{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T22:10:33Z","timestamp":1778278233487,"version":"3.51.4"},"reference-count":32,"publisher":"JMIR Publications Inc.","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JMIR Hum Factors"],"abstract":"<jats:sec>\n                    <jats:title>Background<\/jats:title>\n                    <jats:p>The COVID-19 pandemic has caused changes in technology use worldwide, both socially and economically. This pandemic crisis has brought additional measures such as contact-tracing apps (CTAs) to help fight against spread of the virus. Unfortunately, the low adoption rate of these apps affected their success. There could be many reasons for the low adoption, including concerns of security and privacy, along with reported issues of trust in CTAs. Some concerns are related with how CTAs could be used as surveillance tools or their potential threats to privacy as they involve health data. For example, in Estonia, the CTA named HOIA had approximately 250,000 downloads in the middle of January 2021. However, in 2021, only 4.7% of the population used HOIA as a COVID-19 CTA. The reasons for the low adoption include lack of competency, and privacy and security concerns. This lower adoption and the lack of trustworthiness persist despite efforts of the European Union in building ethics and trustworthy artificial intelligence (AI)-based apps.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Objective<\/jats:title>\n                    <jats:p>The aim of this study was to understand how to measure trust in health technologies. Specifically, we assessed the usefulness of the Human-Computer Trust Scale (HCTS) to measure Estonians\u2019 trust in the HOIA app and the causes for this lack of trust.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Methods<\/jats:title>\n                    <jats:p>The main research question was: Can the HCTS be used to assess citizens\u2019 perception of trust in health technologies? We established four hypotheses that were tested with a survey. We used a convenience sample for data collection, including sharing the questionnaire on social network sites and using the snowball method to reach all potential HOIA users in the Estonian population.<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Results<\/jats:title>\n                    <jats:p>Among the 78 respondents, 61 had downloaded the HOIA app with data on usage patterns. However, 20 of those who downloaded the app admitted that it was never opened despite most claiming to regularly use mobile apps. The main reasons included not understanding how it works, and privacy and security concerns. Significant correlations were found between participants\u2019 trust in CTAs in general and their perceived trust in the HOIA app regarding three attributes: competency (P&lt;.001), risk perception (P&lt;.001), and reciprocity (P=.01).<\/jats:p>\n                  <\/jats:sec>\n                  <jats:sec>\n                    <jats:title>Conclusions<\/jats:title>\n                    <jats:p>This study shows that trust in the HOIA app among Estonian residents did affect their predisposition to use the app. Participants did not generally believe that HOIA could help to control the spread of the virus. The result of this work is limited to HOIA and health apps that use similar contact-tracing methods. However, the findings can contribute to gaining a broader understanding and awareness of the need for designing trustworthy technologies. Moreover, this work can help to provide design recommendations that ensure trustworthiness in CTAs, and the ability of AI to use highly sensitive data and serve society.<\/jats:p>\n                  <\/jats:sec>","DOI":"10.2196\/33951","type":"journal-article","created":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T00:49:20Z","timestamp":1650329360000},"page":"e33951","source":"Crossref","is-referenced-by-count":8,"title":["Modeling Trust in COVID-19 Contact-Tracing Apps Using the Human-Computer Trust Scale: Online Survey Study"],"prefix":"10.2196","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-1389","authenticated-orcid":false,"given":"Sonia","family":"Sousa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0973-7458","authenticated-orcid":false,"given":"Tiina","family":"Kalju","sequence":"additional","affiliation":[]}],"member":"1010","published-online":{"date-parts":[[2022,6,13]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2196\/23194"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/hex.13179"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3411496.3421229"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2020.3029311"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ares.2010.77"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3010226"},{"key":"ref7","first-page":"535","author":"Eloff, MM","year":"2002","journal-title":"Security in the Information Society"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078843"},{"key":"ref9","unstructured":"ISO\/IEC 27000:2009 Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Overview and vocabularyInternational Organization for Standardization20092022-05-19https:\/\/www.iso.org\/standard\/41933.html"},{"key":"ref10","unstructured":"Ethics guidelines for trustworthy AIEuropean Commission201904082022-06-01https:\/\/digital-strategy.ec.europa.eu\/en\/library\/ethics-guidelines-trustworthy-ai"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20722"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3431832.3431841"},{"key":"ref13","unstructured":"COVID-19 teemaline k\u00fcsitlus 26Turu-uuringute AS2021-02-19https:\/\/riigikantselei.ee\/media\/933\/download"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-020-01044-x"},{"key":"ref15","unstructured":"CavoukianAPrivacy by design: The 7 foundational principlesInformation and privacy commissioner of Ontario, Canada20092022-05-19https:\/\/www.ipc.on.ca\/wp-content\/uploads\/resources\/7foundationalprinciples.pdf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106718"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358846"},{"key":"ref18","unstructured":"SimkoLCaloRRoesnerFKohnoTCOVID-19 contact tracing and privacy: studying opinion and preferencesarXiv202012172022-05-19https:\/\/arxiv.org\/abs\/2005.06056"},{"key":"ref19","unstructured":"Ministry of Social AffairsCOVID-19 blogiTerviseamet20212021-04-27https:\/\/www.terviseamet.ee\/et\/uudised\/covid-19-blogi-26-aprill-oopaevaga-lisandus-163-positiivset-testi"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/0144929x.2019.1656779"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2007.24348410"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/cisti.2014.6876935"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1643823.1643894"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633352"},{"key":"ref25","unstructured":"KramerRMRethinking trustHarvard Business Review2009062021-03-19https:\/\/hbr.org\/2009\/06\/rethinking-trust"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420087"},{"key":"ref27","first-page":"16","author":"Magalh\u00e3es Hill, H","year":"2005","journal-title":"Investiga\u00e7\u00e3o por question\u00e1rio, 2nd edition"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajtas.20160501.11"},{"key":"ref29","author":"Hair, J","year":"2014","journal-title":"A primer on partial least squares structural equation modeling (PLS-SEM)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1985347.1985353"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1108\/JOSM-11-2016-0299"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1097-0266(199902)20:2<195::aid-smj13>3.0.co;2-7"}],"container-title":["JMIR Human Factors"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T09:30:44Z","timestamp":1655112644000},"score":1,"resource":{"primary":{"URL":"https:\/\/humanfactors.jmir.org\/2022\/2\/e33951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.2196\/33951","relation":{"has-preprint":[{"id-type":"doi","id":"10.2196\/preprints.33951","asserted-by":"object"}]},"ISSN":["2292-9495"],"issn-type":[{"value":"2292-9495","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,13]]}}}