{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T17:23:03Z","timestamp":1778779383993,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":101,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581163","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:26:08Z","timestamp":1681964768000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["\u201cWe Need a Big Revolution in Email Advertising\u201d: Users\u2019 Perception of Persuasion in Permission-based Advertising Emails"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3701-3123","authenticated-orcid":false,"given":"Anastasia","family":"Sergeeva","sequence":"first","affiliation":[{"name":"Human Computer Interaction Research Group, University of Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2152-5562","authenticated-orcid":false,"given":"Bj\u00f6rn","family":"Rohles","sequence":"additional","affiliation":[{"name":"Human Computer Interaction Research Group, University of Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4461-0551","authenticated-orcid":false,"given":"Verena","family":"Distler","sequence":"additional","affiliation":[{"name":"Human Computer Interaction Research Group, University of Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9940-6286","authenticated-orcid":false,"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Research Group, University of Luxembourg, Luxembourg"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Email Advertising: A Promotional Favorite. https:\/\/www.benchmarkemail.com\/blog\/email-advertising-a-promotional-favorite\/. Accessed: 2022-14-05.","author":"Mehmood Adeel","year":"2020","unstructured":"Adeel Mehmood. 2020. Email Advertising: A Promotional Favorite. https:\/\/www.benchmarkemail.com\/blog\/email-advertising-a-promotional-favorite\/. Accessed: 2022-14-05."},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2014.09.005"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"crossref","first-page":"244","DOI":"10.69554\/NLBA1863","article-title":"The anatomy of an effective e-mail subject line: How to stand out in a crowded inbox","volume":"8","author":"Aiossa Ewelina","year":"2020","unstructured":"Ewelina Aiossa. 2020. The anatomy of an effective e-mail subject line: How to stand out in a crowded inbox. Journal of Digital & Social Media Marketing 8, 3 (2020), 244\u2013250.","journal-title":"Journal of Digital & Social Media Marketing"},{"key":"e_1_3_3_3_4_1","volume-title":"Introduction to quantitative data analysis in the behavioral and social sciences","author":"Albers J","unstructured":"Michael\u00a0J Albers. 2017. Introduction to quantitative data analysis in the behavioral and social sciences. John Wiley & Sons, New Jersey."},{"key":"e_1_3_3_3_5_1","unstructured":"Allen Olivia. 2022. 20 Tips to Write Catchy Email Subject Lines [+ Examples]. https:\/\/blog.hubspot.com\/marketing\/improve-your-email-subject-line. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.03.014"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11301-020-00180-y"},{"key":"e_1_3_3_3_8_1","volume-title":"Consumer choice and autonomy in the age of artificial intelligence and big data. Customer needs and solutions 5, 1","author":"Andr\u00e9 Quentin","year":"2018","unstructured":"Quentin Andr\u00e9, Ziv Carmon, Klaus Wertenbroch, Alia Crum, Douglas Frank, William Goldstein, Joel Huber, Leaf Van\u00a0Boven, Bernd Weber, and Haiyang Yang. 2018. Consumer choice and autonomy in the age of artificial intelligence and big data. Customer needs and solutions 5, 1 (2018), 28\u201337."},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004277"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/13527266.2018.1562485"},{"key":"e_1_3_3_3_11_1","volume-title":"Linkage between Persuasion principles and Advertising. New media and mass communication 8","author":"Bolatito Ojenike","year":"2012","unstructured":"Ojenike Bolatito. 2012. Linkage between Persuasion principles and Advertising. New media and mass communication 8 (2012), 7\u201311."},{"key":"e_1_3_3_3_12_1","unstructured":"Brady Christine. 2012. How to Create Subject Lines that Captivate Motivate and Compel a Click [Part 2]. https:\/\/www.business2community.com\/online-marketing\/how-to-create-subject-lines-that-captivate-motivate-and-compel-a-click-part-2-0279632. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_13_1","volume-title":"Psychological reactance: A theory of freedom and control","author":"Brehm S","unstructured":"Sharon\u00a0S Brehm and Jack\u00a0W Brehm. 1981. Psychological reactance: A theory of freedom and control. Academic Press, San Diego, Texas."},{"key":"e_1_3_3_3_14_1","volume-title":"Which Subject Lines and Messages Improve Response to E-mail Invitations to Web Surveys?Field Methods 32, 4","author":"Brenner S","year":"2020","unstructured":"Philip\u00a0S Brenner, Carol Cosenza, and Floyd\u00a0J Fowler\u00a0Jr. 2020. Which Subject Lines and Messages Improve Response to E-mail Invitations to Web Surveys?Field Methods 32, 4 (2020), 365\u2013382."},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2018.1491350"},{"key":"e_1_3_3_3_16_1","volume-title":"Proceedings of the 26th Australasian Conference of Information Systems. ACIS","author":"Butavicius Marcus","year":"2015","unstructured":"Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. 2015. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. In Proceedings of the 26th Australasian Conference of Information Systems. ACIS, Dallas, Texas, 1\u201310."},{"key":"e_1_3_3_3_17_1","unstructured":"Campaign Monitor. 2022. Using Emoji and Symbols in Your Email Subject Lines. https:\/\/www.campaignmonitor.com\/resources\/guides\/using-emojis-and-symbols-in-email-marketing\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662241311331754"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11846-022-00517-9"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2013.811707"},{"key":"e_1_3_3_3_21_1","volume-title":"Persuasion: Psychological insights and perspectives, Melanie\u00a0C Green and Timothy\u00a0C Brock (Eds.)","author":"Cialdini B","unstructured":"Robert\u00a0B Cialdini and Brad\u00a0J Sagarin. 2005. Principles of Interpersonal Influence. In Persuasion: Psychological insights and perspectives, Melanie\u00a0C Green and Timothy\u00a0C Brock (Eds.). Sage Publications, Inc., California, 143\u2013\u2013169."},{"key":"e_1_3_3_3_22_1","volume-title":"25 Creative Email Subject Lines To Boost Open Rates For","year":"2022","unstructured":"Coomar, Debolina. 2022. 25 Creative Email Subject Lines To Boost Open Rates For 2022. https:\/\/www.mailmunch.com\/blog\/email-subject-lines. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053339"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2015.12.001"},{"key":"e_1_3_3_3_25_1","first-page":"138","article-title":"Going too far? How consumers respond to personalized advertising from different sources","volume":"23","author":"De\u00a0Keyzer Freya","year":"2022","unstructured":"Freya De\u00a0Keyzer, Guda van Noort, and Sanne Kruikemeier. 2022. Going too far? How consumers respond to personalized advertising from different sources. Journal of Electronic Commerce Research 23, 3 (2022), 138\u2013159.","journal-title":"Journal of Electronic Commerce Research"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439319839924"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376165"},{"key":"e_1_3_3_3_28_1","unstructured":"Dholakiya Pratik. 2022. How to Write the Perfect Email Subject Line. https:\/\/www.convinceandconvert.com\/digital-marketing\/email-subject-line. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835811"},{"key":"e_1_3_3_3_30_1","unstructured":"Dimond Chase. 2022. 15 subject line rules to make your emails impossible to ignore. https:\/\/www.linkedin.com\/pulse\/15-subject-line-rules-make-your-emails-impossible-ignore-chase-dimond\/?trk=portfolio_article-card_title. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.01.005"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0006"},{"key":"e_1_3_3_3_33_1","volume-title":"16th International Conferences on Research in Advertising. ICORIA, Ghent, 1\u20137.","author":"Fenko Anna","year":"2017","unstructured":"Anna Fenko, Teun Keizer, and A Pruyn. 2017. Do social proof and scarcity work in the online context?. In 16th International Conferences on Research in Advertising. ICORIA, Ghent, 1\u20137."},{"key":"e_1_3_3_3_34_1","volume-title":"164 Best Email Subject Lines to Boost Your Email Open Rates","year":"2022","unstructured":"Fernandez, Mary. 2021. 164 Best Email Subject Lines to Boost Your Email Open Rates (2022). https:\/\/optinmonster.com\/101-email-subject-lines-your-subscribers-cant-resist\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.12.004"},{"key":"e_1_3_3_3_37_1","volume-title":"The critical incident technique.Psychological bulletin 51, 4","author":"Flanagan C","year":"1954","unstructured":"John\u00a0C Flanagan. 1954. The critical incident technique.Psychological bulletin 51, 4 (1954), 327."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/764008.763957"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1086\/209380"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159698"},{"key":"e_1_3_3_3_41_1","first-page":"1","article-title":"A multi-level defense against social engineering","volume":"13","author":"Gragg David","year":"2003","unstructured":"David Gragg. 2003. A multi-level defense against social engineering. SANS Reading Room 13(2003), 1\u201321.","journal-title":"SANS Reading Room"},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557013"},{"key":"e_1_3_3_3_44_1","unstructured":"Griffin Julie. 2022. Email Subject Lines: Best Practices Tips and Examples. https:\/\/sendgrid.com\/blog\/29-best-email-subject-lines\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_45_1","volume-title":"The structure and interpretation of imperatives: mood and force in Universal Grammar","unstructured":"Chung-hye Han. 2000. The structure and interpretation of imperatives: mood and force in Universal Grammar. Psychology Press, London."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77006-0_37"},{"key":"e_1_3_3_3_47_1","unstructured":"Harry Brignull. 2011. Deceptive design patterns. https:\/\/www.deceptive.design\/. Accessed: 2022-21-05."},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRIM-06-2015-0040"},{"key":"e_1_3_3_3_49_1","volume-title":"The UX book: Agile UX design for a quality user experience. Morgan Kaufmann","author":"Hartson Rex","unstructured":"Rex Hartson and Pardha Pyla. 2018. The UX book: Agile UX design for a quality user experience. Morgan Kaufmann, Burlington, Massachusetts."},{"key":"e_1_3_3_3_50_1","volume-title":"Clustering methods with qualitative data: a mixed-methods approach for prevention research with small samples. Prevention science 16, 7","author":"Henry David","year":"2015","unstructured":"David Henry, Allison\u00a0B Dymnicki, Nathaniel Mohatt, James Allen, and James\u00a0G Kelly. 2015. Clustering methods with qualitative data: a mixed-methods approach for prevention research with small samples. Prevention science 16, 7 (2015), 1007\u20131016."},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-02-2020-0072"},{"key":"e_1_3_3_3_52_1","unstructured":"IBM. 2022. SPSS Statistics 28 Documentation. https:\/\/www.ibm.com\/support\/pages\/ibm-spss-statistics-28-documentation. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_53_1","first-page":"139","article-title":"Social media strategies for organizations using influencers\u2019 power","volume":"11","author":"Ioanid Alexandra","year":"2015","unstructured":"Alexandra Ioanid, Gheorghe Militaru, and Petruta Mihai. 2015. Social media strategies for organizations using influencers\u2019 power. European Scientific Journal 11, 10 (2015), 139\u2013143.","journal-title":"European Scientific Journal"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590344"},{"key":"e_1_3_3_3_55_1","unstructured":"Islam Sabirah. 2021. 13 Best Email Subject Line Tips to Increase Your Open Rates & Engagements. https:\/\/getwemail.io\/email-marketing\/email-subject-line-tips-to-increase-open-rates. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_56_1","volume-title":"Clickbait in Social Media: Detection and Analysis of the Bait. In 2021 55th Annual Conference on Information Sciences and Systems (CISS). IEEE","author":"Jain Mini","year":"2021","unstructured":"Mini Jain, Peya Mowar, Ruchika Goel, and Dinesh\u00a0K Vishwakarma. 2021. Clickbait in Social Media: Detection and Analysis of the Bait. In 2021 55th Annual Conference on Information Sciences and Systems (CISS). IEEE, New York, United States, 1\u20136."},{"key":"e_1_3_3_3_57_1","first-page":"130","article-title":"An empirical study of email-based advertisement and its influence on consumers\u2019 attitude","volume":"2","author":"Jamalzadeh Morteza","year":"2012","unstructured":"Morteza Jamalzadeh, Navid Behravan, and Roozbeh Masoudi. 2012. An empirical study of email-based advertisement and its influence on consumers\u2019 attitude. International Review of Management and Marketing 2, 3 (2012), 130\u2013138.","journal-title":"International Review of Management and Marketing"},{"key":"e_1_3_3_3_58_1","volume-title":"The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern. Computers in human behavior 70","author":"Jung Reum","year":"2017","unstructured":"A-Reum Jung. 2017. The influence of perceived ad relevance on social media advertising: An empirical examination of a mediating role of privacy concern. Computers in human behavior 70 (2017), 303\u2013309."},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979299"},{"key":"e_1_3_3_3_60_1","unstructured":"Keohane Jenny. 2021. 20 Cold Email Subject Lines Proven to Get Over 85 Open Rates. https:\/\/www.yesware.com\/blog\/cold-email-subject-lines. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASA54658.2022.9765017"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_3_3_63_1","volume-title":"Analyzing qualitative data with MAXQDA","author":"Kuckartz Udo","unstructured":"Udo Kuckartz and Stefan R\u00e4diker. 2019. Analyzing qualitative data with MAXQDA. Springer, Cham, Switzerland."},{"key":"e_1_3_3_3_64_1","first-page":"237","article-title":"Dark Patterns: Light to be found in Europe\u2019s Consumer Protection Regime","volume":"10","author":"Leiser MR","year":"2021","unstructured":"MR Leiser and M Caruana. 2021. Dark Patterns: Light to be found in Europe\u2019s Consumer Protection Regime. Journal of European Consumer and Market Law 10, 6 (2021), 237\u2013251.","journal-title":"Journal of European Consumer and Market Law"},{"key":"e_1_3_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRIM-09-2018-0112"},{"key":"e_1_3_3_3_66_1","unstructured":"Mailchimp. 2020. Best Practices for Email Subject Lines. https:\/\/mailchimp.com\/help\/best-practices-for-email-subject-lines\/. Accessed: 2022-14-05."},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207758"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367400404"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTER.2016.7829899"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2006.10722121"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68504-3_15"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_3_73_1","first-page":"365","article-title":"I Am Sorry to Send You SPAM","volume":"31","author":"Park Hee\u00a0Sun","year":"2005","unstructured":"Hee\u00a0Sun Park, Hye Lee\u00a0Eun, and Jeong\u00a0An Song. 2005. \u201cI Am Sorry to Send You SPAM\u201d Cross-Cultural Differences in Use of Apologies in Email Advertising in Korea and the US. Human Communication Research 31, 3 (2005), 365\u2013398.","journal-title":"Human Communication Research"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117974"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2007.11.010"},{"key":"e_1_3_3_3_76_1","volume-title":"The elaboration likelihood model. Handbook of theories of social psychology 1","author":"Petty E","year":"2011","unstructured":"Richard\u00a0E Petty and Pablo Bri\u00f1ol. 2011. The elaboration likelihood model. Handbook of theories of social psychology 1 (2011), 224\u2013245."},{"key":"e_1_3_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2017.1282480"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2017.1066"},{"key":"e_1_3_3_3_79_1","unstructured":"Salazar Kim. 2020. Emojis in Email Subject Lines: Advantage or Impediment?https:\/\/www.nngroup.com\/articles\/emojis-email\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67687-6_29"},{"key":"e_1_3_3_3_81_1","volume-title":"RE: Misleading Subject Lines. https:\/\/www.litmus.com\/blog\/misleading-subject-lines\/. Accessed: 2022-05-06.","year":"2019","unstructured":"Specht, Bettina. 2019. RE: Misleading Subject Lines. https:\/\/www.litmus.com\/blog\/misleading-subject-lines\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1897852.1897872"},{"key":"e_1_3_3_3_83_1","unstructured":"Statista. 2021. Market and consumer data provider. https:\/\/www.statista.com\/. Accessed: 2021-09-04."},{"key":"e_1_3_3_3_84_1","unstructured":"Statista. 2021. Number of e-mails per day worldwide 2017-2025. https:\/\/www.statista.com\/statistics\/456500\/daily-number-of-e-mails-worldwide\/. Accessed: 2022-19-05."},{"key":"e_1_3_3_3_85_1","volume-title":"Advances in Advertising Research X, Enrique igne and Sara Rosengren (Eds.)","author":"Strycharz Joanna","unstructured":"Joanna Strycharz, Guda van Noort, Edith Smit, and Natali Helberger. 2019. Consumer view on personalized advertising: Overview of self-reported benefits and concerns. In Advances in Advertising Research X, Enrique igne and Sara Rosengren (Eds.). Springer, Wiesbaden, Germany, 53\u201366."},{"key":"e_1_3_3_3_86_1","volume-title":"European Conference on Information Retrieval. Springer, Cham, Swizerland, 232\u2013243","author":"Tam Tony","year":"2012","unstructured":"Tony Tam, Artur Ferreira, and Andr\u00e9 Louren\u00e7o. 2012. Automatic foldering of email messages: a combination approach. In European Conference on Information Retrieval. Springer, Cham, Swizerland, 232\u2013243."},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"crossref","unstructured":"Team EtchRock. 2020. 7 tips for writing an email subject line that begs to be opened. https:\/\/etchrock.com\/resources\/7-tips-writing-email-subject-line-begs-opened\/. Accessed: 2022-14-05.","DOI":"10.1002\/npcr.31962"},{"key":"e_1_3_3_3_88_1","unstructured":"Codrin Teiu. 2020. Email subject lines analysis for high open rate in email marketing. In New Trends in Sustainable Business and Consumption. ASE Bucharest 835\u2013840."},{"key":"e_1_3_3_3_89_1","unstructured":"tekGinie. 2022. Email Advertising And Marketing Campaigns \u2013 9 Types. https:\/\/tekginie.com\/email-advertising-and-marketing-campaigns-9-types\/. Accessed: 2022-25-05."},{"key":"e_1_3_3_3_90_1","unstructured":"The MailBakery Blog. 2017. 23 Tips on Writing Email Subject Line Masterpiece. https:\/\/mailbakery.com\/blog\/23-tips-on-writing-email-subject-line-masterpiece\/. Accessed: 2022-05-06."},{"key":"e_1_3_3_3_91_1","unstructured":"Thomas Hajdukowicz. 2022. Reducing email\u2019s carbon footprint. https:\/\/www.mailjet.com\/blog\/email-best-practices\/email-carbon-footprint\/. Accessed: 2022-06-16."},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"crossref","unstructured":"Catherine\u00a0E Tucker. 2012. The economics of advertising and privacy. International journal of Industrial organization 30 3(2012) 326\u2013329.","DOI":"10.1016\/j.ijindorg.2011.11.004"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_3_3_94_1","first-page":"747","article-title":"Phishing email detection using persuasion cues","volume":"19","author":"Valecha Rohit","year":"2021","unstructured":"Rohit Valecha, Pranali Mandaokar, and H\u00a0Raghav Rao. 2021. Phishing email detection using persuasion cues. IEEE Transactions on Dependable and Secure Computing 19, 2 (2021), 747\u2013756.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_3_3_95_1","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems. Association for Computing Machinery","author":"Wainer Jaclyn","year":"2011","unstructured":"Jaclyn Wainer, Laura Dabbish, and Robert Kraut. 2011. Should I open this email? Inbox-level cues, curiosity and attention to email. In Proceedings of the SIGCHI conference on human factors in computing systems. Association for Computing Machinery, New York, United States, 3439\u20133448."},{"key":"e_1_3_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.4172\/2161-0487.1000197"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-007-9027-9"},{"key":"e_1_3_3_3_98_1","volume-title":"Hierarchical cluster analysis: comparison of three linkage measures and application to psychological data. The quantitative methods for psychology 11, 1","author":"Yim Odilia","year":"2015","unstructured":"Odilia Yim and Kylee\u00a0T Ramdeen. 2015. Hierarchical cluster analysis: comparison of three linkage measures and application to psychological data. The quantitative methods for psychology 11, 1 (2015), 8\u201321."},{"key":"e_1_3_3_3_99_1","volume-title":"Understanding ad avoidance on Facebook: Antecedents and outcomes of psychological reactance. Computers in human behavior 98","author":"Youn Seounmi","year":"2019","unstructured":"Seounmi Youn and Seunghyun Kim. 2019. Understanding ad avoidance on Facebook: Antecedents and outcomes of psychological reactance. Computers in human behavior 98 (2019), 232\u2013244."},{"key":"e_1_3_3_3_100_1","volume-title":"International journal of consumer studies 33, 4","author":"Yu Jay","year":"2009","unstructured":"Jay Yu and Brenda Cude. 2009. \u2018Hello, Mrs. Sarah Jones! We recommend this product!\u2019Consumers\u2019 perceptions about personalized advertising: comparisons across advertisements delivered via three different types of media. International journal of consumer studies 33, 4 (2009), 503\u2013514."},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445459"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:46Z","timestamp":1750178806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":101,"alternative-id":["10.1145\/3544548.3581163","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581163","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}