SlideShare una empresa de Scribd logo
1 de 22
23rd SEPTEMBER 2014
MobileHCI 2014 Doctoral Consortium
Marta E. Cecchinato
Email Management &
Work-Home Boundaries
marta.cecchinato.13@ucl.ac.uk
@martacecchinato
Image source: http://www.amcharts.com/visited_countries/
Structure of today’s talk:
1. Research question and motivation
2. Quick overview of my research
a. Approach motivated by literature
b. 3-year plan
3. Initial findings and contributions
Are you aware of how many times you’ve checked
your emails today and where were you??
Are you satisfied with your email practices?
But first... my take home message:
Image sourceL http://ind.pn/1tRntS0
Real world problem
Email Overload:
“Users’ perception that
their own email use has
gotten out of control”
Research motivation
Dabbish and Kraut (2006, p.431)
Research motivation
Overall Research Question:
Can technology make it easier for people to manage
their email, so as to reduce email overload?
Image source: http://bit.ly/1mpRvNj
Literature review summary
• Different email management techniques that
may lead to email overload
• Different suggested solutions, but no
agreement on their efficacy (other than “check
less!”)
Differences:
• Individual preferences (filing, workflow approaches,
use of notifications, reasons for deferring replies,…)
• Context-specific (e.g. work demands)
Reflection: why and how?
Stage-based
Behaviour Change
Theories
Personal
Informatics
Model
Reflection
1. Pre-
contemplation
2. Contemplation
3. Preparation
4. Action
5. Maintenance
1. Preparation
2. Collection
3. Reflection
4. Action
1. Description
2. Reflective
description
3. Dialogic
reflection
4. Transformative
reflection
5. Critical
reflection
Prochaska, J. O., & Velicer, W. F. (1997). The
transtheoretical model of health behavior change.
American journal of health promotion, 12(1), 38-48.
Chicago
Li, I., Dey, A., & Forlizzi, J. (2010, April). A stage-
based model of personal informatics systems. In
Proceedings of the SIGCHI Conference on
Human Factors in Computing Systems (pp. 557-
566). ACM.
Fleck, R., & Fitzpatrick, G. (2010, November). Reflecting on
reflection: framing a design landscape. In Proceedings of
the 22nd Conference of the Computer-Human Interaction
Special Interest Group of Australia on Computer-Human
Interaction (pp. 216-223). ACM.
Digital epiphany
1. Tracking
2. Reflecting
3. Epiphany:
- Change
- Acceptance
“Having an insight about one of their digital behaviours, […]
The realization about this personal habit is the result of
using a digital PI tool”
.
(Cox, Bird, & Fleck, 2013, p.2)
GOAL 1 –
understand
users
GOAL 2 – explore
existing tools
GOAL 3 –
designing and
evaluating a
tailored tool
1st Year
2nd Year
3rd year
Image source: http://bit.ly/1ntCMxI
Research Questions:
1. How do people use email in their personal and
work domains across devices?
2. Do they have different strategies depending on
device used and/or domain?
Methods:
Study 1 - The interview study
Study 2 - The email game study
GOAL 1:
Understanding email behavioural differences and the impact of
email on work-home boundaries
Image source: http://bit.ly/1rpkWPR
Research Questions:
1. What tools currently exist that aim to
help people deal with their email?
2. Are they effective in helping people
change their email behaviour?
Methods:
Study 3 - Tool review
Study 4 - Performance and longitudinal
study
GOAL 2:
Understanding email tools and their
efficacy
• Designing and evaluating
a personalisable and
customizable tool
• that accommodates email
individual and contextual
differences and
• can help reflect on
habits so that a
satisfactory work-home
balance can be achieved.
Goal 3:
Designing a better email tool
Study 1
Exploratory study to
understand how
people use emails
across social domains
and across devices?
Interviews + Work-Life
Indicator survey
16 participants (5
males, 9 academic
staff, 7 professional
services staff)
MOBILE HCI 2014 WORKSHOP
SOCIO-TECHNICAL PRACTICES AND
WORK-HOME BOUNDARIES
Study 1 – Initial findings
Permeable boundaries
(academics)
• Work/personal email on
same mobile app
• Symmetrical
interruptions work-home
Rigid Boundaries
(prof. services)
• Asymmetrical
interruptions work-home
• Control micro-role
transitions with micro-
boundaries
1
2
3
4
5
Academics (N=9) Prof. Serv. (N=6)
Means
NonWork Interrupting Work Work Interrupting NonWork Boundary Control
Family Identity Work Identity
“I would never ever check
my [work] email outside of
work, purposely. It's not the
kind of job that I think about
when I’m not here. I'm not
allowed to work from home"
– P13, Female, PS.
Rigid
boundary
management
Permeable
boundary
management
“The first check is probably right after I
woke up, I will check everything that has
come in the night [on phone]. […] I will
probably have another look once I'm
outside the house, so during my commute
time I will check once again. And once I'm
in my office, I don't have any specific rule,
it's really case by case. […] Once I’m home
[…] I have a second work shift after [my
son] goes to bed until quite late in the
night”
– P15, Male, A.
“I get up, check my email in bed, check my
email on the toilet, check my email
downstairs, maybe whilst I'm having breakfast,
walk to work, generally don't check my email
while I'm actually walking, when I'm waiting for
the train, on the train, maybe in the lift getting
up to work. Maybe then at work, then on the
train on the way home, in front of the TV,
during dinner, yeah, that's about everything I
think.”
– P5, Male, A.
Boundary challenges: overload and
availability
Micro-boundary email practices:
“A strategy to limit the effects of micro-role transition caused by cross-
domain technology mediated interruptions.”
Through accounts:
- one per role
- Creating dedicated folders from one domain in another domain
account with automatic filtering
Through devices:
- personal only on smartphone, work only on desktop computer.
- Deliberately removing work email from phone during time off, e.g. on
holiday;
Through software:
- different apps on smartphone for personal and work email
Boundary Management
1. Professional context has a large impact on email practices: when, where
and how people manage emails and the impact these have on work-
home boundaries.
1. We see a growing trend in the use of micro-boundary strategies to
separate work and personal emails
1. People with more permeable boundary management styles might find it
useful to create micro-boundaries within devices to help them cope with
micro-role transitions between work and personal domains, and to limit
work-home interference.
Contributions
[WP1] Cecchinato, M., Cox, A. L., & Bird, J. (2014). “I check my emails on the toilet”: Email Practices and
Work-Home Boundary Management. MobileHCI Workshop Socio-Technical Practices and Work-
Home Boundaries.
[WP2] Cecchinato, M.E., Bird, J. & Cox, A.L. (2014). “Personalised email tools: a solution to email
overload? CHI’14 Workshop Personalised Behaviour Change Technologies
@martacecchinato
marta.cecchinato.13@ucl.ac.uk

Más contenido relacionado

La actualidad más candente

Boma posters
Boma postersBoma posters
Boma postersmabodx
 
Cyber Psychology - Dr Jens Binder
Cyber Psychology - Dr Jens BinderCyber Psychology - Dr Jens Binder
Cyber Psychology - Dr Jens BinderReading Room
 
Behavior in organizations final project
Behavior in organizations final projectBehavior in organizations final project
Behavior in organizations final projectAaron Bowman
 
Blurring Home And Work Boundaries
Blurring Home And Work BoundariesBlurring Home And Work Boundaries
Blurring Home And Work BoundariesTracy Kennedy
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaborationalhooti11
 
"I just scroll through my stuff until I find it or give up": A Contextual Inq...
"I just scroll through my stuff until I find it or give up": A Contextual Inq..."I just scroll through my stuff until I find it or give up": A Contextual Inq...
"I just scroll through my stuff until I find it or give up": A Contextual Inq...Toine Bogers
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociatymuhammad-Sulaiman
 

La actualidad más candente (8)

Boma posters
Boma postersBoma posters
Boma posters
 
Cyber Psychology - Dr Jens Binder
Cyber Psychology - Dr Jens BinderCyber Psychology - Dr Jens Binder
Cyber Psychology - Dr Jens Binder
 
Behavior in organizations final project
Behavior in organizations final projectBehavior in organizations final project
Behavior in organizations final project
 
Blurring Home And Work Boundaries
Blurring Home And Work BoundariesBlurring Home And Work Boundaries
Blurring Home And Work Boundaries
 
Cyber interaction and collaboration
Cyber interaction and collaborationCyber interaction and collaboration
Cyber interaction and collaboration
 
"I just scroll through my stuff until I find it or give up": A Contextual Inq...
"I just scroll through my stuff until I find it or give up": A Contextual Inq..."I just scroll through my stuff until I find it or give up": A Contextual Inq...
"I just scroll through my stuff until I find it or give up": A Contextual Inq...
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
Social Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our SociatySocial Media And Impact Of Computer On Our Sociaty
Social Media And Impact Of Computer On Our Sociaty
 

Destacado

Working 9-5? Professional Differences in Email and Boundary Management Practices
Working 9-5? Professional Differences in Email and Boundary Management PracticesWorking 9-5? Professional Differences in Email and Boundary Management Practices
Working 9-5? Professional Differences in Email and Boundary Management PracticesMarta Elizabeth Cecchinato
 
Finding Email in a Multi-Account, Multi-Device World
Finding Email in a Multi-Account, Multi-Device WorldFinding Email in a Multi-Account, Multi-Device World
Finding Email in a Multi-Account, Multi-Device WorldMarta Elizabeth Cecchinato
 
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...Marta Elizabeth Cecchinato
 
Eva Pascoe - We are all in it together: Digital futures
Eva Pascoe - We are all in it together: Digital futuresEva Pascoe - We are all in it together: Digital futures
Eva Pascoe - We are all in it together: Digital futuresHumanise The Web
 
Robert Hudson - Apps, Sex, Intimacy and Infidelity
Robert Hudson - Apps, Sex, Intimacy and InfidelityRobert Hudson - Apps, Sex, Intimacy and Infidelity
Robert Hudson - Apps, Sex, Intimacy and InfidelityHumanise The Web
 
Dr Carsten Sørensen - Quantified Self
Dr Carsten Sørensen - Quantified SelfDr Carsten Sørensen - Quantified Self
Dr Carsten Sørensen - Quantified SelfHumanise The Web
 
Martin Daubney - Porn on the brain
Martin Daubney - Porn on the brainMartin Daubney - Porn on the brain
Martin Daubney - Porn on the brainHumanise The Web
 
Nathalie Nahai - Why Humanise The Web? (Opening Talk)
Nathalie Nahai - Why Humanise The Web? (Opening Talk)Nathalie Nahai - Why Humanise The Web? (Opening Talk)
Nathalie Nahai - Why Humanise The Web? (Opening Talk)Humanise The Web
 
Chris Baraniuk - Designed to deceive
Chris Baraniuk - Designed to deceiveChris Baraniuk - Designed to deceive
Chris Baraniuk - Designed to deceiveHumanise The Web
 
Nathalie Nahai - Humanise The Web (Closing Talk)
Nathalie Nahai - Humanise The Web (Closing Talk)Nathalie Nahai - Humanise The Web (Closing Talk)
Nathalie Nahai - Humanise The Web (Closing Talk)Humanise The Web
 
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...Humanise The Web
 

Destacado (12)

Working 9-5? Professional Differences in Email and Boundary Management Practices
Working 9-5? Professional Differences in Email and Boundary Management PracticesWorking 9-5? Professional Differences in Email and Boundary Management Practices
Working 9-5? Professional Differences in Email and Boundary Management Practices
 
Finding Email in a Multi-Account, Multi-Device World
Finding Email in a Multi-Account, Multi-Device WorldFinding Email in a Multi-Account, Multi-Device World
Finding Email in a Multi-Account, Multi-Device World
 
CHI2014 workshop
CHI2014 workshopCHI2014 workshop
CHI2014 workshop
 
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...
Digital Epiphanies project presentation @ Balance Network retreat in Birmingh...
 
Eva Pascoe - We are all in it together: Digital futures
Eva Pascoe - We are all in it together: Digital futuresEva Pascoe - We are all in it together: Digital futures
Eva Pascoe - We are all in it together: Digital futures
 
Robert Hudson - Apps, Sex, Intimacy and Infidelity
Robert Hudson - Apps, Sex, Intimacy and InfidelityRobert Hudson - Apps, Sex, Intimacy and Infidelity
Robert Hudson - Apps, Sex, Intimacy and Infidelity
 
Dr Carsten Sørensen - Quantified Self
Dr Carsten Sørensen - Quantified SelfDr Carsten Sørensen - Quantified Self
Dr Carsten Sørensen - Quantified Self
 
Martin Daubney - Porn on the brain
Martin Daubney - Porn on the brainMartin Daubney - Porn on the brain
Martin Daubney - Porn on the brain
 
Nathalie Nahai - Why Humanise The Web? (Opening Talk)
Nathalie Nahai - Why Humanise The Web? (Opening Talk)Nathalie Nahai - Why Humanise The Web? (Opening Talk)
Nathalie Nahai - Why Humanise The Web? (Opening Talk)
 
Chris Baraniuk - Designed to deceive
Chris Baraniuk - Designed to deceiveChris Baraniuk - Designed to deceive
Chris Baraniuk - Designed to deceive
 
Nathalie Nahai - Humanise The Web (Closing Talk)
Nathalie Nahai - Humanise The Web (Closing Talk)Nathalie Nahai - Humanise The Web (Closing Talk)
Nathalie Nahai - Humanise The Web (Closing Talk)
 
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...
Dr Lawrence Ampofo - Digital mindfulness: Creating meaningful digital experie...
 

Similar a MobileHCI 2014 Doctoral Consortium

Digital Epiphanies Meeting, January 2014, Birmingham
Digital Epiphanies Meeting, January 2014, BirminghamDigital Epiphanies Meeting, January 2014, Birmingham
Digital Epiphanies Meeting, January 2014, Birminghamemilyimcollins
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory DesignMichael Muller
 
Smart Campus: Some Pilots
Smart Campus: Some PilotsSmart Campus: Some Pilots
Smart Campus: Some PilotsJames Clay
 
adrianorenzi_duxu2014
adrianorenzi_duxu2014adrianorenzi_duxu2014
adrianorenzi_duxu2014Adriano Renzi
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL Um e Farwa
 
Advanced Methods for User Evaluation in Enterprise AR
Advanced Methods for User Evaluation in Enterprise ARAdvanced Methods for User Evaluation in Enterprise AR
Advanced Methods for User Evaluation in Enterprise ARMark Billinghurst
 
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...Nottingham Trent University
 
Mobile UX for Academic Libraries
Mobile UX for Academic LibrariesMobile UX for Academic Libraries
Mobile UX for Academic LibrariesKevin Rundblad
 
Research on Negative Effect on E-Learning
Research on Negative Effect on E-LearningResearch on Negative Effect on E-Learning
Research on Negative Effect on E-Learningijmnct
 
Master's thesis Minni Kanerva
Master's thesis Minni KanervaMaster's thesis Minni Kanerva
Master's thesis Minni KanervaMinni Kanerva
 
Human Being Character Analysis from Their Social Networking Profiles
Human Being Character Analysis from Their Social Networking ProfilesHuman Being Character Analysis from Their Social Networking Profiles
Human Being Character Analysis from Their Social Networking ProfilesBiswaranjan Samal
 
Towards the Design of Intelligible Object-based Applications for the Web of T...
Towards the Design of Intelligible Object-based Applications for the Web of T...Towards the Design of Intelligible Object-based Applications for the Web of T...
Towards the Design of Intelligible Object-based Applications for the Web of T...Pierrick Thébault
 
Designing and deploying mobile user studies in the wild: a practical guide
Designing and deploying mobile user studies in the wild: a practical guideDesigning and deploying mobile user studies in the wild: a practical guide
Designing and deploying mobile user studies in the wild: a practical guideKaren Church
 
An investigation into the physical build and psychological aspects of an inte...
An investigation into the physical build and psychological aspects of an inte...An investigation into the physical build and psychological aspects of an inte...
An investigation into the physical build and psychological aspects of an inte...Jessica Navarro
 
Supporting relationships with awareness systems
Supporting relationships with awareness systemsSupporting relationships with awareness systems
Supporting relationships with awareness systemsOnno Romijn
 
E Learning In Modern Education System .
E Learning In Modern Education System .E Learning In Modern Education System .
E Learning In Modern Education System .Assignment Studio
 
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools Nathalie Reid
 
Field of Study and Research Methods for an Effect of Cognitive and Informatio...
Field of Study and Research Methods for an Effect of Cognitive and Informatio...Field of Study and Research Methods for an Effect of Cognitive and Informatio...
Field of Study and Research Methods for an Effect of Cognitive and Informatio...Yury Solonitsyn
 
Musstanser Avanzament 4 (Final No Animation)
Musstanser   Avanzament 4 (Final   No Animation)Musstanser   Avanzament 4 (Final   No Animation)
Musstanser Avanzament 4 (Final No Animation)Musstanser Tinauli
 

Similar a MobileHCI 2014 Doctoral Consortium (20)

Digital Epiphanies Meeting, January 2014, Birmingham
Digital Epiphanies Meeting, January 2014, BirminghamDigital Epiphanies Meeting, January 2014, Birmingham
Digital Epiphanies Meeting, January 2014, Birmingham
 
eParticipation and Participatory Design
eParticipation and Participatory DesigneParticipation and Participatory Design
eParticipation and Participatory Design
 
Smart Campus: Some Pilots
Smart Campus: Some PilotsSmart Campus: Some Pilots
Smart Campus: Some Pilots
 
adrianorenzi_duxu2014
adrianorenzi_duxu2014adrianorenzi_duxu2014
adrianorenzi_duxu2014
 
HCI LAB MANUAL
HCI LAB MANUAL HCI LAB MANUAL
HCI LAB MANUAL
 
Advanced Methods for User Evaluation in Enterprise AR
Advanced Methods for User Evaluation in Enterprise ARAdvanced Methods for User Evaluation in Enterprise AR
Advanced Methods for User Evaluation in Enterprise AR
 
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...
Digitally Engaging and Empowering Employees for Energy Demand Reduction: A Ne...
 
Mobile UX for Academic Libraries
Mobile UX for Academic LibrariesMobile UX for Academic Libraries
Mobile UX for Academic Libraries
 
Research on Negative Effect on E-Learning
Research on Negative Effect on E-LearningResearch on Negative Effect on E-Learning
Research on Negative Effect on E-Learning
 
Master's thesis Minni Kanerva
Master's thesis Minni KanervaMaster's thesis Minni Kanerva
Master's thesis Minni Kanerva
 
Human Being Character Analysis from Their Social Networking Profiles
Human Being Character Analysis from Their Social Networking ProfilesHuman Being Character Analysis from Their Social Networking Profiles
Human Being Character Analysis from Their Social Networking Profiles
 
Lectio Praecursoria
Lectio PraecursoriaLectio Praecursoria
Lectio Praecursoria
 
Towards the Design of Intelligible Object-based Applications for the Web of T...
Towards the Design of Intelligible Object-based Applications for the Web of T...Towards the Design of Intelligible Object-based Applications for the Web of T...
Towards the Design of Intelligible Object-based Applications for the Web of T...
 
Designing and deploying mobile user studies in the wild: a practical guide
Designing and deploying mobile user studies in the wild: a practical guideDesigning and deploying mobile user studies in the wild: a practical guide
Designing and deploying mobile user studies in the wild: a practical guide
 
An investigation into the physical build and psychological aspects of an inte...
An investigation into the physical build and psychological aspects of an inte...An investigation into the physical build and psychological aspects of an inte...
An investigation into the physical build and psychological aspects of an inte...
 
Supporting relationships with awareness systems
Supporting relationships with awareness systemsSupporting relationships with awareness systems
Supporting relationships with awareness systems
 
E Learning In Modern Education System .
E Learning In Modern Education System .E Learning In Modern Education System .
E Learning In Modern Education System .
 
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools
Virtual Network Building: Connecting Trauma Experts Through Collaboration Tools
 
Field of Study and Research Methods for an Effect of Cognitive and Informatio...
Field of Study and Research Methods for an Effect of Cognitive and Informatio...Field of Study and Research Methods for an Effect of Cognitive and Informatio...
Field of Study and Research Methods for an Effect of Cognitive and Informatio...
 
Musstanser Avanzament 4 (Final No Animation)
Musstanser   Avanzament 4 (Final   No Animation)Musstanser   Avanzament 4 (Final   No Animation)
Musstanser Avanzament 4 (Final No Animation)
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

MobileHCI 2014 Doctoral Consortium

  • 1. 23rd SEPTEMBER 2014 MobileHCI 2014 Doctoral Consortium Marta E. Cecchinato Email Management & Work-Home Boundaries marta.cecchinato.13@ucl.ac.uk @martacecchinato
  • 3. Structure of today’s talk: 1. Research question and motivation 2. Quick overview of my research a. Approach motivated by literature b. 3-year plan 3. Initial findings and contributions
  • 4. Are you aware of how many times you’ve checked your emails today and where were you?? Are you satisfied with your email practices? But first... my take home message: Image sourceL http://ind.pn/1tRntS0
  • 6. Email Overload: “Users’ perception that their own email use has gotten out of control” Research motivation Dabbish and Kraut (2006, p.431) Research motivation
  • 7. Overall Research Question: Can technology make it easier for people to manage their email, so as to reduce email overload? Image source: http://bit.ly/1mpRvNj
  • 8. Literature review summary • Different email management techniques that may lead to email overload • Different suggested solutions, but no agreement on their efficacy (other than “check less!”) Differences: • Individual preferences (filing, workflow approaches, use of notifications, reasons for deferring replies,…) • Context-specific (e.g. work demands)
  • 9. Reflection: why and how? Stage-based Behaviour Change Theories Personal Informatics Model Reflection 1. Pre- contemplation 2. Contemplation 3. Preparation 4. Action 5. Maintenance 1. Preparation 2. Collection 3. Reflection 4. Action 1. Description 2. Reflective description 3. Dialogic reflection 4. Transformative reflection 5. Critical reflection Prochaska, J. O., & Velicer, W. F. (1997). The transtheoretical model of health behavior change. American journal of health promotion, 12(1), 38-48. Chicago Li, I., Dey, A., & Forlizzi, J. (2010, April). A stage- based model of personal informatics systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 557- 566). ACM. Fleck, R., & Fitzpatrick, G. (2010, November). Reflecting on reflection: framing a design landscape. In Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction (pp. 216-223). ACM.
  • 10. Digital epiphany 1. Tracking 2. Reflecting 3. Epiphany: - Change - Acceptance “Having an insight about one of their digital behaviours, […] The realization about this personal habit is the result of using a digital PI tool” . (Cox, Bird, & Fleck, 2013, p.2)
  • 11. GOAL 1 – understand users GOAL 2 – explore existing tools GOAL 3 – designing and evaluating a tailored tool 1st Year 2nd Year 3rd year
  • 12. Image source: http://bit.ly/1ntCMxI Research Questions: 1. How do people use email in their personal and work domains across devices? 2. Do they have different strategies depending on device used and/or domain? Methods: Study 1 - The interview study Study 2 - The email game study GOAL 1: Understanding email behavioural differences and the impact of email on work-home boundaries
  • 13. Image source: http://bit.ly/1rpkWPR Research Questions: 1. What tools currently exist that aim to help people deal with their email? 2. Are they effective in helping people change their email behaviour? Methods: Study 3 - Tool review Study 4 - Performance and longitudinal study GOAL 2: Understanding email tools and their efficacy
  • 14. • Designing and evaluating a personalisable and customizable tool • that accommodates email individual and contextual differences and • can help reflect on habits so that a satisfactory work-home balance can be achieved. Goal 3: Designing a better email tool
  • 15.
  • 16. Study 1 Exploratory study to understand how people use emails across social domains and across devices? Interviews + Work-Life Indicator survey 16 participants (5 males, 9 academic staff, 7 professional services staff) MOBILE HCI 2014 WORKSHOP SOCIO-TECHNICAL PRACTICES AND WORK-HOME BOUNDARIES
  • 17. Study 1 – Initial findings Permeable boundaries (academics) • Work/personal email on same mobile app • Symmetrical interruptions work-home Rigid Boundaries (prof. services) • Asymmetrical interruptions work-home • Control micro-role transitions with micro- boundaries 1 2 3 4 5 Academics (N=9) Prof. Serv. (N=6) Means NonWork Interrupting Work Work Interrupting NonWork Boundary Control Family Identity Work Identity
  • 18. “I would never ever check my [work] email outside of work, purposely. It's not the kind of job that I think about when I’m not here. I'm not allowed to work from home" – P13, Female, PS. Rigid boundary management Permeable boundary management “The first check is probably right after I woke up, I will check everything that has come in the night [on phone]. […] I will probably have another look once I'm outside the house, so during my commute time I will check once again. And once I'm in my office, I don't have any specific rule, it's really case by case. […] Once I’m home […] I have a second work shift after [my son] goes to bed until quite late in the night” – P15, Male, A.
  • 19. “I get up, check my email in bed, check my email on the toilet, check my email downstairs, maybe whilst I'm having breakfast, walk to work, generally don't check my email while I'm actually walking, when I'm waiting for the train, on the train, maybe in the lift getting up to work. Maybe then at work, then on the train on the way home, in front of the TV, during dinner, yeah, that's about everything I think.” – P5, Male, A. Boundary challenges: overload and availability
  • 20. Micro-boundary email practices: “A strategy to limit the effects of micro-role transition caused by cross- domain technology mediated interruptions.” Through accounts: - one per role - Creating dedicated folders from one domain in another domain account with automatic filtering Through devices: - personal only on smartphone, work only on desktop computer. - Deliberately removing work email from phone during time off, e.g. on holiday; Through software: - different apps on smartphone for personal and work email Boundary Management
  • 21. 1. Professional context has a large impact on email practices: when, where and how people manage emails and the impact these have on work- home boundaries. 1. We see a growing trend in the use of micro-boundary strategies to separate work and personal emails 1. People with more permeable boundary management styles might find it useful to create micro-boundaries within devices to help them cope with micro-role transitions between work and personal domains, and to limit work-home interference. Contributions [WP1] Cecchinato, M., Cox, A. L., & Bird, J. (2014). “I check my emails on the toilet”: Email Practices and Work-Home Boundary Management. MobileHCI Workshop Socio-Technical Practices and Work- Home Boundaries. [WP2] Cecchinato, M.E., Bird, J. & Cox, A.L. (2014). “Personalised email tools: a solution to email overload? CHI’14 Workshop Personalised Behaviour Change Technologies

Notas del editor

  1. Society reshaping around tech. – mobile allows always online, e.g. email Email is great communication tool, BUT expectation (even sold as service!) This has impact on WLB… french labour agreement, daimler benz, google “dublin goes black”
  2. Email research for 30 yrs. Complaints soon after, 20yrs ago ‘email overload’. Definition evolved: Ways of using email (communication, task m., archive Stress Status overload and type overload -> personal/work email Two shifts: not just work, but also personal email AND considering email not just a work problem. We’ve been aware of email overload for almost 20 years. Much has been done on understanding people’s email habits especially on desktop computers, but little attention has focused on investigating how habits change on mobile devices or through cross-device interaction. From the way in which advances in technology are re-shaping society, I hypothesise that the problem of email overload is now exacerbated by cross-device interaction A better understanding of this will be one of my contributions .  One of 2 sets of contributions? AND THERE IS A DISTINCTION TO BE MADE BETWEEN PERSONAL AND WORK EMAIL OVERLOAD
  3. Having such premises, My overall contribution will be to understand how technology, instead of being treated as a problem, can be integrated as a solution to email overload.  Can technology make it easier for people to manage their email so as to reduce email overload? Most research: single device use of email, no distinction between prof groups (with exceptions of managers)
  4. I’m not going to go into detail here, but… -NO ONE SIZE FITS ALL (check less?) - Strong individual and context-specific work demands
  5. So I’ve decided to take a specific approach to the problem and focus on REFLECTION. Reflection is important for creating the motivation to change behavior. WHY: In stage-based behavior change theories, behavior change is described as a PROCESS that requires moving through a certain amount of phases. The initial phases of these theories include raising AWARENESS on one’s behavior in order to develop those motivations to change. Later phases focus on putting behavior in action and maintaining it.   HOW: There are several ways to reflect, and one way to reflect is through PERSONAL INFORMATICS, which are a particular set of tools that quantify users behavior. Personal informatics are used according to a stage-based model (preparation, collection, integration, reflection and action) to make sense of personal experiences by recognizing trends and patterns that then inform an action. So to recap, behavior change theories explain why it is important to reflect and personal informatics presents a way in which we might encourage reflection. REFLECTION in itself is a process based on collected data/information that moves from a mere description, to a sense-making of relationships between data, to a re-consideration of events based on the new insights gained, to a final more general context considered.
  6. One way of linking all BEHAVIOUR CHANGE, PERSONAL INFORMATICS AND REFLECTION is by considering a ‘DIGITAL EPIPHANIES’. A digital epiphany is based on three steps: Tracking (PERSONAL INFORMATICS) Reflecting (STAGES OF REFLECTION) having an epiphany/realization that might or might not lead to a change in attitude. (INITIAL STAGE OF BEHAVIOUR CHANGE).  
  7. So I’ve layed out a plan to tackle the issue of email overload in a work where cross-device interaction impact our work-life balance Understand user Understand tools Design a tool that takes into account those individual differences and context-specifics
  8. Study 1 - The interview study investigates the strategies people have for dealing with email, especially on multiple devices; the ways in which they use multiple accounts; and the impacts on boundary management. Study 2 - The email game study explores the strategies people use for prioritising which email to deal with and when. It will investigate which factors (value, effort required, urgency, curiosity) people use to help them prioritise one email over another. Devices used to answer will be tracked and correlated with emerging strategies.
  9. STUDY 3 The review study will investigate how the tools work and what can be said about these tools from a theoretical perspective, in particular in relation to behaviour change theories. STUDY 4 The performance and longitudinal study will investigate instead how these tools are employed or not and what is their added value, if any. In addition, it will evaluate if people perceive them as a useful resource to reduce email overload, comparing them with findings from interviews with existing users.
  10. Current ideas include developing a tool that provides people with opportunity to measure their level of email overload, collect and reflect on their own data (according to personal informatics model) and then making recommendations of strategies they might try, given their current behaviour and number of emails. The tool will be designed using participator design and focus groups with past participants and evaluated in the wild as an explorative way to see how users engage with it, collecting both qualitative and quantitative measures.
  11. So far I’ve looked at goal 1 and have conducted the first study TO LOOK AT EMAIL MANAGEMENT PRACTICES ACROSS DEVICES IN 2 PROF. GROUPS AT THE SAME UNIVERSITY. Rectruited….. Interviews and Work-Life indicator scale Preliminary results are found in workshop paper.
  12. We found that there are actually differences in prof. groups (no one else has made this distinction) -permeable boundaries (academics) work/personal email on same app phone allow for symmetrical interruptions between W-NW and NW-W -rigid boundaries (prof serv) control for micro-role transitions (shifts from one role to another). They do so thru MICRO-BOUNDARY PRACTICES to limit impact of these transitions caused by technology mediated interruptions. - Notifications: always on on computers, mostly disabled on phone, especially in those who checked both work and personal accounts suggesting they were trying to limit the interruptions and control for micro-role transitions
  13. Professional services staff tend to only look at work email whilst at work – they have more rigid boundaries. We did find some evidence of individual differences here though as 2 of the professional services staff had boundary management styles that were more typical of academics, and two academics has boundary management styles that were more like the professional services staff.
  14. Our interviews indicate smartphones can interfere even in the most private of moments, favouring those asymmetrical interruptions between work and non-work that our questionnaire highlights. Smartphones are used to check emails first thing in the morning when waking up or as P5 admits, even in the bathroom:
  15. Next study will look at email practices in a more high-pressure environment How practices are applied into the wild, sending emails and expecting replies to study deferral behaviours across devices. Unfortunately plan didn’t go as expected and couldn’t report findings from this study today.