Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing 2017
DOI: 10.1145/2998181.2998189
|View full text |Cite
|
Sign up to set email alerts
|

Don't Bother Me. I'm Socializing!

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(8 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…One major factor should be taken into consideration when designing proactive speakers: 1) timing and 2) context. Proactive services, such as push notifcations, often have an interruptive element and delivering notifcations at opportune moments can minimize that interruption [14]. Compared with smartphones, smart speakers are more interruptive: voice is more intrusive as it can hardly be ignored (unlike a silent alarm or vibration in the user's pocket).…”
Section: Introductionmentioning
confidence: 99%
“…One major factor should be taken into consideration when designing proactive speakers: 1) timing and 2) context. Proactive services, such as push notifcations, often have an interruptive element and delivering notifcations at opportune moments can minimize that interruption [14]. Compared with smartphones, smart speakers are more interruptive: voice is more intrusive as it can hardly be ignored (unlike a silent alarm or vibration in the user's pocket).…”
Section: Introductionmentioning
confidence: 99%
“…We designed three distinct in-the-moment label collection rules: entry-moment, leaving-moment, and during usage. Previous studies in smartphone notification management [28,32,69] showed the effectiveness of breakpoint-based notification delivery. Inspired by these works, we align optimal notification instances with task-switching moments, corresponding to accessing (i.e., entry-moment) and leaving a monitored app (i.e., leaving-moment prompts).…”
Section: Machine Learning For Smartphone Overuse Predictionmentioning
confidence: 99%
“…Digital environments complicate the discussion of I/identity because of the creation of and connection to virtual personae and spaces. Prensky's (2001Prensky's ( , 2006 identification of digital natives and digital immigrants calls attention to the emotional chasm and power structure inherent in the difference between being reared in a digital world and entering it as an adult. As digital immigrant Norton-Meir (2005) notes, "We must realize that our students think and process information differently than we do" (p. 430), and rethinking identity and literacy education involves the discussion of student and educator practices and I/identity development in, or stemming from, digital environments.…”
Section: I/identity and Digital Environmentsmentioning
confidence: 99%