This strikes me as an emerging area for application trustworthiness and privacy issues.<p>In some ways it's an extension of This strikes me as an extension of the dark patterns work (<a href="https://www.darkpatterns.org/" rel="nofollow">https://www.darkpatterns.org/</a>) or in a different way the work on addictive apps by Tristan Harris and his "Time Well Spent" (<a href="http://www.timewellspent.io/" rel="nofollow">http://www.timewellspent.io/</a>) efforts. Somewhat related from a self-help perspective is Clay Johnson's "Information Diet" (<a href="http://informationdiet.com/" rel="nofollow">http://informationdiet.com/</a>) model (See also and <a href="https://player.vimeo.com/video/63368251" rel="nofollow">https://player.vimeo.com/video/63368251</a>)