{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T08:21:38Z","timestamp":1726129298611},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030794590"},{"type":"electronic","value":"9783030794606"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79460-6_22","type":"book-chapter","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T14:03:19Z","timestamp":1624370599000},"page":"275-288","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Perceptions of Ethics in Persuasive User Interfaces"],"prefix":"10.1007","author":[{"given":"Christopher C.","family":"Branch","sequence":"first","affiliation":[]},{"given":"Catherine I.","family":"Beaton","sequence":"additional","affiliation":[]},{"given":"Michael","family":"McQuaid","sequence":"additional","affiliation":[]},{"given":"Elissa","family":"Weeden","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,23]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11755494_25","volume-title":"Persuasive Technology","author":"BMC Atkinson","year":"2006","unstructured":"Atkinson, B.M.C.: Captology: a critical review. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 171\u2013182. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11755494_25"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-07127-5_1","volume-title":"Persuasive Technology","author":"O Barral","year":"2014","unstructured":"Barral, O., et al.: Covert persuasive technologies: bringing subliminal cues to human-computer interaction. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS, vol. 8462, pp. 1\u201312. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07127-5_1"},{"issue":"5","key":"22_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/301353.301410","volume":"42","author":"D Berdichevsky","year":"1999","unstructured":"Berdichevsky, D., Neuenschwander, E.: Toward an ethics of persuasive technology. Commun. ACM 42(5), 51\u201358 (1999). https:\/\/doi.org\/10.1145\/301353.301410","journal-title":"Commun. ACM"},{"key":"22_CR4","unstructured":"Brignull, H.: Dark patterns: dirty tricks designers use to make people do stuff 08 July 2010. https:\/\/www.90percentofeverything.com\/2010\/07\/08\/dark-patterns-dirty-tricks-designers-use-to-make-people-do-stuff\/. Accessed 29 Sep 2019, from 90 Percent Of Everything website"},{"key":"22_CR5","unstructured":"Cialdini, R.: Influence: the Psychology of Persuasion. Collins, New York (1984). NY, rev. edn"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Davis, J.: Design methods for ethical persuasive computing. In: Proceedings of the 4th International Conference on Persuasive Technology, vol. 6, pp. 1\u20136 (2009). https:\/\/doi.org\/10.1145\/1541948.1541957","DOI":"10.1145\/1541948.1541957"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Fogg, B.: The ethics of persuasive technology. In: Persuasive Technology, pp. 211\u2013239. Morgan Kaufmann (2003). https:\/\/doi.org\/10.1016\/B978-155860643-2\/50011-1","DOI":"10.1016\/B978-155860643-2\/50011-1"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI, vol. 18, pp. 1\u201314 (2018). https:\/\/doi.org\/10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"22_CR9","unstructured":"Harris, T.: How technology is hijacking your mind\u2013from a former insider, 18 May 2016. https:\/\/medium.com\/thrive-global\/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3. Accessed 6 Apr 2019, from Medium website"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11755494_1","volume-title":"Persuasive Technology","author":"W IJsselsteijn","year":"2006","unstructured":"IJsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., van den Hoven, E.: Persuasive technology for human well-being: setting the scene. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol. 3962, pp. 1\u20135. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11755494_1"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-13226-1_10","volume-title":"Persuasive Technology","author":"M Kaptein","year":"2010","unstructured":"Kaptein, M., Eckles, D.: Selecting effective means to any end: futures and ethics of persuasion profiling. In: Ploug, T., Hasle, P., Oinas-Kukkonen, H. (eds.) PERSUASIVE 2010. LNCS, vol. 6137, pp. 82\u201393. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13226-1_10"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-37157-8_12","volume-title":"Persuasive Technology","author":"P Karppinen","year":"2013","unstructured":"Karppinen, P., Oinas-Kukkonen, H.: Three approaches to ethical considerations in the design of behavior change support systems. In: Berkovsky, S., Freyne, J. (eds.) PERSUASIVE 2013. LNCS, vol. 7822, pp. 87\u201398. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37157-8_12"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-030-17287-9_12","volume-title":"Persuasive Technology: Development of Persuasive and Behavior Change Support Systems","author":"R Kight","year":"2019","unstructured":"Kight, R., Gram-Hansen, S.B.: Do ethics matter in persuasive technology? In: Oinas-Kukkonen, H., Win, K.T., Karapanos, E., Karppinen, P., Kyza, E. (eds.) PERSUASIVE 2019. LNCS, vol. 11433, pp. 143\u2013155. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17287-9_12"},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Lee, M.K., Kiesler, S., Forlizzi, J.: Mining behavioral economics to design persuasive technology for healthy choices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 325\u2013334 (2011). https:\/\/doi.org\/10.1145\/1978942.1978989","DOI":"10.1145\/1978942.1978989"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-77006-0_15","volume-title":"Persuasive Technology","author":"J Leth Jespersen","year":"2007","unstructured":"Leth Jespersen, J., Albrechtslund, A., \u00d8hrstr\u00f8m, P., Hasle, P., Albretsen, J.: Surveillance, persuasion, and panopticon. In: de Kort, Y., IJsselsteijn, W., Midden, C., Eggen, B., Fogg, B.J. (eds.) PERSUASIVE 2007. LNCS, vol. 4744, pp. 109\u2013120. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77006-0_15"},{"key":"22_CR16","doi-asserted-by":"publisher","unstructured":"Nagenborg, M.: Surveillance and Persuasion, Ethics and Information Technology, Dordrecht, vol. 16 (2014). https:\/\/doi.org\/10.1007\/s10676-014-9339-4","DOI":"10.1007\/s10676-014-9339-4"},{"key":"22_CR17","unstructured":"Nodder, C.: Evil by Design: Interaction Design to Lead Us into Temptation. Wiley, Indianapolis, IN (2013)"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-31037-9_11","volume-title":"Persuasive Technology. Design for Health and Safety","author":"J Smids","year":"2012","unstructured":"Smids, J.: The voluntariness of persuasive technology. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 123\u2013132. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31037-9_11"},{"key":"22_CR19","unstructured":"Thaler, R.H., Sunstein, C.R.: Nudge: Improving Decisions About Health, Wealth, and Happiness. Penguin Books, New York (2009). Revised and expanded edn"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-20306-5_18","volume-title":"Persuasive Technology","author":"J Timmer","year":"2015","unstructured":"Timmer, J., Kool, L., van Est, R.: Ethical challenges in emerging applications of persuasive technology. In: MacTavish, T., Basapur, S. (eds.) PERSUASIVE 2015. LNCS, vol. 9072, pp. 196\u2013201. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20306-5_18"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Torning, K., Oinas-Kukkonen, H.: Persuasive system design: state of the art and future directions. In: Proceedings of the 4th International Conference on Persuasive Technology. Persuasive 2009. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1541948.1541989","DOI":"10.1145\/1541948.1541989"},{"issue":"3","key":"22_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1162\/DESI_a_00087","volume":"27","author":"N Tromp","year":"2011","unstructured":"Tromp, N., Hekkert, P., Verbeek, P.P.: Design for socially responsible behavior: a classification of influence based on intended user experience. Des. Issues 27(3), 3\u201319 (2011)","journal-title":"Des. Issues"}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79460-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T14:07:17Z","timestamp":1624370837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79460-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030794590","9783030794606"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79460-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PERSUASIVE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Persuasive Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persuasive2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/persuasive2021.bournemouth.ac.uk\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}