University of Oulu

Karppinen P., Oinas-Kukkonen H. (2013) Three Approaches to Ethical Considerations in the Design of Behavior Change Support Systems. In: Berkovsky S., Freyne J. (eds) Persuasive Technology. PERSUASIVE 2013. Lecture Notes in Computer Science, vol 7822. Springer, Berlin, Heidelberg.

Three approaches to ethical considerations in the design of behavior change support systems

Saved in:
Author: Karppinen, Pasi1; Oinas-Kukkonen, Harri1
Organizations: 1Department of Information Processing Science, University of Oulu, Finland
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.4 MB)
Persistent link:
Language: English
Published: Springer Nature, 2013
Publish Date: 2022-01-03


Many ethical questions arise when developing persuasive systems. It has become evident that there is no silver bullet which would make it easy to resolve all ethical issues in all cases. This paper seeks to analyze and define potential ways to address ethical considerations in persuasive systems design. We suggest that there are three main approaches: a guideline-based approach, stakeholder analysis, and involving users. This paper helps to understand the strengths and weaknesses of these approaches when developing behavior change support systems, which, by their very nature, request deep engagement and commitment from their users. A pragmatic goal for this paper is to help designers choose an approach for their projects at hand.

see all

Series: Lecture notes in computer science
ISSN: 0302-9743
ISSN-E: 1611-3349
ISSN-L: 0302-9743
ISBN: 978-3-642-37157-8
ISBN Print: 978-3-642-37156-1
Issue: 7822
Pages: 87 - 98
DOI: 10.1007/978-3-642-37157-8_12
Host publication: Persuasive Technology: 8th International Conference, PERSUASIVE 2013, Sydney, NSW, Australia, April 3-5, 2013. Proceedings
Host publication editor: Berkovsky, Shlomo
Freyne, Jill
Conference: International Conference on Persuasive Technologies
Type of Publication: A4 Article in conference proceedings
Field of Science: 113 Computer and information sciences
Copyright information: © Springer-Verlag Berlin Heidelberg 2013. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science, vol 7822. The final authenticated version is available online at