<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMIR</journal-id>
            <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
            <journal-title>Journal of Medical Internet Research</journal-title>
            <issn pub-type="epub">1438-8871</issn>
            <publisher>
                <publisher-name>Gunther Eysenbach</publisher-name>
                <publisher-loc>JMIR Publications Inc., Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v14i3e89</article-id>
            <article-id pub-id-type="pmid">22743534</article-id>
            <article-id pub-id-type="doi">10.2196/jmir.1890</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Viewpoint</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Using Instructional Design Process to Improve Design and Development of Internet Interventions</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Mohr</surname>
                        <given-names>David</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Calear</surname>
                        <given-names>Alison</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Christensen</surname>
                        <given-names>Helen</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Kavanagh</surname>
                        <given-names>David</given-names>
                    </name>
                </contrib>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>Kassam-Adams</surname>
                        <given-names>Nancy</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1">
                    <name name-style="western">
                        <surname>Hilgart</surname>
                        <given-names>Michelle M</given-names>
                    </name>
                    <degrees>MEd</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib2" corresp="yes">
                    <name name-style="western">
                        <surname>Ritterband</surname>
                        <given-names>Lee M</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>Behavioral Health and Technology</institution>
                        <institution>Department of Psychiatry and Neurobehavioral Sciences</institution>
                        <institution>University of Virginia</institution>
                        <addr-line>310 Old Ivy Way</addr-line>
                        <addr-line>Suite 102, PO Box 800223</addr-line>
                        <addr-line>Charlottesville, VA, 22903</addr-line>
                        <country>United States</country>
                        <phone>1 (434) 924 5988</phone>
                        <fax>1 (434) 244 7516</fax>
                        <email>LEER@virginia.edu</email>
                    </address>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Thorndike</surname>
                        <given-names>Frances P</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib4">
                    <name name-style="western">
                        <surname>Kinzie</surname>
                        <given-names>Mable B</given-names>
                    </name>
                    <degrees>PhD</degrees>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
            </contrib-group>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>Behavioral Health and Technology</institution>
                <institution>Department of Psychiatry and Neurobehavioral Sciences</institution>
                <institution>University of Virginia</institution>
                <addr-line>Charlottesville, VA</addr-line>
                <country>United States</country>
            </aff>
            <aff id="aff2" rid="aff2">
                <sup>2</sup>
                <institution>Curry School of Education</institution>
                <institution>Department of Leadership, Foundation and Policy</institution>
                <institution>University of Virginia</institution>
                <addr-line>Charlottesville, VA</addr-line>
                <country>United States</country>
            </aff>
            <pub-date pub-type="collection">
                <season>May-Jun</season>
                <year>2012</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>28</day>
                <month>06</month>
                <year>2012</year>
            </pub-date>
            <volume>14</volume>
            <issue>3</issue>
            <elocation-id>e89</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>15</day>
                    <month>07</month>
                    <year>2011</year>
                </date>
                <date date-type="rev-request">
                    <day>30</day>
                    <month>08</month>
                    <year>2011</year>
                </date>
                <date date-type="rev-recd">
                    <day>14</day>
                    <month>11</month>
                    <year>2011</year>
                </date>
                <date date-type="accepted">
                    <day>16</day>
                    <month>11</month>
                    <year>2011</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Michelle M Hilgart, Lee M Ritterband, Frances P Thorndike, Mable B Kinzie. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 28.06.2012. </copyright-statement>
            <copyright-year>2012</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.jmir.org/2012/3/e89/" xlink:type="simple" />
            <abstract>
                <p>Given the wide reach and extensive capabilities of the Internet, it is increasingly being used to deliver comprehensive behavioral and mental health intervention and prevention programs. Their goals are to change user behavior, reduce unwanted complications or symptoms, and improve health status and health-related quality of life. Internet interventions have been found efficacious in addressing a wide range of behavioral and mental health problems, including insomnia, nicotine dependence, obesity, diabetes, depression, and anxiety. Despite the existence of many Internet-based interventions, there is little research to inform their design and development.
A model for behavior change in Internet interventions has been published to help guide future Internet intervention development and to help predict and explain behavior changes and symptom improvement outcomes through the use of Internet interventions. An argument is made for grounding the development of Internet interventions within a scientific framework. To that end, the model highlights a multitude of design-related components, areas, and elements, including user characteristics, environment, intervention content, level of intervention support, and targeted outcomes. However, more discussion is needed regarding how the design of the program should be developed to address these issues. While there is little research on the design and development of Internet interventions, there is a rich, related literature in the field of instructional design (ID) that can be used to inform Internet intervention development.
ID models are prescriptive models that describe a set of activities involved in the planning, implementation, and evaluation of instructional programs. Using ID process models has been shown to increase the effectiveness of learning programs in a broad range of contexts. ID models specify a systematic method for assessing the needs of learners (intervention users) to determine the gaps between current knowledge and behaviors, and desired outcomes. Through the ID process, designers focus on the needs of learners, taking into account their prior knowledge; set measurable learning objectives or performance requirements; assess learners&#8217; achievement of the targeted outcomes; and employ cycles of continuous formative evaluation to ensure that the intervention meets the needs of all stakeholders.
The ID process offers a proven methodology for the design of instructional programs and should be considered an integral part of the creation of Internet interventions. By providing a framework for the design and development of Internet interventions and by purposefully focusing on these aspects, as well as the underlying theories supporting these practices, both the theories and the interventions themselves can continue to be refined and improved. By using the behavior change model for Internet interventions along with the best research available to guide design practice and inform development, developers of Internet interventions will increase their ability to achieve desired outcomes.</p>
            </abstract>
            <kwd-group>
                <kwd>Internet interventions</kwd>
                <kwd>instructional design</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec sec-type="introduction">
            <title>Introduction</title>
            <p>Emerging technologies have had far-reaching implications on global connectivity, including the availability and use of health information [<xref ref-type="bibr" rid="ref1">1</xref>]. Given the accessibility and extensive capabilities of the Internet, it is increasingly being used to deliver comprehensive behavioral and mental health interventions. Their goals are to change user behavior, reduce unwanted complications or symptoms [<xref ref-type="bibr" rid="ref2">2</xref>], and improve health status and health-related quality of life [<xref ref-type="bibr" rid="ref3">3</xref>]. The Internet (and other technologies) offers the potential to provide efficient, interactive, tailored, and readily accessible health interventions [<xref ref-type="bibr" rid="ref2">2</xref>].</p>
            <sec>
                <title>Internet Interventions</title>
                <p>Results of meta-analyses of Internet-delivered interventions show evidence of their efficacy for addressing a broad range of behavioral and mental health concerns [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. Internet interventions have been found efficacious in addressing a variety of behavioral and mental health problems, such as insomnia, nicotine dependence, obesity, diabetes, depression, and anxiety [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Yet, despite the existence of many Internet-based interventions, the design of these interventions is widely variable, and there is little research to inform their design and development.</p>
                <p>A model for behavior change in Internet interventions has been published [<xref ref-type="bibr" rid="ref2">2</xref>] to help guide the development of Internet interventions and to help predict and explain behavior changes and symptom improvement through the use of these programs [<xref ref-type="bibr" rid="ref2">2</xref>]. With this model, Ritterband and colleagues argue for grounding the development of Internet interventions within a scientific framework&#8212;a framework that explicitly identifies the importance of user characteristics, environment, intervention content, level of intervention support, and targeted outcomes. More discussion, however, is needed regarding <italic>how </italic>the design of the program should be used to address these very issues.</p>
            </sec>
            <sec>
                <title>Instructional Design Defined</title>
                <p>While there is little research on the design and development of Internet interventions, there is a rich, related literature in the field of instructional design (ID). The term instructional design can be considered in three specific contexts. First, as a <italic>science</italic>, ID is concerned with how to help people learn more effectively. It includes research and theory about instructional, motivational, and behavioral learning strategies and the process models for designing and implementing instructional programs [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref18">18</xref>]. Second, as a <italic>field of practice</italic>, ID includes professional instructional designers working with teams of individuals to create detailed specifications for the development, design, implementation, evaluation, and maintenance of learning products [<xref ref-type="bibr" rid="ref19">19</xref>]. These individuals make up part of the primary stakeholder groups for an intervention, together with other individuals who have an investment, or stake, in the success of the target population of learners (program users). Stakeholders include program developers, content experts, learners from the target population, and those affected by the program outcome. Finally, ID, as a <italic>process, </italic>(see <xref ref-type="table" rid="table1">Table 1</xref>) employs process models to guide the systematic development of instructional specifications drawing on learning, instructional, motivational, and behavioral theory to ensure the quality of instructional strategies.</p>
                <p>Additionally, the ID process allows the translation of these theories into design principles that guide the development of the instructional product. This paper is focused on using ID as a systematic, reflective, and iterative process in the development of Internet interventions.</p>
                <table-wrap id="table1" position="float">
                    <label>Table 1</label>
                    <caption>
                        <p>The instructional design (ID) process: terms and definitions.</p>
                    </caption>
                    <table cellpadding="8" cellspacing="0" border="1" rules="groups" frame="hsides" width="1000">
                        <col width="297" />
                        <col width="703" />
                        <tbody>
                            <tr valign="top">
                                <td>  Instructional design  </td>
                                <td>  The systematic development of learning programs using theory to ensure the quality of instruction. It is the entire process of analysis of learning needs and goals, and the development of a delivery system to meet those needs.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  ID process model  </td>
                                <td>  Prescriptive models that describe a systematic set of activities and steps involved in the planning, implementation, and evaluation of instructional programs.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Developmental research  </td>
                                <td>  The systematic study of designing, developing, and evaluating instructional programs, processes, and products that must meet the criteria of internal consistency and effectiveness.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Learners  </td>
                                <td>  The target population of an intervention: the individuals for whom the program or intervention is created.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Internet interventions  </td>
                                <td>  Internet-delivered, interactive, multimedia behavioral treatments often based on effective face-to-face interventions. Typically self-guided, highly structured, personalized, and tailored to the user to provide follow-up and feedback.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Stakeholders  </td>
                                <td>  Individuals who have a stake in the success of the target population of learners (program users). Stakeholders include program developers, content experts, learners from the target populations, and those affected by the program outcome.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Formative evaluation  </td>
                                <td>  The iterative process of tryout and revision of instruction and activities during development of the intervention before the actual implementation.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Needs assessment and analysis  </td>
                                <td>  Considers gaps between &#8220;what is&#8221; and &#8220;what should be&#8221; or &#8220;actual behaviors&#8221; versus &#8220;optimal behaviors.&#8221; Each gap is considered a need. A needs assessment or analysis is a process for determining how to close gaps. It involves identifying the required attitudes, behaviors, skills, and knowledge to meet needs.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Instructional goal  </td>
                                <td>  Formulated from the identified needs in the needs analysis. Instructional goals relate logically and persuasively to the documented performance gaps identified in the needs analysis.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Task analysis  </td>
                                <td>  Performed to identify the tasks required to reach the goals. This is an analysis of the content required for the desired instructional outcomes.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Learning objective  </td>
                                <td>  Written to specify exactly what the learner must do, know think, or feel as a result of completing the instruction. Objectives provide a framework for assessing and evaluating the extent to which learning is taking place.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Affective objective  </td>
                                <td>  Objectives that involve attitudes, emotions, and values.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Cognitive objective  </td>
                                <td>  Objectives and tasks related to information, knowledge, problem solving, and other intellectual aspects of learning.  </td>
                            </tr>
                            <tr valign="top">
                                <td>  Psychomotor objectives  </td>
                                <td>  Objectives that require the use of physical capabilities and activities, such as performing, manipulating, and constructing tasks.  </td>
                            </tr>
                        </tbody>
                    </table>
                </table-wrap>
            </sec>
            <sec>
                <title>Internet-Delivered Interventions and Instructional Design</title>
                <p>During the past decade, educational researchers have focused on conducting design and development research to advance the practice of instructional development [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. Studying the design and development process of an innovative instructional product can help developers better understand how to apply theoretical frameworks to the development process [<xref ref-type="bibr" rid="ref22">22</xref>]. The same case can be made for studying the design and development of Internet-delivered interventions.</p>
                <p>Developmental research in education seeks to create knowledge grounded in data systematically derived from practice [<xref ref-type="bibr" rid="ref20">20</xref>]. By focusing specifically on the design and development process of creating Internet interventions, we can gain knowledge of the best practices and methods, and can develop more efficient models and frameworks for creating Internet interventions. Incorporating the ID process into the design and development of Internet interventions allows for continued testing and refinement of the theories that guide development and improvement in the resulting interventions. This is the essence of design-based research; theory dictates the design principles. Employing ID process during the design of Internet-delivered interventions allows the programs to be evaluated for efficacy while also testing and refining the design principles that initially informed development of the intervention [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
                <p>At their core, Internet interventions are innovative programs designed to teach skills, increase knowledge, and change behaviors, symptoms, or other targeted attributes. A majority of Internet interventions target specific behavioral, psychological, motivational, or health education outcomes, or a combination of these. Each intervention is implemented within its own context in which individuals from the target population (called learners or users) will use and (ideally) benefit from the program. It is important to clarify at the outset that the term learner or user is used to identify Internet intervention participants given their enrollment in a program designed to bring about change. These learners, however, are considered in different ways within the design process and the intervention itself (eg, patient or caregiver; child or parent; or children, teens, adults, or seniors). Although Internet-delivered intervention participants may not think of themselves as learners, they share the fundamental characteristic with learners of any intervention or involvement in a program with the aim of change, improvement, or advancement. This, together with the similarity of learning purposes for Internet-delivered health interventions and other types of instructional interventions, makes the ID process an excellent fit for the design and development of Internet-delivered interventions.</p>
            </sec>
            <sec>
                <title>Models of Instructional Design</title>
                <p>ID models can be used prescriptively to describe a systematic set of activities and steps involved in the planning, implementation, and evaluation of instructional programs. Using ID process models has been shown to increase the effectiveness of learning programs in a broad range of contexts, including both online and face-to-face formats [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref24">24</xref>-<xref ref-type="bibr" rid="ref27">27</xref>]. ID models prescribe a systematic method for assessing the needs of learners to determine the gaps between current attitudes, behaviors, and knowledge and the desired outcomes [<xref ref-type="bibr" rid="ref28">28</xref>]. The ID process guides designers to focus on the needs of learners, taking into account their prior knowledge [<xref ref-type="bibr" rid="ref29">29</xref>]; set measurable learning objectives or performance requirements; design instructional strategies based on appropriate theory; assess users in a way that results in meaningful outcomes [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]; and use cycles of formative evaluation to ensure that the intervention meets the needs of all stakeholders.</p>
                <p>We describe two ID models to convey the breadth in models from simple to elaborate, showing how ID models ultimately focus on similar activities. On one end of the complexity spectrum, Smith and Ragan [<xref ref-type="bibr" rid="ref27">27</xref>] present what they call &#8220;a simple or common instructional design model&#8221; (see <xref ref-type="fig" rid="figure1">Figure 1</xref>) that focuses on three key activities or phases of the ID process: <italic>analysis</italic>, <italic>strategy</italic>, and <italic>evaluation</italic>. Analysis activities consist of assessing learners and learning contexts and developing learning goals. Strategy activities focus on design, organization, and delivery of instructional components. Evaluation activities focus on formative tryout of instruction to allow for revision before implementation.</p>
                <p>Although the model is presented as linear, its authors point out that phases often happen concurrently, and considerations in one phase may (and often do) overlap with those in another phase. An important aspect of the ID process is that it is iterative. Formative evaluation begins during the first cycle, with &#8220;member checking&#8221; of the needs assessment, and continues throughout development. The results of the formative evaluation are used to make revisions to the intervention. The cycles repeat, with further evaluations guiding further revision.</p>
                <p>In contrast to the simplicity of Smith and Ragan&#8217;s ID model [<xref ref-type="bibr" rid="ref27">27</xref>], Dick and Carey&#8217;s Systems Approach Model for Designing Instruction (see <xref ref-type="fig" rid="figure2">Figure 2</xref>) presents a more complex ID model. This model displays more of the specific ID activities that take place [<xref ref-type="bibr" rid="ref19">19</xref>], yet each of these activities can be mapped to the analysis, strategy, and evaluation components outlined in the Smith and Ragan model [<xref ref-type="bibr" rid="ref27">27</xref>]. The key ID activities of analysis, strategy, and evaluation are described in detail below.</p>
                <fig id="figure1" position="float">
                    <label>Figure 1</label>
                    <caption>
                        <p>Smith and Ragan’s instructional design process model.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure2" position="float">
                    <label>Figure 2</label>
                    <caption>
                        <p>The Dick and Carey Systems Approach Model for Designing Instruction.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>Analysis</title>
                <p>In the analysis phase, the focus is on the targeted learner population (intervention users); the context and environment in which the learning (intervention) occur; identification of learning (intervention) goals and objectives; and the learning (intervention) tasks themselves. A needs assessment is performed to collect the information used in the analysis phase. Needs assessment and analysis considers the gaps between &#8220;what is&#8221; and &#8220;what should be.&#8221; A needs assessment is a process for determining how to close a learning or performance gap [<xref ref-type="bibr" rid="ref32">32</xref>] and involves identifying the important needs and how best to meet them.</p>
                <p>A particularly useful and relevant needs assessment approach, the discrepancy model of needs assessment, examines the gaps, or differences, between individuals who perform desired behaviors and those who do not [<xref ref-type="bibr" rid="ref27">27</xref>]. For example, when a successful intervention requires learners to perform a behavior (take a medicine), use knowledge (recognize a skin problem), or show an attitude or belief (perceive one&#8217;s own risk), the differences between what ideal performers do, think, and feel are compared with what learners in the target population are actually doing, thinking, and feeling. Once gaps have been identified, the causes of the gaps can be studied and quantified. This information then shapes development of the learning or intervention tasks designed to achieve the intervention goals.</p>
                <p>Internet intervention development is often based on effective face-to-face treatments where specific desired learning and performance outcomes have already been clearly identified and tested [<xref ref-type="bibr" rid="ref33">33</xref>]. That is, Internet intervention developers frequently borrow from the goals identified in face-to-face treatments. Using the discrepancy approach to needs assessment, Internet intervention developers can focus on the causes of the gaps between what their target population is currently doing (knowing, thinking, or feeling) and what they should be doing to achieve the targeted outcome. Each gap discovered in the analysis is considered a need.</p>
                <p>The discrepancy approach can also be used in instances where optimal behaviors have not been identified or are not known. In this case the optimal, or ideal, behaviors must be identified as part of the needs assessment process by collecting information from the target learners. This includes collecting information from those who have successfully achieved the desired outcome, as well as those who have not. Data are collected to inform developers about the level of awareness of the problem or condition of interest, the common symptoms, how risk is typically managed, and the level of adherence to preventive behaviors. As the data are analyzed, the attitudes, behaviors, skills, and knowledge of the successful individuals are identified and quantified as the optimal set of behaviors, skills, and knowledge. The differences between this ideal set and the unsuccessful set can then be identified as gaps or needs.</p>
                <p>In the ID process, identified needs are then formulated into goals. It is critical that goals relate logically and persuasively to the documented performance gaps identified in the needs analysis. The importance of considering learner-based needs cannot be overstated. Programs must target the needs of the identified population in order to be successful [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Instructional and goal analysis (systematic methods for analyzing goals to identify the required knowledge, skills, behaviors, and attitudes to meet them) is used to categorize and prioritize goals, based on the kind of learning that will occur, into a series of specific measurable and observable objectives.</p>
                <p>Objectives perform several critical functions in the design of instruction, including guiding designers toward the appropriate focus for instruction, and selecting activities and resources that facilitate effective learning [<xref ref-type="bibr" rid="ref29">29</xref>]. Objectives also provide a framework for assessing and evaluating the extent to which learning is taking place and play an important role in guiding the learner by identifying the skills and knowledge to master [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref29">29</xref>].</p>
                <p>During the analysis phase, the designer also considers the environment and context in which learning will take place. The environmental approach to analysis is based on three environmental domains: physical, social, and institutional [<xref ref-type="bibr" rid="ref34">34</xref>]. Physical concerns are those related to the physical environment in which the intervention will be used. Social concerns refer to the learners and their social connections and networks, including those that will influence the learning experience. Institutional considerations affect any institutional goals held by the sponsoring organization and help define the dissemination and use of the program. Each of these domains informs decisions that affect a learner&#8217;s ability and willingness to access and use the program. By working closely with members of the targeted population at the early stages of design and development, designers can fully consider the domain factors most relevant for creation of programs that reflect and address the needs of learners, as well as aligning with the domains in which the programs will be used.</p>
                <p>Task analysis, the next step in the ID process, is conducted to identify the actual tasks required to reach the goals identified in the needs analysis. This second analysis considers the content required for the desired instructional outcome [<xref ref-type="bibr" rid="ref29">29</xref>]. Although there are many ways to analyze tasks, most ID models provide a scheme for classifying information into discrete categories [<xref ref-type="bibr" rid="ref15">15</xref>]. The objectives and tasks typically fall into one of three domains, or categories: cognitive, psychomotor, and affective [<xref ref-type="bibr" rid="ref29">29</xref>]. The cognitive domain includes objectives and tasks related to recall of information, development of conceptual knowledge, application of knowledge to problem solving, and other intellectual aspects of learning. The psychomotor domain includes skills that require the use of physical capabilities and activities, such as performing, manipulating, and constructing tasks. The affective domain includes objectives targeting attitudes, emotions, and values. Thoughtful consideration of the learning experience, including the cognitive, psychomotor, and affective factors involved in that experience, will increase the likelihood that learners can successfully develop the desired knowledge, skills, behaviors, or attitudes.</p>
                <p>In summary, the analysis phase of the ID process involves two sets of analyses. The first analysis identifies the learners (intervention users), the learning (intervention) objectives, and the environment in which the learning (intervention) occurs. The second analysis considers the content, type of tasks, and learning experiences required to meet learning objectives.</p>
            </sec>
            <sec>
                <title>Strategy</title>
                <p>To guide creation of the instructional activities, the strategy phase of the ID process is informed by and draws upon tested theories. Theories are drawn from a range of fields including education and learning psychology, behavior change, and motivation [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref38">38</xref>]. Theories that have been widely applied include cognitive learning [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref40">40</xref>], information processing [<xref ref-type="bibr" rid="ref41">41</xref>], and multimedia learning [<xref ref-type="bibr" rid="ref42">42</xref>]. The structure and type of learning required by each objective influences which learning theories are most applicable. The selection of instructional strategies is also clearly influenced by the analysis of the content; that is, the determination of domain (ie, whether the target is a behavior, skill, knowledge, or attitude), as well as the analysis of the tasks that make up the desired performance. For example, if the intervention aim is to teach the users a rule (eg, to get out of bed if they have not fallen asleep in 20 minutes as part of an intervention for adults with insomnia), the developer first recognizes that this knowledge acquisition falls in the cognitive domain, and then considers the cognitive skills that lead up to and support the rule application (eg, conceptual understandings, which are in turn supported by information recall). Developers would then turn to cognitive theories to help inform their development of the learning activities designed to facilitate learning to apply this rule. Different types of learning tasks require substantially different levels of cognitive effort and different kinds of learning conditions [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref29">29</xref>].</p>
                <p>In this strategy phase of the ID process, the focus is on designing the learning activities that will best serve the specific set of learners for whom the program is being developed. Learning activities refer to learning experiences that involve informational content and designed experiences in which learners act on content in specific ways. Consideration is given to each specific objective and how best to actively engage learners with the learning experiences in order to obtain the desired result. The crafting of instructional strategies is considered the most crucial step in the ID process; it is the step that can contribute the most to making instruction successful [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
                <p>When selecting instructional strategies, designers also need to consider and select the media and methods best suited to deliver the desired experience. Smith and Ragan&#8217;s model [<xref ref-type="bibr" rid="ref27">27</xref>] (see <xref ref-type="fig" rid="figure1">Figure 1</xref>) highlights three key categories in the strategy phase: organization, delivery, and management. Organizational strategies focus on how instruction will be sequenced and presented. Delivery strategies are concerned with the instructional media that will be used and how learners are grouped. For example, learners may be grouped by level of prior knowledge, attitudes on the topic, skill abilities, motivation level, or presence of specific symptoms. In selecting the appropriate media elements used for the learning activities (eg, text, audio, graphics, and animation), developers should evaluate the motivational appeal and ability of each element to support learners in recalling prior knowledge, providing new learning stimuli, activating responses, providing feedback, and encouraging practice and transfer [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. Finally, management strategies focus on the scheduling and implementing of instruction.</p>
                <p>In sum, strategy activities are critical to the ID process. They include the design and development of the actual learning and behavior change activities that will be used to help achieve the objectives and offer designers the opportunity to draw on strategies that have previously been shown to be effective within other specific contexts. The strategy phase also focuses on the organization or sequencing of learning activities, and the media and delivery methods used to engage learners with the materials.</p>
            </sec>
            <sec>
                <title>Evaluation</title>
                <p>Formative evaluation refers to the iterative process of tryout and revision of activities or content during development before the actual implementation [<xref ref-type="bibr" rid="ref44">44</xref>]. The evaluation phase tests the assumptions made in the analysis and strategy phases. The purpose of formative evaluation is to ensure that the goals of the instruction are being achieved and to revise the program as needed before implementation. Formative evaluation requires a plan for determining the extent to which learning is taking place. It involves trying out learning activities with members of the learning group. Evaluation instruments are used to assess the learner&#8217;s mastery of the objectives.</p>
                <p>Formative evaluation ideally takes place at all stages of the ID process. In fact, Dick et al incorporate a formative evaluation element into each stage of their ID process model [<xref ref-type="bibr" rid="ref19">19</xref>] where draft versions of the instruction are examined and then revised as needed. Formative evaluation during the earliest stages of the ID process (even needs assessments can be member checked and refined for fit by stakeholders) can help determine whether the learning goals and objectives have been correctly identified, and whether assumptions made about learners and learner characteristics hold true. This helps prevent valuable time and resources from being wasted on components that are not effective. Using an ongoing formative evaluation approach, and revising the program based on findings, allows developers to identify weaknesses that can be corrected before full-scale implementation [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. It also increases the probability that the program, when implemented, will produce the desired learning and performance outcomes. Failure to conduct formative evaluation throughout all stages of the ID process misses opportunities for identification of problem areas and increases the possibility that learners will not achieve the intended goals despite considerable investment of resources.</p>
            </sec>
        </sec>
        <sec>
            <title>Integrating ID Process Into the Design and Development of Internet Interventions</title>
            <p>Ritterband and colleagues [<xref ref-type="bibr" rid="ref2">2</xref>] described a behavior change model for Internet interventions (see <xref ref-type="fig" rid="figure3">Figure 3</xref> for a high-level representation of the Internet intervention model juxtaposed with the ID model) that consists of nine nonlinear steps: (1) the <italic>user</italic>, influenced by (2) <italic>environmental factors</italic>, affects (3) <italic>website use </italic>and adherence, which is influenced by (4) <italic>support </italic>and (5) <italic>website </italic>characteristics. <italic>Website use </italic>leads to (6) <italic>behavior change </italic>and (7) <italic>symptom improvement </italic>through various (8) <italic>mechanisms of change</italic>. The improvements are sustained via (9) <italic>treatment maintenance </italic>or relapse prevention. Each section of this behavior change model can be clearly connected to the ID process.</p>
            <fig id="figure3" position="float">
                <label>Figure 3</label>
                <caption>
                    <p>Instructional design process model for behavior change in Internet interventions.</p>
                </caption>
                <graphic xlink:href="jmir_v14i3e89_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
            </fig>
            <sec>
                <title>User Characteristics and Environmental Factors</title>
                <p>Ritterband and colleagues [<xref ref-type="bibr" rid="ref2">2</xref>] identify seven areas of user characteristics that are congruent to the analysis phase of the ID model, including disease, demographics, traits, cognitive factors, beliefs and attitudes, physiological factors, and skills. Using an ID approach focuses the needs assessment on discrepancies between the user&#8217;s <italic>desired </italic>behaviors, skills, knowledge, or attitudes and their <italic>current </italic>behaviors, skills, knowledge, or attitudes. Identifying these discrepancies accomplishes two important functions: (1) it attempts to quantify the current state of affairs with regard to the target population so that progress toward meeting goals can be accurately measured [<xref ref-type="bibr" rid="ref24">24</xref>], and (2) it allows very specific learning and performance objectives to be crafted for the intervention that are based on the desired outcomes.</p>
                <p>Environmental factors are also considered in the analysis phase of the ID model. As in Ritterband and colleague&#8217;s model [<xref ref-type="bibr" rid="ref2">2</xref>], environment from the ID perspective is composed of multiple influences, and the focus on environment is holistic. Assessment methods are used to construct an environmental snapshot of how the program will be used by the learner from the physical, social, and institutional contexts of the learning environment. When using the ID model, designers can identify potential program supports and barriers and design the program accordingly. For example, through a needs assessment, designers of an Internet intervention targeting users with negative attitudes toward school are alerted that labeling recommended intervention activities as homework or assignments may present barriers for these users. The ID model also allows designers to leverage environmental factors that influence user characteristics. By systematically identifying the environmental factors, along with the characteristics of the user population, program designers can choose the most relevant motivation, learning, and behavior change theories for their set of learners and learning objectives based on the research literature. This, in turn, will affect the type of instructional strategies that are planned in the strategy phase.</p>
            </sec>
            <sec>
                <title>Website Use, Website Characteristics, Support, and Mechanisms of Change</title>
                <p>The website use, website characteristics, support, and mechanism of change components of the Internet intervention model all map to the strategy phase of the ID process model. All phases of the ID process are interrelated, so the findings and assumptions made in the analysis phase greatly affect the decisions made in the strategy phase. The emphasis in the strategy phase is on crafting the instructional strategies used to reach the desired goals. This focus underscores the importance of design-based research. Using a design&#8211;study approach, developers of Internet interventions tap theory for instructional strategy design guidelines that are then tested along with the instructional components. Thus, knowledge is created in the refinement of theories of both design or development and instruction in the context of Internet-delivered interventions.</p>
                <p>There are several specific challenges in considering instructional strategies in the context of Internet interventions. Opportunities to leverage technologies to build activities that support and promote learning are often not fully considered in favor of less expensive and more quickly produced solutions. For example, text-based delivery of learning is recognized as an important method, yet, before a text-focused solution is selected as most appropriate, it must be considered in relation to the target population of learners, their prior experiences and attitudes, and their reading levels. When text is used, learners can be grouped based on reading level or supported by providing narration so those with lower-level reading skill have the choice of listening instead of reading. Video clips, animation, audio segments, and images can all be integrated with text to support meeting learning objectives.</p>
                <p>Multimedia learning and using specific interactions to affect motivation, skill building, and behavioral change demand instructional strategies that move beyond text on a screen. These methods can be particularly appropriate when an intervention includes psychomotor skill building. Modeling, through the use of videos or animation of specific skills, using a variety of models and conditions can be more effective than reading about the activity [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Additionally, modeling typical beginner mistakes, while providing specific feedback on why problems occur and ways to correct or prevent them, can help learners gain mastery [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
                <p>Motivation, or the action of an individual to select and sustain a behavior, is another theory area from which designers of instructional strategies can find significant guidance. Motivation theories help focus attention and support affirmative answers to questions such as &#8220;Can I do this task?,&#8221; &#8220;Do I want to do this task?,&#8221; and &#8220;Will I continue to do this task?&#8221; Self-efficacy [<xref ref-type="bibr" rid="ref45">45</xref>], expectancy-value [<xref ref-type="bibr" rid="ref17">17</xref>], self-determination [<xref ref-type="bibr" rid="ref46">46</xref>,<xref ref-type="bibr" rid="ref47">47</xref>], and self-regulated learning theories [<xref ref-type="bibr" rid="ref47">47</xref>] can all provide designers with practical and applicable programmatic supports that can help learners meet learning objectives and help sustain adherence to intervention use.</p>
                <p>The strategy phase also focuses on organizing and sequencing learning activities in ways that will best help users meet identified program goals. Strategy activities include selecting media and methods for delivery of the instruction, and managing and supporting the implementation of the instructional strategies. In each of these areas, the primary concern is how best to engage the learner to reach agreed-on goals.</p>
            </sec>
            <sec>
                <title>Behavior Change, Symptom Improvement, and Treatment Maintenance</title>
                <p>The formative evaluation component of the ID model is the evaluation of program components completed while the intervention is being formed. This type of evaluation provides evidence for how well designers have reached their goals and allows modification of the program before it is fully implemented. Behavior change, symptom improvement, and treatment maintenance or relapse prevention components of the Internet intervention model align with the evaluation phase of the ID process. During formative evaluation activities, results of the needs assessment, instructional goals, objectives, and strategies are evaluated with content experts and members of the target population to explore whether the assumptions made, the strategies employed, and the learning activities developed actually result in the desired outcomes.</p>
                <p>To determine the extent to which goals are being met, designers develop and implement a plan for assessing outcomes from their intervention. Evaluation of instruction typically considers outcomes at four levels: (1) learner reactions, (2) learning achievement, (3) transfer of learning, and (4) organizational results [<xref ref-type="bibr" rid="ref26">26</xref>]. Formative evaluation focuses on the first two levels [<xref ref-type="bibr" rid="ref24">24</xref>], while summative evaluation (program evaluation that occurs after implementation) may focus on all four levels. The first level, learner (user) reactions, refers to the attitudes and preferences of the learners toward the learning intervention. This is the extent to which learners like or dislike the learning activities, or find the activities to be satisfactory, effective, and useful. The second level, learning (intervention) achievement, refers to how well learners perform on objective measures of learning. This is often tested with pre and post tests to determine the extent to which learners have mastered goals via change in attitudes, knowledge, skills, or behavioral intentions.</p>
                <p>During the revision stage of formative evaluation, the data that have been collected are analyzed and used to operationalize a set of revisions to the intervention. The ID process includes setting standards and criteria to guide revisions. This includes criteria for examining the data that have been collected; criteria for organizing and summarizing the data; and criteria for prioritizing which sources of data are most relevant to the revision efforts [<xref ref-type="bibr" rid="ref44">44</xref>]. Prioritizing and deciding how to implement revisions is typically the most challenging for designers. It can be relatively straightforward to identify a problem area but less clear what should be the appropriate revision or refinement of the instruction. For example, an evaluation of learners on how well they like an intervention and find it satisfactory and useful (level 1) returns negative results for one set of learners but positive results for other sets. Designers need to think about how the learners are being grouped and whether the set of learners with the unsatisfactory experience share characteristics that can help inform program revisions (eg, gender differences, differences in prior knowledge, differences in symptoms, or age-related differences). Designers also need to consider the selected theoretical underpinning and whether it is appropriate for the subset of learners with negative outcomes. Designers should investigate whether additional needs within a subset of the user population can be identified and supported by adding appropriate objectives, content, and instructional strategies, thus making the intervention satisfactory, useful, and relevant to all user groups. It is often necessary to reconsider the previous stages of analysis and strategy to determine how best to revise the instruction [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
                <p>By conducting preliminary testing of the Internet intervention with users from the target population, designers will be able to measure the extent to which they have reached their objectives and to further refine goals or strategies to best reach the desired outcomes. All elements of the Internet intervention model are incorporated because formative evaluation is conducted at each phase of the ID process to confirm the assumptions made in that phase. Another important aspect to note is that, because the ID process is highly interconnected, all elements of the model overlap considerably. For example, while this mapping shows behavior change, symptom improvement, and treatment maintenance as mapping only to the evaluation phase of activities of the ID process, there is also a clear connection to both analysis and strategy activities.</p>
            </sec>
        </sec>
        <sec>
            <title>Application</title>
            <p>Here are several examples to help convey the process of incorporating ID into the development of Internet interventions. These examples are broken down into the analysis, strategy and evaluation phases.</p>
            <sec>
                <title>Analysis Phase</title>
                <p>Instructional curriculum mapping is an ID method that uses flowcharting to illustrate instructional relationships within a program [<xref ref-type="bibr" rid="ref48">48</xref>]. An example of the use of instructional curriculum mapping flowcharts is seen in the development of iSHIFTup (Internet Skin Health Intervention For Targeted Ulcer Prevention), an Internet-delivered intervention designed for adults with spinal cord injury to prevent serious pressure ulcers (funded by the Commonwealth Neurotrauma Initiative, Virginia, USA). Within iSHIFTup, instructional curriculum mapping flowcharts were used to show how objectives map to instructional sequences. <xref ref-type="fig" rid="figure4">Figure 4</xref> shows a visual representation of the relationship between an objective for learners in iSHIFTup &#8220;to identify personal risk factors for pressure ulcers&#8221; and the skills and attitudes required to meet the objective. In this example, the objective skill is within the cognitive domain. The desired outcome is that learners be able to identify their own risk factors. To do this, learners first acquire the skills to describe general risk factors, then compare their own behaviors with these factors and classify their risk factors. Once learners have mastered these sequences, they are able to identify personal risk factors for pressure ulcers.</p>
                <p>
                    <xref ref-type="fig" rid="figure5">Figure 5</xref> (a small section of a larger, fully developed iSHIFTup flowchart) graphically shows learners&#8217; movement through the intervention from their first contact with the program to completion of all required intervention components. Flowcharting allows communication of the complex timing of events used in Internet interventions. Using these systematic methods allows visualization of the entire intervention and facilitates discussion with all stakeholders (including members of the target population of learners) to help reach consensus on the process. Using flowcharts to envision the whole system as it is being designed supports coordination between designers, developers, and those who will implement the program [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. It also allows for a common language and general procedure among the stakeholders. These flowcharts, and the written plans that accompany them, are results of the ID method. They aid the development team in the process of iterative review and revision of work in a coordinated and systematic manner.</p>
                <p>Another example of ID process in the analysis phase is the inclusion of learners from the target population in the design of the intervention. Including members of the group who will use the program in its design is critical to the success of the intervention. For example, in the design of iSHIFTup, 10 individuals (8 with spinal cord injury and 2 caregivers of patients with spinal cord injury) partnered with the development team. In addition to the 10 target user members, the development team consisted of content experts in the area of Internet-delivered interventions, pressure ulcers, and spinal cord injury medicine (clinical psychologist, rehabilitation physician, wound specialist, physical therapist, and occupational therapist), an instructional designer, a graphic artist, and a Web programmer. Collaboratively, the team identified program goals, content, and functional requirements for the intervention. Individuals with spinal cord injury shared their real-life stories about the challenges of keeping their skin healthy and maintaining preventive behaviors. They shared critical information about living with pressure ulcers and identified which coping strategies had (and had not) worked for them. Members of the user population also reviewed intervention content and instructional activities throughout the design and development of the program. They gave feedback that was incorporated into program revisions, and later reviewed the revised the content. This collaboration serves to ensure relevance and acceptability to the targeted learners (users) of the intervention.</p>
                <fig id="figure4" position="float">
                    <label>Figure 4</label>
                    <caption>
                        <p>Example of instructional curriculum mapping. Program objective: core level. IS = intellectual skill; VI = verbal information.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure5" position="float">
                    <label>Figure 5</label>
                    <caption>
                        <p>Example of instructional curriculum mapping. Program overview: sequence.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>Strategy Phase</title>
                <p>A comprehensive set of theory-driven instructional strategies has been recommended for health education [<xref ref-type="bibr" rid="ref49">49</xref>]. A condensed version of Gagne&#8217;s events of instruction [<xref ref-type="bibr" rid="ref43">43</xref>] is used as a starting point, or framework, on which the health belief model [<xref ref-type="bibr" rid="ref50">50</xref>], social cognitive theory [<xref ref-type="bibr" rid="ref18">18</xref>], and diffusion theory [<xref ref-type="bibr" rid="ref51">51</xref>] are drawn as key health behavior change theories to inform instructional strategy development. Specific instructional practices based on these theories are advanced for each of Gagne&#8217;s instructional events. For example, in the recommended strategy for Gagne&#8217;s event <italic>provide learner guidance</italic>, social cognitive theory suggests using trustworthy, knowledgeable modeling to demonstrate desired behaviors and social modeling to develop self-protective skills. For example, a series of photographs or illustrations of a trusted, competent person performing preventive or protective behaviors could be used. Diffusion theory suggests using trustworthy and knowledgeable opinion leaders from the target population to speed the diffusion process. An example of an instructional strategy informed by both of these theories would be a video of a recognized opinion leader (eg, well-known athlete, musician, or actor), who is identified with the target population, performing desired behaviors, such as checking blood glucose levels before driving.</p>
                <p>Another example of using ID process during the strategy phase can be seen in SHUTi (Sleep Healthy Using The Internet), an Internet intervention for adults with insomnia [<xref ref-type="bibr" rid="ref7">7</xref>]. One of the learning goals in this intervention is that users &#8220;recognize the relationship between <italic>Time in Bed </italic>and <italic>Sleep Efficiency</italic>.&#8221; This relationship has been identified as a conceptual understanding required to apply the behavioral rules of sleep restriction. Sleep efficiency is defined as the mathematical calculation of <italic>total sleep time </italic>divided by <italic>time in bed</italic>, multiplied by 100. In SHUTi, learners are cued (using highlighting and color) to move sliders to set and subsequently increase and decrease their total sleep time and time in bed to graphically see the relationship between the two. For example, as time in bed (while not asleep) increases, sleep efficiency decreases; and as time in bed approaches total sleep time, sleep efficiency increases (<xref ref-type="fig" rid="figure6">Figure 6</xref>).</p>
                <p>This interactive, user-controlled activity was selected as an ideal way to engage learners, based on their characteristics (above-average education, high motivation, and comfort with technology), the content being introduced (cognitive domain, making connections, and intellectual skill), and type of learning goal (to recognize the relationship between time in bed and sleep efficiency and apply it to their own situation). Several learning theories were applied in crafting this solution. Guided discovery e-learning architecture [<xref ref-type="bibr" rid="ref52">52</xref>] was selected in which knowledge construction is the learning goal and high interactivity is used to guide learners to specific goals such as making connections and identifying relationships. Multimedia learning theory suggests that people learn better when graphics are used to show relationships [<xref ref-type="bibr" rid="ref53">53</xref>]. Here, the quantitative relationship between time in bed, total sleep time, and sleep efficiency is shown graphically. By adding interactivity in the form of slider bars, it becomes a transformational graphic that depicts changes over time [<xref ref-type="bibr" rid="ref42">42</xref>]. The theory of planned behavior [<xref ref-type="bibr" rid="ref54">54</xref>] is used to encourage learners to consider their own behaviors (time in bed) and intentions.</p>
                <p>These examples demonstrate the ID process of drawing on learning theory and applying it to the specific learning context in which the intervention is being used. Design-based research, which blends empirical instructional research with the theory-driven design of learning environments [<xref ref-type="bibr" rid="ref55">55</xref>], is an important methodology for discovering which learning and behavior theories work in Internet interventions and under what conditions. This can lead to sharable theories that help communicate relevant implications to developers of Internet interventions [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. Using this type of design-based research approach focuses on methods that document processes of enactment to outcomes of interest.</p>
                <fig id="figure6" position="float">
                    <label>Figure 6</label>
                    <caption>
                        <p>SHUTi (Sleep Healthy Using The Internet) sleep efficiency interaction screen.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>Evaluation</title>
                <p>The final example focuses on formative evaluation and revision of instruction as part of the evaluation phase of ID. This example is an Internet-delivered intervention designed for pediatric encopresis (UCanPoopToo) [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. In this program, learners (parent and child dyads) using the intervention took part in formative evaluation activities. Analysis of the findings according to agreed-on criteria revealed that parents using the program could be further supported by including a self-assessment to determine whether their children had mastered each unit of instruction. Once this gap had been recognized, additional learning goals were identified to support parents in assessing their children&#8217;s mastery. Self-regulated learning theory [<xref ref-type="bibr" rid="ref47">47</xref>] was used to inform the design of self-assessments of the child&#8217;s content mastery and to allow parents to reflect on and adapt their children&#8217;s learning processes toward the learning goals.</p>
                <p>In the revision phase of the formative evaluation, the design team used core objectives as a starting point for developing the self-assessments. The result (see <xref ref-type="fig" rid="figure7">Figure 7</xref>) is a self-assessment at the end of each unit of instruction called <italic>Now I Can</italic>. Each Now I Can screen describes specifically what the child should be able to do at the end of the instruction. In current versions of the program, parents complete Now I Cans with their child to assess whether their child has mastered the skills in that core of instruction.</p>
                <fig id="figure7" position="float">
                    <label>Figure 7</label>
                    <caption>
                        <p>Now I Can screen from UCanPoopToo.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
                <fig id="figure8" position="float">
                    <label>Figure 8</label>
                    <caption>
                        <p>Internet intervention instructional design check list.</p>
                    </caption>
                    <graphic xlink:href="jmir_v14i3e89_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
                </fig>
            </sec>
            <sec>
                <title>Conclusion</title>
                <p>Developers of Internet interventions often struggle with the question of whether adding a particular feature to an intervention, such as a game, a simulation, or animation, is a good or bad idea. This, however, is not the salient question to consider. Instead, given the concepts of the ID process set forth here, designers of Internet-delivered interventions are encouraged to take a learner-centered, needs-based approach and to consider how <italic>all </italic>technology features (eg, text, graphics, interactivity, video, and games) can be used in ways to best meet the needs of learners. It is not a simple question of whether to include a feature, but is instead a broader, more complex question of what theory-based learning activities best support a specific set of learners given their own characteristics and learning environment to meet an identified set of measurable objectives.</p>
                <p>The ID process offers a proven methodology for the design of instructional programs and should be considered an integral part of the creation of Internet interventions. To support researchers, an Internet intervention ID check list has been created and included to use in developing new Internet-delivered interventions (see <xref ref-type="fig" rid="figure8">Figure 8</xref>). By providing a framework for the design and development of Internet-delivered interventions and by purposefully focusing on the design, development, and the underlying theories supporting these practices, both the theories and the interventions themselves will continue to be refined and improved. By using the behavior change model for Internet interventions along with the best research available to guide design practice and inform development, developers of Internet-delivered interventions will increase their ability to help users achieve the desired outcomes.</p>
            </sec>
        </sec>
    </body>
    <back>
        <glossary>
            <title>Abbreviations</title>
            <def-list>
                <def-item>
                    <term id="abb1">ID</term>
                    <def>
                        <p> instructional design</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb2">iSHIFTup</term>
                    <def>
                        <p> Internet Skin Health Intervention For Targeted Ulcer Prevention</p>
                    </def>
                </def-item>
                <def-item>
                    <term id="abb3">SHUTi</term>
                    <def>
                        <p> Sleep Healthy Using The Internet</p>
                    </def>
                </def-item>
            </def-list>
        </glossary>
        <fn-group>
            <fn fn-type="conflict">
                <p>Drs. Ritterband and Thorndike are equity owners of BeHealth Solutions, Inc, which is developing products related to the research described in this paper. The terms of this arrangement have been reviewed and approved by the University of Virginia, in accordance with their respective conflict of interest policies.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="web">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Fox</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>Online health search 2006</source>
                    <year>2006</year>
                    <month>10</month>
                    <day>29</day>
                    <access-date>2012-05-01</access-date>
                    <publisher-loc>Washington, DC</publisher-loc>
                    <publisher-name>Pew Internet &#38; American Life Project</publisher-name>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pewinternet.org/~/media//Files/Reports/2006/PIP_Online_Health_2006.pdf.pdf">http://www.pewinternet.org/~/media//Files/Reports/2006/PIP_Online_Health_2006.pdf.pdf</ext-link>
                    </comment>
                    <pub-id pub-id-type="other">67L69VTfk</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref2">
                <label>2</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ritterband</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thorndike</surname>
                            <given-names>FP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cox</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kovatchev</surname>
                            <given-names>BP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gonder-Frederick</surname>
                            <given-names>LA</given-names>
                        </name>
                    </person-group>
                    <article-title>A behavior change model for internet interventions</article-title>
                    <source>Ann Behav Med</source>
                    <year>2009</year>
                    <month>08</month>
                    <volume>38</volume>
                    <issue>1</issue>
                    <fpage>18</fpage>
                    <lpage>27</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12160-009-9133-4</pub-id>
                    <pub-id pub-id-type="medline">19802647</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2878721</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref3">
                <label>3</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bennett</surname>
                            <given-names>GG</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Glasgow</surname>
                            <given-names>RE</given-names>
                        </name>
                    </person-group>
                    <article-title>The delivery of public health interventions via the Internet: actualizing their potential</article-title>
                    <source>Annu Rev Public Health</source>
                    <year>2009</year>
                    <volume>30</volume>
                    <fpage>273</fpage>
                    <lpage>92</lpage>
                    <pub-id pub-id-type="doi">10.1146/annurev.publhealth.031308.100235</pub-id>
                    <pub-id pub-id-type="medline">19296777</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref4">
                <label>4</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Barak</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hen</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Boniel-Nissim</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Shapira</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <article-title>A comprehensive review and a meta-analysis of the effectiveness of internet-based psychotherapeutic interventions</article-title>
                    <source>J Technol Hum Serv</source>
                    <year>2008</year>
                    <volume>26</volume>
                    <issue>2</issue>
                    <fpage>109</fpage>
                    <lpage>60</lpage>
                    <pub-id pub-id-type="doi">10.1080/15228830802094429</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref5">
                <label>5</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Spek</surname>
                            <given-names>V</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cuijpers</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Nykl&#237;cek</surname>
                            <given-names>I</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Riper</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Keyzer</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Pop</surname>
                            <given-names>V</given-names>
                        </name>
                    </person-group>
                    <article-title>Internet-based cognitive behaviour therapy for symptoms of depression and anxiety: a meta-analysis</article-title>
                    <source>Psychol Med</source>
                    <year>2007</year>
                    <month>03</month>
                    <volume>37</volume>
                    <issue>3</issue>
                    <fpage>319</fpage>
                    <lpage>28</lpage>
                    <pub-id pub-id-type="doi">10.1017/S0033291706008944</pub-id>
                    <pub-id pub-id-type="medline">17112400</pub-id>
                    <pub-id pub-id-type="pii">S0033291706008944</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref6">
                <label>6</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wantland</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Portillo</surname>
                            <given-names>CJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Holzemer</surname>
                            <given-names>WL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Slaughter</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McGhee</surname>
                            <given-names>EM</given-names>
                        </name>
                    </person-group>
                    <article-title>The effectiveness of Web-based vs. non-Web-based interventions: a meta-analysis of behavioral change outcomes</article-title>
                    <source>J Med Internet Res</source>
                    <year>2004</year>
                    <month>11</month>
                    <day>10</day>
                    <volume>6</volume>
                    <issue>4</issue>
                    <fpage>e40</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2004/4/e40/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.6.4.e40</pub-id>
                    <pub-id pub-id-type="medline">15631964</pub-id>
                    <pub-id pub-id-type="pii">v6e40</pub-id>
                    <pub-id pub-id-type="pmcid">PMC1550624</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref7">
                <label>7</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ritterband</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thorndike</surname>
                            <given-names>FP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gonder-Frederick</surname>
                            <given-names>LA</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Magee</surname>
                            <given-names>JC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bailey</surname>
                            <given-names>ET</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Saylor</surname>
                            <given-names>DK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Morin</surname>
                            <given-names>CM</given-names>
                        </name>
                    </person-group>
                    <article-title>Efficacy of an Internet-based behavioral intervention for adults with insomnia</article-title>
                    <source>Arch Gen Psychiatry</source>
                    <year>2009</year>
                    <month>07</month>
                    <volume>66</volume>
                    <issue>7</issue>
                    <fpage>692</fpage>
                    <lpage>8</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://archpsyc.ama-assn.org/cgi/pmidlookup?view=long&#38;pmid=19581560" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1001/archgenpsychiatry.2009.66</pub-id>
                    <pub-id pub-id-type="medline">19581560</pub-id>
                    <pub-id pub-id-type="pii">66/7/692</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref8">
                <label>8</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ritterband</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ardalan</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Thorndike</surname>
                            <given-names>FP</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Magee</surname>
                            <given-names>JC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Saylor</surname>
                            <given-names>DK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cox</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sutphen</surname>
                            <given-names>JL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Borowitz</surname>
                            <given-names>SM</given-names>
                        </name>
                    </person-group>
                    <article-title>Real world use of an Internet intervention for pediatric encopresis</article-title>
                    <source>J Med Internet Res</source>
                    <year>2008</year>
                    <volume>10</volume>
                    <issue>2</issue>
                    <fpage>e16</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2008/2/e16/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1081</pub-id>
                    <pub-id pub-id-type="medline">18653440</pub-id>
                    <pub-id pub-id-type="pii">v10i2e16</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2483922</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref9">
                <label>9</label>
                <nlm-citation citation-type="confproc">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cox</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ritterband</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Gonder-Frederick</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Patel</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clarke</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <article-title>Blood glucose awareness training delivered over the internet</article-title>
                    <year>2006</year>
                    <conf-name>American Diabetes Association 66th Scientific Sessions</conf-name>
                    <conf-date>June 9-13, 2006</conf-date>
                    <conf-loc>Washington, DC, USA</conf-loc>
                </nlm-citation>
            </ref>
            <ref id="ref10">
                <label>10</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Tate</surname>
                            <given-names>DF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jackvony</surname>
                            <given-names>EH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wing</surname>
                            <given-names>RR</given-names>
                        </name>
                    </person-group>
                    <article-title>Effects of Internet behavioral counseling on weight loss in adults at risk for type 2 diabetes: a randomized trial</article-title>
                    <source>JAMA</source>
                    <year>2003</year>
                    <month>04</month>
                    <day>9</day>
                    <volume>289</volume>
                    <issue>14</issue>
                    <fpage>1833</fpage>
                    <lpage>6</lpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://jama.ama-assn.org/cgi/pmidlookup?view=long&#38;pmid=12684363" />
                    </comment>
                    <pub-id pub-id-type="doi">10.1001/jama.289.14.1833</pub-id>
                    <pub-id pub-id-type="medline">12684363</pub-id>
                    <pub-id pub-id-type="pii">289/14/1833</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref11">
                <label>11</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mu&#241;oz</surname>
                            <given-names>RF</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Barrera</surname>
                            <given-names>AZ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Delucchi</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Penilla</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Torres</surname>
                            <given-names>LD</given-names>
                        </name>
                        <name name-style="western">
                            <surname>P&#233;rez-Stable</surname>
                            <given-names>EJ</given-names>
                        </name>
                    </person-group>
                    <article-title>International Spanish/English Internet smoking cessation trial yields 20% abstinence rates at 1 year</article-title>
                    <source>Nicotine Tob Res</source>
                    <year>2009</year>
                    <month>09</month>
                    <volume>11</volume>
                    <issue>9</issue>
                    <fpage>1025</fpage>
                    <lpage>34</lpage>
                    <pub-id pub-id-type="doi">10.1093/ntr/ntp090</pub-id>
                    <pub-id pub-id-type="medline">19640833</pub-id>
                    <pub-id pub-id-type="pii">ntp090</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2725004</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref12">
                <label>12</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mohr</surname>
                            <given-names>DC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Vella</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Hart</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Heckman</surname>
                            <given-names>T</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Simon</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>The effect of telephone-administered psychotherapy on symptoms of depression and attrition: a meta-analysis</article-title>
                    <source>Clin Psychol (New York)</source>
                    <year>2008</year>
                    <volume>15</volume>
                    <issue>3</issue>
                    <fpage>243</fpage>
                    <lpage>53</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1468-2850.2008.00134.x</pub-id>
                    <pub-id pub-id-type="medline">21369344</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3045729</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref13">
                <label>13</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Carlbring</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bohman</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Brunt</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Buhrman</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Westling</surname>
                            <given-names>BE</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ekselius</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Andersson</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>Remote treatment of panic disorder: a randomized trial of internet-based cognitive behavior therapy supplemented with telephone calls</article-title>
                    <source>Am J Psychiatry</source>
                    <year>2006</year>
                    <month>12</month>
                    <volume>163</volume>
                    <issue>12</issue>
                    <fpage>2119</fpage>
                    <lpage>25</lpage>
                    <pub-id pub-id-type="doi">10.1176/appi.ajp.163.12.2119</pub-id>
                    <pub-id pub-id-type="medline">17151163</pub-id>
                    <pub-id pub-id-type="pii">163/12/2119</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref14">
                <label>14</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Christensen</surname>
                            <given-names>H</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Griffiths</surname>
                            <given-names>KM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Farrer</surname>
                            <given-names>L</given-names>
                        </name>
                    </person-group>
                    <article-title>Adherence in internet interventions for anxiety and depression</article-title>
                    <source>J Med Internet Res</source>
                    <year>2009</year>
                    <volume>11</volume>
                    <issue>2</issue>
                    <fpage>e13</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2009/2/e13/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1194</pub-id>
                    <pub-id pub-id-type="medline">19403466</pub-id>
                    <pub-id pub-id-type="pii">v11i2e13</pub-id>
                    <pub-id pub-id-type="pmcid">PMC2762797</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref15">
                <label>15</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Reigeluth</surname>
                            <given-names>CM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carr-Chellman</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <source>Instructional-Design Theories and Models. Volume III, 3rd edition</source>
                    <year>2009</year>
                    <publisher-loc>Hillsdale, NJ</publisher-loc>
                    <publisher-name>Lawrence Erlbaum Associates</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref16">
                <label>16</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Keller</surname>
                            <given-names>JM</given-names>
                        </name>
                    </person-group>
                    <article-title>First principles of motivation to learn and e3-learning</article-title>
                    <source>Distance Educ</source>
                    <year>2008</year>
                    <volume>29</volume>
                    <issue>2</issue>
                    <fpage>175</fpage>
                    <lpage>85</lpage>
                    <pub-id pub-id-type="doi">10.1080/01587910802154970</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref17">
                <label>17</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wigfield</surname>
                            <given-names>A</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Eccles</surname>
                            <given-names>JS</given-names>
                        </name>
                    </person-group>
                    <article-title>Expectancy-Value Theory of Achievement Motivation</article-title>
                    <source>Contemp Educ Psychol</source>
                    <year>2000</year>
                    <month>01</month>
                    <volume>25</volume>
                    <issue>1</issue>
                    <fpage>68</fpage>
                    <lpage>81</lpage>
                    <pub-id pub-id-type="doi">10.1006/ceps.1999.1015</pub-id>
                    <pub-id pub-id-type="medline">10620382</pub-id>
                    <pub-id pub-id-type="pii">S0361476X99910159</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref18">
                <label>18</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bandura</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <source>Social Foundations of Thought and Action: A Social Cognitive Theory</source>
                    <year>1986</year>
                    <publisher-loc>Englewood Cliffs, NJ</publisher-loc>
                    <publisher-name>Prentice-Hall</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref19">
                <label>19</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dick</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carey</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Carey</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>The Systematic Design of Instruction</source>
                    <year>2001</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Longman</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref20">
                <label>20</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Richey</surname>
                            <given-names>RC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Klein</surname>
                            <given-names>JD</given-names>
                        </name>
                    </person-group>
                    <article-title>Developmental research methods: creating knowledge from instructional design and development practice</article-title>
                    <source>J Comput High Educ</source>
                    <year>2005</year>
                    <volume>16</volume>
                    <issue>2</issue>
                    <fpage>23</fpage>
                    <lpage>38</lpage>
                    <pub-id pub-id-type="doi">10.1007/BF02961473</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref21">
                <label>21</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Richey</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Klein</surname>
                            <given-names>JD</given-names>
                        </name>
                    </person-group>
                    <source>Design and Development Research: Methods, Strategies, and Issues. 1st edition</source>
                    <year>2007</year>
                    <publisher-loc>Mahwah, NJ</publisher-loc>
                    <publisher-name>L Erlbaum Associates</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref22">
                <label>22</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wang</surname>
                            <given-names>F</given-names>
                        </name>
                    </person-group>
                    <article-title>Design-based research and technology-enhanced learning environments</article-title>
                    <source>Educ Technol Res Dev</source>
                    <year>2005</year>
                    <volume>53</volume>
                    <issue>4</issue>
                    <fpage>5</fpage>
                    <lpage>23</lpage>
                    <pub-id pub-id-type="doi">10.1007/BF02504682</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref23">
                <label>23</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Cobb</surname>
                            <given-names>P</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Confrey</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>diSessa</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Design experiments in educational research</article-title>
                    <source>Educ Res</source>
                    <year>2003</year>
                    <volume>32</volume>
                    <issue>1</issue>
                    <fpage>9</fpage>
                    <lpage>13</lpage>
                    <pub-id pub-id-type="doi">10.3102/0013189X032001009</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref24">
                <label>24</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gagne</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wager</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Golas</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Keller</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>Principles of Instructional Design. 5th edition</source>
                    <year>2004</year>
                    <publisher-loc>Belmont, CA</publisher-loc>
                    <publisher-name>Thomson/Wadsworth</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref25">
                <label>25</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Heinich</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Molenda</surname>
                            <given-names>M</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Russell</surname>
                            <given-names>J</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Smaldino</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <article-title>The ASSURE model</article-title>
                    <source>Stollenwerk DA, editor. Instructional Media and Technologies for Learning. 7th edition</source>
                    <year>2002</year>
                    <publisher-loc>Upper Saddle River, NJ</publisher-loc>
                    <publisher-name>Merrill/Prentice Hall</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref26">
                <label>26</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kirkpatrick</surname>
                            <given-names>D</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kirkpatrick</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>Evaluating Training Programs: The Four Levels. 3rd edition</source>
                    <year>2006</year>
                    <publisher-loc>San Francisco, CA</publisher-loc>
                    <publisher-name>Berrett-Koehler</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref27">
                <label>27</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Smith</surname>
                            <given-names>PL</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ragan</surname>
                            <given-names>TJ</given-names>
                        </name>
                    </person-group>
                    <source>Instructional Design. 3rd edition</source>
                    <year>2005</year>
                    <publisher-loc>Hoboken, NJ</publisher-loc>
                    <publisher-name>J Wiley &#38; Sons</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref28">
                <label>28</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rossett</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <source>First Things Fast: A Handbook for Performance Analysis (Essential Knowledge Resource)</source>
                    <year>2009</year>
                    <publisher-loc>Hoboken, NJ</publisher-loc>
                    <publisher-name>Pfeiffer</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref29">
                <label>29</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Morrison</surname>
                            <given-names>G</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Ross</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kemp</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <source>Designing Effective Instruction. 7th edition</source>
                    <year>2010</year>
                    <publisher-loc>Hoboken, NJ</publisher-loc>
                    <publisher-name>Wiley</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref30">
                <label>30</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Schank</surname>
                            <given-names>R</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Neaman</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Motivation and failure in educational simulation design</article-title>
                    <source>Forbus KD, Feltovich PJ, editors. Smart Machines in Education: The Coming Revolution in Educational Technology. 1st edition</source>
                    <year>2001</year>
                    <publisher-loc>Menlo Park, CA</publisher-loc>
                    <publisher-name>AAAI Press</publisher-name>
                    <fpage>37</fpage>
                    <lpage>69</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref31">
                <label>31</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Wiggins</surname>
                            <given-names>G</given-names>
                        </name>
                    </person-group>
                    <article-title>A true test: toward more authentic and equitable assessment</article-title>
                    <source>Phi Delta Kappan</source>
                    <year>1989</year>
                    <month>05</month>
                    <volume>70</volume>
                    <issue>9</issue>
                    <fpage>703</fpage>
                    <lpage>13</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref32">
                <label>32</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gupta</surname>
                            <given-names>K</given-names>
                        </name>
                    </person-group>
                    <source>A Practical Guide to Needs Assessment. 2nd edition</source>
                    <year>2007</year>
                    <publisher-loc>San Francisco, CA</publisher-loc>
                    <publisher-name>Pfeiffer/Wiley</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref33">
                <label>33</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ritterband</surname>
                            <given-names>LM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Cox</surname>
                            <given-names>DJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Walker</surname>
                            <given-names>LS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Kovatchev</surname>
                            <given-names>B</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McKnight</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Patel</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Borowitz</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Sutphen</surname>
                            <given-names>J</given-names>
                        </name>
                    </person-group>
                    <article-title>An Internet intervention as adjunctive therapy for pediatric encopresis</article-title>
                    <source>J Consult Clin Psychol</source>
                    <year>2003</year>
                    <month>10</month>
                    <volume>71</volume>
                    <issue>5</issue>
                    <fpage>910</fpage>
                    <lpage>7</lpage>
                    <pub-id pub-id-type="doi">10.1037/0022-006X.71.5.910</pub-id>
                    <pub-id pub-id-type="medline">14516239</pub-id>
                    <pub-id pub-id-type="pii">2003-07816-008</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref34">
                <label>34</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Conyne</surname>
                            <given-names>RK</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Clack</surname>
                            <given-names>RJ</given-names>
                        </name>
                    </person-group>
                    <source>Environmental Assessment and Design: A New Tool for the Applied Behavioral Scientist</source>
                    <year>1981</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Praeger</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref35">
                <label>35</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bandura</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Human agency in social cognitive theory</article-title>
                    <source>Am Psychol</source>
                    <year>1989</year>
                    <month>09</month>
                    <volume>44</volume>
                    <issue>9</issue>
                    <fpage>1175</fpage>
                    <lpage>84</lpage>
                    <pub-id pub-id-type="medline">2782727</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref36">
                <label>36</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Prochaska</surname>
                            <given-names>JO</given-names>
                        </name>
                        <name name-style="western">
                            <surname>DiClemente</surname>
                            <given-names>CC</given-names>
                        </name>
                    </person-group>
                    <article-title>The transtheoretical approach</article-title>
                    <source>Norcross JC, Goldfried MR, editors. Handbook of Psychotherapy Integration</source>
                    <year>1992</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Basic Books</publisher-name>
                    <fpage>300</fpage>
                    <lpage>34</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref37">
                <label>37</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Miller</surname>
                            <given-names>W</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Rollnick</surname>
                            <given-names>S</given-names>
                        </name>
                    </person-group>
                    <source>Motivational Interviewing. 2nd edition: Preparing People for Change</source>
                    <year>2002</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>The Guilford Press</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref38">
                <label>38</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Schank</surname>
                            <given-names>RC</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Berman</surname>
                            <given-names>TR</given-names>
                        </name>
                    </person-group>
                    <article-title>The pervasive role of stories in knowledge and action</article-title>
                    <source>Green MC, Strange JJ, editors. Narrative Impact: Social and Cognitive Foundations</source>
                    <year>2002</year>
                    <publisher-loc>Mahwah, NJ</publisher-loc>
                    <publisher-name>L Erlbaum Associates</publisher-name>
                    <fpage>287</fpage>
                    <lpage>313</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref39">
                <label>39</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Winn</surname>
                            <given-names>W</given-names>
                        </name>
                    </person-group>
                    <article-title>Research into practice: current trends in educational technology research: the study of learning environments</article-title>
                    <source>Educ Psychol Rev</source>
                    <year>2002</year>
                    <volume>14</volume>
                    <issue>3</issue>
                    <fpage>331</fpage>
                    <lpage>51</lpage>
                    <pub-id pub-id-type="doi">10.1023/A:1016068530070</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref40">
                <label>40</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Anderson</surname>
                            <given-names>JR</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Douglass</surname>
                            <given-names>S</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Qin</surname>
                            <given-names>Y</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name name-style="western">
                            <surname>Healy</surname>
                            <given-names>AF</given-names>
                        </name>
                    </person-group>
                    <article-title>How should a theory of learning and cognition inform instruction?</article-title>
                    <source>Healy AF, editor. Experimental Dognitive Psychology and its Applications</source>
                    <year>2005</year>
                    <publisher-loc>Washington, DC</publisher-loc>
                    <publisher-name>American Psychological Association</publisher-name>
                    <fpage>47</fpage>
                    <lpage>58</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref41">
                <label>41</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Lockhart</surname>
                            <given-names>RS</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Craik</surname>
                            <given-names>FI</given-names>
                        </name>
                    </person-group>
                    <article-title>Levels of processing: a retrospective commentary on a framework for memory research</article-title>
                    <source>Can J Psychol</source>
                    <year>1990</year>
                    <volume>44</volume>
                    <issue>1</issue>
                    <fpage>87</fpage>
                    <lpage>112</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref42">
                <label>42</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mayer</surname>
                            <given-names>RE</given-names>
                        </name>
                    </person-group>
                    <source>Multimedia Learning</source>
                    <year>2009</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Cambridge University Press</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref43">
                <label>43</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Gagne</surname>
                            <given-names>RM</given-names>
                        </name>
                    </person-group>
                    <source>Conditions of Learning. 2nd edition</source>
                    <year>1970</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Holt, Rinehart &#38; Winston</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref44">
                <label>44</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Weston</surname>
                            <given-names>C</given-names>
                        </name>
                        <name name-style="western">
                            <surname>McAlpine</surname>
                            <given-names>L</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Bordonaro</surname>
                            <given-names>T</given-names>
                        </name>
                    </person-group>
                    <article-title>A model for understanding formative evaluation in instructional design</article-title>
                    <source>EducTechnol Res Dev</source>
                    <year>1995</year>
                    <volume>43</volume>
                    <issue>3</issue>
                    <fpage>29</fpage>
                    <lpage>48</lpage>
                    <pub-id pub-id-type="doi">10.1007/BF02300454</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref45">
                <label>45</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Bandura</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <article-title>Self-efficacy: toward a unifying theory of behavioral change</article-title>
                    <source>Psychol Rev</source>
                    <year>1977</year>
                    <month>03</month>
                    <volume>84</volume>
                    <issue>2</issue>
                    <fpage>191</fpage>
                    <lpage>215</lpage>
                    <pub-id pub-id-type="medline">847061</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref46">
                <label>46</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ryan</surname>
                            <given-names>RM</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Deci</surname>
                            <given-names>EL</given-names>
                        </name>
                    </person-group>
                    <article-title>Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being</article-title>
                    <source>Am Psychol</source>
                    <year>2000</year>
                    <month>01</month>
                    <volume>55</volume>
                    <issue>1</issue>
                    <fpage>68</fpage>
                    <lpage>78</lpage>
                    <pub-id pub-id-type="medline">11392867</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref47">
                <label>47</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Schunk</surname>
                            <given-names>DH</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Zimmerman</surname>
                            <given-names>BJ</given-names>
                        </name>
                    </person-group>
                    <article-title>Self-regulation and learning</article-title>
                    <source>Reynolds WM, Miller GE, editors. Handbook of Psychology: Educational Psychology. Volume 7</source>
                    <year>2003</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Wiley</publisher-name>
                    <fpage>59</fpage>
                    <lpage>78</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref48">
                <label>48</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Briggs</surname>
                            <given-names>LJ</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Wager</surname>
                            <given-names>WW</given-names>
                        </name>
                    </person-group>
                    <source>Handbook of Procedures for the Design of Instruction</source>
                    <year>1981</year>
                    <publisher-loc>Englewood Cliffs, NJ</publisher-loc>
                    <publisher-name>Educational Technology Publications</publisher-name>
                </nlm-citation>
            </ref>
            <ref id="ref49">
                <label>49</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Kinzie</surname>
                            <given-names>MB</given-names>
                        </name>
                    </person-group>
                    <article-title>Instructional design strategies for health behavior change</article-title>
                    <source>Patient Educ Couns</source>
                    <year>2005</year>
                    <month>01</month>
                    <volume>56</volume>
                    <issue>1</issue>
                    <fpage>3</fpage>
                    <lpage>15</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.pec.2004.02.005</pub-id>
                    <pub-id pub-id-type="medline">15590217</pub-id>
                    <pub-id pub-id-type="pii">S0738399104000813</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref50">
                <label>50</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Rosenstock</surname>
                            <given-names>IM</given-names>
                        </name>
                    </person-group>
                    <article-title>Historical origins of the health belief model</article-title>
                    <source>Health Educ Monogr</source>
                    <year>1974</year>
                    <volume>2</volume>
                    <issue>4</issue>
                    <fpage>328</fpage>
                    <lpage>35</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref51">
                <label>51</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Dearing</surname>
                            <given-names>JW</given-names>
                        </name>
                    </person-group>
                    <article-title>An exploratory tool for predicting adoption decisions</article-title>
                    <source>Sci Commun</source>
                    <year>1994</year>
                    <volume>16</volume>
                    <issue>1</issue>
                    <fpage>43</fpage>
                    <lpage>57</lpage>
                    <pub-id pub-id-type="doi">10.1177/0164025994016001003</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref52">
                <label>52</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Clark</surname>
                            <given-names>RC</given-names>
                        </name>
                    </person-group>
                    <article-title>Four architectures of instruction</article-title>
                    <source>Perform Improv</source>
                    <year>2000</year>
                    <volume>39</volume>
                    <issue>10</issue>
                    <fpage>31</fpage>
                    <lpage>8</lpage>
                    <pub-id pub-id-type="doi">10.1002/pfi.4140391011</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref53">
                <label>53</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Mayer</surname>
                            <given-names>RE</given-names>
                        </name>
                    </person-group>
                    <article-title>Unique contributions of eye-tracking research to the study of learning with graphics</article-title>
                    <source>Learn Instruct</source>
                    <year>2010</year>
                    <volume>20</volume>
                    <issue>2</issue>
                    <fpage>167</fpage>
                    <lpage>71</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.learninstruc.2009.02.012</pub-id>
                </nlm-citation>
            </ref>
            <ref id="ref54">
                <label>54</label>
                <nlm-citation citation-type="book">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>Ajzen</surname>
                            <given-names>I</given-names>
                        </name>
                    </person-group>
                    <article-title>From intentions to actions: a theory of planned behavior</article-title>
                    <source>Kuhl J, Beckman J, editors. Action Control: From Cognition to Behavior</source>
                    <year>1985</year>
                    <publisher-loc>New York, NY</publisher-loc>
                    <publisher-name>Springer-Verlag</publisher-name>
                    <fpage>11</fpage>
                    <lpage>39</lpage>
                </nlm-citation>
            </ref>
            <ref id="ref55">
                <label>55</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <collab>The Design-Based Research Collective</collab>
                    </person-group>
                    <article-title>Design-based research: an emerging paradigm for educational inquiry</article-title>
                    <source>Educ Res</source>
                    <year>2003</year>
                    <volume>32</volume>
                    <issue>1</issue>
                    <fpage>5</fpage>
                    <lpage>8</lpage>
                    <pub-id pub-id-type="doi">10.3102/0013189X032001005</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>
