Designing for email response management
Abstract
References
Index Terms
- Designing for email response management
Recommendations
Preventing Spam Email by Delivery Limitation in RMX
IDEAS '15: Proceedings of the 19th International Database Engineering & Applications SymposiumOn the rule-based email exchange system called RMX, similar to general mailing lists, anyone can send emails by sending to an address unique to RMX. However, there is a security problem that we cannot prevent spam emails and accidentally sending email ...
Email overload at work: an analysis of factors associated with email strain
CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative workAlmost every office worker can relate to feelings of email overload and stress, but in reality the concept of email strain is not well understood. In this paper, we describe a large-scale nationwide organizational survey examining the relationship ...
Revisiting Whittaker & Sidner's "email overload" ten years later
CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative workTen years ago, Whittaker and Sidner [8] published research on email overload, coining a term that would drive a research area that continues today. We examine a sample of 600 mailboxes collected at a high-tech company to compare how users organize their ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Dan R. Olsen,
- Program Chairs:
- Ken Hinckley,
- Meredith Ringel Morris,
- Scott Hudson,
- Saul Greenberg
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigchi
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 315Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in