Digital contact tracing applications during COVID-19: A scoping review about public acceptance

Loading...
Thumbnail Image

Access rights

openAccess
publishedVersion

URL

Journal Title

Journal ISSN

Volume Title

A2 Katsausartikkeli tieteellisessä aikakauslehdessä

Major/Subject

Mcode

Degree programme

Language

en

Pages

24

Series

Informatics, Volume 8, issue 3

Abstract

Digital contact tracing applications (CTAs) have been one of the most widely discussed technical methods of controlling the COVID-19 outbreak. The effectiveness of this technology and its ethical justification depend highly on public acceptance and adoption. This study aims to describe the current knowledge about public acceptance of CTAs and identify individual perspectives, which are essential to consider concerning CTA acceptance and adoption. In this scoping review, 25 studies from four continents across the globe are compiled, and critical topics are identified and discussed. The results show that public acceptance varies across national cultures and sociodemographic strata. Lower acceptance among people who are mistrusting, socially disadvantaged, or those with low technical skills suggest a risk that CTAs may amplify existing inequities. Regarding determinants of acceptance, eight themes emerged, covering both attitudes and behavioral perspectives that can influence acceptance, including trust, privacy concerns, social responsibility, perceived health threat, experience of and access to technologies, performance expectancy and perceived benefits, and understanding. Furthermore, widespread misconceptions about the CTA function are a topic in need of immediate attention to ensure the safe use of CTAs. The intention-action gap is another topic in need of more research.

Description

Publisher Copyright: © 2021 by the authors. Licensee MDPI, Basel, Switzerland.

Other note

Citation

Zetterholm, M V, Lin, Y & Jokela, P 2021, 'Digital contact tracing applications during COVID-19 : A scoping review about public acceptance', Informatics, vol. 8, no. 3, 48. https://doi.org/10.3390/informatics8030048