Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1054972.1055068acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Understanding email use: predicting action on a message

Published: 02 April 2005 Publication History

Abstract

Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examined people's ratings of message importance and the actions they took on specific email messages, based on message characteristics and characteristics of receivers and senders. Respondents kept half of their new messages in the inbox and replied to about a third of them. They rated messages as important if they were about work and required action. Importance, in turn, had a modest impact on whether people replied to their incoming messages and whether they saved them. The results indicate that factors other than message importance (e.g., their social nature) also determine how people handle email. Overall, email usage reflects attentional differences due both to personal propensities and to work demands and relationships.

References

[1]
Abu-Hakima, S., McFarland, C., & Meech, J.F. An agent-based system for email highlighting. in Proc. AGENTS 2001, ACM Press (2001), 224--225.
[2]
Bälter, O. Keystroke level analysis of email message organization. In Proc. CHI 2000, ACM Press (2000), 105--112.
[3]
Belloti, V., Ducheneaut, N., Howard, M., & Smith, I. Taking email to task: The design and evaluation of a task management centered email tool. In Proc. CHI 2003, ACM Press (2003), 345--352.
[4]
Boone, G. Concept features in Re:Agent, an intelligent email agent. In Proc. AGENTS 1998, ACM Press (1998), 141--148.
[5]
Cohen, W., Carvalho, V., & Mitchell, T. Learning to classify email into "Speech Acts." In Proc. EMNLP-2004, (2004), 309--316.
[6]
Dabbish, L., Venolia, G., & Cadiz, J.J. Marked for deletion: An analysis of email data. Ext. Abstracts CHI 2003, ACM Press (2003), 924--925.
[7]
Ducheneaut, N., & Belloti, V. Email as habitat: An exploration of embedded personal information management. Interactions 8,5 (2001), 30--38.
[8]
Firm bans email at work, http://www.cnn.com/2003/TECH/internet/09/19/e-mail.ban/index.html
[9]
Flores, F., Graves, M., Hartfield, B., & Winograd, T. Computer systems and the design of organizational interaction. ACM Transactions on OIS 6, 2 (1988), 153--172.
[10]
Horvitz, E., Jacobs, A., & Hovel, D. Attention-sensitive alerting. In Proc. UAI 1999, Morgan Kaufmann (1999), 305--313.
[11]
Jackson, T. W., Dawson, R. J., & Wilson, D. The cost of email interruption. Journal of Systems and Information Technology 5,1 (2001), 81--92.
[12]
Kraut, R.E. & Attewell, P. Media use in a global corporation: Electronic mail and organizational knowledge, in Culture of the Internet. Lawrence Erlbaum Associates, Mahwah, NJ, USA, (1997), 323--342.
[13]
Lashkari, Y., Metral, M., & Maes, P. Collaborative interface agents. In Proc. AAAI 1994. ACM Press (1994), 444--449.
[14]
Mackay, W. Diversity in the use of electronic mail: A preliminary inquiry. ACM Transactions on Office Information Systems 6,4 (1988), 380--397.
[15]
Malone, T., Grant, K., Turbank, F., Brobst, S., & Cohen, M. Intelligent information-sharing systems. Communications of the ACM 30, 5 (1987), 390--402.
[16]
Mintzberg, H. The Nature of Managerial Work. New Harper & Row, New York, NY, USA, 1973.
[17]
Nardi, B., Whittaker, S., Isaacs, E., Creech, M., Johnson, J., & Hainsworth, J. Integrating communication and information through ContactMap. Communications of the ACM 45 (2002), 89--95.
[18]
Neuwirth, C.M., Morris, J.H., Regli, S.H., Chandok, R., & Wegner, G.C. Envisioning communication: Task-tailorable representations of communication in asynchronous work. In Proc. CSCW 1998, ACM Press (1998), 265--274.
[19]
Panko, R. Managerial communication patterns. Journal of Organisational Computing 2, 1 (1992), 95--122.
[20]
Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian approach to filtering junk email. AAAI Workshop on Learning for Text Categorization, July 1998.
[21]
Sproull, L., & Kiesler, S. Connections: New ways of working in the networked organization. MIT Press: Cambridge, MA, USA, 1991.
[22]
Sumner, M. The impact of electronic mail on managerial and organizational communications. In Proc. of ACM SIGOIS and IEEECS TCOA Conference on Office Information Systems. ACM Press (1988), 96--109.
[23]
Tyler, J., & Tang, J. When can I expect an email response? A study of rhythms in email usage. In Proc. of ECSCW 2003, Oulu Univ. Press (2003), 238--258.
[24]
Venolia, G., Dabbish, L., Cadiz, J.J., & Gupta, A. (2001). Supporting email workflow. MSR Tech Report MSR-TR-2001-88.
[25]
Vivisimo Clustering Engine, http://vivisimo.com/
[26]
Whittaker, S., & Hirschberg, J. The character, value, and management of personal paper archives. ACM TOCHI 8, 2, (2001), 150--170.
[27]
Whittaker, S., & Sidner, C. Email overload: exploring personal information management of email. In Proc. of CHI 1996, ACM Press (1996), 276--283.

Cited By

View all
  • (2024)Resource-seeking and media choice process: A case of irrational decision makingInternational Journal of Information Management10.1016/j.ijinfomgt.2023.10271474(102714)Online publication date: Feb-2024
  • (2024)Transformer models for mining intents and predicting activities from emails in knowledge-intensive processesEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107450128(107450)Online publication date: Feb-2024
  • (2024)Effects of visual risk indicators on phishing detection behaviorComputers and Security10.1016/j.cose.2024.103940144:COnline publication date: 1-Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
April 2005
928 pages
ISBN:1581139985
DOI:10.1145/1054972
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. communication
  2. computer-mediated
  3. electronic mail
  4. email
  5. filtering
  6. intelligent agents
  7. messaging

Qualifiers

  • Article

Conference

CHI05
Sponsor:

Acceptance Rates

CHI '05 Paper Acceptance Rate 93 of 372 submissions, 25%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI '25
CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)125
  • Downloads (Last 6 weeks)7
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Resource-seeking and media choice process: A case of irrational decision makingInternational Journal of Information Management10.1016/j.ijinfomgt.2023.10271474(102714)Online publication date: Feb-2024
  • (2024)Transformer models for mining intents and predicting activities from emails in knowledge-intensive processesEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107450128(107450)Online publication date: Feb-2024
  • (2024)Effects of visual risk indicators on phishing detection behaviorComputers and Security10.1016/j.cose.2024.103940144:COnline publication date: 1-Sep-2024
  • (2023)Email Overload: Investigating Technology-fit Antecedents and Job-related OutcomeACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3595863.359586954:2(77-96)Online publication date: 1-May-2023
  • (2023)Stationary Algorithmic Balancing For Dynamic Email Re-Ranking ProblemProceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3580305.3599909(4527-4538)Online publication date: 6-Aug-2023
  • (2023)Getting on top of work‐email: A systematic review of 25 years of research to understand effective work‐email activityJournal of Occupational and Organizational Psychology10.1111/joop.1246297:1(74-103)Online publication date: 23-Aug-2023
  • (2023)Digital Hoarding in Everyday Hedonic Social Media Use: The Roles of Fear of Missing out (FoMO) and Social Media AffordancesInternational Journal of Human–Computer Interaction10.1080/10447318.2023.223313940:18(5399-5414)Online publication date: 11-Jul-2023
  • (2023)What makes IM users (un)responsive: An empirical investigation for understanding IM responsivenessInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2022.102983172(102983)Online publication date: Apr-2023
  • (2023)A Predictive Approach Based on Feature Selection to Improve Email Marketing Campaign Success RateInternational Conference on Advanced Intelligent Systems for Sustainable Development10.1007/978-3-031-26384-2_85(940-948)Online publication date: 10-Jun-2023
  • (2023)Effects of task interruptions caused by notifications from communication applications on strain and performanceJournal of Occupational Health10.1002/1348-9585.1240865:1Online publication date: 6-Jun-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media