{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T06:01:46Z","timestamp":1740808906815,"version":"3.38.0"},"reference-count":115,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Information Visualization"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p> Incidental visualizations are meant to be perceived at-a-glance, on-the-go, and during short exposure times, but are not seen on demand. Instead, they appear in people\u2019s fields of view during an ongoing primary task. They differ from glanceable visualizations because the information is not received on demand, and they differ from ambient visualizations because the information is not continuously embedded in the environment. However, current graphical perception guidelines do not consider situations where information is presented at specific moments during brief exposure times without being the user\u2019s primary focus. Therefore, we conducted a crowdsourced user study with 99 participants to understand how accurate people\u2019s incidental graphical perception is. Each participant was tested on one of the three conditions: position of dots, length of lines, and angle of lines. We varied the number of elements for each combination and the display time. During the study, participants were asked to perform reproduction tasks, where they had to recreate a previously shown stimulus in each. Our results indicate that incidental graphical perception can be accurate when using position, length, and angles. Furthermore, we argue that incidental visualizations should be designed for low exposure times (between 300 and 1000\u2009ms). <\/jats:p>","DOI":"10.1177\/14738716231189218","type":"journal-article","created":{"date-parts":[[2023,8,12]],"date-time":"2023-08-12T04:13:13Z","timestamp":1691813593000},"page":"3-20","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Incidental graphical perception: How marks and display time influence accuracy"],"prefix":"10.1177","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5461-5217","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Moreira","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e8cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Daniel","family":"Mendes","sequence":"additional","affiliation":[{"name":"INESC TEC, Faculdade de Engenharia, Universidade do Porto, Porto, Portugal"}]},{"given":"Daniel","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e8cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"179","published-online":{"date-parts":[[2023,8,11]]},"reference":[{"volume-title":"Evaluating the potential of glanceable ar interfaces for authentic everyday uses","author":"Lu F","key":"bibr1-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1109\/VR50410.2021.00104"},{"key":"bibr2-14738716231189218","unstructured":"Weiser MD. Designing calm technology."},{"first-page":"325","volume-title":"Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques","author":"Skog T.","key":"bibr3-14738716231189218"},{"first-page":"133","volume-title":"IVAPP 2021 -12th International Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications","author":"Blascheck T","key":"bibr4-14738716231189218"},{"key":"bibr5-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399841"},{"volume-title":"Exploring the design space of glanceable feedback for physical activity trackers","author":"Gouveia R","key":"bibr6-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2971648.2971754"},{"key":"bibr7-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-031219-041252"},{"key":"bibr8-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1984.10478080"},{"key":"bibr9-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.127"},{"volume-title":"You have 5 seconds","author":"Gouveia R","key":"bibr10-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2800835.2809437"},{"volume-title":"How do we engage with activity trackers?","author":"Gouveia R","key":"bibr11-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2750858.2804290"},{"key":"bibr12-14738716231189218","unstructured":"Gouveia R, Karapanos E, Hassenzahl M. Activity tracking in vivo. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI \u201918, pp. 1\u201313. New York: Association for Computing Machinery."},{"key":"bibr13-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1126\/science.229.4716.828"},{"key":"bibr14-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80019-0"},{"key":"bibr15-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1987.10478448"},{"key":"bibr16-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1002\/acp.2350050106"},{"key":"bibr17-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1177\/0049124189018002002"},{"volume-title":"Crowdsourcing graphical perception","author":"Heer J","key":"bibr18-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/1753326.1753357"},{"key":"bibr19-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.124"},{"key":"bibr20-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13409"},{"key":"bibr21-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2829750"},{"key":"bibr22-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.251"},{"key":"bibr23-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.4.738.56809"},{"key":"bibr24-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.160"},{"volume-title":"Perception of elementary graphical elements in tabletop and multi-surface environments","author":"Wigdor D","key":"bibr25-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/1240624.1240701"},{"key":"bibr26-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864884"},{"key":"bibr27-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9040219"},{"key":"bibr28-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3029413"},{"key":"bibr29-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2466971"},{"key":"bibr30-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744199"},{"key":"bibr31-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2680452"},{"key":"bibr32-14738716231189218","unstructured":"Neshati A, Sakamoto Y, Leboe-McGowan L, et al. G-sparks: Glanceable sparklines on smartwatches. In: Proceedings of Graphics Interface, 2019, Kingston."},{"volume-title":"Flowers or a robot army?","author":"Consolvo S","key":"bibr33-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/1409635.1409644"},{"journal-title":"UC Berkeley","year":"2015","author":"Matthews T","key":"bibr34-14738716231189218"},{"volume-title":"Designing and evaluating glanceable peripheral displays","author":"Matthews T.","key":"bibr35-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/1142405.1142457"},{"key":"bibr36-14738716231189218","unstructured":"Matthews T, Blais D, Shick A, et al. Evaluating glanceable visuals for multitasking."},{"volume-title":"Smartwatch in vivo","author":"Pizza S","key":"bibr37-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2858036.2858522"},{"key":"bibr38-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70541"},{"key":"bibr39-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-014-0775-2"},{"key":"bibr40-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865142"},{"volume-title":"Fitaware","author":"Esakia A","key":"bibr41-14738716231189218"},{"key":"bibr42-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2018.01.010"},{"key":"bibr43-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2743939"},{"key":"bibr44-14738716231189218","volume":"150507079","author":"Rodrigues-Jr J","year":"2015","journal-title":"arXiv preprint arXiv"},{"key":"bibr45-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.104.2.163"},{"key":"bibr46-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(80)90312-6"},{"key":"bibr47-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2014.00680"},{"key":"bibr48-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/s13414-020-01973-9"},{"key":"bibr49-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90004-3"},{"key":"bibr50-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/BF03210799"},{"key":"bibr51-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"key":"bibr52-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1177\/0963721409359277"},{"key":"bibr53-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1038\/srep34025"},{"key":"bibr54-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1068\/p180457"},{"key":"bibr55-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/13506280500195250"},{"key":"bibr56-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.15.3.419"},{"key":"bibr57-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/34.730558"},{"key":"bibr58-14738716231189218","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0073"},{"key":"bibr59-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.146"},{"key":"bibr60-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/S0734-189X(85)80004-9"},{"key":"bibr61-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/s13414-011-0199-2"},{"key":"bibr62-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(80)90005-5"},{"key":"bibr63-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1038\/35058500"},{"key":"bibr64-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/135062800394667"},{"key":"bibr65-14738716231189218","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.3327"},{"key":"bibr66-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.0569-04.2004"},{"key":"bibr67-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.113.4.501"},{"key":"bibr68-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.123.2.161"},{"key":"bibr69-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/00335558008248231"},{"volume-title":"The aesthetic awareness display","author":"Shelton B","key":"bibr70-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2843043.2843371"},{"key":"bibr71-14738716231189218","doi-asserted-by":"crossref","unstructured":"M, Covert attention increases contrast sensitivity: psychophysical, neurophysiological and neuroimaging studies. In: Martinez-Conde S, Macknik SL, Martinez LM, et al. (eds), Visual Perception -fundamentals of vision: low and Mid-Level processes in perception. Amsterdam: Elsevier, 2006, pp.33\u201370.","DOI":"10.1016\/S0079-6123(06)54003-8"},{"key":"bibr72-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2011.04.012"},{"key":"bibr73-14738716231189218","volume-title":"Spatial Covert attention","volume":"1","author":"Carrasco M.","year":"2014"},{"key":"bibr74-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/0042-6989(89)90144-2"},{"key":"bibr75-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-vision-082114-035431"},{"key":"bibr76-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1101\/sqb.2014.79.024687"},{"key":"bibr77-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.concog.2018.02.005"},{"key":"bibr78-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2018.10.004"},{"key":"bibr79-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2007.01.018"},{"key":"bibr80-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2014.03.002"},{"key":"bibr81-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.cub.2004.09.041"},{"key":"bibr82-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1167\/13.3.16"},{"key":"bibr83-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.109.2.160"},{"key":"bibr84-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1111\/nyas.13320"},{"key":"bibr85-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(00)00019-5"},{"key":"bibr86-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.14.2.188"},{"key":"bibr87-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.33.6.1335"},{"key":"bibr88-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/s13414-020-02115-x"},{"key":"bibr89-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1167\/10.6.20"},{"key":"bibr90-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/s13414-019-01831-3"},{"key":"bibr91-14738716231189218","first-page":"265","volume-title":"Communications in Computer and Information Science","author":"Bandlow A","year":"2011"},{"key":"bibr92-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.01793"},{"key":"bibr93-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1037\/bul0000144"},{"key":"bibr94-14738716231189218","doi-asserted-by":"publisher","DOI":"10.2307\/1418556"},{"key":"bibr95-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1038\/003281a0"},{"key":"bibr96-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/13506280801937939"},{"key":"bibr97-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1080\/13506280701825861"},{"key":"bibr98-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2007.08.004"},{"key":"bibr99-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0003269"},{"key":"bibr100-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1163\/187847511X570097"},{"key":"bibr101-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-68111-1"},{"key":"bibr102-14738716231189218","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-021-02015-7"},{"key":"bibr103-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2006.01746.x"},{"key":"bibr104-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1177\/0956797613501520"},{"key":"bibr105-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1177\/0301006615602599"},{"key":"bibr106-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66435-4_5"},{"key":"bibr107-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0057410"},{"key":"bibr108-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13444"},{"key":"bibr109-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(00)01520-5"},{"key":"bibr110-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.1983.0055"},{"volume-title":"Understanding malicious behavior in crowdsourcing platforms","author":"Gadiraju U","key":"bibr111-14738716231189218","doi-asserted-by":"crossref","DOI":"10.1145\/2702123.2702443"},{"key":"bibr112-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.actpsy.2008.04.003"},{"key":"bibr113-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-7687.2012.01190.x"},{"key":"bibr114-14738716231189218","doi-asserted-by":"publisher","DOI":"10.1016\/j.actpsy.2016.06.013"},{"key":"bibr115-14738716231189218","unstructured":"Briggs G, Bridewell W, Bello PF. A computational model of the role of attention in subitizing and enumeration."}],"container-title":["Information Visualization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716231189218","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14738716231189218","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14738716231189218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T23:29:00Z","timestamp":1740785340000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14738716231189218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,11]]},"references-count":115,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1177\/14738716231189218"],"URL":"https:\/\/doi.org\/10.1177\/14738716231189218","relation":{},"ISSN":["1473-8716","1473-8724"],"issn-type":[{"type":"print","value":"1473-8716"},{"type":"electronic","value":"1473-8724"}],"subject":[],"published":{"date-parts":[[2023,8,11]]}}}