Skip to main content

Using E-mail Communication Network for Importance Measurement in Collaboration Environments

  • Conference paper
Book cover Social Informatics (SocInfo 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8359))

Included in the following conference series:

  • 691 Accesses

Abstract

Can we establish the importance of people by simply analyzing the set of sent and received emails, having no access to subject lines or contents of messages? The answer, apparently, is ”yes we can”. Intrinsic behavior of people reveals simple patterns in choosing which emails to answer next. Our theory is based on two assumptions. We assume that people do their email communication in bursts, answering several messages consecutively and that they can freely choose the order of answers. Secondly, we believe that people use priority queues to manage their internal task lists, including the list of emails to be answered. Looking at timing and ordering of responses we derive individual rankings of importance of actors, because we posit that people have a tendency to reply to important actors first. These individual subjective rankings are significant because they reflect the relative importance of other actors as perceived by each actor. The individual rankings are aggregated into a global ranking of importance of all actors. We perform an experimental evaluation of our model by analyzing the dataset consisting of over 600 000 emails sent during one year period to 200 employees of our university. Our final ranking closely reflects the ”true” importance of employees computed based on surveys. We think that our model is general and can be applied whenever behavioral data is available which includes any choice made by actors from a set of available alternatives with the alternatives having varying degrees of importance to individual actors.

The original version of this chapter was revised. An erratum for this chapter can be found at: http://dx.doi.org/10.1007/978-3-642-55285-4_12

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barabasi, A.-L.: The origin of bursts and heavy tails in human dynamics. Nature 435(7039), 207–211 (2005)

    Article  Google Scholar 

  2. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the 2006 International Workshop on Mining Software Repositories, pp. 137–143. ACM (2006)

    Google Scholar 

  3. Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review 29(1), 63–92 (2008)

    Article  Google Scholar 

  4. Burton-Jones, A., Hubona, G.S.: Individual differences and usage behavior: revisiting a technology acceptance model assumption. ACM SIGMIS Database 36(2), 58–77 (2005)

    Article  Google Scholar 

  5. Cormack, G.V.: Email spam filtering: A systematic review. Foundations and Trends in Information Retrieval 1(4), 335–455 (2007)

    Article  Google Scholar 

  6. Culotta, A., Bekkerman, R., McCallum, A.: Extracting social networks and contact information from email and the web (2004)

    Google Scholar 

  7. Diesner, J., Carley, K.M.: Exploration of communication networks from the enron email corpus. In: SIAM Int. Conference on Data Mining: Workshop on Link Analysis, Counterterrorism and Security, Newport Beach, CA. Citeseer (2005)

    Google Scholar 

  8. Dwork, C., Kumar, R., Naor, M., Sivakumar, D.: Rank aggregation methods for the web. In: Proc. of the 10th International Conference on World Wide Web, pp. 613–622. ACM (2001)

    Google Scholar 

  9. Gross, D., Shortle, J.F., Thompson, J.M., Harris, C.M.: Fundamentals of queueing theory. Wiley.com (2013)

    Google Scholar 

  10. Li, H., Zhang, J., Wang, H., Huang, S.: A mining algorithm for email’s relationships based on neural networks. In: 2008 International Conference on Computer Science and Software Engineering, vol. 4, pp. 1122–1125. IEEE (2008)

    Google Scholar 

  11. Lubarski, P., Morzy, M.: Measuring the importance of users in a social network based on email communication patterns. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 86–90. IEEE Computer Society (2012)

    Google Scholar 

  12. Whittaker, S., Bellotti, V., Gwizdka, J.: Email in personal information management. Communications of the ACM 49(1), 68–73 (2006)

    Article  Google Scholar 

  13. Whittaker, S., Sidner, C.: Email overload: exploring personal information management of email. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 276–283. ACM (1996)

    Google Scholar 

  14. Yoo, S., Yang, Y., Lin, F., Moon, I.-C.: Mining social networks for personalized email prioritization. In: Proc. of the 15th ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining, pp. 967–976. ACM (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lubarski, P., Łupkowski, P., Kleka, P., Morzy, M. (2014). Using E-mail Communication Network for Importance Measurement in Collaboration Environments. In: Nadamoto, A., Jatowt, A., Wierzbicki, A., Leidner, J.L. (eds) Social Informatics. SocInfo 2013. Lecture Notes in Computer Science, vol 8359. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55285-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55285-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55284-7

  • Online ISBN: 978-3-642-55285-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics