<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v6i4e31730</article-id>
      <article-id pub-id-type="pmid">35188897</article-id>
      <article-id pub-id-type="doi">10.2196/31730</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Toward Research-Informed Design Implications for Interventions Limiting Smartphone Use: Functionalities Review of Digital Well-being Apps</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Robinson</surname>
            <given-names>Renee</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Ayyoubzadeh</surname>
            <given-names>Seyed Mohammad</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Abdul Kader Jilani</surname>
            <given-names>Munshi Muhammad</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Almoallim</surname>
            <given-names>Sultan</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Computing and Communications</institution>
            <institution>Lancaster University</institution>
            <addr-line>InfoLab21</addr-line>
            <addr-line>Bailrigg</addr-line>
            <addr-line>Lancaster, LA1 4YW</addr-line>
            <country>United Kingdom</country>
            <phone>44 07453728107</phone>
            <email>s.almoallim@lancaster.ac.uk</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3717-5309</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Sas</surname>
            <given-names>Corina</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9297-9612</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Computing and Communications</institution>
        <institution>Lancaster University</institution>
        <addr-line>Lancaster</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Sultan Almoallim <email>s.almoallim@lancaster.ac.uk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>4</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>19</day>
        <month>4</month>
        <year>2022</year>
      </pub-date>
      <volume>6</volume>
      <issue>4</issue>
      <elocation-id>e31730</elocation-id>
      <history>
        <date date-type="received">
          <day>1</day>
          <month>7</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>19</day>
          <month>10</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>13</day>
          <month>1</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>20</day>
          <month>2</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Sultan Almoallim, Corina Sas. Originally published in JMIR Formative Research (https://formative.jmir.org), 19.04.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2022/4/e31730" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Much research in human-computer interaction has focused on well-being and how it can be better supported through a range of technologies, from affective interfaces to mindfulness systems. At the same time, we have seen a growing number of commercial digital well-being apps. However, there has been limited scholarly work reviewing these apps.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This paper aims to report on an autoethnographic study and functionality review of the 39 most popular commercial digital well-being apps on Google Play Store and 17 apps described in academic papers.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>From 1250 apps on Google Play Store, we selected 39 (3.12%) digital well-being apps, and from Google Scholar, we identified 17 papers describing academic apps. Both sets of digital well-being apps were analyzed through a review of their functionalities based on their descriptions. The commercial apps were also analyzed through autoethnography, wherein the first author interacted with them to understand how these functionalities work and how they may be experienced by users in their daily lives.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Our findings indicate that these apps focus mostly on limiting screen time, and we advanced a richer conversation about such apps, articulating the distinctions among monitoring use, tracking use against set limits, and 4 specific interventions supporting limited use.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>We conclude with 6 implications for designing digital well-being apps, namely calling to move beyond screen time and support the broader focus of digital well-being; supporting meaningful use rather than limiting meaningless use; leveraging (digital) navigation in design for friction; supporting collaborative interaction to limit phone overuse; supporting explicit, time-based visualizations for monitoring functionality; and supporting the ethical design of digital well-being apps.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>digital well-being</kwd>
        <kwd>smartphone apps</kwd>
        <kwd>tracking use</kwd>
        <kwd>monitoring against set use limits</kwd>
        <kwd>interventions for limiting use</kwd>
        <kwd>barriers</kwd>
        <kwd>design for friction</kwd>
        <kwd>screen time</kwd>
        <kwd>attention</kwd>
        <kwd>self-regulation</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>A significant growth of research in well-being [<xref ref-type="bibr" rid="ref1">1</xref>] and affective health [<xref ref-type="bibr" rid="ref2">2</xref>] has taken place in the last decade across a range of disciplines, from human-computer interaction (HCI) and science and technology studies to clinical psychology and psychiatry. This range reflects the interdisciplinary work in this space, and we argue the unique position of the HCI discipline to articulate the design knowledge required for digital well-being interventions. Such work includes novel affective interfaces intended to support real-time awareness of emotions or their regulation [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref7">7</xref>], novel design approaches emphasizing the importance of the human body such as soma design [<xref ref-type="bibr" rid="ref8">8</xref>], novel technologies supporting reflection and meaning making [<xref ref-type="bibr" rid="ref9">9</xref>], and those intended to train meditation or mindfulness skills [<xref ref-type="bibr" rid="ref10">10</xref>] or to conceptualize meaning [<xref ref-type="bibr" rid="ref11">11</xref>]. Other strands of HCI work have focused on ill-health, such as mobile apps for cognitive behavioral therapy [<xref ref-type="bibr" rid="ref12">12</xref>] and empirical studies exploring ways to support vulnerable users; such as those living with depression [<xref ref-type="bibr" rid="ref13">13</xref>], dementia [<xref ref-type="bibr" rid="ref14">14</xref>], addiction, or the compulsive use of technology; including screen time research [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Much of such work frames mental well-being as “positive emotional, psychological and social health” [<xref ref-type="bibr" rid="ref17">17</xref>], whereas digital well-being is broadly seen as the result of being able to use technologies in productive and healthy ways without the negative consequences of dependency, distraction, or risks to users’ privacy [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
        <p>A specific body of work has focused on interventions supporting smartphone nonuse, for instance, by increasing interaction cost to discourage smartphone app use [<xref ref-type="bibr" rid="ref19">19</xref>]. Both limiting phone use and increasing interaction cost can be conceptualized within the slow movement, where technology is reframed with the aim of pausing and reflecting on its use [<xref ref-type="bibr" rid="ref20">20</xref>]. Other examples of interventions of smartphone nonuse include apps such as MyTime to make users aware of their tracked use data, which in turn prompt them to reflect upon their use and especially the problematic use [<xref ref-type="bibr" rid="ref21">21</xref>]. In addition, Roffarello and De Russis [<xref ref-type="bibr" rid="ref22">22</xref>] argued that current digital well-being apps’ focus on self-monitoring may not be a sufficient mechanism to change users’ behavior with smartphones. Moreover, Roffarello and De Russis [<xref ref-type="bibr" rid="ref22">22</xref>] also pointed out the limited exploration of the effectiveness and theoretical underpinning of digital well-being apps, whereas van Velthoven et al [<xref ref-type="bibr" rid="ref23">23</xref>] highlighted also the insufficient investigation of the positive effects of regulating problematic smartphone use with digital interventions. The nascent research exploring the effectiveness of digital well-being apps has been limited, with only 1 study focusing on the analysis of users’ qualitative reviews of commercial apps [<xref ref-type="bibr" rid="ref22">22</xref>]. Their findings indicate that such apps are liked, especially in studying, working, sleeping, parental control, and free time contexts, albeit limited in supporting behavior change and habit formation toward more conscious smartphone use.</p>
        <p>In addition, the theoretical underpinning of digital well-being apps has also received limited attention. In this respect, most work has looked at their adoption [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>], leveraging, for instance, technology acceptance theories [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], including the more recent technology acceptance life cycle model [<xref ref-type="bibr" rid="ref28">28</xref>]; although these models are rather generic, they are leveraged for personal or domestic technologies. Scholars such as Douglas et al [<xref ref-type="bibr" rid="ref25">25</xref>], Lukoff et al [<xref ref-type="bibr" rid="ref29">29</xref>], Lyngs et al [<xref ref-type="bibr" rid="ref30">30</xref>], Kim et al [<xref ref-type="bibr" rid="ref31">31</xref>], or Colombo et al [<xref ref-type="bibr" rid="ref3">3</xref>] have also identified other theories more relevant to digital well-being apps, such as the uses and gratification theory [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], theory of planned behavior [<xref ref-type="bibr" rid="ref32">32</xref>], dual system theory [<xref ref-type="bibr" rid="ref33">33</xref>], nudge theory [<xref ref-type="bibr" rid="ref34">34</xref>], framework for behavior change [<xref ref-type="bibr" rid="ref35">35</xref>], or theories for regulation [<xref ref-type="bibr" rid="ref36">36</xref>]. However, it is less explored how such theories could actually inform the developing of commercial well-being apps.</p>
        <p>Given the limited research on the theoretical and evidence-based aspects of digital well-being apps [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>], we argue that unpacking the functionalities of the most used commercial apps is an important initial step toward better designing them. The exploration of functionalities and features of mobile apps is an emerging research area, with initial HCI work focusing on digital interventions and especially development of apps for specific conditions such as depressions [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>] or for supporting, for instance, mindfulness [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>] or physical activity [<xref ref-type="bibr" rid="ref41">41</xref>]. In contrast, the functionalities of digital well-being apps have been less investigated. A noticeable exception is the exploration by Roffarello and De Russis [<xref ref-type="bibr" rid="ref22">22</xref>] of 42 digital well-being apps and their descriptions on Google Play, whose findings indicate the following as key features: (1) tracking user behavior through phone unlocks, phone and app time, and app checking; (2) data presentation through phone and app summary, charts, daily or widget recap, and social comparison; (3) phone interventions through timers and blockers; (4) app interventions through timers, blockers, and notification blockers; and (5) extra features such as motivational quotes or rewards. However, given the brevity of apps’ descriptions available on marketplaces, a richer source to identify their key functionalities is the actual use of the apps, with authors, as HCI experts, adopting the role of the user by directly interacting with the apps—a method previously used for app reviews [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>].</p>
        <p>Specific functionalities of digital well-being apps have been also explored through research prototypes usually implementing tracking and notifications [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>], whereas others included also specific interventions for limiting use [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. For instance, the Socialize [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref47">47</xref>] app integrates the most common functionalities of tracking, data presentation, real-time notifications, and blocking use, which were evaluated in the wild with 38 young people over 3 weeks. Findings indicate improvements in terms of problematic use, measured through the phone addiction scale, and self-regulation, measured through the general self-efficacy scale. Although this is one of the few studies involving measures to explore the effectiveness of a digital well-being app, the Socialize app itself does not appear to be novel, borrowing common functionalities of commercial apps, whose theoretical grounding is limitedly unpacked. The Focus app [<xref ref-type="bibr" rid="ref48">48</xref>] is another research prototype that leverages Nielsen’s heuristics to support tracking phone use and the blocking of any app, indeterminately or for a limited time set by the user, with the option to unblock them at any time, and provision of educational content on digital addiction. To mitigate overuse from a broader perspective, another research prototype, the FeelHabits app [<xref ref-type="bibr" rid="ref49">49</xref>], tracks and notifies users about their use of specific apps; albeit rather than on a smartphone alone, this apps tracks use across devices and blocks them if limits set by the user are exceeded.</p>
        <p>Another strand of scholarly work with richer theoretical underpinning has focused on restrictive and coercive interventions intended to be stronger than persuasive interventions by supporting users to commit to self-impose limits of use while the phone is blocked [<xref ref-type="bibr" rid="ref31">31</xref>]. The framework for influencing behavior change [<xref ref-type="bibr" rid="ref35">35</xref>] suggests the following four types of influence: persuasive (explicit and weak); coercive (explicit and strong); seductive (implicit and weak) and decisive (implicit and strong), which are based on the influencing force (strong and weak); and salience (explicit and implicit). Inspired by this framework, Kim et al [<xref ref-type="bibr" rid="ref31">31</xref>] designed and evaluated GoalKeeper, a smartphone app featuring both a <italic>weak lockout</italic>, that is, the phone is locked increasingly longer (eg, 1, 5, 15, 30 and 60 minutes) each time the user exceeds the time they have previously set for use, with each lockout being mitigated by a temporary 15-minute allowance time, and a <italic>strong lockout</italic>, that is, the phone is locked until midnight without any allowance. Their findings indicate that both mechanisms were more effective than mere notifications of use, with the strong lockout being the most effective, as users set longer limits for not using their phones. Although in the latter case users experienced also more frustration, this was mitigated by the flexibility of setting their own limits and one-time opportunity to modify it.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>Despite this growing academic interest in digital well-being, the commercial apps far outweigh the research prototypes in terms of uptake. Thus, the increased adoption of commercial well-being apps offers an opportunity to explore their potentially richer set of functionalities, and the aim of this paper is to articulate these functionalities as well as the novel design implications informed by them to better inspire the design of technologies for well-being. To address this aim, we focused on the following research questions:</p>
        <list list-type="order">
          <list-item>
            <p>What are the key functionalities of the top-rated digital well-being apps?</p>
          </list-item>
          <list-item>
            <p>What theoretical underpinning supports these functionalities?</p>
          </list-item>
          <list-item>
            <p>What design guidelines for digital well-being apps can be informed by these functionalities?</p>
          </list-item>
        </list>
        <p>Our contributions are 3-fold. First, we unpacked richer insights about tracking and monitoring functionalities in terms of user profiling and understanding of monitoring as a <italic>complete, location-based, and flexible practice</italic> that can benefit from tailored, time-based visualizations. Second, we identified 4 interventions for limiting use including richer understanding of different types of obstacles for limiting use and specific features for less explored functionalities such as supporting awareness for reaching use limits, focused attention, and motivation to keep within set use limits. Third, grounded in our findings, we generated 6 design implications for digital well-being apps.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>App Selection</title>
        <p>To identify the digital well-being apps, in winter 2019, we searched for free apps in Google Play Store using the following search terms: <italic>digital wellbeing</italic>, <italic>digital detox</italic>, <italic>detox apps</italic>, <italic>unplugging</italic>, and <italic>distraction</italic>, which is a new direction given that extensive previous work on such apps has prioritized addiction and screen time [<xref ref-type="bibr" rid="ref22">22</xref>]. We have focused on Google Play because its apps represent the largest global market share, &#62;2.5 greater than iOS apps [<xref ref-type="bibr" rid="ref50">50</xref>], whereas the latter is also more restrictive in terms of available information [<xref ref-type="bibr" rid="ref22">22</xref>]. However, future work could extend this exploration to other platforms.</p>
        <p>For each search term, the top 250 most relevant apps returned on Google Play were retained, totaling 1250 apps, with 37 duplicates. At the screening stage, after reading their titles, summary descriptions, and main screenshots, we excluded 931 less relevant apps such as fitness, activity planner, or nondigital detox apps. The eligibility of the remaining 282 apps was assesses based on their full descriptions, with further 147 apps being excluded such as utility apps, games, and general well-being and meditation practice apps. From the remaining 135 apps, we further excluded those with less than 1000 raters and with average rating score &#60;4, leading to 39 apps to be included in our review. The PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) diagram for the searching and screening process for digital well-being apps is shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>. We also note that of our 39 apps, 12 (31%) are also available on the Apple Store, with 7 (58%) of them having user rating &#62;4.2.</p>
        <p>Our final set consisted of 39 digital well-being apps (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]), which were analyzed through two complementary methods: first, a review of their functionalities based on their descriptions from Google Play and, second, an autoethnography with the authors (SA and CS), as HCI experts directly interacting with them in order to viscerally understand how these functionalities work and are experienced by potentially users in their daily lives. Such interactions were iterated, involving at least two sessions for each app, lasting for at least 30 minutes. For the autoethnography, we used a Samsung Galaxy Note 9 phone with an Android mobile operating system.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) diagram for the searching and screening of digital well-being apps.</p>
          </caption>
          <graphic xlink:href="formative_v6i4e31730_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>App Analysis</title>
        <p>The first author (SA) evaluated all 39 digital well-being apps, whereas the second author (CS) evaluated 21% (8/39) of the apps. Through the use of both methods, the authors (SA and CS) iteratively revised the coding scheme over several months, a process that has followed a hybrid approach. This integrated deductive codes, informed by prior work on functionalities [<xref ref-type="bibr" rid="ref22">22</xref>] such as tracking, data presentation, and interventions (<xref ref-type="table" rid="table1">Table 1</xref>). The inductive coding was informed the distinction between tracking and monitoring, the revision of intervention functionalities such as tracking phone or app use by setting limits and of data presentation or visualization and its subcategories such as numerical and diagrammatic format through charts, round diagrams, metaphors, heat maps, or reports. Particularly important are the new functionalities capturing 4 interventions for limiting use.</p>
        <p>To better contextualize our review in scholarly work, we subsequently extended the list of apps with 17 digital well-being apps designed in academia, which we found through search on Google Scholar using the following keywords: <italic>digital wellbeing application</italic> or <italic>digital wellbeing app</italic>. This search returned 42 papers, which after reading their abstracts, led to 17 papers describing such apps [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref58">58</xref>-<xref ref-type="bibr" rid="ref65">65</xref>]. The remaining 25 papers do not included digital well-being apps and for this reason they were excluded. We have explored the functionalities of the apps described in the 17 papers by applying the above coding system to their description, as not all of them were available to download from app marketplaces. All the tables provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendices 1</xref>-<xref ref-type="supplementary-material" rid="app7">7</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>] include information on both commercial and academic apps.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>The main codes and subcodes from the app analysis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="320"/>
            <col width="650"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Functionality codes and subcodes</td>
                <td>Definitions</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>Tracking</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Recording phone or app use</td>
                <td>The tracking functionality supports the recording of phone or app uses.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Visualizing tracked use data</td>
                <td>The tracking functionality supports the visualization of tracked data.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Profiling users</td>
                <td>The tracking functionality supports profiling users based on tracked data.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Monitoring</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Setting time limits of phone and app use, their scope and place</td>
                <td>The monitoring functionality provides use time limits or supports users to customize them in terms of scope and place.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Visualizing monitored data</td>
                <td>The monitoring functionality supports the visualization of monitored data against set time limits of use.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Providing flexibility for limiting monitoring</td>
                <td>The monitoring functionality supports flexibility for limiting monitoring through allowances to extend use beyond the set time limit, excluding apps from being monitored, or discontinuing the monitoring.</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Interventions for limiting use</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Creating obstacles to limit phone and app use</td>
                <td>This intervention supports creating different types of obstacles to limit phone or app overuse.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Supporting awareness of reaching the set use limits of phone and app use</td>
                <td>This intervention supports users’ awareness of reaching the set use limits through different types of notifications varying in content and form.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Supporting focused attention away from phones and apps</td>
                <td>This intervention supports users’ focused attention on main task and away from habitual phone and app use through training or white noise.</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Supporting motivation to keep within limited use</td>
                <td>This intervention supports motivation to keep within limited phone and app use through rewards and penalties, motivational quotes or education, and social motivation.</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>This section starts with a brief overview of the descriptive characteristics and ethical aspects of the 39 apps, continues with the identified main functionalities of top-rated digital well-being apps and how they compare with the apps developed in academia.</p>
      <sec>
        <title>Descriptive Characteristics of Digital Well-being Apps: Ethics</title>
        <p>The descriptive characteristics captured by our analysis include app category, target users, scientific underpinning and evidence base, and cost. Findings indicate that the top-rated digital well-being apps belong to 6 categories, albeit feature predominantly in the Productivity category (27/39, 69% apps), followed by fewer apps in the Tools (4/39, 10%), Personalization (3/39, 8%), Health and fitness (2/39, 5%), Parenting (2/39, 5%), and Lifestyle (1/39, 3%) categories. Together with their main aim of limiting phone overuse, this is an interesting outcome that can be linked to the ethical principle <italic>of nonmaleficence</italic> [<xref ref-type="bibr" rid="ref2">2</xref>] to protect users from the negative impact of phone overuse. These can also be aligned with the ethical principle of <italic>beneficence</italic>, particularly the predominant instrumental value of digital well-being apps supporting increased productivity rather than their eudemonic value for supporting meaningful goals [<xref ref-type="bibr" rid="ref66">66</xref>]. Arguably, the latter would further strengthen their beneficence potential.</p>
        <p>Another important outcome, which can potentially hinder their beneficence is the limited science base of digital well-being apps, with 97% (38/39) of the apps not specifying if they are backed up by research, the only exception being the Focus To-Do app described as a <italic>science-based app</italic>. This indicates the importance of these apps unpacking in their descriptions the scientific underpinnings informing their design and any available outcomes from evaluation studies. This, in turn, will support users make more informed choices regarding their beneficence.</p>
        <p>The target users of digital well-being apps appear to be unrestricted, with most of them available to users of all ages, which reflects the principle of <italic>justice</italic>. Indeed, all but 4 apps are rated on Google Play as “PGEI 3,” which stands for “Pan European Game Information.” The remaining four apps do not specify any age: Brain Focus Productivity Timer, Lock Me Out, SleepTown, and Sma-Phospital. Interestingly, the design of the apps does not vary with age, as we see the same functionalities for both children and adults. We also examined whether the target users include the clinical population. Findings indicate that of the 39 apps, 38 (97%) do not specify clinical user groups, whereas 1 (3%) app, that is, AppBlock, mentions its suitability for children or adults with attention deficit hyperactivity disorder. This suggests that digital well-being apps predominantly target users without specific conditions or health concerns. However, given their value for supporting attention, some of these apps may be beneficial for users with attention deficit. Future work should further explore this.</p>
        <p>Also related to justice, the cost of the digital well-being apps is an important aspect that can increase or limit diverse users accessing them. Regarding cost, an important outcome is that although all the 39 apps are free to download, only 11 (28%) are entirely free to use, whereas 28 (72%) offer in-app purchase mostly for removing adds, unlocking premium features, or subscribing to premium versions of the apps. This is an important outcome indicating that most functionalities of these apps are freely available, making their use particularly inclusive.</p>
        <p>Digital well-being apps have an interesting relationship with the ethical principle of autonomy. On the one hand, these apps tend to limit one’s use of phone or apps; on the other hand, consistent findings have shown that autonomy is already impaired [<xref ref-type="bibr" rid="ref67">67</xref>] when people live with some form of addiction such as phone overuse.</p>
      </sec>
      <sec>
        <title>Functionalities of Digital Well-being Apps</title>
        <sec>
          <title>Overview</title>
          <p>We now turn our attention to the key functionalities of digital well-being apps. The iterative analysis led to specific functionalities that can be broadly grouped into the following six main functionalities: tracking use of the phone or apps, monitoring use against set limits, and the four functionalities that highlight interventions for limiting use, namely, creating obstacles for the phone or app use, supporting awareness of reaching the set use limits, supporting focused attention, and support motivation to keep within limits of use. Each of these functionalities is further detailed.</p>
        </sec>
        <sec>
          <title>Tracking Overall Phone and App Use: User Profiling</title>
          <p>Findings indicate that 28 digital well-being apps automatically track or record overall phone use, use of specific apps, or both (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). In particular, (1) the overall use of the time spent on the phone was captured by 11% (3/28) of the apps through overall screen time across all apps measured per minute, hour, day, or week or the number of times the phone unlocks per hour or day; (2) the use of specific apps that provide users the choice to select them to capture only their screen time was captured by 54% (15/28) of the apps; and (3) 21% (6/28) of the apps tracked both the overall use of the phone and the use of specific apps. Other digital well-being apps provide users with the choice to select the time when the tracking can occur, for instance, between 9 AM and 5 PM, but not outside of the specified time window. Tracking can also be contextualized, with three apps (AppBlock, Instant-Quantified Self, and Lock Me Out), allowing its coupling with physical locations specified by users.</p>
          <p>Regarding visualization, the tracked use data tends to be provided in numerical and diagrammatic format through reports (27/28, 96%), charts (21/28, 75%), round diagrams (9/28, 32%), metaphors (4/28, 14%), or heat maps (1/28, 4%; <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>). The four apps providing metaphoric visualizations are Forest: Stay focused, Focus To-Do: Pomodoro Timer &#38; To Do List, SPACE, and SleepTown, with the latter’s visualization consisting of raising in-app towns when maintaining regular sleep hours. In addition, from the 27 of the apps including reports, 20 (74%) provided daily and weekly reports of screen time and 7 (26%) provided only daily such reports.</p>
          <p>Findings also indicate that of the 39 apps, 10 (26%) extend the tracking functionality to also inform user profiling. Of these 10 apps, 4 (40%) use either the tracked data of app use (App Usage and Screen Time) to generate categories of used apps for broader purposes such as productivity and social, or ask users to identify these categories (SaveMyTime and Boosted). In addition, of the 10 apps, 3 (30%) provide users the option of creating different profiles for different settings that could be used to support different levels of limited use of the phone or apps, both with payment (HelpMeFocus) or without payment (Stay Focused), for instance, by allowing them to specify the location or specific Wi-Fi network where set limits are activated (AppBlock). This is important, as it indicates the flexibility of the interventions for limited use to the situatedness of users’ different contexts such as homes or work. Finally, the YourHour app also aims to identify levels of phone addiction based on tracked data, whereas the Digital Detox app offers predefined levels of limited use that users can choose from. These 2 apps are interesting, as they attempt diagnosis of smartphone addiction and prediction of the intervention intensity. Although smartphone addiction is not yet a clinical condition featured in the <italic>Diagnostic and Statistical Manual of Mental Disorders</italic>, its problematic behaviors as diagnostic criteria have started to be explored [<xref ref-type="bibr" rid="ref68">68</xref>]. In addition, several scales have been developed for measuring phone addiction [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref69">69</xref>] that meet the psychometric properties of validity and reliability. If digital well-being apps aim to identify users’ level of addiction, which will allow for a better tailored intervention, these scales are useful to consider.</p>
          <p>Interestingly, of the 39 apps, the remaining 11 (28%) that do not provide tracking functionalities include 8 (73%) apps supporting focused attention usually on offline activities (Forest, Boosted, Pomodoro Smart Timer, Brain Focus Timer, SleepTown, Engross, Visual Timer, and Hold), 2 (18%) launcher apps minimizing the number of apps being displayed (LessPhone Launcher and Before Launcher), and 1 (9%) app for turning off email notifications (Quite for Gmail).</p>
        </sec>
        <sec>
          <title>Monitoring Phone and App Use Against Set Use Limits or Set Time Limits for Focused Attention</title>
          <p>Apart from tracking, most digital well-being apps also allow setting use limits to track phone or app use against them (25/39, 64%); <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49 </xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). The distinction between tracking and monitoring is that monitoring is based on user intentions to self-limit their use, whereas tracking merely captures the time spent on apps or phone without any such limits. Thus, tracking becomes a prerequisite activity, performed first to explore one’s use patterns, and based on this information, use limits can be set. Indeed, all apps supporting monitoring also support tracking; however, 33% (13/39) of the apps, although supporting tracking, do not support monitoring. This is an important outcome as arguably, monitoring is better positioned to support behavior change toward limiting use than mere tracking; however, approximately 36% (14/39) of the top-rated apps do not support monitoring.</p>
          <p>Whereas most apps (25/39, 64%) support setting limits for using the phone or its apps, the remaining 36% (14/39) of the apps include 8 (57%) apps that allow people to focus attention by setting time for offline activities and therefore away from phones and apps; 3 (21%) apps providing only the tracking functionality (Smarter Time, Sma-Phospital, and Usage Analyzer); 2 (14%) launcher apps minimizing the number of apps being displayed; and 1 (7%) app for turning off email notifications (Quite for Gmail). The prevalence of apps for focused attention on offline activities is an interesting and less explored monitoring aspect of digital well-being apps.</p>
          <p>The monitoring functionality allows user setting of the scope and place of limited use, visualization of monitored content, and, interestingly, options for limiting monitoring. With respect to the scope of the limited use, more than half of the monitoring apps offer options to reduce the use of some of the installed apps (13/25, 52%). This means that while using these digital well-being apps, some apps’ use remains unmonitored. In contrast, the remaining digital well-being apps extend this option to monitor use to all apps on the user’s phone (6/25, 24%) or to the phone itself (7/25, 28%). Setting use limits can also be activated at specific locations, either specified through the phone GPS (3/25, 12% apps) or Wi-Fi network (1/25, 4% apps), although only a few apps offer these options.</p>
          <p>Findings also indicate that 56% (22/39) of the digital well-being apps support a more forgiving or <italic>flexible monitoring</italic> by allowing users to limit their monitoring in 3 ways. This includes allowances to extend use beyond the set time limit (9/22, 41% apps) and the option to exclude specific apps from being monitored (19/22, 86% apps). Allowances are breaks during the set nonuse time limit so that users can continue to use the phone or the apps despite being during their set nonuse time limit, with or without (financial) penalties, although the number of breaks, and their duration is either capped or uncapped. This can also include terminating the nonuse time limit earlier than it is actually due (4/22, 18% apps). A total of 49% (19/39) of the digital well-being apps also offer the option of excluding specific apps from being monitored against time limits, especially apps such as App Usage–Manage/Track Usage, AntiSocial, and My Phone Time. In addition, 36% (14/39) of the apps allow users to discontinue monitoring when they reached the set use limit.</p>
          <p>Regarding visualizations, monitoring function engulfs tracking one, so that it supports the visualization of tracked data. However, visualizations specific to the monitoring functionality are offered by less than half of the digital well-being apps (19/39, 49%). This is an important outcome, suggesting the value of considerably extending such visualizations within the monitoring functionality. These 19 apps provide monitoring-specific visualizations of (1) time unspent out of the use time limit, that is, count down (n=12, 63% apps), (2) time spent out of the use time limit (n=6, 32% apps), or (3) even time overspent as a percentage of the time limit (n=1, 5% apps). These are provided in either text form (12/19, 63% apps) and diagrammatic one as circles (4/19, 21% apps) or progress bars filled or unfilled gradually with colors (3/19, 16% apps) until the set time limit is reached. Interestingly, the monitoring of focused attention, usually during offline activities, can also be visualized, usually through time unspent out of the focus time (or time for not using the phones and apps), through countdown timers (3/19, 16% apps), or circle progressively unfilled with color (1/19, 5% apps).</p>
        </sec>
        <sec>
          <title>Interventions for Limiting Use of Phones and Apps</title>
          <p>Findings indicate four interventions for limiting the overall use of the phone or its installed apps, which include creating obstacles to limit use, supporting awareness of reaching the set limits, supporting focused attention, and supporting motivation for limiting use, which are further detailed.</p>
        </sec>
        <sec>
          <title>Creating Obstacles to Limit Phone and App Use</title>
          <p>The first intervention consists of creating obstacles for excessive phone or app use (21/39, 54% apps). Obstacles can be classified according to their force (strong or weak); saliency (explicit or implicit); temporal aspects such as being activated before, during, or after excessive use; and social aspects such as parental control or social commitment (<xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). Obstacles also differ with respect to their source (being generated by the digital well-being app or by users) and could be tailored to user profiles.</p>
          <p>The identified strong obstacles feature predominantly in commercial apps (18/39, 46%). These obstacles that cannot be circumvented include the lockout of phones and apps beyond the set time limit of use (14/18, 78% apps), interrupting use while the set use time has been reached (12/18, 67% apps), and unchangeable time limits of phone and app use (6/18, 33% apps). In contrast, weak obstacles have features in much fewer apps (5/39, 13%), with only one app providing both strong and weak obstacles, that is, StayFree. Weak obstacles do not directly restrict use but make it more difficult through notifications from phones or apps after overuse (4/5, 80% apps), notifications inside the digital well-being app when reaching the time limit (4/5, 80% apps), and microboundary interactions that make it more difficult for users to access their apps targeted by limited use (2/5, 40% apps). Microboundary interactions are particularly interesting, as although theoretically explored in academic research, they have been limited, implemented through design. Such interactions feature in two apps (LessPhone Launcher and Before Launcher) and consist of <italic>launchers</italic> as substitute home screens for users’ phones that display only a reduced number of apps so that accessing other apps requires additional clicks for navigating from the launcher to them.</p>
          <p>According to their saliency, most obstacles are explicit such as lockout (8/39, 21% apps), set time limits for phone and app use (14/39, 36% apps), and textual or visual notifications (4/39, 10% apps), whereas others are implicit such as launchers (2/39, 5% apps) or activation of the dimming mode of the phone’s screen when a set time limit was reached (1/39, 3% apps). This much lower number of implicit obstacles is interesting, suggesting a less explored design space and their potential value of complementing explicit obstacles.</p>
          <p>With respect to the temporal aspect, most obstacles are created before the use of a phone or app and activated during the set limited time for using the phone or apps. The exception is flexible time limits, which can be changed not only during but also after the set time limit for use has ended.</p>
          <p>The obstacles also have a social dimension, albeit only 13% (5/39) of the apps implemented them, in two forms: parental control (4/5, 80% apps) or social commitment (1/5, 20% apps). Regarding the latter, the Forest app leverages the feeling of failure to social commitment as a type of obstacle to prevent users from accessing apps while with friends.</p>
          <p>Regarding the source, obstacles can be created by the digital well-being app or the user. The former leads to automatically generated obstacles, usually through user profiling (11/39, 28% apps), whereas the latter leads to customized obstacles (13/39, 33% apps). Apps allowing users to set use limits usually restrict this option to specific apps rather than all apps. Examples of the automatic setting of use limits feature in the YourHour app, which provides users short quizzes to identify if the app is used for work or entertainment. Another example is the SPACE app, supporting limited phone use through automatically suggested limits. Interestingly, two apps allow users to create multiple profiles, each profile with a particular setting to be assigned to different tasks (HelpMeFocus and Stay Focused). This is an interesting option, allowing users different modes of engaging with specific apps, which could, for instance, help with the context setting such as work or leisure, and different phone use for each.</p>
          <p>Finally, different types of obstacles may be tailored to different user profiles for matching, for instance, the level of addition (1/39, 3% app) or users’ preference for a specific level of digital detox (namely, easy, medium, and hard) that are proposed to users to choose from (Digital Detox app). Interestingly, no apps attempt to recommend interventions at different levels (weak or strong) based on tracked data. This is a less explored feature with potential to provide adaptive interventions better tailored to users’ needs.</p>
        </sec>
        <sec>
          <title>Supporting Awareness of Reaching the Set Use Limits of Phone and App Use</title>
          <p>The second intervention is supporting awareness of reaching the set limits of use and is provided by 33% (13/39) of the apps (<xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). Such awareness is predominantly supported through explicit notifications of reaching the set time limits (12/13, 92% apps), usually in textual or diagrammatic form, with both push notifications that appear when the screen is both locked and unlocked, usually at the top in the status bar; (4/12, 33% apps) or pull notifications that appear suddenly in the middle of the screen as a small window alerting the user of something, sometimes these are big, covering most of the screen (7/12, 58% apps). Notifications can be provided both in the digital well-being apps about the use of the phone or its installed apps (13/39, 33% apps) and as embedded within a specific app when the time limit relates to that app (11/39, 28% apps). In contrast to explicit notifications, implicit ways to support awareness of reaching the time limit include screen dimming. Although less common (1/39, 3% apps), these are interesting, more subtle ways to notify users of reaching their use limits for specific apps or phones and to persuade disengagement. Although both notifications and screen dimming are provided in real time, daily reminders to review tracked data support a higher level of awareness beyond a specific instance of <italic>in the moment</italic> use and more about the historic user over the day (7/39, 18% apps).</p>
        </sec>
        <sec>
          <title>Supporting Focused Attention on Primary Tasks and Away From Habitual Phone and App Use</title>
          <p>The third intervention supports focused attention and features in &#62;70% (29/39) of digital well-being apps (<xref ref-type="supplementary-material" rid="app6">Multimedia Appendix 6</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). These include all apps that support monitoring (25/39, 64%) and four additional ones: Boosted, Pomodoro Smart Timers, Engross, and Hold. By aiming to limit phone and app overuse, digital well-being apps implementing the monitoring functionality implicitly support focused attention on the main task because they prevent the user’s attention from being hijacked by habitual phone and app use.</p>
          <p>Findings also indicate that, of the 39 apps, 8 (21%; four that support monitoring and four that do not: Boosted, Pomodoro Smart Timers, Hold, and Engross) explicitly target the training of focused attention. These apps encourage users to stay away from their phone to focus on specific offline tasks for a set time. This use of a time limit is different from that in the monitoring functionality, as people are supported to practice the adaptive behavior of maintaining attention for a set time away from the phone rather than resisting for a set time the temptation to use the phone.</p>
          <p>In addition, of these 8 apps for training focused attention, 5 (63%) also provide users with white noise to better facilitate concentration. This is an interesting outcome, and although these apps provide limited evidence for its value, scholarly work indicates that white noise, defined as “task-irrelevant auditory input containing many frequencies of equal intensities” [<xref ref-type="bibr" rid="ref8">8</xref>], has potential to improve cognitive performance in both healthy adults [<xref ref-type="bibr" rid="ref17">17</xref>] and those with attention deficit [<xref ref-type="bibr" rid="ref70">70</xref>]. Mechanisms that could explain the benefits of white noise include its ability to moderate brain arousal by inducing neural noise, which at specific dopamine-based thresholds could stimulate cognitive performance [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
        </sec>
        <sec>
          <title>Supporting Motivation to Keep Within Limited Use of Phone or Apps</title>
          <p>The fourth intervention supports motivation for limiting phone and app use (12/39, 31% apps; <xref ref-type="supplementary-material" rid="app7">Multimedia Appendix 7</xref> [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]). Findings indicate 3 mechanisms for supporting motivation. The first is the reward and penalty feedback usually implemented by those apps that support monitoring (7/12, 58% apps), with rewards being provided when users successfully kept within their set use limits of their phones and apps. The main types of rewards leverage gamification principles and consist of badges at different levels (2/7, 29% apps), points (2/7, 29% apps), in-app coins (1/7, 14% apps), building in-app trees (Forest) or towns (SleepTown), or motivational quotes (4/7, 57% apps). The main categories of penalty content are metaphoric and consist of in-app tree withers (Forest) or town-building collapses (SleepTown). Interestingly, however, most monitoring apps (20/29, 69%) do not support such motivation through rewards and penalties.</p>
          <p>Second, in addition to the reward and penalty feedback provided on the basis of successful or unsuccessful keeping within set limits of phone or app use, other types of motivation are provided to support behavior regulation of limiting use, both during and even before the actual behavior of limiting use. This less common type of motivation consists of motivational quotes, either provided by the app (two apps: Stay Focused and HelpMeFocus) number and names or generated by the user (two apps: StayFree and App Usage–Manage/Track Usage); educational content about phone and life balance (one app: SPACE); or motivational stories written by other users (one app: YourHour).</p>
          <p>Third, social support is another form of motivation, whose role in facilitating behavior change has been much acknowledged [<xref ref-type="bibr" rid="ref71">71</xref>]. An important outcome is the limited number of apps that encourage social support to limit phone or app use, through competition (5/39, 13% apps), collaboration (5/39, 13% apps), or both (3/39, 8% apps). This is distinct from the identified emphasis on competition [<xref ref-type="bibr" rid="ref72">72</xref>]. For instance, the SPACE app allows comparing such progress of limited use. In contrast to this competition social motivator, our findings also show 13% (5/39) of the apps leveraging collaboration, in which family members, friends, or broader social networks are used. For instance, the SleepTown app allows sharing sleep time goals with friends and setting similar sleep goals with them. Another example is the Hold app, which provides different ways to share focus time through finding nearby Bluetooth-enabled devices to encourage focused attention in the group. The Hold app also integrates collaborative and competitive aspects, for instance, by ranking users according to the points they gained from their time spent on focusing tasks, most often offline ones. Apps leveraging competition can also integrate social recognition. For example, the Hold app rewards the top-ranked users according to their points with a crown icon next to their username, and the Focus app rewards the first three users with a trophy icon next to their usernames: gold, silver, and bronze.</p>
        </sec>
      </sec>
      <sec>
        <title>Comparison of Commercial Digital Well-being Apps With Academic Ones</title>
        <p>This section focuses on the comparison of the functionalities of the apps developed in academia with those of commercial apps, with a specific focus on how they differ. It is not surprising that most academic apps share the tracking and monitoring functionalities available in commercial apps. For example, the lockout mechanism that blocks the phone until midnight when reaching the use limit [<xref ref-type="bibr" rid="ref31">31</xref>] is similar to blocking apps and phone when the user exceeds the defined time limit in some commercial apps (ie, Ubhind). Similarly, blocking and scheduling blocking in the academic app Forest [<xref ref-type="bibr" rid="ref48">48</xref>] are comparable with those in the commercial app AppBlock. An interesting distinction concerning tracking and monitoring is the new form of visualization of tracked data in academic apps, namely, timelines.</p>
        <p>In terms of interventions for limiting use, findings indicate additional key distinctions between commercial and academic apps for digital well-being. Regarding creating obstacles to limit phone or app use, important distinctions concern the force and saliency of the created obstacles and their temporal aspect and source. With respect to force, commercial apps predominantly use strong obstacles such as phone or app blocks (14/39, 35% apps) instead of weak obstacles such as notifications or microboundary interactions (5/39, 13% apps), with only 3% (1/39) of the apps providing both strong and weak obstacles. In contrast, academic apps take a more balanced approach, using equally both strong (10/17, 59%) and weak (11/17, 65%) obstacles, with 29% (5/17) of these apps using both strong and weak obstacles. Given the nascent research exploring the effectiveness of digital well-being apps, academic work is more likely to use both types of obstacles to compare their effectiveness.</p>
        <p>With respect to the saliency of obstacles, almost half of the commercial apps (17/39, 44%) specify saliency, with all but 1 featuring explicit obstacles (which also tend to be strong), whereas the SPACE app features implicit obstacles. In contrast, almost all academic apps (16/17, 94%) involve explicit obstacles, that is, mostly notifications. What is interesting here is the innovative use in academic apps of a new type of obstacles for restricting use through design frictions. These could involve mandatory cognitive tasks such as entering several digits as users attempt to start interacting with apps targeted for limited use [<xref ref-type="bibr" rid="ref57">57</xref>] or entering 30- or 10-digits try [<xref ref-type="bibr" rid="ref19">19</xref>], which, when compared with merely pressing OK, indicates that the more complex the cognitive task, the more likely that users will restrain from engaging with those apps. Commercial apps present limited such cognitive tasks, with one exception being the MMGuardian app, which requires entering a password by parents to prevent the child from removing the app or modifying the set time limit of use.</p>
        <p>Findings also indicate differences regarding the temporal aspects of obstacles to use. Although commercial apps use these obstacles predominantly after use of the targeted apps (15/39, 38%), as opposed to during use (4/39, 10%), academic apps take a more balanced approach using such obstacles equally during (8/17, 47%) and after the use of targeted apps (8/17, 47%), with 12% (2/17) of the apps using them both during and after use. This suggests not only the value of providing flexibility and users’ choice but also the importance of real-time obstacles in limiting phone or app overuse in real time.</p>
        <p>Regarding obstacles’ source, commercial apps use mostly obstacles set and customized by users (15/39, 38%) rather than obstacles set automatically (6/39, 15%); in contrast, academic apps feature more automatically set obstacles (10/17, 59%) than those set by users (6/17, 35%).</p>
        <p>Scholarly work on digital well-being apps has also focused on the types of apps that users are more willing to limit use. In this respect, empirical findings indicate that users were willing to restrict the use of specific apps such as messaging ones [<xref ref-type="bibr" rid="ref56">56</xref>], as well as social media or games apps [<xref ref-type="bibr" rid="ref21">21</xref>]. Academic work has also explored limited use not only beyond individual devices such as phones but also across multi-devices and their context of use [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref49">49</xref>]. Similar work has looked, for instance, at chatbots to notify users of their smartphone use [<xref ref-type="bibr" rid="ref51">51</xref>] or video platforms supporting preschoolers to self-manage their phone and app consumption [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
        <p>The second intervention, intended to increase users’ awareness of reaching their limits of phone or app use, also shows differences. Although both sets of apps use mostly explicit notifications to support such awareness, academic apps do so more (8/17, 47%) than commercial apps (11/39, 28%). Interestingly, both sets of apps also used implicit notifications such as screen dimming featuring in the SPACE app and vibrations for notifying users when they exceeded their set time limit for phone use featuring in the Good Vibrations app [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>The intervention targeting focused attention has been supported by both sets of apps through training for focused attention, with 21% (8/39) of commercial apps and 29% (5/17) of academic apps providing such training. Interestingly, commercial apps also feature white noise as a specific mechanism for supporting focused attention, whose effectiveness as part of digital well-being apps has been less explored, although a body of scholarly work has shown its value for relaxation [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        <p>Finally, the fourth intervention for supporting motivation to keep within set limits shows similar findings for the 2 sets of apps, with emphasis on rewarding user behavior when the goal of keeping within limits has been reached (9/39, 23% commercial apps; 3/17, 18% academic apps), albeit commercial apps show more diverse forms of rewarding content, usually leveraging gamification principles, as opposed to academic apps, which use merely points. In contrast, findings show much fewer apps leveraging punitive feedback when users fail to keep within set use limits for both commercial apps (4/39, 10%) and academic apps (1/17, 6%). In terms of social support, a small number of apps provide it to support cooperation (5/39, 13% commercial apps; 2/17, 12% academic apps), competition, and recognition (5/39, 13% commercial apps; 3/17, 18% academic apps).</p>
        <p>Also unique to research on academic apps for digital well-being is the extended focus of their audience to include not only individual users as commercial apps but also groups of users. For example, such academic apps focused on enhancing self-regulation through groups of users collaborating or competing toward limiting their collective use of phones and apps [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref54">54</xref>], through limiting use as a family activity [<xref ref-type="bibr" rid="ref45">45</xref>], or through providing in-app spaces for college students to restrict their phone use during class time [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>We now revisit the research questions advanced in the <italic>Introduction</italic> section and articulate the novelty of our key findings. The first 2 research questions focused on identifying the key functionalities of the top-rated digital well-being apps and their theoretical underpinning. Our review of top-rated digital well-being apps indicates the following six main functionalities: tracking use; monitoring use against set limits; and four interventions for limiting use, namely, creating obstacles to limit use, supporting awareness of reaching the set limits, supporting focused attention, and supporting motivation for limiting use. In this section, we also theoretically position these functionalities and leverage them to articulate new implications for better designing digital well-being apps.</p>
        <p>Findings indicate that &#62;70% (29/39) of digital well-being apps provide tracking of use of phone or app data, visualized mostly through reports and charts. More than a third (11/29) of the apps providing the tracking functionality also support user profiling, either automatically from tracked data or through users’ entered data. This aspect of tracking has been limitedly explored in previous work [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Another key finding is that almost 30% (11/39, 28%) of the digital well-being apps do not support tracking phone or app use but support instead focused attention or tracking of offline activities. This is a key outcome with important design implications that we will revisit later.</p>
        <p>The second functionality is monitoring phone or app use against set time limits, which is key for limiting their use. This functionality features in 64% (25/39) of our reviewed commercial apps. Interestingly, however, the remaining almost 35% (14/39) of the digital well-being apps do not support this functionality directly, albeit they monitor the time spent on offline activities, away from the phone and its apps. From the former set of apps monitoring phone and app use, most tend to target some of the apps installed on the phone, with fewer digital well-being apps monitoring the use limits of all the apps. An important implication here is designing for <italic>complete monitoring</italic> of all the apps installed on the phone and providing users with the choice of selecting the ones to monitor, as well as <italic>location-based monitoring</italic> currently limitedly supported, albeit useful for situating the monitoring behavior in a spatiotemporal context. We also suggest supporting <italic>flexible monitoring</italic> allowing circumventing the set use time limit, which can support ongoing motivation for monitoring phone consumption and regulating phone overuse behavior. Findings also indicate interesting time-based, monitoring-specific visualizations featuring in approximately half (20/39) of our reviewed apps, which are useful to be extended to all digital well-being apps.</p>
        <p>With respect to the first intervention, almost half (16/39) of our reviewed commercial apps implement strong and explicit obstacles, such as blocking to limit phone or app use, with much fewer apps featuring weak or implicit obstacles, usually in the form of notification. Even fewer apps attempt to implement microboundary interactions using launchers as substitute home screens. Such obstacles can be generated either automatically or by the users, with only few apps tailing them to user profiles and none mapping the force of obstacles (strong or weak) to such profiles. These approaches suggest the value of using both sources, so that digital well-being apps could benefit from the customization of users’ set obstacles and potentially even more so from extending the use of automatically set obstacles. Although previous work suggested that strong obstacles, despite inducing frustration, can be preferred by users and are likely to be more effective than the less restrictive obstacles [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref46">46</xref>], the value of providing both strong and weak obstacles can be further explored, in terms of both effectiveness and user experience for more sustained and long-term change of one’s relation with their mobile phones. Our findings from academic apps also highlighted new explicit obstacles for restricting use through design frictions such as cognitive tasks, which, unfortunately, have been limitedly explored. However, these innovative obstacles open up an interesting design space, as frictions support users to pause before compulsively re-engaging with their phones and apps, and thus a more mindful interaction.</p>
        <p>From the 25 apps that support monitoring, 13 (52%) support users becoming aware when they reach the set use limits of their phone or apps, mostly through explicit notification and much less through implicit ones such as screen dimming, whereas daily reminders support a high-level awareness of use patterns exceeding set limits. Academic apps also started to explore implicit notification, albeit in tactile modality, through vibrations. These implicit notifications open up a less explored design space for this intervention. Arguably, vibration-based notifications are weak obstacles, and illustrations of how nudge theory [<xref ref-type="bibr" rid="ref34">34</xref>] can be leveraged in the design of digital well-being apps. Implicit notifications may be less intrusive and therefore more persuasive, although future work is needed to explore their specific benefits when compared with explicit ones.</p>
        <p>An important outcome is the 2 ways of supported focused attention that digital well-being apps implement: The first is implicit support through the monitoring and limiting of phone or app overuse, and the second is the explicit training of attention by focusing on offline activities without phone use, including also exposure to white noise to support concentration, which has strong research underpinning [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        <p>A key functionality, less explored in previous research on digital well-being, is supporting motivation for keeping within limited use. For this functionality, we identified the following three mechanisms: reward and penalty leveraging gamification principles, educational and motivational content, and social support provided, however, by a limited number of apps and where cooperation among users is limited.</p>
        <p>The theoretical underpinning of digital well-being apps has received limited attention. However, Roffarello and De Russis [<xref ref-type="bibr" rid="ref22">22</xref>] suggested the value of grounding the design of well-being apps to support behavior change, habit formation, and self-regulation. As shown in the <italic>Introduction</italic> section, scholars have identified a range of theories that may inform the design of digital well-being apps, such as those of uses and gratification [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], planned behavior [<xref ref-type="bibr" rid="ref32">32</xref>], dual system [<xref ref-type="bibr" rid="ref33">33</xref>], nudge [<xref ref-type="bibr" rid="ref34">34</xref>], framework for behavior change [<xref ref-type="bibr" rid="ref35">35</xref>], or regulation [<xref ref-type="bibr" rid="ref36">36</xref>]. However, it is less explored how such theories have been actually informing the developing of commercial well-being apps. However, the operationalization of these theories in this respect has been limited. In this section, we argue for the value of self-regulation theories.</p>
        <p>Previous work has shown that tracking is a key functionality of digital well-being apps that captures the use of the phone and its apps [<xref ref-type="bibr" rid="ref22">22</xref>]. However, this does not make the important distinction between the digital well-being app running in the background to collect such information and the user’s active effort to minimize phone use. The former is usually important in the early stage of digital detox when people want to understand their consumption patterns, whereas the latter follows with setting up limits to phone or app use. For this, we called the former tracking, and the latter monitoring, which is a better term for capturing or tracking data against a specific target. Most behavior-changing apps use monitoring toward specific goals such as exercising ones [<xref ref-type="bibr" rid="ref41">41</xref>]; therefore, the link between monitoring and goal setting is crucial. We note the important alignment of monitoring functionality to the three ingredients of self-regulation as reflected in self-regulation theories: setting target standards, monitoring the current state against these targets, and activating processes to reduce any identified distance between the current state and the targets [<xref ref-type="bibr" rid="ref59">59</xref>]. Thus, we argue that designing for monitoring functionality can benefit from theoretical grounding in self-regulation theories.</p>
        <p>Regarding the intervention of creating obstacles to limit use, we have seen the value of both strong restrictive mechanisms and weak ones, mostly explored in academic research rather than reflected in commercial apps. We argue that weak and particularly implicit obstacles are illustrations of nudges, which nudge theory describes as persuasive attempts for behavior change that do not limit users’ choices [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. Future work is needed to understand how nudge theory can be sensitively leveraged to rigorously inform such obstacles to use.</p>
        <p>The intervention for supporting focused attention is particularly interesting, as it marks a shift away from limiting excessive use toward more mindful activities, either technologically mediated or offline, whose valuable side effect is limited use of the phone or apps. Rather than steering away from undesirable behavior, this intervention encourages engagement in meaningful and ideally desirable activities, subsequently supporting the most powerful appetitive rather than aversive motivation. We also highlight in this context the value of supporting users to understand and support their meaningful goals [<xref ref-type="bibr" rid="ref66">66</xref>], which subsequently can address the phone overuse and the boredom often associated with it. However, goal theories have been limitedly discussed in relation to digital well-being apps.</p>
        <p>The final intervention focuses on supporting motivation to keep within use limits. Although limitedly mentioned in relation to digital well-being apps, we suggest the value of broaden and build theory [<xref ref-type="bibr" rid="ref75">75</xref>], where positive emotions are leveraged for increased self-awareness and behavior change. Illustrations of how this theory may be underpinning some of the identified functionalities include the provision of allowances for overruling the set use limits during monitoring. This is important for instrumental reasons both allowing the completion of some immediate tasks, and maintaining motivation in case of setbacks in meeting the set limits. In turn, this could broaden users’ resilience and more flexibly support the acknowledged high demands of self-regulation [<xref ref-type="bibr" rid="ref36">36</xref>]. Future work is needed to explore effective ways for managing the negative emotions associated with setbacks.</p>
      </sec>
      <sec>
        <title>Design Implications for Digital Well-being Apps</title>
        <sec>
          <title>Overview</title>
          <p>The third research question focused on the design guidelines for digital well-being apps informed by our identified functionalities. For this, we articulate 6 implications for designing digital well-being apps including calling to move beyond screen time and support the broader focus of digital well-being; supporting meaningful use rather than limiting meaningless use; leveraging (digital) navigation in design for friction; supporting collaborative interaction phone overuse; supporting explicit, time-based visualizations for monitoring functionality; and supporting the ethical design of digital well-being apps. These implications open up a larger design space for digital well-being apps, going beyond the main tracking and monitoring functionalities [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref57">57</xref>].</p>
        </sec>
        <sec>
          <title>Beyond Screen Time: Broader Focus of Digital Well-being</title>
          <p>Although most of these functionalities focus on limiting screen time, echoing previous findings on addiction and phone overuse [<xref ref-type="bibr" rid="ref22">22</xref>], an important outcome is that about a third (13/39) of our apps support focus of attention either by limiting distractions or by supporting focused attention often on offline activities, including training of attention. We argue that this bias toward screen time fails to reflect the larger body of HCI research on well-being that can inspire novel apps that may better support users’ skills for more mindful use of technologies. We call for stronger engagement of HCI research in the design of digital well-being apps that addresses this limitation. Indeed, our findings could mark a shift away from addressing a problematic behavior by explicitly limiting it but rather by supporting a high-level function that can arguably better address the root of the problematic behavior. There is an extensive body of work on mitigating the impact of interruptions [<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>] and a growing interest in mindfulness technologies [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref76">76</xref>] that can support the design of these apps for digital well-being aiming to support focus of attention.</p>
        </sec>
        <sec>
          <title>Supporting Meaningful Use Versus Limiting Meaningless Use</title>
          <p>Findings also indicate an important limitation of digital well-being apps reviewed in this work and in particular their rather narrow view of limiting use. We argue that this overlooks the broader goals for using technology in the first place and users’ different avoidance or approach motivations. For this, we can leverage goal theories and the distinction between hedonic and eudemonic or meaningful goals [<xref ref-type="bibr" rid="ref66">66</xref>] and how the latter can be purposefully designed for. Emphasizing the meaningful use of technology [<xref ref-type="bibr" rid="ref11">11</xref>] may be a better approach to avoid meaningless or habitual use leading to phone overuse, while accounting also for the scarcity of attention [<xref ref-type="bibr" rid="ref77">77</xref>].</p>
        </sec>
        <sec>
          <title>Leveraging (Digital) Navigation in Design for Friction</title>
          <p>Findings highlight obstacles for preventing app use that can inform the design for friction [<xref ref-type="bibr" rid="ref78">78</xref>] as a mechanism for slowing down interaction (such as information sessions at the start of using a mediation app), which we know little about. Our findings suggest harnessing the digital distance and navigation to the target app. This is supported by findings showing that navigation in the folder hierarchy and in the real world share the same neural correlates [<xref ref-type="bibr" rid="ref61">61</xref>]. One can imagine that information architecture imposing additional digital navigation cost for reaching apps located deeper in the phone’s information hierarchy, whose use is to be limited, may mitigate against their overuse. We can also think of leveraging physical navigation, for instance, by allowing access to some apps only in physical locations that the user has to purposefully travel to, supporting thus fitness goals. Kim et al [<xref ref-type="bibr" rid="ref31">31</xref>] positioned their app and this family of restrictive and coercive interventions within the HCI work on uncomfortable interactions aimed at helping people toward important goals while tolerating discomfort [<xref ref-type="bibr" rid="ref60">60</xref>] and on design frictions through microboundaries consisting of small barriers enforced before an interaction to prevent habitual phone use [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
        </sec>
        <sec>
          <title>Supporting Collaborative Interaction for Limiting Phone and App Overuse</title>
          <p>Much work has shown the value of social support for behavior change, and our findings confirm that this is also an important intervention for digital well-being apps. Our outcomes echo previous ones showing the benefit of social support for limiting smartphone use, albeit by leveraging competition. We argue that the value of cooperation can be better harnessed in the design of digital well-being apps, both for limiting overuse and for training focus of attention. Our findings indicate that only 16% (9/56) of the apps in our app review implement social support as a built-in feature. This supports the argument presented in a study by Czerwinski et al [<xref ref-type="bibr" rid="ref62">62</xref>] that social support is a feature needed in digital well-being apps, as current apps do not seem to leverage social support as a mechanism to enhance self-regulation.</p>
        </sec>
        <sec>
          <title>Supporting Time-Based, Explicit Visualizations Tailored to Monitoring Functionality</title>
          <p>In terms of data visualization, findings indicate a richer range of formats available for the monitoring of phone or app use against set limits compared with their mere tracking. This makes sense because tracking aims primarily to support users’ exploration and understanding, whereas monitoring aims mostly to support behavior change toward set goals [<xref ref-type="bibr" rid="ref79">79</xref>,<xref ref-type="bibr" rid="ref80">80</xref>]. Hence, although more ambiguous representations are useful to motivate and engage users during tracking, for the monitoring functionality, more specific formats and particularly those including timelines are more useful. However, we have seen that academic apps leverage timeline representations, whereas commercial apps do so to a lesser extent. The latter allow people to easily match on the timeline their behavior with the recorded data to not only understand the data but also use it for reaching the goals. These outcomes align with previous work on the value of the ambiguity of different types of captured data [<xref ref-type="bibr" rid="ref4">4</xref>] to support users’ engagement in understanding it, particularly relevant in the tracking stage. In contrast, although the rationale of timeline visualizations has been limitedly unpacked in scholarly work, it can be grounded in the growing HCI interest in temporality [<xref ref-type="bibr" rid="ref24">24</xref>] and its value for reflection, both in and on action [<xref ref-type="bibr" rid="ref81">81</xref>]. Future work can compare the value of different visualization forms for supporting such reflection on data.</p>
        </sec>
        <sec>
          <title>Supporting Ethical Design of Digital Well-being Apps</title>
          <p>Despite their potential for supporting users with their phone overuse, most digital well-being apps have limited scientific underpinning and evidence base. They tend to target users without health conditions and tend to be inclusive, as many of their functionalities appear to be free. However, we call for extending the efforts toward a more research-informed and evidence-based design of digital well-being apps. This is particularly important because their beneficence can be limited by the risk of harming users with mental health conditions, as well as those who experience phone addiction. Such recommendation can be addressed to app market places or policy makers for regulating the requirements for their research underpinning. The most ethical challenge pertaining to these apps is supporting autonomy of users experiencing smartphone addiction [<xref ref-type="bibr" rid="ref67">67</xref>]. However, given the challenges of diagnosing phone addiction, increased ethical sensitivity is required in this respect. In addition, more work is needed to explore how the shift toward increased autonomy can be best supported and by what features of digital well-being apps.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations and Future Work</title>
        <p>We focused on Google Play, which limited our review of iOS apps not available on Google Play. Future work could extend this exploration to other platforms. Future work can also aim to further strengthen the scientific underpinning of the design principles of digital well-being apps, in terms of both their theoretical framing and evidence-based evaluation studies. Our findings indicate that despite the growing number of digital well-being apps, parts of their design space have been less explored, such as supporting awareness for reaching use limits, motivation to keep within set use limits, implicit obstacles rather than explicit ones, recommended interventions to determine the right type of obstacles according to the tracked data, and mechanisms for supporting focused attention. We encourage researchers and developers to focus on these aspects, and together with the key features identified in our study, they can significantly improve the design of digital well-being apps.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>We report on a functionality review of 39 commercial and 17 academic digital well-being apps. Findings provide richer understanding of tracking and particularly monitoring functionalities, together with 4 interventions for limiting use. These provide new understanding of the different types of obstacles for limiting use, as well as of specific features for less explored functionalities such as supporting awareness for reaching use limits, focused attention, and motivation to keep within set use limits. We conclude with 6 design implications for digital well-being apps, namely, calling to move beyond screen time and support the broader focus of digital well-being; supporting meaningful use rather than limiting meaningless use; leveraging (digital) navigation in design for friction; supporting collaborative interaction to limit phone overuse; supporting explicit, time-based visualizations for monitoring functionality; and supporting ethical design of digital well-being apps.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>The reviewed top-rated digital well-being apps and academic apps, their user rating scores from 1 to 5, and their numbers of raters.</p>
        <media xlink:href="formative_v6i4e31730_app1.docx" xlink:title="DOCX File , 21 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Tracking functionality for phone and app use, format for visualizing the tracked data, and user profiling based on tracked data.</p>
        <media xlink:href="formative_v6i4e31730_app2.docx" xlink:title="DOCX File , 23 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Monitoring functionality: setting use or focus time limits, scope and place of limited use, visualizing time limit, and flexibility through 3 options (use allowance beyond time limit, exclude apps from time limit, and discontinuing tracking when limit was reached).</p>
        <media xlink:href="formative_v6i4e31730_app3.docx" xlink:title="DOCX File , 30 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Interventions for limiting use: creating obstacles for limiting use differing in force, saliency, temporality, sociality, user profile, and source.</p>
        <media xlink:href="formative_v6i4e31730_app4.docx" xlink:title="DOCX File , 26 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Interventions for limiting use: supporting awareness for reaching the set limit of use through different notification types, screen diming, and daily reminders.</p>
        <media xlink:href="formative_v6i4e31730_app5.docx" xlink:title="DOCX File , 24 KB"/>
      </supplementary-material>
      <supplementary-material id="app6">
        <label>Multimedia Appendix 6</label>
        <p>Interventions for limiting use: supporting focused attention through training or white noise.</p>
        <media xlink:href="formative_v6i4e31730_app6.docx" xlink:title="DOCX File , 18 KB"/>
      </supplementary-material>
      <supplementary-material id="app7">
        <label>Multimedia Appendix 7</label>
        <p>Interventions for limiting use: supporting motivation to keep within limited use involving different types and content, as well as social support of different types involving cooperation, competition and associated social recognition.</p>
        <media xlink:href="formative_v6i4e31730_app7.docx" xlink:title="DOCX File , 27 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">HCI</term>
          <def>
            <p>human-computer interaction</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported by the University of Tabuk, Saudi Arabia, and AffecTech: Personal Technologies for Affective Health, Innovative Training Network, which is funded by the Horizon 2020 People Programme under Marie Skłodowska-Curie (grant agreement No 722022).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thieme</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Designing technology to promote mental health and wellbeing</article-title>
          <source>Newcastle University</source>
          <year>2015</year>
          <access-date>2020-03-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://theses.ncl.ac.uk/jspui/handle/10443/2864">http://theses.ncl.ac.uk/jspui/handle/10443/2864</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sanches</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Janson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Karpashevich</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Nadal</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Qu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Roquet</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Umair</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Windlin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Höök</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>HCI and affective health: taking stock of a decade of studies and charting future research directions</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300475"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300475</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Colombo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Álvarez</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Suso-Ribera</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Cipresso</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Valev</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Leufkens</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia-Palacios</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Riva</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Botella</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The need for change: understanding emotion regulation antecedents and consequences using ecological momentary assessment</article-title>
          <source>Emotion</source>
          <year>2020</year>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1037/emo0000671</pub-id>
          <pub-id pub-id-type="medline">31961174</pub-id>
          <pub-id pub-id-type="pii">2020-03346-005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sanches</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Höök</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ståhl</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Ambiguity as a resource to inform proto-practices: the case of skin conductance</article-title>
          <source>ACM Trans Comput-Hum Interact</source>
          <year>2019</year>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>1</fpage>
          <lpage>32</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3318143"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3318143</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Umair</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Latif</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Dynamic displays at wrist for real time visualization of affective data</article-title>
          <source>Proceedings of the 2018 ACM Conference Companion Publication on Designing Interactive Systems</source>
          <year>2018</year>
          <conf-name>DIS '18</conf-name>
          <conf-date>June 9-13, 2018</conf-date>
          <conf-loc>Hong Kong, China</conf-loc>
          <fpage>201</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3197391.3205436"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3197391.3205436</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Umair</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chalabianloo</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ersoy</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Exploring personalized vibrotactile and thermal patterns for affect regulation</article-title>
          <source>Designing Interactive Systems Conference 2021</source>
          <year>2021</year>
          <conf-name>DIS '21</conf-name>
          <conf-date>June 28-July 2, 2021</conf-date>
          <conf-loc>Virtual</conf-loc>
          <fpage>891</fpage>
          <lpage>906</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3461778.3462042"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3461778.3462042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Umair</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Latif</surname>
              <given-names>MH</given-names>
            </name>
          </person-group>
          <article-title>Towards affective chronometry: exploring smart materials and actuators for real-time representations of changes in arousal</article-title>
          <source>Proceedings of the 2019 on Designing Interactive Systems Conference</source>
          <year>2019</year>
          <conf-name>DIS '19</conf-name>
          <conf-date>June 23-28, 2019</conf-date>
          <conf-loc>San Diego, CA</conf-loc>
          <fpage>1479</fpage>
          <lpage>94</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3322276.3322367"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3322276.3322367</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alfaras</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Tsaknaki</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Sanches</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Windlin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Umair</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Höök</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>From biodata to somadata</article-title>
          <source>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</source>
          <year>2020</year>
          <conf-name>CHI '20</conf-name>
          <conf-date>April 25-30, 2020</conf-date>
          <conf-loc>Honolulu, HI</conf-loc>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1145/3313831.3376684</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fleck</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzpatrick</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Reflecting on reflection: framing a design landscape</article-title>
          <source>Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction</source>
          <year>2010</year>
          <conf-name>OZCHI '10</conf-name>
          <conf-date>November 22-26, 2010</conf-date>
          <conf-loc>Brisbane, Australia</conf-loc>
          <fpage>216</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1952222.1952269"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1952222.1952269</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chopra</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>MeditAid: a wearable adaptive neurofeedback-based system for training mindfulness state</article-title>
          <source>Pers Ubiquit Comput</source>
          <year>2015</year>
          <volume>19</volume>
          <issue>7</issue>
          <fpage>1169</fpage>
          <lpage>82</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s00779-015-0870-z"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s00779-015-0870-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mekler</surname>
              <given-names>ED</given-names>
            </name>
            <name name-style="western">
              <surname>Hornbæk</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>A framework for the experience of meaning in human-computer interaction</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300455"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300455</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Coyle</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sharry</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Engagement with online mental health interventions: an exploratory clinical study of a treatment for depression</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2012</year>
          <conf-name>CHI '12</conf-name>
          <conf-date>May 5-10, 2012</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <fpage>1421</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2207676.2208602"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2207676.2208602</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Qu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Exploring and designing for memory impairments in depression</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300740"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300740</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lazar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Edasis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Piper</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Supporting people with dementia in digital social sharing</article-title>
          <source>Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</source>
          <year>2017</year>
          <conf-name>CHI '17</conf-name>
          <conf-date>May 6-11, 2017</conf-date>
          <conf-loc>Denver, CO</conf-loc>
          <fpage>2149</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3025453.3025586"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3025453.3025586</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rooksby</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Asadzadeh</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Rost</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chalmers</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Personal tracking of screen time on digital devices</article-title>
          <source>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</source>
          <year>2016</year>
          <conf-name>CHI '16</conf-name>
          <conf-date>May 7-12, 2016</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <fpage>284</fpage>
          <lpage>96</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2858036.2858055"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2858036.2858055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Millennials: digitally connected never unplugged?</article-title>
          <source>2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290607.XXXXXXX"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Herweg</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Bunzeck</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Differential effects of white noise in cognitive and perceptual tasks</article-title>
          <source>Front Psychol</source>
          <year>2015</year>
          <volume>6</volume>
          <fpage>1639</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3389/fpsyg.2015.01639"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpsyg.2015.01639</pub-id>
          <pub-id pub-id-type="medline">26579024</pub-id>
          <pub-id pub-id-type="pmcid">PMC4630540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cecchinato</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Rooksby</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hiniker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Munson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lukoff</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ciolfi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Thieme</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Harrison</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <source>Designing for Digital Wellbeing: A Research &#38; Practice Agenda. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI EA '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290607.3298998"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290607.3298998</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>LocknType: lockout task intervention for discouraging smartphone app use</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300927"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300927</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hallnäs</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Redström</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Slow technology – designing for reflection</article-title>
          <source>Personal Ub Comp</source>
          <year>2001</year>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>201</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/PL00000019"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/pl00000019</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hiniker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Kohno</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kientz</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>MyTime: designing and evaluating an intervention for smartphone non-use</article-title>
          <source>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</source>
          <year>2016</year>
          <conf-name>CHI '16</conf-name>
          <conf-date>May 7-12, 2016</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <fpage>4746</fpage>
          <lpage>57</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2858036.2858403"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2858036.2858403</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roffarello</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>De Russis</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The race towards digital wellbeing: issues and opportunities</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300616"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Velthoven</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Problematic smartphone use: digital approaches to an emerging public health problem</article-title>
          <source>Digit Health</source>
          <year>2018</year>
          <volume>4</volume>
          <fpage>2055207618759167</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/2055207618759167?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207618759167</pub-id>
          <pub-id pub-id-type="medline">31463071</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207618759167</pub-id>
          <pub-id pub-id-type="pmcid">PMC6034350</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nadal</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McCully</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The TAC toolkit: supporting the design for user acceptance of health technologies from a macro-temporal perspective</article-title>
          <source>Proceedings of the CHI Conference on Human Factors in Computing Systems</source>
          <year>2022</year>
          <conf-name>CHI '22</conf-name>
          <conf-date>April 29-May 5, 2022</conf-date>
          <conf-loc>New Orleans, LA</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/https://doi.org/10.1145/3491102.3502039"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parry</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>le Roux</surname>
              <given-names>DB</given-names>
            </name>
            <name name-style="western">
              <surname>Morton</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pons</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Pretorius</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Schoeman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Digital wellbeing applications: adoption, use and perceived effects</article-title>
          <source>SocArXiv (forthcoming)</source>
          <year>2020</year>
          <fpage>-</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.31235/OSF.IO/6E9AP"/>
          </comment>
          <pub-id pub-id-type="doi">10.31235/osf.io/6e9ap</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>A technology acceptance model for empirically testing new end-user information systems : theory and results</article-title>
          <source>Massachusetts Institute of Technology</source>
          <year>1986</year>
          <access-date>2021-12-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dspace.mit.edu/handle/1721.1/15192">https://dspace.mit.edu/handle/1721.1/15192</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Venkatesh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>GB</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>FD</given-names>
            </name>
          </person-group>
          <article-title>User acceptance of information technology: toward a unified view</article-title>
          <source>MIS Q</source>
          <year>2003</year>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>425</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.2307/30036540"/>
          </comment>
          <pub-id pub-id-type="doi">10.2307/30036540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nadal</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Technology acceptance in mobile health: scoping review of definitions, models, and measurement</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <volume>22</volume>
          <issue>7</issue>
          <fpage>e17256</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/7/e17256/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17256</pub-id>
          <pub-id pub-id-type="medline">32628122</pub-id>
          <pub-id pub-id-type="pii">v22i7e17256</pub-id>
          <pub-id pub-id-type="pmcid">PMC7381045</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lukoff</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kientz</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hiniker</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>What makes smartphone use meaningful or meaningless?</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2018</year>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>26</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3191754"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3191754</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lyngs</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Lukoff</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Slovak</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Binns</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Slack</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Inzlicht</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Van Kleek</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Shadbolt</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Self-control in cyberspace: applying dual systems theory to a review of digital self-control tools</article-title>
          <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300361"/>
          </comment>
          <pub-id pub-id-type="doi">10.31235/osf.io/685tm</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>GoalKeeper: exploring interaction lockout mechanisms for regulating smartphone use</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2019</year>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3314403"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3314403</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajzen</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The theory of planned behaviour: reactions and reflections</article-title>
          <source>Psychol Health</source>
          <year>2011</year>
          <volume>26</volume>
          <issue>9</issue>
          <fpage>1113</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="doi">10.1080/08870446.2011.613995</pub-id>
          <pub-id pub-id-type="medline">21929476</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wason</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>Dual processes in reasoning?</article-title>
          <source>Cognition</source>
          <year>1974</year>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>141</fpage>
          <lpage>54</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/0010-0277(74)90017-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/0010-0277(74)90017-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Okeke</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sobolev</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dell</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Estrin</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Good vibrations: can a digital nudge reduce digital overload?</article-title>
          <source>Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services</source>
          <year>2018</year>
          <conf-name>MobileHCI '18</conf-name>
          <conf-date>September 3-6, 2018</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3229434.3229463"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3229434.3229463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tromp</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hekkert</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Verbeek</surname>
              <given-names>PP</given-names>
            </name>
          </person-group>
          <article-title>Design for socially responsible behavior: a classification of influence based on intended user experience</article-title>
          <source>Design Issues</source>
          <year>2011</year>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>3</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1162/DESI_A_00087"/>
          </comment>
          <pub-id pub-id-type="doi">10.1162/desi_a_00087</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gross</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <source>Handbook of emotional regulation. 2nd edition</source>
          <year>2014</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>The Guilford Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bowie-DaBreo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sünram-Lea</surname>
              <given-names>SI</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Iles-Smith</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of treatment descriptions and alignment with clinical guidance of apps for depression on app stores: systematic search and content analysis</article-title>
          <source>JMIR Form Res</source>
          <year>2020</year>
          <volume>4</volume>
          <issue>11</issue>
          <fpage>e14988</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://formative.jmir.org/2020/11/e14988/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/14988</pub-id>
          <pub-id pub-id-type="medline">33185566</pub-id>
          <pub-id pub-id-type="pii">v4i11e14988</pub-id>
          <pub-id pub-id-type="pmcid">PMC7695532</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Qu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Daudén Roquet</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doherty</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Functionality of top-rated mobile apps for depression: systematic search and evaluation</article-title>
          <source>JMIR Ment Health</source>
          <year>2020</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>e15321</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mental.jmir.org/2020/1/e15321/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15321</pub-id>
          <pub-id pub-id-type="medline">32012079</pub-id>
          <pub-id pub-id-type="pii">v7i1e15321</pub-id>
          <pub-id pub-id-type="pmcid">PMC7007593</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roquet</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Evaluating mindfulness meditation apps</article-title>
          <source>Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems</source>
          <year>2018</year>
          <conf-name>CHI EA '18</conf-name>
          <conf-date>April 21-26, 2018</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3170427.3188616"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3170427.3188616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roquet</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Interoceptive interaction: an embodied metaphor inspired approach to designing for meditation</article-title>
          <source>Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems</source>
          <year>2021</year>
          <conf-name>CHI '21</conf-name>
          <conf-date>May 8-13, 2021</conf-date>
          <conf-loc>Yokohama, Japan</conf-loc>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3170427.3188616"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3411764.3445137</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCallum</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rooksby</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gray</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the impact of physical activity apps and wearables: interdisciplinary review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <volume>6</volume>
          <issue>3</issue>
          <fpage>e58</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/3/e58/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.9054</pub-id>
          <pub-id pub-id-type="medline">29572200</pub-id>
          <pub-id pub-id-type="pii">v6i3e58</pub-id>
          <pub-id pub-id-type="pmcid">PMC5889496</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jake-Schoffman</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Silfee</surname>
              <given-names>VJ</given-names>
            </name>
            <name name-style="western">
              <surname>Waring</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Boudreaux</surname>
              <given-names>ED</given-names>
            </name>
            <name name-style="western">
              <surname>Sadasivam</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Mullen</surname>
              <given-names>SP</given-names>
            </name>
            <name name-style="western">
              <surname>Carey</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>EY</given-names>
            </name>
            <name name-style="western">
              <surname>Bennett</surname>
              <given-names>GG</given-names>
            </name>
            <name name-style="western">
              <surname>Pagoto</surname>
              <given-names>SL</given-names>
            </name>
          </person-group>
          <article-title>Methods for evaluating the content, usability, and efficacy of commercial mobile health apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <volume>5</volume>
          <issue>12</issue>
          <fpage>e190</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.2196/mhealth.8758"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.8758</pub-id>
          <pub-id pub-id-type="medline">29254914</pub-id>
          <pub-id pub-id-type="pii">v5i12e190</pub-id>
          <pub-id pub-id-type="pmcid">PMC5748471</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Kane</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Blandford</surname>
              <given-names>AE</given-names>
            </name>
          </person-group>
          <article-title>Gaining empathy for non-routine mobile device use through autoethnography</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2014</year>
          <conf-name>CHI '14</conf-name>
          <conf-date>April 26-May 1, 2014</conf-date>
          <conf-loc>Toronto, Canada</conf-loc>
          <fpage>987</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2556288.2557179"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2556288.2557179</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Jung</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Let’s FOCUS: mitigating mobile phone use in college classrooms</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2017</year>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3130928"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3130928</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Heizmann</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jeong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Yatani</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>KM</given-names>
            </name>
          </person-group>
          <article-title>NUGU: a group-based intervention app for improving self-regulation of limiting smartphone use</article-title>
          <source>Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &#38; Social Computing</source>
          <year>2015</year>
          <conf-name>CSCW '15</conf-name>
          <conf-date>March 14-18, 2015</conf-date>
          <conf-loc>Vancouver, Canada</conf-loc>
          <fpage>1235</fpage>
          <lpage>45</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2675133.2675244"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2675133.2675244</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Technology supported behavior restriction for mitigating self-interruptions in multi-device environments</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2017</year>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3130932"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3130932</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roffarello</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>De Russis</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Understanding, discovering, and mitigating habitual smartphone use in young adults</article-title>
          <source>ACM Trans Interact Intell Syst</source>
          <year>2021</year>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3447991"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3447991</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Potapova</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Cetinkaya</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Liebchen</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Monitoring and controlling phone usage to raise awareness and combat digital addiction</article-title>
          <source>7th International Conference on Behavioural and Social Computing</source>
          <year>2020</year>
          <conf-name>BESC '20</conf-name>
          <conf-date>November 5-7, 2020</conf-date>
          <conf-loc>Bournemouth, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/BESC51023.2020.9348314"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/besc51023.2020.9348314</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bravo</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Towards designing multi-device digital self-control tools</article-title>
          <source>Politecnico di Torino</source>
          <year>2020</year>
          <access-date>2022-01-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://webthesis.biblio.polito.it/15976">https://webthesis.biblio.polito.it/15976</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <article-title>Mobile operating system market share worldwide</article-title>
          <source>StatCounter</source>
          <year>2021</year>
          <access-date>2021-12-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gs.statcounter.com/os-market-share/mobile/worldwide">https://gs.statcounter.com/os-market-share/mobile/worldwide</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abreu</surname>
              <given-names>CR</given-names>
            </name>
          </person-group>
          <article-title>Raising awareness of smartphone overuse among university students: a persuasive approach using digital wellbeing chatbots</article-title>
          <source>Universidade da Madeira</source>
          <year>2020</year>
          <access-date>2022-01-07</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/docview/2599043162">https://www.proquest.com/docview/2599043162</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hiniker</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Heung</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Kientz</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Coco's videos: an empirical investigation of video-player design features and children's media use</article-title>
          <source>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems</source>
          <year>2018</year>
          <conf-name>CHI '18</conf-name>
          <conf-date>April 21-26, 2018</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3173574.3173828"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3173574.3173828</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>FamiLync: facilitating participatory parental mediation of adolescents' smartphone use</article-title>
          <source>Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing</source>
          <year>2015</year>
          <conf-name>UbiComp '15</conf-name>
          <conf-date>September 7-11, 2015</conf-date>
          <conf-loc>Osaka, Japan</conf-loc>
          <fpage>867</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2750858"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2750858.2804283</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yatani</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Lock n' LoL: group-based limiting assistance app to mitigate smartphone distractions in group activities</article-title>
          <source>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</source>
          <year>2016</year>
          <conf-name>CHI '16</conf-name>
          <conf-date>May 7-12, 2016</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <fpage>998</fpage>
          <lpage>1010</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2858036.2858568"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2858036.2858568</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ahn</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>The SAMS: smartphone addiction management system and verification</article-title>
          <source>J Med Syst</source>
          <year>2014</year>
          <volume>38</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-013-0001-1</pub-id>
          <pub-id pub-id-type="medline">24395031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Löchtefeld</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Böhmer</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ganev</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>AppDetox: helping users with mobile app addiction</article-title>
          <source>Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia</source>
          <year>2013</year>
          <conf-name>MUM '13</conf-name>
          <conf-date>December 2-5, 2013</conf-date>
          <conf-loc>Luleå, Sweden</conf-loc>
          <fpage>1</fpage>
          <lpage>2</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2541831.2541870"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2541831.2541870</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sim</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yi</surname>
              <given-names>MY</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Interaction restraint: enforcing adaptive cognitive tasks to restrain problematic user interaction</article-title>
          <source>Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems</source>
          <year>2018</year>
          <conf-name>CHI EA '18</conf-name>
          <conf-date>April 21-26, 2018</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3170427.3188613"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3170427.3188613</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baum</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chaddha</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The impact of auditory white noise on cognitive performance</article-title>
          <source>J Sci Med</source>
          <year>2021</year>
          <volume>3</volume>
          <issue>Special Issue</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.37714/JOSAM.VI0.82"/>
          </comment>
          <pub-id pub-id-type="doi">10.37714/josam.vi0.82</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baumeister</surname>
              <given-names>RF</given-names>
            </name>
            <name name-style="western">
              <surname>Heatherton</surname>
              <given-names>TF</given-names>
            </name>
          </person-group>
          <article-title>Self-regulation failure: an overview</article-title>
          <source>Psychol Inq</source>
          <year>1996</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1207/S15327965PLI0701_1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1207/s15327965pli0701_1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benford</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Greenhalgh</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Giannachi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Marshall</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rodden</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Uncomfortable interactions</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2012</year>
          <conf-name>CHI '12</conf-name>
          <conf-date>May 5-10, 2012</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <fpage>2005</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2207676.2208347"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2207676.2208347</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benn</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Bergman</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Glazer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Arent</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wilkinson</surname>
              <given-names>ID</given-names>
            </name>
            <name name-style="western">
              <surname>Varley</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Whittaker</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Navigating through digital folders uses the same brain structures as real world navigation</article-title>
          <source>Sci Rep</source>
          <year>2015</year>
          <volume>5</volume>
          <fpage>14719</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/srep14719"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/srep14719</pub-id>
          <pub-id pub-id-type="medline">26423226</pub-id>
          <pub-id pub-id-type="pii">srep14719</pub-id>
          <pub-id pub-id-type="pmcid">PMC4589681</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Czerwinski</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Horvitz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wilhite</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A diary study of task switching and interruptions</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2004</year>
          <conf-name>CHI '04</conf-name>
          <conf-date>April 24-29, 2004</conf-date>
          <conf-loc>Vienna, Austria</conf-loc>
          <fpage>175</fpage>
          <lpage>82</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/985692.985715"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/985692.985715</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dabbish</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mark</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>González</surname>
              <given-names>VM</given-names>
            </name>
          </person-group>
          <article-title>Why do i keep interrupting myself?: environment, habit and self-interruption</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2011</year>
          <conf-name>CHI '11</conf-name>
          <conf-date>May 7-12, 2011</conf-date>
          <conf-loc>Vancouver, Canada</conf-loc>
          <fpage>3127</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1978942.1979405"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1978942.1979405</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roquet</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Sas</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Body matters: exploration of the human body as a resource for the design of technologies for meditation</article-title>
          <source>Proceedings of the 2020 ACM Designing Interactive Systems Conference</source>
          <year>2020</year>
          <conf-name>DIS '20</conf-name>
          <conf-date>July 6-10, 2020</conf-date>
          <conf-loc>Eindhoven, The Netherlands</conf-loc>
          <fpage>533</fpage>
          <lpage>46</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3357236.3395499"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3357236.3395499</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De-Sola</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Talledo</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Rubio</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>de Fonseca</surname>
              <given-names>FR</given-names>
            </name>
          </person-group>
          <article-title>Development of a mobile phone addiction craving scale and its validation in a Spanish adult population</article-title>
          <source>Front Psychiatry</source>
          <year>2017</year>
          <volume>8</volume>
          <fpage>90</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3389/fpsyt.2017.00090"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpsyt.2017.00090</pub-id>
          <pub-id pub-id-type="medline">28611692</pub-id>
          <pub-id pub-id-type="pmcid">PMC5447711</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Estes</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Hedonic versus Eudaimonic conceptions of well-being: evidence of differential associations with self-reported well-being</article-title>
          <source>Soc Indic Res</source>
          <year>2011</year>
          <volume>103</volume>
          <issue>1</issue>
          <fpage>93</fpage>
          <lpage>108</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s11205-010-9698-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s11205-010-9698-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Addiction, autonomy, and informed consent: on and off the garden path</article-title>
          <source>J Med Philos</source>
          <year>2016</year>
          <volume>41</volume>
          <issue>1</issue>
          <fpage>56</fpage>
          <lpage>73</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26668167"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jmp/jhv033</pub-id>
          <pub-id pub-id-type="medline">26668167</pub-id>
          <pub-id pub-id-type="pii">jhv033</pub-id>
          <pub-id pub-id-type="pmcid">PMC4882628</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>YH</given-names>
            </name>
            <name name-style="western">
              <surname>Chiang</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>PH</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>LR</given-names>
            </name>
            <name name-style="western">
              <surname>Ko</surname>
              <given-names>CH</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>YH</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>SH</given-names>
            </name>
          </person-group>
          <article-title>Proposed diagnostic criteria for smartphone addiction</article-title>
          <source>PLoS One</source>
          <year>2016</year>
          <volume>11</volume>
          <issue>11</issue>
          <fpage>e0163010</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0163010"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0163010</pub-id>
          <pub-id pub-id-type="medline">27846211</pub-id>
          <pub-id pub-id-type="pii">PONE-D-16-13518</pub-id>
          <pub-id pub-id-type="pmcid">PMC5112893</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kwon</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Won</surname>
              <given-names>WY</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Min</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Hahn</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Development and validation of a smartphone addiction scale (SAS)</article-title>
          <source>PLoS One</source>
          <year>2013</year>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>e56936</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0056936"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0056936</pub-id>
          <pub-id pub-id-type="medline">23468893</pub-id>
          <pub-id pub-id-type="pii">PONE-D-12-27008</pub-id>
          <pub-id pub-id-type="pmcid">PMC3584150</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Söderlund</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sikström</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Smart</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Listen to the noise: noise is beneficial for cognitive performance in ADHD</article-title>
          <source>J Child Psychol Psychiatry</source>
          <year>2007</year>
          <volume>48</volume>
          <issue>8</issue>
          <fpage>840</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1469-7610.2007.01749.x</pub-id>
          <pub-id pub-id-type="medline">17683456</pub-id>
          <pub-id pub-id-type="pii">JCPP1749</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>RB</given-names>
            </name>
            <name name-style="western">
              <surname>Zyzanski</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Alemagno</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>Prediction of motivation and behavior change following health promotion: role of health beliefs, social support, and self-efficacy</article-title>
          <source>Soc Sci Med</source>
          <year>1991</year>
          <volume>32</volume>
          <issue>3</issue>
          <fpage>311</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.1016/0277-9536(91)90109-p</pub-id>
          <pub-id pub-id-type="medline">2024141</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Matthews</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Win</surname>
              <given-names>KT</given-names>
            </name>
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Freeman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Persuasive technology in mobile applications promoting physical activity: a systematic review</article-title>
          <source>J Med Syst</source>
          <year>2016</year>
          <volume>40</volume>
          <issue>3</issue>
          <fpage>72</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-015-0425-x</pub-id>
          <pub-id pub-id-type="medline">26748792</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-015-0425-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kankane</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>DiRusso</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Buckley</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Can we nudge users toward better password management?: an initial study</article-title>
          <source>Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems</source>
          <year>2018</year>
          <conf-name>CHI EA '18</conf-name>
          <conf-date>April 21-26, 2018</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3170427.3188689"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3170427.3188689</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thaler</surname>
              <given-names>RH</given-names>
            </name>
            <name name-style="western">
              <surname>Sunstein</surname>
              <given-names>CR</given-names>
            </name>
          </person-group>
          <source>Nudge: improving decisions about health, wealth, and happiness</source>
          <year>2009</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Penguin Books</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fredrickson</surname>
              <given-names>BL</given-names>
            </name>
          </person-group>
          <article-title>The broaden-and-build theory of positive emotions</article-title>
          <source>Philos Trans R Soc Lond B Biol Sci</source>
          <year>2004</year>
          <volume>359</volume>
          <issue>1449</issue>
          <fpage>1367</fpage>
          <lpage>78</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/15347528"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rstb.2004.1512</pub-id>
          <pub-id pub-id-type="medline">15347528</pub-id>
          <pub-id pub-id-type="pii">DH5NJJTNQCAMP8UT</pub-id>
          <pub-id pub-id-type="pmcid">PMC1693418</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Terzimehić</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Häuslschmid</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hussmann</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Schraefel</surname>
              <given-names>MC</given-names>
            </name>
          </person-group>
          <source>A Review &#38; Analysis of Mindfulness Research in HCI: Framing Current Lines of Research and Future Opportunities. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source>
          <year>2019</year>
          <conf-name>CHI '19</conf-name>
          <conf-date>May 4-9, 2019</conf-date>
          <conf-loc>Glasgow, UK</conf-loc>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3290605.3300687"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3290605.3300687</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shirky</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>It's not information overload: it's filter failure</article-title>
          <source>Mas Context</source>
          <year>2020</year>
          <access-date>2020-03-13</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mascontext.com/issues/7-information-fall-10/its-not-information-overload-its-filter-failure/">https://www.mascontext.com/issues/7-information-fall-10/its-not-information-overload-its-filter-failure/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mejtoft</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hale</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Söderström</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Design friction</article-title>
          <source>Proceedings of the 31st European Conference on Cognitive Ergonomics</source>
          <year>2019</year>
          <conf-name>ECCE '19</conf-name>
          <conf-date>September 10-13, 2019</conf-date>
          <conf-loc>Belfast, UK</conf-loc>
          <fpage>41</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3335082.3335106"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3335082.3335106</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klasnja</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Consolvo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Pratt</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>How to evaluate technologies for health behavior change in HCI research</article-title>
          <source>Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          <year>2011</year>
          <conf-name>CHI '11</conf-name>
          <conf-date>May 7-12, 2011</conf-date>
          <conf-loc>Vancouver, Canada</conf-loc>
          <fpage>3063</fpage>
          <lpage>72</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1978942"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1978942.1979396</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Sticky goals: understanding goal commitments for behavioral changes in the wild</article-title>
          <source>Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems</source>
          <year>2021</year>
          <conf-name>CHI '21</conf-name>
          <conf-date>May 8-13, 2021</conf-date>
          <conf-loc>Yokohama, Japan</conf-loc>
          <fpage>1</fpage>
          <lpage>16</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3411764.3445295"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3411764.3445295</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schön</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <source>The reflective practitioner: how professionals think in action</source>
          <year>1983</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Basic Books</publisher-name>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
