Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Technology Supported Behavior Restriction for Mitigating Self-Interruptions in Multi-device Environments

Published: 11 September 2017 Publication History

Abstract

The interruptions people experience may be initiated from digital devices but also from oneself, an action which is termed “self-interruption.” Prior work mostly focused on understanding work-related self-interruptions and designing tools for mitigating them in work contexts. However, self-interruption to off-tasks (e.g., viewing social networking sites, and playing mobile games) has received little attention in the HCI community thus far. We conducted a formative study about self-interruptions to off-tasks and coping strategies in multi-device working environments. Off-task usage was considered a serious roadblock to productivity, and yet, the habitual usage and negative triggers made it challenging to manage off-task usage. To mitigate these concerns, we developed “PomodoLock,” a self-interruption management tool that allows users voluntarily to set a timer for a fixed period, during which it selectively blocks interruption sources across multiple devices. To understand the effect of restricting access to self-interruptive sources such as applications and websites, we conducted a three-week field trial (n=40) where participants were asked to identify disrupting apps and sites to be blocked, but the multi-device blocking feature was only provided to the experimental group. Our study results showed the perceived coercion and the stress of the experimental group were lower despite its behavioral restriction with multi-device blocking. Qualitative study results from interviews and surveys confirm that multi-device blocking significantly reduced participants’ mental effort for managing self-interruptions, thereby leading to a reduction in the overall stress level. The findings suggest that when the coerciveness of behavioral restriction is appropriately controlled, coercive design can positively assist users in achieving their goals.

References

[1]
2016. ManicTime. Website. (2016). http://www.manictime.com.
[2]
2016. RescueTime. Website. (2016). http://www.rescuetime.com.
[3]
2016. SLife. Website. (2016). http://www.slife.com.
[4]
Rachel F Adler and Raquel Benbunan-Fich. 2013. Self-interruptions in discretionary multitasking. Computers in Human Behavior 29, 4 (2013), 1441--1449.
[5]
Elena Agapie, Daniel Avrahami, and Jennifer Marlow. 2016. Staying the Course: System-Driven Lapse Management for Supporting Behavior Change. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 1072--1083.
[6]
Murugan Anandarajan and Claire A Simmers. 2004. Developing Human Capital Through Personal Web Use in the Workplace: Mapping Employee Perceptions by. In Communications of the ACM, Computers and Operations Research, Decision Sciences, Information and Management, Journal of Management Information Systems, Journal of International Business Studies, and Omega-International Journal of Management Science among. Citeseer.
[7]
Roy F Baumeister, Kathleen D Vohs, and Dianne M Tice. 2007. The strength model of self-control. Current directions in psychological science 16, 6 (2007), 351--355.
[8]
Eric PS Baumer, Phil Adams, Vera D Khovanskaya, Tony C Liao, Madeline E Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re) lapsing: an exploration of Facebook non-use practices and experiences. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 3257--3266.
[9]
Raquel Benbunan-Fich and Gregory E Truman. 2009. Technical opinion Multitasking with laptops during meetings. Commun. ACM 52, 2 (2009), 139--141.
[10]
Steve Benford, Chris Greenhalgh, Gabriella Giannachi, Brendan Walker, Joe Marshall, and Tom Rodden. 2013. Uncomfortable user experience. Commun. ACM 56, 9 (2013), 66--73.
[11]
Anita L Blanchard and Christine A Henle. 2008. Correlates of different forms of cyberloafing: The role of norms and external locus of control. Computers in Human Behavior 24, 3 (2008), 1067--1084.
[12]
Matthias Böhmer, Christian Lander, Sven Gehring, Duncan P Brumby, and Antonio Krüger. 2014. Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3045--3054.
[13]
Francesco Cirillo. 2014. The pomodoro technique. Simon and Schuster.
[14]
Jacob Cohen. 1992. A power primer. Psychological bulletin 112, 1 (1992), 155.
[15]
Mary Czerwinski, Eric Horvitz, and Susan Wilhite. 2004. A diary study of task switching and interruptions. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 175--182.
[16]
Parisa Eslambolchilar, Max Wilson, Ian Oakley, and Anind Dey. 2011. PINC: persuasion, influence, nudge 8 coercion through mobile devices. In CHI’11 Extended Abstracts on Human Factors in Computing Systems. ACM, 13--16.
[17]
Brian J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002, December (2002), 5.
[18]
Jeremy Glassman, Marilyn Prosch, and Benjamin BM Shao. 2015. To monitor or not to monitor: Effectiveness of a cyberloafing countermeasure. Information 8 Management 52, 2 (2015), 170--182.
[19]
Victor M González and Gloria Mark. 2004. Constant, constant, multi-tasking craziness: managing multiple working spheres. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 113--120.
[20]
Christine A Henle and Uma Kedharnath. 2012. Cyberloafing in the Workplace. In Encyclopedia of Cyber Behavior. IGI Global, 560--573.
[21]
Alexis Hiniker, Sungsoo Ray Hong, Tadayoshi Kohno, and Julie A Kientz. 2016. MyTime: Designing and Evaluating an Intervention for Smartphone Non-Use. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4746--4757.
[22]
Joyce Ho and Stephen S Intille. 2005. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 909--918.
[23]
Jing Jin and Laura A Dabbish. 2009. Self-interruption on the computer: a typology of discretionary task interleaving. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1799--1808.
[24]
Tero Jokela, Jarno Ojala, and Thomas Olsson. 2015. A diary study on combining multiple information devices in everyday activities and tasks. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 3903--3912.
[25]
Amy Karlson, Brian Meyers, Andy Jacobs, Paul Johns, and Shaun Kane. 2009. Working overtime: Patterns of smartphone and PC usage in the day of an information worker. Pervasive computing (2009), 398--405.
[26]
Inyeop Kim, Gyuwon Jung, Hayoung Jung, Minsam Ko, and Uichin Lee. 2017. Let’s FOCUS: Mitigating Mobile Phone Use in College Classrooms. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (2017).
[27]
Young-Ho Kim, Jae Ho Jeon, Eun Kyoung Choe, Bongshin Lee, KwonHyun Kim, and Jinwook Seo. 2016. TimeAware: Leveraging framing effects to enhance personal productivity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 272--283.
[28]
Minsam Ko, Seungwoo Choi, Subin Yang, Joonwon Lee, and Uichin Lee. 2015. FamiLync: facilitating participatory parental mediation of adolescents’ smartphone use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 867--878.
[29]
Minsam Ko, Seungwoo Choi, Koji Yatani, and Uichin Lee. 2016. Lock n’LoL: group-based limiting assistance app to mitigate smartphone distractions in group activities. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 998--1010.
[30]
Minsam Ko, Subin Yang, Joonwon Lee, Christian Heizmann, Jinyoung Jeong, Uichin Lee, Daehee Shin, Koji Yatani, Junehwa Song, and Kyong-Mee Chung. 2015. NUGU: a group-based intervention app for improving self-regulation of limiting smartphone use. In Proceedings of the 18th ACM conference on computer supported cooperative work 8 social computing. ACM, 1235--1245.
[31]
Kostadin Kushlev and Elizabeth W Dunn. 2015. Checking email less frequently reduces stress. Computers in Human Behavior 43 (2015), 220--228.
[32]
Uichin Lee, Joonwon Lee, Minsam Ko, Changhun Lee, Yuhwan Kim, Subin Yang, Koji Yatani, Gahgene Gweon, Kyong-Mee Chung, and Junehwa Song. 2014. Hooked on smartphones: an exploratory study on smartphone overuse among college students. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2327--2336.
[33]
Vivien KG Lim. 2002. The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior 23, 5 (2002), 675--694.
[34]
Vivien KG Lim and Don JQ Chen. 2012. Cyberloafing at the workplace: gain or drain on work? Behaviour 8 Information Technology 31, 4 (2012), 343--353.
[35]
Markus Löchtefeld, Matthias Böhmer, and Lyubomir Ganev. 2013. AppDetox: helping users with mobile app addiction. In Proceedings of the 12th international conference on mobile and ubiquitous multimedia. ACM, 43.
[36]
Hugo Lopez-Tovar, Andreas Charalambous, and John Dowell. 2015. Managing smartphone interruptions through adaptive modes and modulation of notifications. In Proceedings of the 20th International Conference on Intelligent User Interfaces. ACM, 296--299.
[37]
Danielle Lottridge, Eli Marschner, Ellen Wang, Maria Romanovsky, and Clifford Nass. 2012. Browser design impacts multitasking. In Proceedings of the human factors and Ergonomics Society Annual Meeting, Vol. 56. SAGE Publications Sage CA: Los Angeles, CA, 1957--1961.
[38]
Gloria Mark, Victor M Gonzalez, and Justin Harris. 2005. No task left behind?: examining the nature of fragmented work. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 321--330.
[39]
Gloria Mark, Shamsi T Iqbal, Mary Czerwinski, and Paul Johns. 2014. Bored mondays and focused afternoons: the rhythm of attention and online activity in the workplace. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 3025--3034.
[40]
Gloria Mark, Stephen Voida, and Armand Cardello. 2012. A pace not dictated by electrons: an empirical study of work without email. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 555--564.
[41]
Nathaniel Ostashewski and Doug Reid. 2015. A history and frameworks of digital badges in education. In Gamification in education and business. Springer, 187--200.
[42]
Antti Oulasvirta, Tye Rattenbury, Lingyi Ma, and Eeva Raita. 2012. Habits make smartphone use more pervasive. Personal and Ubiquitous Computing 16, 1 (2012), 105--114.
[43]
Viktoria Pammer and Marina Bratic. 2013. Surprise, surprise: activity log based time analytics for time management. In CHI’13 Extended Abstracts on Human Factors in Computing Systems. ACM, 211--216.
[44]
Adam Pash and Gina Trapani. 2011. Lifehacker: The Guide to Working Smarter, Faster, and Better. John Wiley 8 Sons.
[45]
Stephen J Payne, Geoffrey B Duggan, and Hansjorg Neth. 2007. Discretionary task interleaving: Heuristics for time allocation in cognitive foraging. JOURNAL OF EXPERIMENTAL PSYCHOLOGY GENERAL 136, 3 (2007), 370.
[46]
Martin Pielot and Luz Rello. 2015. The do not disturb challenge: a day without notifications. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 1761--1766.
[47]
Jun Rekimoto and Hitomi Tsujita. 2014. Inconvenient interactions: an alternative interaction design approach to enrich our daily activities. In Proceedings of the 2014 International Working Conference on Advanced Visual Interfaces. ACM, 225--228.
[48]
John Rooksby, Parvin Asadzadeh, Mattias Rost, Alistair Morrison, and Matthew Chalmers. 2016. Personal tracking of screen time on digital devices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 284--296.
[49]
Manya Sleeper, Alessandro Acquisti, Lorrie Faith Cranor, Patrick Gage Kelley, Sean A Munson, and Norman Sadeh. 2015. I Would Like To …, I Shouldn’t …, I Wish I …: Exploring Behavior-Change Goals for Social Networking Sites. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work 8 Social Computing. ACM, 1058--1069.
[50]
Jeremiah Smith and Naranker Dulay. 2014. Ringlearn: Long-term mitigation of disruptive smartphone interruptions. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on. IEEE, 27--35.
[51]
Dominik Weber, Alexandra Voit, Philipp Kratzer, and Niels Henze. 2016. In-situ investigation of notifications in multi-device environments. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1259--1264.

Cited By

View all
  • (2024)“I finally felt I had the tools to control these urges”: Empowering Students to Achieve Their Device Use Goals With the Reduce Digital Distraction WorkshopProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642946(1-23)Online publication date: 11-May-2024
  • (2024)InteractOut: Leveraging Interaction Proxies as Input Manipulation Strategies for Reducing Smartphone OveruseProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642317(1-19)Online publication date: 11-May-2024
  • (2024)Time-Turner: A Bichronous Learning Environment to Support Positive In-class Multitasking of Online LearnersProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641985(1-15)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 1, Issue 3
September 2017
2023 pages
EISSN:2474-9567
DOI:10.1145/3139486
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 September 2017
Accepted: 01 July 2017
Received: 01 May 2017
Published in IMWUT Volume 1, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Behavior restriction
  2. Interruption management
  3. Self-interruption
  4. Technological coercion

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Ministry of Science and ICT

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)172
  • Downloads (Last 6 weeks)20
Reflects downloads up to 10 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)“I finally felt I had the tools to control these urges”: Empowering Students to Achieve Their Device Use Goals With the Reduce Digital Distraction WorkshopProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642946(1-23)Online publication date: 11-May-2024
  • (2024)InteractOut: Leveraging Interaction Proxies as Input Manipulation Strategies for Reducing Smartphone OveruseProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642317(1-19)Online publication date: 11-May-2024
  • (2024)Time-Turner: A Bichronous Learning Environment to Support Positive In-class Multitasking of Online LearnersProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641985(1-15)Online publication date: 11-May-2024
  • (2024)Use of digital self-control tools in higher education – a survey studyEducation and Information Technologies10.1007/s10639-023-12198-229:8(9645-9666)Online publication date: 1-Jun-2024
  • (2024)Maladaptive Smartphone UsageMaladaptive Consumer Behavior10.1007/978-3-031-60199-6_5(103-127)Online publication date: 30-Jul-2024
  • (2023)FinerMe: Examining App-level and Feature-level Interventions to Regulate Mobile Social Media UseProceedings of the ACM on Human-Computer Interaction10.1145/36100657:CSCW2(1-30)Online publication date: 4-Oct-2023
  • (2023)Implicit Smartphone Use Interventions to Promote Life-Technology Balance: An App-Market Survey, Design Space and the Case of Life-RelaunchedProceedings of Mensch und Computer 202310.1145/3603555.3603578(237-249)Online publication date: 3-Sep-2023
  • (2023)Achieving Digital Wellbeing Through Digital Self-control Tools: A Systematic Review and Meta-analysisACM Transactions on Computer-Human Interaction10.1145/357181030:4(1-66)Online publication date: 12-Sep-2023
  • (2023)Challenges and Opportunities of Using Redirection of Activity for Self-Regulation OnlineProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581342(1-19)Online publication date: 19-Apr-2023
  • (2023)Digital Strategies for Screen Time Reduction: A Randomized Field ExperimentCyberpsychology, Behavior, and Social Networking10.1089/cyber.2022.002726:1(42-49)Online publication date: 1-Jan-2023
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media