The Lifetime of Email Messages: A Large-Scale Analysis of Email Revisitation

被引:16
|
作者
Alrashed, Tarfah [1 ]
Awadallah, Ahmed Hassan [2 ]
Dumais, Susan [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Microsoft Res, Redmond, WA USA
关键词
Email interaction; email revisitation; email lifetime;
D O I
10.1145/3176349.3176398
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Email continues to be one of the most important means of online communication, leading to a number of challenges related to information overload and email management. To better understand email management practices in detail, we examine the distribution of visits to emails over time. During their lifetime, emails may be visited one or more times, and with each visit different actions may be taken. Emails that are revisited over time are especially interesting because they represent an opportunity to improve email management and search. In this paper, we present a large-scale log analysis of email revisitation, the activities that people perform on revisited email messages (e.g. responding to, organizing or deleting messages, and opening attachments), and the strategies they use to go back to these emails. We find that most emails have a short lifetime, with more than 33% having a lifetime of less than 5 minutes. We also find that deleting is the most common action taken on messages visited once, and that responding and organizing are more common for messages visited more than once. We complement the log analysis with a survey to understand the motivation behind revisits and the types of emails that are revisited. The survey results show that 73% of the visits are to find information (e.g. a link or document, instructions to perform a task, or answers to questions), while 20% of revisits are to respond to the email. Our findings have implications for designing email clients and intelligent agents that support both short- and long-term revisitation patterns.
引用
收藏
页码:120 / 129
页数:10
相关论文
共 50 条
  • [1] Large-Scale Analysis of Email Search and Organizational Strategies
    Narang, Kanika
    Dumais, Susan T.
    Craswell, Nick
    Liebling, Dan
    Ai, Qingyao
    [J]. CHIIR'17: PROCEEDINGS OF THE 2017 CONFERENCE HUMAN INFORMATION INTERACTION AND RETRIEVAL, 2017, : 215 - 223
  • [2] Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
    Shen, Kaiwen
    Wang, Chuhan
    Guo, Minglei
    Zheng, Xiaofeng
    Lu, Chaoyi
    Liu, Baojun
    Zhao, Yuxuan
    Hao, Shuang
    Duan, Haixin
    Pan, Qingfeng
    Yang, Min
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 3201 - 3217
  • [3] Characterizing Email Search using Large-scale Behavioral Logs and Surveys
    Ai, Qingyao
    Dumais, Susan T.
    Craswell, Nick
    Liebling, Dan
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, : 1511 - 1520
  • [4] Design of large-scale agricultural wireless sensor networks: email from the vineyard
    Jardak, Christine
    Rerkrai, Krisakorn
    Kovacevic, Aleksandar
    Riihijaervi, Janne
    Maehoenen, Petri
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (02) : 77 - 88
  • [5] Learning to Predict Subject-Line Opens for Large-Scale Email Marketing
    Balakrishnan, Raju
    Parekh, Rajesh
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014, : 579 - 584
  • [6] Nigerian English in informal email messages
    Chiluwa, Innocent
    [J]. ENGLISH WORLD-WIDE, 2010, 31 (01) : 40 - 61
  • [7] Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis
    Maroofi, Sourena
    Korczynski, Maciej
    Holzel, Arnold
    Duda, Andrzej
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3184 - 3196
  • [8] IP geolocation suspicious email messages
    Butkovic, Asmir
    Mrdovic, Sasa
    Mujacic, Samra
    [J]. 2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 881 - +
  • [9] Email messages: Towards a pedagogy of caring
    Aungamuthu, Yougan
    [J]. INDEPENDENT JOURNAL OF TEACHING AND LEARNING, 2011, 6 : 34 - 44
  • [10] Learning to semantically classify email messages
    Jiang, Eric
    [J]. INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 700 - 711