skip to main content
10.1145/3159652.3159698acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
research-article

Unsubscription: A Simple Way to Ease Overload in Email

Published: 02 February 2018 Publication History

Abstract

The constant growth of machine-generated mail, which today consists of more than 90% of non-spam mail traffic, is a major contributor toinformation overload in email, where users become overwhelmed with a flood of messages from commercial entities. A large part of this traffic is often junk mail that the user would prefer not to receive. Surprisingly, nearly 95% of this traffic is in fact solicited by the users themselves in the form of subscriptions to mailing services. These subscriptions are many times unintentional. Although unsubscription option from such services is enforced by commercial laws, it is hardly actually used by users. We perform a large scale study ofunsubscribable traffic, namely, messages that provide unsubscription option to users. We consider users behavior over such traffic in Yahoo Web mail service, and demonstrate a significant gap between users low interest in this traffic, and their lack of active behavior in decreasing its load. We conjecture that the cause of this gap is the lack of an efficient and easily accessible mechanism that would help users to unsubscribe. We validate our conjecture with an online large scale experiment, where we provide users with a novel mail feature for managing unsubscribable traffic, based on personalized recommendations. The experiment demonstrates the imminent need that exists for such a mechanism.

References

[1]
D. Aberdeen, O. Pacovsky, and A. Slater. The learning behind gmail priority inbox. In NIPS 2010 Workshop on Learning on Cores, Clusters and Clouds. Elsevier, 2010.
[2]
C.-S. Act. Federal trade commission, 2003. https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business.
[3]
Q. Ai, S. Dumais, N. Craswell, and D. Liebling. Characterizing email search using large-scale behavioral logs and surveys. In Proceedings of the 26th International Conference on World Wide Web, pages 1511--1520. ACM, 2017.
[4]
N. Ailon, Z. S. Karnin, E. Liberty, and Y. Maarek. Threading machine generated email. In Proceedings of the sixth ACM international conference on Web search and data mining, WSDM '13, pages 405--414. ACM, 2013.
[5]
I. Alberts and D. Forest. Email pragmatics and automatic classification: A study in the organizational context. In Journal of the Association for Information Science and Technology, volume 63, pages 904--922. John Wiley & Sons, Inc., 2012.
[6]
N. Avigdor-Elgrabli, M. Cwalinski, D. D. Castro, I. Gamzu, I. Grabovitch-Zuyev, L. Lewin-Eytan, and Y. Maarek. Structural clustering of machine-generated mail. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management, pages 217--226, 2016.
[7]
V. Bellotti, N. Ducheneaut, M. Howard, and I. Smith. Taking email to task: The design and evaluation of a task management centered email tool. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '03, pages 345--352. ACM, 2003.
[8]
M. Bendersky, X. Wang, D. Metzler, and M. Najork. Learning from user interactions in personal search via attribute parameterization. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, WSDM '17, pages 791--799. ACM, 2017.
[9]
D. Carmel, G. Halawi, L. Lewin-Eytan, Y. Maarek, and A. Raviv. Rank by time or by relevance?: Revisiting email search. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, CIKM '15, pages 283--292. ACM, 2015.
[10]
D. Carmel, L. Lewin-Eytan, A. Libov, Y. Maarek, and A. Raviv. The demographics of mail search and their application to query suggestion. In Proceedings of the 26th International Conference on World Wide Web, WWW '17. ACM, 2017.
[11]
D. Carmel, L. Lewin-Eytan, A. Libov, Y. Maarek, and A. Raviv. Promoting relevant results in time-ranked mail search. In Proceedings of the 26th International Conference on World Wide Web, WWW '17. ACM, 2017.
[12]
M. E. Cecchinato, A. Sellen, M. Shokouhi, and G. Smyth. Finding email in a multi-account, multi-device world. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI '16, pages 1200--1210, 2016.
[13]
L. A. Dabbish and R. E. Kraut. Email overload at work: An analysis of factors associated with email strain. In Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, CSCW '06, pages 431--440. ACM, 2016.
[14]
L. A. Dabbish, R. E. Kraut, S. Fussell, and S. Kiesler. Understanding email use: Predicting action on a message. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, pages 691--700. ACM, 2005.
[15]
D. Di Castro, Z. Karnin, L. Lewin-Eytan, and Y. Maarek. You've got mail, and here is what you could do with it!: Analyzing and predicting actions on email messages. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM '16, pages 307--316. ACM, 2016.
[16]
D. Di Castro, L. Lewin-Eytan, Y. Maarek, R. Wolff, and E. Zohar. Enforcing k-anonymity in web mail auditing. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM '16, pages 327--336. ACM, 2016.
[17]
M. Dredze, T. Brooks, J. Carroll, J. Magarick, J. Blitzer, and F. Pereira. Intelligent email: Reply and attachment prediction. In Proceedings of the 13th International Conference on Intelligent User Interfaces, IUI '08, pages 321--324, Canary Islands, Spain, 2008.
[18]
M. Grbovic, G. Halawi, Z. Karnin, and Y. Maarek. How many folders do you really need? classifying email into a handful of categories. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM '14, pages 869--878. ACM, 2014.
[19]
C. Grevet, D. Choi, D. Kumar, and E. Gilbert. Overload is overloaded: Email in the age of gmail. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '14, pages 793--802. ACM, 2016.
[20]
J. Gwizdka. Email task management styles: The cleaners and the keepers. In CHI '04 Extended Abstracts on Human Factors in Computing Systems, CHI EA '04, pages 1235--1238. ACM, 2004.
[21]
R. Internet Engineering Task Force. The use of urls as meta-syntax for core mail list commands and their transport through message header fields, July 1998. https://tools.ietf.org/html/rfc2369.
[22]
R. Internet Engineering Task Force. List-id: A structured field and namespace for the identification of mailing lists, March 2001. https://tools.ietf.org/html/rfc2919.
[23]
R. Internet Engineering Task Force. Signaling one-click functionality for list email headers, January 2017. https://tools.ietf.org/html/rfc8058.
[24]
S. Kiritchenko and S. Matwin. Email classification with co-training. In Center for Advanced Studies on Collaborative Research, CASCON '11, pages 301--312, 2011.
[25]
B. Klimt and Y. Yang. The enron corpus: A new dataset for email classification research. In Machine Learning: ECML 2004: 15th European Conference on Machine Learning, Proceedings, pages 217--226, 2004.
[26]
F. Kooti, L. M. Aiello, M. Grbovic, K. Lerman, and A. Mantrach. Evolution of conversations in the age of email overload. In Proceedings of the 24th International Conference on World Wide Web, WWW '15, pages 603--613, 2015.
[27]
G. Lab. Why do people subscribe to email newsletters?, Mars 2015. https://lab.getapp.com/new-research-getdata-why-do-people-subscribe-to-email-newsletters.
[28]
J. Langford, L. Li, and A. Strehl. Vowpal wabbit online learning project, 2007. Technical report, http://hunch.net.
[29]
J. Langford, L. Li, and T. Zhang. Sparse online learning via truncated gradient. Journal of Machine Learning Research, 10:777--801, 2009.
[30]
K. Narang, S. T. Dumais, N. Craswell, D. Liebling, and Q. Ai. Large-scale analysis of email search and organizational strategies. In Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, CHIIR '17, pages 215--223. ACM, 2017.
[31]
B. On, E. Lim, J. Jiang, A. Purandare, and L. Teow. Mining interaction behaviors for email reply order prediction. In Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and Mining, ASONAM '10, pages 306--310. IEEE, 2010.
[32]
A. Qadir, M. Gamon, P. Pantel, and A. H. Awadallah. Activity modeling in email. In Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT '16, pages 1452--1462, 2016.
[33]
S. Radicati and J. Levenstein. Email market, 2015--2019, Nov 2015. http://www.radicati.com/wp/wp-content/uploads/2015/07/Email-Market-2015--2019-Executive-Summary.pdf.
[34]
S. Radicati and J. Levenstein. Email market, 2017--2021, Nov 2017. http://www.radicati.com/wp/wp-content/uploads/2017/01/Email-Statistics-Report-2017--2021-Executive-Summary.pdf.
[35]
M. Sappelli, S. Verberne, and W. Kraaij. Combining textual and non-textual features for e-mail importance estimation. In Proceedings of the 25th Benelux Conference on Articial Intelligence, pages 168--174. IBM Press, 2013.
[36]
A. Taiwo, Z. Shikun, and K. Rinat. Applying machine learning techniques for e-mail management: solution with intelligent e-mail reply prediction. Journal of Engineering and Technology Research, 1)7):143--151, 10 2009.
[37]
B. Wang, M. Ester, J. Bu, Y. Zhu, Z. Guan, and D. Cai. Which to view: Personalized prioritization for broadcast emails. In Proceedings of the 25th International Conference on World Wide Web, WWW '16, pages 1181--1190, 2016.
[38]
B. Wang, M. Ester, Y. Liao, J. Bu, Y. Zhu, Z. Guan, and D. Cai. The million domain challenge: Broadcast email prioritization by cross-domain recommendation. In Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '16, pages 1895--1904. ACM, 2016.
[39]
J. B. Wendt, M. Bendersky, L. Garcia-Pueyo, V. Josifovski, B. Miklos, and I. Krka. Hierarchical label propagation and discovery for machine generated email. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM '16, 2016.
[40]
S. Whittaker and C. L. Sidner. Email overload: Exploring personal information management of email. In Conference on Human Factors in Computing Systems: Common Ground, CHI, pages 276--283, 1996.
[41]
L. Yang, S. T. Dumais, P. N. Bennett, and A. H. Awadallah. Characterizing and predicting enterprise email reply behavior. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '17, pages 235--244. ACM, 2017.

Cited By

View all
  • (2020)Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted EmailProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376165(1-12)Online publication date: 21-Apr-2020

Index Terms

  1. Unsubscription: A Simple Way to Ease Overload in Email

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WSDM '18: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining
    February 2018
    821 pages
    ISBN:9781450355810
    DOI:10.1145/3159652
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 February 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    • Honorable Mention

    Author Tags

    1. machine-generated mail
    2. mail mining
    3. unsubscription recommendations

    Qualifiers

    • Research-article

    Conference

    WSDM 2018

    Acceptance Rates

    WSDM '18 Paper Acceptance Rate 81 of 514 submissions, 16%;
    Overall Acceptance Rate 498 of 2,863 submissions, 17%

    Upcoming Conference

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)26
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted EmailProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376165(1-12)Online publication date: 21-Apr-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media