Access the full text.
Sign up today, get DeepDyve free for 14 days.
Laura Dabbish, Gina Venolia, Jonathan Cadiz (2003)
Marked for deletion: an analysis of email dataCHI '03 Extended Abstracts on Human Factors in Computing Systems
E. Horvitz, Andy Jacobs, D. Hovel (1999)
Attention-Sensitive AlertingArXiv, abs/1301.6707
Olle Bälter (2000)
Keystroke level analysis of email message organizationProceedings of the SIGCHI conference on Human Factors in Computing Systems
F. Flores, M. Graves, Brad Hartfield, T. Winograd (1988)
Computer systems and the design of organizational interactionACM Trans. Inf. Syst., 6
B. Nardi, S. Whittaker, E. Isaacs, M. Creech, Jeff Johnson, J. Hainsworth (2002)
Integrating communication and information through ContactMapCommun. ACM, 45
R. Kraut (2003)
Media Use in a Global Corporation: Electronic Mail and Organizational Knowledge
Suhayya Abu-Hakima, Connie McFarland, J. Meech (2001)
An agent-based system for email highlighting
Y. Lashkari, M. Metral, P. Maes (1994)
Collaborative Interface Agents
R. Panko (1992)
Managerial Communication PatternsJournal of Organizational Computing and Electronic Commerce, 2
Joshua Tyler, John Tang (2003)
When Can I Expect an Email Response? A Study of Rhythms in Email Usage
S. Whittaker, C. Sidner (1996)
Email overload: exploring personal information management of emailProceedings of the SIGCHI Conference on Human Factors in Computing Systems
M. Sumner (1988)
The impact of electronic mail on managerial and organizational communications
Gina Venolia, Laura Dabbish, Jonathan Cadiz, Anoop Gupta (2001)
Supporting Email Workflow
S. Whittaker, Julia Hirschberg (2001)
The character, value, and management of personal paper archivesACM Trans. Comput. Hum. Interact., 8
L. Sproull, S. Kiesler (1991)
Connections: New Ways of Working in the Networked Organization
B. Partridge (1974)
The Nature of Managerial WorkJournal of the Operational Research Society, 25
C. Neuwirth, James Morris, S. Regli, Ravinder Chandhok, G. Wenger (1998)
Envisioning communication: task-tailorable representations of communication in asynchronous work
V. Bellotti, Nicolas Ducheneaut, Mark Howard, Ian Smith (2003)
Taking email to task: the design and evaluation of a task management centered email tool
M. Sahami, S. Dumais, D. Heckerman, E. Horvitz (1998)
A Bayesian Approach to Filtering Junk E-Mail
W. Mackay (1988)
Diversity in the use of electronic mail: a preliminary inquiryACM Trans. Inf. Syst., 6
T. Malone, K. Grant, F. Turbak, S. Brobst, Michael Cohen (1987)
Intelligent information-sharing systemsCommun. ACM, 30
Nicolas Ducheneaut, V. Bellotti (2001)
E-mail as habitat: an exploration of embedded personal information managementInteractions, 8
William Cohen, Vitor Carvalho, Tom Mitchell (2004)
Learning to Classify Email into “Speech Acts”
Vivisimo Clustering Engine
Thomas Jackson, R. Dawson, D. Wilson (2001)
The cost of email interruptionJournal of Systems and Information Technology, 5
Gary Boone (1998)
Concept features in Re:Agent, an intelligent Email agent
Firm bans email at work
CHI 2005 « ¬ PAPERS: Email and Security April 2 7 « ¬Portland, Oregon, USA Understanding Email Use: Predicting Action on a Message Laura A. Dabbish Robert E. Kraut Susan Fussell Sara Kiesler Human-Computer Interaction Institute School of Computer Science Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 {dabbish, robert.kraut, susan.fussell, kiesler}@cs.cmu.edu application designers have been developing more efficient search engines [25], advanced interfaces for navigating contacts [17], and interfaces designed around task management [3]. In addition, researchers have attempted to characterize and develop tools to combat unsolicited commercial email (spam) [4, 20]. Most previous empirical research on email management describes at a general level the functions email serves and the problems associated with email overload. For example, several studies have focused on how people save their email, what purposes it serves for them, and its importance as a tool for coordination in the workplace [6, 7, 12, 14, 21, 22, 24, 26, 27]. In the current study, we build on this previous work by looking carefully at the decision rules people use in dealing with particular messages. Few previous studies have examined, using behavioral data, how people choose to reply to email messages or save or
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.