{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T22:32:29Z","timestamp":1757629949749,"version":"3.44.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"5","funder":[{"name":"Tokyo College, the University of Tokyo"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>\n            Current \u201csocial acceptability\u201d guidelines for interactive technologies advise against certain, seemingly problematic forms of interaction. Specifically, \u201csuspenseful\u201d interactions, characterized by visible manipulations and invisible effects, are generally considered problematic. However, the empirical grounding for this claim is surprisingly weak. To test its validity, this paper presents a controlled replication study (\n            <jats:italic toggle=\"yes\">n<\/jats:italic>\n            = 281) of the \u201csuspensefulness effect\u201d. Although it could be statistically replicated with two out of three social acceptability measures, effect sizes were small (\n            <jats:italic toggle=\"yes\">r<\/jats:italic>\n            \u2264.2), and all compared forms of interaction, including the suspenseful one, had high absolute social acceptability scores. Thus, despite the slight negative effect, suspenseful interactions seem less problematic in the overall scheme of things. We discuss alternative approaches to improve the social acceptability of interactive technology, and recommend to more closely engage with their specific social situatedness.\n          <\/jats:p>","DOI":"10.1145\/3743731","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T14:28:48Z","timestamp":1757428128000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How Problematic Are Suspenseful Interactions? MHCI015"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3877-5453","authenticated-orcid":false,"given":"Alarith","family":"Uhde","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering","place":["Osaka, Japan"]},{"name":"Ritsumeikan University","place":["Osaka, Japan"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"e_1_3_4_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628381"},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3281505.3281541"},{"key":"e_1_3_4_4_2","doi-asserted-by":"publisher","unstructured":"Lauren\u00a0L. Emberson Gary Lupyan Michael\u00a0H. Goldstein and Michael\u00a0J. Spivey. 2010. Overheard Cell-Phone Conversations: When Less Speech Is More Distracting. Psychological Science 21 10 (2010) 1383\u20131388. 10.1177\/0956797610382126","DOI":"10.1177\/0956797610382126"},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807449"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","unstructured":"Franz Faul Edgar Erdfelder Albert-Georg Lang and Axel Buchner. 2007. G*Power 3: A Flexible Statistical Power Analysis Program for the Social Behavioral and Biomedical Sciences. Behavior Research Methods 39 2 (2007) 175\u2013191. 10.3758\/BF03193146","DOI":"10.3758\/BF03193146"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","unstructured":"Jonathan Forma and Stan\u00a0A. Kaplowitz. 2012. The Perceived Rudeness of Public Cell Phone Behaviour. Behaviour & Information Technology 31 10 (2012) 947\u2013952. 10.1080\/0144929X.2010.520335","DOI":"10.1080\/0144929X.2010.520335"},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","unstructured":"Yosef Hochberg. 1988. A sharper Bonferroni procedure for multiple tests of significance. Biometrika 75 4 (1988) 800\u2013802. 10.1093\/biomet\/75.4.800","DOI":"10.1093\/biomet\/75.4.800"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892331"},{"key":"e_1_3_4_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/1228175.1228229"},{"key":"e_1_3_4_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376162"},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3240167.3240174"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","unstructured":"Theodore Kunin. 1955. The Construction of a New Type of Attitude Measure. Personnel Psychology 8 1 (1955) 65\u201377. 10.1111\/j.1744-6570.1955.tb01189.x","DOI":"10.1111\/j.1744-6570.1955.tb01189.x"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","unstructured":"Tiffany C.\u00a0K. Kwok Peter Kiefer and Martin Raubal. 2023. Unobtrusive Interaction: a Systematic Literature Review and Expert Survey. Human-Computer Interaction (2023) 37\u00a0pages. 10.1080\/07370024.2022.2162404","DOI":"10.1080\/07370024.2022.2162404"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311823.3311831"},{"key":"e_1_3_4_16_2","doi-asserted-by":"publisher","unstructured":"Andrew Monk Jenni Carroll Sarah Parker and Mark Blythe. 2004. Why are Mobile Phones Annoying? Behaviour & Information Technology 23 1 (2004) 33\u201341. 10.1080\/01449290310001638496","DOI":"10.1080\/01449290310001638496"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","unstructured":"Andrew Monk Evi Fellas and Eleanor Ley. 2004. Hearing Only One Side of Normal and Mobile Phone Conversations. Behaviour & Information Technology 23 5 (2004) 301\u2013305. 10.1080\/01449290410001712744","DOI":"10.1080\/01449290410001712744"},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851647"},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","unstructured":"Brendan Norman and Daniel Bennett. 2014. Are Mobile Phone Conversations Always so Annoying? The \u2018need-to-listen\u2019 Effect Re-visited. Behaviour & Information Technology 33 12 (2014) 1294\u20131305. 10.1080\/0144929X.2013.876098","DOI":"10.1080\/0144929X.2013.876098"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","unstructured":"Thomas Olsson Pradthana Jarusriboonchai Pawe\u0142 Wo\u017aniak Susanna Paasovaara Kaisa V\u00e4\u00e4n\u00e4nen and Andr\u00e9s Lucero. 2020. Technologies for Enhancing Collocated Social Interaction: Review of Design Solutions and Approaches. Computer Supported Cooperative Work (CSCW) 29 1-2 (2020) 29\u201383. 10.1007\/s10606-019-09345-0","DOI":"10.1007\/s10606-019-09345-0"},{"key":"e_1_3_4_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702247"},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858130"},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055074"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.2001.962092"},{"key":"e_1_3_4_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753458"},{"key":"e_1_3_4_26_2","volume-title":"Lectures on Conversation: Volumes I and II","author":"Sacks Harvey","year":"1992","unstructured":"Harvey Sacks. 1992. Lectures on Conversation: Volumes I and II. Blackwell, Oxford, UK."},{"key":"e_1_3_4_27_2","doi-asserted-by":"publisher","unstructured":"Alarith Uhde Lianara Dreyer and Marc Hassenzahl. 2025. The Witness Experience Inventory. Interacting With Computersiwaf010 (2025) 1\u201316. 10.1093\/iwc\/iwaf010","DOI":"10.1093\/iwc\/iwaf010"},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451649"},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3568457"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","unstructured":"Alarith Uhde Tim zum Hoff and Marc Hassenzahl. 2023. Beyond Hiding and Revealing: Exploring Effects of Visibility and Form of Interaction on the Witness Experience. Proceedings of the ACM on Human-Computer Interaction (MobileHCI) 7 200 (2023) 23. 10.1145\/3604247","DOI":"10.1145\/3604247"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/c2010-0-67044-1"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T16:05:27Z","timestamp":1757520327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3743731"],"URL":"https:\/\/doi.org\/10.1145\/3743731","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"2025-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}