{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:33:20Z","timestamp":1761006800234,"version":"build-2065373602"},"reference-count":8,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Interactivity as a way to help users understand and\/or explore complex information issues has been utilized successfully in information science areas such as information retrieval. In this paper we report experiences with utilizing interactivity in a different albeit related context: informing users about spam filtering processes. Spam filters that prevent spam from showing up in inboxes by filtering incoming messages according to their suspected level of \u201cspamminess\u201d are readily available. However, the complexity of modern spam filters aggregating evidence from various sources means few non\u2010expert users of spam filters actually understand what their spam filters are doing. It also remains unclear how different spam filter settings would impact on what they see in their email inboxes. In this paper, we describe work into using interactive exploration as a way to increase users' understanding of how spam filters work. Lab\u2010based evaluation of a prototype suggests a considerable increase in spam filtering understanding occurred even among subjects that stated they had prior spam filtering expertise.<\/jats:p>","DOI":"10.1002\/meet.2009.145046038","type":"journal-article","created":{"date-parts":[[2010,1,29]],"date-time":"2010-01-29T15:50:00Z","timestamp":1264780200000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Using interactivity to help users understand the impact of spam filter settings"],"prefix":"10.1002","volume":"46","author":[{"given":"Andrew","family":"Orange","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Lueg","sequence":"additional","affiliation":[]},{"given":"Vishv","family":"Malhotra","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"key":"e_1_2_5_2_1","doi-asserted-by":"crossref","unstructured":"Ahlberg C.andShneiderman B.(1994).Visual information seeking: tight coupling of dynamic query filters with starfield displays. Proc. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 94) pp.313\u2013317. ACM Press.","DOI":"10.1145\/191666.191775"},{"key":"e_1_2_5_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247715.1247717"},{"key":"e_1_2_5_4_1","unstructured":"Fallows D.(2003).Spam: How it is hurting email and degrading life on the Internet. Pew Internet and American Life Project."},{"key":"e_1_2_5_5_1","doi-asserted-by":"crossref","unstructured":"Koenemann J.andBelkin N. J.(1996)A case for interaction: a study of interactive information retrieval behavior and effectiveness. Proc. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 96). pp.205\u2013212.","DOI":"10.1145\/238386.238487"},{"key":"e_1_2_5_6_1","doi-asserted-by":"crossref","unstructured":"Lueg C.(1998).Supporting Situated Actions in High Volume Conversational Data Situations. Proc. ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 98) Los Angeles USA pp.471\u2013479. ACM Press.","DOI":"10.1145\/274644.274708"},{"key":"e_1_2_5_7_1","doi-asserted-by":"crossref","unstructured":"Lueg C.(2005).From Spam Filtering to Information Retrieval and Back: Seeking Conceptual Foundations for Spam Filtering. Proc. 68th Annual Meeting of the American Society for Information Science and Technology Charlotte NC USA.","DOI":"10.1002\/meet.14504201146"},{"volume-title":"Interaction Design: Beyond Human\u2010Computer Interaction","year":"2007","author":"Preece J.","key":"e_1_2_5_8_1"},{"key":"e_1_2_5_9_1","unstructured":"Ward B.(2003).The problem of spam and the counter measure options for New Zealand. NetSafe II: Society Safety & the Internet conference. Auckland . NZ. Proceedings available fromhttp:\/\/www.netsafe.org.nz\/."}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.145046038","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.145046038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:14:20Z","timestamp":1760955260000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.145046038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.145046038"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.145046038","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}