<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMH</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Ment Health</journal-id>
      <journal-title>JMIR Mental Health</journal-title>
      <issn pub-type="epub">2368-7959</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v9i2e30838</article-id>
      <article-id pub-id-type="pmid">35147504</article-id>
      <article-id pub-id-type="doi">10.2196/30838</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Attentional Harms and Digital Inequalities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Torous</surname>
            <given-names>John</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>LaMendola</surname>
            <given-names>Walter</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Hartford</surname>
            <given-names>Anna</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Brain-Behaviour Unit</institution>
            <institution>University of Cape Town</institution>
            <addr-line>J-Block, Groote Schuur Hospital</addr-line>
            <addr-line>Cape Town, 7935</addr-line>
            <country>South Africa</country>
            <phone>27 214042174</phone>
            <email>annahartford@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6993-3800</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Stein</surname>
            <given-names>Dan J</given-names>
          </name>
          <degrees>PhD, DPhil</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7218-7810</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Brain-Behaviour Unit</institution>
        <institution>University of Cape Town</institution>
        <addr-line>Cape Town</addr-line>
        <country>South Africa</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>South African Medical Research Council Unit on Risk &#38; Resilience in Mental Disorders</institution>
        <institution>Department of Psychiatry &#38; Neuroscience Institute</institution>
        <institution>University of Cape Town</institution>
        <addr-line>Cape Town</addr-line>
        <country>South Africa</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Anna Hartford <email>annahartford@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>2</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>11</day>
        <month>2</month>
        <year>2022</year>
      </pub-date>
      <volume>9</volume>
      <issue>2</issue>
      <elocation-id>e30838</elocation-id>
      <history>
        <date date-type="received">
          <day>31</day>
          <month>5</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>1</day>
          <month>8</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>15</day>
          <month>10</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>15</day>
          <month>10</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Anna Hartford, Dan J Stein. Originally published in JMIR Mental Health (https://mental.jmir.org), 11.02.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Mental Health, is properly cited. The complete bibliographic information, a link to the original publication on https://mental.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://mental.jmir.org/2022/2/e30838" xlink:type="simple"/>
      <abstract>
        <p>Recent years have seen growing public concern about the effects of persuasive digital technologies on public mental health and well-being. As the draws on our attention reach such staggering scales and as our ability to focus our attention on our own considered ends erodes ever further, the need to understand and articulate what is at stake has become pressing. In this ethical viewpoint, we explore the concept of attentional harms and emphasize their potential seriousness. We further argue that the acknowledgment of these harms has relevance for evolving debates on digital inequalities. An underdiscussed aspect of web-based inequality concerns the persuasions, and even the manipulations, that help to generate sustained attentional loss. These inequalities are poised to grow, and as they do, so will concerns about justice with regard to the psychological and self-regulatory burdens of web-based participation for different internet users. In line with calls for multidimensional approaches to digital inequalities, it is important to recognize these potential harms as well as to empower internet users against them even while expanding high-quality access.</p>
      </abstract>
      <kwd-group>
        <kwd>digital inequalities</kwd>
        <kwd>attentional harms</kwd>
        <kwd>excessive internet use</kwd>
        <kwd>persuasive technologies</kwd>
        <kwd>internet ethics</kwd>
        <kwd>attention economies</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Over the past 3 decades, as the internet has become an increasingly indispensable tool for economic, social, and political inclusion, there has been extensive and warranted concern about the sorts of social inequalities, or stratifications, that are generated or exacerbated by digital exclusion.</p>
      <p>Initially, first-level research on these digital divides focused predominantly on the issue of access or nonaccess to the internet. However, as access has widened and as the field has developed, it has become clear that more complex and multidimensional analyses of digital inequalities are necessary. In turn, focus has shifted from access alone to include the quality of access; questions regarding digital literacy and proficiency (referred to as <italic>second-level digital divides</italic>) [<xref ref-type="bibr" rid="ref1">1</xref>]; and, more recently, the ability to generate concrete social and economic benefits via the internet (referred to as <italic>third-level digital divides</italic>) [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>].</p>
      <p>Increasingly, there has been growing concern about the prejudicial nature of the <italic>harms</italic>, and not only the benefits, that can accompany web-based participation, particularly with regard to surveillance, algorithmic bias, and predatory marketing [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Among the potential harms associated with digital access, which can be exacerbated by socioeconomic forces and factors, are what we will be calling <italic>attentional harms</italic>. The present nature of the internet has made it an extraordinary draw on human attention, which has been amplified by the internet’s design and commodification. The growing awareness of design features that encourage excessive use has necessitated an ethical reckoning regarding what is at stake when we introduce powerful forces of distraction into our lives at such an enormous scale or when human attention is treated as a commodity by the world’s most powerful corporations.</p>
      <p>The acknowledgment of these factors has serious implications within multidimensional analyses of digital divides, especially insofar as our goal ought to be to provide digital access that empowers individuals and enriches their lives. In countries that have addressed earlier digital divides, the issue of attentional harms has become more pressing, and in some tech-heavy societies, being empowered to disconnect or having the option of “tech-lite” environments is increasingly seen as a privilege [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      <p>In many other countries, particularly those in the Global South, the issue of digital divides is understudied and underresearched, with the focus remaining predominantly on enduring first-level divides [<xref ref-type="bibr" rid="ref16">16</xref>]. However, countries that are still addressing earlier digital divides now have the opportunity to do so in a more complex and multidimensional way, including by recognizing the potential harms and agential costs that can be generated by internet use, particularly when we are not adequately informed about and empowered against them.</p>
    </sec>
    <sec>
      <title>Attention Economies</title>
      <p>Broadly speaking, persuasive design is the process of creating technologies in order to generate behavioral change. One can distinguish between the intended and unintended effects of persuasive design [<xref ref-type="bibr" rid="ref17">17</xref>] and between persuasive design and outright manipulative, deceptive, or coercive design [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>], though in some cases these distinctions will be vague. Fogg [<xref ref-type="bibr" rid="ref20">20</xref>] famously founded the Stanford Persuasive Technology Lab (now the Behavior Design Lab) and developed a behavior model for persuasive design. Concern about the ethics of persuasive design has accompanied the field from the outset. Fogg [<xref ref-type="bibr" rid="ref21">21</xref>] himself has been careful to say that these techniques should not be used for ignoble purposes and has proposed that education is key to empowering individuals against nefarious forms of persuasive design. Recent ethical debates concerning design principles have emphasized the roles of participatory design and design justice as ways of overcoming marginalization and oppression [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref25">25</xref>] as well as advancing design that is aligned with, rather than opposed to, human well-being and flourishing (a point to which we will soon return) [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
      <p>The so-called <italic>attention economy</italic> has come to dominate the provision of many web-based services. As such, success and profitability often relies on maximizing user engagement; the more often and the longer users engage with products, the more data manufacturers are able to collect on them and the longer manufacturers have them as an audience for advertisers. In turn, the goal of many software developers has been to design products that generate habitual engagement and maximize use, drawing on techniques from applied psychology, neuroscience, and behavioral economics in their efforts.</p>
      <p>Certain pervasive design features, such as “like” buttons (or their equivalents), push notifications, streaks, auto-play, and infinite scroll, have been especially successful in this regard and have proliferated across platforms. The success of some of these features in terms of maximizing use have often been attributed to intermittent variable rewards, which have long been linked to addictive behavior and are also associated with the addictive quality of slot machines [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. At the level of our neural reward system, an uncertain reward generates a more significant dopamine response than those generated by a reliable reward. On prominent internet platforms, sophisticated machine learning technologies now endeavor to randomize rewards for each user. Insofar as these content “rewards” involve high arousal and extreme or divisive material, there are related concerns about social harms [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>].</p>
      <p>The effect of these design features on our behavior, and their draw on our attention, is patent. The habitual checking of certain internet platforms and incessant engagement with smartphones have become facts of life in many parts of the world. One report indicates that the average smartphone user checks their device over 70 times per day and swipes and interacts with it thousands of times [<xref ref-type="bibr" rid="ref31">31</xref>]. Efforts to limit or reduce the time spent on devices, even among “ordinary” users, can require significant self-control and often results in failure [<xref ref-type="bibr" rid="ref32">32</xref>]. The difficulty of focusing one’s attention while having ready access to the internet has also become renowned, with many people investing in internet and site-blocking software in order to aid concentration. The mere presence of a smartphone has been reported to adversely affect working memory and functional fluid intelligence [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
      <p>Persuasive design focused on maximizing use has come under increased scrutiny in recent years. Public interest about the effects of persuasive technologies on our behavior, mental health, and well-being has grown significantly, informed by a public conversation featuring tech insiders (notably the former Google design ethicist Tristan Harris), policy makers, health specialists, and educators, among others [<xref ref-type="bibr" rid="ref34">34</xref>]. Some have argued that the increasing sophistication of persuasive digital technologies and their personalized nature makes them a far deeper and more considerable threat to autonomy than more long-standing and familiar forms of persuasive design [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
    </sec>
    <sec>
      <title>Attentional Harms</title>
      <p>The value of our attention, that is, our ability to direct our attention in meaningful ways and our capacity for sustained attention, is as yet underexplored and undertheorized territory [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. However, as the draws on our attention and the power of digital distractions reach such staggering scales and as our ability to focus our attention on our own considered ends erodes ever further, the need to understand and articulate what is at stake has become pressing. Yet, the necessary ethical frameworks (and even vocabularies) for understanding the significance of these forces are presently underdeveloped. Williams [<xref ref-type="bibr" rid="ref35">35</xref>] writes:</p>
      <disp-quote>
        <p>To date, the problems of “distraction” have been minimized as minor annoyances. Yet the competition for attention and the “persuasion” of users ultimately amounts to a project of the manipulation of the will. We currently lack a language for talking about, and thereby recognizing, the full depth of these problems. At individual levels, these problems threaten to frustrate one’s authorship of one’s own life.</p>
      </disp-quote>
      <p>Amplifying this sentiment, Dennett [<xref ref-type="bibr" rid="ref36">36</xref>] has said that “this is perhaps the greatest risk to human political freedom that we’ve ever seen,” and that “an agent who controls your attention controls you.”</p>
      <p>It is clear that what we pay attention to is closely related to our conscious awareness and, therefore, to deep aspects of our individual identity and what constitutes our experience of life. How we direct our attention has both voluntary and involuntary aspects, and our attention can be drawn and held in ways that are by no means indicative of our assessments of worth, including via persuasion, manipulation, and coercion. Insofar as we are compelled to direct ever more significant amounts of our attention in ways that we do not relate to on a deeper level or in ways that we would not reflectively endorse, there are elements of our very selfhoods that are at stake.</p>
      <p>An emerging philosophical conversation has sought to situate attentional harms within existing paradigms for understanding what is necessary for human well-being. For the purposes of this viewpoint, we only summarize some of the approaches that have been taken and gesture to other moral frameworks that might be applicable to the issue of attentional harms. As seen above, in exploring the harms implicit in pervasive attentional loss, some philosophers have focused on personal autonomy [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Other philosophers, drawing on Wolf [<xref ref-type="bibr" rid="ref37">37</xref>], have emphasized the importance of the construction of worth and meaning to human well-being and have argued that persistent distraction undermines the pursuit of this goal [<xref ref-type="bibr" rid="ref38">38</xref>]. Still others have drawn on Nussbaum’s [<xref ref-type="bibr" rid="ref39">39</xref>] capabilities approach, which asserts the moral importance of the freedom to achieve well-being and understands well-being in terms of an individual’s capabilities, to argue that the harms of excessive time spent on the internet can undermine the capabilities central to human dignity [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
      <p>An enduring difficulty within this debate concerns how to distinguish between beneficial and harmful co-options of our attention. After all, sometimes our attention is drawn precisely because we are highly invested in something and consider it enduringly worthwhile and meaningful. This can also be true of the time we spend on the internet; there is no end to what can be pursued on the internet, including essential and otherwise worthwhile undertakings, and therefore no straightforward relationship between the time spent on the internet and the sorts of attentional harms with which we are concerned. Further, within certain parameters, escapism itself can be stress relieving and curative. Given this: how can we recognize the harmless aspects, and even the beneficial aspects, of attentional loss while simultaneously recognizing where our attention is being co-opted in harmful ways and where we are giving over large swathes of our lives and receiving little in return but angst, regret, and alienation from our web-based pursuits?</p>
      <p>A deontological framework is potentially useful here; we can distinguish between cases where our attention is being used as a mere means to the ends of others and cases where it is being treated as an end in itself. Per this framework, in cases where our attention is used as a mere means, the sustained co-option of our attention can be construed as harmful. In cases where our attention is also treated as an end in itself—cases where our engagement is ultimately something we would reflectively endorse—the sustained co-option of our attention need not be harmful and may even be beneficial.</p>
      <p>Another important consideration in appraising these attentional harms is what has been called the <italic>indispensability thesis</italic> [<xref ref-type="bibr" rid="ref15">15</xref>]. The all-purpose nature of digital devices, which include a range of essential and work-related functions, has resulted in the use of such devices increasingly becoming a requirement in both our personal and professional lives (and never more so than during the COVID-19 pandemic). This increasing indispensability has long motivated concern about digital inequalities in terms of the quality of access. However, the fact of indispensability also raises different ethical questions, and there is a sense in which the indispensability of (near-constant) internet access undermines full-fledged consent to the risks and deleterious effects associated with such access and engagement, given that there is increasingly no realistic alternative [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      <p>The current nature of the internet exacerbates this difficulty. In most cases, people cannot keep only the “essential” internet on them (ie, the parts they need to function or pursue their goals); people must always have access to the whole thing, including parts that might be sources of compulsion and regret. As Hanin [<xref ref-type="bibr" rid="ref15">15</xref>] puts it:</p>
      <disp-quote>
        <p>Whereas no sane adult must smoke, use drugs, consume sugary foods, or gamble as a precondition to leading a fulfilling life or excelling in a profession, many sane adults have no practical way of avoiding often prolonged entanglement with digital ecosystems in the workplace and their personal lives. This entanglement poses formidable psychological challenges for self-regulation.</p>
      </disp-quote>
      <p>We agree with scholars who argue that widespread and systemic attentional harms should not be downplayed or dismissed and that they can potentially be deeply undermining to human agency and well-being. Respect for individuals ought to include respect for their attention, and any aspirational notion of the value of human life and the conditions for human flourishing ought to recognize the importance of our engaged presence and the ideal of achieving a sense of meaning and worth within our lives [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. Insofar as digital distractions stymie these pursuits—often intentionally and on an utterly unprecedented scale—we are warranted in resisting or seeking to alter the forms these technologies take within our lives.</p>
    </sec>
    <sec>
      <title>Attentional Inequalities</title>
      <p>As research into digital inequalities has emphasized, in expanding access to web-based services, it is crucial to acknowledge that not all internet access is equal. This inequality also pertains to attentional harms. The potential burdens of internet access, including the psychological and self-regulatory burdens that we have been describing, are very differently felt by different users depending on their device, their digital literacy, their awareness of these potential harms, and their recourse to strategies for avoiding them.</p>
      <p>In societies where inequalities related to internet access have largely been overcome, socioeconomic vulnerability sometimes correlates with more time, rather than less time, on certain platforms, including social media and digital games [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. In some places, “tech-lite” environments are becoming the ultimate privilege. For example, it is a much-reported fact that many Silicon Valley insiders send their children to the deliberately “tech-lite” Waldorf School [<xref ref-type="bibr" rid="ref43">43</xref>]. Advocating for government-provided “tech-lite” environments, Hanin (writing from the United States of America) emphasizes that “poor and rich alike should have access to such settings, which may otherwise risk becoming a luxury for the few” [<xref ref-type="bibr" rid="ref15">15</xref>].</p>
      <p>Societies that are addressing earlier digital divides, including those in the Global South, should do so with cognizance of the emerging complexities and new stratifications regarding the potential attentional costs and burdens of access. In other words, the most empowering forms of connectivity are those that also empower us with strategies and effective methods for disengaging and disconnecting when we recognize, and are enabled to recognize [<xref ref-type="bibr" rid="ref44">44</xref>], that time spent on the internet is impeding our own considered ends rather than serving them.</p>
      <p>Research has also suggested that socioeconomic vulnerability is a risk factor for developing clinically significant internet addiction [<xref ref-type="bibr" rid="ref45">45</xref>]. Our earlier points about indispensability are relevant here too. One important consideration is determining how feasible it is for individuals to control their access, especially among those who are vulnerable to internet addiction or problematic use. As Christakis [<xref ref-type="bibr" rid="ref46">46</xref>] writes:</p>
      <disp-quote>
        <p>Cultural influences both mandate and facilitate that we spend time “online,” meaning that teetotalism is not an option. Given our current understanding that there is a genetic predisposition to behavioral addictions, we may be going a long way toward ensuring that the entire susceptible population develops them.</p>
      </disp-quote>
      <p>There are a range of straightforward socioeconomic factors that potentially contribute to attentional harms. Low-income internet users are much more likely to go on the internet by using their phone rather than a computer [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref47">47</xref>], which increases data vulnerability and, in many cases, limits control. Moreover, the ability to afford a more expensive smartphone provides a far higher degree of data privacy and greater control over which apps and services can be removed from a device or controlled within it, including those that someone might find to be compulsive or habit forming. A person who can afford to buy an iPhone (Apple Inc) or a parent who can afford to buy one for their child therefore has a far greater range of control over the time spent on their device and other use limits compared to that of someone who cannot afford to buy one [<xref ref-type="bibr" rid="ref34">34</xref>]. Android phones (which cost one-third of the price of iPhones) have also been reported to collect significantly more personal data [<xref ref-type="bibr" rid="ref48">48</xref>].</p>
      <p>Data vulnerability has primarily been assessed through the lens of privacy and security [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. However, another aspect of this vulnerability relates to attentional harms and the efficacy of targeted content. Increased data collection can generate a vicious cycle in which data can be deployed to better maximize use (through artificial intelligence–driven personalized recommendations and randomized rewards), which in turn allows more data to be gathered [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. Relatedly, these factors increase vulnerability to predatory marketing tactics [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref49">49</xref>].</p>
      <p>Socioeconomic inequalities in the burdens of attentional harms are liable to increase in coming years as divisions concerning who is aware of these harms emerge and as wealthier internet users buy their way out of some of the more noxious aspects of the web-based attention economy [<xref ref-type="bibr" rid="ref44">44</xref>]. In considering ways to move away from the attention economy model, the most obvious suggestion is to require users to pay for services. In recommending regulations on persuasive technologies, Williams [<xref ref-type="bibr" rid="ref35">35</xref>] suggests that “companies could be expected (or compelled, if necessary) to give users a choice about how to ‘pay’ for content online – that is, with their money or with their attention.” Aspects of this choice are already prevalent on the internet, with the distinction between free and premium services. As Roose writes [<xref ref-type="bibr" rid="ref50">50</xref>]:</p>
      <disp-quote>
        <p>Today’s internet is full of premium subscriptions, walled gardens and virtual VIP rooms, all of which promise a cleaner, more pleasant experience than their free counterparts.</p>
      </disp-quote>
      <p>At present, available methods for mitigating attentional harms require significant digital literacy. In the first place, one must recognize such forces and the designs that exacerbate them, and one must further recognize the available means for resisting them. One study, which used education as a proxy for socioeconomic status, found that while internet users with both low and high education levels recognize the attentional burdens of being on the internet, especially with regard to wasted time, highly educated users were much more likely to intervene or to consider that time spent on the internet is potentially detrimental to their self-actualization [<xref ref-type="bibr" rid="ref51">51</xref>]. Provided that one is aware of these options and, in many cases, is also able to pay for them, one can partially mitigate digital distraction by investing in site-blocking software, ad-blocking software, apps that generate screen time alerts, or devices that disable one’s internet connection for certain hours. People can also hide more of their personal information, encrypt their browsing history, and invest in apps and plug-ins that overwrite certain persuasive design features and shift default settings to those that reduce use rather than amplify use [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
      <p>If the goal of overcoming digital inequalities is to empower individuals and enhance their well-being and their access to opportunities, we have to be cognizant of aspects of digital access that are deliberately <italic>disempowering</italic>, undermine our pursuit of meaning and worth within our lives, and ultimately serve powerful corporate interests that might well conflict with the interests of individual users.</p>
      <p>The fact that these burdens can be compounded by socioeconomic factors generates further moral reasons to support decent minimum standards for design regulation and user controls (regardless of the cost of a device and regardless of whether services are free or paid for), since these burdens raise issues of justice with regard to the distribution of these essential controls and, in turn, raise issues of justice with regard to who will be empowered to better safeguard their attention as an end in itself and whose attention will be treated as a mere means to the ends of others.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <ack>
      <p>A portion of the material within this viewpoint overlaps with a chapter that we have written for <italic>Mental Health in a Digital World</italic> [<xref ref-type="bibr" rid="ref53">53</xref>], which overviewed some of the ethical implications of the addictive qualities of the internet.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Attewell</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The first and second digital divides</article-title>
          <source>Sociol Educ</source>
          <year>2001</year>
          <month>07</month>
          <volume>74</volume>
          <issue>3</issue>
          <fpage>252</fpage>
          <lpage>259</lpage>
          <pub-id pub-id-type="doi">10.2307/2673277</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Deursen</surname>
              <given-names>AJAM</given-names>
            </name>
            <name name-style="western">
              <surname>Helsper</surname>
              <given-names>EJ</given-names>
            </name>
          </person-group>
          <article-title>The third-level digital divide: Who benefits most from being online?</article-title>
          <source>Communication and Information Technologies Annual (Studies in Media and Communications)</source>
          <year>2015</year>
          <volume>10</volume>
          <fpage>29</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="doi">10.1108/S2050-206020150000010002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ragnedda</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>The Third Digital Divide: A Weberian Approach to Digital Inequalities</source>
          <year>2017</year>
          <publisher-loc>England, UK</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Digital inequalities in the age of artificial intelligence and big data</article-title>
          <source>Hum Behav Emerg Technol</source>
          <year>2019</year>
          <month>04</month>
          <day>26</day>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>141</fpage>
          <lpage>148</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://onlinelibrary.wiley.com/doi/10.1002/hbe2.140"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/hbe2.140</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blank</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Benefits and harms from internet use: A differentiated analysis of Great Britain</article-title>
          <source>New Media Soc</source>
          <year>2016</year>
          <month>09</month>
          <day>07</day>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>618</fpage>
          <lpage>640</lpage>
          <pub-id pub-id-type="doi">10.1177/1461444816667135</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>D'Ignazio</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Klein</surname>
              <given-names>LF</given-names>
            </name>
          </person-group>
          <source>Data Feminism</source>
          <year>2020</year>
          <publisher-loc>Cambridge, Massachusetts</publisher-loc>
          <publisher-name>The MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Noble</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Algorithms of Oppression: How Search Engines Reinforce Racism</source>
          <year>2018</year>
          <publisher-loc>New York, New York</publisher-loc>
          <publisher-name>NYU Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Madden</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gilman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Marwick</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Privacy, poverty, and big data: A matrix of vulnerabilities for poor Americans</article-title>
          <source>Washington University Law Review</source>
          <year>2017</year>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://openscholarship.wustl.edu/law_lawreview/vol95/iss1/6/">https://openscholarship.wustl.edu/law_lawreview/vol95/iss1/6/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eubanks</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <source>Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor</source>
          <year>2018</year>
          <publisher-loc>New York, New York</publisher-loc>
          <publisher-name>St. Martin's Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffmann</surname>
              <given-names>CP</given-names>
            </name>
          </person-group>
          <article-title>The dark side of online participation: exploring non-, passive and negative participation</article-title>
          <source>Inf Commun Soc</source>
          <year>2017</year>
          <month>02</month>
          <day>21</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>876</fpage>
          <lpage>897</lpage>
          <pub-id pub-id-type="doi">10.1080/1369118x.2017.1293129</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marwick</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>boyd</surname>
              <given-names>d</given-names>
            </name>
          </person-group>
          <article-title>Understanding privacy at the margins</article-title>
          <source>International Journal of Communication</source>
          <year>2018</year>
          <volume>12</volume>
          <fpage>1157</fpage>
          <lpage>1165</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ijoc.org/index.php/ijoc/article/download/7053/2293"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Micheli</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lutz</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Büchi</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Digital footprints: an emerging dimension of digital inequality</article-title>
          <source>Journal of Information, Communication and Ethics in Society</source>
          <year>2018</year>
          <month>08</month>
          <day>13</day>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>242</fpage>
          <lpage>251</lpage>
          <pub-id pub-id-type="doi">10.1108/jices-02-2018-0014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Neil</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <source>Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy</source>
          <year>2016</year>
          <publisher-loc>New York, New York</publisher-loc>
          <publisher-name>Crown</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Redden</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Brand</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Terzieva</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Data harm record</article-title>
          <source>Data Justice Lab</source>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://datajusticelab.org/data-harm-record/">https://datajusticelab.org/data-harm-record/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hanin</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Theorizing digital distraction</article-title>
          <source>Philos Technol</source>
          <year>2020</year>
          <month>02</month>
          <day>10</day>
          <volume>34</volume>
          <issue>2</issue>
          <fpage>395</fpage>
          <lpage>406</lpage>
          <pub-id pub-id-type="doi">10.1007/s13347-020-00394-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ragnedda</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gladkova</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Digital Inequalities in the Global South</source>
          <year>2020</year>
          <publisher-loc>London, United Kingdom</publisher-loc>
          <publisher-name>Palgrave Macmillan</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Verbeek</surname>
              <given-names>PP</given-names>
            </name>
          </person-group>
          <article-title>Persuasive technology and moral responsibility: Toward an ethical framework for persuasive technologies</article-title>
          <year>2006</year>
          <conf-name>Persuasive 2006</conf-name>
          <conf-date>May 18-19, 2006</conf-date>
          <conf-loc>Eindhoven, The Netherlands</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fogg</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <source>Persuasive technology: Using Computers to Change What We Think and Do</source>
          <year>2002</year>
          <publisher-loc>Amsterdam, Netherlands</publisher-loc>
          <publisher-name>Morgan Kaufmann</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bech</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>The need for focused research on coercion, deception and manipulation in persuasive use of social media</article-title>
          <year>2020</year>
          <conf-name>Persuasive 2020</conf-name>
          <conf-date>April 20-23, 2020</conf-date>
          <conf-loc>Aalborg, Denmark</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://ceur-ws.org/Vol-2629/16_poster_bech.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fogg</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <article-title>A behavior model for persuasive design</article-title>
          <year>2009</year>
          <conf-name>Persuasive 2009</conf-name>
          <conf-date>April 26-29, 2009</conf-date>
          <conf-loc>Claremont, California, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/1541948.1541999</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fogg</surname>
              <given-names>BJ</given-names>
            </name>
          </person-group>
          <article-title>Persuasive computers: perspectives and research directions</article-title>
          <year>1998</year>
          <month>01</month>
          <conf-name>CHI98: ACM Conference on Human Factors and Computing Systems</conf-name>
          <conf-date>April 18-23, 1998</conf-date>
          <conf-loc>Los Angeles, California, USA</conf-loc>
          <fpage>225</fpage>
          <lpage>232</lpage>
          <pub-id pub-id-type="doi">10.1145/274644.274677</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>D'Ignazio</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Graeff</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Harrington</surname>
              <given-names>CN</given-names>
            </name>
            <name name-style="western">
              <surname>Rosner</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>Toward equitable participatory design: Data feminism for CSCW amidst multiple pandemics</article-title>
          <year>2020</year>
          <month>10</month>
          <conf-name>CSCW '20: Computer Supported Cooperative Work and Social Computing</conf-name>
          <conf-date>October 17-21, 2020</conf-date>
          <conf-loc>USA</conf-loc>
          <fpage>437</fpage>
          <lpage>445</lpage>
          <pub-id pub-id-type="doi">10.1145/3406865.3418588</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Costanza-Chock</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Design Justice: Community-Led Practices to Build the Worlds We Need</source>
          <year>2020</year>
          <publisher-loc>Cambridge,  Massachusetts</publisher-loc>
          <publisher-name>The MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harrington</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Erete</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Piper</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Deconstructing community-based collaborative design</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2019</year>
          <month>11</month>
          <day>07</day>
          <volume>3</volume>
          <issue>CSCW</issue>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <pub-id pub-id-type="doi">10.1145/3359318</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dencik</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hintz</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Redden</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Treré</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Exploring data justice: Conceptions, applications and directions</article-title>
          <source>Inf Commun Soc</source>
          <year>2019</year>
          <month>05</month>
          <day>13</day>
          <volume>22</volume>
          <issue>7</issue>
          <fpage>873</fpage>
          <lpage>881</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tandfonline.com/doi/full/10.1080/1369118X.2019.1606268"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/1369118x.2019.1606268</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <article-title>Ethically aligned design: A vision for prioritizing human well-being with autonomous and intelligent systems, first edition</article-title>
          <source>IEEE Standards Association</source>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead1e.pdf">https://standards.ieee.org/content/dam/ieee-standards/standards/web/documents/other/ead1e.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eyal</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <source>Hooked: How to Build Habit-Forming Products</source>
          <year>2014</year>
          <publisher-loc>New York, New York</publisher-loc>
          <publisher-name>Portfolio</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schüll</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <source>Addiction by Design: Machine Gambling in Las Vegas</source>
          <year>2012</year>
          <publisher-loc>Princeton, New Jersey, United States</publisher-loc>
          <publisher-name>Princeton University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tufekci</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>YouTube, the great radicalizer</article-title>
          <source>The New York Times</source>
          <year>2018</year>
          <month>03</month>
          <day>10</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html">https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Taub</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>How YouTube radicalized brazil</article-title>
          <source>The New York Times</source>
          <year>2019</year>
          <month>08</month>
          <day>11</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2019/08/11/world/americas/youtube-brazil.html">https://www.nytimes.com/2019/08/11/world/americas/youtube-brazil.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <article-title>Mobile touches: dscout’s inaugural study on humans and their tech</article-title>
          <source>dscout</source>
          <year>2016</year>
          <month>06</month>
          <day>15</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://blog.dscout.com/hubfs/downloads/dscout_mobile_touches_study_2016.pdf">https://blog.dscout.com/hubfs/downloads/dscout_mobile_touches_study_2016.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <article-title>2018 Global Mobile Consumer Survey: US edition</article-title>
          <source>Deloitte</source>
          <year>2018</year>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www2.deloitte.com/content/dam/Deloitte/us/Documents/technology-media-telecommunications/us-tmt-global-mobile-consumer-survey-exec-summary-2018.pdf">https://www2.deloitte.com/content/dam/Deloitte/us/Documents/technology-media-telecommunications/us-tmt-global-mobile-consumer-survey-exec-summary-2018.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ward</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>Duke</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gneezy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bos</surname>
              <given-names>MW</given-names>
            </name>
          </person-group>
          <article-title>Brain drain: The mere presence of one’s own smartphone reduces available cognitive capacity</article-title>
          <source>J Assoc Consum Res</source>
          <year>2017</year>
          <month>04</month>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>140</fpage>
          <lpage>154</lpage>
          <pub-id pub-id-type="doi">10.1086/691462</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mackinnon</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Shade</surname>
              <given-names>LR</given-names>
            </name>
          </person-group>
          <article-title>“God Only Knows What It’s Doing to Our Children’s Brains”: A closer look at internet addiction discourse</article-title>
          <source>Jeunesse: Young People, Texts, Cultures</source>
          <year>2020</year>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>16</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1353/jeu.2020.0003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Stand Out of Our Light: Freedom and Resistance in the Attention Economy</source>
          <year>2018</year>
          <publisher-loc>Cambridge, United Kingdom</publisher-loc>
          <publisher-name>Cambridge University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dennett</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>Herding cats and free will inflation</article-title>
          <source>The American Philosophical Association</source>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ase.tufts.edu/cogstud/dennett/papers/Dennett_Romanell_C2020.pdf">https://ase.tufts.edu/cogstud/dennett/papers/Dennett_Romanell_C2020.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wolf</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Happiness and meaning: Two aspects of the good life</article-title>
          <source>Soc Philos Policy</source>
          <year>2009</year>
          <month>01</month>
          <day>13</day>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>207</fpage>
          <lpage>225</lpage>
          <pub-id pub-id-type="doi">10.1017/s0265052500001734</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sullivan</surname>
              <given-names>LS</given-names>
            </name>
            <name name-style="western">
              <surname>Reiner</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Digital wellness and persuasive technologies</article-title>
          <source>Philos Technol</source>
          <year>2019</year>
          <month>09</month>
          <day>07</day>
          <volume>34</volume>
          <issue>3</issue>
          <fpage>413</fpage>
          <lpage>424</lpage>
          <pub-id pub-id-type="doi">10.1007/s13347-019-00376-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nussbaum</surname>
              <given-names>MC</given-names>
            </name>
          </person-group>
          <article-title>Capabilities and human rights</article-title>
          <source>Fordham Law Review</source>
          <year>1997</year>
          <access-date>2022-01-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ir.lawnet.fordham.edu/flr/vol66/iss2/2">https://ir.lawnet.fordham.edu/flr/vol66/iss2/2</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bhargava</surname>
              <given-names>VR</given-names>
            </name>
            <name name-style="western">
              <surname>Velasquez</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Ethics of the attention economy: The problem of social media addiction</article-title>
          <source>Bus Ethics Q</source>
          <year>2020</year>
          <month>10</month>
          <day>06</day>
          <volume>31</volume>
          <issue>3</issue>
          <fpage>321</fpage>
          <lpage>359</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1017/beq.2020.32"/>
          </comment>
          <pub-id pub-id-type="doi">10.1017/beq.2020.32</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Floridi</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <source>The Onlife Manifesto: Being Human in a Hyperconnected Era</source>
          <year>2014</year>
          <publisher-loc>Berlin, Germany</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koivusilta</surname>
              <given-names>LK</given-names>
            </name>
            <name name-style="western">
              <surname>Lintonen</surname>
              <given-names>TP</given-names>
            </name>
            <name name-style="western">
              <surname>Rimpelä</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>Orientations in adolescent use of information and communication technology: a digital divide by sociodemographic background, educational career, and health</article-title>
          <source>Scand J Public Health</source>
          <year>2007</year>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>95</fpage>
          <lpage>103</lpage>
          <pub-id pub-id-type="doi">10.1080/14034940600868721</pub-id>
          <pub-id pub-id-type="medline">17366093</pub-id>
          <pub-id pub-id-type="pii">771226130</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Richtel</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>A Silicon Valley school that doesn’t compute</article-title>
          <source>The New York Times</source>
          <year>2011</year>
          <month>10</month>
          <day>22</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2011/10/23/technology/at-waldorf-school-in-silicon-valley-technology-can-wait.html">https://www.nytimes.com/2011/10/23/technology/at-waldorf-school-in-silicon-valley-technology-can-wait.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Castro</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>AK</given-names>
            </name>
          </person-group>
          <article-title>Is the attention economy noxious?</article-title>
          <source>Philosophers' Imprint</source>
          <year>2020</year>
          <volume>20</volume>
          <issue>17</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://hdl.handle.net/2027/spo.3521354.0020.017"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Glaesmer</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Brähler</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Woelfling</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Beutel</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Prevalence of internet addiction in the general population: results from a German population-based survey</article-title>
          <source>Behav Inf Technol</source>
          <year>2013</year>
          <month>08</month>
          <day>15</day>
          <volume>33</volume>
          <issue>7</issue>
          <fpage>757</fpage>
          <lpage>766</lpage>
          <pub-id pub-id-type="doi">10.1080/0144929x.2013.810778</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christakis</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <article-title>Internet addiction: a 21st century epidemic?</article-title>
          <source>BMC Med</source>
          <year>2010</year>
          <month>10</month>
          <day>18</day>
          <volume>8</volume>
          <fpage>61</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/1741-7015-8-61"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1741-7015-8-61</pub-id>
          <pub-id pub-id-type="medline">20955578</pub-id>
          <pub-id pub-id-type="pii">1741-7015-8-61</pub-id>
          <pub-id pub-id-type="pmcid">PMC2972229</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Duggan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Cell internet use 2013</article-title>
          <source>Pew Research Center</source>
          <year>2013</year>
          <month>09</month>
          <day>16</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://perma.cc/49NH-37NN">https://perma.cc/49NH-37NN</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schmidt</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>Google data collection</article-title>
          <source>Digital Content Next</source>
          <year>2018</year>
          <month>08</month>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcontentnext.org/wp-content/uploads/2018/08/DCN-Google-Data-Collection-Paper.pdf">https://digitalcontentnext.org/wp-content/uploads/2018/08/DCN-Google-Data-Collection-Paper.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Newman</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>How big data enables economic harm to consumers, especially to low-income and other vulnerable sectors of the population</article-title>
          <source>Fedral Trade Commission</source>
          <year>2017</year>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://perma.cc/VB4Y-53SR">https://perma.cc/VB4Y-53SR</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roose</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Online cesspool got you down? You can clean it up, for a price</article-title>
          <source>The New York Times</source>
          <year>2019</year>
          <month>11</month>
          <day>13</day>
          <access-date>2021-10-14</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/interactive/2019/11/13/magazine/internet-premium.html">https://www.nytimes.com/interactive/2019/11/13/magazine/internet-premium.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Scheerder</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>van Deursen</surname>
              <given-names>AJAM</given-names>
            </name>
            <name name-style="western">
              <surname>van Dijk</surname>
              <given-names>JAGM</given-names>
            </name>
          </person-group>
          <article-title>Negative outcomes of Internet use: A qualitative analysis in the homes of families with different educational backgrounds</article-title>
          <source>The Information Society</source>
          <year>2019</year>
          <month>08</month>
          <day>09</day>
          <volume>35</volume>
          <issue>5</issue>
          <fpage>286</fpage>
          <lpage>298</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tandfonline.com/doi/full/10.1080/01972243.2019.1649774"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/01972243.2019.1649774</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Purohit</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Barclay</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Holzer</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Designing for digital detox: Making social media less addictive with digital nudges</article-title>
          <year>2020</year>
          <month>04</month>
          <conf-name>CHI '20: CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 25-30, 2020</conf-date>
          <conf-loc>Honolulu, Hawaii, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1145/3334480.3382810</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hartford</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stein</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Stein</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Fineberg</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chaberlain</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Addiction, autonomy and the internet: Some ethical considerations</article-title>
          <source>Mental Health in a Digital World</source>
          <year>2021</year>
          <publisher-loc>Cambridge, Massachusetts</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
          <fpage>481</fpage>
          <lpage>496</lpage>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
