{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:59:06Z","timestamp":1776095946222,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642132254","type":"print"},{"value":"9783642132261","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13226-1_11","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T10:58:28Z","timestamp":1275908308000},"page":"94-105","source":"Crossref","is-referenced-by-count":59,"title":["Individual Differences in Persuadability in the Health Promotion Domain"],"prefix":"10.1007","author":[{"given":"Maurits","family":"Kaptein","sequence":"first","affiliation":[]},{"given":"Joyca","family":"Lacroix","sequence":"additional","affiliation":[]},{"given":"Privender","family":"Saini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Security, Privacy and Trust in Modern Data Management","author":"E.H.L. Aarts","year":"2007","unstructured":"Aarts, E.H.L., Markopoulos, P., Ruyter, B.E.R.: The persuasiveness of ambient intelligence. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management. Springer, Heidelberg (2007)"},{"key":"11_CR2","volume-title":"Understanding attitudes and predicting social behavior","author":"I. Ajzen","year":"1980","unstructured":"Ajzen, I., Fishbein, M.: Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs (1980)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cacioppo, J.T., Petty, R.E.: The need for cognition. Journal of Personality and Social Psychology (1982)","DOI":"10.1037\/0022-3514.42.1.116"},{"issue":"5","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.1037\/0022-3514.51.5.1032","volume":"51","author":"J.T. Cacioppo","year":"1986","unstructured":"Cacioppo, J.T., Petty, R.E., Kao, C.F., Rodriguez, R.: Central and peripheral routes to persuasion: An individual difference perspective. Journal of Personality and Social Psychology\u00a051(5), 1032\u20131043 (1986)","journal-title":"Journal of Personality and Social Psychology"},{"key":"11_CR5","first-page":"73","volume-title":"Dual-process Theories in Social Psychology","author":"S. Chaiken","year":"1999","unstructured":"Chaiken, S., Chen, S.: The Heuristic-Systematic model in its broader context. In: Chaiken, S., Trope, Y. (eds.) Dual-process Theories in Social Psychology, pp. 73\u201396. Guilford Press, New York (1999)"},{"key":"11_CR6","volume-title":"Influence, Science and Practice","author":"R. Cialdini","year":"2001","unstructured":"Cialdini, R.: Influence, Science and Practice. Allyn & Bacon, Boston (2001)"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1038\/scientificamerican0201-76","volume":"284","author":"R. Cialdini","year":"2004","unstructured":"Cialdini, R.: The science of persuasion. Scientific American Mind\u00a0284, 76\u201384 (2004)","journal-title":"Scientific American Mind"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1037\/h0046408","volume":"51","author":"M. Deutsch","year":"1955","unstructured":"Deutsch, M., Gerard, H.B.: A study of normative and informational social influences upon individual judgment. Journal of Abnormal and Social Psychology\u00a051, 629\u2013636 (1955)","journal-title":"Journal of Abnormal and Social Psychology"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Fogg, B.J.: Persuasive technologies: Introduction. Communications of the ACM\u00a042 (1999)","DOI":"10.1145\/301353.301396"},{"key":"11_CR10","volume-title":"Persuasive Technology: Using Computers to Change what We Think and Do","author":"B.J. Fogg","year":"2003","unstructured":"Fogg, B.J.: Persuasive Technology: Using Computers to Change what We Think and Do. Morgan Kaufmann, San Francisco (2003)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Hurling, R., Catt, M., De Boni, M., Fairley, B.W., Hurst, T., Murray, P., Richardson, A., Sodhi, J.S.: Using internet and mobile phone technology to deliver an automated physical activity program: Randomized controlled trial. Journal of Medical Internet Research\u00a09 (2008)","DOI":"10.2196\/jmir.9.2.e7"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11755494_1","volume-title":"Persuasive Technology","author":"W. IJsselsteijn","year":"2006","unstructured":"IJsselsteijn, W., de Kort, Y., Midden, C.J.H., Eggen, B., van den Hoven, E.: Persuasive technology for human well-being: Setting the scene. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol.\u00a03962, pp. 1\u20135. Springer, Heidelberg (2006)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1086\/269336","volume":"54","author":"J.M. James","year":"1992","unstructured":"James, J.M., Bolstein, R.: Effect of monetary incentives and follow-up mailings on the response rate and response quality in mail surveys. Public opinion Quarterly\u00a054, 442\u2013453 (1992)","journal-title":"Public opinion Quarterly"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.ypmed.2007.09.010","volume":"46","author":"S.S. Johnson","year":"2008","unstructured":"Johnson, S.S., Paiva, A.L., Cummins, C.O., Johnson, J.L., Dyment, S.J., Wright, J.A., Prochaska, J.O., Prochaska, J.M., Sherman, K.: Transtheoretical model-based multiple behavior intervention for weight management: Effectiveness on a population basis. Preventive Medicine\u00a046(3), 238\u2013246 (2008), multiple Health Behavior Change (MHBC) Research","journal-title":"Preventive Medicine"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-03655-2_13","volume-title":"Human-Computer Interaction \u2013 INTERACT 2009","author":"M. Kaptein","year":"2009","unstructured":"Kaptein, M., Markopoulos, P., de Ruyter, B., Aarts, E.: Can you be persuaded? individual differences in susceptibility to persuasion. In: Gross, T., Gulliksen, J., Kotz\u00e9, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009. LNCS, vol.\u00a05726, pp. 115\u2013118. Springer, Heidelberg (2009)"},{"key":"11_CR16","unstructured":"Kaptein, M., Eckles, D.: Persuasion profiling: Identifying individual differences in influence strategy effectiveness (December 2009), unpublished Manuscript submitted for publication"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Kaptein, M., Markopoulos, P., de Ruyter, B., Aarts, E.: Persuasion in ambient intelligence. Journal of Ambient Intelligence and Humanized Computing (December 2009)","DOI":"10.1007\/s12652-009-0005-3"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1207\/s15324796abm3103_2","volume":"31","author":"W. Kroeze","year":"2006","unstructured":"Kroeze, W., Werkman, A., Brug, J.: A systematic review of randomized trials on the effectiveness of computer-tailored education on physical activity and dietary behaviors. Annals of Behavioral Medicine\u00a031, 205\u2013223 (2006)","journal-title":"Annals of Behavioral Medicine"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Lacroix, J., Saini, P., Holmes, R.: The relationship between goal difficulty and performance in the context of a physical activity intervention program. In: MobileHCI (2008)","DOI":"10.1145\/1409240.1409302"},{"key":"11_CR20","series-title":"ACM International Conference Proceeding Series","first-page":"9","volume-title":"PERSUASIVE","author":"J. Lacroix","year":"2009","unstructured":"Lacroix, J., Saini, P., Goris, A.: Understanding user cognitions to guide the tailoring of persuasive technology-based physical activity interventions. In: Chatterjee, S., Dev, P. (eds.) PERSUASIVE. ACM International Conference Proceeding Series, vol.\u00a0350, p. 9. ACM, New York (2009)"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-540-68504-3_30","volume-title":"Persuasive Technology","author":"D. Lockton","year":"2008","unstructured":"Lockton, D., Harrison, D., Stanton, N.A.: Design with intent: Persuasive technology in a wider context. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol.\u00a05033, pp. 274\u2013278. Springer, Heidelberg (2008)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-68504-3_26","volume-title":"Persuasive Technology","author":"M. Maheshwari","year":"2008","unstructured":"Maheshwari, M., Chatterjee, S., Drew, D.: Exploring the persuasiveness of \u201djust-in-time\u201d motivational messages for obesity management. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol.\u00a05033, pp. 258\u2013261. Springer, Heidelberg (2008)"},{"key":"11_CR23","volume-title":"Obedience to Authority","author":"S. Milgram","year":"1974","unstructured":"Milgram, S.: Obedience to Authority. Tavistock, London (1974)"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1093\/her\/cyp006","volume":"24","author":"L.M. Neville","year":"2009","unstructured":"Neville, L.M., O\u2019Hara, B., Milat, A.J.: Computer-tailored dietary behaviour change interventions: a systematic review. Health Education Research\u00a024, 699\u2013720 (2009)","journal-title":"Health Education Research"},{"key":"11_CR25","first-page":"41","volume-title":"Dual-process theories in social psychology","author":"R.E. Petty","year":"1999","unstructured":"Petty, R.E., Wegener, D.T.: The elaboration likelihood model: Current status and controversies. In: Chaiken, S., Trope, Y. (eds.) Dual-process theories in social psychology, pp. 41\u201372. Guilford Press, New York (1999)"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-68504-3_25","volume-title":"Persuasive Technology","author":"T. R\u00e4is\u00e4nen","year":"2008","unstructured":"R\u00e4is\u00e4nen, T., Oinas-Kukkonen, H., Pahnila, S.: Finding kairos in quitting smoking: Smokers\u2019 perceptions of warning pictures. In: Oinas-Kukkonen, H., Hasle, P., Harjumaa, M., Segerst\u00e5hl, K., \u00d8hrstr\u00f8m, P. (eds.) PERSUASIVE 2008. LNCS, vol.\u00a05033, pp. 254\u2013257. Springer, Heidelberg (2008)"},{"key":"11_CR27","unstructured":"Rhoads, K.: How many influence, persuasion, compliance tactics & strategies are there? Working Psychology (2007)"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1056\/NEJMsa073350","volume":"357","author":"S. Schroeder","year":"2007","unstructured":"Schroeder, S.: We can do better-improving the health of the american people. The New England Journal of Medicine\u00a0357, 1221\u20131228 (2007)","journal-title":"The New England Journal of Medicine"},{"issue":"2","key":"11_CR29","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S1057-7408(08)80053-8","volume":"1","author":"D.M. Stayman","year":"1992","unstructured":"Stayman, D.M., Kardes, F.R.: Spontaneous inference processes in advertising: Effects of need for cognition and Self-Monitoring on inference generation and utilization. Journal of Consumer Psychology\u00a01(2), 125\u2013142 (1992)","journal-title":"Journal of Consumer Psychology"},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1037\/h0077033","volume":"60","author":"S.G. West","year":"1975","unstructured":"West, S.G.: Increaing the attractiveness of college cafeteria food: A reactance theory perspective. Journal of Applied Psychology\u00a060, 656\u2013658 (1975)","journal-title":"Journal of Applied Psychology"}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13226-1_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:02:58Z","timestamp":1606186978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13226-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642132254","9783642132261"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13226-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}