MSP.2009.163

CrossRef Full Text | Google Scholar

38. Fichman RG, Kohli R, Krishnan R. The role of information systems in healthcare: current research and future trends. Inform Syst Res. (2011) 22:419–28. doi: 10.1287/isre.1110.0382

CrossRef Full Text | Google Scholar

39. Xu F, Michael K, Chen X. Factors affecting privacy disclosure on social network sites: an integrated model. Electr Commerce Res. (2013) 13:151–68. doi: 10.1007/s10660-013-9111-6

CrossRef Full Text | Google Scholar

40. Morosan C, Defranco A. Disclosing personal information via hotel apps: a privacy calculus perspective. Int J Hosp Manag. (2015) 47:120–30. doi: 10.1016/j.ijhm.2015.03.008

CrossRef Full Text | Google Scholar

41. Libaque-Saenz CF, Chang Y, Kim J, Park M-C, Rho JJ. The role of perceived information practices on consumers' intention to authorise secondary use of personal data. Behav Inf Technol. (2016) 35:339–56. doi: 10.1080/0144929X.2015.1128973

CrossRef Full Text | Google Scholar

42. Bansal G, Zahedi FM, Gefen D. Do context and personality matter? Trust and privacyconcerns in disclosing private information online. Informat Manage. (2016) 53:1–21. doi: 10.1016/j.im.2015.08.001

CrossRef Full Text | Google Scholar

43. Yunpeng Y, Weixin Y. Does whistleblowing work for air pollution control in China? A study based on three-party evolutionary game model under incomplete information. Sustainability. (2019) 11:324. doi: 10.3390/su11020324

CrossRef Full Text | Google Scholar

44. Wang Z, Xia C. Co-evolution spreading of multiple information and epidemics on two-layered networks under the influence of mass media. Nonlinear Dynam. (2020) 102:3039–52. doi: 10.1007/s11071-020-06021-7

PubMed Abstract | CrossRef Full Text | Google Scholar

45. Wang Z, Xia C, Chen Z, Chen G. Epidemic propagation with positive and negative preventive information in Multiplex Networks. IEEE Trans Cybernetics. (2021) 51:1454–62. doi: 10.1109/TCYB.2019.2960605

PubMed Abstract | CrossRef Full Text | Google Scholar

Keywords: online users, government, information sharing, privacy protection, COVID-19 prevention and control

Citation: Xiao Y, Xu W, Zeng S and Peng Q (2021) Online User Information Sharing and Government Pandemic Prevention and Control Strategies-Based on Evolutionary Game Model. Front. Public Health 9:747239. doi: 10.3389/fpubh.2021.747239

Received: 27 July 2021; Accepted: 18 October 2021;
Published: 15 November 2021.

Edited by:

Lei Shi, Yunnan University of Finance and Economics, China

Reviewed by:

Chengyi Xia, Tianjin University of Technology, China
Zhenyu Shi, Beihang University, China

Copyright © 2021 Xiao, Xu, Zeng and Peng. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Qiao Peng, pengqiao0636@163.com

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.