Artificial Intelligence Review

, Volume 40, Issue 1, pp 51–70 | Cite as

Event detection using user interaction behavior models

  • Byung-Won On


In information exchange networks such as email or blog networks, most processes are carried out using exchange of messages. The behavioral analysis in such networks leads to interesting insight which would be quite valuable for organizational or social analysis. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that help us understand an email network which is one of information exchange networks. Engaging actors are those who can effectively solicit responses from other actors. Responsive actors are those who are willing to respond to other actors. By modeling such behaviors, we are able to measure them and to identify high engaging or responsive actors. We systematically propose novel behavior models to quantify the engagingness and responsiveness of actors in the Enron email network. Furthermore, as one of case studies, we study an event detection problem, based on our proposed behavior models, in the Enron emails. According to our empirical study, we found out meaningful events in Enron. For details, see Sect. 5.


Event detection Interaction behaviors Enron emails Email threads Responsiveness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Barnes J (1954) Class and committees in a Norwegian Island Parish. Hum Relat 7: 39–58CrossRefGoogle Scholar
  2. Chen L, Roy A (2009) Event detection from flickr data through wavelet-based spatial analysis. In: Proceedings of the 18th ACM conference on information and knowledge management, Hong Kong, ChinaGoogle Scholar
  3. Deepak P, Garg D, Varshney V (2007) Analysis of Enron email threads and quantification of employee responsiveness. Workshop on text mining and link analysis (TextLink)Google Scholar
  4. Dredze M, Blitzer J, Pereira F (2005) Reply expectation prediction for email management. In: Proceedings of the 2nd CEASGoogle Scholar
  5. Fagin R, Kumar R, Sivakumar D (2003) Comparing top K lists SIAM. J Discret Math 17: 134–160MathSciNetzbMATHCrossRefGoogle Scholar
  6. Fung G, Yu J, Yu P, Lu H (2005) Parameter free bursty event detection in text streams. In: Proceedings of the 31st international conference on very large data bases, VLDB endowment, Trondheim, NorwayGoogle Scholar
  7. He Q, Chang K, Lim E (2007) Analyzing feature trajectories for event detection. In: Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval, Amsterdam, NetherlandGoogle Scholar
  8. Howard S, Tang H, Berry M, Martin D (2009) GTP: general text parser.
  9. Karagiannis T, Vojnovic M (2009) Behavioral profiles for advanced email features. WWWGoogle Scholar
  10. Kendall M (1948) Rank correlation methods. Griffin, Oxford, UK, LondonzbMATHGoogle Scholar
  11. Kleinberg J (2002) Bursty and hierarchical structure in streams. In: proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining, Edmonton, Alberta, CanadaGoogle Scholar
  12. McCallum A, Wang X, Coorada-Emmanuel A (2007) Topic and role discovery in social networks with experiments on Enron and academic email. J Artif Intell Res 30: 249–272Google Scholar
  13. On B, Lim E, Jiang J, Chua C, Nguyen V, Teow L (2010) Messaging behavior modeling in mobile social networks. In: proceedings of the symposium on social intelligence and networking (SIN) in conjunction with the 2nd IEEE international conference on social computing (SocialCom), Minneapolis, Minnesota, USA, August 2010Google Scholar
  14. Pathak N, Mane S, Srivastava J (2006) Who thinks who knows who? Socio-cognitive analysis of an email network. In: Proceedings of the ICDMGoogle Scholar
  15. Rowe R, Creamer G, Hershkop S, Stolfo S (2007) Automated social hierarchy detection through email network analysis. In: Proceedings of the 9th WEBKDD and 1st SNA-KDD workshopGoogle Scholar
  16. Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th international conference on word wide web, Raleigh, NC, USAGoogle Scholar
  17. Tian Y, Hankins R, Patel J (2008) Efficient aggregation for graph summarization. In: Proceedings of the SIGMODGoogle Scholar
  18. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge, UKCrossRefGoogle Scholar
  19. Weng J, Lim E, He Q, Leung C (2010) What do people want in microblogs? Measuring interestingness of hashtags in twitter. In: Proceedings of the IEEE international conference on data mining, Sydney, AustraliaGoogle Scholar
  20. Yang Y, Pierce T, Carbonell J (1998) A study of retrospective and online event detection. In: Proceedings of the 21st annual international ACM SIGIR conference on research and development in information retrieval, Melbourne, AustraliaGoogle Scholar
  21. Yeh J, Harnly A (2006) Email thread reassembly using similarity matching. In: proceedings of the 3rd CEASGoogle Scholar
  22. Yoo S, Yang Y, Lin F, Moon I (2009) Mining social networks for personalized email prioritization. In: Proceedings og the 15th KDDGoogle Scholar
  23. Zhao Q, Mitra P, Chen B (2007) Temporal and information flow based event detection from social text streams. In: Proceedings of the 22nd AAAI conference on artificial intelligence, Vancouver, BC, CanadaGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2011

Authors and Affiliations

  1. 1.Advanced Digital Sciences CenterSingaporeSingapore

Personalised recommendations