<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Conceptualizing Blockchain Utilization in Persuasive Systems Design</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Iikka Paajala</string-name>
          <email>iikka.paajala@oulu.fi</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eunice Eno Yaa Frimponmaa Agyei</string-name>
          <email>Eunice.agyei@oulu.fi</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pasi Karppinen</string-name>
          <email>pasi.karppinen@oulu.fi</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oulu</institution>
          ,
          <addr-line>Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Blockchain technology has recently spread widely among different business and research domains, it has not yet been fully explored in the field of persuasive technologies. This paper attempts to define how blockchain technologies can be utilized when developing persuasive technologies and to position blockchain research topics in the persuasive technology domain. Data in persuasive systems are often sensitive and can benefit from the security feature blockchain has to offer. However, the immutability of data raises notable issues that impact compliance with General Data Protection Regulation (GDPR). In this paper, we discuss other benefits and challenges that may be of interest to designers, developers, and researchers who are keen on using blockchain to design the persuasive technologies they design.</p>
      </abstract>
      <kwd-group>
        <kwd>Blockchain</kwd>
        <kwd>Conceptual Research</kwd>
        <kwd>Persuasive Technology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Trust has been an issue of information systems. This problem gets even more complex
when sensitive data (e.g., health, financial data) is stored and used [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In his whitepaper
Nakamoto [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] presented the bitcoin blockchain to solve this issue. In the Bitcoin
blockchain, the coins are secured by users of decentralized, verifiable, and auditable
peer-topeer (P2P) networks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>In this research, we aim to find out if utilizing blockchain in persuasive systems
design solves some privacy concerns (e.g., transparency and trust) of users of Behaviour
Change Support Systems (BCSS) as well as how well blockchain can be used with a
large amount of IoT (Internet of Things) data (from e.g., wearables). Also, we present
the possibility of blockchain tokens to be used in persuasive technologies.</p>
      <p>
        Similarly, to other information systems, BCSS and persuasive technologies often
collect large quantities of sensitive data from their use as part of the behavior change
process [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Collecting data happen via wearable devices and apps, and data may
provide more personalized services [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. These technologies collect more data than
needed for the application to work, which can risk the privacy of the user [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. According
to Oinas-Kukkonen &amp; Oinas-Kukkonen [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] there are concerns that the data can be sold
to third parties for profit, which raises moral and ethical concerns. This can lead
to user profiling and discrimination using their data [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. On many occasions,
persuasive systems have been developed for health and wellbeing [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Sensitive data in
general, ought not to be trusted in the hands of third parties, where they are at mercy of
attacks and misuse. Users should own and control their data without compromising
security [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>The remainder of this paper is organized as follows. Section two describes the
Persuasive Systems Design model. The third section is about the characteristics of
blockchain technology. In section four, we explore how blockchain can be utilized in
persuasive systems and conclude in section five.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Persuasive Systems Design (PSD)</title>
      <p>
        The PSD model developed by Oinas-Kukkonen and Harjumaa [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] conceptualizes the
development of a persuasive system in three steps. Before implementing the system,
one should understand the fundamental issues behind persuasive systems. After that,
the system can be analyzed and designed. The second phase consists of analyzing the
context for persuasive systems, where the intent (intention of the persuader), event
(user, use, and technology context), and strategies (route of information to the user) for
the use of a persuasive system are recognized.
      </p>
      <p>
        The PSD model includes seven postulates [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The first four postulates concern
persuasion techniques and they are (1) IT (Information Technology) is always on, (2)
commitment and consistency needed, (3) direct and indirect routes, and (4) incrementality.
These are not directly about system design issues. Postulates 5, 6, and 7 resonate with
the blockchain context best as they relate more to the system development issues. The
fifth postulate is that the system should be open. If the designer bias remains unclear
for the users, the system may either lose some of the persuasive power or it may even
end up misleading the users. A system based on untruthful or false information does
not fit with the overall goal of users’ voluntarily changing attitudes or behaviors [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
The sixth postulate is unobtrusiveness. This means that the systems should avoid
disturbing users performing their primary tasks [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The seventh and last postulate is easy
to use and useful. This includes e.g., responsiveness, ease of access, lack of errors,
convenience, and high information quality. If users find the system useless or difficult to
use, it is not going to have a favorable effect [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Blockchain</title>
      <p>
        Blockchain is a distributed ledger that can be used to record transactions between two
parties [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Blocks of information are connected cryptographically and timestamped
and hence trustworthy and useful for certain types of transactions [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The distributed
database that underly blockchain enables access to the entire history of records held of
transactions, immutability of recorded information, the transmission of information
among peers in the network, transparency with the possibility to remain anonymous
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Blockchain works when a node records new data is broadcasted to all the nodes
in the network. Each of these nodes upon receiving the new data verifies its validity
and confirms the validity of the new data, then all the nodes will have to come to an
agreement and conclude that the new piece of data is valid [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Only then will this new
data be added to the block ensuring auditability. Blockchain is changing the lifestyle of
people due to the influence it is garnering in businesses and industries [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and there
are several use cases to demonstrate its potential for recording and storing information
and transactions. Applications of blockchain include digital currency, identity
management, and record-keeping (e.g., health records, contracts) asset management, and shows
promise to deal with the security challenges in IoT [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>Blockchain Characteristics. When incorporating blockchain technologies into
persuasive systems, the developer should pay attention to the common blockchain
characteristics. The following blockchain characteristics relate to persuasive technologies.</p>
      <p>
        Decentralization: The blockchain network is P2P. Any two peers can conduct
transactions in the blockchain network without authentication by the central agency.
Therefore, blockchain can significantly reduce operational costs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Persistency: Transactions are confirmed and recorded in blocks distributed in the
whole network, making them nearly impossible to tamper [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Also, each block is
validated by other nodes therefore all the transactions would be checked [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
Falsifications are detected easily, as each user holds their copy of the blockchain [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
The consensus algorithm makes changing the records difficult [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Anonymity: Users may interact with the blockchain network with a generated
address (or even several). There is no central agency to keep records of users’ confidential
information. However, blockchain cannot guarantee perfect privacy [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        Auditability: The transactions on the blockchain are validated and recorded with a
timestamp, users can easily verify and trace the previous transactions by accessing any
node in the distributed network. The store data in the blockchain is traceable and
transparent [
        <xref ref-type="bibr" rid="ref1 ref14">14, 1</xref>
        ].
      </p>
      <p>
        Blockchain Taxonomy. Blockchain systems usually are categorized into three types:
private, public, and consortium [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Zheng et al [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], Namasudra [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and
Casino et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] made some classifications and comparisons of these three. The selected
comparison is seen in table 1.
      </p>
      <p>
        In a public blockchain, no one is in charge or control of public blockchains, and
everyone can join in the writing, reading, and validating of the network [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Public
blockchains are open and transparent to the public. Decisions are made by decentralized
consensus algorithms which tend to consume more energy than other types [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ],
e.g., Proof of Work (PoW) and Proof of Stake (PoS) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In general, public blockchain
is the slowest type of these three [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        A private blockchain is owned by organizations or individuals, which oversee the
closed network [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. A private blockchain is a cryptographically secure and
cost-effective type of blockchain. Private blockchains are used internally by organizations which
also grant the mining rights [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        A consortium blockchain is a combination of public and private blockchains [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The
goal of this type is use is to mitigate the disadvantages of the private blockchain [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], as
this offers scalability and security [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. According to Sharma [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] this is best suited for
organizations needing both (private and public) blockchain. In consortium blockchain,
there are more entities in charge of the blockchain network, than in the private
blockchain. It consists of a group of individuals or organizations co-operating in
decisionmaking [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Due to the sensitive data, and the number of users, some semiprivate consortium
blockchain could be used. There write and read rights could be given freer as in purely
private blockchain, and tracking sensitive information is harder as in public blockchain
such as Bitcoin, where every transaction could scrutinize and linked to a username,
although pseudonym. The type of consensus algorithm should be considered as well.
PoW is the first consensus algorithm used in blockchain, i.e., in Bitcoin, and now it is
notorious in energy consumption [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, new algorithms are developed which
are seen as greener options [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Blockchain security and PSD postulates. Implementing blockchain for persuasive
systems could be useful. Blockchain increases trust. This means that even users who do
not trust each other may use blockchain [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. If multiple users are participating in
creating the database, uniform rules need to be governed; this can happen by the smart
contracts in the system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Blockchain has been tried and found useful in e-health systems,
Big Data, and IoT [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], 18]. E-health collects sensitive data, and it is one of the
most central domains of persuasive technology. Also, persuasive technologies in many
cases utilize IoT and IoT-based data already [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        There are some advantages of blockchain implementation on persuasive systems.
All the validated transactions are permanently saved into the blockchain that cannot be
altered or deleted. This is because a Blockchain network can consist of several
computers (nodes) around the world [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The data in a blockchain is hard to tamper or forge
[
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Blockchain can enhance the security for user authentication, recording data
access histories [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Blockchain can be used to store important and sensitive data (such
as health information) and to maintain the originality of data [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Also, the auditability
characteristic of blockchain addresses the openness postulate of the PSD model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ],
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. So far, most APIs provided by cryptocurrencies cannot be considered easy to use
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. As ease of use is the seventh postulate of PSD [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], the developers should pay
attention to this.
      </p>
      <p>
        Tokens as a medium for implementing persuasive principles. Blockchain
technology has the potential to bring new levels of scale by designing tokens and standardizing
tokens to shape behaviors [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. A token economy is a means to shape a desirable
behavior [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Tokens are neutral stimuli in the form of abstract items (e.g., points) e
offered to users for achieving the target behavior [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. Digital tokens can be used as a
behavior change tool to achieve targeted behavior and avoid undesired behaviors to
reward users when they achieve some outcomes [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Tokens may be used to reinforce
the desired behavior such it makes the person whose behavior is been shaped progress
closer and closer to the desired behavior in a similar fashion as B.F. Skinner’s operant
conditioning technique [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Tokens in behavior change reinforce positive beliefs,
shape habits, and sustain newly adopted behaviors [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        Blockchain can be used to increase the adoption of sustainable transport (e.g.,
cycling and walking) by people [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. To influence user travel behavior, a smartphone
sensor can be used to collect data about a user’s location, speed, acceleration, travel
distance among other parameters to be able to determine via artificial intelligence the
mode of travel a person has used [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. These pieces of data can be converted into
tokens that represent the person’s estimated carbon saving, and the tokens can
accumulate as rewards [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In another research, tokens generated represented cycling journeys
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] which is a means to track the user’s cycling behavior.
      </p>
      <p>
        Blockchain may be used to record earned tokens, maintain token balances, and
facilitate the exchange of token rewards [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Blockchain smart contracts can encode
commitments to engage in the desired behavior and issue tokens. Smart contracts can
be signed between people with a shared behavior goal (e.g., walking), non-human
entities such as pets, and the environment [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ],[
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. Research by [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] enabled users to
monetize geospatial and environmental data (e.g., air quality) and traffic congestion
levels while cycling.
      </p>
      <p>
        Other applications of blockchain. Blockchain can be used to track, measure, and
reward environmentally sustainable behavior. RecycleToCoin is a mobile app built on
blockchain technology to shape recycling behavior by rewarding users when waste is
recycled [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Also, a blockchain ledger can be created when the different BCSS apps
used by a person can be linked [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Smart contracts can be used to link these apps via
an application programming interface to create a complete record of a person’s behavior
and activities [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], This information can be shared by the user, and it is particularly
useful when the user wants to be anonymous. Such a blockchain ledger can be viewed as
a persuasion profile that contains fine-grained information about the user which can be
used to enhance behavior change experiences.
      </p>
      <p>
        Limitations of blockchain. Blockchain implementation on persuasive systems may
have also disadvantages. The consensus algorithms can consume vast amounts of
energy [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Each node must run the algorithm granting fault tolerance ability [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
Fortunately, new efficient consensus mechanisms and procedures could be adapted to
help with the energy waste issue [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Furthermore, when the persuasive system collects massive quantities of data, the
database size is increased, as each new transaction is added to the blockchain [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This
can bring out scalability issues [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Also, a blockchain network is slower than a
centralized database, as the blockchain executes several extra processes, such as hashing,
validation, and consensus algorithm [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Using blockchain in persuasive technology has challenges with GDPR. To ensure
compliance with GDPR, a data controller (i.e., a person who is responsible and
accountable for data collection and processing activities) must be appointed. Decentralization
of decisions made on data and data processing in blockchain challenges the obligations
of data controllers in the GDPR. Again, the data recorded on the blockchain ledger is
permanent and tamper-proof making it impossible to delete data without breaking the
basic principle of irreversibility or immutability which underpins the blockchain
technology. This also affects the trustworthiness and transparency of blockchain
transactions and can affect the compliance to the right to be forgotten GDPR [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. Finally,
there may be challenges to meet the requirements of data minimization of GDPR in
blockchain applications due to replicated nature of distributed databases and the need
to store data continuously [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>This paper presents an investigation into issues surrounding blockchain and its
application areas within the context of persuasive systems design.</p>
      <p>We discussed how blockchain characteristics such as privacy, trust, transparency can
be useful for designing persuasive systems. User data in BCSS is sensitive and should
be protected as they are susceptible to attacks and misuse. These issues can be tackled
using blockchain. In addition, users should own and control their data. For example, by
combining blockchain and BCSS such as wearables, users will become aware of how
data is being collected about them and how it is used as well as give them the possibility
to own their data. Blockchain user data can be collected without privacy issues. The
way user data is collected and processed is transparent with blockchain. This can
increase trust among the stakeholders.</p>
      <p>
        We also explored the use of Blockchain-based token economies to shape and support
behavior change. Tokens in behavior change reinforce positive beliefs, shape habits,
and sustain newly adopted behaviors [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] via mechanisms such as rewards.
      </p>
      <p>It is worth mentioning that utilizing a blockchain has its challenges including energy
used to conduct blockchain transactions, scalability, and other challenges that concern
GDPR compliance. These issues must be addressed in the design of Blockchain-based
persuasive technology.</p>
      <p>Despite the novelty of blockchain technology, several business domains have
already found it useful. We will continue to see more useful applications of blockchain
considering the investment and effort to improve on the technology. We recommend
further research into this topic using several research methods such as design science.
Developers of persuasive technology that utilizes blockchain should consider issues
such as blockchain type, consensus algorithm, the data stored, and GDPR related issues.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Namasudra</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Deka</surname>
            ,
            <given-names>G. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johri</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hosseinpour</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gandomi</surname>
            ,
            <given-names>A. H.</given-names>
          </string-name>
          :
          <article-title>The revolution of blockchain: State-of-the-art and research challenges</article-title>
          .
          <source>Archives of Computational Methods in Engineering</source>
          ,
          <volume>28</volume>
          (
          <issue>3</issue>
          ),
          <fpage>1497</fpage>
          -
          <lpage>1515</lpage>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Bitcoin: A peer-to-peer electronic cash system</article-title>
          .
          <source>Decentralized Business Review</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Zyskind</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nathan</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pentland</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Decentralizing Privacy: Using Blockchain to Protect Personal Data</article-title>
          . (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Casino</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dasaklis</surname>
            ,
            <given-names>T. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patsakis</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A systematic literature review of blockchainbased applications: Current status, classification and open issues</article-title>
          .
          <source>Telematics and informatics</source>
          ,
          <volume>36</volume>
          ,
          <fpage>55</fpage>
          -
          <lpage>81</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oinas-Kukkonen</surname>
          </string-name>
          , H.:
          <article-title>Humanizing the web : change and social innovation</article-title>
          .
          <source>Palgrave Macmillan</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Oinas-Kukkonen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Harjumaa.,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Persuasive systems design: Key issues, process model, and system features</article-title>
          .
          <source>Communications of the Association for Information Systems 24.1</source>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Karafiloski</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mishev</surname>
            ,
            <given-names>A..:</given-names>
          </string-name>
          <article-title>Blockchain solutions for big data challenges: A literature review</article-title>
          .
          <source>IEEE EUROCON 2017-17th International Conference on Smart Technologies. IEEE</source>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Leeming</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cunningham</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ainsworth</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A Ledger of Me: Personalizing Healthcare Using Blockchain Technology</article-title>
          .
          <source>Front. Med</source>
          ., vol.
          <volume>6</volume>
          , p.
          <fpage>171</fpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Albanese</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>D'Acierno</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moscato</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Persia</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Picariello</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A multimedia recommender system</article-title>
          .
          <source>ACM Trans. Internet Technol.</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>1</issue>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tapscott</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tapscott</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          : How Blockchain Is Changing Finance. (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>DI</given-names>
            <surname>Pierro</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <source>What Is the Blockchain? Comput. Sci. Eng</source>
          ., vol.
          <volume>19</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>95</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>I.-C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liao</surname>
          </string-name>
          , T.-C.
          <article-title>: A Survey of Blockchain Security Issues and</article-title>
          <string-name>
            <surname>Challenges. Int. J. Netw. Secur.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Alketbi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nasir</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Talib</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>Blockchain for government services-Use cases, security benefits and challenges, 15th Learning</article-title>
          and Technology Conference, L and T
          <year>2018</year>
          , pp.
          <fpage>112</fpage>
          -
          <lpage>119</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xie</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dai</surname>
            ,
            <given-names>H. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Blockchain challenges and opportunities: A survey</article-title>
          .
          <source>International Journal of Web and Grid Services</source>
          ,
          <volume>14</volume>
          (
          <issue>4</issue>
          ),
          <fpage>352</fpage>
          -
          <lpage>375</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>T. K.</given-names>
          </string-name>
          ,
          <article-title>Types of blockchains explained - public vs</article-title>
          .
          <source>private vs. consortium. Blockchain Council</source>
          . Available at: https://www.blockchain
          <article-title>-council.org/blockchain/types-of-blockchains-explained-public-vs-private-vs-consortium</article-title>
          ,
          <source>last accessed</source>
          <year>2021</year>
          /11/29.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Fedak</surname>
          </string-name>
          , V.:
          <article-title>Blockchain and Big Data: the match made in heavens (</article-title>
          <year>2018</year>
          ) - Available at: https://towardsdatascience.com/blockchain-and
          <article-title>-big-data-the-match-made-in-heavens-337887a0ce73, last accessed</article-title>
          <year>2021</year>
          /11/29.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Azaria</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ekblaw</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vieira</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lippman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Medrec: Using blockchain for medical data access and permission management. 2nd international conference on open and big data (OBD) (pp</article-title>
          .
          <fpage>25</fpage>
          -
          <lpage>30</lpage>
          ). IEEE. (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zheng</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>A blockchain-based trading system for big data</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>191</volume>
          ,
          <fpage>107994</fpage>
          . (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Nakamura</surname>
          </string-name>
          , Y.:
          <article-title>IoT Nudge: IoT Data-driven Nudging for Health Behavior Change</article-title>
          .
          <source>Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers</source>
          . (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Jalowski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Revolutionizing Workshops:
          <article-title>Supporting Participants' Creativity with Persuasive Technology</article-title>
          . Springer Nature. (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Barclay</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Preece</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rana</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          , I.:
          <article-title>Tokenising behaviour change: optimising blockchain technology for sustainable transport interventions</article-title>
          . (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Shakespeare</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peterkin</surname>
            ,
            <given-names>V.M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bourne</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          :
          <article-title>A token economy: an approach used for behavior modifications among disruptive primary school children</article-title>
          .
          <source>MOJ Public Heal.</source>
          , vol. Volume
          <volume>7</volume>
          , no.
          <source>Issue</source>
          <volume>3</volume>
          , (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Doll</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mclaughlin</surname>
            ,
            <given-names>T.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barretto</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The Token Economy: A Recent Review</article-title>
          and Evaluation. (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Social Token Economy - B.F. Skinner</surname>
          </string-name>
          . https://bfskinner2.weebly.com/social-tokeneconomy.html. Last accessed:
          <year>2021</year>
          /11/29.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Jaffer</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          , John,
          <string-name>
            <given-names>N.W.</given-names>
            ,
            <surname>Standfield</surname>
          </string-name>
          , N.:
          <article-title>Surgical trainee opinions in the United Kingdom regarding a three-dimensional virtual mentoring environment (mentorSL) in second life: Pilot study</article-title>
          .
          <source>J. Med. Internet Res.</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>9</issue>
          . (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26. Cycle4Value. https://www.cycle4value.at/en/. Last accessed:
          <year>2021</year>
          /11/29.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giaccardi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Albayrak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Walkers' union: Designing new urban walking rituals with blockchain</article-title>
          ,
          <source>” DIS 2018 - Companion Publ. 2018 Des. Interact. Syst. Conf.</source>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>62</lpage>
          , (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Jaffe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mata</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamvar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Motivating Urban Cycling Through a BlockchainBased Financial Incentives System CCS Concepts</article-title>
          .
          <source>Proc. 2017 ACM Int. Jt. Conf. Pervasive Ubiquitous Computing. Proc. 2017 ACM Int. Symp. Wearable Computers</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29. “
          <source>SCIENCE DIVISION Blockchain Technology and Environmental Sustainability</source>
          ,” (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Tatar</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gokce</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Nussbaum</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Law versus technology: Blockchain, GDPR, and tough tradeoffs</article-title>
          .
          <source>Computer Law &amp; Security Review</source>
          ,
          <volume>38</volume>
          ,
          <fpage>105454</fpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31. “
          <article-title>Blockchain and the General Data Protection Regulation Can distributed ledgers be squared with European data protection law? STUDY Panel for the Future of Science</article-title>
          and Technology,
          <source>” EPRS | European Parliamentary Research Service Scientific Foresight Unit (STOA) PE 634.445</source>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>