A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Characterizing and Predicting Enterprise Email Reply Behavior
2017
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR '17
In this paper, we extend previous work on predicting email reply behavior by looking at enterprise se ings and considering more than dyadic communications. ...
We characterize the in uence of various factors such as email content and metadata, historical interaction features and temporal features on email reply behavior. ...
In this paper, we address this gap by characterizing and predicting reply behaviors in enterprise emails, where we consider both dyadic conversations and group discussions. ...
doi:10.1145/3077136.3080782
dblp:conf/sigir/0019DBA17
fatcat:pijsz57xjffbbmwpuhw62cvyl4
Behavioral profiles for advanced email features
2009
Proceedings of the 18th international conference on World wide web - WWW '09
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend on? ...
We highlight various novel threshold behaviors and provide support for existing hypotheses such as that of the least-effort reply. ...
Specifically, we present results of an extensive study of "behavioral" profiles that characterize users, their actions in processing emails, and properties of the exchanged emails. ...
doi:10.1145/1526709.1526805
dblp:conf/www/KaragiannisV09
fatcat:pwfxpv5ov5dbzpmezx635vd23y
Characterizing and Predicting Email Deferral Behavior
2019
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining - WSDM '19
In this paper, through qualitative interviews and a large-scale log analysis, we study when and what enterprise email users tend to defer. ...
We found that users are more likely to defer emails when handling them involves replying, reading carefully, or clicking on links and attachments. ...
They characterized the influence of various factors such as email content and metadata, historical interaction features and temporal features on email reply behavior. ...
doi:10.1145/3289600.3291028
dblp:conf/wsdm/SarrafzadehALLS19
fatcat:eub4jult3fbm7fdsvrzbg3rxxq
Context-Aware Intent Identification in Email Conversations
2019
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR'19
We use a large scale publicly available email dataset to characterize intents in enterprise email and propose methods for improving intent identification in email conversations. ...
People spend a significant amount of time sending, reading, searching and responding to email in order to manage tasks, exchange information, etc. ...
[29] studied the problem of email reply order prediction by mining interaction behaviors. Kooti et al. [23] characterized the replying behavior in conversations for pairs of users. ...
doi:10.1145/3331184.3331260
dblp:conf/sigir/WangHABQ19
fatcat:srdh4qepdrdo7gqjgxifambxpu
Characterizing Reading Time on Enterprise Emails
[article]
2020
arXiv
pre-print
In this paper, we characterize how users read their enterprise emails, and reveal the various contextual factors that impact reading time. ...
Overall, our study is the first to characterize enterprise email reading time on a very large scale. ...
In this paper, we characterize how users read their enterprise emails, and reveal the various contextual factors that impact reading time. ...
arXiv:2001.00802v1
fatcat:5vx2y7tohngajaolsd4hco3k5e
Characterizing and Supporting Question Answering in Human-to-Human Communication
2018
The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval - SIGIR '18
We study a large scale publicly available email dataset to characterize information exchange via questions and answers in enterprise email. ...
In this paper, we focus on information exchange over enterprise email in the form of questions and answers. ...
[56] also studied reply behavior focusing on enterprise email. Recently, Lin et al. ...
doi:10.1145/3209978.3210046
dblp:conf/sigir/YangAKWW18
fatcat:hgc3o76qlbelfjkwj63ncxxife
The Lifetime of Email Messages
2018
Proceedings of the 2018 Conference on Human Information Interaction&Retrieval - CHIIR '18
attachments), and the strategies they use to go back to these emails. ...
Our findings have implications for designing email clients and intelligent agents that support both short-and long-term revisitation patterns. ...
We focus on investigating enterprise email behavior, since accessing email makes up a large proportion of users' information seeking efforts within enterprises [16] . ...
doi:10.1145/3176349.3176398
dblp:conf/chiir/AlrashedAD18
fatcat:xur5ir7wijf3vfq54fbqjospfe
Exploring User Behavior in Email Re-Finding Tasks
2019
The World Wide Web Conference on - WWW '19
However, previous studies on email have been exclusive to enterprises with access to large user logs, or limited to small-scale qualitative surveys and analyses on limited public datasets such as Enron ...
We use our approach to experiment with various ranking functions and quality degradation to measure how users behave under different conditions, and conduct analysis across various email types and attributes ...
Here, we review the relevant studies, including those that focus on user behavior in web search tasks, user behavior and characterization on email tasks, crowdsourcing and gamification, and ranking for ...
doi:10.1145/3308558.3313450
dblp:conf/www/MackenzieGQAS19
fatcat:taerzdxdebbohl53n3wfd6qk3a
Reply With
2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management - CIKM '17
Analysis of an enterprise email corpus reveals that 35% of the time when users include these items as part of their response, the attachable item is already present in their inbox or sent folder. ...
A modern email client can proactively retrieve relevant attachable items from the user's past emails based on the context of the current conversation, and recommend them for inclusion, to reduce the time ...
The first author was supported, before and after his employment at Microsoft, by the Bloomberg Research Grant program and the Google Faculty Research Award scheme. ...
doi:10.1145/3132847.3132979
dblp:conf/cikm/GyselMVRKGC17
fatcat:76gem77znbdwlmwk7ugfnhz444
Most liked, fewest friends
2014
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing - CSCW '14
First, a factor analysis revealed that most variance of social media usage is explained by commenting and 'liking' behaviors while other usage can be characterized as patterns of distinct tool usage. ...
Enterprise social media can provide visibility of users' actions and thus has the potential to reveal insights about users in the organization. ...
ACKNOWLEDGMENTS We thank Judy Olson, Cory Knobel, Bart Knijnenburg and Xinru Page for their valuable comments. ...
doi:10.1145/2531602.2531662
dblp:conf/cscw/MarkGKJ14
fatcat:76ory2hihbhp3jdwvo3uajgice
Enterprise Microblogging
2010
Wirtschaftsinformatik
When marketing Enterprise Microblogging to businesses, one of the key features of the service seems to act as a main barrier: Twitter as an open platform is largely shaped by the interest and behavior ...
Much like other communication and collaboration systems, EMB platforms are characterized by a form of openness which is best described by the German word "Nutzungsoffenheit". ...
doi:10.1007/s11576-010-0246-y
fatcat:iyjk7khwqvh45c4onngnhpidui
Enterprise Microblogging
2010
Business & Information Systems Engineering
When marketing Enterprise Microblogging to businesses, one of the key features of the service seems to act as a main barrier: Twitter as an open platform is largely shaped by the interest and behavior ...
Much like other communication and collaboration systems, EMB platforms are characterized by a form of openness which is best described by the German word "Nutzungsoffenheit". ...
doi:10.1007/s12599-010-0129-1
fatcat:urrx2zxacbejjo63bjk7hb7dk4
Studying the Adoption of Mail2Tag: an Enterprise2.0 Tool for Sharing
[chapter]
2011
ECSCW 2011: Proceedings of the 12th European Conference on Computer Supported Cooperative Work, 24-28 September 2011, Aarhus Denmark
The Mail2Tag system leverages existing practices around enterprise email to move relevant information out from individual inboxes. ...
In this way no changes to the email client are required for users to participate in the system and information is routed based on individual need, while the amount of information noise is reduced. ...
The Mail2Tag System While email remains the channel of choice in the enterprise, keeping email interesting and relevant, reducing the amount of information noise, and enabling efficient reuse are growing ...
doi:10.1007/978-0-85729-913-0_3
dblp:conf/ecscw/NelsonCCN11
fatcat:yw4d75amffffxhrhxomqomau5q
Understanding affect in the workplace via social media
2013
Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13
We present three analyses of emotional expression among employees, based on literature in organizational behavior: its relationship to (1) exogenous/lifestyle and endogenous workplace factors, (2) geography ...
and (3) organizational structure. ...
ACKNOWLEDGMENTS The authors would like to thank Jonathan Grudin for thorough and helpful comments and feedback on early drafts of the paper. ...
doi:10.1145/2441776.2441812
dblp:conf/cscw/ChoudhuryC13
fatcat:jcatzbye7jctlkgkaz4oynp34i
Gossip
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17
We identify a set of effective features extracted from email threads, users participating in the discussions, and content keywords, to infer malicious domains from mailing lists, without the need to actually ...
To defend against Internet attacks and scams, operators widely use blacklisting to detect and block malicious domain names and IP addresses. ...
A key question is: what features best characterize a malicious domain? We explore the properties of the discussion behavior and content in the mailing lists. ...
doi:10.1145/3052973.3053017
dblp:conf/ccs/HuangHILFKV17
fatcat:yhuimpcoynebbia3zxxwnfsh4y
« Previous
Showing results 1 — 15 out of 4,311 results