<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>About the Persuasion Context for BCSSs: Analyzing the Contextual Factors</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kirsi Halttu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Oduor</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Piiastiina Tikka</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Harri Oinas-Kukkonen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oulu, Department of Information Processing Science P.</institution>
          <addr-line>O Box 3000 FI-90014 Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>43</fpage>
      <lpage>50</lpage>
      <abstract>
        <p>Accumulation of contextual data offers new opportunities to improve the preventative health and wellbeing interventions. In this paper, we discuss the importance of understanding the context elements of Behavior Change Support Systems (BCSSs) and present an Event model illustrating the Use, User and Technology Context factors of the Persuasion Context. The model is a conceptual tool for identifying potential meaningful context factors and serves as basis for future research activities.</p>
      </abstract>
      <kwd-group>
        <kwd>behavior change support systems</kwd>
        <kwd>persuasive technology</kwd>
        <kwd>persuasive systems design</kwd>
        <kwd>context modeling</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Personalized technology interventions have been listed among the top research
questions related to big data in computer science and information systems [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. While
personalization possibilities give rise to numerous commercial applications, it is somewhat
unclear how actual personalization is implemented and which pieces of information are
actually useful. In addition, more emphasis should be given for creating value for
individual end-users, the ones actually creating the mass of information. A very potential
carrier for preventative health and wellbeing services is persuasive technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]: a
research field that studies how people are persuaded while interacting with computer
technology. While big data provides possibilities for both prediction and explanation,
persuasive systems will take that information into action.
      </p>
      <p>
        Operationalization of the information provided by big data depends on understanding
context and improving persuasive (or information) systems’ awareness and access to
contextual data – which, in turn, increases the richness of communication [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and can
be a predictor to overall adherence. In terms of persuasive systems, Oinas-Kukkonen
and Harjumaa’s [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] persuasive systems design (PSD) model, which is a framework for
developing and evaluating persuasive systems, states that the development process for
persuasive systems is multi-phased. The PSD model consists of: 1) seven underlying
postulates defining basic principles of successful persuasive systems, 2) the persuasion
context analysis which defines the desired behavior or attitude change type, studies the
persuasion event and the effectiveness of different strategies to achieve the desired
outcome, and 3) the actual design of systems qualities with four (primary, human-computer
dialogue, credibility, social) support categories to be designed, evaluated or
implemented at the feature level.
      </p>
      <p>In this paper, the persuasion context analysis of PSD model is deepened by studying
contextual factors of the persuasion Event. The following sections of the paper provide
a review of literature on contextual information, an outline of the Event context model
and discussion of the model and its implications.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <sec id="sec-2-1">
        <title>Persuasion context in PSD model</title>
        <p>
          In this section we focus on the second phase of the PSD model [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], the Persuasion
Context. The Persuasion Context phase is crucial for understanding the user, use case,
application domain and technological environment of the system. Context analysis
refers to the overall persuasion situation, and involves the study and identification of
contextually relevant elements in a user’s life situation in order to deliver successful
support systems for behavior change. It is divided into three categories, namely Use
Context, User Context and Technology Context [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. Use Context covers the factors that
arise from the problem domain i.e. the specific features of the application area in
question, and also factors of situational relevance. The User Context focuses on factors,
which create individual differences and may therefore influence the effectiveness of the
system. These include, for example, goals, interests, motivations, attitudes, and all
kinds of situational and personality elements. Technology Context refers to factors
which stem from the technological features of the system, such as selected platform
type, available devices and application software [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. All these elements have both their
strengths and weaknesses and in accordance with all other context factors they create
the overall persuasion context of the system.
        </p>
        <p>
          Regardless of its crucial nature, Persuasion Context is often not taken properly into
account in scientific literature describing persuasive designs [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], mainly because of
insufficient system descriptions. The PSD model has also been criticized for being too
general and not providing explicit guidance for practical design work [
          <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
          ]. One of the
previous works contributing to the Persuasion Context knowledge created a 3D model
for analyzing the system users’ relation to target change[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and later the same model
was applied to the analysis of Persuasion Context in the PSD model [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Another
Persuasion Context contribution comes from the field of Green IS [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], where behavior
change in organizational settings was studied. The results confirm that the selection of
design principles is dependent on the contextual factors of the organizations and the
application domain and urge that information systems should be studied in their actual
contexts. Additionally, one of the two core principles identified in the study, tailoring,
is inherently rooted to understanding of user groups [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
2.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Context modeling</title>
        <p>
          Context itself is such a multidimensional and wide concept that unambiguous
definitions are infeasible; instead of trying to grasp the whole entity, it is more practical to
find a proper viewpoint and construct the definitions accordingly. While the
significance of context has been identified also in information systems research, lately its role
in theorizing is also becoming more prominent [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]; most of the work in the field is
focused on organizational level and deal with business applications. Therefore the
present study draws from the multidisciplinary field of human-computer interaction (HCI)
and also from the engineering field of contextual computing. The most common
definition of context is by Dey [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] who stated:
“Context is any information that can be used to characterise the situation of
an entity. An entity is a person, place, or object that is considered relevant to
the interaction between a user and an application, including the user and
applications themselves.”
        </p>
        <p>
          The definition is operational by nature and aims to gather factors which help
designing context-aware applications. This definition was further extended in Zimmermann
et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] to include both formal (categories of context information) and operational
(the use of context) definitions. In the field on mobile HCI, Jumisko-Pyykkö and Vainio
[
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] presented a descriptive model for context of use. The model is based on a broad
literature review and contains five contextual components: physical, temporal, task,
social and technical-information components. Also some additional properties and level
of magnitude, dynamism, pattern and typical combinations are visible in the model.
Despite the dynamic nature of the model, the initial literature review of the study reports
that context of use is seen as being rather static. Yet mobile contexts are inherently
dynamic and heterogeneous and consist of transitions from one context to another [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
Thanks to recent development of sensor technologies, true contextual awareness is
becoming more sensible target for mobile applications.
        </p>
        <p>
          The challenge for this paper, however, is more practical: how to separate the
essential context factors from everything else that is present in our everyday life. This same
question was addressed in a longitudinal study of mobile internet [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The study
developed a conceptual framework for contextual elements which likely influence human
behavior when using the service. In addition to a very practice-oriented context model,
the study revealed that the services were actually used in a very limited set of contexts
despite the ubiquitous availability of the mobile internet. Some context factors also had
different effects on utilitarian vs. hedonic and active vs. passive services, giving clear
implications that identifying the key context factors for each service might be enough
for delivering specialized (tailored or personalized) services. Context also plays a
crucial role in the value customers perceive in services, especially in mobile services [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
The conditional value of the service is created, when contextual elements interacting
with the service user and the service enhance the service’s value in-use. The study found
four contextual elements (time, location, lack of alternatives, and uncertain conditions)
which act as filters for the service value offered by the service provider; depending on
the context, the user either perceives those values or not [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. While this study is from
the economics field, it highlights an important issue also for the BCSSs field: the system
needs to fit to the use and user context in order to deliver the intended service.
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Context in user experience</title>
        <p>In the field of user experience (UX), the role of context in constructing the subjective
experiences of the users is acknowledged. In their well-known definition of user
experience, Hassenzahl and Tractinsky [14, p.95] specify context as one of the three parts
of UX:
“UX is about technology that fulfils more than just instrumental needs in a
way that acknowledges its use as a subjective, situated, complex and dynamic
encounter. UX is a consequence of a user’s internal state (predispositions,
expectations, needs, motivation, mood, etc.), the characteristics of the designed
system (e.g. complexity, purpose, usability, functionality, etc.) and the context
(or the environment) within whicthhe interaction occurs (e.g.
organisational/social setting, meaningfulness ofthe activity, voluntariness of use,
etc.)”</p>
        <p>
          In the context of BCSSs the target is more than just good user experience, but also
to change behavior with support of the system. It is acknowledged that design is an
influential factor and even though there is increased knowledge on effective
mechanisms, this area lacks the detailed understanding of contextual factors. In fact, it is
argued that persuasive strategies are means which co uld be applied to basically any “end”,
referring to the application domains [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. Also design patterns contribute [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] to the
vision that persuasive strategies are not context-dependent and are therefore posing an
interesting challenge to context sensitive literature. Regarding user experience, BCSSs
have a very specific goal: the achievement of intended user experience by influencing
the users [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] and ensuring the experience is meaningful.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Modeling the Persuasion Event</title>
      <p>
        In this paper, the focus is on deepening the understanding of Persuasion Event of the
PSD model [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], namely the elements of Use Context, User Context and Technology
Context. In broad sense this means understanding the user of the system, both
situational factors and more enduring issues of their life situation as well as the technology
platform supporting the system. The PSD model itself is generic and applicable to both
evaluation and design of the BCSSs, and likewise the proposed Event model aims at
both evaluating and studying the existing system and guiding the design of future
systems. In the long run, understanding the users in their real Use Contexts will aid the
designing of new systems. For now, it is constructed for identifying meaningful
contextual factors. It is a conceptual tool that helps identify potential concrete elements in
the everyday lives of end-users and should not be considered as a new context
modelling theory.
      </p>
      <p>Regardless of the viewpoint, most of the contextual factors have both situational and
more enduring effects. While both types of factors are important and necessary for
adaptive and well-tailored systems, it is relatively difficult to determine which type
would dominate in any given persuasion situation. Therefore the original categories of
the Event are divided into situational and more long-lasting factors: Use Context refers
to situational factors and User Context to elements, which relate to individual
differences of the user. Technology Context is kept as separate category but it mainly assess
sustainable elements of selected technology (Figure 1).</p>
      <p>
        In addition to the PSD model, the Event model is strongly influenced by Lee et al.
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], who studied the use of mobile services in a longitudinal research setting. The study
focuses on real-life situations and identifies ten sources of situational variation in the
use contexts. They suggest two main categories: personal and environmental.
Environmental factors are further divided into physical and social factors. Personal and physical
factors are integrated also into the Event model. Examples of personal factors include
emotions evoked in the use situations and subjective nature of time; physical factors
refer to, for example, a location element. Social context of Lee et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is re-defined
as privacy factors, concerning the private or public nature of use situations and the level
of interaction with other people around. Additionally, the situational Use Context has
the task-related factors category, which refers to characteristics of user tasks. Overall,
the situational factors are selected based on their measurability in end-user surveys:
some additional factors could be introduced to the model should automatic sensing
parameters be accessible (for example in a field study where tracking with sensors is
utilized).
      </p>
      <p>The User Context in the PSD model focuses on user-dependent issues, such as needs,
goals, motivation, abilities, and attitudes, taking a more holistic approach to the life
situation of the user. The same applies to Event model, but the nature of factors is
longlasting, e.g. mood is not part of User Context, but it is grouped as situational factors
and is therefore part of Use Context. The main difference between the Use and User
Contexts is therefore how time-sensitive the factors are. The User Context is divided
into personality and social factors, which aim to group this challenging mix of features
into smaller entities. Social factors are predominantly social elements such as social
influence and subjective norm and personality covers factors like attitude,
persuadability, goal-directedness and habits.</p>
      <p>
        The significance of User Context is observable in the interplay between the other
Event contexts: the User Context is in a key position when considering tailoring a
persuasive system so that it can best serve each individual user. Tailoring, in turn, is a way
of leveling Use Context and Technology Context so that these remain more predictable
at least to some degree. Various psychological processes are included in the processing
of persuasive messages, and tailoring the persuasive messages to an individual user
increases the opportunity of gaining a positive outcome [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>The Technology Context deals with the features of the selected technology and
technological aspects of the service. All levels of inquiry are encouraged, such as the
platform of choice, the application features, and the specific implementation details, in
order to assess both the strengths and weaknesses of the Technology Context. This group
aims to cover elements, which have enduring, general level impact on the service, while
situational elements are handled in Use Context, in the task-related factors section.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and discussion</title>
      <p>The presented Event model is built on the PSD model and has the intention of serving
as an evaluation and design tool. The ultimate goal of the model might be that some
links from context factors to end-user groups, application domains or some other factors
could be identified and those could be used as design guidelines for future systems.
This would further contribute to our understanding of persuasive mechanisms. In the
meantime, the model is first validated with empirical methods, to verify the factors and
basic items for each factor and later used as research model for analyzing the relevance
of different BCSS features.</p>
      <p>
        Compared to conceptual model of Lee et al., [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], this model has both situational
and more enduring aspects of the context. Behavior change process takes time so it will
not be feasible to focus only on situational factors. On the other hand, situational factors
contribute to the overall user experience of the service or application and therefore
cannot be overlooked either. As the model is primarily developed for health BCSSs, this
might limit its application and is therefore a limitation of our study. Also the practical
nature of the model might decrease its applicability.
      </p>
      <p>
        When studying these different types of contextual elements, one should keep in mind
that there might be elements that override all other elements in some or most situations.
This dominant or recessive nature of context elements might be the key for identifying,
if not the most opportune moments for persuasion, at least avoiding some of the worst
ones. The interplay between “situational and dispositional variables” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and effect of
situational factors on goal prioritization [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] also pose interesting viewpoints for
evaluating and developing new BCSSs. Goal-setting considerations are another interesting
aspect for context modelling: behavior change applications typically have both short
and long-term goals and both should be supported by the design. If the service fails to
support the user in difficult moments which require situationally sensitive functions,
the overall long-term goal support might soon become useless.
      </p>
      <p>
        The context also plays a crucial role in habit formation. Stable context functions as
trigger to habitual actions and according to some studies [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], strong habits can also
outweigh goals. Understanding the contextual elements triggering the habit might
enable us to find tailored or even personalized solutions which attack the key habit trigger
by creating new context cues to suppress it.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dhar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>Editorial-Big Data, Data Science, and Analytics: The Opportunity and Challenge for IS Research</article-title>
          .
          <source>Information Systems Research</source>
          <volume>25</volume>
          (
          <issue>3</issue>
          ):
          <fpage>443</fpage>
          -
          <lpage>448</lpage>
          . http://dx.doi.org/10.1287/isre.
          <year>2014</year>
          .0546
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>A foundation for the study of behavior change support systems</article-title>
          .
          <source>Personal and ubiquitous computing</source>
          , Vol.
          <volume>17</volume>
          , No. 6,
          <year>August 2013</year>
          , pp.
          <fpage>1223</fpage>
          -
          <lpage>1235</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Understanding and using context</article-title>
          .
          <source>Personal and ubiquitous computing</source>
          ,
          <volume>5</volume>
          (
          <issue>1</issue>
          ),
          <fpage>4</fpage>
          -
          <lpage>7</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harjumaa</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Persuasive systems design: Key issues, process model, and system features</article-title>
          .
          <source>In: Communications of the Association for Information Systems</source>
          ,
          <volume>1</volume>
          , vol.
          <volume>24</volume>
          , pp.
          <fpage>485</fpage>
          -
          <lpage>500</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Torning</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2009</year>
          , April).
          <article-title>Persuasive system design: state of the art and future directions</article-title>
          .
          <source>In Proceedings of the 4th international conference on persuasive technology</source>
          (p.
          <fpage>30</fpage>
          ). ACM.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Wiafe</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alhammad</surname>
            ,
            <given-names>M. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakata</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulliver</surname>
            ,
            <given-names>S. R.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Analyzing the persuasion context of the persuasive systems design model with the 3D-RAB model</article-title>
          .
          <source>In Persuasive Technology. Design for Health and Safety</source>
          (pp.
          <fpage>193</fpage>
          -
          <lpage>202</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Corbett</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Designing and Using Carbon Management Systems to Promote Ecologically Responsible Behaviors</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          ,
          <volume>14</volume>
          (
          <issue>7</issue>
          ),
          <fpage>339</fpage>
          -
          <lpage>378</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Wiafe</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakata</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moran</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulliver</surname>
            ,
            <given-names>S. R.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Considering user attitude and behavior in persuasive systems design: the 3d-rab model</article-title>
          .
          <source>In ECIS.</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chan</surname>
            ,
            <given-names>F. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thong</surname>
            ,
            <given-names>J. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chasalow</surname>
            ,
            <given-names>L. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dhillon</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>A framework and guidelines for context-specific theorizing in information systems research</article-title>
          .
          <source>Information Systems Research</source>
          ,
          <volume>25</volume>
          (
          <issue>1</issue>
          ),
          <fpage>111</fpage>
          -
          <lpage>136</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Zimmermann</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lorenz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oppermann</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>An operational definition of context</article-title>
          .
          <source>In Modeling and using context</source>
          (pp.
          <fpage>558</fpage>
          -
          <lpage>571</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Jumisko-Pyykkö</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vainio</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Framing the Context of Use for Mobile HCI</article-title>
          .
          <source>International Journal of Mobile Human Computer Interaction</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Use contexts for the mobile internet: a longitudinal study monitoring actual use of mobile internet services</article-title>
          .
          <source>International Journal of Human-Computer Interaction</source>
          ,
          <volume>18</volume>
          (
          <issue>3</issue>
          ),
          <fpage>269</fpage>
          -
          <lpage>292</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Gummerus</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pihlström</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Context and mobile services' value-in-use</article-title>
          .
          <source>Journal of Retailing and Consumer Services</source>
          ,
          <volume>18</volume>
          (
          <issue>6</issue>
          ),
          <fpage>521</fpage>
          -
          <lpage>533</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jretconser.
          <year>2011</year>
          .
          <volume>07</volume>
          .002
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Hassenzahl</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tractinsky</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>User experience-a research agenda</article-title>
          .
          <source>Behaviour &amp; information technology</source>
          ,
          <volume>25</volume>
          (
          <issue>2</issue>
          ),
          <fpage>91</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kaptein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eckles</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Selecting effective means to any end: Futures and ethics of persuasion profiling</article-title>
          . In Persuasive technology (pp.
          <fpage>82</fpage>
          -
          <lpage>93</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Lockton</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harrison</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stanton</surname>
            ,
            <given-names>N. A.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>The Design with Intent Method: A design tool for influencing user behavior</article-title>
          .
          <source>Applied Ergonomics</source>
          ,
          <volume>41</volume>
          (
          <issue>3</issue>
          ),
          <fpage>382</fpage>
          -
          <lpage>392</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.apergo.
          <year>2009</year>
          .
          <volume>09</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Tromp</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hekkert</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verbeek</surname>
            ,
            <given-names>P. P.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Design for socially responsible behavior: a classification of influence based on intended user experience</article-title>
          .
          <source>Design Issues</source>
          ,
          <volume>27</volume>
          (
          <issue>3</issue>
          ),
          <fpage>3</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Dijkstra</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>The Psychology of Tailoring-Ingredients in Computer-Tailored Persuasion</article-title>
          .
          <source>Social and Personality Psychology Compass</source>
          <volume>2</volume>
          /2:
          <fpage>765</fpage>
          -
          <lpage>5</lpage>
          748.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Darley</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Batson</surname>
            ,
            <given-names>C. D.</given-names>
          </string-name>
          (
          <year>1973</year>
          ).
          <article-title>“From Jerusalem to Jericho": A study of situational and dispositional variables in helping behavior</article-title>
          .
          <source>Journal of Personality and Social Psychology</source>
          ,
          <volume>27</volume>
          (
          <issue>1</issue>
          ),
          <fpage>100</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Steg</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bolderdijk</surname>
            ,
            <given-names>J. W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Keizer</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perlaviciute</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>An Integrated framework for encouraging pro-environmental behavior: The role of values, situational factors and goals</article-title>
          .
          <source>Journal of Environmental Psychology</source>
          ,
          <volume>38</volume>
          ,
          <fpage>104</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Neal</surname>
            ,
            <given-names>D. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wood</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Labrecque</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lally</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>How do habits guide behavior? Perceived and actual triggers of habits in daily life</article-title>
          .
          <source>Journal of Experimental Social Psychology</source>
          ,
          <volume>48</volume>
          (
          <issue>2</issue>
          ),
          <fpage>492</fpage>
          -
          <lpage>498</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jesp.
          <year>2011</year>
          .
          <volume>10</volume>
          .011
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>