{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T12:25:42Z","timestamp":1765974342553,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025613","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"85-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["\"If a person is emailing you, it just doesn't make sense\""],"prefix":"10.1145","author":[{"given":"Frank","family":"Bentley","sequence":"first","affiliation":[{"name":"Yahoo, Sunnyvale, CA, USA"}]},{"given":"Nediyana","family":"Daskalova","sequence":"additional","affiliation":[{"name":"Yahoo, Sunnyvale, USA"}]},{"given":"Nazanin","family":"Andalibi","sequence":"additional","affiliation":[{"name":"Yahoo, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of HCI","author":"B\u00e4lter Olle","year":"1997","unstructured":"Olle B\u00e4lter . Strategies for organizing email messages . Proceedings of HCI 1997 , Springer, 21--38. Olle B\u00e4lter. Strategies for organizing email messages. Proceedings of HCI 1997, Springer, 21--38."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001%262_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858056"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785868"},{"key":"e_1_3_2_1_5_1","volume-title":"Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16)","author":"Cecchinato Marta E.","year":"2016","unstructured":"Marta E. Cecchinato , Abigail Sellen , Milad Shokouhi , and Gavin Smyth . 2016 . Finding Email in a MultiAccount , Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16) . ACM, New York, NY, USA, 1200--1210. DOI: https:\/\/doi.org\/10.1145\/2858036.2858473 10.1145\/2858036.2858473 Marta E. Cecchinato, Abigail Sellen, Milad Shokouhi, and Gavin Smyth. 2016. Finding Email in a MultiAccount, Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1200--1210. DOI: https:\/\/doi.org\/10.1145\/2858036.2858473"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493225"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. INTERACT 2001","author":"Cutrell Edward","year":"2001","unstructured":"Edward Cutrell , Mary Czerwinski , and Eric Horvitz . Notification, disruption, and memory : Effects of messaging interruptions on memory and performance . In Proc. INTERACT 2001 , IOS Press ( 2001 ), 263--269. Edward Cutrell, Mary Czerwinski, and Eric Horvitz. Notification, disruption, and memory: Effects of messaging interruptions on memory and performance. In Proc. INTERACT 2001, IOS Press (2001), 263--269."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180941"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055068"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958880"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180922"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557013"},{"key":"e_1_3_2_1_13_1","volume-title":"\"y do tngrs luv 2 txt msg?.\" ECSCW","author":"Grinter Rebecca E.","year":"2001","unstructured":"Rebecca E. Grinter and Margery A. Eldridge . \"y do tngrs luv 2 txt msg?.\" ECSCW 2001 . Springer Netherlands , 2001. Rebecca E. Grinter and Margery A. Eldridge. \"y do tngrs luv 2 txt msg?.\" ECSCW 2001. Springer Netherlands, 2001."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642688"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188816.1188817"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.10.4.287"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207754"},{"key":"e_1_3_2_1_18_1","volume-title":"Home broadband adoption: Modest decline from 2013 to","author":"Horrigan John","year":"2015","unstructured":"John Horrigan and Maeve Duggan . Home broadband adoption: Modest decline from 2013 to 2015 . PEW Internet . http:\/\/www.pewinternet.org\/2015\/12\/21\/1home-broadband-adoption-modest-decline-from-2013to-2015\/ Accessed July, 2016. John Horrigan and Maeve Duggan. Home broadband adoption: Modest decline from 2013 to 2015. PEW Internet. http:\/\/www.pewinternet.org\/2015\/12\/21\/1home-broadband-adoption-modest-decline-from-2013to-2015\/ Accessed July, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358975"},{"key":"e_1_3_2_1_20_1","first-page":"2016","author":"Radicati Sarah","year":"2012","unstructured":"Sarah Radicati . Email Statistics Report , 2012 -- 2016 . http:\/\/www.radicati.com\/wp\/wpcontent\/uploads\/2012\/04\/Email-Statistics-Report2012--2016-Executive-Summary.pdf. Accessed July, 2016. Sarah Radicati. Email Statistics Report, 2012--2016. http:\/\/www.radicati.com\/wp\/wpcontent\/uploads\/2012\/04\/Email-Statistics-Report2012--2016-Executive-Summary.pdf. Accessed July, 2016.","journal-title":"Email Statistics Report"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28997-2_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1499224.1499252"},{"key":"e_1_3_2_1_23_1","volume-title":"\"When can I expect an email response? A study of rhythms in email usage.\" ECSCW","author":"Tyler Joshua R.","year":"2003","unstructured":"Joshua R. Tyler and John C. Tang . \"When can I expect an email response? A study of rhythms in email usage.\" ECSCW 2003 . Springer Netherlands , 2003. Joshua R. Tyler and John C. Tang. \"When can I expect an email response? A study of rhythms in email usage.\" ECSCW 2003. Springer Netherlands, 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979457"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Denver Colorado USA","acronym":"CHI '17"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:34Z","timestamp":1750215814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025613"}},"subtitle":["Exploring Changing Consumer Behaviors in Email"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":25,"alternative-id":["10.1145\/3025453.3025613","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025613","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}