skip to main content
10.1145/3176349.3176398acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article

The Lifetime of Email Messages: A Large-Scale Analysis of Email Revisitation

Published:01 March 2018Publication History

ABSTRACT

Email continues to be one of the most important means of online communication, leading to a number of challenges related to information overload and email management. To better understand email management practices in detail, we examine the distribution of visits to emails over time. During their lifetime, emails may be visited one or more times, and with each visit different actions may be taken. Emails that are revisited over time are especially interesting because they represent an opportunity to improve email management and search. In this paper, we present a large-scale log analysis of email revisitation, the activities that people perform on revisited email messages (e.g. responding to, organizing or deleting messages, and opening attachments), and the strategies they use to go back to these emails. We find that most emails have a short lifetime, with more than 33% having a lifetime of less than 5 minutes. We also find that deleting is the most common action taken on messages visited once, and that responding and organizing are more common for messages visited more than once. We complement the log analysis with a survey to understand the motivation behind revisits and the types of emails that are revisited. The survey results show that 73% of the visits are to find information (e.g. a link or document, instructions to perform a task, or answers to questions), while 20% of revisits are to respond to the email. Our findings have implications for designing email clients and intelligent agents that support both short- and long-term revisitation patterns.

References

  1. Q. Ai, S. Dumais, N. Craswell, and D. Liebling . 2017. Characterizing email search using large-scale behavioral logs and surveys Proceedings of the 26th International Conference on World Wide Web (WWW '17). Perth, Australia, 1511--1520. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Capra, J. Khanova, and S. Ramdeen . 2013. Work and personal e-mail use by university employees: PIM practices across domain boundaries. Journal of the Association for Information Science and Technology, Vol. 64, 5, 1029--1044.Google ScholarGoogle Scholar
  3. D. Castro, Z. Karnin, L. Lewin-Eytan, and Y. Maarek . 2016. You've got mail, and Here is what you could do with it!: Analyzing and predicting actions on email messages. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). San Francisco, CA, USA, 307--316. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M.E. Cecchinato, A. Sellen, M. Shokouhi, and G. Smyth . 2016. Finding email in a multi-account, multi-device world Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). 1200--1210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Dumais, E. Cutrell, J. J. Cadiz, G. Jancke, R. Sarin, and D. C. Robbins . 2016. Stuff I've Seen: A system for personal information retrieval and re-use ACM SIGIR Forum, Vol. Vol. 49. 28--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Elsweiler, M. Harvey, and M. Hacker . 2011. Understanding re-finding behavior in naturalistic email interaction logs Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval. 35--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Fisher, A. J. Brush, E. Gleave, and M. Smith . 2006. Revisiting Whittaker & Sidner's "email overload" ten years later Proceedings of the 2006 20th anniversary conference on Computer Supported Cooperative Work (CSCW '06). Banff, Alberta, Canada, 309--312. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Grbovic, G. Halawi, Z. Karnin, and Y. Maarek . 2014. How many folders do you really need': Classifying email into a handful of categories Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (CIKM '14). Shanghai, China, 869--878. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Grevet, D. Choi, D. Kumar, and E. Gilbert . 2014. Overload is overloaded: Email in the age of Gmail. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Toronto, Ontario, Canada, 793--802. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Harvey and D. Elsweiler . 2012. Exploring query patterns in email search. Advances in information retrieval (2012), 25--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Jerejian, C. Reid, and C. Rees . 2013. The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics Computers in Human Behavior, Vol. Vol. 29. Elsevier, 991--996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Jones and K.L. Klinkner . 2008. Beyond the Session Timeout: Automatic hierarchical segmentation of search topics in query logs Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM '08). 699--708. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y.M. Kalman and G. Ravid . 2015. Filing, piling, and everything in between: The dynamics of E-mail inbox management Journal of the Association for Information Science and Technology. Toronto, Ontario, Canada, 2540--2552. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J.Y. Kim, N. Craswell, S. Dumais, F. Radlinski, and F. Liu . 2017. Understanding and modeling success in email search Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '17). Perth, Australia, 265--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Koren, E. Liberty, Y. Maarek, and R. Sandler . 2011. Automatically tagging email by leveraging other users' folders Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '11). San Diego, CA, USA, 913--921. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. U. Kruschwitz and H. Charlie . 2017. Searching the Enterprise. Foundations and Trends in Information Retrieval, Vol. 11, 1 (2017), 1--142.Google ScholarGoogle ScholarCross RefCross Ref
  17. K. Narang, S. Dumais, and Q. Ai . 2017. Large-scale analysis of email search and organizational strategies Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval (CHIIR '17). 215--223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Smith, Y. Rogers, and M. Underwood . 2003. Managing personal and work email in the same box: overcoming the tensions through new metaphors. Proceedings of the Home Oriented Informatics and Telematics (HOIT '03) (2003).Google ScholarGoogle Scholar
  19. J. Teevan, E. Adar, R. Jones, and M.A.S. Potts . 2007. Information re-retrieval: repeat queries in Yahoo's logs Proceedings of the 30th annual international ACM SIGIR conference on Research and Development in Information Retrieval. 151--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S.K. Tyler and J. Teevan . 2010. Large scale query log analysis of re-finding. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. 191--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Whittaker, T. Matthews, J. Cerruti, H. Badenes, and J. Tang . 2011. Am I wasting my time organizing email?: A study of email refinding Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). Vancouver, BC, Canada, 3449--3458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Whittaker and C. Sidner . 1996. Email overload: Exploring personal information management of email Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '96). Vancouver, British Columbia, Canada, 276--283. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Lifetime of Email Messages: A Large-Scale Analysis of Email Revisitation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHIIR '18: Proceedings of the 2018 Conference on Human Information Interaction & Retrieval
          March 2018
          402 pages
          ISBN:9781450349253
          DOI:10.1145/3176349

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 March 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHIIR '18 Paper Acceptance Rate22of57submissions,39%Overall Acceptance Rate55of163submissions,34%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader