Filters








4,457 Hits in 5.7 sec

Characterizing and Predicting Enterprise Email Reply Behavior

Liu Yang, Susan T. Dumais, Paul N. Bennett, Ahmed Hassan Awadallah
2017 Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR '17  
In this paper, we extend previous work on predicting email reply behavior by looking at enterprise se ings and considering more than dyadic communications.  ...  We characterize the in uence of various factors such as email content and metadata, historical interaction features and temporal features on email reply behavior.  ...  In this paper, we address this gap by characterizing and predicting reply behaviors in enterprise emails, where we consider both dyadic conversations and group discussions.  ... 
doi:10.1145/3077136.3080782 dblp:conf/sigir/0019DBA17 fatcat:pijsz57xjffbbmwpuhw62cvyl4

Behavioral profiles for advanced email features

Thomas Karagiannis, Milan Vojnovic
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend on?  ...  We highlight various novel threshold behaviors and provide support for existing hypotheses such as that of the least-effort reply.  ...  Specifically, we present results of an extensive study of "behavioral" profiles that characterize users, their actions in processing emails, and properties of the exchanged emails.  ... 
doi:10.1145/1526709.1526805 dblp:conf/www/KaragiannisV09 fatcat:pwfxpv5ov5dbzpmezx635vd23y

Context-Aware Intent Identification in Email Conversations

Wei Wang, Saghar Hosseini, Ahmed Hassan Awadallah, Paul N. Bennett, Chris Quirk
2019 Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR'19  
We use a large scale publicly available email dataset to characterize intents in enterprise email and propose methods for improving intent identification in email conversations.  ...  People spend a significant amount of time sending, reading, searching and responding to email in order to manage tasks, exchange information, etc.  ...  [29] studied the problem of email reply order prediction by mining interaction behaviors. Kooti et al. [23] characterized the replying behavior in conversations for pairs of users.  ... 
doi:10.1145/3331184.3331260 dblp:conf/sigir/WangHABQ19 fatcat:srdh4qepdrdo7gqjgxifambxpu

Characterizing and Predicting Email Deferral Behavior

Bahareh Sarrafzadeh, Ahmed Hassan Awadallah, Christopher H. Lin, Chia-Jung Lee, Milad Shokouhi, Susan T. Dumais
2019 Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining - WSDM '19  
In this paper, through qualitative interviews and a large-scale log analysis, we study when and what enterprise email users tend to defer.  ...  We found that users are more likely to defer emails when handling them involves replying, reading carefully, or clicking on links and attachments.  ...  They characterized the influence of various factors such as email content and metadata, historical interaction features and temporal features on email reply behavior.  ... 
doi:10.1145/3289600.3291028 dblp:conf/wsdm/SarrafzadehALLS19 fatcat:eub4jult3fbm7fdsvrzbg3rxxq

Characterizing Reading Time on Enterprise Emails [article]

Xinyi Li, Chia-Jung Lee, Milad Shokouhi, Susan Dumais
2020 arXiv   pre-print
In this paper, we characterize how users read their enterprise emails, and reveal the various contextual factors that impact reading time.  ...  Overall, our study is the first to characterize enterprise email reading time on a very large scale.  ...  In this paper, we characterize how users read their enterprise emails, and reveal the various contextual factors that impact reading time.  ... 
arXiv:2001.00802v1 fatcat:5vx2y7tohngajaolsd4hco3k5e

Characterizing and Supporting Question Answering in Human-to-Human Communication

Xiao Yang, Ahmed Hassan Awadallah, Madian Khabsa, Wei Wang, Miaosen Wang
2018 The 41st International ACM SIGIR Conference on Research & Development in Information Retrieval - SIGIR '18  
We study a large scale publicly available email dataset to characterize information exchange via questions and answers in enterprise email.  ...  In this paper, we focus on information exchange over enterprise email in the form of questions and answers.  ...  [56] also studied reply behavior focusing on enterprise email. Recently, Lin et al.  ... 
doi:10.1145/3209978.3210046 dblp:conf/sigir/YangAKWW18 fatcat:hgc3o76qlbelfjkwj63ncxxife

The Lifetime of Email Messages

Tarfah Alrashed, Ahmed Hassan Awadallah, Susan Dumais
2018 Proceedings of the 2018 Conference on Human Information Interaction&Retrieval - CHIIR '18  
attachments), and the strategies they use to go back to these emails.  ...  Our findings have implications for designing email clients and intelligent agents that support both short-and long-term revisitation patterns.  ...  We focus on investigating enterprise email behavior, since accessing email makes up a large proportion of users' information seeking efforts within enterprises [16] .  ... 
doi:10.1145/3176349.3176398 dblp:conf/chiir/AlrashedAD18 fatcat:xur5ir7wijf3vfq54fbqjospfe

Exploring User Behavior in Email Re-Finding Tasks

Joel Mackenzie, Kshitiz Gupta, Fang Qiao, Ahmed Hassan Awadallah, Milad Shokouhi
2019 The World Wide Web Conference on - WWW '19  
However, previous studies on email have been exclusive to enterprises with access to large user logs, or limited to small-scale qualitative surveys and analyses on limited public datasets such as Enron  ...  We use our approach to experiment with various ranking functions and quality degradation to measure how users behave under different conditions, and conduct analysis across various email types and attributes  ...  Here, we review the relevant studies, including those that focus on user behavior in web search tasks, user behavior and characterization on email tasks, crowdsourcing and gamification, and ranking for  ... 
doi:10.1145/3308558.3313450 dblp:conf/www/MackenzieGQAS19 fatcat:taerzdxdebbohl53n3wfd6qk3a

Reply With

Christophe Van Gysel, Bhaskar Mitra, Matteo Venanzi, Roy Rosemarin, Grzegorz Kukla, Piotr Grudzien, Nicola Cancedda
2017 Proceedings of the 2017 ACM on Conference on Information and Knowledge Management - CIKM '17  
Analysis of an enterprise email corpus reveals that 35% of the time when users include these items as part of their response, the attachable item is already present in their inbox or sent folder.  ...  A modern email client can proactively retrieve relevant attachable items from the user's past emails based on the context of the current conversation, and recommend them for inclusion, to reduce the time  ...  The first author was supported, before and after his employment at Microsoft, by the Bloomberg Research Grant program and the Google Faculty Research Award scheme.  ... 
doi:10.1145/3132847.3132979 dblp:conf/cikm/GyselMVRKGC17 fatcat:76gem77znbdwlmwk7ugfnhz444

Most liked, fewest friends

Gloria Mark, Ido Guy, Shiri Kremer-Davidson, Michal Jacovi
2014 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing - CSCW '14  
First, a factor analysis revealed that most variance of social media usage is explained by commenting and 'liking' behaviors while other usage can be characterized as patterns of distinct tool usage.  ...  Enterprise social media can provide visibility of users' actions and thus has the potential to reveal insights about users in the organization.  ...  ACKNOWLEDGMENTS We thank Judy Olson, Cory Knobel, Bart Knijnenburg and Xinru Page for their valuable comments.  ... 
doi:10.1145/2531602.2531662 dblp:conf/cscw/MarkGKJ14 fatcat:76ory2hihbhp3jdwvo3uajgice

Enterprise Microblogging

Kai Riemer, Alexander Richter, Martin Bohringer
2010 Wirtschaftsinformatik  
When marketing Enterprise Microblogging to businesses, one of the key features of the service seems to act as a main barrier: Twitter as an open platform is largely shaped by the interest and behavior  ...  Much like other communication and collaboration systems, EMB platforms are characterized by a form of openness which is best described by the German word "Nutzungsoffenheit".  ... 
doi:10.1007/s11576-010-0246-y fatcat:iyjk7khwqvh45c4onngnhpidui

Enterprise Microblogging

Kai Riemer, Alexander Richter, Martin Bohringer
2010 Business & Information Systems Engineering  
When marketing Enterprise Microblogging to businesses, one of the key features of the service seems to act as a main barrier: Twitter as an open platform is largely shaped by the interest and behavior  ...  Much like other communication and collaboration systems, EMB platforms are characterized by a form of openness which is best described by the German word "Nutzungsoffenheit".  ... 
doi:10.1007/s12599-010-0129-1 fatcat:urrx2zxacbejjo63bjk7hb7dk4

Studying the Adoption of Mail2Tag: an Enterprise2.0 Tool for Sharing [chapter]

Les Nelson, Gregorio Convertino, H. Chi, Rowan Nairn
2011 ECSCW 2011: Proceedings of the 12th European Conference on Computer Supported Cooperative Work, 24-28 September 2011, Aarhus Denmark  
The Mail2Tag system leverages existing practices around enterprise email to move relevant information out from individual inboxes.  ...  In this way no changes to the email client are required for users to participate in the system and information is routed based on individual need, while the amount of information noise is reduced.  ...  The Mail2Tag System While email remains the channel of choice in the enterprise, keeping email interesting and relevant, reducing the amount of information noise, and enabling efficient reuse are growing  ... 
doi:10.1007/978-0-85729-913-0_3 dblp:conf/ecscw/NelsonCCN11 fatcat:yw4d75amffffxhrhxomqomau5q

Understanding affect in the workplace via social media

Munmun De Choudhury, Scott Counts
2013 Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13  
We present three analyses of emotional expression among employees, based on literature in organizational behavior: its relationship to (1) exogenous/lifestyle and endogenous workplace factors, (2) geography  ...  and (3) organizational structure.  ...  ACKNOWLEDGMENTS The authors would like to thank Jonathan Grudin for thorough and helpful comments and feedback on early drafts of the paper.  ... 
doi:10.1145/2441776.2441812 dblp:conf/cscw/ChoudhuryC13 fatcat:jcatzbye7jctlkgkaz4oynp34i

Gossip

Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
We identify a set of effective features extracted from email threads, users participating in the discussions, and content keywords, to infer malicious domains from mailing lists, without the need to actually  ...  To defend against Internet attacks and scams, operators widely use blacklisting to detect and block malicious domain names and IP addresses.  ...  A key question is: what features best characterize a malicious domain? We explore the properties of the discussion behavior and content in the mailing lists.  ... 
doi:10.1145/3052973.3053017 dblp:conf/ccs/HuangHILFKV17 fatcat:yhuimpcoynebbia3zxxwnfsh4y
« Previous Showing results 1 — 15 out of 4,457 results