{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:47:10Z","timestamp":1761061630514,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["107-2218-E-009 -030 -MY3, 110-2222-E-A49 -008 -MY3"],"award-info":[{"award-number":["107-2218-E-009 -030 -MY3, 110-2222-E-A49 -008 -MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3517496","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:09:36Z","timestamp":1651165776000},"page":"1-15","source":"Crossref","is-referenced-by-count":9,"title":["Why Did You\/I Read but Not Reply? IM Users\u2019 Unresponded-to Read-receipt Practices and Explanations of Them"],"prefix":"10.1145","author":[{"given":"Yu-Ling","family":"Chou","sequence":"first","affiliation":[{"name":"Department of Chinese Literature, National Tsing Hua University, Taiwan and Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan"}]},{"given":"Yi-Hsiu","family":"Lin","sequence":"additional","affiliation":[{"name":"Institute of Communication Studies, National Yang Ming Chiao Tung University, Taiwan and Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan"}]},{"given":"Tzu-Yi","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan"}]},{"given":"Hsin Ying","family":"You","sequence":"additional","affiliation":[{"name":"Institute of Communication Studies, National Yang Ming Chiao Tung University, Taiwan and Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan"}]},{"given":"Yung-Ju","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan and Institute of Communication Studies, National Yang Ming Chiao Tung University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Here\u2019s how you can secretly check anyone\u2019s WhatsApp status without sending Read receipt. https:\/\/www.businesstoday.in\/technology\/story\/whatsapp-whatsappstatus-anonymous-whatsapp-tricks-facebook-162472-2019-01-31  [n.d.]. Here\u2019s how you can secretly check anyone\u2019s WhatsApp status without sending Read receipt. https:\/\/www.businesstoday.in\/technology\/story\/whatsapp-whatsappstatus-anonymous-whatsapp-tricks-facebook-162472-2019-01-31"},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. How to Turn Off Read Receipts on iMessage. https:\/\/www.alphr.com\/imessage-turn-off-read-receipts\/  [n.d.]. How to Turn Off Read Receipts on iMessage. https:\/\/www.alphr.com\/imessage-turn-off-read-receipts\/"},{"key":"e_1_3_2_2_3_1","unstructured":"2015. Message read. But what kind of weirdo keeps read receipts on?https:\/\/www.theguardian.com\/technology\/2015\/aug\/17\/message-read-but-what-kind-of-weirdo-keeps-read-receipts-on  2015. Message read. But what kind of weirdo keeps read receipts on?https:\/\/www.theguardian.com\/technology\/2015\/aug\/17\/message-read-but-what-kind-of-weirdo-keeps-read-receipts-on"},{"key":"e_1_3_2_2_4_1","unstructured":"2021. How to read a WhatsApp secretly without being online or double blue check. https:\/\/marketresearchtelecast.com\/how-to-read-a-whatsapp-secretly-without-being-online-or-double-blue-check\/94732\/  2021. How to read a WhatsApp secretly without being online or double blue check. https:\/\/marketresearchtelecast.com\/how-to-read-a-whatsapp-secretly-without-being-online-or-double-blue-check\/94732\/"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.260"},{"key":"e_1_3_2_2_6_1","first-page":"825","article-title":"What is \u201ctheory of mind","volume":"65","author":"Apperly A","year":"2012","unstructured":"Ian\u00a0 A Apperly . 2012 . What is \u201ctheory of mind \u201d? Concepts, cognitive processes and individual differences. Quarterly Journal of Experimental Psychology 65 , 5(2012), 825 \u2013 839 . Ian\u00a0A Apperly. 2012. What is \u201ctheory of mind\u201d? Concepts, cognitive processes and individual differences. Quarterly Journal of Experimental Psychology 65, 5(2012), 825\u2013839.","journal-title":"Concepts, cognitive processes and individual differences. Quarterly Journal of Experimental Psychology"},{"volume-title":"Why language matters for theory of mind","author":"Astington Janet\u00a0Wilde","key":"e_1_3_2_2_7_1","unstructured":"Janet\u00a0Wilde Astington and Jodie\u00a0 A Baird . 2005. Why language matters for theory of mind . Oxford University Press . Janet\u00a0Wilde Astington and Jodie\u00a0A Baird. 2005. Why language matters for theory of mind. Oxford University Press."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460610"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124881"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2017.85"},{"key":"e_1_3_2_2_11_1","unstructured":"Johnston Casey. 2013. Why I hate read receipts. https:\/\/arstechnica.com\/staff\/2013\/07\/why-i-hate-read-receipts\/  Johnston Casey. 2013. Why I hate read receipts. https:\/\/arstechnica.com\/staff\/2013\/07\/why-i-hate-read-receipts\/"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785852"},{"key":"e_1_3_2_2_13_1","unstructured":"Kathy Charmaz. 2014. Constructing grounded theory. sage.  Kathy Charmaz. 2014. Constructing grounded theory. sage."},{"key":"e_1_3_2_2_14_1","volume-title":"Computer-mediated interpersonal communication. Information and behavior 1","author":"Chesebro W","year":"1985","unstructured":"James\u00a0 W Chesebro . 1985. Computer-mediated interpersonal communication. Information and behavior 1 ( 1985 ), 202\u2013222. James\u00a0W Chesebro. 1985. Computer-mediated interpersonal communication. Information and behavior 1 (1985), 202\u2013222."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493225"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.05.023"},{"key":"e_1_3_2_2_17_1","unstructured":"Allison\u00a0P. Davis. 2014. Turn Off Your \u2019Read Receipts\u2019 Now: A Plea. https:\/\/www.thecut.com\/2014\/08\/turn-off-your-read-receipts-now-a-plea.html  Allison\u00a0P. Davis. 2014. Turn Off Your \u2019Read Receipts\u2019 Now: A Plea. https:\/\/www.thecut.com\/2014\/08\/turn-off-your-read-receipts-now-a-plea.html"},{"volume-title":"Interaction rhythms: Periodicity in communicative behavior","author":"Davis Martha","key":"e_1_3_2_2_18_1","unstructured":"Martha Davis . 1982. Interaction rhythms: Periodicity in communicative behavior . Human Sciences Press . Martha Davis. 1982. Interaction rhythms: Periodicity in communicative behavior. Human Sciences Press."},{"key":"e_1_3_2_2_19_1","unstructured":"India Today\u00a0Web Desk. 2020. How to disable or enable twitter direct message read receipt: Step by step guide. https:\/\/www.indiatoday.in\/information\/story\/how-to-disable-or-enable-twitter-direct-message-read-receipt-step-by-step-guide-1663563-2020-04-05  India Today\u00a0Web Desk. 2020. How to disable or enable twitter direct message read receipt: Step by step guide. https:\/\/www.indiatoday.in\/information\/story\/how-to-disable-or-enable-twitter-direct-message-read-receipt-step-by-step-guide-1663563-2020-04-05"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/2050157920943926"},{"volume-title":"The reconstruction of space and time","author":"D\u00f6ring Nicola","key":"e_1_3_2_2_21_1","unstructured":"Nicola D\u00f6ring and Sandra P\u00f6schl . 2017. Nonverbal cues in mobile phone text messages: The effects of chronemics and proxemics . In The reconstruction of space and time . Routledge , 109\u2013135. Nicola D\u00f6ring and Sandra P\u00f6schl. 2017. Nonverbal cues in mobile phone text messages: The effects of chronemics and proxemics. In The reconstruction of space and time. Routledge, 109\u2013135."},{"volume-title":"Face-to-face interaction: Research, methods, and theory","author":"Duncan Starkey","key":"e_1_3_2_2_22_1","unstructured":"Starkey Duncan and Donald\u00a0 W Fiske . 2015. Face-to-face interaction: Research, methods, and theory . Routledge . Starkey Duncan and Donald\u00a0W Fiske. 2015. Face-to-face interaction: Research, methods, and theory. Routledge."},{"key":"e_1_3_2_2_23_1","volume-title":"Impression formation in dyads: The temporal dimension. Interaction rhythms","author":"Feldstein Stanley","year":"1982","unstructured":"Stanley Feldstein . 1982. Impression formation in dyads: The temporal dimension. Interaction rhythms ( 1982 ), 207\u2013224. Stanley Feldstein. 1982. Impression formation in dyads: The temporal dimension. Interaction rhythms (1982), 207\u2013224."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856520918987"},{"key":"e_1_3_2_2_25_1","volume-title":"The eyes of the beholder: Understanding the turn-taking system in quasi-synchronous computer-mediated communication. Research on language and social interaction 32, 4","author":"Garcia Angela\u00a0Cora","year":"1999","unstructured":"Angela\u00a0Cora Garcia and Jennifer Baker\u00a0Jacobs . 1999. The eyes of the beholder: Understanding the turn-taking system in quasi-synchronous computer-mediated communication. Research on language and social interaction 32, 4 ( 1999 ), 337\u2013367. Angela\u00a0Cora Garcia and Jennifer Baker\u00a0Jacobs. 1999. The eyes of the beholder: Understanding the turn-taking system in quasi-synchronous computer-mediated communication. Research on language and social interaction 32, 4 (1999), 337\u2013367."},{"key":"e_1_3_2_2_26_1","unstructured":"Jack Gramenz. 2020. \u2019Sadistic\u2019 way you could be \u2019torturing\u2019 your partner. https:\/\/www.news.com.au\/technology\/gadgets\/mobile-phones\/why-leaving-your-partner-on-read-and-not-replying-to-messages-can-be-torturous\/news-story\/548450d9b0a2e3335318ee7313c966b8  Jack Gramenz. 2020. \u2019Sadistic\u2019 way you could be \u2019torturing\u2019 your partner. https:\/\/www.news.com.au\/technology\/gadgets\/mobile-phones\/why-leaving-your-partner-on-read-and-not-replying-to-messages-can-be-torturous\/news-story\/548450d9b0a2e3335318ee7313c966b8"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772674"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0747-5632(88)90023-4"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63874-4_13"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047207"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025925"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550619887704"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361115"},{"volume-title":"Rhythms of dialogue. Vol.\u00a08","author":"Jaffe Joseph","key":"e_1_3_2_2_34_1","unstructured":"Joseph Jaffe and Stanley Feldstein . 1970. Rhythms of dialogue. Vol.\u00a08 . Academic Press . Joseph Jaffe and Stanley Feldstein. 1970. Rhythms of dialogue. Vol.\u00a08. Academic Press."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Tatum\u00a0A Jolink Yen-Ping Chang and Sara\u00a0B Algoe. 2021. Perceived Partner Responsiveness Forecasts Behavioral Intimacy as Measured by Affectionate Touch. Personality and Social Psychology Bulletin(2021) 0146167221993349.  Tatum\u00a0A Jolink Yen-Ping Chang and Sara\u00a0B Algoe. 2021. Perceived Partner Responsiveness Forecasts Behavioral Intimacy as Measured by Affectionate Touch. Personality and Social Psychology Bulletin(2021) 0146167221993349.","DOI":"10.1177\/0146167221993349"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00312.x"},{"key":"e_1_3_2_2_37_1","volume-title":"56th Annual Conference of the International Communication Association","author":"Kalman M","year":"2006","unstructured":"Yoram\u00a0 M Kalman , Gilad Ravid , Daphne\u00a0 R Raban , and Sheizaf Rafaeli . 2006 . Speak* now* or forever hold your peace: Power law chronemics of turn-taking and response in asynchronous CMC . In 56th Annual Conference of the International Communication Association , Dresden, Germany. Yoram\u00a0M Kalman, Gilad Ravid, Daphne\u00a0R Raban, and Sheizaf Rafaeli. 2006. Speak* now* or forever hold your peace: Power law chronemics of turn-taking and response in asynchronous CMC. In 56th Annual Conference of the International Communication Association, Dresden, Germany."},{"key":"e_1_3_2_2_38_1","volume-title":"The Chronemics of Asynchronous Written CMC. In Chais Conference on Instructional Technologies Research","author":"Kalman M","year":"2007","unstructured":"Yoram\u00a0 M Kalman , Gilad Ravid , and Daphne R Raban\u00a0Sheizaf Rafaeli . 2007 . Are you still waiting for an answer? The Chronemics of Asynchronous Written CMC. In Chais Conference on Instructional Technologies Research , Raanana, Israel. Yoram\u00a0M Kalman, Gilad Ravid, and Daphne R Raban\u00a0Sheizaf Rafaeli. 2007. Are you still waiting for an answer? The Chronemics of Asynchronous Written CMC. In Chais Conference on Instructional Technologies Research, Raanana, Israel."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.036"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJTHI.2020010103"},{"key":"e_1_3_2_2_41_1","volume-title":"Social psychological aspects of computer-mediated communication.American psychologist 39, 10","author":"Kiesler Sara","year":"1984","unstructured":"Sara Kiesler , Jane Siegel , and Timothy\u00a0 W McGuire . 1984. Social psychological aspects of computer-mediated communication.American psychologist 39, 10 ( 1984 ), 1123. Sara Kiesler, Jane Siegel, and Timothy\u00a0W McGuire. 1984. Social psychological aspects of computer-mediated communication.American psychologist 39, 10 (1984), 1123."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750481319868853"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3344841"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300756"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12251"},{"key":"e_1_3_2_2_46_1","first-page":"893","article-title":"How Do Frequency and Duration of Messaging Affect Impression Development in Computer Mediated","volume":"7","author":"Liu Yuliang","year":"2001","unstructured":"Yuliang Liu , Dean Ginther , and Paul Zelhart . 2001 . How Do Frequency and Duration of Messaging Affect Impression Development in Computer Mediated . Journal of Universal Computer Science 7 , 10 (2001), 893 \u2013 913 . Yuliang Liu, Dean Ginther, and Paul Zelhart. 2001. How Do Frequency and Duration of Messaging Affect Impression Development in Computer Mediated. Journal of Universal Computer Science 7, 10 (2001), 893\u2013913.","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_2_47_1","volume-title":"Mobile Instant Messaging. Tidsskrift for Medier, Erkendelse Og Formidling 5, 1","author":"Lynden James","year":"2017","unstructured":"James Lynden and Teis Rasmussen . 2017. Exploring the impact of\u2019read receipts \u2019 in Mobile Instant Messaging. Tidsskrift for Medier, Erkendelse Og Formidling 5, 1 ( 2017 ). James Lynden and Teis Rasmussen. 2017. Exploring the impact of\u2019read receipts\u2019 in Mobile Instant Messaging. Tidsskrift for Medier, Erkendelse Og Formidling 5, 1 (2017)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.074"},{"key":"e_1_3_2_2_49_1","unstructured":"Bertram Malle. 2003. Attributions as behavior explanations: Toward a new theory. (2003).  Bertram Malle. 2003. Attributions as behavior explanations: Toward a new theory. (2003)."},{"key":"e_1_3_2_2_50_1","volume-title":"Studies of turn-taking in computermediated communications. Interacting with computers 6, 2","author":"McKinlay Andy","year":"1994","unstructured":"Andy McKinlay , Rob Procter , Oliver Masting , Robin Woodburn , and John Arnott . 1994. Studies of turn-taking in computermediated communications. Interacting with computers 6, 2 ( 1994 ), 151\u2013171. Andy McKinlay, Rob Procter, Oliver Masting, Robin Woodburn, and John Arnott. 1994. Studies of turn-taking in computermediated communications. Interacting with computers 6, 2 (1994), 151\u2013171."},{"key":"e_1_3_2_2_51_1","unstructured":"Margaret\u00a0L McLaughlin. 1984. How talk is organized. Beverly Hills-London-New Delhi(1984).  Margaret\u00a0L McLaughlin. 1984. How talk is organized. Beverly Hills-London-New Delhi(1984)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420150303"},{"key":"e_1_3_2_2_53_1","volume-title":"Applying conversation analysis methods to online talk: A literature review. Discourse, context & media 12","author":"Paulus Trena","year":"2016","unstructured":"Trena Paulus , Amber Warren , and Jessica\u00a0Nina Lester . 2016. Applying conversation analysis methods to online talk: A literature review. Discourse, context & media 12 ( 2016 ), 1\u201310. Trena Paulus, Amber Warren, and Jessica\u00a0Nina Lester. 2016. Applying conversation analysis methods to online talk: A literature review. Discourse, context & media 12 (2016), 1\u201310."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556973"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23022"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750481315600309"},{"key":"e_1_3_2_2_57_1","volume-title":"2009 42nd Hawaii International Conference on System Sciences. IEEE, 1\u20139.","author":"Russell M","year":"2009","unstructured":"Daniel\u00a0 M Russell and Mike Oren . 2009 . Retrospective cued recall: a method for accurately recalling previous user behaviors . In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 1\u20139. Daniel\u00a0M Russell and Mike Oren. 2009. Retrospective cued recall: a method for accurately recalling previous user behaviors. In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 1\u20139."},{"volume-title":"Studies in the organization of conversational interaction","author":"Sacks Harvey","key":"e_1_3_2_2_58_1","unstructured":"Harvey Sacks , Emanuel\u00a0 A Schegloff , and Gail Jefferson . 1978. A simplest systematics for the organization of turn taking for conversation . In Studies in the organization of conversational interaction . Elsevier , 7\u201355. Harvey Sacks, Emanuel\u00a0A Schegloff, and Gail Jefferson. 1978. A simplest systematics for the organization of turn taking for conversation. In Studies in the organization of conversational interaction. Elsevier, 7\u201355."},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1\u201312","year":"2018","key":"e_1_3_2_2_59_1","unstructured":"In-geon Shin, Jin-min Seok, and Youn-kyung Lim. 2018 . Too close and crowded: understanding stress on mobile instant messengers based on proxemics . In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1\u201312 . In-geon Shin, Jin-min Seok, and Youn-kyung Lim. 2018. Too close and crowded: understanding stress on mobile instant messengers based on proxemics. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1\u201312."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260515590787"},{"key":"e_1_3_2_2_61_1","unstructured":"Stephanie\u00a0A Tikkanen and Andrew Frisbie. 2015. When Bad Timing Is Actually Good: Reconceptualizing Response Delays. Debates for the Digital Age: The Good the Bad and the Ugly of our Online World [2 volumes]: The Good the Bad and the Ugly of Our Online World (2015) 305.  Stephanie\u00a0A Tikkanen and Andrew Frisbie. 2015. When Bad Timing Is Actually Good: Reconceptualizing Response Delays. Debates for the Digital Age: The Good the Bad and the Ugly of our Online World [2 volumes]: The Good the Bad and the Ugly of Our Online World (2015) 305."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241889.1241902"},{"key":"e_1_3_2_2_63_1","volume-title":"Adolescents","author":"Van\u00a0Ouytsel Joris","year":"2019","unstructured":"Joris Van\u00a0Ouytsel , Michel Walrave , Koen Ponnet , An-Sofie Willems , and Melissa Van\u00a0Dam . 2019. Adolescents \u2019 perceptions of digital media\u2019s potential to elicit jealousy, conflict and monitoring behaviors within romantic relationships. CYBERPSYCHOLOGY-JOURNAL OF PSYCHOSOCIAL RESEARCH ON CYBERSPACE 13, 3( 2019 ). Joris Van\u00a0Ouytsel, Michel Walrave, Koen Ponnet, An-Sofie Willems, and Melissa Van\u00a0Dam. 2019. Adolescents\u2019 perceptions of digital media\u2019s potential to elicit jealousy, conflict and monitoring behaviors within romantic relationships. CYBERPSYCHOLOGY-JOURNAL OF PSYCHOSOCIAL RESEARCH ON CYBERSPACE 13, 3(2019)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.085"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/10919399509540258"},{"key":"e_1_3_2_2_66_1","unstructured":"Rob Woodgate. 2020. How to Turn Off Read Receipts in Microsoft Teams. https:\/\/www.howtogeek.com\/706566\/how-to-turn-off-read-receipts-in-microsoft-teams\/  Rob Woodgate. 2020. How to Turn Off Read Receipts in Microsoft Teams. https:\/\/www.howtogeek.com\/706566\/how-to-turn-off-read-receipts-in-microsoft-teams\/"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445209"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"New Orleans LA USA","acronym":"CHI '22"},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3517496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:12Z","timestamp":1750188672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":67,"alternative-id":["10.1145\/3491102.3517496","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3517496","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}