{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:21:14Z","timestamp":1740122474936,"version":"3.37.3"},"reference-count":92,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Supported Coop Work"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s10606-021-09399-z","type":"journal-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T08:02:52Z","timestamp":1621929772000},"page":"307-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Context-based Automated Responses of Unavailability in Mobile Messaging"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3310-0617","authenticated-orcid":false,"given":"Pranut","family":"Jain","sequence":"first","affiliation":[]},{"given":"Rosta","family":"Farzan","sequence":"additional","affiliation":[]},{"given":"Adam J.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"9399_CR1","doi-asserted-by":"crossref","unstructured":"Abdul, A.; Jo, V.; Wang, D.; Lim, B.Y.; and Kankanhalli, M. (2018). Trends and trajectories for explainable, accountable and intelligible systems: an HCI research agenda. In: CHI \u201918. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal, pp. 1\u201318.","DOI":"10.1145\/3173574.3174156"},{"key":"9399_CR2","doi-asserted-by":"crossref","unstructured":"Andone, I.; B\u0142aszkiewicz, K.; Eibes, M.; Trendafilov, B.; Montag, C.; and Markowetz, A. (2016). How Age and Gender Affect Smartphone Usage. In: UbiComp \u201916. Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct. Heidelberg, pp. 9\u201312.","DOI":"10.1145\/2968219.2971451"},{"key":"9399_CR3","doi-asserted-by":"crossref","unstructured":"Avrahami, D.; and Hudson, S.E. (2004). Qna: Augmenting an Instant Messaging Client to Balance User Responsiveness and Performance. In: CSCW \u201904. Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work. Chicago, pp. 515\u2013518.","DOI":"10.1145\/1031607.1031692"},{"key":"9399_CR4","doi-asserted-by":"crossref","unstructured":"Avrahami, D.; Gergle, D.; Hudson, S.E; and Kiesler, S. (2007). Improving the match between callers and receivers: a study on the effect of contextual information on cell phone interruptions. Behaviour & Information Technology, vol. 26, no. 3, pp. 247\u2013259.","DOI":"10.1080\/01449290500402338"},{"key":"9399_CR5","doi-asserted-by":"crossref","unstructured":"Awad, N.F.; and Krishnan, M.S. (2006). The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, vol. 30, no. 1, pp. 13\u201328.","DOI":"10.2307\/25148715"},{"key":"9399_CR6","unstructured":"Bailey, B.P; Konstan, J.A; and Carlis, J.V (2001). The Effects of interruptions on task performance, annoyance, and anxiety in the user interface. In: INTERACT \u201901. Human-computer interaction: IFIP TC13 international conference on human-computer interaction, pp. 593\u2013601."},{"key":"9399_CR7","doi-asserted-by":"crossref","unstructured":"Bardram, J.E; and Hansen, T.R (2010). Context-based workplace awareness. Computer Supported Cooperative Work (CSCW), vol. 19, no. 2, pp. 105\u2013138.","DOI":"10.1007\/s10606-010-9110-2"},{"key":"9399_CR8","unstructured":"Bates, E.; and Wiest, L.R. (2004). Impact of personalization of mathematical word problems on student performance. The Mathematics Educator, vol. 14, pp. 17\u201326."},{"key":"9399_CR9","unstructured":"Becker, D.; Bremer, V.; Funk, B.; Asselbergs, J.; Riper, H.; and Ruwaard, J. (2016). How to predict mood? delving into features of Smartphone-Based data. Twenty-second Americas Conference on Information Systems, pp. 1\u201310."},{"key":"9399_CR10","doi-asserted-by":"crossref","unstructured":"Begole, J. \u201dBo\u201d; Matsakis, N.E.; and Tang, J.C. (2004). Lilsys: Sensing unavailability. In: CSCW \u201904. Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work. Chicago, pp. 511\u2013514.","DOI":"10.1145\/1031607.1031691"},{"key":"9399_CR11","unstructured":"Begole, J. \u201dBo\u201d; and Tang, J.C. (2007). Incorporating Human and Machine Interpretation of Unavailability and Rhythm Awareness Into the Design of Collaborative Applications. Human\u2013Computer Interaction, vol. 22, no. 1-2, pp. 7\u201345."},{"key":"9399_CR12","doi-asserted-by":"crossref","unstructured":"Bellotti, V.; and Bly, S. (1996). Walking away from the desktop computer: Distributed collaboration and mobility in a product design team. In: CSCW \u201996. Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work. Boston, pp. 209\u2013218.","DOI":"10.1145\/240080.240256"},{"key":"9399_CR13","doi-asserted-by":"crossref","unstructured":"Bennett, P.N.; White, R.W.; Chu, W.; Dumais, S.T.; Bailey, P.; Borisyuk, F.; and Cui, X. (2012). Modeling the impact of short- and Long-Term behavior on search personalization. In: SIGIR \u201912. Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval. Portland, pp. 185\u2013194.","DOI":"10.1145\/2348283.2348312"},{"key":"9399_CR14","doi-asserted-by":"crossref","unstructured":"Boyle, M.; Neustaedter, C.; and Greenberg, S. (2009). Privacy factors in video-based media spaces, Media Space 20+ Years of Mediated Life. Springer, pp. 97\u2013122.","DOI":"10.1007\/978-1-84882-483-6_7"},{"key":"9399_CR15","doi-asserted-by":"crossref","unstructured":"Braunstein, A.; Granka, L.; and Staddon, J. (2011). Indirect content privacy surveys: Measuring privacy without asking about it. In: SOUPS \u201911. Proceedings of the Seventh Symposium on Usable Privacy and Security. Pittsburgh, pp. 1\u201314.","DOI":"10.1145\/2078827.2078847"},{"key":"9399_CR16","doi-asserted-by":"crossref","unstructured":"Brown, B.; and Barkhuus, L. (2007). Leisure and CSCW: Introduction to special edition. Computer Supported Cooperative Work (CSCW), vol. 16, no. 1-2, pp. 1\u201310.","DOI":"10.1007\/s10606-007-9043-6"},{"key":"9399_CR17","doi-asserted-by":"crossref","unstructured":"Buchenscheit, A.; K\u00f6nings, B.; Neubert, A.; Schaub, F.; Schneider, M.; and Kargl, F. (2014). Privacy implications of presence sharing in mobile messaging applications. In: MUM \u201914. Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia. Melbourne, pp. 20\u201329.","DOI":"10.1145\/2677972.2677980"},{"key":"9399_CR18","doi-asserted-by":"crossref","unstructured":"Buschek, D.; Hassib, M.; and Alt, F. (2018). Personal mobile messaging in context: Chat augmentations for expressiveness and awareness. ACM Transactions on Computer-Human Interaction (TOCHI), vol. 25, no. 4, pp. 1\u201333.","DOI":"10.1145\/3201404"},{"key":"9399_CR19","doi-asserted-by":"crossref","unstructured":"Caird, J.K.; Johnston, K.A.; Willness, C.R.; Asbridge, M.; and Steel, P. (2014). A meta-analysis of the effects of texting on driving. Accident Analysis & Prevention, vol. 71, pp. 311\u2013318.","DOI":"10.1016\/j.aap.2014.06.005"},{"key":"9399_CR20","doi-asserted-by":"crossref","unstructured":"Chang, Y.-J.; and Tang, J.C. (2015). Investigating mobile users\u2019 ringer mode usage and attentiveness and responsiveness to communication. In: MobileHCI \u201915. Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. Copenhagen, pp. 6\u201315.","DOI":"10.1145\/2785830.2785852"},{"key":"9399_CR21","doi-asserted-by":"crossref","unstructured":"Chang, Y.-J.; Chung, Y.-J.; and Shih, Y.-H. (2019). I think it\u2019s her: Investigating smartphone users\u2019 speculation about phone notifications and its influence on attendance. In: MobileHCI \u201919. Proceedings of the 21st International Conference on Human-Computer Interaction with Mobile Devices and Services. Taipei.","DOI":"10.1145\/3338286.3340125"},{"key":"9399_CR22","doi-asserted-by":"crossref","unstructured":"Chen, Z.; Mu, L.; Chen, F.; Lane, N.D.; Cardone, G.; Wang, R.; Li, T.; Chen, Y.; Choudhury, T.; and Campbell, A.T. (2013). Unobtrusive sleep monitoring using smartphones. In: PervasiveHealth \u201913. Proceedings of the 7th International Conference on Pervasive Computing Technologies for Healthcare. Venice: BEL, pp. 145\u2013152.","DOI":"10.4108\/icst.pervasivehealth.2013.252148"},{"key":"9399_CR23","doi-asserted-by":"crossref","unstructured":"Cho, H.; Oh, J.; Kim, J.; and Lee, S.-J. (2020). I Share, You Care: Private Status Sharing and Sender-Controlled Notifications in Mobile Instant Messaging. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW1), 1\u201325.","DOI":"10.1145\/3392839"},{"key":"9399_CR24","doi-asserted-by":"crossref","unstructured":"Church, Karen; and Oliveira, Rodrigo de (2013). What\u2019s up with whatsapp? comparing mobile instant messaging behaviors with traditional SMS. In: MobileHCI \u201913. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services. Munich, pp. 352\u2013361.","DOI":"10.1145\/2493190.2493225"},{"key":"9399_CR25","doi-asserted-by":"crossref","unstructured":"Consolvo, S.; Smith, I.; Matthews, T.; LaMarca, A.; Tabert, J.; and Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. In: CHI \u201905. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Portland, pp. 81\u201390.","DOI":"10.1145\/1054972.1054985"},{"key":"9399_CR26","doi-asserted-by":"crossref","unstructured":"Dabbish, L.; and Kraut, R.E. (2004). Controlling interruptions: Awareness displays and social motivation for coordination. In: CSCW \u201904. Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work. Chicago, pp. 182\u2013191.","DOI":"10.1145\/1031607.1031638"},{"key":"9399_CR27","doi-asserted-by":"crossref","unstructured":"Dey, A.K (2001). Understanding and using context. Personal and Ubiquitous Computing, vol. 5, no. 1, pp. 4\u20137.","DOI":"10.1007\/s007790170019"},{"key":"9399_CR28","doi-asserted-by":"crossref","unstructured":"De, Guzman; Edward, S.; Sharmin, M.; and Bailey, B.P. (2007). Should I call now? understanding what context is considered when deciding whether to initiate remote communication via mobile devices, GI. In: \u201907. Proceedings of Graphics Interface 2007. Montreal, pp. 143\u2013150.","DOI":"10.1145\/1268517.1268542"},{"key":"9399_CR29","doi-asserted-by":"crossref","unstructured":"Difallah, D.; Filatova, E.; and Ipeirotis, P. (2018). Demographics and dynamics of mechanical turk workers. In: WSDM \u201918. Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. Marina Del Rey, pp. 135\u2013143.","DOI":"10.1145\/3159652.3159661"},{"key":"9399_CR30","doi-asserted-by":"crossref","unstructured":"Dourish, P.; and Bly, S. (1992a). Portholes: Supporting awareness in a distributed work group. In: CHI \u201992. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Monterey, pp. 541\u2013547.","DOI":"10.1145\/142750.142982"},{"key":"9399_CR31","doi-asserted-by":"crossref","unstructured":"Dourish, P.; and Bellotti, V. (1992b). Awareness and coordination in shared workspaces. In: CSCW \u201992. Proceedings of the 1992 ACM Conference on Computer-Supported Cooperative Work. Toronto, pp. 107\u2013114.","DOI":"10.1145\/143457.143468"},{"key":"9399_CR32","doi-asserted-by":"crossref","unstructured":"Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, vol. 8, no. 1, pp. 19\u201330.","DOI":"10.1007\/s00779-003-0253-8"},{"key":"9399_CR33","unstructured":"Earle, K.K. (2018). Attributions online: an examination of time stamps, read receipts and ellipses in Text-Based communication. Ph.D. thesis, North Dakota State University."},{"key":"9399_CR34","doi-asserted-by":"crossref","unstructured":"Fischer, J.E.; Yee, N.; Bellotti, V.; Good, N.; Benford, S.; and Greenhalgh, C. (2010). Effects of content and time of delivery on receptivity to mobile interruptions. In: MobileHCI \u201910. Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services. Lisbon, pp. 103\u2013112.","DOI":"10.1145\/1851600.1851620"},{"key":"9399_CR35","doi-asserted-by":"crossref","unstructured":"Griggio, C.F.; Nouwens, M.; McGrenere, J.; and Mackay, W.E. (2019). Augmenting Couples\u2019 Communication with \u201cLifelines\u201d Shared Timelines of Mixed Contextual Information. In: CHI \u201919. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, pp. 1\u201313.","DOI":"10.1145\/3290605.3300853"},{"key":"9399_CR36","unstructured":"Guyon, I.; and Elisseeff, A. (2003). An introduction to variable and feature selection. Journal of machine learning research, vol. 3, pp. 1157\u20131182."},{"key":"9399_CR37","doi-asserted-by":"crossref","unstructured":"Hancock, J.; Birnholtz, J.; Bazarova, N.; Guillory, J.; Perlin, J.; and Amos, B. (2009). Butler lies: Awareness, deception and design. In: CHI \u201909. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Boston, pp. 517\u2013526.","DOI":"10.1145\/1518701.1518782"},{"key":"9399_CR38","unstructured":"Handel, M.; and Wills, G. (2000). TeamPortal: Providing team awareness on the web. In: ACM CSCW 2000 Proceedings of the International Workshop on Awareness and the WWW. Philadelphia, pp. 3\u201312."},{"key":"9399_CR39","doi-asserted-by":"crossref","unstructured":"Handel, M.; and Herbsleb, J.D. (2002). What is chat doing in the workplace? In: CSCW \u201902. Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work. New Orleans, pp. 1\u201310.","DOI":"10.1145\/587078.587080"},{"key":"9399_CR40","doi-asserted-by":"crossref","unstructured":"Harrison, S. (2009). Media Space 20+ Years of Mediated Life. Springer Publishing Company, Incorporated, 1st edn.","DOI":"10.1007\/978-1-84882-483-6"},{"key":"9399_CR41","doi-asserted-by":"crossref","unstructured":"Hassib, M.; Buschek, D.; Wozniak, P.W.; and Alt, F. (2017). HeartChat: Heart Rate Augmented Mobile Chat to Support Empathy and Awareness. New York: Association for Computing Machinery, pp. 2239\u20132251.","DOI":"10.1145\/3025453.3025758"},{"key":"9399_CR42","unstructured":"Horvitz, E.J; and Apacible, J.T (2009). Use of a bulk-email filter within a system for classifying messages for urgency or importance. US Patent 7,565,403."},{"key":"9399_CR43","doi-asserted-by":"crossref","unstructured":"Hoyle, R.; Das, S.; Kapadia, A.; Lee, A.J.; and Vaniea, K. (2017). Was my message read? privacy and signaling on facebook messenger. In: CHI \u201917. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Denver, pp. 3838\u20133842.","DOI":"10.1145\/3025453.3025925"},{"key":"9399_CR44","doi-asserted-by":"crossref","unstructured":"Isaacs, E.; Walendowski, A.; Whittaker, S.; Schiano, D.J.; and Kamm, C. (2002). The character, functions, and styles of instant messaging in the workplace. In: CSCW \u201902. Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work. New Orleans, pp. 11\u201320.","DOI":"10.1145\/587078.587081"},{"key":"9399_CR45","doi-asserted-by":"crossref","unstructured":"Jacoby, J.; and Matell, M.S. (1971). Three-Point Likert scales are good enough. Journal of Marketing Research, vol. 8, no. 4, pp. 495\u2013500.","DOI":"10.1177\/002224377100800414"},{"key":"9399_CR46","doi-asserted-by":"crossref","unstructured":"Jain, P.; Farzan, R.; and Lee, A.J. (2019a). Adaptive Modelling of Attentiveness to Messaging: A Hybrid Approach. In: UMAP \u201919. Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization. Larnaca, pp. 261\u2013270.","DOI":"10.1145\/3320435.3320461"},{"key":"9399_CR47","doi-asserted-by":"crossref","unstructured":"Jain, P.; Farzan, R.; and Lee, A.J. (2019b). Are You There? Identifying Unavailability in Mobile Messaging. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow, pp. 1\u20136.","DOI":"10.1145\/3290607.3312893"},{"key":"9399_CR48","unstructured":"Kang, R.; Brown, S.; Dabbish, L.; and Kiesler, S. (2014). Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. In: SOUPS \u201914. Proceedings of the Tenth USENIX Conference on Usable Privacy and Security. Menlo Park, pp. 37\u201349."},{"key":"9399_CR49","doi-asserted-by":"crossref","unstructured":"Khalil, A.; and Connelly, K. (2006). Context-Aware Telephony: Privacy preferences and sharing patterns. In: CSCW \u201906. Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work. Banff, pp. 469\u2013478.","DOI":"10.1145\/1180875.1180947"},{"key":"9399_CR50","doi-asserted-by":"crossref","unstructured":"Kim, B.; Shin, K.-S.; and Chai, S. (2015). How People Disclose Themselves Differently According To The Strength Of Relationship In SNS? Journal of Applied Business Research, vol. 31, no. 6, p. 2139.","DOI":"10.19030\/jabr.v31i6.9472"},{"key":"9399_CR51","doi-asserted-by":"crossref","unstructured":"Knittel, J.; Shirazi, A.S.; Henze, N.; and Schmidt, A. (2013). Utilizing contextual information for mobile communication. In: CHI \u201913 Extended abstracts on human factors in computing systems. Paris, pp. 1371\u20131376.","DOI":"10.1145\/2468356.2468601"},{"key":"9399_CR52","doi-asserted-by":"crossref","unstructured":"Lampinen, A.; Tamminen, S.; and Oulasvirta, A. (2009). All my people right here, right now: Management of group Co-Presence on a social networking site. In: GROUP \u201909. Proceedings of the ACM 2009 International Conference on Supporting Group Work. Sanibel Island, pp. 281\u2013290.","DOI":"10.1145\/1531674.1531717"},{"key":"9399_CR53","unstructured":"Lantz, B. (2013). Equidistance of Likert-type scales and validation of inferential methods using experiments and simulations. The Electronic Journal of Business Research Methods, vol. 11, no. 1, pp. 16\u201328."},{"key":"9399_CR54","doi-asserted-by":"crossref","unstructured":"Liang, K.-Y.; and Zeger, S.L. (1986). Longitudinal data analysis using generalized linear models, Vol. 73.","DOI":"10.1093\/biomet\/73.1.13"},{"key":"9399_CR55","doi-asserted-by":"crossref","unstructured":"Lin, R.; and Utz, S. (2017). Self-disclosure on SNS: Do disclosure intimacy and narrativity influence interpersonal closeness and social attraction? Computers in Human Behavior, vol. 70, pp. 426\u2013436.","DOI":"10.1016\/j.chb.2017.01.012"},{"key":"9399_CR56","doi-asserted-by":"crossref","unstructured":"Mai, L.M.; Freudenthaler, R.; Schneider, F.M.; and Vorderer, P. (2015). \u201cI know you\u2019ve seen it!\u201d Individual and social factors for users\u2019 chatting behavior on Facebook. Computers in Human Behavior, vol. 49, pp. 296\u2013302.","DOI":"10.1016\/j.chb.2015.01.074"},{"key":"9399_CR57","doi-asserted-by":"crossref","unstructured":"Malhotra, N.K.; Kim, S.S.; and Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, vol. 15, no. 4, pp. 336\u2013355.","DOI":"10.1287\/isre.1040.0032"},{"key":"9399_CR58","doi-asserted-by":"crossref","unstructured":"Marreiros, H.; Tonin, M.; Vlassopoulos, M.; and Schraefel, M.C. (2017). \u201cNow that you mention it\u201d: A survey experiment on information, inattention and online privacy. Journal of Economic Behavior & Organization, vol. 140, pp. 1\u201317.","DOI":"10.1016\/j.jebo.2017.03.024"},{"key":"9399_CR59","doi-asserted-by":"crossref","unstructured":"McDuff, D.; and Czerwinski, M. (2018). Designing emotionally sentient agents. Communications of the ACM, vol. 61, no. 12, pp. 74\u201383.","DOI":"10.1145\/3186591"},{"key":"9399_CR60","doi-asserted-by":"crossref","unstructured":"Mehrotra, A.; Musolesi, M.; Hendley, R.; and Pejovic, V. (2015). Designing Content-driven Intelligent Notification Mechanisms for Mobile Applications. In: UbiComp \u201915. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Osaka, pp. 813\u2013824.","DOI":"10.1145\/2750858.2807544"},{"key":"9399_CR61","doi-asserted-by":"crossref","unstructured":"Mehrotra, A.; Pejovic, V.; Jo, V.; Hendley, R.; and Musolesi, M. (2016). My phone and me: Understanding people\u2019s receptivity to mobile notifications. In: CHI \u201916. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. San Jose, pp. 1021\u20131032.","DOI":"10.1145\/2858036.2858566"},{"key":"9399_CR62","doi-asserted-by":"crossref","unstructured":"Montag, C.; B\u0142aszkiewicz, K; Sariyska, R.; Lachmann, B.; Andone, I.; Trendafilov, B.; Eibes, M.; and Markowetz, A. (2015). Smartphone usage in the 21st century: who is active on WhatsApp?. BMC Research notes, vol. 8, no. 1, p. 331.","DOI":"10.1186\/s13104-015-1280-z"},{"key":"9399_CR63","doi-asserted-by":"crossref","unstructured":"Nardi, B.A.; Whittaker, S.; and Bradner, E. (2000). Interaction and outeraction: Instant messaging in action. In: CSCW \u201900. Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work. Philadelphia, pp. 79\u201388.","DOI":"10.1145\/358916.358975"},{"key":"9399_CR64","doi-asserted-by":"crossref","unstructured":"Niemantsverdriet, K.; Van Essen, H.; Pakanen, M.; and Eggen, B. (2019). Designing for awareness in interactions with shared systems: the DASS framework. ACM Transactions on Computer-Human Interaction (TOCHI), vol. 26, no. 6, pp. 1\u201341.","DOI":"10.1145\/3338845"},{"key":"9399_CR65","doi-asserted-by":"crossref","unstructured":"O\u2019Day, D.R; and Calix, R.A (2013). Text message corpus: applying natural language processing to mobile device forensics. In: ICMEW 2013. IEEE International conference on multimedia and expo workshops. San Jose, pp. 1\u20136.","DOI":"10.1109\/ICMEW.2013.6618380"},{"key":"9399_CR66","doi-asserted-by":"crossref","unstructured":"Pejovic, V.; and Musolesi, M. (2014). Interruptme: Designing Intelligent Prompting Mechanisms for Pervasive Applications. In: UbiComp \u201914. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Seattle, pp. 897\u2013908.","DOI":"10.1145\/2632048.2632062"},{"key":"9399_CR67","doi-asserted-by":"crossref","unstructured":"Pek\u00e1r, S.; and Brabec, M. (2018). Generalized estimating equations: a pragmatic and flexible approach to the marginal GLM modelling of correlated data in the behavioural sciences. Ethology, vol. 124, no. 2, pp. 86\u201393.","DOI":"10.1111\/eth.12713"},{"key":"9399_CR68","doi-asserted-by":"crossref","unstructured":"Perry, M.; O\u2019hara, K.; Sellen, A.; Brown, B.; and Harper, R. (2001). Dealing with mobility: understanding access anytime, anywhere. ACM Transactions on Computer-Human Interaction (TOCHI), vol. 8, no. 4, pp. 323\u2013347.","DOI":"10.1145\/504704.504707"},{"key":"9399_CR69","doi-asserted-by":"crossref","unstructured":"Pielot, M.; de Oliveira, R.; Kwak, H.; and Oliver, N. (2014). Didn\u2019t you see my message? predicting attentiveness to mobile instant messages. In: CHI \u201914. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Toronto, pp. 3319\u20133328.","DOI":"10.1145\/2556288.2556973"},{"key":"9399_CR70","doi-asserted-by":"crossref","unstructured":"Pielot, M.; Cardoso, B.; Katevas, K.; Serr\u00e0, J; Matic, A.; and Oliver, N. (2017). Beyond interruptibility: Predicting opportune moments to engage mobile phone users. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 3, pp. 1\u201325.","DOI":"10.1145\/3130956"},{"key":"9399_CR71","doi-asserted-by":"crossref","unstructured":"Pielot, Martin; Dingler, Tilman; Pedro, Jose San; and Oliver, Nuria (2015). When attention is not scarce - detecting boredom from mobile phone usage. In: UbiComp \u201915. Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Osaka, pp. 825\u2013836.","DOI":"10.1145\/2750858.2804252"},{"key":"9399_CR72","doi-asserted-by":"crossref","unstructured":"Retore, Ana Paula; and Almeida, Leonelo Dell Anhol (2019). Understanding Appropriation Through End-User Tailoring in Communication Systems: A Case Study on Slack and WhatsApp. In , SCSM 2019. Social Computing and social media. design, Human Behavior and Analytics. Cham, pp. 245\u2013264.","DOI":"10.1007\/978-3-030-21902-4_18"},{"key":"9399_CR73","doi-asserted-by":"crossref","unstructured":"Reynolds, L.; Smith, M.E.; Birnholtz, J.P.; and Hancock, J.T. (2013). Butler lies from both sides: Actions and perceptions of unavailability management in texting. In: CSCW \u201913. Proceedings of the 2013 Conference on Computer Supported Cooperative Work. San Antonio, pp. 769\u2013778.","DOI":"10.1145\/2441776.2441862"},{"key":"9399_CR74","doi-asserted-by":"crossref","unstructured":"Rosenthal, S.; Dey, A.K.; and Veloso, M. (2011). Using Decision-Theoretic experience sampling to build personalized mobile phone interruption models. In: Pervasive\u201911. Proceedings of the 9th International Conference on Pervasive Computing. San Francisco, pp. 170\u2013187.","DOI":"10.1007\/978-3-642-21726-5_11"},{"key":"9399_CR75","doi-asserted-by":"crossref","unstructured":"Salovaara, A.; Lindqvist, A.; Hasu, T.; and H\u00e4kkil\u00e4, J (2011). The phone rings but the user doesn\u2019t answer: Unavailability in mobile communication. In: MobileHCI \u201911. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services. Stockholm, pp. 503\u2013512.","DOI":"10.1145\/2037373.2037448"},{"key":"9399_CR76","doi-asserted-by":"crossref","unstructured":"Schildt, Emily; Leinfors, Martin; and Barkhuus, Louise (2016). Communication, coordination and awareness around continuous location sharing. In: GROUP \u201916. Proceedings of the 19th International Conference on Supporting Group Work. Sanibel Island, pp. 257\u2013265.","DOI":"10.1145\/2957276.2957289"},{"key":"9399_CR77","doi-asserted-by":"crossref","unstructured":"Schmidt, Kjeld (2002). The problem with awareness\u2019: Introductory remarks onawareness in CSCW\u2019. Computer Supported Cooperative Work (CSCW), vol. 11, no. 3-4, pp. 285\u2013298.","DOI":"10.1023\/A:1021272909573"},{"key":"9399_CR78","doi-asserted-by":"crossref","unstructured":"Sullivan, G.M.; and Anthony, Jr, RA. (2013). Analyzing and interpreting data from Likert-type scales. Journal of Graduate Medical Education, vol. 5, no. 4, pp. 541\u2013542.","DOI":"10.4300\/JGME-5-4-18"},{"key":"9399_CR79","doi-asserted-by":"crossref","unstructured":"Tam, K.Y.; and Ho, S.Y. (2006). Understanding the impact of web personalization on user information processing and decision outcomes. MIS Quarterly, vol. 30, no. 4, pp. 865\u2013890.","DOI":"10.2307\/25148757"},{"key":"9399_CR80","doi-asserted-by":"crossref","unstructured":"Tang, J.C (2007). Approaching and leave-taking: Negotiating contact in computer-mediated communication. ACM Transactions on Computer-Human Interaction (TOCHI), vol. 14, no. 1, pp. 5\u2013es.","DOI":"10.1145\/1229855.1229860"},{"key":"9399_CR81","doi-asserted-by":"crossref","unstructured":"Tang, JC.; Yankelovich, N.; Begole, J.; Van, K.M.; Li, F.; and Bhalodia, J. (2001). Connexus to Awarenex: Extending Awareness to Mobile Users. In: CHI \u201901. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Seattle, pp. 221\u2013228.","DOI":"10.1145\/365024.365105"},{"key":"9399_CR82","doi-asserted-by":"crossref","unstructured":"Teevan, J.; and Hehmeyer, A. (2013). Understanding how the projection of availability state impacts the reception incoming communication. In: CSCW \u201913. Proceedings of the 2013 Conference on Computer Supported Cooperative Work. San Antonio, pp. 753\u2013758.","DOI":"10.1145\/2441776.2441860"},{"key":"9399_CR83","doi-asserted-by":"crossref","unstructured":"Thayer, A.; Bietz, MJ.; Derthick, K.; and Lee, CP. (2012). I love you, let\u2019s share calendars: Calendar sharing as relationship work. In: CSCW \u201912. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. Seattle, pp. 749\u2013758.","DOI":"10.1145\/2145204.2145317"},{"key":"9399_CR84","doi-asserted-by":"crossref","unstructured":"Tyler, JR.; and Tang, JC. (2003). When Can i expect an email response? a study of rhythms in email usage. In: ECSCW 2003. Proceedings of the 2003 European Conference on Computer-Supported Cooperative Work. Dordrecht, pp. 239\u2013258.","DOI":"10.1007\/978-94-010-0068-0_13"},{"key":"9399_CR85","doi-asserted-by":"crossref","unstructured":"Voida, A.; Newstetter, WC.; and Mynatt, ED. (2002). When conventions collide: The tensions of instant messaging attributed. In: CHI \u201902. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Minneapolis, pp. 187\u2013194.","DOI":"10.1145\/503376.503410"},{"key":"9399_CR86","doi-asserted-by":"crossref","unstructured":"Walther, JB.; and Burgoon, JK. (1992). Relational communication in Computer-Mediated interaction. Human Communication Research, vol. 19, no. 1, pp. 50\u201388.","DOI":"10.1111\/j.1468-2958.1992.tb00295.x"},{"key":"9399_CR87","doi-asserted-by":"crossref","unstructured":"Wang, M.; Cho, S.; and Denton, T. (2017). The impact of personalization and compatibility with past experience on e-banking usage. International Journal of Bank Marketing, vol. 35, no. 1, pp. 45\u201355.","DOI":"10.1108\/IJBM-04-2015-0046"},{"key":"9399_CR88","doi-asserted-by":"crossref","unstructured":"Wiberg, M.; and S. Whittaker (2005). Managing availability: Supporting lightweight negotiations to handle interruptions. ACM transactions on computer-human interaction (TOCHI), vol. 12, no. 4, pp. 356\u2013387.","DOI":"10.1145\/1121112.1121114"},{"key":"9399_CR89","doi-asserted-by":"crossref","unstructured":"Wiese, J.; Kelley, P.G.; Cranor, L.F.; Dabbish, L.; Hong, JI.; and Zimmerman, J. (2011). Are you close with me? are you nearby? investigating social groups, closeness, and willingness to share. In: UbiComp \u201911. Proceedings of the 13th International Conference on Ubiquitous Computing. Beijing, pp. 197\u2013206.","DOI":"10.1145\/2030112.2030140"},{"key":"9399_CR90","doi-asserted-by":"crossref","unstructured":"Yuan, F.; Gao, X.; and Lindqvist, J. (2017). How busy are you?: Predicting the interruptibility intensity of mobile users. In: CHI \u201917. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Denver, pp. 5346\u20135360.","DOI":"10.1145\/3025453.3025946"},{"key":"9399_CR91","unstructured":"Y\u00e1\u00f1ez Cort\u00e9s, R (1975). The problem of interpretation in psychology. Acta Psiquiatrica y Psicologica de America Latina, vol. 21, no. 2, pp. 84\u201489."},{"key":"9399_CR92","doi-asserted-by":"crossref","unstructured":"Zhao, C.; Hinds, P.; and Ge, G. (2012). How and to whom people share: The role of culture in Self-Disclosure in online communities. In: CSCW \u201912. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. Seattle, pp. 67\u201376.","DOI":"10.1145\/2145204.2145219"}],"container-title":["Computer Supported Cooperative Work (CSCW)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-021-09399-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10606-021-09399-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-021-09399-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T03:53:58Z","timestamp":1699070038000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10606-021-09399-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":92,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["9399"],"URL":"https:\/\/doi.org\/10.1007\/s10606-021-09399-z","relation":{},"ISSN":["0925-9724","1573-7551"],"issn-type":[{"type":"print","value":"0925-9724"},{"type":"electronic","value":"1573-7551"}],"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"4 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}