skip to main content
research-article

Configuring Audiences: A Case Study of Email Communication

Published: 29 May 2020 Publication History

Abstract

When people communicate with each other, their choice of what to say is tied to their perceptions of the audience. For many communication channels, people have some ability to explicitly specify their audience members and the different roles they can play. While existing accounts of communication behavior have largely focused on how people tailor the content of their messages, we focus on the configuring of the audience as a complementary family of decisions in communication. We formulate a general description of audience configuration choices, highlighting key aspects of the audience that people could configure to reflect a range of communicative goals. We then illustrate these ideas via a case study of email usage-a realistic domain where audience configuration choices are particularly fine-grained and explicit in how email senders fill the To and Cc address fields. In a large collection of enterprise emails, we explore how people configure their audiences, finding salient patterns relating a sender's choice of configuration to the types of participants in the email exchange, the content of the message, and the nature of the subsequent interactions. Our formulation and findings show how analyzing audience configurations can enrich and extend existing accounts of communication behavior, and frame research directions on audience configuration decisions in communication and collaboration.

References

[1]
Sakhar Alkhereyf and Owen Rambow. 2017. Work Hard, Play Hard : Email Classification on the Avocado and Enron Corpora. In Proceedings of TextGraphs.
[2]
Tim Althoff, Cristian Danescu-Niculescu-Mizil, and Dan Jurafsky. 2014. How to Ask for a Favor : A Case Study on the Success of Altruistic Requests. In Proceedings of ICWSM.
[3]
John L. Austin. 1975. How to Do Things with Words.
[4]
Brandy L. Aven. 2015. The Paradox of Corrupt Networks : An Analysis of Organizational Crime at Enron. Organization Science (2015).
[5]
Natalya N. Bazarova and Yoon Hyung Choi. 2014. Self-Disclosure in Social Media : Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites. Journal of Communication (2014).
[6]
Allan Bell. 1984. Language Style as Audience Design. Language in Society (1984).
[7]
Michael S. Bernstein, Eytan Bakshy, Moira Burke, and Brian Karrer. 2013. Quantifying the Invisible Audience in Social Networks. In Proceedings of CHI.
[8]
Penelope Brown and Stephen C Levinson. 1987. Politeness: Some Universals in Language Usage.
[9]
Anne Marie Bülow, Joyce Y. H. Lee, and Niki Panteli. 2019. Distant Relations : The Affordances of Email in Interorganizational Conflict. International Journal of Business Communication (2019).
[10]
Ronald S. Burt. 2004. Structural Holes and Good Ideas. Amer. J. Sociology (2004).
[11]
Kristin Byron. 2008. Carrying Too Heavy a Load ? The Communication and Miscommunication of Emotion by Email. The Academy of Management Review (2008).
[12]
Vitor Carvalho and William Cohen. 2006. Improving “Email Speech Acts ” Analysis via N -Gram Selection. In Proceedings of the ACTS Workshop.
[13]
Vitor R. Carvalho. 2011. Modeling Intention in Email - Speech Acts, Information Leaks and Recommendation Models. In Studies in Computational Intelligence.
[14]
Justine Cassell and Dona Tversky. 2005. The Language of Online Intercultural Community Formation. Journal of Computer-Mediated Communication (2005).
[15]
Jonathan P Chang, Justin Cheng, and Cristian Danescu-Niculescu-Mizil. 2020. Don't Let Me Be Misunderstood :Comparing Intentions and Perceptions in Online Discussions. In Proceedings of WWW.
[16]
Herbert H Clark and Thomas B Carlson. 1982. Hearers and Speech Acts. Language (1982).
[17]
Herbert H. Clark and E. Schaefer. 1987. Concealing One 's Meaning from Overhearers. Journal of Memory and Language (1987).
[18]
William W. Cohen, Vitor R. Carvalho, and Tom M. Mitchell. 2004. Learning to Classify Email into “Speech Acts ”. In Proceedings of EMNLP.
[19]
James S. Coleman. 1988. Social Capital in the Creation of Human Capital. Amer. J. Sociology (1988).
[20]
Simon Corston-Oliver, Eric Ringger, Michael Gamon, and Richard Campbell. 2004. Integration of Email and Task Lists. (2004).
[21]
Cristian Danescu-Niculescu-Mizil, Moritz Sudhof, Dan Jurafsky, Jure Leskovec, and Christopher Potts. 2013. A Computational Approach to Politeness with Application to Social Factors. In Proceedings of ACL.
[22]
Michal Danilák. 2020. Langdetect. https://github.com/Mimino666/langdetect.
[23]
Jana Diesner, Terrill L. Frantz, and Kathleen M. Carley. 2005. Communication Networks from the Enron Email Corpus “It 's Always About the People. Enron Is No Different ”. Computational and Mathematical Organization Theory (2005).
[24]
Gabriel Doyle, Amir Goldberg, Sameer Srivastava, and Michael Frank. 2017. Alignment at Work : Using Language to Distinguish the Internalization and Self -Regulation Components of Cultural Fit in Organizations. In Proceedings of ACL.
[25]
Nicolas Fay, Simon Garrod, and Jean Carletta. 2000. Group Discussion as Interactive Dialogue or as Serial Monologue: The Influence of Group Size. Psychological Science (2000).
[26]
Casey Fiesler, Munmun De Choudhury, Eric Gilbert, Michaelanne Dye, Jessica L. Feuston, Chaya Hiruncharoenvate, C.J. Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, and Amy S. Bruckman. 2017. What (or Who ) Is Public ?: Privacy Settings and Social Media Content Sharing. In Proceedings of CSCW.
[27]
Eric Gilbert. 2012. Phrases That Signal Workplace Hierarchy. In Proceedings of CSCW.
[28]
Eric Gilbert and Karrie Karahalios. 2009. Predicting Tie Strength with Social Media. In Proceedings of CHI.
[29]
Erving Goffman. 1959. The Presentation of Self in Everyday Life.
[30]
Erving Goffman. 1979. Footing. Semiotica (1979).
[31]
Sukeshini A. Grandhi and Lyndsey Lanagan-Leitzel. 2016. To Reply or To Reply All : Understanding Replying Behavior in Group Email Communication. In Proceedings of CSCW.
[32]
Mark S. Granovetter. 1973. The Strength of Weak Ties. Amer. J. Sociology (1973).
[33]
Catherine Grevet, David Choi, Debra Kumar, and Eric Gilbert. 2014. Overload Is Overloaded: Email in the Age of Gmail. In Proceedings of CHI.
[34]
Tessa Haesevoets, David De Cremer, Leander De Schutter, Jack McGuire, Yu Yang, Xie Jian, and Alain Van Hiel. 2019. Transparency and Control in Email Communication : The More the Supervisor Is Put in Cc the Less Trust Is Felt. Journal of Business Ethics (2019).
[35]
Mark Handel and James D Herbsleb. 2002. What Is Chat Doing in the Workplace ?. In Proceedings of CSCW.
[36]
Caroline Haythornthwaite. 2001. Exploring Multiplexity : Social Network Structures in a Computer-Supported Distance Learning Class. The Information Society (2001).
[37]
Matthew Honnibal and Ines Montani. 2020. spaCy: Natural Language Understanding with Bloom Embeddings, Convolutional Neural Networks and Incremental Parsing.
[38]
Eric J. Horvitz, Andy Jacobs, and David Hovel. 1999. Attention-Sensitive Alerting. In Proceedings of UAI.
[39]
Paula Jarzabkowski and David Seidl. 2008. The Role of Meetings in the Social Practice of Strategy. Organization Studies (2008).
[40]
Ian Johnson. 2013. Audience Design And Communication Accommodation Theory : Use Of Twitter By Welsh textendashEnglish Biliterates. In Social Media and Minority Languages : Convergence and the Creative Industries.
[41]
Ewa Kacewicz, James W. Pennebaker, Matthew Davis, Moongee Jeon, Arthur C, Ewa Kacewicz, James W. Pennebaker, Matthew Davis, Moongee Jeon, and Arthur C. Graesser. 2013. Pronoun Use Reflects Standings in Social Hierarchies. Journal of Language and Social Psychology (2013).
[42]
Bryan Klimt and Yiming Yang. 2004. Introducing the Enron Corpus. In CEAS.
[43]
Farshad Kooti, Luca Maria Aiello, Mihajlo Grbovic, Kristina Lerman, and Amin Mantrach. 2015. Evolution of Conversations in the Age of Email Overload. In Proceedings of WWW.
[44]
Gueorgi Kossinets and Duncan J. Watts. 2009. Origins of Homophily in an Evolving Social Network. Amer. J. Sociology (2009).
[45]
Robert E Kraut and Paul Attewell. 1996. Media Use in a Global Corporation : Electronic Mail and Organizational Knowledge. Culture of the Internet (1996).
[46]
Bibb Latané. 1981. The Psychology of Social Impact. American Psychologist (1981).
[47]
Yao Li, Xinning Gui, Yunan Chen, Heng Xu, and Alfred Kobsa. 2018. When SNS Privacy Settings Become Granular : Investigating Users ' Choices, Rationales, and Influences on Their Social Experience. In Proceedings of CSCW.
[48]
Eden Litt. 2012. Knock, Knock. Who's There ? The Imagined Audience. Journal of Broadcasting & Electronic Media (2012).
[49]
Yabing Liu and Krishna P Gummadi. 2011. Analyzing Facebook Privacy Settings : User Expectations vs. Reality. In Proceedings of IMC.
[50]
Xiao Ma, Jeff Hancock, and Mor Naaman. 2016. Anonymity, Intimacy and Self -Disclosure in Social Media. In Proceedings of CHI.
[51]
Ifigeneia Machili, Jo Angouri, and Nigel Harwood. 2019. `The Snowball of Emails We Deal With ': CCing in Multinational Companies. Business and Professional Communication Quarterly (2019).
[52]
Alice E. Marwick and danah boyd. 2010. I Tweet Honestly, I Tweet Passionately : Twitter Users, Context Collapse, and the Imagined Audience. New Media & Society (2010).
[53]
Andrew McCallum, Xuerui Wang, and Andrés Corrada-Emmanuel. 2007. Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email. Journal of Artificial Intelligence Research (2007).
[54]
Tanushree Mitra and Eric Gilbert. 2013. "Analyzing Gossip in Workplace Email" by Tanushree Mitra and Eric Gilbert, with Ching -Man Au Yeung as Coordinator. ACM SIGWEB Newsletter (2013).
[55]
Sean A. Munson, Karina Kervin, and Lionel P. Robert, Jr. 2014. Monitoring Email to Indicate Project Team Performance and Mutual Attraction. In Proceedings of CSCW. New York, NY, USA.
[56]
Bonnie A. Nardi, Steve Whittaker, and Erin Bradner. 2000. Interaction and Outeraction: Instant Messaging in Action. In Proceedings of CSCW.
[57]
Dong Nguyen, Dolf Trieschnigg, and Leonie Cornips. 2015. Audience and the Use of Minority Languages on Twitter. In Proceedings of ICWSM.
[58]
Doug Oard, William Webber, David Kirsch, and Sergey Golitsynskiy. 2015. Avocado Research Email Collection.
[59]
Jacob Palme. 1997. Common Internet Message Headers. https://tools.ietf.org/html/rfc2076.
[60]
Niki Panteli. 2002. Richness, Power Cues and Email Text. Information & Management (2002).
[61]
Soya Park, Amy X. Zhang, Luke S. Murray, and David R. Karger. 2019. Opportunities for Automating Email Processing: A Need -Finding Study. In Proceedings of CHI.
[62]
Umashanthi Pavalanathan and Jacob Eisenstein. 2015. Audience-Modulated Variation in Online Social Media. American Speech (2015).
[63]
Ellie Pavlick and Joel Tetreault. 2016. An Empirical Analysis of Formality in Online Communication. TACL (2016).
[64]
James W. Pennebaker, Cindy K. Chung, Joey Frazee, Gary M. Lavergne, and David I. Beaver. 2014. When Small Words Foretell Academic Success : The Case of College Admissions Essays. PLOS ONE (2014).
[65]
Vinodkumar Prabhakaran and Owen Rambow. 2013. Written Dialog and Social Power : Manifestations of Different Types of Power in Dialog Behavior. In Proceedings of IJCNLP.
[66]
Kristen Purcell. 2011. Search and Email Still Top the List of Most Popular Online Activities.
[67]
Mark T. Rivera, Sara B. Soderstrom, and Brian Uzzi. 2010. Dynamics of Dyads in Social Networks : Assortative, Relational, and Proximity Mechanisms. Annual Review of Sociology (2010).
[68]
Shane L. Rogers, Nicolas Fay, and Murray Maybery. 2013. Audience Design through Social Interaction during Group Discussion. PLOS ONE (2013).
[69]
Daniel M. Romero, Brian Uzzi, and Jon Kleinberg. 2016. Social Networks Under Stress. In Proceedings of WWW.
[70]
M. Sappelli, G. Pasi, S. Verberne, M. de Boer, and W. Kraaij. 2016. Assessing E-Mail Intent and Tasks in e-Mail Messages. Information Sciences (2016).
[71]
Bahareh Sarrafzadeh, Ahmed Hassan Awadallah, Christopher H. Lin, Chia-Jung Lee, Milad Shokouhi, and Susan T. Dumais. 2019. Characterizing and Predicting Email Deferral Behavior. In Proceedings of WSDM.
[72]
Joseph Schmitz and Janet Fulk. 1991. Organizational Colleagues, Media Richness, and Electronic Mail : A Test of the Social Influence Model of Technology Use. Communication Research (1991).
[73]
John R. Searle. 1976. A Classification of Illocutionary Acts. Language in Society (1976).
[74]
Georg Simmel. 1902. The Number of Members as Determining the Sociological Form of the Group. Amer. J. Sociology (1902).
[75]
Karianne Skovholt and Jan Svennevig. 2006. Email Copies in Workplace Interaction. Journal of Computer-Mediated Communication (2006).
[76]
Lee Sproull and Sara Kiesler. 1986. Reducing Social Context Cues: Electronic Mail in Organizational Communication. Management Science (1986).
[77]
Sameer B. Srivastava, Amir Goldberg, V. Govind Manian, and Christopher Potts. 2018. Enculturation Trajectories: Language, Cultural Adaptation, and Individual Outcomes in Organizations. Management Science (2018).
[78]
Yla R. Tausczik and James W. Pennebaker. 2010. The Psychological Meaning of Words : LIWC and Computerized Text Analysis Methods. Journal of Language and Social Psychology (2010).
[79]
Jenny Thomas. 1983. Cross-Cultural Pragmatic Failure. Applied Linguistics (1983).
[80]
Fernanda B. Viégas. 2005. Bloggers' Expectations of Privacy and Accountability : An Initial Survey. Journal of Computer-Mediated Communication (2005).
[81]
Wei Wang, Saghar Hosseini, Ahmed Hassan Awadallah, Paul N. Bennett, and Chris Quirk. 2019. Context-Aware Intent Identification in Email Conversations. In Proceedings of SIGIR.
[82]
Steve Whittaker, Victoria Bellotti, and Jacek Gwizdka. 2006. Email and PIM : Problems and Possibilities. Communications in the ACM (2006).
[83]
Steve Whittaker and Candace Sidner. 1996. Email Overload : Exploring Personal Information Management of Email. In Proceedings of CHI.
[84]
Shaomei Wu, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. 2011. Who Says What to Whom on Twitter. In Proceedings of WWW.
[85]
Diyi Yang and Robert E. Kraut. 2017. Persuading Teammates to Give : Systematic versus Heuristic Cues for Soliciting Loans. In Proceedings of CSCW.
[86]
Liu Yang, Susan T. Dumais, Paul N. Bennett, and Ahmed Hassan Awadallah. 2017. Characterizing and Predicting Enterprise Email Reply Behavior. In Proceedings of SIGIR.
[87]
Justine Zhang, Cristian Danescu-Niculescu-Mizil, Christina Sauper, and Sean J. Taylor. 2018. Characterizing Online Public Discussions Through Patterns of Participant Interactions. In Proceedings of CSCW.

Cited By

View all
  • (2025)P3ID: A Privacy-Preserving Person Identification Framework Towards Multi-Environments Based on Transfer LearningIEEE Transactions on Mobile Computing10.1109/TMC.2024.345994424:1(102-116)Online publication date: 1-Jan-2025
  • (2024)Room-scale Location Trace Tracking via Continuous Acoustic WavesACM Transactions on Sensor Networks10.1145/364913620:3(1-23)Online publication date: 13-Apr-2024
  • (2024)Form-From: A Design Space of Social Media SystemsProceedings of the ACM on Human-Computer Interaction10.1145/36410068:CSCW1(1-47)Online publication date: 26-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue CSCW1
CSCW
May 2020
1285 pages
EISSN:2573-0142
DOI:10.1145/3403424
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2020
Published in PACMHCI Volume 4, Issue CSCW1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. audience
  2. email
  3. social interaction

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)83
  • Downloads (Last 6 weeks)5
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2025)P3ID: A Privacy-Preserving Person Identification Framework Towards Multi-Environments Based on Transfer LearningIEEE Transactions on Mobile Computing10.1109/TMC.2024.345994424:1(102-116)Online publication date: 1-Jan-2025
  • (2024)Room-scale Location Trace Tracking via Continuous Acoustic WavesACM Transactions on Sensor Networks10.1145/364913620:3(1-23)Online publication date: 13-Apr-2024
  • (2024)Form-From: A Design Space of Social Media SystemsProceedings of the ACM on Human-Computer Interaction10.1145/36410068:CSCW1(1-47)Online publication date: 26-Apr-2024
  • (2024)Mitigating Barriers to Public Social Interaction with Meronymous CommunicationProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642241(1-26)Online publication date: 11-May-2024
  • (2023)IDIoT: Multimodal Framework for Ubiquitous Identification and Assignment of Human-Carried Wearable DevicesACM Transactions on Internet of Things10.1145/3579832Online publication date: 12-Jan-2023
  • (2023)HIPPOProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35703446:4(1-30)Online publication date: 11-Jan-2023
  • (2023)Side-lobe Can Know MoreProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35694986:4(1-34)Online publication date: 11-Jan-2023
  • (2023)GC-LocProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35694956:4(1-27)Online publication date: 11-Jan-2023
  • (2023)EarmonitorProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35694726:4(1-22)Online publication date: 11-Jan-2023
  • (2023)A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and ChallengesIEEE Communications Surveys & Tutorials10.1109/COMST.2023.327493425:3(1841-1876)Online publication date: 1-Jul-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media