{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:15:21Z","timestamp":1761293721878,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319789774"},{"type":"electronic","value":"9783319789781"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78978-1_6","type":"book-chapter","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T15:53:01Z","timestamp":1522684381000},"page":"70-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Building Online Platforms for Peer Support Groups as a Persuasive Behavior Change Technique"],"prefix":"10.1007","author":[{"given":"Amen","family":"Alrobai","sequence":"first","affiliation":[]},{"given":"Huseyin","family":"Dogan","sequence":"additional","affiliation":[]},{"given":"Keith","family":"Phalp","sequence":"additional","affiliation":[]},{"given":"Raian","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","first-page":"378","DOI":"10.24908\/ss.v9i4.4342","volume":"9","author":"AE Marwick","year":"2012","unstructured":"Marwick, A.E.: The public domain: social surveillance in everyday life. Surveill. Soc. 9, 378\u2013393 (2012)","journal-title":"Surveill. Soc."},{"issue":"December","key":"6_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/764008.763957","volume":"2002","author":"B. J. Fogg","year":"2002","unstructured":"Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies) (2002)","journal-title":"Ubiquity"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-77006-0_15","volume-title":"Persuasive Technology","author":"J Leth Jespersen","year":"2007","unstructured":"Leth Jespersen, J., Albrechtslund, A., \u00d8hrstr\u00f8m, P., Hasle, P., Albretsen, J.: Surveillance, persuasion, and panopticon. In: de Kort, Y., IJsselsteijn, W., Midden, C., Eggen, B., Fogg, B.J. (eds.) PERSUASIVE 2007. LNCS, vol. 4744, pp. 109\u2013120. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77006-0_15"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.bushor.2011.01.005","volume":"54","author":"JH Kietzmann","year":"2011","unstructured":"Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre, B.S.: Social media? Get serious! Understanding the functional building blocks of social media. Bus. Horiz. 54, 241\u2013251 (2011)","journal-title":"Bus. Horiz."},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/026327697014004001","volume":"14","author":"KK Cetina","year":"1997","unstructured":"Cetina, K.K.: Sociality with objects: social relations in postsocial knowledge societies. Theory Cult. Soc. 14, 1\u201330 (1997)","journal-title":"Theory Cult. Soc."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Pereira, R., Baranauskas, M.: Social software building blocks: revisiting the honeycomb framework. In: 2010 International Conference on Information Society (i-Society). IEEE (2010)","DOI":"10.1109\/i-Society16502.2010.6018707"},{"key":"6_CR7","unstructured":"Baranauskas, M.: Socially aware computing. Presented at the Proceedings of VI International Conference on Engineering and Computer Education (2009)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-319-31510-2_25","volume-title":"Persuasive Technology","author":"A Alrobai","year":"2016","unstructured":"Alrobai, A., McAlaney, J., Phalp, K., Ali, R.: Online peer groups as a persuasive tool to combat digital addiction. In: Meschtscherjakov, A., De Ruyter, B., Fuchsberger, V., Murer, M., Tscheligi, M. (eds.) PERSUASIVE 2016. LNCS, vol. 9638, pp. 288\u2013300. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31510-2_25"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1111\/j.1360-0443.2010.03028.x","volume":"105","author":"TL Webb","year":"2010","unstructured":"Webb, T.L., Sniehotta, F.F., Michie, S.: Using theories of behaviour change to inform interventions for addictive behaviours. Addiction 105, 1879\u20131892 (2010)","journal-title":"Addiction"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"6_CR11","volume-title":"Social Foundation of Thought and Action: A Social-Cognitive View","author":"A Bandura","year":"1986","unstructured":"Bandura, A.: Social Foundation of Thought and Action: A Social-Cognitive View. Prentice-Hall, Englewood Cliffs (1986)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1037\/0033-2909.92.1.111","volume":"92","author":"CS Carver","year":"1982","unstructured":"Carver, C.S., Scheier, M.F.: Control theory: a useful conceptual framework for personality\u2013social, clinical, and health psychology. Psychol. Bull. 92, 111\u2013135 (1982)","journal-title":"Psychol. Bull."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1007\/978-1-4419-1005-9_70","volume-title":"Encyclopedia of Behavioral Medicine","author":"JO Prochaska","year":"2013","unstructured":"Prochaska, J.O.: Transtheoretical model of behavior change. In: Gellman, M.D., Turner, J.R. (eds.) Encyclopedia of Behavioral Medicine, pp. 1997\u20132000. Springer, New York, New York, NY (2013). https:\/\/doi.org\/10.1007\/978-1-4419-1005-9_70"},{"key":"6_CR14","first-page":"190","volume":"22","author":"VJ Strecher","year":"1995","unstructured":"Strecher, V.J., Seijts, G.H., Kok, G.J., Latham, G.P., Glasgow, R., DeVellis, B., Meertens, R.M., Bulger, D.W.: Goal setting as a strategy for health behavior change. Health Educ. Behav. 22, 190\u2013200 (1995)","journal-title":"Health Educ. Behav."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/109019818401100101","volume":"11","author":"NK Janz","year":"1984","unstructured":"Janz, N.K., Becker, M.H.: The health belief model: a decade later. Health Educ. Q. 11, 1\u201347 (1984)","journal-title":"Health Educ. Q."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/clipsy.6.2.165","volume":"6","author":"L Davidson","year":"2006","unstructured":"Davidson, L., Chinman, M., Kloos, B., Weingarten, R., Stayner, D., Tebes, J.K.: Peer support among individuals with severe mental illness: a review of the evidence. Clin. Psychol. Sci. Pract. 6, 165\u2013187 (2006)","journal-title":"Clin. Psychol. Sci. Pract."},{"key":"6_CR17","unstructured":"Al-Deen, H., Hendricks, J.A.: Social Media: Usage and Impact (2011)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSKD.2016040101","volume":"8","author":"A Alrobai","year":"2016","unstructured":"Alrobai, A., McAlaney, J., Phalp, K., Ali, R.: Exploring the risk factors of interactive e-health interventions for digital addiction. Int. J. Sociotechnol. Knowl. Dev. 8, 1\u201315 (2016)","journal-title":"Int. J. Sociotechnol. Knowl. Dev."},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1111\/j.1753-6405.1992.tb00043.x","volume":"16","author":"D Lupton","year":"1992","unstructured":"Lupton, D.: Discourse analysis: a new methodology for understanding the ideologies of health and illness. Aust. J. Public Health 16, 145\u2013150 (1992)","journal-title":"Aust. J. Public Health"},{"key":"6_CR20","unstructured":"Alrobai, A.: Engineering Social Networking to Combat Digital Addiction: The Case of Online Peer Groups (2018)"},{"key":"6_CR21","volume-title":"Passages Through Recovery","author":"T Gorski","year":"2009","unstructured":"Gorski, T.: Passages Through Recovery. Hazelden Publishing, Center City (2009)"},{"key":"6_CR22","unstructured":"Gorski, T.: Recovery From Addiction: Gorski\u2019s Operational Definition. https:\/\/terrygorski.com\/2013\/10\/15\/recovery-from-addiction-gorskis-operational-definition\/"},{"key":"6_CR23","unstructured":"Marlatt, G.A., Gordon, J.R.: Determinants of relapse: implications for the maintenance of behavior change (1978)"},{"key":"6_CR24","unstructured":"Gorski, T.: The GORSKI-CENAPS Clinical Model. http:\/\/www.tgorski.com\/clin_mod\/clin_mod.htm"},{"key":"6_CR25","unstructured":"Gorski, T.T.: Relapse prevention planning: a new recovery tool. In: Alcohol Health and Research World-National Institute on Alcohol Abuse and Alcoholism (1986)"},{"key":"6_CR26","first-page":"419","volume":"2","author":"BW Tuckman","year":"1977","unstructured":"Tuckman, B.W., Jensen, M.A.C.: Stages of small-group development revisited. Group Organ. Manag. 2, 419\u2013427 (1977)","journal-title":"Group Organ. Manag."},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"313","DOI":"10.2307\/2573663","volume":"34","author":"FL Bates","year":"1956","unstructured":"Bates, F.L.: Position, role, and status: a reformulation of concepts. Soc. Forces 34, 313\u2013321 (1956)","journal-title":"Soc. Forces"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"228","DOI":"10.2307\/2786878","volume":"57","author":"PL Callero","year":"1994","unstructured":"Callero, P.L.: From role-playing to role-using: understanding role as resource. Soc. Psychol. Q. 57, 228\u2013243 (1994)","journal-title":"Soc. Psychol. Q."},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1177\/1046496494253005","volume":"25","author":"AP Hare","year":"1994","unstructured":"Hare, A.P.: Types of roles in small groups: a bit of history and a current perspective. Small Group Res. 25, 433\u2013448 (1994)","journal-title":"Small Group Res."},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1002\/ejsp.36","volume":"31","author":"AN Joinson","year":"2001","unstructured":"Joinson, A.N.: Self-disclosure in computer-mediated communication: the role of self-awareness and visual anonymity. Eur. J. Soc. Psychol. 31, 177\u2013192 (2001)","journal-title":"Eur. J. Soc. Psychol."},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1177\/1461444814543163","volume":"18","author":"K Crawford","year":"2016","unstructured":"Crawford, K., Gillespie, T.: What is a flag for? Social media reporting tools and the vocabulary of complaint. New Media Soc. 18, 410\u2013428 (2016)","journal-title":"New Media Soc."}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78978-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T20:41:13Z","timestamp":1604090473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78978-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319789774","9783319789781"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78978-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}