skip to main content
10.1145/572020.572034acmconferencesArticle/Chapter ViewAbstractPublication PagesnordichiConference Proceedingsconference-collections
Article

Bifrost inbox organizer: giving users control over the inbox

Published:19 October 2002Publication History

ABSTRACT

Many email users, especially managers, receive too many email messages to read in the time available to them. The solutions available today often require programming skills on the part of the user to define rules for prioritizing messages or moving messages to folders. We propose a different approach: categorize messages in the inbox with predefined rules that do not require maintenance and are scalable to handle anything from 50 to thousands of messages.

References

  1. Arensburger & Rosenfeld (1995): To take arms against a sea of email. Communications of the ACM 38(3) pp 108-109.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bannon L. (1993): CSCW: An Initial Exploration. Scandinavian Journal of Information Systems, vol. 5, pp 3-24.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Boone G. (1998): Concept features in Re: Agent, an Intelligent email agent. Proceedings of the second Annual Conference on Autonomous Agents, pp. 141-148.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Borenstein N. & Thyberg C. (1991): Power, ease of use and cooperative work in a practical multimedia message system. International Journal of Man-Machine Studies, vol. 34, pp 229-259.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bälter O. (1997): Strategies for organising email messages. In proceedings of HCI'97, Springer, London, United Kingdom, pp 21-38.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bälter O. (1998): Electronic Mail in a Working Context. Doctoral Thesis, TRITA-NA-9820, Royal Institute of Technology, Stockholm, Sweden.]]Google ScholarGoogle Scholar
  7. Bälter O. & Sidner C. (2000): Bifrost Inbox Organizer: Giving users control over the inbox Technical Report #: 00-08. IBM Watson Research Center.]]Google ScholarGoogle Scholar
  8. Bälter O. (2000): Keystroke Level Analysis of Email Message Organization. In Proceedings of CHI'2000, pp 105-112.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hiltz S.R. & Turoff M. (1985): Structuring computer mediated communication systems to avoid information overload. In Communications of the ACM, vol. 28, no 7, pp 680-689.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Horvitz E., Jacobs A. & Hovel D. (1999): Attention-Sensitive Alerting. In Proceedings of UAI'99, Conference on Uncertainty and Artificial Intelligence, Stockholm, Sweden, July 1999. Morgan Kaufmann: San Francisco, pp 305-313.]]Google ScholarGoogle Scholar
  11. Lantz A. (1996): Computer Mediated Communication in a Work Context: an Interdisciplinary Approach. Stockholm University, Dept. of Psychology, Stockholm, Sweden. ISBN 91-7153-519-5.]]Google ScholarGoogle Scholar
  12. Losee R. (1989): Minimising information overload: the ranking of electronic messages. Journal of Information Science, vol. 15, pp 179-189.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mackay W. (1988): More Than Just a Communication System: Diversity in the use of Electronic Mail. In Proceedings of CSCW'88, pp 215-218.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Maes P. (1993): Learning Interface Agents. ACM-SIGCHI International Workshop on Intelligent User Interfaces.]]Google ScholarGoogle Scholar
  15. Maes P. (1997): Agents that Reduce Work and Information Overload. In Bradshaw, J. (Ed.) Software Agents, ISBN 0262522349. AAAI/MIT Press, pp 145-164.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Malone T. (1983): How do people organise their desks? Implications for the design of office information systems. ACM Transactions on Office Information Systems, vol. 1, no 1, pp 99-112.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Malone T., Grant K., Turbak F., Brobst S. & Cohen M. (1987): Intelligent Information sharing systems. Communications of the ACM, vol. 30, no 5, pp 390-402.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mander R., Saloman G. & Wong Y.Y. (1992): A 'Pile' Metaphor for Supporting Casual Organization of Information. In Proceedings of CHI'92, pp 627-634.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Marx M: (1995). Toward Effective Conversational Messaging. Master Thesis, Media Art and Sciences MIT.]]Google ScholarGoogle Scholar
  20. Palme J. (1984): You have 134 Unread Mail! Do you want to read them know? Proceedings of IFIP Wg 6.5 Working Conference on Computer-Based Message Services.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Savendy G. (1987): Handbook of Human Factors, Wiley NY 1987, pp 368, 405.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Segal, R. And Kephart J.O. (1999) MailCat: An Intelligent Assistant for Organizing Email, Proceedings of the third Annual Conference on Autonomous Agents, May, pp. 276-282.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sheridan T. & Ferrell W. (1974): Man-Machine Systems: Information, Control, and Decision Models of Human Performance. MIT Press, Cambridge, Massachusetts, USA.]]Google ScholarGoogle Scholar
  24. Sheth B. & Maes P. (1993): Evolving Agents for Personalized Information Filtering. In Proceedings of the Ninth IEEE Conference on Artificial Intelligence for Applications, pp 345-352.]]Google ScholarGoogle ScholarCross RefCross Ref
  25. Whittaker S. & Sidner C. (1996): Email overload: exploring personal information management of email. In Proceedings of CHI'96, pp 276-283.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Winograd T. (1988): A Language/Action Perspective on the Design of Cooperative Work. In Human-Computer Interaction, Vol. 3, pp 3-30.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Bifrost inbox organizer: giving users control over the inbox

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NordiCHI '02: Proceedings of the second Nordic conference on Human-computer interaction
            October 2002
            309 pages
            ISBN:1581136161
            DOI:10.1145/572020

            Copyright © 2002 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 October 2002

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate379of1,572submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader