{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:17:08Z","timestamp":1773407828428,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030861438","type":"print"},{"value":"9783030861445","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,24]],"date-time":"2021-11-24T00:00:00Z","timestamp":1637712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Verein zur F\u00f6rderung des digitalen Humanismus"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Digital technologies, the data they collect, and the ways in which that data is used increasingly effect our psychological, social, economic, medical, and safety-related well-being. While technology can be used to improve our well-being on all of these axes, it can also perpetrate harm. Prior research has focused near exclusively on privacy as a primary harm. Yet, privacy is only one of the many considerations that users have when adopting a technology. In this chapter, I use the case study of COVID-19 apps to argue that this reductionist view on technology harm has prevented effective adoption of beneficial technology. Further, a privacy-only focus risks perpetuating and magnifying existing technology-related inequities. To realize the potential of well-being technology, we need to create technologies that are respectful not only of user privacy but of users\u2019 expectations for their technology use and the context in which that use takes place.<\/jats:p>","DOI":"10.1007\/978-3-030-86144-5_42","type":"book-chapter","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T09:02:41Z","timestamp":1637658161000},"page":"309-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["The Need for Respectful Technologies: Going Beyond Privacy"],"prefix":"10.1007","author":[{"given":"Elissa M.","family":"Redmiles","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,24]]},"reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Abu-Salma, R., Sasse, M. A., Bonneau, J., Danilova, A., Naiakshina, A., and Smith, M. (2017). Obstacles to the Adoption of Secure Communication Tools. In: Security and Privacy (SP), 2017 IEEE Symposium on (SP17). IEEE Computer Society.","DOI":"10.1109\/SP.2017.65"},{"issue":"2","key":"42_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1086\/671754","volume":"42","author":"A Acquisti","year":"2013","unstructured":"Acquisti, A., John, L. K., and Loewenstein, G. (2013). What Is Privacy Worth? The Journal of Legal Studies, 42 (2), 249\u2013274.","journal-title":"The Journal of Legal Studies"},{"issue":"1","key":"42_CR3","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1097\/PRS.0b013e318219c171","volume":"128","author":"PB Burns","year":"2011","unstructured":"Burns, P. B., Rohrich, R. J., and Chung, K. C. (2011). The levels of evidence and their role in evidence-based medicine. Plastic and reconstructive surgery, 128 (1), 305.","journal-title":"Plastic and reconstructive surgery"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Byambasuren, O., Sanders, S., Beller, E., and Glasziou, P. (2018). Prescribable mHealth apps identified from an overview of systematic reviews. npj Digital Medicine, 1 (1), 1\u201312.","DOI":"10.1038\/s41746-018-0021-9"},{"issue":"1","key":"42_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T. and Hart, P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17 (1), 61\u201380.","journal-title":"Information Systems Research"},{"key":"42_CR6","unstructured":"Learning from the People: Responsibly Encouraging Adoption of Contact Tracing Apps (2020). Available from: https:\/\/www.youtube.com\/watch?v=my_Sm7C_Jt4&t=366s [Accessed 17 Mar 2021]."},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Li, T., Cobb, C., Jackie, Yang, Baviskar, S., Agarwal, Y., Li, B., Bauer, L., and Hong, J. I. (2020). What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention. arXiv:2012.12415 [cs] [online]. Available from: http:\/\/arxiv.org\/abs\/2012.12415 [Accessed 17 Mar 2021].","DOI":"10.1016\/j.pmcj.2021.101439"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Redmiles, E. M. (2020). User Concerns 8 Tradeoffs in Technology-facilitated COVID-19 Response. Digital Government: Research and Practice, 2 (1), 6:1\u20136:12.","DOI":"10.1145\/3428093"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Redmiles, E. M., Bodford, J., and Blackwell, L. (2019). \u201cI Just Want to Feel Safe\u201d: A Diary Study of Safety Perceptions on Social Media. Proceedings of the International AAAI Conference on Web and Social Media, 13, 405\u2013416.","DOI":"10.1609\/icwsm.v13i01.3356"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Simko, L., Chang, J. L., Jiang, M., Calo, R., Roesner, F., and Kohno, T. (2020). COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion. arXiv:2012.01553 [cs] [online]. Available from: http:\/\/arxiv.org\/abs\/2012.01553 [Accessed 17 Mar 2021].","DOI":"10.1145\/3480464"},{"key":"42_CR11","unstructured":"Troncoso, C., Payer, M., Hubaux, J.-P., Salath\u00e9, M., Larus, J., Bugnion, E., Lueks, W., Stadler, T., Pyrgelis, A., Antonioli, D., Barman, L., Chatel, S., Paterson, K., \u010capkun, S., Basin, D., Beutel, J., Jackson, D., Roeschlin, M., Leu, P., Preneel, B., Smart, N., Abidin, A., G\u00fcrses, S., Veale, M., Cremers, C., Backes, M., Tippenhauer, N. O., Binns, R., Cattuto, C., Barrat, A., Fiore, D., Barbosa, M., Oliveira, R., and Pereira, J. (2020). Decentralized Privacy-Preserving Proximity Tracing. arXiv:2005.12273 [cs] [online]. Available from: http:\/\/arxiv.org\/abs\/2005.12273 [Accessed 17 Mar 2021]."},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Vitak, J., Liao, Y., Kumar, P., Zimmer, M., and Kritikos, K. (2018). Privacy attitudes and data valuation among fitness tracker users. In: International Conference on Information. Springer, 229\u2013239.","DOI":"10.1007\/978-3-319-78105-1_27"}],"container-title":["Perspectives on Digital Humanism"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86144-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T01:37:49Z","timestamp":1673833069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86144-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,24]]},"ISBN":["9783030861438","9783030861445"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86144-5_42","relation":{},"subject":[],"published":{"date-parts":[[2021,11,24]]},"assertion":[{"value":"24 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}