{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:23:18Z","timestamp":1776093798598,"version":"3.50.1"},"reference-count":65,"publisher":"Association for Computing Machinery (ACM)","issue":"MHCI","license":[{"start":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T00:00:00Z","timestamp":1727136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council, R.O.C","doi-asserted-by":"crossref","award":["110-2222-E-A49 -008 -MY3"],"award-info":[{"award-number":["110-2222-E-A49 -008 -MY3"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,9,24]]},"abstract":"<jats:p>Research indicates that smartphone users often speculate about notifications upon sensing their arrival, aiding their decision to attend to them. This speculation, however, relies on the presence of sufficient clues to associate with the notification, which are not always available. To address this challenge, through an experience sampling study, we investigated the effectiveness of delivering user-assigned alerts in influencing users' speculation accuracy, attendance effectiveness, and perceived disturbance. Our findings suggest that while user-assigned alerts enhanced the accuracy of speculation and improved participants' decisions to attend to notifications, the increased notification awareness sometimes led participants to view their decision to ignore notifications as less favorable. Moreover, we found that sporadic alert delivery disrupted the association between the alert and the notification, leading to no reduction in perceived disturbance nor improvement in speculation accuracy. In assigning alerts to notifications, participants considered five strategies: familiarity, distinctiveness, disturbance, emotional resonance, and dimension representation.<\/jats:p>","DOI":"10.1145\/3676512","type":"journal-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T13:17:48Z","timestamp":1727183868000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["\"I Want Lower Tone for Work-Related Notifications\": Exploring the Effectiveness of User-Assigned Notification Alerts in Improving User Speculation of and Attendance to Mobile Notifications"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2921-050X","authenticated-orcid":false,"given":"Tang-Jie","family":"Chang","sequence":"first","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7476-8173","authenticated-orcid":false,"given":"Li-Ting","family":"Su","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1611-3440","authenticated-orcid":false,"given":"Yong-Han","family":"Lin","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0218-5876","authenticated-orcid":false,"given":"Jie","family":"Tsai","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5385-010X","authenticated-orcid":false,"given":"Zi-Xun","family":"Tang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6956-3459","authenticated-orcid":false,"given":"Yung-Ju","family":"Chang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,9,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-141"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229468"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188688"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178477.1178499"},{"key":"e_1_2_1_5_1","unstructured":"Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169179"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581146"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340125"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123024.3124557"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785852"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517529"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445477"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979405"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785840"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2009.07.001"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851620"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211960.3211974"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2793706"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130917"},{"key":"e_1_2_1_20_1","volume-title":"Responsive web design. Version of 6","author":"Harb Eva","year":"2011","unstructured":"Eva Harb, Paul Kapellari, Steven Luong, and Norbert Spot. 2011. Responsive web design. Version of 6 (2011)."},{"key":"e_1_2_1_21_1","volume-title":"Hindsight: Biased judgments of past events after the outcomes are known. Psychological bulletin 107, 3","author":"Hawkins Scott A","year":"1990","unstructured":"Scott A Hawkins and Reid Hastie. 1990. Hindsight: Biased judgments of past events after the outcomes are known. Psychological bulletin 107, 3 (1990), 311."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240732"},{"key":"e_1_2_1_23_1","unstructured":"Kari Kallinen. 2003. Emotional Responses to Single-Voice Melodies: Implications for Mobile Ringtones.. In INTERACT."},{"key":"e_1_2_1_24_1","unstructured":"Krippendorff Klaus. 1980. Content analysis: An introduction to its methodology."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101332"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030-03062--9_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130934"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858359"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v082.i13"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300756"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2022.102983"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445384"},{"key":"e_1_2_1_33_1","volume-title":"Hyper-Coordination via Mobile Phones in Norway","author":"Ling Richard","unstructured":"Richard Ling and Birgitte Yttri. 2002. Hyper-Coordination via Mobile Phones in Norway. Cambridge University Press, USA, 139--169."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22668-2_19"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357072"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2638759"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971747"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807544"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858566"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130948"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344959"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2017.7917856"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998189"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998189"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632062"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628364"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556973"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732704"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098526"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229445"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2014.15"},{"key":"e_1_2_1_52_1","volume-title":"Using Decision-Theoretic Experience Sampling to Build Personalized Mobile Phone Interruption Models","author":"Rosenthal Stephanie","unstructured":"Stephanie Rosenthal, Anind K. Dey, and Manuela Veloso. 2011. Using Decision-Theoretic Experience Sampling to Build Personalized Mobile Phone Interruption Models. In Pervasive Computing, Kent Lyons, Jeffrey Hightower, and Elaine M. Huang (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 170--187."},{"key":"e_1_2_1_53_1","volume-title":"IOS Auto Layout Demystified","author":"Sadun E.","unstructured":"E. Sadun. 2013. IOS Auto Layout Demystified. Addison-Wesley."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557189"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636082"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581320"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935334.2935347"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2794338"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909824.3020239"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580731"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--24195--1_6"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.03.001"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365610.3365611"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025946"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766933"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:15:34Z","timestamp":1755882934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,24]]},"references-count":65,"journal-issue":{"issue":"MHCI","published-print":{"date-parts":[[2024,9,24]]}},"alternative-id":["10.1145\/3676512"],"URL":"https:\/\/doi.org\/10.1145\/3676512","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,24]]},"assertion":[{"value":"2024-09-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}