{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:13Z","timestamp":1750306573277,"version":"3.41.0"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T00:00:00Z","timestamp":1421107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2015,1,14]]},"abstract":"<jats:p>Evaluating a system with users is an important part of interactive applications research and development. However, there are many challenges to conducting an effective evaluation. One such challenge is involving an appropriate number of participants in a study. Although the number of participants involved has varied in previously published studies of interactive systems, it does not mean that any value can be used. When too few participants are involved, those studies are often regarded as weak, incomplete, or otherwise invalid.<\/jats:p>","DOI":"10.1145\/2721914.2721925","type":"journal-article","created":{"date-parts":[[2015,1,16]],"date-time":"2015-01-16T14:29:58Z","timestamp":1421418598000},"page":"32-36","source":"Crossref","is-referenced-by-count":1,"title":["When is Too Few Too Bad"],"prefix":"10.1145","volume":"18","author":[{"given":"Khai N.","family":"Truong","sequence":"first","affiliation":[{"name":"University of North Carolina, Charlotte"}]}],"member":"320","published-online":{"date-parts":[[2015,1,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1145\/1868914.1868921"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/2565585.2565589"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1145\/1322263.1322273"},{"doi-asserted-by":"publisher","key":"e_1_2_1_4_1","DOI":"10.1007\/11853565_11"},{"doi-asserted-by":"publisher","key":"e_1_2_1_5_1","DOI":"10.1145\/1168987.1169006"},{"doi-asserted-by":"publisher","key":"e_1_2_1_6_1","DOI":"10.1007\/978-3-642-01516-8_15"},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1007\/11853565_10"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/1555816.1555823"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721914.2721925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2721914.2721925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:28Z","timestamp":1750227208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721914.2721925"}},"subtitle":["How Many Participants Should a User Study Have?"],"short-title":[],"issued":{"date-parts":[[2015,1,13]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,1,14]]}},"alternative-id":["10.1145\/2721914.2721925"],"URL":"https:\/\/doi.org\/10.1145\/2721914.2721925","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2015,1,13]]}}}