<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<?covid-19-tdm?>
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JPH</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Public Health Surveill</journal-id>
      <journal-title>JMIR Public Health and Surveillance</journal-title>
      <issn pub-type="epub">2369-2960</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v7i11e28956</article-id>
      <article-id pub-id-type="pmid">34783673</article-id>
      <article-id pub-id-type="doi">10.2196/28956</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Designing Better Exposure Notification Apps: The Role of Persuasive Design</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Sanchez</surname>
            <given-names>Travis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Arden-Close</surname>
            <given-names>Emily</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Blondon</surname>
            <given-names>Katie</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Oyibo</surname>
            <given-names>Kiemute</given-names>
          </name>
          <degrees>BSc, MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8300-3343</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Morita</surname>
            <given-names>Plinio Pelegrini</given-names>
          </name>
          <degrees>PEng, MSc, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Public Health Sciences</institution>
            <institution>Faculty of Health</institution>
            <institution>University of Waterloo</institution>
            <addr-line>200 University Avenue West</addr-line>
            <addr-line>Waterloo, ON, N2L 3G1</addr-line>
            <country>Canada</country>
            <phone>1 5198884567 ext 41372</phone>
            <email>plinio.morita@uwaterloo.ca</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9515-6478</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Public Health Sciences</institution>
        <institution>Faculty of Health</institution>
        <institution>University of Waterloo</institution>
        <addr-line>Waterloo, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Systems Design Engineering</institution>
        <institution>University of Waterloo</institution>
        <addr-line>Waterloo, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>eHealth Innovation</institution>
        <institution>Techna Institute</institution>
        <institution>University Health Network</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Institute of Health Policy, Management, and Evaluation</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Plinio Pelegrini Morita <email>plinio.morita@uwaterloo.ca</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>11</month>
        <year>2021</year>
      </pub-date>
      <volume>7</volume>
      <issue>11</issue>
      <elocation-id>e28956</elocation-id>
      <history>
        <date date-type="received">
          <day>22</day>
          <month>3</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>16</day>
          <month>7</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>16</day>
          <month>8</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>24</day>
          <month>8</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Kiemute Oyibo, Plinio Pelegrini Morita. Originally published in JMIR Public Health and Surveillance (https://publichealth.jmir.org), 16.11.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Public Health and Surveillance, is properly cited. The complete bibliographic information, a link to the original publication on https://publichealth.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://publichealth.jmir.org/2021/11/e28956" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Digital contact tracing apps have been deployed worldwide to limit the spread of COVID-19 during this pandemic and to facilitate the lifting of public health restrictions. However, due to privacy-, trust-, and design-related issues, the apps are yet to be widely adopted. This calls for an intervention to enable a critical mass of users to adopt them.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this paper is to provide guidelines to design contact tracing apps as persuasive technologies to make them more appealing and effective.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We identified the limitations of the current contact tracing apps on the market using the Government of Canada’s official exposure notification app (COVID Alert) as a case study. Particularly, we identified three interfaces in the COVID Alert app where the design can be improved. The interfaces include the no exposure status interface, exposure interface, and diagnosis report interface. We propose persuasive technology design guidelines to make them more motivational and effective in eliciting the desired behavior change.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Apart from trust and privacy concerns, we identified the minimalist and nonmotivational design of exposure notification apps as the key design-related factors that contribute to the current low uptake. We proposed persuasive strategies such as self-monitoring of daily contacts and exposure time to make the no exposure and exposure interfaces visually appealing and motivational. Moreover, we proposed social learning, praise, and reward to increase the diagnosis report interface’s effectiveness.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>We demonstrated that exposure notification apps can be designed as persuasive technologies by incorporating key persuasive features, which have the potential to improve uptake, use, COVID-19 diagnosis reporting, and compliance with social distancing guidelines.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>contact tracing app</kwd>
        <kwd>exposure notification app</kwd>
        <kwd>COVID Alert</kwd>
        <kwd>COVID-19</kwd>
        <kwd>persuasive technology</kwd>
        <kwd>behavior change</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>The COVID-19 pandemic, beginning in the early part of 2020, has led to the development and deployment of several digital health technologies to slow the spread of COVID-19. COVID-19 is a human-to-human transmittable respiratory disease caused by the coronavirus known as SARS-CoV-2, which emerged in December 2019. Its symptoms include cough, sore throat, and high fever, which have the potential to cause pneumonia and respiratory failure [<xref ref-type="bibr" rid="ref1">1</xref>]. Most prevalent among the technologies aimed at curbing COVID-19 are digital contact tracing apps, which help public health authorities to track or notify individuals who may have come into close contact with a person who is infected. Traditionally, contact tracing has been a manual process whereby people, potentially exposed to a human-to-human transmittable disease, are identified by interviewing persons who are infected with whom the former may have had close contact [<xref ref-type="bibr" rid="ref2">2</xref>]. However, with the advancement in mobile technology and privacy-preserving cryptography (eg, the Google/Apple Exposure Notification system), the practice of contact tracing has gone predominantly digital worldwide [<xref ref-type="bibr" rid="ref3">3</xref>]. Digital contact tracing does not replace manual tracing techniques but augments it to fast-track the containment of COVID-19 [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. The main advantage of digital over manual contact tracing is that it automates the labor-intensive process, especially in situations where there are a limited number of human contact tracers [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Digital contact tracing, if adopted by a critical mass of people, is more likely to be faster, more effective, and accurate in comparison to the fallible nature of human memories, especially given that COVID-19 infection may be asymptomatic for up to 14 days [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p><xref rid="figure1" ref-type="fig">Figure 1</xref> shows how the exposure notification app works in the real world. If Bob and Alice come in close contact (ie, within a 2-meter distance) for 15 minutes or more, both contacts exchange a dynamic randomly generated identification number. In the future, if Bob tests positive and uploads his one-time key given to him by the public health authority to the cloud-based database of anonymized contacts, Alice will be contacted via the app and advised on what to do next.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>COVID-19 contact tracing and exposure notification process (adapted from Fairbank et al [<xref ref-type="bibr" rid="ref8">8</xref>]).</p>
        </caption>
        <graphic xlink:href="publichealth_v7i11e28956_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>Several countries worldwide, such as Australia, Canada, France, South Africa, and Singapore [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>], have launched nationwide exposure notification apps in their respective official languages. The apps alert people who may have come in close contact with persons infected with COVID-19 for 15 minutes or more in the last 14 days. The Government of Canada’s exposure notification app is called “COVID Alert” [<xref ref-type="bibr" rid="ref12">12</xref>]. It is available in two languages (English and French) and can be downloaded from the Apple and Android stores by Canadian residents in the Northwest Territories, Prince Edward Island, Nova Scotia, Quebec, Manitoba, Saskatchewan, New Brunswick, Ontario, and Newfoundland and Labrador [<xref ref-type="bibr" rid="ref13">13</xref>]. Given the current poor uptake of contact tracing apps in general [<xref ref-type="bibr" rid="ref14">14</xref>], in this paper, we used the COVID Alert app as a case study to uncover some of the weaknesses in the current design of most exposure notification apps on the market and demonstrate how persuasive features can be incorporated in their design to improve their persuasiveness, uptake, and effectiveness.</p>
      <p>The rest of the paper is organized as follows. We begin by covering the poor uptake and design of contact tracing apps on the market and the need to make them more motivationally appealing. We then focus on persuasive design, key persuasive strategies relevant to contact tracing apps, and incorporating persuasive design in exposure notification apps using the COVID Alert app as a case study. Finally, we discuss the potential benefits of the proposed persuasive design of exposure notification apps and the ethics of persuasive technology.</p>
    </sec>
    <sec>
      <title>Poor Uptake of Current Exposure Notification Apps</title>
      <p>The Canadian Government has widely publicized the COVID Alert app, but acquiring a critical mass of users has been hampered due to privacy concerns, trust, and human factor design issues. Part of the adoption campaign involved Prime Minister Justin Trudeau urging Canadian residents, especially young people, to download and use the COVID Alert app to improve contact tracing and diminish disease trajectories [<xref ref-type="bibr" rid="ref13">13</xref>]. In 2020, it was estimated that there were 31.38 million smartphone users in Canada [<xref ref-type="bibr" rid="ref15">15</xref>]. Yet, as of November 26, 2020, the COVID alert app has only been downloaded about 5.5 million times from both Apple and Google stores [<xref ref-type="bibr" rid="ref16">16</xref>]. This means (assuming each download can be associated with a unique smartphone user) approximately 17.5 percent of the smartphone users in Canada in 2020 downloaded the app as of November 26. The low adoption rate of the COVID Alert app among the Canadian population limits its effectiveness, as research shows that 56% of the population would have to use the app to considerably slow down the spread of the virus [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
    </sec>
    <sec>
      <title>Problems With Current Contact Tracing and Exposure Notification Apps</title>
      <p>There are several problems associated with the low uptake of contact tracing and exposure notification apps worldwide. Concerns hindering their adoption are privacy, data use, public surveillance, poor persuasive design, and lack of customization to mention but a few [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref18">18</xref>].</p>
      <p>Broadly, these problems can be grouped into two categories, as shown in <xref rid="figure2" ref-type="fig">Figure 2</xref>. The first category is lack of trust in stakeholders (eg, government, tech companies, or public health authority) pertaining to data privacy and protection [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. The second category is the lack of motivational affordances in the user interface (UI) design of exposure notification apps. In other words, these apps are minimalist, nonpersuasive, and use a one-size-fits-all approach, which can negatively impact adoption [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      <fig id="figure2" position="float">
        <label>Figure 2</label>
        <caption>
          <p>Stakeholder and design-related issues surrounding the low uptake of contact tracing and exposure notification apps.</p>
        </caption>
        <graphic xlink:href="publichealth_v7i11e28956_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <sec>
        <title>Lack of Trust in Contact Tracing Stakeholders</title>
        <p>Privacy and trust-related concerns have been raised by the public concerning how COVID-19 health and tech stakeholders will handle users’ privacy and data [<xref ref-type="bibr" rid="ref7">7</xref>]. For example, most Americans may trust COVID-19 stakeholders such as public health agencies and universities, but they do not trust tech companies such as Apple and Google, which developed the privacy-preserving Google/Apple Exposure Notification system, which most of the contact tracing apps on the market require and support to function properly [<xref ref-type="bibr" rid="ref12">12</xref>]. A cross-section of US smartphone users was asked the question, “How much, if at all, do you trust _____ to ensure that people who report being diagnosed with coronavirus using their smartphone app remain anonymous — a great deal, a good amount, not too much or not at all?” A total of 56% of those polled (ie, nearly 3 in 5) did not trust tech companies such as Apple and Google, but 57% and 56% trusted public health agencies and universities a great deal or a good amount, respectively [<xref ref-type="bibr" rid="ref23">23</xref>]. The limited trust in tech companies such as Apple and Google (&#60;45%) may not come as a surprise given the widely reported Facebook-Cambridge Analytica Scandal about the 2016 United States elections [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
      </sec>
      <sec>
        <title>Lack of Motivational Affordances in Exposure Notification Apps</title>
        <p>High uptake is crucial for exposure notification apps to be effective in mitigating the spread of COVID-19. However, according to Walrave et al [<xref ref-type="bibr" rid="ref25">25</xref>], “<italic>it</italic> remains unclear how we can motivate citizens to use these apps.” Although the government and tech companies have taken some measures to increase public trust by way of decentralization of collected data [<xref ref-type="bibr" rid="ref12">12</xref>], Bluetooth contact tracing, and nontracking/storage of users’ location data via global positioning technology, much is yet to be done in the area of persuasive design to increase the adoption rate. For example, the current version of the COVID Alert app is minimalist [<xref ref-type="bibr" rid="ref26">26</xref>] and lacks motivational affordances and incentives [<xref ref-type="bibr" rid="ref27">27</xref>]. Motivational affordances are the persuasive elements that satisfy users’ needs. According to Zhang [<xref ref-type="bibr" rid="ref28">28</xref>], when an information and communication technology (ICT) satisfies users’ motivational needs, they feel enjoyment and want it more. Hence, “the ultimate goal of designing an ICT for human use is to achieve high motivational affordance so that users would be attracted to it, really want to use it, and cannot live without it” [<xref ref-type="bibr" rid="ref28">28</xref>]. However, “[a]part from providing receiving notifications about possible infections, current contract tracing apps appear to not provide a clear benefit to the user” [<xref ref-type="bibr" rid="ref29">29</xref>]. Specifically, most of them lack vital persuasive features that motivate people to use digital health technologies to monitor and manage their health behaviors. Hence, the lack of persuasive features may contribute to low adoption rates of many contact tracing and exposure notification apps on the market [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
        <p>Digital health researchers have stated that incorporating persuasive features into contact tracing apps could increase their adoption and use by the wider population [<xref ref-type="bibr" rid="ref27">27</xref>]. In other words, contact tracing apps are more likely to be effective as persuasive technologies than as traditional information systems focused on functionality.</p>
        <p>Persuasive technology is an interactive system intentionally designed to change attitudes or behaviors positively through persuasion and social influence but not through coercion or deception [<xref ref-type="bibr" rid="ref31">31</xref>]. However, the current version of the COVID Alert app lacks basic persuasive and social influence principles that can motivate more users to download and use the app more frequently. <xref rid="figure3" ref-type="fig">Figure 3</xref> shows the three main functional UIs of the COVID Alert app: “No Exposure,” “Exposure,” and “Diagnosis Report.” Apart from being minimalistic, all three UIs do not support essential persuasive features such as monitoring of the users’ daily contacts and exposure time. This may help them regulate themselves concerning observing social (physical) distancing guidelines in public settings.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Key user interfaces in the COVID Alert app (Government of Ontario [<xref ref-type="bibr" rid="ref32">32</xref>]).</p>
          </caption>
          <graphic xlink:href="publichealth_v7i11e28956_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec>
      <title>Persuasive Design</title>
      <p>Persuasive design involves applied social psychology theories in the design of technologies to change behaviors and attitudes. Hence, persuasive technology, also called “Captology” by Fogg [<xref ref-type="bibr" rid="ref31">31</xref>], is regarded as the intersection of computer systems (from the field of human-computer interaction) and the art of persuasion (from the field of psychology). A typical example of a persuasive technology is a mobile fitness app aimed at motivating people to exercise more to improve their mental well-being and physical fitness. Persuasive design focuses on influencing human behavior, attitude, motivation, and compliance through the systematic design of a system’s features and affordances to promote behavior change.</p>
      <sec>
        <title>Persuasive Techniques</title>
        <p>There are two main design frameworks commonly used in designing and evaluating persuasive technologies. The first framework is called Cialdini’s [<xref ref-type="bibr" rid="ref33">33</xref>] principles of persuasion, which comprise six persuasive techniques: authority, commitment, reciprocity, liking, consensus, and scarcity [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. The second framework is called the persuasive system design model [<xref ref-type="bibr" rid="ref36">36</xref>], which comprises 28 persuasive techniques and extends Fogg’s [<xref ref-type="bibr" rid="ref31">31</xref>] seven persuasive techniques. The persuasive system design model includes four broad categories (primary task support, dialogue support, system credibility support, and social support) as shown in <xref rid="figure4" ref-type="fig">Figure 4</xref> [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        <p>First, primary task support includes persuasive techniques that help the user to carry out the target behavior easily and effectively. Second, dialogue support includes persuasive techniques that motivate the user to perform the target behavior through feedback and interaction with the persuasive application. Third, social support includes persuasive techniques that motivate the user to carry out the target behavior through social influence. Finally, system credibility support includes persuasive techniques that make the persuasive application look credible to the user [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Persuasive system design model [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
          </caption>
          <graphic xlink:href="publichealth_v7i11e28956_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Each of the four categories in the persuasive system design model comprises seven persuasive techniques. <xref rid="figure5" ref-type="fig">Figure 5</xref> shows three persuasive techniques in each of the four categories relevant to contact tracing apps. For example, primary task support comprises self-monitoring, tailoring, and personalization, and social support includes social learning, social comparison, and normative influence. These techniques, widely studied in persuasive technology research, have proven effective in changing health behaviors such as physical activity [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]. Moreover, dialogue support comprises praise, reward, and feedback. In particular, reward, be it virtual, tangible, or monetary, holds potential in motivating behavior change, as people from both high-income and low-income countries are receptive to it [<xref ref-type="bibr" rid="ref41">41</xref>]. Finally, credibility support comprises trustworthiness, surface credibility, and authority. Research [<xref ref-type="bibr" rid="ref36">36</xref>] shows that persuasive apps perceived as trustworthy and credible are more likely to motivate behavior change. Prior studies found a direct or indirect relationship between source trustworthiness [<xref ref-type="bibr" rid="ref42">42</xref>] or perceived credibility [<xref ref-type="bibr" rid="ref43">43</xref>] and behavioral intentions. Moreover, Oyibo et al [<xref ref-type="bibr" rid="ref44">44</xref>] found that people from both high-income and low-income countries are receptive to the authority strategy. Interestingly, current exposure notification apps on the market are already equipped with the authority and credibility strategies by default given that they were sponsored by national governments that symbolize authority. However, the issue of trust in the area of data protection and privacy remains a roadblock to adoption [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Twelve contact tracing app persuasive techniques from the persuasive system design model.</p>
          </caption>
          <graphic xlink:href="publichealth_v7i11e28956_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Example Implementation of Key Persuasive Design Techniques</title>
        <p>Persuasive techniques are implemented in most mobile health apps on the market to motivate behavior change and help users achieve their goals. <xref rid="figure6" ref-type="fig">Figure 6</xref> shows a fitness app called “BEN’FIT,” in which reward/self-monitoring and social learning/social comparison are, respectively, implemented in the personal and social versions (Oyibo et al [<xref ref-type="bibr" rid="ref45">45</xref>]). Self-monitoring enables the user to track their physical activity, including calories burned and step count over time. Regarded as the cornerstone of persuasive apps, self-monitoring fosters self-awareness and commitment, among other advantages shown in <xref rid="figure7" ref-type="fig">Figure 7</xref> [<xref ref-type="bibr" rid="ref46">46</xref>]. In the context of contact tracing apps, Cruz et al [<xref ref-type="bibr" rid="ref47">47</xref>] found that over 50% of their surveyed participants wanted to know how many infected people they have come in contact with and how many infected people have passed through a given location. Reward provides users with something to strive for and reinforces behaviors [<xref ref-type="bibr" rid="ref48">48</xref>]. Feedback allows the user to get important information about their behavior at specific points in time, for example, after achieving a 10,000 steps milestone. Feedback is not listed as a dialogue support feature in the persuasive system design model, yet it is used as a persuasive feature in motivating behavioral change. Social learning and social comparison, which are correlated [<xref ref-type="bibr" rid="ref49">49</xref>], use social pressure to motivate the target behavior [<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Implementation of SM, RW, SC, and SL in a fitness app aimed at promoting physical activity [<xref ref-type="bibr" rid="ref46">46</xref>]. RW: reward; SC: social comparison; SL: social learning; SM: self-monitoring.</p>
          </caption>
          <graphic xlink:href="publichealth_v7i11e28956_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure7" position="float">
          <label>Figure 7</label>
          <caption>
            <p>Advantages of self-monitoring, reward, social learning, and social comparison [47].</p>
          </caption>
          <graphic xlink:href="publichealth_v7i11e28956_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec>
      <title>Incorporating Persuasive Design in Exposure Notification Apps</title>
      <p>The COVID Alert app can be redesigned to be more appealing and motivating to the target users by incorporating essential persuasive features to increase its effectiveness. <xref rid="figure8" ref-type="fig">Figure 8</xref> provides guidelines for integrating persuasive features such as self-monitoring, praise, reward, social comparison, and social learning. However, prior research in the physical activity domain shows that Canadians are more likely to be receptive to personal than social strategies [<xref ref-type="bibr" rid="ref50">50</xref>]. For this reason, there should be a personal and a social version of the app to enable the target users to make a choice based on their preferences.</p>
      <fig id="figure8" position="float">
        <label>Figure 8</label>
        <caption>
          <p>Guidelines for incorporating persuasive features into key user interfaces of exposure notification apps using COVID Alert as a case study.</p>
        </caption>
        <graphic xlink:href="publichealth_v7i11e28956_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <sec>
        <title>No Exposure Interface</title>
        <p>In the no exposure UI, a self-monitoring feature, which tracks daily contacts and exposure time, and showcases historical behavior, can be incorporated in the second half of the screen, which is currently blank. The implementation of the self-monitoring feature is presented in Oyibo et al [<xref ref-type="bibr" rid="ref51">51</xref>]. In the social version, a social comparison feature, which compares the user’s exposure levels (daily contacts and exposure time) with those of others in the community, can be incorporated as well. In addition, users can be allowed to customize the app (eg, choose a happy face avatar instead of a green hand icon that represents their no exposure state). Research shows that well-designed avatars can improve the user experience by drawing a closer connection between the user’s lived and digital identities as, for example, avatars possess some human signifiers like facial expressions that convey emotion [<xref ref-type="bibr" rid="ref52">52</xref>]. This is in line with the liking principle in the persuasive system design model (<xref rid="figure4" ref-type="fig">Figure 4</xref>), which states that people are more likely to be persuaded by people similar to them or that are attractive [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref36">36</xref>].</p>
      </sec>
      <sec>
        <title>Exposure Interface</title>
        <p>In the exposure UI, a self-monitoring feature, which tracks the total number of contacts and approximately when the user was exposed, can be incorporated in the middle of the screen, as shown in <xref rid="figure8" ref-type="fig">Figure 8</xref>. The implementation of the self-monitoring feature is presented in Oyibo et al [<xref ref-type="bibr" rid="ref51">51</xref>]. As in the no exposure UI, users should be able to customize the app (eg, choose a sad face avatar instead of a purple hand icon to represent their exposed state). In addition, in the social version, they should be given the choice to compare their exposure levels with those of others in the community as an additional means of motivation and insight.</p>
      </sec>
      <sec>
        <title>Diagnosis Report Interface</title>
        <p>In the diagnosis report UI, a social learning feature, which informs the user about the number of persons that have reported their COVID-19 diagnosis for a given period (eg, day or week), can be incorporated in the middle of the screen as shown in <xref rid="figure8" ref-type="fig">Figure 8</xref>. This additional statistical information can encourage users, when infected, to report their diagnosis to ensure the safety of the community. The implementation of the social learning feature is presented in Oyibo et al [<xref ref-type="bibr" rid="ref51">51</xref>]. Moreover, users can be praised or rewarded for reporting their diagnosis. In a recent study, Jonker et al [<xref ref-type="bibr" rid="ref53">53</xref>] found that respondents preferred apps that offer them incentives such as a token monetary reward (€5 [US $6] or €10 [US $12] a month), permission to gather in small groups (eg, after recovering), or free testing for COVID-19 after receiving an exposure alert.</p>
      </sec>
      <sec>
        <title>Social Location Monitoring Interface</title>
        <p>In addition to the 12 persuasive features drawn from the persuasive system design model (<xref rid="figure4" ref-type="fig">Figure 4</xref>), hot spot monitoring, which we call “Social Location Monitoring,” can be used as a persuasive strategy to promote adoption and use. Social location monitoring is the tracking and gathering of information about a location that includes the number of persons who are infected that currently reside in, have been to, or passed the location in a given period to help users make informed decisions. <xref rid="figure8" ref-type="fig">Figure 8</xref> shows a hypothetical interface for incorporating social location monitoring to motivate beneficial behaviors (eg, avoiding hot spots, social distancing, and wearing a mask). In a recent study, Li et al [<xref ref-type="bibr" rid="ref54">54</xref>] found that respondents were more willing to install contact tracing apps that collect users’ location data than those that do not, due to the additional benefits they provide about hot spot information and analysis. Social location monitoring can help local authorities allocate resources in a better way and enact better health care policies during the COVID-19 pandemic [<xref ref-type="bibr" rid="ref55">55</xref>].</p>
      </sec>
    </sec>
    <sec>
      <title>Potential Impact of the Proposed Persuasive Design</title>
      <p>The projected impact of the persuasive design of exposure notification apps includes improved uptake, frequent use, increased report of diagnosis, and compliance with social distancing guidelines. In future research efforts, we hope to implement these persuasive design guidelines and conduct a study to investigate the effectiveness of the persuasive design of exposure notification apps using the COVID Alert app as a case study. Although research has shown that persuasive design can promote behavior change (eg, in the physical domain or health eating), it is still not certain whether the proposed persuasive design guidelines for exposure notification apps can promote the target behaviors. Hence, there is a need for empirical research in the future to investigate the effectiveness of the proposed persuasive system design guidelines.</p>
    </sec>
    <sec>
      <title>Ethics of Persuasive Design</title>
      <p>Ethical concerns about the app and impact of persuasive design have been raised in the gray and academic literature. Admittedly, in the wrong hands, persuasive design can be exploited or used to manipulate unsuspecting users for financial and other gains [<xref ref-type="bibr" rid="ref56">56</xref>]. We regard this as “persuasive design for unethical gains.” One area that experts believe that persuasive technologies have been unethically used is digital apps for children. Research shows that the amount of kids’ screen time in 2018 was 10 times the amount in 2011, with kids spending an average of 6 hours and 40 minutes using persuasive technologies such as game apps and social media. Hence, some health professionals believed “children’s behaviors are being exploited in the name of the tech world’s profit” [<xref ref-type="bibr" rid="ref56">56</xref>]. This led 50 psychologists in 2018 to send a letter to the American Psychological Association (APA) “accusing psychologists working at tech companies of using ‘hidden manipulation techniques’ [and prevailing on] the APA to take an ethical stand on behalf of kids” [<xref ref-type="bibr" rid="ref56">56</xref>]. However, leveraging persuasive design for financial gains or unethical benefits is not what “persuasive design for behavior change” is about. Rather, the sole purpose for persuasive design for behavior change is to support the user in adopting and performing behaviors beneficial to themselves or society. An example of behavior change beneficial to the individual is eating healthy or exercising regularly. A persuasive app can be used to promote these behaviors. An example of such an app is “List It” [<xref ref-type="bibr" rid="ref57">57</xref>]. The app motivates users to select healthy options from a shopping list. Moreover, a behavior change beneficial to the society is commuting by public transportation (eg, bus or train) instead of driving one’s personal car [<xref ref-type="bibr" rid="ref58">58</xref>]. Broadly speaking, eco-friendly behaviors aimed at reducing carbon footprints will help, on a large scale, reduce global warming and climate change [<xref ref-type="bibr" rid="ref59">59</xref>]. An example of a persuasive app aimed at reducing carbon footprints is “EcoIsland” [<xref ref-type="bibr" rid="ref60">60</xref>]. The app, which supports the feedback strategy, encourages users to perform eco-friendly activities (turning down the room heater by 1 °C, commuting by train instead of driving a car, etc) to reduce carbon dioxide emission. Overall, the guiding moral principle (also known as the golden rule) of persuasive technology is that “designers of persuasive technology should not create any artifact that persuades someone to do or think something that they (the designers) would not want to be persuaded of themselves” [<xref ref-type="bibr" rid="ref61">61</xref>].</p>
    </sec>
    <sec>
      <title>Conclusions</title>
      <p>In this paper, we identified some of the issues surrounding the low uptake of contact tracing and exposure notification apps deployed by national governments worldwide to curb the spread of COVID-19 and speed up the lifting of public health restrictions. Specifically, we pinpointed lack of trust, concerns about privacy and data use by COVID-19 stakeholders, and the nonmotivational design of contact tracing and exposure notification apps as potential reasons for the low adoption rates worldwide. Using the Government of Canada’s COVID Alert app as a case study, we provided persuasive technology design guidelines that can help incorporate persuasive features in contact tracing and exposure notification apps to increase their uptake, frequent use, and compliance with social distancing guidelines. For example, we identified three use cases (no exposure status, exposure status, and diagnosis report interfaces) that can support persuasive features such as self-monitoring of the number of daily contacts and COVID-19 exposure time, and social learning about other users that have reported their diagnosis over a given period. In future work, we hope to conduct a user study to investigate the effectiveness of the implemented guidelines among Canadian residents using the COVID Alert app as a case study [<xref ref-type="bibr" rid="ref51">51</xref>].</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">APA</term>
          <def>
            <p>American Psychological Association</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ICT</term>
          <def>
            <p>information and communication technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">UI</term>
          <def>
            <p>user interface</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This project was funded by the Cybersecurity and Privacy Institute at the University of Waterloo, and was part of the conference organized by the Master of Public Service Policy and Data Lab.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ghosh</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Virion structure and mechanism of propagation of coronaviruses including SARS-CoV 2 (COVID-19) and some meaningful points for drug or vaccine development</article-title>
          <source>Preprints</source>
          <comment>Preprint posted online on August 14, 2020</comment>
          <pub-id pub-id-type="doi">10.20944/preprints202008.0312.v1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barrat</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cattuto</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kivelä</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Saramäki</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Effect of manual and digital contact tracing on COVID-19 outbreaks: a study on empirical contact data</article-title>
          <source>J R Soc Interface</source>
          <year>2021</year>
          <month>05</month>
          <volume>18</volume>
          <issue>178</issue>
          <fpage>20201000</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://royalsocietypublishing.org/doi/abs/10.1098/rsif.2020.1000?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rsif.2020.1000</pub-id>
          <pub-id pub-id-type="medline">33947224</pub-id>
          <pub-id pub-id-type="pmcid">PMC8097511</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>Privacy-preserving contact tracing</article-title>
          <source>Apple and Google</source>
          <access-date>2021-02-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.apple.com/covid19/contacttracing/">https://www.apple.com/covid19/contacttracing/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <article-title>Download COVID Alert today</article-title>
          <source>Government of Canada</source>
          <access-date>2021-02-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.canada.ca/en/public-health/services/diseases/coronavirus-disease-covid-19/covid-alert.html">https://www.canada.ca/en/public-health/services/diseases/coronavirus-disease-covid-19/covid-alert.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Crumpler</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Contact tracing apps are not a silver bullet</article-title>
          <source>Center for Strategic and International Studies</source>
          <year>2020</year>
          <month>05</month>
          <day>15</day>
          <access-date>2021-11-03</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.csis.org/blogs/technology-policy-blog/contact-tracing-apps-are-not-silver-bullet">https://www.csis.org/blogs/technology-policy-blog/contact-tracing-apps-are-not-silver-bullet</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Braithwaite</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Callender</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Bullock</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Aldridge</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>Automated and partly automated contact tracing: a systematic review to inform the control of COVID-19</article-title>
          <source>Lancet Digit Health</source>
          <year>2020</year>
          <month>11</month>
          <volume>2</volume>
          <issue>11</issue>
          <fpage>e607</fpage>
          <lpage>e621</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2589-7500(20)30184-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/S2589-7500(20)30184-9</pub-id>
          <pub-id pub-id-type="medline">32839755</pub-id>
          <pub-id pub-id-type="pii">S2589-7500(20)30184-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC7438082</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sharon</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech's newfound role as global health policy makers</article-title>
          <source>Ethics Inf Technol</source>
          <year>2020</year>
          <month>07</month>
          <day>18</day>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32837287"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10676-020-09547-x</pub-id>
          <pub-id pub-id-type="medline">32837287</pub-id>
          <pub-id pub-id-type="pii">9547</pub-id>
          <pub-id pub-id-type="pmcid">PMC7368642</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fairbank</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Murray</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Couture</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kline</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lazzaro</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>There's an app for that: digital contact tracing and its role in mitigating a second wave</article-title>
          <source>Berkman Klein Center</source>
          <year>2020</year>
          <access-date>2021-02-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cyber.harvard.edu/sites/default/files/2020-05/Contact_Tracing_Report_Final.pdf">https://cyber.harvard.edu/sites/default/files/2020-05/Contact_Tracing_Report_Final.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jalabneh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zehra Syed</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Pillai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hoque Apu</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Hussein</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Kabir</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Arafat</surname>
              <given-names>SMY</given-names>
            </name>
            <name name-style="western">
              <surname>Azim Majumder</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Use of mobile phone apps for contact tracing to control the COVID-19 pandemic: a literature review</article-title>
          <source>SSRN J</source>
          <comment>Preprint posted online on July 5, 2020</comment>
          <pub-id pub-id-type="doi">10.2139/ssrn.3641961</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Teixeira</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Doetsch</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The multifaceted role of mobile technologies as a strategy to combat COVID-19 pandemic</article-title>
          <source>Epidemiol Infect</source>
          <year>2020</year>
          <month>10</month>
          <day>13</day>
          <volume>148</volume>
          <fpage>e244</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33046160"/>
          </comment>
          <pub-id pub-id-type="doi">10.1017/S0950268820002435</pub-id>
          <pub-id pub-id-type="medline">33046160</pub-id>
          <pub-id pub-id-type="pii">S0950268820002435</pub-id>
          <pub-id pub-id-type="pmcid">PMC7588719</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Collado-Borrell</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Escudero-Vilaplana</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Villanueva-Bueno</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Herranz-Alonso</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sanjurjo-Saez</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Features and functionalities of smartphone apps related to COVID-19: systematic search in app stores and content analysis</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>08</month>
          <day>25</day>
          <volume>22</volume>
          <issue>8</issue>
          <fpage>e20334</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/8/e20334/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20334</pub-id>
          <pub-id pub-id-type="medline">32614777</pub-id>
          <pub-id pub-id-type="pii">v22i8e20334</pub-id>
          <pub-id pub-id-type="pmcid">PMC7479586</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <article-title>COVID Alert: COVID-19 exposure notification application privacy assessment Internet</article-title>
          <source>Government of Canada</source>
          <year>2021</year>
          <access-date>2021-07-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.canada.ca/en/public-health/services/diseases/coronavirus-disease-covid-19/covid-alert/privacy-policy/assessment.html">https://www.canada.ca/en/public-health/services/diseases/coronavirus-disease-covid-19/covid-alert/privacy-policy/assessment.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trudeau</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Canada’s COVID-19 exposure notification app now available in the Northwest Territories</article-title>
          <source>Prime Minister of Canada</source>
          <year>2020</year>
          <month>11</month>
          <day>26</day>
          <access-date>2021-02-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pm.gc.ca/en/news/news-releases/2020/11/26/canadas-covid-19-exposure-notification-app-now-available-northwest">https://pm.gc.ca/en/news/news-releases/2020/11/26/canadas-covid-19-exposure-notification-app-now-available-northwest</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farronato</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Iansiti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bartosiak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Denicolai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ferretti</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fontana</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>How to get people to actually use contact-tracing apps</article-title>
          <source>Havard Business Review</source>
          <year>2020</year>
          <month>07</month>
          <day>15</day>
          <access-date>2021-02-22</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hbr.org/2020/07/how-to-get-people-to-actually-use-contact-tracing-apps">https://hbr.org/2020/07/how-to-get-people-to-actually-use-contact-tracing-apps</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Dea</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Number of smartphone users in Canada from 2018 to 2024 (in millions)</article-title>
          <source>Statista</source>
          <year>2020</year>
          <month>12</month>
          <day>07</day>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statista.com/statistics/467190/forecast-of-smartphone-users-in-canada/">https://www.statista.com/statistics/467190/forecast-of-smartphone-users-in-canada/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <article-title>Coronavirus: Trudeau pleads with young people to download COVID Alert app</article-title>
          <source>Global News</source>
          <year>2020</year>
          <month>11</month>
          <day>27</day>
          <access-date>2021-01-08</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://globalnews.ca/video/7488498/coronavirus-trudeau-pleads-with-young-people-to-download-covid-alert-app">https://globalnews.ca/video/7488498/coronavirus-trudeau-pleads-with-young-people-to-download-covid-alert-app</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Neill</surname>
              <given-names>PH</given-names>
            </name>
          </person-group>
          <article-title>No, coronavirus apps don't need 60% adoption to be effective</article-title>
          <source>MIT Technology Review</source>
          <year>2020</year>
          <month>07</month>
          <day>05</day>
          <access-date>2021-01-13</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.technologyreview.com/2020/06/05/1002775/covid-apps-effective-at-less-than-60-percent-download/">https://www.technologyreview.com/2020/06/05/1002775/covid-apps-effective-at-less-than-60-percent-download/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Trenz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Weiger</surname>
              <given-names>WH</given-names>
            </name>
            <name name-style="western">
              <surname>Tarafdar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cheung</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>One app to trace them all? Examining app specifications for mass acceptance of contact-tracing apps</article-title>
          <source>Eur J Inf Syst</source>
          <year>2020</year>
          <month>07</month>
          <day>27</day>
          <volume>29</volume>
          <issue>4</issue>
          <fpage>415</fpage>
          <lpage>428</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2020.1784046</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Basu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Effective contact tracing for COVID-19 using mobile phones: an ethical analysis of the mandatory use of the Aarogya Setu application in India</article-title>
          <source>Camb Q Healthc Ethics</source>
          <year>2021</year>
          <month>04</month>
          <volume>30</volume>
          <issue>2</issue>
          <fpage>262</fpage>
          <lpage>271</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/32993842"/>
          </comment>
          <pub-id pub-id-type="doi">10.1017/S0963180120000821</pub-id>
          <pub-id pub-id-type="medline">32993842</pub-id>
          <pub-id pub-id-type="pii">S0963180120000821</pub-id>
          <pub-id pub-id-type="pmcid">PMC7642501</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Megnin-Viggars</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Carter</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Melendez-Torres</surname>
              <given-names>GJ</given-names>
            </name>
            <name name-style="western">
              <surname>Weston</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Rubin</surname>
              <given-names>GJ</given-names>
            </name>
          </person-group>
          <article-title>Facilitators and barriers to engagement with contact tracing during infectious disease outbreaks: a rapid review of the evidence</article-title>
          <source>PLoS One</source>
          <year>2020</year>
          <volume>15</volume>
          <issue>10</issue>
          <fpage>e0241473</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0241473"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0241473</pub-id>
          <pub-id pub-id-type="medline">33120402</pub-id>
          <pub-id pub-id-type="pii">PONE-D-20-28526</pub-id>
          <pub-id pub-id-type="pmcid">PMC7595276</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
          <article-title>Tracking COVID-19: contact tracing in the digital age</article-title>
          <source>World Health Organization</source>
          <access-date>2021-02-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/news-room/feature-stories/detail/tracking-covid-19-contact-tracing-in-the-digital-age">https://www.who.int/news-room/feature-stories/detail/tracking-covid-19-contact-tracing-in-the-digital-age</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Aloysius</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Burton</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Design and evaluation of auto-ID enabled shopping assistance artifacts in customers' mobile phones: two retail store laboratory experiments</article-title>
          <source>MIS Q</source>
          <year>2017</year>
          <month>1</month>
          <day>1</day>
          <volume>41</volume>
          <issue>1</issue>
          <fpage>83</fpage>
          <lpage>113</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2017/41.1.05</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Timberg</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Harwell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Safarpour</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Most Americans are not willing or able to use an app tracking coronavirus infections. That’s a problem for Big Tech’s plan to slow the pandemic</article-title>
          <source>The Washington Post</source>
          <year>2020</year>
          <month>05</month>
          <day>29</day>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.washingtonpost.com/technology/2020/04/29/most-americans-are-not-willing-or-able-use-an-app-tracking-coronavirus-infections-thats-problem-big-techs-plan-slow-pandemic/">https://tinyurl.com/5un2duv8</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>What the Cambridge Analytica scandal means for the future of Facebook marketing</article-title>
          <source>Forbes</source>
          <year>2018</year>
          <month>05</month>
          <day>01</day>
          <access-date>2020-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.forbes.com/sites/forbescommunicationscouncil/2018/05/01/what-the-cambridge-analytica-scandal-means-for-the-future-of-facebook-marketing/#2ffe20df291c">https://www.forbes.com/sites/forbescommunicationscouncil/2018/05/01/what-the-cambridge-analytica-scandal-means-for-the-future-of-facebook-marketing/#2ffe20df291c</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walrave</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Waeterloos</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ponnet</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Adoption of a contact tracing app for containing COVID-19: a health belief model approach</article-title>
          <source>JMIR Public Health Surveill</source>
          <year>2020</year>
          <month>09</month>
          <day>01</day>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>e20572</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://publichealth.jmir.org/2020/3/e20572/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20572</pub-id>
          <pub-id pub-id-type="medline">32755882</pub-id>
          <pub-id pub-id-type="pii">v6i3e20572</pub-id>
          <pub-id pub-id-type="pmcid">PMC7470174</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sadasivan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Illustrating with diversity and inclusion for the COVID Alert app</article-title>
          <source>Canadian Digital Service</source>
          <year>2020</year>
          <month>11</month>
          <day>26</day>
          <access-date>2021-02-13</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.canada.ca/2020/11/26/illustrating-with-diversity-and-inclusion-for-the-covid-alert-app/">https://digital.canada.ca/2020/11/26/illustrating-with-diversity-and-inclusion-for-the-covid-alert-app/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Turnbull</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>COVID Alert app nears 3 million users, but only 514 positive test reports</article-title>
          <source>CTV News</source>
          <access-date>2021-01-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ctvnews.ca/health/coronavirus/covid-alert-app-nears-3-million-users-but-only-514-positive-test-reports-1.5125256">https://www.ctvnews.ca/health/coronavirus/covid-alert-app-nears-3-million-users-but-only-514-positive-test-reports-1.5125256</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ping</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Motivational affordances: fundamental reasons for ICT design and use</article-title>
          <source>Commun ACM</source>
          <year>2008</year>
          <month>11</month>
          <volume>51</volume>
          <issue>11</issue>
          <fpage>145</fpage>
          <lpage>147</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kukuk</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Analyzing adoption of COVID-19 contact tracing apps using UTAUT</article-title>
          <source>University of Twente Student Theses</source>
          <year>2020</year>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://essay.utwente.nl/81983/1/Kukuk_BA_EEMCS.pdf">http://essay.utwente.nl/81983/1/Kukuk_BA_EEMCS.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kreps</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>McMurry</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Contact-tracing apps face serious adoption obstacles</article-title>
          <source>Brookings</source>
          <year>2020</year>
          <month>05</month>
          <day>20</day>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.brookings.edu/techstream/contact-tracing-apps-face-serious-adoption-obstacles/">https://www.brookings.edu/techstream/contact-tracing-apps-face-serious-adoption-obstacles/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fogg</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <source>Persuasive Technology: Using Computers to Change What We Think and Do</source>
          <year>2002</year>
          <publisher-loc>United States</publisher-loc>
          <publisher-name>Morgan Kaufmann</publisher-name>
          <fpage>1</fpage>
          <lpage>312</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <article-title>Download the COVID Alert mobile app to protect yourself and your community</article-title>
          <source>Government of Ontario</source>
          <year>2020</year>
          <access-date>2021-02-07</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://covid-19.ontario.ca/covidalert">https://covid-19.ontario.ca/covidalert</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cialdini</surname>
              <given-names>RB</given-names>
            </name>
          </person-group>
          <source>Influence: The Psychology of Persuasion</source>
          <year>2006</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>HarperCollins</publisher-name>
          <fpage>1</fpage>
          <lpage>263</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ciocarlan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Masthoff</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Oren</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Win</surname>
              <given-names>KT</given-names>
            </name>
            <name name-style="western">
              <surname>Karapanos</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Karppinen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kyza</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Actual persuasiveness: impact of personality, age and gender on message type susceptibility</article-title>
          <source>Persuasive Technology: Development of Persuasive and Behavior Change Support Systems 14th International Conference, PERSUASIVE 2019, Limassol, Cyprus, April 9–11, 2019, Proceedings</source>
          <year>2019</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>283</fpage>
          <lpage>294</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaptein</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Markopoulos</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>De</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Aarts</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Gross</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gulliksen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kotzé</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Oestreicher</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Palanque</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Prates</surname>
              <given-names>RO</given-names>
            </name>
            <name name-style="western">
              <surname>Winckler</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Can you be persuaded? Individual differences in susceptibility to persuasion</article-title>
          <source>Human-Computer Interaction – INTERACT 2009: 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part I</source>
          <year>2009</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>115</fpage>
          <lpage>118</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Harjumaa</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Persuasive systems design: key issues, process model, and system features</article-title>
          <source>Commun Assoc Inf Syst</source>
          <year>2009</year>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>485</fpage>
          <lpage>500</lpage>
          <pub-id pub-id-type="doi">10.17705/1cais.02428</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Investigating the key persuasive features for fitness app design and extending the persuasive system design model: a qualitative approach</article-title>
          <source>Proc Int Symp Hum Factors Ergonomics Health Care</source>
          <year>2021</year>
          <month>07</month>
          <day>22</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>47</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.1177/2327857921101022</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bartlett</surname>
              <given-names>YK</given-names>
            </name>
            <name name-style="western">
              <surname>Webb</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Hawley</surname>
              <given-names>MS</given-names>
            </name>
          </person-group>
          <article-title>Using persuasive technology to increase physical activity in people with chronic obstructive pulmonary disease by encouraging regular walking: a mixed-methods study exploring opinions and preferences</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>04</month>
          <day>20</day>
          <volume>19</volume>
          <issue>4</issue>
          <fpage>e124</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/4/e124/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.6616</pub-id>
          <pub-id pub-id-type="medline">28428155</pub-id>
          <pub-id pub-id-type="pii">v19i4e124</pub-id>
          <pub-id pub-id-type="pmcid">PMC5418523</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Munson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Consolvo</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Exploring goal-setting, rewards, self-monitoring, and sharing to motivate physical activity</article-title>
          <year>2012</year>
          <conf-name>6th International Conference on Pervasive Computing Technologies for Healthcare</conf-name>
          <conf-date>May 21-24, 2012</conf-date>
          <conf-loc>San Diego, CA</conf-loc>
          <fpage>25</fpage>
          <lpage>32</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.scopus.com/inward/record.url?eid=2-s2.0-84865047997&#38;partnerID=tZOtx3y1"/>
          </comment>
          <pub-id pub-id-type="doi">10.4108/icst.pervasivehealth.2012.248691</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lomotey</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Blustein</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shahid</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Tracking feels oppressive and 'punishy': exploring the costs and benefits of self-monitoring for health and wellness</article-title>
          <source>Digit Health</source>
          <year>2018</year>
          <volume>4</volume>
          <fpage>2055207618797554</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/2055207618797554?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207618797554</pub-id>
          <pub-id pub-id-type="medline">30202544</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207618797554</pub-id>
          <pub-id pub-id-type="pmcid">PMC6122239</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The influence of culture in the effect of age and gender on social influence in persuasive technology</article-title>
          <source>Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization</source>
          <year>2017</year>
          <conf-name>UMAP '17</conf-name>
          <conf-date>July 9-12, 2017</conf-date>
          <conf-loc>Bratislava, Slovakia</conf-loc>
          <fpage>47</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="doi">10.1145/3099023.3099071</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Warkentin</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions</article-title>
          <source>End-User Computing, Development, and Software Engineering: New Challenges</source>
          <year>2012</year>
          <publisher-loc>Hershy, PA</publisher-loc>
          <publisher-name>IGI Global</publisher-name>
          <fpage>312</fpage>
          <lpage>334</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Drozd</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lehto</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ragnemalm</surname>
              <given-names>EL</given-names>
            </name>
          </person-group>
          <article-title>Exploring perceived persuasiveness of a behavior change support system: a structural model</article-title>
          <source>Persuasive Technology. Design for Health and Safety: 7th International Conference, PERSUASIVE 2012, Linköping, Sweden, June 6-8, 2012. Proceedings</source>
          <year>2012</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>157</fpage>
          <lpage>168</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Adaji</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Olabenjo</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Susceptibility to persuasive strategies: a comparative analysis of Nigerians vs. Canadians</article-title>
          <source>Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization</source>
          <year>2018</year>
          <month>07</month>
          <conf-name>UMAP '18</conf-name>
          <conf-date>July 8-11, 2018</conf-date>
          <conf-loc>Singapore, Singapore</conf-loc>
          <fpage>229</fpage>
          <lpage>238</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Olagunju</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Olabenjo</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Adaji</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Deters</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Ben'Fit: design, implementation and evaluation of a culture-tailored fitness app</article-title>
          <source>Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization</source>
          <year>2019</year>
          <conf-name>UMAP'19 Adjunct</conf-name>
          <conf-date>June 6, 2019</conf-date>
          <conf-loc>Larnaca, Cyprus</conf-loc>
          <fpage>161</fpage>
          <lpage>166</lpage>
          <pub-id pub-id-type="doi">10.1145/3314183.3323854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lomotey</surname>
              <given-names>RK</given-names>
            </name>
            <name name-style="western">
              <surname>Orji</surname>
              <given-names>FA</given-names>
            </name>
          </person-group>
          <article-title>Socially-driven persuasive health intervention design: competition, social comparison, and cooperation</article-title>
          <source>Health Informatics J</source>
          <year>2019</year>
          <month>12</month>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>1451</fpage>
          <lpage>1484</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/1460458218766570?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1460458218766570</pub-id>
          <pub-id pub-id-type="medline">29801426</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cruz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Beltrao</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lopes</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Viterbo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Trevisan</surname>
              <given-names>DG</given-names>
            </name>
            <name name-style="western">
              <surname>Bernardini</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Assessing the level of acceptance of a crowdsourcing solution to monitor infectious diseases propagation</article-title>
          <source>2020 IEEE International Smart Cities Conference</source>
          <year>2020</year>
          <conf-name>ISC2</conf-name>
          <conf-date>September 28-October 1, 2020</conf-date>
          <conf-loc>Virtual Conference</conf-loc>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1109/isc251055.2020.9239069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Designing culture-tailored persuasive technology to promote physical activity</article-title>
          <source>University of Saskatchewan: HARVEST</source>
          <year>2020</year>
          <access-date>2021-11-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://harvest.usask.ca/handle/10388/12943">https://harvest.usask.ca/handle/10388/12943</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>de Vries</surname>
              <given-names>PW</given-names>
            </name>
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Siemons</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Beerlage-de Jong</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>van Gemert-Pijnen</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Investigation of social predictors of competitive behavior in persuasive technology</article-title>
          <source>Persuasive Technology: Development and Implementation of Personalized Technologies to Change Attitudes and Behaviors: 12th International Conference, PERSUASIVE 2017, Amsterdam, The Netherlands, April 4–6, 2017, Proceedings</source>
          <year>2017</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>279</fpage>
          <lpage>291</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Investigation of the moderating effect of culture on users’ susceptibility to persuasive features in fitness applications</article-title>
          <source>Information</source>
          <year>2019</year>
          <month>11</month>
          <day>06</day>
          <volume>10</volume>
          <issue>11</issue>
          <fpage>344</fpage>
          <pub-id pub-id-type="doi">10.3390/info10110344</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Yasunaga</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Morita</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Designing contact tracing applications as persuasive technologies to improve uptake and effectiveness</article-title>
          <year>2020</year>
          <conf-name>International Symposium on Human Factors and Ergonomics in Health Care</conf-name>
          <conf-date>April 12-16, 2021</conf-date>
          <conf-loc>Toronto, ON</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hfeshcs2021.conference-program.com/presentation/?id=INDLEC155&#38;sess=sess102"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pan</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Steed</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The impact of self-avatars on trust and collaboration in shared virtual environments</article-title>
          <source>PLoS One</source>
          <year>2017</year>
          <volume>12</volume>
          <issue>12</issue>
          <fpage>e0189078</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0189078"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0189078</pub-id>
          <pub-id pub-id-type="medline">29240837</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-04685</pub-id>
          <pub-id pub-id-type="pmcid">PMC5730128</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jonker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>de Bekker-Grob</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Veldwijk</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Goossens</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Bour</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Rutten-Van Mölken</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 contact tracing apps: predicted uptake in the Netherlands based on a discrete choice experiment</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>10</month>
          <day>09</day>
          <volume>8</volume>
          <issue>10</issue>
          <fpage>e20741</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/10/e20741/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20741</pub-id>
          <pub-id pub-id-type="medline">32795998</pub-id>
          <pub-id pub-id-type="pii">v8i10e20741</pub-id>
          <pub-id pub-id-type="pmcid">PMC7584977</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cobb</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Baviskar</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bauer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>JI</given-names>
            </name>
          </person-group>
          <article-title>What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention</article-title>
          <source>Pervasive Mobile Computing</source>
          <year>2021</year>
          <month>08</month>
          <volume>75</volume>
          <fpage>101439</fpage>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2021.101439</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zlotnick</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Predicting emerging COVID-19 hotspots...without asking</article-title>
          <source>McGill University</source>
          <year>2020</year>
          <month>05</month>
          <day>27</day>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mcgill.ca/oss/article/covid-19-health/predicting-emerging-covid-19-hotspotswithout-asking">https://www.mcgill.ca/oss/article/covid-19-health/predicting-emerging-covid-19-hotspotswithout-asking</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lieber</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Tech companies use "persuasive design" to get us hooked. Psychologists say it's unethical</article-title>
          <source>Vox</source>
          <year>2010</year>
          <month>08</month>
          <day>18</day>
          <access-date>2021-10-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.vox.com/2018/8/8/17664580/persuasive-technology-psychology">https://www.vox.com/2018/8/8/17664580/persuasive-technology-psychology</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Adaji</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Oyibo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vassileva</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>List it: a shopping list app that influences healthy shopping habits</article-title>
          <year>2018</year>
          <conf-name>32nd International BCS Human Computer Interaction Conference</conf-name>
          <conf-date>July 4, 2018</conf-date>
          <conf-loc>Belfast, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.14236/ewic/hci2018.81</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <article-title>Reducing your transportation footprint</article-title>
          <source>Center for Climate and Energy Solutions</source>
          <access-date>2021-02-13</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.c2es.org/content/reducing-your-transportation-footprint/">https://www.c2es.org/content/reducing-your-transportation-footprint/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>Overview of greenhouse gases</article-title>
          <source>United States Environmental Protection Agency</source>
          <access-date>2021-02-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.epa.gov/ghgemissions/overview-greenhouse-gases">https://www.epa.gov/ghgemissions/overview-greenhouse-gases</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kimura</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Nakajima</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Designing persuasive applications to motivate sustainable behavior in collectivist cultures</article-title>
          <source>PsychNology J</source>
          <year>2011</year>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>7</fpage>
          <lpage>28</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Page</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Kray</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Ethics and persuasive technology: an exploratory study in the context of healthy living</article-title>
          <year>2010</year>
          <conf-name>First International Workshop on Nudge and Influence through Mobile Devices</conf-name>
          <conf-date>September 7, 2010</conf-date>
          <conf-loc>Lisbon, Portugal</conf-loc>
          <fpage>19</fpage>
          <lpage>23</lpage>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
