{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:48:26Z","timestamp":1775850506331,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030856090","type":"print"},{"value":"9783030856106","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-85610-6_15","type":"book-chapter","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T06:03:15Z","timestamp":1629871395000},"page":"243-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["NotificationManager: Personal Boundary Management on Mobile Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8353-7388","authenticated-orcid":false,"given":"Tom","family":"Gross","sequence":"first","affiliation":[]},{"given":"Anna-Lena","family":"Mueller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,26]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1111\/isj.12064","volume":"25","author":"S Addas","year":"2015","unstructured":"Addas, S., Pinsonneault, A.: The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects. Inf. Syst. J. 25(3), 231\u2013273 (2015)","journal-title":"Inf. Syst. J."},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"472","DOI":"10.2307\/259305","volume":"25","author":"BE Ashforth","year":"2000","unstructured":"Ashforth, B.E., Kreiner, G.E., Fugate, M.: All in a day\u2019s work: boundaries and micro role transitions. Acad. Manag. Rev. 25(3), 472\u2013491 (2000)","journal-title":"Acad. Manag. Rev."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Auda, J., Weber, D., Voit, A., Schneegass, S.: Understanding user preferences towards rule-based notification deferral. In: Extended Abstracts of the Conference on Human Factors in Computing Systems - CHI 2018, Montreal, Canada, 21\u201326 April, pp. LBW548:1\u20136. ACM, New York (2018)","DOI":"10.1145\/3170427.3188688"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ijinfomgt.2018.07.007","volume":"43","author":"P Baillette","year":"2018","unstructured":"Baillette, P., Barlette, Y., Leclercq-Vandelannoitte, A.: Bring your own device in organisations: extending the reversed IT adoption logic to security paradoxes for CEOs and end users. Int. J. Inf. Manag. 43, 76\u201384 (2018)","journal-title":"Int. J. Inf. Manag."},{"key":"15_CR5","volume-title":"Language, Proof, and Logic","author":"D Barker-Plummer","year":"2011","unstructured":"Barker-Plummer, D., Barwise, J., Etchemendy, J.: Language, Proof, and Logic. CSLI Publications, Stanford (2011)"},{"key":"15_CR6","unstructured":"Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modelling Language UWSER Guido. Pearson, Englewood Cliffs (2005)"},{"key":"15_CR7","unstructured":"Brodin, M.: BYOD vs. CYOD - what is the difference? In: Proceedings of the 9th IADIS International Conference on Information Systems - IS 2016, Vilamoura, Portugal, 9\u201311 April, pp. 55\u201362. IADIS Press (2016)"},{"issue":"6","key":"15_CR8","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1177\/0018726700536001","volume":"53","author":"S Campbell Clark","year":"2000","unstructured":"Campbell Clark, S.: Work\/family border theory: a new theory of work\/family balance. Hum. Relat. 53(6), 747\u2013770 (2000)","journal-title":"Hum. Relat."},{"key":"15_CR9","unstructured":"Canalys: Smartphone Shipment Fall 6.3% in Europe in Q1 2018 (2020). https:\/\/www.canalys.com\/newsroom\/smartphone-shipments-fall-63-europe-q1-2018. Accessed 4 Mar 2020"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Cecchinato, M.E., Cox, A.L., Bird, J.: Working 9\u20135? Professional differences in email and boundary management practices. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2015, Seoul, Republic of Korea, 18\u201323 April, pp. 3989\u20133998. ACM, New York (2015)","DOI":"10.1145\/2702123.2702537"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chen, K.-Y., Lee, H.-P., Lin, C.-H., Chang, Y.-J.: Who matters: a closer look at interpersonal relationship in mobile interruptibility. In: Adjunct Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the ACM International Symposium on Wearable Computer \u2013 UbiComp 2017, Maui, HI, USA, 11\u201315 September, pp. 910\u2013915. ACM, New York (2017)","DOI":"10.1145\/3123024.3124569"},{"issue":"3\u20136","key":"15_CR12","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1007\/s10606-018-9315-3","volume":"27","author":"L Ciolfi","year":"2018","unstructured":"Ciolfi, L., Lockley, E.: From work to life and back again: examining the digitally-mediated work\/life practices of a group of knowledge workers. Comput. Support Coop. Work 27(3\u20136), 803\u2013839 (2018)","journal-title":"Comput. Support Coop. Work"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Corno, F., De Russis, L., Montanaro, T.: A context and user aware smart notification system. In: Proceedings of the IEEE 2nd World Forum on Internet of Things - WF-IoT 2015, Milan, Italy, 14\u201316 December, pp. 645\u2013651. IEEE Computer Society Press, Los Alamitos (2015)","DOI":"10.1109\/WF-IoT.2015.7389130"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"De Russis, L., Roffarello, A.M.: On the benefit of adding user preferences to notification delivery. In: Extended Abstracts of the Conference on Human Factors in Computing Systems - CHI 2017, Denver, CO, 6\u201311 May, pp. 1561\u20131568. ACM, New York (2017)","DOI":"10.1145\/3027063.3053160"},{"key":"15_CR15","volume-title":"Formal Methods for Interactive Systems","author":"AJ Dix","year":"1991","unstructured":"Dix, A.J.: Formal Methods for Interactive Systems. Academic Press, Chestnut Hill (1991)"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1111\/1467-8551.12027","volume":"25","author":"L Duxbury","year":"2014","unstructured":"Duxbury, L., Higgins, C., Smart, R., Stevenson, M.: Mobile technology and boundary permeability. Br. J. Manag. 25, 570\u2013588 (2014)","journal-title":"Br. J. Manag."},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Fetter, M., Gross, T.: PRIMIExperience: experience sampling via instant messaging. In: Proceedings of the ACM 2011 Conference on Computer-Supported Cooperative Work - CSCW 2011, Hangzhou, China, 19\u201323 March, pp. 629\u2013632. ACM, New York (2011)","DOI":"10.1145\/1958824.1958931"},{"key":"15_CR18","unstructured":"Fetter, M., Mueller, A.-L., Vasilyev, P., Barth, L.M., Gross, T.: Towards a better understanding of availability and interruptibility with mobile availability probes. In: Proceedings of the 16th European Conference on Computer-Supported Cooperative Work - Exploratory Papers - ECSCW 2018, Nancy, France, 4\u20138 June, pp. 14:1\u201318. Reports of the European Society for Socially Embedded Technologies, EUSSET, Siegen (2018)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Fetter, M., Schirmer, M., Gross, T.: CAESSA: visual authoring of context-aware experience sampling studies. In: Extended Abstracts of the Conference on Human Factors in Computing Systems - CHI 2011, Vancouver, Canada, 7\u201312 May, pp. 2341\u20132346. ACM, New York (2011)","DOI":"10.1145\/1979742.1979928"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/978-3-642-23765-2_35","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"M Fetter","year":"2011","unstructured":"Fetter, M., Seifert, J., Gross, T.: Predicting selective availability for instant messaging. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6948, pp. 503\u2013520. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23765-2_35"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Fischer, J.E., Greenhalgh, C., Benford, S.: Investigating episodes of mobile phone activity as indicators of opportune moments to deliver notifications. In: Proceedings of the 13th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2011, Stockholm, Sweden, August 30\u2013September 2, pp. 181\u2013190. ACM, New York (2011)","DOI":"10.1145\/2037373.2037402"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Fischer, J.E., Yee, N., Bellotti, V., Good, N., Benford, S., Greenhalgh, C.: Effects of content and time of delivery on receptivity of mobile interruptions. In: Proceedings of the 12th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2010, Lisbon, Portugal, 7\u201310 September, pp. 103\u2013112. ACM, New York (2010)","DOI":"10.1145\/1851600.1851620"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Fleck, R., Cox, A.L., Robinson, R.A.V.: Balancing boundaries: using multiple devices to manage work-life balance. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2015, Seoul, Republic of Korea, 18\u201323 April, pp. 3985\u20133988. ACM, New York (2015)","DOI":"10.1145\/2702123.2702386"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ijhcs.2015.02.008","volume":"79","author":"SA Grandhi","year":"2015","unstructured":"Grandhi, S.A., Jones, Q.: Knock, knock! who\u2019s there? Putting the user in control of managing interruptions. Int. J. Hum. Comput. Stud. 79, 35\u201350 (2015)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"15_CR25","volume-title":"Naive Set Theory","author":"PR Halmos","year":"1960","unstructured":"Halmos, P.R.: Naive Set Theory. D. Van Nostrand Company Inc., Princeton (1960)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Ho, J., Intille, S.: Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2005, Portland, OR, 2\u20137 April, pp. 909\u2013918. ACM, New York (2005)","DOI":"10.1145\/1054972.1055100"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Iqbal, S.T., Bailey, B.P.: Effects of intelligent notification management on users and their tasks. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2008, Florence, Italy, 5\u201310 April, pp. 93\u2013102. ACM, New York (2008)","DOI":"10.1145\/1357054.1357070"},{"key":"15_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/9780470249260","volume-title":"Domain-Specific Modelling: Enabling Full Code Generation","author":"S Kelly","year":"2008","unstructured":"Kelly, S., Tolvanen, J.-P.: Domain-Specific Modelling: Enabling Full Code Generation. Wiley, New York (2008)"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Kerber, F., Hirtz, C., Gehring, S., Loechtefeld, M., Krueger, A.: Managing smartwatch notifications through filtering and ambient illumination. In: Adjunct Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2016, Florence, Italy, 6\u20139 September, pp. 918\u2013923. ACM, New York (2016)","DOI":"10.1145\/2957265.2962657"},{"key":"15_CR30","unstructured":"Kern, N., Schiele, B.: Context-aware notification for wearable computing. In: Proceedings of the Seventh IEEE International Symposium on Wearable Computers - ISWC 2003, White Plains, NY, 21\u201323 October, pp. 223\u2013230. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"15_CR31","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jvb.2012.04.003","volume":"81","author":"EE Kossek","year":"2012","unstructured":"Kossek, E.E., Ruderman, M.N., Braddy, P.W., Hannum, K.M.: Work-nonwork boundary management profiles: a person-centred approach. J. Vocat. Behav. 81, 112\u2013128 (2012)","journal-title":"J. Vocat. Behav."},{"issue":"4","key":"15_CR32","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/job.386","volume":"27","author":"GE Kreiner","year":"2006","unstructured":"Kreiner, G.E.: Consequences of work-home segmentation and integration: a person-environment fit perspective. J. Organ. Behav. 27(4), 485\u2013507 (2006)","journal-title":"J. Organ. Behav."},{"issue":"4","key":"15_CR33","doi-asserted-by":"publisher","first-page":"704","DOI":"10.5465\/amj.2009.43669916","volume":"52","author":"GE Kreiner","year":"2009","unstructured":"Kreiner, G.E., Hollensbe, E.C., Sheep, M.L.: Balancing borders and bridges: negotiating the work-home interface via boundary work tactics. Acad. Manag. J. 52(4), 704\u2013730 (2009)","journal-title":"Acad. Manag. J."},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Lim, H., Arawjo, I., Xie, Y., Khojasteh, N., Fussell, S.: Distraction or life saver?: The role of technology in undergraduate students\u2019 boundary management strategies. In: Proceedings of the ACM on Human-Computer Interaction, vol. 1, no. 68, pp. 68:1\u201368:18 (November 2017)","DOI":"10.1145\/3134703"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Mark, G., Czerwinski, M., Iqbal, S.T.: Effects of individual differences in blocking workplace distractions. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2018, Montreal, Canada, 21\u201326 April, pp. 92:1\u201312. ACM, New York (2018)","DOI":"10.1145\/3173574.3173666"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Mark, G., Gudith, D., Klocke, U.: The cost of interrupted work: more speed and stress. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2008, Florence, Italy, 5\u201310 April, pp. 107\u2013116. ACM, New York (2008)","DOI":"10.1145\/1357054.1357072"},{"issue":"1","key":"15_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15327051HCI1701_1","volume":"17","author":"DC McFarlane","year":"2002","unstructured":"McFarlane, D.C., Latorella, K.A.: The scope and importance of human interruption in human-computer interaction design. Hum.-Comput. Interact. 17(1), 1\u201361 (2002)","journal-title":"Hum.-Comput. Interact."},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Mehrotra, A., Hendley, R., Musolesi, M.: PrefMiner: mining user\u2019s preferences for intelligent mobile notification management. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp 2016, Heidelberg, Germany, 12\u201316 September, pp. 1223\u20131234. ACM, New York (2016)","DOI":"10.1145\/2971648.2971747"},{"key":"15_CR39","doi-asserted-by":"crossref","unstructured":"Mehrotra, A., Musolesi, M.: Designing content-driven intelligent notification mechanisms for mobile applications. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp 2015, Osaka, Japan, 7\u201311 September, pp. 813\u2013824. ACM, New York (2015)","DOI":"10.1145\/2750858.2807544"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Mehrotra, A., Pejovic, V., Vermeulen, J., Hendley, R., Musolesi, M.: My phone and me: understanding people\u2019s receptivity to mobile notifications. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2016, San Jose, CA, 7\u201312 May, pp. 1021\u20131032. ACM, New York (2016)","DOI":"10.1145\/2858036.2858566"},{"key":"15_CR41","unstructured":"Niehaves, B., Koeffer, S., Ortbach, K.: The effect of private IT use on work performance - towards an IT consumerisation theory. In: Proceedings of the 11th International Conference on Wirtschaftsinformatik - WI 2013, Leipzig, Germany, 27 February\u20131 March, pp. 39\u201353. Merkur Druck- & Kopierzentrum, Leipzig (2013)"},{"issue":"3","key":"15_CR42","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/BF02408393","volume":"11","author":"C Nippert-Eng","year":"1996","unstructured":"Nippert-Eng, C.: Calendars and keys: the classification of \u201chome\u201d and \u201cwork.\u201d Sociol. Forum 11(3), 563\u2013582 (1996)","journal-title":"Sociol. Forum"},{"key":"15_CR43","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226581477.001.0001","volume-title":"Home and Work: Negotiating Boundaries through Everyday Life","author":"C Nippert-Eng","year":"1996","unstructured":"Nippert-Eng, C.: Home and Work: Negotiating Boundaries through Everyday Life. University of Chicago Press, Chicago (1996)"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Obuchi, M., Sasaki, W., Okoshi, T., Nakazawa, J., Tokuda, H.: Investigating interruptibility at activity breakpoints using smartphone activity recognition API. In: Adjunct Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp 2016, Heidelberg, Germany, 12\u201316 September, pp. 1602\u20131607. ACM, New York (2016)","DOI":"10.1145\/2968219.2968556"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Oemig, C., Gross, T.: Impacts of disruption on secondary task knowledge: recovery modes and social nuances. In: Mensch & Computer - 19. Fachuebergreifende Konferenz fuer interaktive und kooperative Medien - M&C 2019, Hamburg, Germany, 8\u201311 September, pp. 815\u2013818. ACM, New York (2019)","DOI":"10.1145\/3340764.3344914"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Okoshi, T., Nakazawa, J., Tokuda, H.: Attelia: sensing user\u2019s attention status on smart phones. In: Adjunct Proceedings of the International Jiont Conference on Pervasive and Ubiquitous Computing \u2013 UbiComp 2014, Seattle, WA, 13\u201317 September, pp. 139\u2013142. ACM, New York (2014)","DOI":"10.1145\/2638728.2638802"},{"key":"15_CR47","doi-asserted-by":"crossref","unstructured":"Okoshi, T., Ramos, J., Nozaki, H., Nakazawa, J., Dey, A.K., Tokuda, H.: Reducing users\u2019 perceived mental effort due to interruptive notifications in multi-device mobile environments. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp 2015, Osaka, Japan, 7\u201311 September, pp. 475\u2013486. ACM, New York (2015)","DOI":"10.1145\/2750858.2807517"},{"issue":"2","key":"15_CR48","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1037\/a0022759","volume":"18","author":"Y Park","year":"2011","unstructured":"Park, Y., Jex, S.M.: Work-home boundary management using communication and information technology. Int. J. Stress. Manag. 18(2), 133\u2013152 (2011)","journal-title":"Int. J. Stress. Manag."},{"issue":"2","key":"15_CR49","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1207\/s15327051hci0202_1","volume":"2","author":"SJ Payne","year":"1986","unstructured":"Payne, S.J., Green, T.R.G.: Task-action grammars: a model of the mental representation of task languages. Hum.-Comput. Interact. 2(2), 93\u2013133 (1986)","journal-title":"Hum.-Comput. Interact."},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Pejovic, V., Musolesi, M.: InterruptMe: designing intelligent prompting mechanisms for pervasive applications. In: Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing \u2013 UbiComp 2014, Seattle, WA, 13\u201317 September, pp. 897\u2013908. ACM, New York (2014)","DOI":"10.1145\/2632048.2632062"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Pielot, M., Cardoso, B., Katevas, K., Serra, J., Matic, A., Oliver, N.: Beyond interruptibility: predicting opportune moments to engage mobile phone users. In: Proceedings of the ACM on Interactive, Mobile, Wearable, and Ubiquitous Technolologies - UbiComp 2017, vol. 1, no. 3, pp. 91:1\u201391:25 (September 2017)","DOI":"10.1145\/3130956"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Pielot, M., Church, K., Oliveira Patres, R.: An in-situ study of mobile phone notifications. In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2014, Toronto, Canada, 23\u201326 September, pp. 233\u2013242. ACM, New York (2014)","DOI":"10.1145\/2628363.2628364"},{"key":"15_CR53","doi-asserted-by":"crossref","unstructured":"Pielot, M., Dingler, T., San Pedro, J., Oliver, N.: When attention is not scarce - detecting boredom from mobile phone usage. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp 2015, Osaka, Japan, 7\u201311 September, pp. 825\u2013836. ACM, New York (2015)","DOI":"10.1145\/2750858.2804252"},{"key":"15_CR54","doi-asserted-by":"crossref","unstructured":"Pielot, M., Rello, L.: Productive, anxious, lonely - 24 hours without push notifications. In: Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2017, Vienna, Austria, 4\u20137 September, pp. 11:1\u201311:11. ACM, New York (2017)","DOI":"10.1145\/3098279.3098526"},{"issue":"3","key":"15_CR55","doi-asserted-by":"publisher","first-page":"513","DOI":"10.5465\/amj.2010.51468647","volume":"53","author":"GN Powell","year":"2010","unstructured":"Powell, G.N., Greenhaus, J.H.: Sex, gender, and the work-to-family interface: exploring negative and positive interdependencies. Acad. Manag. J. 53(3), 513\u2013534 (2010)","journal-title":"Acad. Manag. J."},{"key":"15_CR56","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-54978-1_30","volume-title":"Information Technology \u2013 New Generations","author":"MM Ratchford","year":"2018","unstructured":"Ratchford, M.M.: BYOD: a security policy evaluation model. In: Latifi, S. (ed.) Information Technology \u2013 New Generations. AISC, vol. 558, pp. 215\u2013220. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-54978-1_30"},{"key":"15_CR57","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S1361-3723(14)70007-7","volume":"1","author":"H Romer","year":"2014","unstructured":"Romer, H.: Best practices for BYOD security. Comput. Fraud Secur. 1, 13\u201315 (2014)","journal-title":"Comput. Fraud Secur."},{"key":"15_CR58","doi-asserted-by":"crossref","unstructured":"Schulze, F., Groh, G.: Conversational context helps improve mobile notification management. In: Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI 2016, Florence, Italy, 6\u20139 September, pp. 518\u2013528. ACM, New York (2016)","DOI":"10.1145\/2935334.2935347"},{"key":"15_CR59","doi-asserted-by":"crossref","unstructured":"Schuss, M., Gross, T.: Availability and boundary management: an exploratory study. In: Extended Abstracts of the Conference on Human Factors in Computing Systems - CHI 2019, Glasgow, Scotland, UK, 4\u20139 May, pp. LBW 1215:1\u20134. ACM, New York (2019)","DOI":"10.1145\/3290607.3313088"},{"key":"15_CR60","unstructured":"Shirazi, A.S., Henze, N., Dingler, T., Pielot, M., Weber, D., Schmidt, A.: Large-scale assessment of mobile notifications. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2014, Toronto, Canada, 26 April\u20131 May, pp. 3055\u20133064. ACM, New York (2014)"},{"key":"15_CR61","unstructured":"Siewiorek, D., et al.: SenSay: a context-aware mobile phone. In: Proceedings of the Seventh IEEE International Symposium on Wearable Computers - ISWC 2003, White Plains, NY, 21\u201323 October, pp. 248\u2013249. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"15_CR62","doi-asserted-by":"crossref","unstructured":"Speier, C., Valacich, J.S., Vessey, I.: The influence of task interruption on individual decision making: an information overload perspective. Decis. Sci. 30(2), 337\u2013360 (1999)","DOI":"10.1111\/j.1540-5915.1999.tb01613.x"},{"key":"15_CR63","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-319-51838-1_16","volume-title":"The Handbook of Formal Methods in Human-Computer Interaction","author":"S Van Mierlo","year":"2017","unstructured":"Van Mierlo, S., van Tendeloo, Y., Meyers, B., Vangheluwe, H.: Domain-specific modelling for human-computer interaction. In: Weyers, B., Bowen, J., Dix, A., Palanque, P. (eds.) The Handbook of Formal Methods in Human-Computer Interaction, pp. 435\u2013462. Springer-Verlag, Heidelberg (2017)"},{"key":"15_CR64","volume-title":"Using Z: Specification Refinement, and Proof","author":"J Woodcock","year":"1996","unstructured":"Woodcock, J., Davies, J.: Using Z: Specification Refinement, and Proof. Prentice Hall, Englewood Cliffs (1996)"},{"key":"15_CR65","doi-asserted-by":"crossref","unstructured":"Yuan, F., Gao, X., Lindqvist, J.: How busy are you? Predicting the interruptibility intensity of mobile users. In: Proceedings of the Conference on Human Factors in Computing Systems - CHI 2017, Denver, CO, 6\u201311 May, pp. 5346\u20135360. ACM, New York (2017)","DOI":"10.1145\/3025453.3025946"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-85610-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T20:56:34Z","timestamp":1699390594000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-85610-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030856090","9783030856106"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-85610-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"26 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.interact2021.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"680","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}