Abstract

Smartphone apps, including those for digital contact tracing (DCT), played a crucial role in containing infections during the COVID-19 pandemic. Their primary function is to generate and disseminate information to disrupt transmissions based on various events, such as encounters, vaccinations, locations, or infections. Although the functionality of these apps has been extensively studied, there is still a lack of qualitative research addressing critical issues. We will demonstrate that the use of DCT presents a challenge due to the tension between continuous health monitoring and uncertainties related to transparency and user sovereignty. On one hand, DCT enables the monitoring of various risk factors, including data-based calculations of infection probabilities. On the other hand, continuous risk management is intertwined with several uncertainties, including the unclear storage of personal data, who has access to it, and how it will be used in the future. We focus on the German "Corona-Warn-App" and support our argument with empirical data from 19 expert interviews conducted between 2020 and 2021. The interviews were conducted using a semistructured questionnaire and analyzed according to the principles of grounded theory. Our data underscores 3 dimensions: transparency, data sovereignty, and the east-west divide. While transparency is considered an essential foundation for establishing trust in the use of DCT by providing a sense of security, data sovereignty is seen as a high value during the pandemic, protecting users from an undesired loss of control. The aspect of the east-west divide highlights the idea of incorporating sociocultural values and standards into technology, emphasizing that algorithms and data-driven elements, such as distance indicators, encounters, and isolations, are also influenced by sociocultural factors. The effective use of DCT for pandemic containment relies on achieving a balance between individual control and technological prevention. Maximizing the technological benefits of these tools is crucial. However, users must also be mindful of the information they share and maintain control over their shared data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call