{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T13:52:06Z","timestamp":1768485126181,"version":"3.49.0"},"reference-count":80,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T00:00:00Z","timestamp":1527206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Health Informatics J"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:p> Persuasive technologies are tools for motivating behaviour change using persuasive strategies. socially-driven persuasive technologies employ three common socially-oriented persuasive strategies in many health domains: competition, social comparison, and cooperation. Research has shown the possibilities for socially-driven persuasive interventions to backfire by demotivating behaviour, but we lack knowledge about how the interventions could motivate or demotivate behaviours. To close this gap, we studied 1898 participants, specifically Socially-oriented strategies and their comparative effectiveness in socially-driven persuasive health interventions that motivate healthy behaviour change. The results of a thematic analysis of 278 pages of qualitative data reveal important strengths and weaknesses of the individual socially-oriented strategies that could facilitate or hinder their effectiveness at motivating behaviour change. These include their tendency to simplify behaviours and make them fun, challenge people and make them accountable, give a sense of accomplishment and their tendency to jeopardize user\u2019s privacy and relationships, creates unnecessary tension, and reduce self-confidence and self-esteem, and provoke a health disorder and body shaming, respectively. We contribute to the health informatics community by developing 15 design guidelines for operationalizing the strategies in persuasive health intervention to amplify their strengths and overcome their weaknesses. <\/jats:p>","DOI":"10.1177\/1460458218766570","type":"journal-article","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T06:58:51Z","timestamp":1527317931000},"page":"1451-1484","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":53,"title":["Socially-driven persuasive health intervention design: Competition, social comparison, and cooperation"],"prefix":"10.1177","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6152-8034","authenticated-orcid":false,"given":"Rita","family":"Orji","sequence":"first","affiliation":[{"name":"Dalhousie University, Canada"}]},{"given":"Kiemute","family":"Oyibo","sequence":"additional","affiliation":[{"name":"University of Saskatchewan, Canada"}]},{"given":"Richard K.","family":"Lomotey","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Fidelia A.","family":"Orji","sequence":"additional","affiliation":[{"name":"University of Saskatchewan, Canada"}]}],"member":"179","published-online":{"date-parts":[[2018,5,25]]},"reference":[{"key":"bibr1-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"bibr2-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07127-5_11"},{"key":"bibr3-1460458218766570","first-page":"7","volume":"1","author":"Orji R","year":"2016","journal-title":"Health Informatics J"},{"key":"bibr4-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/764008.763957"},{"key":"bibr5-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481341"},{"key":"bibr6-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2458-14-1054"},{"key":"bibr7-1460458218766570","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4708"},{"key":"bibr8-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1187\/cbe.11-04-0040"},{"key":"bibr9-1460458218766570","first-page":"241","volume-title":"Proceedings of the 12th ACM international conference on ubiquitous computing","author":"Grimes A"},{"key":"bibr10-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518766"},{"key":"bibr11-1460458218766570","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.82.3.372"},{"key":"bibr12-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1177\/109019819702400108"},{"key":"bibr13-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025577"},{"key":"bibr14-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(01)00167-8"},{"key":"bibr15-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1241059"},{"key":"bibr16-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1228175.1228214"},{"key":"bibr17-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125805"},{"key":"bibr18-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_16"},{"key":"bibr19-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0590-6"},{"key":"bibr20-1460458218766570","first-page":"1","author":"Orji R.","year":"2014","journal-title":"Design for Behaviour Change: A Model-driven Approach for Tailoring Persuasive Technologies"},{"key":"bibr21-1460458218766570","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2218"},{"key":"bibr22-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-47860-9_22"},{"key":"bibr23-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1097\/00004479-200101000-00004"},{"key":"bibr24-1460458218766570","first-page":"256","author":"Khaled R.","year":"2008","journal-title":"Pt Des"},{"key":"bibr25-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.08.006"},{"key":"bibr26-1460458218766570","first-page":"185","author":"Chiu M","year":"2009","journal-title":"Hum Factors"},{"key":"bibr27-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124835"},{"key":"bibr28-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/2209310.2209313"},{"key":"bibr29-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31510-2_6"},{"key":"bibr30-1460458218766570","first-page":"4","volume-title":"2nd International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealthcare)","author":"Tammy T","year":"2008"},{"key":"bibr31-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1006\/pmed.1996.0108"},{"key":"bibr32-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-014-9149-8"},{"key":"bibr33-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55134-0_20"},{"key":"bibr34-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68504-3_15"},{"key":"bibr35-1460458218766570","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1559"},{"key":"bibr36-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"bibr37-1460458218766570","volume-title":"Invisible Influence: The Hidden Forces that Shape Behavior","author":"Berger J.","year":"2016"},{"key":"bibr38-1460458218766570","unstructured":"Amazon. www.amazon.ca (accessed 1 May2017)."},{"key":"bibr39-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.05.005"},{"key":"bibr40-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518861"},{"key":"bibr41-1460458218766570","unstructured":"Foth M, Satchell C, Paulos E. Pervasive persuasive technology and environmental sustainability. In: Ext Abstr 2008 International conference on pervasive computing, 2008. http:\/\/www.paulos.net\/papers\/2008\/Pervasive2008SustainabilityWorkshopPapers.pdf (accessed 2 May2017)."},{"key":"bibr42-1460458218766570","first-page":"182","author":"Gustafsson A","year":"2004","journal-title":"Power"},{"key":"bibr43-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/11755494_18"},{"key":"bibr44-1460458218766570","first-page":"24","author":"Oinas-Kukkonen H","year":"2009","journal-title":"Commun Assoc Inf Syst"},{"key":"bibr45-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099113."},{"key":"bibr46-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026052"},{"key":"bibr47-1460458218766570","volume-title":"International Workshop on Personalizing in Persuasive Technologies (PPT\u201917)","author":"Oyibo K","year":"2017"},{"key":"bibr48-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1300\/J005v29n01_08"},{"key":"bibr49-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/3119929."},{"key":"bibr50-1460458218766570","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-739-8.ch011"},{"key":"bibr51-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1080\/10410230802676490"},{"key":"bibr52-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1371216.1371224"},{"key":"bibr53-1460458218766570","first-page":"55","author":"Zwinderman MJ","year":"2012","journal-title":"Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics)"},{"key":"bibr54-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_16"},{"key":"bibr55-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1037\/a0019441"},{"key":"bibr56-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142410"},{"key":"bibr57-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0026-7"},{"key":"bibr58-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31510-2_19"},{"key":"bibr59-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13226-1_16"},{"key":"bibr60-1460458218766570","doi-asserted-by":"crossref","unstructured":"Orji R, Tondello GF, Nacke LE. Personalizing persuasive strategies in gameful systems to gamification user types. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI \u201918. 2018 doi:doi.org\/10.1145\/3173574.3174009.","DOI":"10.1145\/3173574.3174009"},{"key":"bibr61-1460458218766570","volume-title":"Workshop on Personalization in Persuasive Technology (PPT\u201916)","author":"Orji R.","year":"2016"},{"key":"bibr62-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"bibr63-1460458218766570","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"bibr64-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291817"},{"key":"bibr65-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"bibr66-1460458218766570","doi-asserted-by":"publisher","DOI":"10.4324\/9780203642597"},{"key":"bibr67-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1985.tb02268.x"},{"key":"bibr68-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-9406(10)61901-3"},{"key":"bibr69-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"bibr70-1460458218766570","unstructured":"County YS. ACT! Actively Changing Together, YMCA Snohomish County. http:\/\/www.seattlechildrens.org\/about\/community-benefit\/obesity-program\/act\/ (accessed 29 Apr2017)."},{"key":"bibr71-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.12.024"},{"key":"bibr72-1460458218766570","first-page":"667","volume":"59","author":"Gul F.","year":"1991","journal-title":"The theory of disappointment aversion"},{"key":"bibr73-1460458218766570","doi-asserted-by":"crossref","unstructured":"Xie Y. Asset allocation under disappointment aversion. PhD Thesis 2014.","DOI":"10.1061\/9780784413609.119"},{"key":"bibr74-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1057\/jibs.1992.23."},{"key":"bibr75-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2010.05450.x"},{"key":"bibr76-1460458218766570","doi-asserted-by":"publisher","DOI":"10.5772\/36865"},{"key":"bibr77-1460458218766570","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531721"},{"key":"bibr78-1460458218766570","volume-title":"No Contest: The Case Against Competition","author":"Kohn A.","year":"2006"},{"key":"bibr79-1460458218766570","first-page":"30","author":"Orji R.","year":"2016","journal-title":"PPT@ Persuas"},{"key":"bibr80-1460458218766570","first-page":"38","volume-title":"Adjunct Proceedings of the 11th International Conference on Persuasive Technology","author":"Orji R","year":"2016"}],"container-title":["Health Informatics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1460458218766570","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1460458218766570","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1460458218766570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T17:45:23Z","timestamp":1740764723000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1460458218766570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,25]]},"references-count":80,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["10.1177\/1460458218766570"],"URL":"https:\/\/doi.org\/10.1177\/1460458218766570","relation":{},"ISSN":["1460-4582","1741-2811"],"issn-type":[{"value":"1460-4582","type":"print"},{"value":"1741-2811","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,25]]}}}