Knowledge workers experience many interruptions during their work day. Especially when they happen at inopportune moments, interruptions can incur high costs, cause time loss and frustration. Knowing a person's interruptibility allows optimizing the timing of interruptions and minimize disruption. Recent advances in technology provide the opportunity to collect a wide variety of data on knowledge workers to predict interruptibility. While prior work predominantly examined interruptibility based on a single data type and in short lab studies, we conducted a two-week field study with 13 professional software developers to investigate a variety of computer interaction, heart-, sleep-, and physical activity-related data. Our analysis shows that...
The modern workplace environment is filled with interruptions due to the necessity of coworkers to c...
Recent trends in software development directed toward intelligence, distribution, and mobility have ...
Breaches of cyber-security often arise unintentionally from the human user such as when switching be...
Knowledge workers experience many interruptions during their work day. Especially when they happen a...
In office workplaces, interruptions by co-workers, emails or instant messages are common. Many of th...
Interruptions of knowledge workers are common and can cause a high cost if they happen at inopportun...
Interruptions carry a high cost, especially to software developers. To prevent unnecessary interrupt...
Due to the high number and cost of interruptions at work, several approaches have been suggested to ...
Current systems often create socially awkward interruptions or unduly demand attention because they ...
A person seeking another person’s attention is normally able to quickly assess how interruptible the...
The computer and communication systems that office workers currently use tend to interrupt at inappr...
When should a machine attempt to communicate with a user? This is a historical problem that has been...
Computer-based work often involves looking up information from different sources. Though these inter...
We all experience interruption in our daily lives when something causes a break in our actions, acti...
Interruptions are prevalent in everyday life and can be very disruptive. An important factor that af...
The modern workplace environment is filled with interruptions due to the necessity of coworkers to c...
Recent trends in software development directed toward intelligence, distribution, and mobility have ...
Breaches of cyber-security often arise unintentionally from the human user such as when switching be...
Knowledge workers experience many interruptions during their work day. Especially when they happen a...
In office workplaces, interruptions by co-workers, emails or instant messages are common. Many of th...
Interruptions of knowledge workers are common and can cause a high cost if they happen at inopportun...
Interruptions carry a high cost, especially to software developers. To prevent unnecessary interrupt...
Due to the high number and cost of interruptions at work, several approaches have been suggested to ...
Current systems often create socially awkward interruptions or unduly demand attention because they ...
A person seeking another person’s attention is normally able to quickly assess how interruptible the...
The computer and communication systems that office workers currently use tend to interrupt at inappr...
When should a machine attempt to communicate with a user? This is a historical problem that has been...
Computer-based work often involves looking up information from different sources. Though these inter...
We all experience interruption in our daily lives when something causes a break in our actions, acti...
Interruptions are prevalent in everyday life and can be very disruptive. An important factor that af...
The modern workplace environment is filled with interruptions due to the necessity of coworkers to c...
Recent trends in software development directed toward intelligence, distribution, and mobility have ...
Breaches of cyber-security often arise unintentionally from the human user such as when switching be...