{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:23:14Z","timestamp":1776093794103,"version":"3.50.1"},"reference-count":105,"publisher":"Association for Computing Machinery (ACM)","issue":"MHCI","license":[{"start":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T00:00:00Z","timestamp":1727136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["110-2222-E-A49-008-MY3"],"award-info":[{"award-number":["110-2222-E-A49-008-MY3"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,9,24]]},"abstract":"<jats:p>In this exploratory experience sampling method (ESM) research, we examined the perceptions of 74 smartphone users regarding the opportuneness of moments for proceeding through a four-stage notification-response process: the phone generating an alert (Alert), the user roughly glancing at the notification (Glance), engaging with it (Engage), and acting on it (Act). We investigated how the moments perceived as opportune for each of the four stages related to users' self-reported values of 20 contextual factors, and how these factors influenced users' perceived opportuneness of the moments for each stage. Our results reveal that Alert and Glance stages were perceived as more distinct, with Alert being influenced by social-environmental related factors and Glance characterized by a lower threshold for what constitutes an opportune moment. The final two stages - Engage and Act - were the most similar to each other. The findings also indicated how the influence of contextual factors on perceived opportuneness of the moments varied across factors, notification types, stages, and how such variation was manifested in the likelihood, valence, and magnitude of their overall influence.<\/jats:p>","DOI":"10.1145\/3676514","type":"journal-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T13:17:48Z","timestamp":1727183868000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigating User-perceived Impacts of Contextual Factors on Opportune Moments"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1326-8914","authenticated-orcid":false,"given":"Yu-Jen","family":"Lee","sequence":"first","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4919-0801","authenticated-orcid":false,"given":"Meng-Hsin","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4960-8017","authenticated-orcid":false,"given":"Chung-Chiao","family":"Chang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0934-745X","authenticated-orcid":false,"given":"Xi-Jing","family":"Chang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6956-3459","authenticated-orcid":false,"given":"Yung-Ju","family":"Chang","sequence":"additional","affiliation":[{"name":"National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,9,24]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985727"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/opo.12131"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180954"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124881"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.12.009"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.885940"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628380"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.130"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381000"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411810"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581146"},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340125"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.11.001"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785852"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517529"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580689"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702146"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445477"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517616"},{"key":"e_1_2_2_20_1","volume-title":"Unresponded-to Read-receipt Practices and Explanations of Them. In CHI Conference on Human Factors in Computing Systems. 1--15","author":"Chou Yu-Ling","year":"2022","unstructured":"Yu-Ling Chou, Yi-Hsiu Lin, Tzu-Yi Lin, Hsin Ying You, and Yung-Ju Chang. 2022. Why Did You\/I Read but Not Reply? IM Users? Unresponded-to Read-receipt Practices and Explanations of Them. In CHI Conference on Human Factors in Computing Systems. 1--15."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-013-0279-x"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785840"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785840"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282917"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-010--9578--7"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490099.3511133"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--90740--6_5"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3344842"},{"key":"e_1_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Tseng Fang-Ching Chiou Zih-Yun Chuang Ho-Hsuan Su Li-Ting Lin Yong-Han Lin Yu-Rou Lee Yi-Chi Wang Peng-Jui Chen Uei-Dar and Chang Yung-Ju. 2023. Multiple Device Users? Actual and Ideal Cross-Device Usage for Multi-Stage Notifcation-Interactions: An ESM Study Addressing the Usage Gap and Impacts of Device Context. (2023).","DOI":"10.1145\/3544548.3580731"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037402"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851620"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211960.3211974"},{"key":"e_1_2_2_33_1","volume-title":"Quick Question: Interrupting Users for Microtasks with Reinforcement Learning. arXiv:2007.09515 [cs] (July","author":"Ho Bo-Jhang","year":"2020","unstructured":"Bo-Jhang Ho, Bharathan Balaji, Mehmet Koseoglu, Sandeep Sandha, Siyou Pei, and Mani Srivastava. 2020. Quick Question: Interrupting Users for Microtasks with Reinforcement Learning. arXiv:2007.09515 [cs] (July 2020). http:\/\/arxiv.org\/abs\/2007.09515 arXiv: 2007.09515."},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055100"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376228"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642657"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124882"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357070"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879831.1879833"},{"key":"e_1_2_2_40_1","unstructured":"E. Isaacs N. Yee D. Schiano Nathaniel Good Nicolas Ducheneaut and V. Bellotti. 2010. - 1- Mobile Microwaiting Moments : The Role of Context in Receptivity to Content While on the Go. https:\/\/www.semanticscholar.org\/paper\/1-Mobile-Microwaiting-Moments-%3A-The-Role-of-Context-Isaacs-Yee\/cafaaa823351104bddb3f95071241866b3993dbe"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1103572"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/1754073908100432"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2004.3"},{"key":"e_1_2_2_44_1","volume-title":"NotifyMiner: rule based user behavioral machine learning approach for context wise personalized notification services. Journal of Ambient Intelligence and Humanized Computing","author":"Khan Muhammad Faizan","year":"2022","unstructured":"Muhammad Faizan Khan, Lu Lu, Muhammad Toseef, Ahmed Musyafa, and Ahmad Amin. 2022. NotifyMiner: rule based user behavioral machine learning approach for context wise personalized notification services. Journal of Ambient Intelligence and Humanized Computing (2022), 1--17."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjhp.12000"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03062-9_1"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098569"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858359"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.56"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300756"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3344387"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2022.102983"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.1876764"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445384"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445384"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1037\/pspp0000289"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675221"},{"key":"e_1_2_2_58_1","volume-title":"Coordinating the Interruption of People in Human-Computer Interaction. undefined","author":"McFarlane D.","year":"1999","unstructured":"D. McFarlane. 1999. Coordinating the Interruption of People in Human-Computer Interaction. undefined (1999). https:\/\/www.semanticscholar.org\/paper\/Coordinating-the-Interruption-of-People-in-McFarlane\/a4b595558f76fc5449d762a49e6a651af121b9d1"},{"key":"e_1_2_2_59_1","first-page":"295","article-title":"Coordinating the interruption of people in human-computer interaction","volume":"99","author":"McFarlane Daniel C","year":"1999","unstructured":"Daniel C McFarlane. 1999. Coordinating the interruption of people in human-computer interaction.. In Interact, Vol. 99. 295.","journal-title":"Interact"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971747"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807544"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131901"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858566"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130948"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517249"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2015.7146515"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.07.005"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330732"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998189"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702165"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632062"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2794336"},{"key":"e_1_2_2_73_1","volume-title":"What's wrong with Bonferroni adjustments. Bmj 316, 7139","author":"Perneger Thomas V","year":"1998","unstructured":"Thomas V Perneger. 1998. What's wrong with Bonferroni adjustments. Bmj 316, 7139 (1998), 1236--1238."},{"key":"e_1_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130956"},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628364"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556973"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804252"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229445"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2014.15"},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--21726--5_11"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557189"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2017.8273623"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636082"},{"key":"e_1_2_2_84_1","volume-title":"L\u00e1szl\u00f3 Zsolt Garamszegi, and Yimen G Araya-Ajoy","author":"Schielzeth Holger","year":"2020","unstructured":"Holger Schielzeth, Niels J Dingemanse, Shinichi Nakagawa, David F Westneat, Hassen Allegue, C\u00e9line Teplitsky, Denis R\u00e9ale, Ned A Dochtermann, L\u00e1szl\u00f3 Zsolt Garamszegi, and Yimen G Araya-Ajoy. 2020. Robustness of linear mixed-effects models to violations of distributional assumptions. Methods in ecology and evolution 11, 9 (2020), 1141--1152."},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581320"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935334.2935347"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2794338"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377999.1378003"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415162"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071--5819(03)00023--5"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--24195--1_6"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.01.011"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123988"},{"key":"e_1_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300281"},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.12.002"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858348"},{"key":"e_1_2_2_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.03.001"},{"key":"e_1_2_2_98_1","doi-asserted-by":"crossref","unstructured":"Peter Vorderer Doroth\u00e9e Hefner Leonard Reinecke and Christoph Klimmt (Eds.). 2018. Permanently online permanently connected: living and communicating in a POPC world. Routledge Taylor & Francis Group New York; London.","DOI":"10.4324\/9781315276472"},{"key":"e_1_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365610.3365611"},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892383"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445209"},{"key":"e_1_2_2_102_1","doi-asserted-by":"crossref","unstructured":"Chang XiJing Hsu Fang-Hsin Liang En-Chi Chiou Zih-Yun Chuang Ho-Hsuan Tseng Fang-Ching Lin Yu-Hsin and Chang Yung-Ju. 2023. Not Merely Deemed as Distraction: Investigating Smartphone Users? Motivations for Notification-Interaction. (2023).","DOI":"10.1145\/3544548.3581146"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196730"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581167"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025946"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:15:40Z","timestamp":1755882940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,24]]},"references-count":105,"journal-issue":{"issue":"MHCI","published-print":{"date-parts":[[2024,9,24]]}},"alternative-id":["10.1145\/3676514"],"URL":"https:\/\/doi.org\/10.1145\/3676514","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,24]]},"assertion":[{"value":"2024-09-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}