{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:05:37Z","timestamp":1771265137335,"version":"3.50.1"},"reference-count":13,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2020,7,13]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Because of the outbreak of Covid 19, the entire world is thinking of new strategies, preventive measures to safeguard the human life from the widespread of the pandemic. The areas where people are affected are marked as containment zones and people are not allowed to exit out of those areas. Similarly, new people are not allowed to enter inside those areas. Hence, the purpose of this paper is to propose a methodology to track the Covid zones, to enhance and tighten the security measures. A geo-fence is created for the containment zone. The person who enters or exits out of that particular zone will be monitored and alert message will be sent to that person\u2019s mobile.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>After tracking the location of a suspicious individual, the geo-fenced layer is mapped in the area and then the virtual perimeter is used for further trapping process. This geo-fenced layer can be viewed by the citizens as soon as it is updated by the Covid monitoring team. The geo-fencing is a concept of building a virtual perimeter area. This virtual perimeter monitoring system helps in monitoring the containment zones effectively. It reduces operational costs by using an automated system based on wireless infrastructure. It also alerts the authorities immediately to catch the violators. Thus, it helps to speed up the process of inspecting the containment zones and monitoring the individuals who violate the rules given by government.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The proposed methodologies will be an effective way to track the Covid\u2019s communal spread. But the workflow of the system demands the required data sets and permission in legal manner to set up the environment that maintains the constitutional law and order in practice. The application developed was a prototype to display how it works if the required data sets are provided by the government. There are several tracking models that are released across the world such as Aarogya setu (India), Trace together (Singapore) and Hagmen (Israel). All these models are based on Bluetooth proximity identification; though Bluetooth proximity identification is helpful for high range in a short distance, the privacy concern is debatable one. Using modern technology, it is so easy to crack the individual gadgets and with Bluetooth enabling it makes things even worse. Thus, it is important to maintain the tracking a safer and secure one, and another issue with those Bluetooth-based applications is that tracking can be done only if the user enabled the Bluetooth option, if not the entire functioning would become a mess. The proposed methodology of tracking without Bluetooth will ensure data security also.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This was developed as a project by our third-year students of the Department of Information Technology of our college.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-06-2020-0057","type":"journal-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T07:48:45Z","timestamp":1594367325000},"page":"409-417","source":"Crossref","is-referenced-by-count":13,"title":["Tracking the Covid zones through geo-fencing technique"],"prefix":"10.1108","volume":"16","author":[{"given":"Anto Arockia Rosaline","family":"R.","sequence":"first","affiliation":[]},{"given":"Lalitha","family":"R.","sequence":"additional","affiliation":[]},{"given":"Hariharan","family":"G.","sequence":"additional","affiliation":[]},{"given":"Lokesh","family":"N.","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020100504360539900_ref001","doi-asserted-by":"publisher","article-title":"Automated and semi-automated contact tracing: protocol for a rapid review of available evidence and current challenges to inform the control of COVID-19","year":"2020","DOI":"10.1101\/2020.04.14.20063636"},{"issue":"6","key":"key2020100504360539900_ref002","article-title":"Geofencing: a generic approach to real time location based tracking system","volume":"6","year":"2016","journal-title":"I, RACST \u2013 International Journal of Computer Networks and Wireless Communications (IJCNWC)"},{"key":"key2020100504360539900_ref003","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.idm.2020.04.001","article-title":"To mask or not to mask: modeling the potential for face mask use by the general public to curtail the COVID-19 pandemic","volume":"5","year":"2020","journal-title":"Infectious Disease Modelling"},{"key":"key2020100504360539900_ref004","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636093","article-title":"Geofencing 2.0: taking location-based notifications to the next level","volume-title":"UbiComp 2014 \u2013 Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing","year":"2014"},{"issue":"11","key":"key2020100504360539900_ref005","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.3201\/eid1211.060255","article-title":"Targeted social distancing design for pandemic influenza","volume":"12","year":"2006","journal-title":"Emerging Infectious Diseases"},{"issue":"1","key":"key2020100504360539900_ref006","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jegh.2011.06.004","article-title":"Could influenza transmission be reduced by restricting mass gatherings? Towards an evidence-based policy framework","volume":"1","year":"2011","journal-title":"Journal of Epidemiology and Global Health"},{"issue":"4","key":"key2020100504360539900_ref007","article-title":"Development of automatic geofencing and accidental monitoring system based on GPS technology","volume":"3","year":"2013","journal-title":"International Journal of Computer Science, Engineering and Applications"},{"issue":"10","key":"key2020100504360539900_ref008","article-title":"Geofencing and location based reminder services","volume":"3","year":"2016","journal-title":"International Journal of Advance Engineering and Research Development"},{"key":"key2020100504360539900_ref009","article-title":"Optimal COVID-19 quarantine and testing policies","year":"2020"},{"issue":"11","key":"key2020100504360539900_ref010","article-title":"Geo-fencing infrastructure: location based service","volume":"3","year":"2016","journal-title":"International Research Journal of Engineering and Technology"},{"key":"key2020100504360539900_ref011","article-title":"Optimizing geofencing for location-based services: a new application of spatial marketing","volume-title":"Ideas in Marketing: Finding the New and Polishing the Old. Developments in Marketing Science: Proceedings of the Academy of Marketing Science","year":"2015"},{"issue":"4","key":"key2020100504360539900_ref012","article-title":"Vehicle tracking with geo fencing on android platform","volume":"8","year":"2018","journal-title":"International Journal of Engineering Science and Technology"},{"key":"key2020100504360539900_ref013","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICIS.2016.7550849","article-title":"Using geofencing for a disaster information system","volume-title":"IEEE\/ACIS 15th International Conference on Computer and Information Science (ICIS)","year":"2016"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-06-2020-0057\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-06-2020-0057\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:33Z","timestamp":1753394733000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/16\/5\/409-417\/162748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":13,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,7,13]]}},"alternative-id":["10.1108\/IJPCC-06-2020-0057"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-06-2020-0057","relation":{},"ISSN":["1742-7371","1742-7371"],"issn-type":[{"value":"1742-7371","type":"print"},{"value":"1742-7371","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7,13]]}}}