<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Selecting effective persuasive strategies in Behavior Change Support Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Saskia Kelders</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Kulyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lisette van Gemert-Pijnen</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Harri Oinas-Kukkonen</string-name>
          <email>Harri.Oinas-Kukkonen@oulu.fi</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oulu</institution>
          ,
          <country country="FI">Finland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Twente</institution>
          ,
          <addr-line>The Netherlands (s.m.kelders; o.a.kulyk</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <abstract>
        <p>The Third International Workshop on Behavior Change Support Systems provides a place to discuss recent advances in BCSS research. The selected papers show that research into behavior change support systems is expanding: not only by trying to reach more and other people, but also by expanding the contexts where BCSSs are employed. A key point for all BCSSs, for each target group and for each context, is to select the right persuasive strategies. From the proceedings we can learn that there are several ways to select and evaluate these features, but this remains an issue that deserves continuous research attention.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Technology is everywhere. Our homes and workplaces are filled with technology and
people themselves carry more and more technology with them everywhere they go.
Furthermore, persuasion is everywhere. From doing grocery shopping to reading the
news online, we are being persuaded to buy certain products or behave a certain way.
This persuasion is not new, only the way it is presented to us, is changing. With the
ubiquitous presence of technology, there is also ubiquitous presence of persuasion
through technology. However, because of the sometimes overwhelming possibilities
and instances of persuasion, it is even more important to select the right strategies to
actually influence the behavior of people and not just add to the ‘noise’ of persuasion
all around us. This poses real challenges for researchers and practitioners in the field
of Behavior Change Support Systems (BCSSs) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The aim of a BCSS is to help people to change their behavior through technology.
Two domains that gave gained considerable attention are the health and the energy
domain. In the health domain, BCSSs have been developed to support people to
become more physically active, or to shop and eat healthier (e.g. [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ]). In the energy
sector, BCSSs have been created to help people become aware of their energy
consumption and to reduce this (e.g. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]). However, BCSSs also hold potential for other
domains, e.g. in the context of the workplace [
        <xref ref-type="bibr" rid="ref5 ref6">5,6</xref>
        ]. BCSSs may support people to
work according to protocols or to help them work more efficiently. In all these cases,
the BCSS helps people to change their behavior, but there is always a certain level of
motivation to start with. It is the challenge for BCSSs to find the right way and the
right moment to persuade the user to reach previously agreed upon goals.
Finding this right way of persuasion is a challenge that can be seen in the
development and evaluation of many BCSSs, but has not always received very structured
attention. There are multiple ways how to deal with this challenge. For instance, the
Persuasive System Design Model (PSD-model) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] provides guidelines for developing
and evaluating BCSSs. It states that for developing BCSSs, the starting point is
understanding the postulates that underline each persuasive system. After that, one should
analyze the intent, event and strategy. Only then can developers decide on which
persuasive features can be used to reach the goals of the BCSS. The persuasive features
in the PSD-model are divided into four categories. Primary task support holds
strategies that are aimed to make the main task of the BCSS easier for the user. Examples
of strategies in this category are reduction (reducing complex behavior to simpler
tasks) and tailoring (presenting information that is tailored to the needs and wishes of
a target group). Strategies from primary task support seem to be used most in many
BCSSs, from web-based interventions to mobile apps [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ]. This emphasis on primary
task support features seems logical from the perspective of the developers (i.e. most
of the time the BCSS is built to support this primary task) and many individual
features been shown to be effective in behavior change (e.g. the positive effects of
tailoring are well known [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. However, deciding which primary task support features to
choose in which situation, is still a challenge. Moreover, primary task support is not
the only category of persuasive features and research shows that other categories
might even be more important for the persuasive power of BCSSs than primary task
support [
        <xref ref-type="bibr" rid="ref11 ref12 ref8">8,11,12</xref>
        ].
      </p>
      <p>
        Dialogue support, the second category of persuasive features in the PSD-model, is
aimed at supporting the dialogue between the user and the system. Examples of
features from this category are reminders, praise and a social role. Reminders are a
feature that is well investigated and can play an important role in persuading users
[
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ]. Not surprising, this feature has been used in many BCSSs (see e.g. [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ].
Other features form this category have been used less often, although with the recent
rise of gamification techniques, features as (virtual) rewards are getting more
attention (see e.g. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]). Research shows that dialogue support as a category seems to pay
an important role in persuading users [
        <xref ref-type="bibr" rid="ref11 ref12 ref8">8,11,12</xref>
        ].
      </p>
      <p>
        Credibility support, or the ways to make a system more credible and this persuasive,
has been used to some extent in BCSS [
        <xref ref-type="bibr" rid="ref16 ref17 ref9">9,16,17</xref>
        ]. Credibility is an important issue in
our digital community, but selecting the right way to support credibility of BCSS
seems to have gotten only limited attention.
      </p>
      <p>
        The last category of persuasive features in the PSD-model is social support, or the
ways to design the system so that it motivates users by leveraging social influence.
Social support through technology has received a lot research attention (see e.g.
[1820]) and seems to provide huge opportunities to persuade people in our social
environment, which takes place more and more in our online world. The humanization of
the web [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] plays an important role in this respect. In this light, is it even more
surprising that social support features are used so little in BCSSs [
        <xref ref-type="bibr" rid="ref16 ref17 ref8 ref9">8,9,16,17</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Advances in BCSS research</title>
      <p>The Third International Workshop on Behavior Change Support Systems provides a
place to discuss recent advances in BCSS research. The six papers presented at the
workshop all cover the timely topic of how to select and evaluate effective persuasive
strategies. The first session includes three papers that are about selecting persuasive
strategies to increase the reach of BCSS. The second session covers three papers that
show the importance of the context of the BCSS.
2.1</p>
      <sec id="sec-2-1">
        <title>Persuasive strategies to increase reach</title>
        <p>
          Triggers in the environment; increasing the reach of Behavior Change Support
Systems by connecting to the offline worldby Ludden and Offringa [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] discusses why
many BCSSs have limited reach and provides an alternative approach to increase
reach; design for stages of change. Through a case study, the authors show that
triggers in the environment can be designed that may reach a larger group than an online
BCSS. By connecting these offline triggers to the BCSS, reach may be increased.
Enhancing persuasive features of Behavior Change Support Systems: the role of
UFADE by Wiafe and Frempong [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] builds on earlier work on the three-dimensional
relationships between attitude and behavior (3D-RAB) model [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] and addresses the
issue of changing user needs during the use of BCSSs. When BCSSs are not ready for
these changing needs, they become obsolete for a group of users, thereby diminishing
its reach. The Unified Framework for Analyzing, Designing and Evaluating
persuasive systems (U-FADE) provides an approach to evaluate and select persuasive
features based on the (changing) needs of the targeted users. Application to an existing
weight management intervention shows the possibilities of this approach.
How Persuasive are Serious Games, Social Media and mHealth Technologies for
Vulnerable Young Adults? Design Factors for Health Behavior and Lifestyle Change
Support: Sexual Health Caseby Kulyk, Den Haas, David and Van Gemert-Pijnen
[
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] aims to identify effective persuasive features for a specific target group which is
not reached by regular interventions. They use the case of improving the sexual health
of vulnerable young adults and employ focus groups to gain insight into the needs and
attitudes of these young adults towards persuasive features and design factors that
contribute to the use and uptake of existing and new health technologies.
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Importance of context</title>
        <p>
          About the persuasion context for BCSSs: analyzing the contextual factorbsy Halttu,
Oduor, Tikka and Oinas-Kukkonen [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] emphasizes the importance of taking the
context into account for designing and evaluating BCSSs. They present the event
model, which is a conceptual tool for identifying which contextual factors are
important and how to take these factors into account. This event model is an extension
of the persuasion context of the PSD-model and provides more concrete factors that
potentially play a role in the everyday lives of end-users and should be taken into
account when investigating a BCSS.
Behavior Change Support Systems for Privacy and Securityby Kegel and Wieringa
[
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] proposes to use a BCSS for a specific domain, namely information security. For
this specific context, the challenges seem to differ from areas that have received more
attention in the BCSS-field like healthcare and energy consumption. Challenges that
have been identified are motivation and change type, and the dynamic nature of
security threats. The authors propose the Personal Information Security Assistant (PISA)
as a possible solution to these challenges.
        </p>
        <p>
          Persuasive information security: a Behavior Change Support System to help
employees protect organizational information securityby Busch, Patil, Regal, Hochleitner,
Fröhlich and Tscheligi [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] also tackles the issue of information security, but in the
context of the workplace. They present a Behavior Change Support prototype that
implements persuasive features (points, quiz, challenges, statistics, personalization
and risk communication) to support employees to comply with information security
policies. Preliminary results of user studies show that this is a promising approach for
influencing user attitudes and behaviors regarding secure work practices.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Discussion</title>
      <p>The selected papers for the workshop show that research into behavior change support
systems is expanding: not only by trying to reach more and other people, but also by
expanding the contexts where BCSSs are employed. The workshop provides an
opportunity for researchers to discuss new steps in these directions. A key point for all
BCSSs, for each target group and for each context, is to select the right persuasive
strategies. From the proceedings we can learn that there are several ways to select and
evaluate these features, but this remains an issue that deserves continuous research
attention.</p>
      <p>Acknowledgements. We wish to thank the reviewers who have provided valuable
comments on the submissions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>A foundation for the study of behavior change support systems</article-title>
          .
          <source>Personal and ubiquitous computing 17</source>
          <volume>(6)</volume>
          :
          <fpage>1223</fpage>
          -
          <lpage>1235</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </string-name>
          , Van
          <string-name>
            <surname>Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Werkman</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nijland</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seydel</surname>
            <given-names>ER</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Effectiveness of a Web-based intervention aimed at healthy dietary and physical activity behavior: a randomized controlled trial about users and usage</article-title>
          .
          <source>J Med Internet Res</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Reitberger</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spreicer</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fitzpatrick</surname>
            <given-names>G</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Situated and mobile displays for reflection on shopping and nutritional choices</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1721</fpage>
          -
          <lpage>1735</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014-0781-4
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bang</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torstensson</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katzeff</surname>
            <given-names>C</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>The powerhhouse: A persuasive computer game designed to raise awareness of domestic energy consumption</article-title>
          .
          <source>In: Persuasive Technology</source>
          . Springer, pp
          <fpage>123</fpage>
          -
          <lpage>132</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Wentzel</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Velsen</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Limburg</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Jong</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karreman</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hendrix</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Gemert</surname>
            <given-names>JEWC</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Participatory eHealth development to support nurses in antimicrobial stewardship. BMC medical informatics and decision making 14 (1</article-title>
          ):
          <fpage>45</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>De Jong</surname>
            <given-names>N</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eikelenboom-Boskamp</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voss</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Gemert-Pijnen L User-Centered</surname>
          </string-name>
          and
          <article-title>Persuasive Design of a Web-Based Registration and Monitoring System for HealthcareAssociated Infections in Nursing Homes</article-title>
          .
          <source>In: eTELEMED</source>
          <year>2014</year>
          , The Sixth International Conference on eHealth, Telemedicine, and Social Medicine,
          <year>2014</year>
          . pp
          <fpage>152</fpage>
          -
          <lpage>157</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harjumaa</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Persuasive Systems Design: Key Issues, Process Model, and System Features</article-title>
          .
          <source>Communications of the Association for Information Systems</source>
          <volume>24</volume>
          (
          <issue>1</issue>
          ):
          <fpage>28</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kok</surname>
            <given-names>RN</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ossebaard</surname>
            <given-names>HC</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van</surname>
            <given-names>Gemert-Pijnen JE</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Persuasive system design does matter: a systematic review of adherence to web-based interventions</article-title>
          .
          <source>J Med Internet Res</source>
          <volume>14</volume>
          (
          <issue>6</issue>
          ):e152. doi:
          <volume>10</volume>
          .2196/jmir.2104
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Langrial</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehto</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harjumaa</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karppinen P Native Mobile Applications For Personal Well-Being</surname>
          </string-name>
          :
          <article-title>A Persuasive Systems Design Evaluation</article-title>
          . In: PACIS,
          <year>2012</year>
          . p 93
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Noar</surname>
            <given-names>SM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Benac</surname>
            <given-names>CN</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harris</surname>
            <given-names>MS</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Does tailoring matter? Meta-analytic review of tailored print health Behavior change interventions</article-title>
          .
          <source>Psychol Bull</source>
          <volume>133</volume>
          (
          <issue>4</issue>
          ):
          <fpage>673</fpage>
          -
          <lpage>693</lpage>
          . doi:Doi 10.1037/
          <fpage>0033</fpage>
          -
          <lpage>2909</lpage>
          .
          <year>133</year>
          .4.
          <fpage>673</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Drozd</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehto</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Exploring perceived persuasiveness of a behavior change support system: a structural model</article-title>
          .
          <source>In: Persuasive Technology. Design for Health and Safety</source>
          . Springer, pp
          <fpage>157</fpage>
          -
          <lpage>168</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lehto</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drozd</surname>
            <given-names>F</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Factors affecting perceived persuasiveness of a behavior change support system</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fry</surname>
            <given-names>JP</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neff</surname>
            <given-names>RA</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Periodic prompts and reminders in health promotion and health behavior interventions: systematic review</article-title>
          .
          <source>J Med Internet Res</source>
          <volume>11</volume>
          (
          <issue>2</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Langrial</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>Less fizzy drinks: a multi-method study of persuasive reminders</article-title>
          .
          <source>In: Persuasive Technology. Design for Health and Safety</source>
          . Springer, pp
          <fpage>256</fpage>
          -
          <lpage>261</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zuckerman</surname>
            <given-names>O</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gal-Oz</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Deconstructing gamification: evaluating the effectiveness of continuous measurement, virtual rewards, and social comparison for promoting physical activity</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1705</fpage>
          -
          <lpage>1719</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014- 0783-2
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Chang</surname>
            <given-names>T-R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaasinen</surname>
            <given-names>E</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaipainen</surname>
            <given-names>K</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>Persuasive Design in Mobile Applications for Mental Well-Being: Multidisciplinary Expert Review</article-title>
          .
          <source>In: Wireless Mobile Communication and Healthcare</source>
          . Springer, pp
          <fpage>154</fpage>
          -
          <lpage>162</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lehto</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Persuasive Features in Web-Based Alcohol and Smoking Interventions: A Systematic Review of the Literature</article-title>
          .
          <source>J Med Internet Res</source>
          <volume>13</volume>
          (
          <issue>3</issue>
          ).
          <source>doi:ARTN e46 DOI 10</source>
          .2196/jmir.1559
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Oduor</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alahäivälä</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Persuasive software design patterns for social influence</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1689</fpage>
          -
          <lpage>1704</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014-0778-z
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Parker</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Reflection-through-performance: personal implications of documenting health behaviors for the collective</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1737</fpage>
          -
          <lpage>1752</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014-0780-5
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Ploderer</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reitberger</surname>
            <given-names>W</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van Gemert-Pijnen</surname>
            <given-names>J</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Social interaction and reflection for behaviour change</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1667</fpage>
          -
          <lpage>1676</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014-0779-y
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>Humanizing the web: change and social innovation</article-title>
          .
          <source>Palgrave Macmillan.</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Ludden</surname>
            <given-names>GDS</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Offringa</surname>
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Triggers in the environment; increasing the reach of Behavior Change Support Systems by connecting to the offline world</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Wiafe</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frempong</surname>
            <given-names>DA</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Enhancing persuasive features of Behavior Change Support Systems: the role of U-FADE</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Wiafe</surname>
            <given-names>I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakata</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulliver</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Categorizing users in behavior change support systems based on cognitive dissonance</article-title>
          .
          <source>Personal and ubiquitous computing 18</source>
          <volume>(7)</volume>
          :
          <fpage>1677</fpage>
          -
          <lpage>1687</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00779-014-0782-3
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Kulyk</surname>
            <given-names>O</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Den Haas</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>David S</surname>
          </string-name>
          ,
          <string-name>
            <surname>Van</surname>
            <given-names>Gemert-Pijnen L</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>How Persuasive are Serious Games, Social Media and mHealth Technologies for Vulnerable Young Adults? Design Factors for Health Behavior and Lifestyle Change Support: Sexual Health Case</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Halttu</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oduor</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tikka</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>About the persuasion context for BCSSs: analyzing the contextual factors</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Kegel</surname>
            <given-names>RHP</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wieringa</surname>
            <given-names>RJ</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Behavior Change Support Systems for Privacy and Security</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Busch</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patil</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Regal</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hochleitner</surname>
            <given-names>C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fröhlich</surname>
            <given-names>P</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tscheligi</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Persuasive information security: a Behavior Change Support System to help employ-ees protect organizational information security</article-title>
          .
          <source>Proceedings of the Third International Workshop on Behavior Change Support Systems (BCSS2015)</source>
          , Chicago, USA, June 3
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>