Abstract
Despite Email being the most popular communication medium currently in use and that people have been shown to regularly re-use messages, very little is known about how people actually search within email clients. In this paper we present a detailed analysis of email search behaviour obtained from a study of 47 users. We uncover a number of behavioral patterns that contrast with those previously observed in web search. From our findings, we describe ways in which email search could be improved and conclude with a short discussion of possible future work.
Keywords
- Query Pattern
- Levenshtein Distance
- Lexical Similarity
- Email Client
- Search Engine Query
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
http://www.facebook.com/press/info.php?statistics (last accessed on September 13, 2011)
http://blog.twitter.com/2011/06/200-million-tweets-per-day.html (last accessed on September 13, 2011)
Adar, E., Teevan, J., Dumais, S.T.: Large scale analysis of web revisitation patterns. In: Proc SIGCHI, CHI 2008, pp. 1197–1206. ACM (2008)
Dumais, S., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R., Robbins, D.C.: Stuff i’ve seen: a system for personal information retrieval and re-use. In: Proc. ACM SIGIR 2003, pp. 72–79 (2003)
Elsweiler, D., Baillie, M., Ruthven, I.: What Makes Re-finding Information Difficult? A Study of Email Re-finding. In: Clough, P., Foley, C., Gurrin, C., Jones, G.J.F., Kraaij, W., Lee, H., Mudoch, V. (eds.) ECIR 2011. LNCS, vol. 6611, pp. 568–579. Springer, Heidelberg (2011)
Elsweiler, D., Harvey, M., Hacker, M.: Understanding re-finding behavior in naturalistic email interaction logs. In: Proc. ACM SIGIR, pp. 35–44. ACM (2011)
Elsweiler, D., Losada, D.E., Toucedo, J., Fernandez, R.: Seeding simulated queries with user-study data forpersonal search evaluation. In: Proc. ACM SIGIR, pp. 25–34. ACM (2011)
Elsweiler, D., Ruthven, I.: Towards task-based personal information management evaluations. In: Proc. ACM SIGIR 2007, pp. 23–30 (2007)
Freeman, E., Gelernter, D.: Lifestreams: a storage model for personal data. SIGMOD Record 25(1), 80–86 (1996)
Jansen, B.J., Spink, A.: How are we searching the world wide web? a comparison of nine search engine transaction logs. IPM 42, 248–263 (2006)
Purcell, K.: (August 2011), http://www.pewinternet.org/reports/2011/search-and-email/report.aspx
Radicati, S.: Email statistics report (2010)
Sanderson, M., Dumais, S.T.: Examining Repetition in User Search Behavior. In: Amati, G., Carpineto, C., Romano, G. (eds.) ECIR 2007. LNCS, vol. 4425, pp. 597–604. Springer, Heidelberg (2007)
Silverstein, C., Henzinger, M., Marais, H., Moricz, M.: Analysis of a very large alta vista query log. Technical report, SRC, Technical Note 1998-014 (1998)
Teevan, J., Adar, E., Jones, R., Potts, M.: Information re-retrieval: Repeat queries in yahoo’s logs. In: Proc. SIGIR 2007 (2007)
Tyler, S.K., Teevan, J.: Large scale query log analysis of re-finding. In: Proc. WSDM 2010 (2010)
Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. In: SIGCHI 1996, pp. 276–283 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Harvey, M., Elsweiler, D. (2012). Exploring Query Patterns in Email Search. In: Baeza-Yates, R., et al. Advances in Information Retrieval. ECIR 2012. Lecture Notes in Computer Science, vol 7224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28997-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-28997-2_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28996-5
Online ISBN: 978-3-642-28997-2
eBook Packages: Computer ScienceComputer Science (R0)
