ABSTRACT
Email continues to be one of the most important means of online communication, leading to a number of challenges related to information overload and email management. To better understand email management practices in detail, we examine the distribution of visits to emails over time. During their lifetime, emails may be visited one or more times, and with each visit different actions may be taken. Emails that are revisited over time are especially interesting because they represent an opportunity to improve email management and search. In this paper, we present a large-scale log analysis of email revisitation, the activities that people perform on revisited email messages (e.g. responding to, organizing or deleting messages, and opening attachments), and the strategies they use to go back to these emails. We find that most emails have a short lifetime, with more than 33% having a lifetime of less than 5 minutes. We also find that deleting is the most common action taken on messages visited once, and that responding and organizing are more common for messages visited more than once. We complement the log analysis with a survey to understand the motivation behind revisits and the types of emails that are revisited. The survey results show that 73% of the visits are to find information (e.g. a link or document, instructions to perform a task, or answers to questions), while 20% of revisits are to respond to the email. Our findings have implications for designing email clients and intelligent agents that support both short- and long-term revisitation patterns.
- Q. Ai, S. Dumais, N. Craswell, and D. Liebling . 2017. Characterizing email search using large-scale behavioral logs and surveys Proceedings of the 26th International Conference on World Wide Web (WWW '17). Perth, Australia, 1511--1520. Google ScholarDigital Library
- R. Capra, J. Khanova, and S. Ramdeen . 2013. Work and personal e-mail use by university employees: PIM practices across domain boundaries. Journal of the Association for Information Science and Technology, Vol. 64, 5, 1029--1044.Google Scholar
- D. Castro, Z. Karnin, L. Lewin-Eytan, and Y. Maarek . 2016. You've got mail, and Here is what you could do with it!: Analyzing and predicting actions on email messages. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). San Francisco, CA, USA, 307--316. Google ScholarDigital Library
- M.E. Cecchinato, A. Sellen, M. Shokouhi, and G. Smyth . 2016. Finding email in a multi-account, multi-device world Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). 1200--1210. Google ScholarDigital Library
- S. Dumais, E. Cutrell, J. J. Cadiz, G. Jancke, R. Sarin, and D. C. Robbins . 2016. Stuff I've Seen: A system for personal information retrieval and re-use ACM SIGIR Forum, Vol. Vol. 49. 28--35. Google ScholarDigital Library
- D. Elsweiler, M. Harvey, and M. Hacker . 2011. Understanding re-finding behavior in naturalistic email interaction logs Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval. 35--44. Google ScholarDigital Library
- D. Fisher, A. J. Brush, E. Gleave, and M. Smith . 2006. Revisiting Whittaker & Sidner's "email overload" ten years later Proceedings of the 2006 20th anniversary conference on Computer Supported Cooperative Work (CSCW '06). Banff, Alberta, Canada, 309--312. Google ScholarDigital Library
- M. Grbovic, G. Halawi, Z. Karnin, and Y. Maarek . 2014. How many folders do you really need': Classifying email into a handful of categories Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (CIKM '14). Shanghai, China, 869--878. Google ScholarDigital Library
- C. Grevet, D. Choi, D. Kumar, and E. Gilbert . 2014. Overload is overloaded: Email in the age of Gmail. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Toronto, Ontario, Canada, 793--802. Google ScholarDigital Library
- M. Harvey and D. Elsweiler . 2012. Exploring query patterns in email search. Advances in information retrieval (2012), 25--36. Google ScholarDigital Library
- A. Jerejian, C. Reid, and C. Rees . 2013. The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics Computers in Human Behavior, Vol. Vol. 29. Elsevier, 991--996. Google ScholarDigital Library
- R. Jones and K.L. Klinkner . 2008. Beyond the Session Timeout: Automatic hierarchical segmentation of search topics in query logs Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM '08). 699--708. Google ScholarDigital Library
- Y.M. Kalman and G. Ravid . 2015. Filing, piling, and everything in between: The dynamics of E-mail inbox management Journal of the Association for Information Science and Technology. Toronto, Ontario, Canada, 2540--2552. Google ScholarDigital Library
- J.Y. Kim, N. Craswell, S. Dumais, F. Radlinski, and F. Liu . 2017. Understanding and modeling success in email search Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR '17). Perth, Australia, 265--274. Google ScholarDigital Library
- Y. Koren, E. Liberty, Y. Maarek, and R. Sandler . 2011. Automatically tagging email by leveraging other users' folders Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '11). San Diego, CA, USA, 913--921. Google ScholarDigital Library
- U. Kruschwitz and H. Charlie . 2017. Searching the Enterprise. Foundations and Trends in Information Retrieval, Vol. 11, 1 (2017), 1--142.Google ScholarCross Ref
- K. Narang, S. Dumais, and Q. Ai . 2017. Large-scale analysis of email search and organizational strategies Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval (CHIIR '17). 215--223. Google ScholarDigital Library
- H. Smith, Y. Rogers, and M. Underwood . 2003. Managing personal and work email in the same box: overcoming the tensions through new metaphors. Proceedings of the Home Oriented Informatics and Telematics (HOIT '03) (2003).Google Scholar
- J. Teevan, E. Adar, R. Jones, and M.A.S. Potts . 2007. Information re-retrieval: repeat queries in Yahoo's logs Proceedings of the 30th annual international ACM SIGIR conference on Research and Development in Information Retrieval. 151--158. Google ScholarDigital Library
- S.K. Tyler and J. Teevan . 2010. Large scale query log analysis of re-finding. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. 191--200. Google ScholarDigital Library
- S. Whittaker, T. Matthews, J. Cerruti, H. Badenes, and J. Tang . 2011. Am I wasting my time organizing email?: A study of email refinding Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). Vancouver, BC, Canada, 3449--3458. Google ScholarDigital Library
- S. Whittaker and C. Sidner . 1996. Email overload: Exploring personal information management of email Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '96). Vancouver, British Columbia, Canada, 276--283. Google ScholarDigital Library
Index Terms
- The Lifetime of Email Messages: A Large-Scale Analysis of Email Revisitation
Recommendations
Generalizing email messages digests
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsAn email digest is a message that results from the combination of other messages. Mailing list management systems implement digests to let subscribers reduce their email messages frequency. In this paper we address the issue of generalizing this digest ...
Dates and times in email messages
IUI '04: Proceedings of the 9th international conference on Intelligent user interfacesIn this paper, we present a user interface which allows users to keep track of calendar related email messages. We provide visual cues for calendar related items, as well as allow users to search these for messages based on the dates and times they ...
Authorship similarity detection from email messages
MLDM'11: Proceedings of the 7th international conference on Machine learning and data mining in pattern recognitionIt is easy to hide the true identity of the author of an email. The author's actual name, email address, etc. can be changed arbitrarily to deceive an email receiver. For example, a sender can change his/her identity in the email header to send ...
Comments