<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>N. Albers);</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Workshop on Algorithmic Behavior Change Support</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nele Albers</string-name>
          <email>N.Albers@tudelft.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amal Abdulrahman</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Deborah Richards</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Caroline Figueroa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bibhas Chakraborty</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ananya Bhattacharjee</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff10">10</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Linwei He</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff8">8</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mark A. Neerincx</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joseph Jay Williams</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff10">10</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nezih Younsi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff7">7</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tibor Bosse</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff6">6</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Annemiek Linn</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff9">9</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Crystal Smit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Willem-Paul Brinkman</string-name>
          <email>W.P.Brinkman@tudelft.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Conference on Persuasive Technology</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Delft University of Technology</institution>
          ,
          <addr-line>Delft</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Duke University</institution>
          ,
          <addr-line>Durham, NC</addr-line>
          ,
          <country country="US">United States</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Erasmus University Rotterdam</institution>
          ,
          <addr-line>Rotterdam</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Macquarie University</institution>
          ,
          <addr-line>Sydney</addr-line>
          ,
          <country country="AU">Australia</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>National University of Singapore</institution>
          ,
          <country>Singapore, Singapore</country>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>Radboud University</institution>
          ,
          <addr-line>Nijmegen</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
        <aff id="aff7">
          <label>7</label>
          <institution>Sorbonne University</institution>
          ,
          <addr-line>Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff8">
          <label>8</label>
          <institution>Tilburg University</institution>
          ,
          <addr-line>Tilburg</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
        <aff id="aff9">
          <label>9</label>
          <institution>University of Amsterdam</institution>
          ,
          <addr-line>Amsterdam</addr-line>
          ,
          <country country="NL">Netherlands</country>
        </aff>
        <aff id="aff10">
          <label>10</label>
          <institution>University of Toronto</institution>
          ,
          <addr-line>Toronto, ON</addr-line>
          ,
          <country country="CA">Canada</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>To increase the efectiveness of behavior change applications, a large variety of algorithms has been developed to adapt what the applications ofer, challenges related to the concept of algorithmic behavior change support, its development, evaluation, and impact on behavior change, this workshop aims to strengthen the community of people with diverse backgrounds (e.g., computer science, psychology, human-computer interaction) and roles in behavior change support (e.g., researcher, designer, practitioner). Combining keynotes of leading researchers with sessions in which individual workshop participants present their work and discuss problems with the audience, the workshop encouraged a lively exchange of ideas that benefits current and future research on algorithmic behavior change support.</p>
      </abstract>
      <kwd-group>
        <kwd>Behavior change support systems</kwd>
        <kwd>Persuasion</kwd>
        <kwd>Persuasive technology</kwd>
        <kwd>Algorithmic acceptance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Health, sustainability, education - being potentially easy to use, available at all times, scalable,
and cost-efective, behavior change applications have a large potential and have thus been
developed for diverse domains (e.g., [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1, 2, 3</xref>
        ]). However, despite their potential, users commonly
do not adhere to these applications or abandon them entirely [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6</xref>
        ]. Thus, there appears to be
a mismatch between what the applications ofer and what users need.
      </p>
      <p>
        To create behavior change applications that do meet users’ needs, a variety of algorithms has
been developed to adapt what the applications ofer, when, how, and with whom. For example,
Zhou et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], Adams et al. [8], and Costa et al. [9] have adapted daily step goals and the choice
of activities for elderly people, Wang et al. [10] and Trella et al. [11] have developed algorithms
for adapting the timing of notifications for physical activity and oral self-care, Kaptein et al. [12]
and Bertolotti et al. [13] have adapted the use of Cialdini’s persuasion principles and diferent
message frames, and Piette et al. [14] and Forman et al. [15] have optimized the addition of
human support to eHealth applications for pain management and weight loss. These algorithms
thereby consider various elements from dynamic factors (e.g., user states derived from the
COM-B model [16], self-eficacy [ 13]) to more stable user characteristics (e.g., personality and
gender [17]) and employ various algorithmic techniques from reinforcement learning (e.g.,
[10]) to recommender systems (e.g., [18]). Placing the human at the center and combining
the strengths of humans and technology (i.e., augmented or hybrid intelligence) is often an
important design guideline, as is accounting for ethical and societal values.
      </p>
      <p>This workshop brings together researchers, designers, developers, practitioners, and
educators who are interested in the concept, development, evaluation, and impact of algorithmic
behavior change support. We explicitly invite participants from various backgrounds such as
artificial intelligence, human-computer interaction, psychology, medical practice, and ethics
of technology to contribute their perspectives and experiences. The broader objective of this
workshop is to strengthen the community of people working on adaptive support in behavior
change applications. To this end, the workshop aims to create a lively exchange of ideas that
benefits the individual workshop participants’ current and future research. Specifically, the
workshop’s aim is to a) learn about each other’s work, b) jointly work on problems of the
workshop participants, and c) establish a vision for future work on algorithmic behavior change
support.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Organization</title>
      <p>This was a one-day workshop that was primarily designed as an in-person event. It combined
sessions where participants presented their work and worked together on their individual
problems (e.g., provide feedback on an idea for an algorithm, serve as a focus group, or brainstorm
on a research question) with keynotes by leading researchers.</p>
      <sec id="sec-3-1">
        <title>2.1. Accepted Papers</title>
        <p>Researchers interested in attending the workshop were asked to submit a short position paper
of their work as well as a problem that they would like to work on together with the other
workshop participants. We received ten submissions by authors from diverse countries such
as Canada, India, and Australia. Each submission was reviewed by at least two reviewers and
the authors of four accepted papers presented their work and problem at the workshop. The
accepted papers broadly covered the personalization of eHealth applications for diferent types
of behavior change (e.g., sleep adherence, stress management, diabetes lifestyle change) and
algorithm design guidelines.</p>
      </sec>
      <sec id="sec-3-2">
        <title>2.2. Keynotes</title>
        <p>The workshop featured two keynotes, one online and one in-person:
• Nina Deliu is an Assistant Professor in Statistics at Sapienza University of Rome, Italy,
and a long-term visitor of the MRC–Biostatistics Unit of the University of Cambridge,
UK. Her research focuses on exploring and developing reinforcement learning and
multiarmed bandit algorithms for applications in behavioral sciences (e.g., education, mobile
health, clinical trials). Moreover, she investigates how we can perform valid inference
based on data that has been adaptively collected in such settings.
• Deborah Richards is a Professor with the School of Computing in the Faculty of Science
and Engineering at Macquarie University in Sydney, Australia. She is an expert on
intelligent virtual agents, which she has developed for various domains including health
and education.</p>
      </sec>
      <sec id="sec-3-3">
        <title>2.3. Organizing Committee</title>
        <p>The workshop was organized by a multidisciplinary team of researchers from several institutes,
with expertise in human-computer interaction, artificial intelligence, health communication,
statistics, and behavioral science:
• Nele Albers is a PhD student in Computer Science at Delft University of Technology.</p>
        <p>She studies how adaptive algorithms can be used to tailor behavior change applications
to individuals and their state in time, especially using reinforcement learning.
• Amal Abdulrahman is a research fellow at Macquarie University and Delft University
of Technology. Her main research interest lies in exploring how technology can support
humans in achieving a better quality of life. For this, she has developed embodied and
text-based virtual agents that use techniques ranging from reinforcement learning to
argumentation.
• Deborah Richards did, besides giving a keynote, also help with organizing the workshop.</p>
        <p>Deborah is a Professor at Macquarie University. Her research focuses on intelligent
systems, agent technologies, and virtual worlds to support human learning and
wellbeing.
• Caroline Figueroa’s research focuses on developing, testing, and disseminating
personalized digital health tools for behavior change, and tailoring these tools to the needs of
underserved populations such as people from ethnic and racial minority backgrounds
and low-income individuals.
• Bibhas Chakraborty is an Associate Professor at the Duke-NUS Medical School. His
main research focus revolves around the development of novel statistical methods and
associated study designs aimed at advancing data-driven precision health, particularly in
settings with varying temporal factors.
• Ananya Bhattacharjee is a Computer Science PhD student at the University of Toronto,
Canada. His main research interest lies in developing and understanding technology that
can help people manage their psychological well-being. To this end, he has developed
several text message services, mobile applications, and websites.
• Linwei He is a PhD student at Tilburg University in the Netherlands with a background
in communication science and especially persuasive communication. Her research focus
lies on using conversational agents to accomplish long-term health behavior change, for
example in the context of quitting smoking.
• Mark Neerincx is Full Professor in Human-Centered Computing at the Delft University
of Technology, and Senior Research Scientist at TNO Perceptual and Cognitive Systems.
He is an expert on fundamental and applied research on human-computer interaction in
domains such as health, security, and defense.
• Joseph Jay Williams is an Assistant Professor in Computer Science at the University
of Toronto. His vision is to develop intelligent, adaptive systems that are continuously
enhancing and personalizing interventions to help people in contexts such as education
and mental health.
• Nezih Younsi is a PhD student at Sorbonne University in France. He is interested in
how algorithms such as reinforcement learning can be used to help people change their
behavior, specifically in the context of healthy eating.
• Tibor Bosse is Full Professor of Artificial Intelligence and Communication Science at
Radboud University. His main research interest is the social interaction between humans
and socially intelligent systems, applied to various domains such as social skills training
and behavior change.
• Annemiek Linn is an Associate Professor in Health Communication at the University of
Amsterdam. Her research lies at the intersection of technology and health communication.
She is specifically interested in developing healthcare technologies that place the patient
at the center.
• Crystal Smit is an Assistant Professor in Clinical Child and Family Studies at
Erasmus University Rotterdam. In her research, she focuses on encouraging positive health
behaviors among young individuals, especially considering the impact of their social
networks.
• Willem-Paul Brinkman is an Associate Professor at Delft University of Technology. His
research focuses on human-computer interaction, human-centered artificial intelligence,
and behavior change support systems, specifically in eHealth.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Outcome</title>
      <p>The workshop’s goal was to enable a fruitful exchange of ideas that benefits both the current
and future research of the workshop participants. More specifically, the workshop outcomes
were that a) participants gained insights into current research projects that their peers from
diferent disciplines are working on, b) participants contributed to addressing problems of other
workshop participants, and c) participants established a vision for future work on algorithmic
behavior change support.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work is part of the multidisciplinary research project Perfect Fit, which is supported by
several funders organized by the Netherlands Organization for Scientific Research (NWO),
program Commit2Data - Big Data &amp; Health (project number 628.011.211). Besides NWO, the
funders include the Netherlands Organisation for Health Research and Development (ZonMw),
Hartstichting, the Ministry of Health, Welfare and Sport (VWS), Health Holland, and the
Netherlands eScience Center.
A. Aswani, Personalizing mobile fitness apps using reinforcement learning, in: CEUR
Workshop Proceedings, volume 2068, NIH Public Access, 2018.
[8] M. A. Adams, J. F. Sallis, G. J. Norman, M. F. Hovell, E. B. Hekler, E. Perata, An adaptive
physical activity intervention for overweight adults: a randomized controlled trial, PLoS
ONE 8 (2013) e82901. doi:10.1371/journal.pone.0082901.
[9] Â. Costa, S. Heras, J. Palanca, J. Jordán, P. Novais, V. Julian, Using argumentation schemes
for a persuasive cognitive assistant system, in: N. C. Pacheco, C. Carrascosa, N. Osman,
V. J. Inglada (Eds.), Multi-Agent Systems and Agreement Technologies - 14th European
Conference, EUMAS 2016, and 4th International Conference, AT 2016, Valencia, Spain,
December 15-16, 2016, Revised Selected Papers, volume 10207 of Lecture Notes in Computer
Science, Springer, 2016, pp. 538–546. doi:10.1007/978- 3- 319- 59294- 7_43.
[10] S. Wang, C. Zhang, B. Kröse, H. van Hoof, Optimizing adaptive notifications in
mobile health interventions systems: reinforcement learning from a data-driven behavioral
simulator, Journal of Medical Systems 45 (2021). doi:10.1007/s10916- 021- 01773- 0.
[11] A. L. Trella, K. W. Zhang, I. Nahum-Shani, V. Shetty, F. Doshi-Velez, S. A. Murphy, Reward
design for an online reinforcement learning algorithm supporting oral self-care, in:
B. Williams, Y. Chen, J. Neville (Eds.), Thirty-Seventh AAAI Conference on Artificial
Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial
Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial
Intelligence, EAAI 2023, Washington, DC, USA, February 7-14, 2023, AAAI Press, 2023, pp.
15724–15730. doi:10.1609/AAAI.V37I13.26866.
[12] M. Kaptein, P. Markopoulos, B. De Ruyter, E. Aarts, Personalizing persuasive technologies:
Explicit and implicit personalization using persuasion profiles, International Journal
of Human-Computer Studies 77 (2015) 38–51. doi:https://doi.org/10.1016/j.ijhcs.
2015.01.004.
[13] M. Bertolotti, V. Carfora, P. Catellani, Diferent frames to reduce red meat intake: The
moderating role of self-eficacy, Health Communication 35 (2020) 475–482. doi: 10.1080/
10410236.2019.1567444.
[14] J. D. Piette, S. Newman, S. L. Krein, N. Marinec, J. Chen, D. A. Williams, S. N. Edmond,
M. Driscoll, K. M. LaChappelle, R. D. Kerns, et al., Patient-centered pain care using artificial
intelligence and mobile health tools: a randomized comparative efectiveness trial, JAMA
Internal Medicine 182 (2022) 975–983. doi:10.1001/jamainternmed.2022.3178.
[15] E. M. Forman, S. G. Kerrigan, M. L. Butryn, A. S. Juarascio, S. M. Manasse, S. Ontañón, D. H.</p>
      <p>Dallal, R. J. Crochiere, D. Moskow, Can the artificial intelligence technique of reinforcement
learning use continuously-monitored digital data to optimize treatment for weight loss?,
Journal of Behavioral Medicine 42 (2019) 276–290. doi:10.1007/s10865- 018- 9964- 1.
[16] N. Albers, M. A. Neerincx, W.-P. Brinkman, Addressing people’s current and future states
in a reinforcement learning algorithm for persuading to quit smoking and to be physically
active, PLoS ONE 17 (2022) e0277295. doi:10.1371/journal.pone.0277295.
[17] R. A. de Vries, K. P. Truong, C. Zaga, J. Li, V. Evers, A word of advice: how to tailor
motivational text messages based on behavior change theory to personality and gender, Personal
and Ubiquitous Computing 21 (2017) 675–687. doi:10.1007/S00779- 017- 1025- 1.
[18] S. Hors-Fraile, S. Malwade, F. Luna-Perejon, C. Amaya, A. Civit, F. Schneider, P. Bamidis,
S. Syed-Abdul, Y.-C. Li, H. De Vries, Opening the black box: Explaining the process of
basing a health recommender system on the i-change behavioral change model, IEEE
Access 7 (2019) 176525–176540. doi:10.1109/ACCESS.2019.2957696.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alslaity</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. K.</given-names>
            <surname>Reen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Anukem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Orji</surname>
          </string-name>
          ,
          <article-title>Gardenquest: Using hexad player types to design a step-based multiplayer persuasive game for motivating physical activity</article-title>
          , in: A.
          <string-name>
            <surname>Meschtscherjakov</surname>
            ,
            <given-names>C. J. H.</given-names>
          </string-name>
          <string-name>
            <surname>Midden</surname>
          </string-name>
          , J. Ham (Eds.),
          <source>Persuasive Technology - 18th International Conference, PERSUASIVE</source>
          <year>2023</year>
          , Eindhoven,
          <source>The Netherlands, April 19-21</source>
          ,
          <year>2023</year>
          , Proceedings, volume
          <volume>13832</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2023</year>
          , pp.
          <fpage>337</fpage>
          -
          <lpage>356</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -30933-5_
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ciocarlan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Masthof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Oren</surname>
          </string-name>
          ,
          <article-title>Kindness makes you happy and happiness makes you healthy: Actual persuasiveness and personalisation of persuasive messages in a behaviour change intervention for wellbeing</article-title>
          , in: A.
          <string-name>
            <surname>Meschtscherjakov</surname>
            ,
            <given-names>C. J. H.</given-names>
          </string-name>
          <string-name>
            <surname>Midden</surname>
          </string-name>
          , J. Ham (Eds.),
          <source>Persuasive Technology - 18th International Conference, PERSUASIVE</source>
          <year>2023</year>
          , Eindhoven,
          <source>The Netherlands, April 19-21</source>
          ,
          <year>2023</year>
          , Proceedings, volume
          <volume>13832</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2023</year>
          , pp.
          <fpage>198</fpage>
          -
          <lpage>214</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -30933-5_
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Meijer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Korst</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Oosting</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Heemskerk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hermsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Willemsen</surname>
          </string-name>
          ,
          <string-name>
            B. van den Putte,
            <given-names>N. H.</given-names>
            <surname>Chavannes</surname>
          </string-name>
          , J. Brown, “
          <article-title>at least someone thinks i'm doing well”: a real-world evaluation of the quit-smoking app stopcoach for lower socio-economic status smokers</article-title>
          ,
          <source>Addiction Science &amp; Clinical Practice</source>
          <volume>16</volume>
          (
          <year>2021</year>
          ).
          <source>doi:10.1186/s13722-021-00255-5.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Beun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Brinkman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fitrianie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Grifioen-Both</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. H. G.</given-names>
            <surname>Horsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lancee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Spruit</surname>
          </string-name>
          ,
          <article-title>Improving adherence in automated e-coaching - A case from insomnia therapy</article-title>
          , in: A.
          <string-name>
            <surname>Meschtscherjakov</surname>
            ,
            <given-names>B. E.</given-names>
          </string-name>
          <string-name>
            <surname>R. de Ruyter</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Fuchsberger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Murer</surname>
          </string-name>
          , M. Tscheligi (Eds.),
          <source>Persuasive Technology - 11th International Conference, PERSUASIVE</source>
          <year>2016</year>
          , Salzburg, Austria, April 5-
          <issue>7</issue>
          ,
          <year>2016</year>
          , Proceedings, volume
          <volume>9638</volume>
          of Lecture Notes in Computer Science, Springer,
          <year>2016</year>
          , pp.
          <fpage>276</fpage>
          -
          <lpage>287</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -31510-2_
          <fpage>24</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Greenhalgh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wherton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Papoutsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lynch</surname>
          </string-name>
          , G. Hughes,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hinder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fahy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Procter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shaw</surname>
          </string-name>
          , et al.,
          <article-title>Beyond adoption: a new framework for theorizing and evaluating nonadoption, abandonment, and challenges to the scale-up, spread, and sustainability of health and care technologies</article-title>
          ,
          <source>Journal of Medical Internet Research</source>
          <volume>19</volume>
          (
          <year>2017</year>
          )
          <article-title>e367</article-title>
          . doi:
          <volume>10</volume>
          .2196/jmir.8775.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Kelders</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. E. Van Zyl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Ludden</surname>
          </string-name>
          ,
          <article-title>The concept and components of engagement in diferent domains applied to ehealth: a systematic scoping review</article-title>
          ,
          <source>Frontiers in Psychology</source>
          <volume>11</volume>
          (
          <year>2020</year>
          )
          <article-title>926</article-title>
          . doi:
          <volume>10</volume>
          .3389/fpsyg.
          <year>2020</year>
          .
          <volume>00926</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mintz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fukuoka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Goldberg</surname>
          </string-name>
          , E. Flowers,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kaminsky</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Castillejo,
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>