skip to main content
10.1145/3411764.3445118acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

“Oops...”: Mobile Message Deletion in Conversation Error and Regret Remediation

Authors Info & Claims
Published:07 May 2021Publication History

ABSTRACT

Message deletion in mobile messaging apps allows people to “unsay” things they have said. This paper explores how and why people use (or do not use) this feature within remediation strategies after a communication error is identified. We present findings from a multi-stage survey designed to explore people’s general experiences of the message deletion feature (N = 401), peoples’ experiences of using this feature during the remediation of an error (N = 70), and receivers’ perceptions around recent message deletions (N = 68). While people are typically aware of the deletion feature, it is infrequently used. When used, it is primarily done so to improve conversations by reducing confusion between conversation partners. We found people being aware of message deletions creating information-gaps which can provoke curiosity in recipients, causing them to develop narratives to help address the uncertainty. We found concerns amongst senders that these narratives would be of a negative nature, having an undesirable impact on how others perceive them. We use our findings to suggest ways in which mobile messaging apps could improve conversational experiences around erroneous and regrettable messages.

Skip Supplemental Material Section

Supplemental Material

References

  1. Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman Sadeh, and Alessandro Acquisti. 2013. Tweets are forever: a large-scale quantitative analysis of deleted tweets. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 897–908.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hans Rutger Bosker, Anne-France Pinget, Hugo Quené, Ted Sanders, and Nivja H De Jong. 2013. What makes speech sound fluent? The contributions of pauses, speed and repairs. Language Testing 30, 2 (2013), 159–175.Google ScholarGoogle ScholarCross RefCross Ref
  3. Eliane M Boucher, Jeffrey T Hancock, and Philip J Dunham. 2008. Interpersonal sensitivity in computer-mediated and face-to-face conversations. Media Psychology 11, 2 (2008), 235–258.Google ScholarGoogle ScholarCross RefCross Ref
  4. Dathan, Matt. 2015. David Cameron makes another gaffe: ’This election is all about my career... sorry, I mean country’. https://www.independent.co.uk/news/uk/politics/generalelection/david-cameron-makes-another-gaffe-this-election-is-all-about-my-career-sorry-i-mean-country-10218341.html [Online; accessed 18-August-2020].Google ScholarGoogle Scholar
  5. Nicole Ellison, Rebecca Heino, and Jennifer Gibbs. 2006. Managing impressions online: Self-presentation processes in the online dating environment. Journal of computer-mediated communication 11, 2 (2006), 415–441.Google ScholarGoogle ScholarCross RefCross Ref
  6. Shelly D. Farnham and Elizabeth F. Churchill. 2011. Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online. In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work (Hangzhou, China) (CSCW ’11). Association for Computing Machinery, New York, NY, USA, 359–368. https://doi.org/10.1145/1958824.1958880Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. GitHub. [n.d.]. Managing disruptive comments. https://docs.github.com/en/github/building-a-strong-community/managing-disruptive-comments. Accessed: 2020-09-09.Google ScholarGoogle Scholar
  8. Erving Goffman 1978. The presentation of self in everyday life. Harmondsworth London.Google ScholarGoogle Scholar
  9. Russell Golman and George Loewenstein. 2015. Curiosity, information gaps, and the utility of knowledge. Information Gaps, and the Utility of Knowledge (April 16, 2015) (2015), 96–135.Google ScholarGoogle Scholar
  10. Shion Guha, Eric PS Baumer, and Geri K Gay. 2018. Regrets, I’ve had a few: When regretful experiences do (and don’t) compel users to leave Facebook. In Proceedings of the 2018 ACM Conference on Supporting Groupwork. ACM, 166–177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andreas Gutmann and Mark Warner. 2019. Fight to be forgotten: Exploring the efficacy of data erasure in popular operating systems. In Annual Privacy Forum. Springer, 45–58.Google ScholarGoogle Scholar
  12. P Hovey. 2010. Real-time recovery and visualization of deleted tweets. Master’s thesis, University of California(2010).Google ScholarGoogle Scholar
  13. Hunt, Elle. 2017. I sent a compromising message to the wrong person. How will I ever recover?https://www.theguardian.com/culture/2017/apr/28/i-sent-a-compromising-message-to-the-wrong-person-how-will-i-ever-recover.Google ScholarGoogle Scholar
  14. Simon Jones and Eamonn O’Neill. 2011. Contextual Dynamics of Group-Based Sharing Decisions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI ’11). Association for Computing Machinery, New York, NY, USA, 1777–1786. https://doi.org/10.1145/1978942.1979200Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sara Kiesler, Jane Siegel, and Timothy W McGuire. 1984. Social psychological aspects of computer-mediated communication.American psychologist 39, 10 (1984), 1123.Google ScholarGoogle Scholar
  16. Mark L. Knapp, Laura Stafford, and John A. Daly. 1986. Regrettable Messages: Things People Wish They Hadn’t Said. Journal of Communication 36, 4 (1986), 40–58. https://doi.org/10.1111/j.1460-2466.1986.tb01449.xGoogle ScholarGoogle ScholarCross RefCross Ref
  17. Kuebelback, Amy. 1991. Getting the Message : E-Mail is fast and efficient. But it isn’t always private–and that can mean big trouble for users.https://www.latimes.com/archives/la-xpm-1991-09-04-vw-1539-story.html [Online; accessed 18-August-2020].Google ScholarGoogle Scholar
  18. Myron W Lustig, Jolene Koester, and Rona Halualani. 2006. Intercultural competence: Interpersonal communication across cultures. Pearson/A and B.Google ScholarGoogle Scholar
  19. Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1–23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Margaret L Mclaughun, Michael J Cody, and H Dan O’Hair. 1983. The management of failure events: Some contextual determinants of accounting behavior. Human Communication Research 9, 3 (1983), 208–224.Google ScholarGoogle ScholarCross RefCross Ref
  21. Sarah McRoberts, Haiwei Ma, Andrew Hall, and Svetlana Yarosh. 2017. Share first, save later: Performance of self through Snapchat stories. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 6902–6911.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sandra Metts and William R Cupach. 1989. Situational influence on the use of remedial strategies in embarrassing predicaments. Communications Monographs 56, 2 (1989), 151–162.Google ScholarGoogle ScholarCross RefCross Ref
  23. Janet R Meyer. 2011. Regretted messages: Cognitive antecedents and post hoc reflection. Journal of Language and Social Psychology 30, 4 (2011), 376–395.Google ScholarGoogle ScholarCross RefCross Ref
  24. Janet R Meyer and Kyra Rothenberg. 2004. Repairing regretted messages: Effects of emotional state, relationship type, and seriousness of offense. Communication Research Reports 21, 4 (2004), 348–356.Google ScholarGoogle ScholarCross RefCross Ref
  25. Bradley M Okdie, Rosanna E Guadagno, Frank J Bernieri, Andrew L Geers, and Amber R Mclarney-Vesotski. 2011. Getting to know you: Face-to-face versus online interactions. Computers in human behavior 27, 1 (2011), 153–159.Google ScholarGoogle Scholar
  26. Theodor Schnitzler, Christine Utz, Florian M Farke, Christina Pöpper, and Markus Dürmuth. 2018. User Perception and Expectations on Deleting Instant Messages - or - “What Happens If I Press This Button?”. In European Workshop on Usable Security (EuroUSEC).Google ScholarGoogle ScholarCross RefCross Ref
  27. Peter Schönbach. 1980. A category system for account phases. European Journal of Social Psychology 10, 2 (1980), 195–200.Google ScholarGoogle ScholarCross RefCross Ref
  28. Marvin B Scott and Stanford M Lyman. 1968. Accounts. American sociological review(1968), 46–62.Google ScholarGoogle Scholar
  29. Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2013. I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 3277–3286.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Statista. 2019. Most popular messaging apps 2019. https://www.statista.com/statistics/258749/most-popular-global-mobile-messenger-apps/ [Online; accessed 06-September-2019].Google ScholarGoogle Scholar
  31. Statista. 2019. U.S. WhatsApp users 2019. https://www.statista.com/statistics/558290/number-of-whatsapp-users-usa/ [Online; accessed 06-September-2019].Google ScholarGoogle Scholar
  32. James T Tedeschi and Marc Reiss. 1981. Verbal strategies in impression management. The psychology of ordinary explanations of social behavior 271, 309(1981), 792–799.Google ScholarGoogle Scholar
  33. Catalina L Toma and Jeffrey T Hancock. 2010. Reading between the lines: linguistic cues to deception in online dating profiles. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. 5–8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Catalina L Toma and Jeffrey T Hancock. 2012. What lies beneath: The linguistic traces of deception in online dating profiles. Journal of Communication 62, 1 (2012), 78–97.Google ScholarGoogle ScholarCross RefCross Ref
  35. Jeffrey W Treem, Paul M Leonardi, and Bart van den Hooff. 2020. Computer-Mediated Communication in the Age of Communication Visibility. Journal of Computer-Mediated Communication 25, 1 (01 2020), 44–59. https://doi.org/10.1093/jcmc/zmz024 arXiv:https://academic.oup.com/jcmc/article-pdf/25/1/44/32961193/zmz024.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  36. Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security. ACM, 10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Mark Warner, Andreas Gutmann, M Angela Sasse, and Ann Blandford. 2018. Privacy Unraveling Around Explicit HIV Status Disclosure Fields in the Online Geosocial Hookup App Grindr. Proceedings of the ACM on Human-Computer Interaction 2, CSCW(2018), 181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan F Maestre, and Ann Blandford. 2020. Evaluating’Prefer not to say’Around Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1–13.Google ScholarGoogle Scholar
  39. Mark Warner, Juan F Maestre, Jo Gibbs, Chia-Fang Chung, and Ann Blandford. 2019. Signal Appropriation of Explicit HIV Status Disclosure Fields in Sex-Social Apps used by Gay and Bisexual Men. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 692.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Mark Warner and Victoria Wang. 2019. Self-censorship in social networking sites (SNSs)–privacy concerns, privacy awareness, perceived vulnerability and information management. Journal of Information, Communication and Ethics in Society (2019).Google ScholarGoogle Scholar
  41. Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 609–618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lu Zhou, Wenbo Wang, and Keke Chen. 2016. Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones. In Proceedings of the 25th International Conference on World Wide Web (Montréal, Québec, Canada) (WWW ’16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 603–612. https://doi.org/10.1145/2872427.2883052Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. “Oops...”: Mobile Message Deletion in Conversation Error and Regret Remediation
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
      May 2021
      10862 pages
      ISBN:9781450380966
      DOI:10.1145/3411764

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 May 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%
    • Article Metrics

      • Downloads (Last 12 months)61
      • Downloads (Last 6 weeks)6

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format