{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T12:43:12Z","timestamp":1759495392049,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662722428","type":"print"},{"value":"9783662722435","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-662-72243-5_21","type":"book-chapter","created":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T12:14:35Z","timestamp":1759493675000},"page":"366-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fostering Responsibility in\u00a0Email Marketing: A Contextual Restless Bandit Framework"],"prefix":"10.1007","author":[{"given":"Ibtihal","family":"El Mimouni","sequence":"first","affiliation":[]},{"given":"Konstantin","family":"Avrachenkov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,4]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Akbarzadeh, N., Mahajan, A.: Restless bandits with controlled restarts: indexability and computation of whittle index. In: 58th IEEE Conference on Decision and Control, CDC 2019, Nice, France, December 11-13, 2019, pp. 7294\u20137300. IEEE (2019). https:\/\/doi.org\/10.1109\/CDC40024.2019.9029182","DOI":"10.1109\/CDC40024.2019.9029182"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/TCNS.2016.2619066","volume":"5","author":"KE Avrachenkov","year":"2018","unstructured":"Avrachenkov, K.E., Borkar, V.S.: Whittle index policy for crawling ephemeral content. IEEE Trans. Control. Netw. Syst. 5(1), 446\u2013455 (2018). https:\/\/doi.org\/10.1109\/TCNS.2016.2619066","journal-title":"IEEE Trans. Control. Netw. Syst."},{"key":"21_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110186","volume":"139","author":"KE Avrachenkov","year":"2022","unstructured":"Avrachenkov, K.E., Borkar, V.S.: Whittle index based q-learning for restless bandits with average reward. Autom. 139, 110186 (2022). https:\/\/doi.org\/10.1016\/j.automatica.2022.110186","journal-title":"Autom."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Bennett, J., Lanning, S.: The netflix prize. In: Proceedings of KDD Cup and Workshop, vol.\u00a02007, p.\u00a035. New York (2007). https:\/\/api.semanticscholar.org\/CorpusID:1978078","DOI":"10.1145\/1345448.1345459"},{"key":"21_CR5","unstructured":"Berners-Lee, M.: How bad are bananas?: The carbon footprint of everything. Profile Books (2020)"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Biswas, A., Aggarwal, G., Varakantham, P., Tambe, M.: Learn to intervene: an adaptive learning policy for restless bandits in application to preventive healthcare. In: Zhou, Z. (ed.) Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI 2021, Virtual Event \/ Montreal, Canada, 19-27 August 2021, pp. 4039\u20134046. ijcai.org (2021). https:\/\/doi.org\/10.24963\/ijcai.2021\/556","DOI":"10.24963\/ijcai.2021\/556"},{"key":"21_CR7","unstructured":"Biswas, A., Killian, J.A., Diaz, P.R., Ghosh, S., Tambe, M.: Fairness for workers who pull the arms: an index based policy for allocation of restless bandit tasks pp. 1321\u20131328 (2023). https:\/\/dl.acm.org\/doi\/10.5555\/3545946.3598779"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Borkar, V.S.: Stochastic approximation with two time scales. Syst. Control Lett. 29(5), 291\u2013294 (1997). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167691197900153","DOI":"10.1016\/S0167-6911(97)90015-3"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Bouneffouf, D., Rish, I., Aggarwal, C.: Survey on applications of multi-armed and contextual bandits. In: 2020 IEEE Congress on Evolutionary Computation (CEC), pp.\u00a01\u20138. IEEE (2020)","DOI":"10.1109\/CEC48606.2020.9185782"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Chapelle, O., Li, L.: An empirical evaluation of thompson sampling. In: Shawe-Taylor, J., Zemel, R.S., Bartlett, P.L., Pereira, F.C.N., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 24: 25th Annual Conference on Neural Information Processing Systems 2011. Proceedings of a meeting held 12-14 December 2011, Granada, Spain, pp. 2249\u20132257 (2011). https:\/\/doi.org\/10.5555\/2986459.2986710","DOI":"10.5555\/2986459.2986710"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Chen, X., Hou, I.: Contextual restless multi-armed bandits with application to demand response decision-making. CoRR abs\/2403.15640 (2024). https:\/\/doi.org\/10.48550\/arXiv.2403.15640","DOI":"10.48550\/arXiv.2403.15640"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1057\/palgrave.jt.5740078","volume":"11","author":"L Chittenden","year":"2003","unstructured":"Chittenden, L., Rettie, R.: An evaluation of e-mail marketing and factors affecting response. J. Target. Meas. Anal. Mark. 11, 203\u2013217 (2003). https:\/\/doi.org\/10.1057\/palgrave.jt.5740078","journal-title":"J. Target. Meas. Anal. Mark."},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1561\/1100000009","volume":"4","author":"MD Ekstrand","year":"2011","unstructured":"Ekstrand, M.D., Riedl, J., Konstan, J.A.: Collaborative filtering recommender systems. Found. Trends Hum. Comput. Interact. 4(2), 175\u2013243 (2011). https:\/\/doi.org\/10.1561\/1100000009","journal-title":"Found. Trends Hum. Comput. Interact."},{"key":"21_CR14","unstructured":"GDPR: General data protection regulation (2025). https:\/\/gdpr-info.eu\/. Accessed 16 Jan 2025"},{"issue":"1","key":"21_CR15","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.ejor.2004.01.036","volume":"165","author":"KD Glazebrook","year":"2005","unstructured":"Glazebrook, K.D., Mitchell, H., Ansell, P.: Index policies for the maintenance of a collection of machines by a set of repairmen. Eur. J. Oper. Res. 165(1), 267\u2013284 (2005)","journal-title":"Eur. J. Oper. Res."},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Gomez-Uribe, C.A., Hunt, N.: The netflix recommender system: algorithms, business value, and innovation. ACM Trans. Manag. Inf. Syst. 6(4), 13:1\u201313:19 (2016). https:\/\/doi.org\/10.1145\/2843948","DOI":"10.1145\/2843948"},{"key":"21_CR17","unstructured":"Hallak, A., Castro, D.D., Mannor, S.: Contextual markov decision processes. CoRR abs\/1502.02259 (2015). http:\/\/arxiv.org\/abs\/1502.02259"},{"issue":"20","key":"21_CR18","doi-asserted-by":"publisher","first-page":"11208","DOI":"10.3390\/su132011208","volume":"13","author":"S Hemker","year":"2021","unstructured":"Hemker, S., Herrando, C., Constantinides, E.: The transformation of data marketing: how an ethical lens on consumer data collection shapes the future of marketing. Sustainability 13(20), 11208 (2021)","journal-title":"Sustainability"},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Herlihy, C., Prins, A., Srinivasan, A., Dickerson, J.P.: Planning to fairly allocate: probabilistic fairness in the restless bandit setting. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 732\u2013740 (2023). https:\/\/doi.org\/10.1145\/3580305.3599467","DOI":"10.1145\/3580305.3599467"},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"Hu, Y., Koren, Y., Volinsky, C.: Collaborative filtering for implicit feedback datasets. In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), December 15-19, 2008, Pisa, Italy, pp. 263\u2013272. IEEE Computer Society (2008). https:\/\/doi.org\/10.1109\/ICDM.2008.22","DOI":"10.1109\/ICDM.2008.22"},{"key":"21_CR21","unstructured":"INSEE: National institute of statistics and economic studies (2025). https:\/\/www.insee.fr\/en\/accueil. Accessed 16 Jan 2025"},{"key":"21_CR22","unstructured":"Jenkins, S.: The Truth About Email Marketing. FT Press (2008)"},{"key":"21_CR23","unstructured":"(source: Kaspersky), S.: Global spam volume as percentage of total e-mail traffic from 2011 to 2023 (2025). https:\/\/www.statista.com\/statistics\/420400\/spam-email-traffic-share-annual\/. Accessed 16 Jan 2025"},{"issue":"1","key":"21_CR24","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3390\/electronics11010141","volume":"11","author":"H Ko","year":"2022","unstructured":"Ko, H., Lee, S., Park, Y., Choi, A.: A survey of recommendation systems: recommendation models, techniques, and application fields. Electronics 11(1), 141 (2022)","journal-title":"Electronics"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Lattimore, T., Szepesv\u00e1ri, C.: Bandit Algorithms. Cambridge University Press, Cambridge (2020)","DOI":"10.1017\/9781108571401"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Li, D., Varakantham, P.: Avoiding starvation of arms in restless multi-armed bandits, pp. 1303\u20131311 (2023). https:\/\/doi.org\/10.5555\/3545946.3598777","DOI":"10.5555\/3545946.3598777"},{"key":"21_CR27","doi-asserted-by":"publisher","unstructured":"Li, L., Chu, W., Langford, J., Schapire, R.E.: A contextual-bandit approach to personalized news article recommendation. In: Rappa, M., Jones, P., Freire, J., Chakrabarti, S. (eds.) Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 661\u2013670. ACM (2010). https:\/\/doi.org\/10.1145\/1772690.1772758","DOI":"10.1145\/1772690.1772758"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Lian, Z., Nath, R.: A conceptual model for effective email marketing. In: 17th International Conference on Computer and Information Technology, ICCIT 2014, pp. 250\u2013256. IEEE (2014). https:\/\/doi.org\/10.1109\/ICCITechn.2014.7073103","DOI":"10.1109\/ICCITechn.2014.7073103"},{"key":"21_CR29","doi-asserted-by":"publisher","unstructured":"Liang, B., Xu, L., Taneja, A., Tambe, M., Janson, L.: A Bayesian approach to online learning for contextual restless bandits with applications to public health. CoRR abs\/2402.04933 (2024). https:\/\/doi.org\/10.48550\/arXiv.2402.04933","DOI":"10.48550\/arXiv.2402.04933"},{"key":"21_CR30","doi-asserted-by":"publisher","unstructured":"Liu, J., Dolan, P., Pedersen, E.R.: Personalized news recommendation based on click behavior. In: Rich, C., Yang, Q., Cavazza, M., Zhou, M.X. (eds.) Proceedings of the 15th International Conference on Intelligent User Interfaces, IUI 2010, Hong Kong, China, February 7-10, 2010, pp. 31\u201340. ACM (2010). https:\/\/doi.org\/10.1145\/1719970.1719976","DOI":"10.1145\/1719970.1719976"},{"key":"21_CR31","doi-asserted-by":"publisher","unstructured":"Meshram, R., Manjunath, D., Gopalan, A.: A restless bandit with no observable states for recommendation systems and communication link scheduling. In: 54th IEEE Conference on Decision and Control, CDC 2015, Osaka, Japan, December 15-18, 2015, pp. 7820\u20137825. IEEE (2015). https:\/\/doi.org\/10.1109\/CDC.2015.7403456","DOI":"10.1109\/CDC.2015.7403456"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Ni\u00f1o-Mora, J.: Restless bandits, partial conservation laws and indexability. Adv. Appl. Probab. 33(1), 76\u201398 (2001). http:\/\/www.jstor.org\/stable\/1428442","DOI":"10.1239\/aap\/999187898"},{"key":"21_CR33","doi-asserted-by":"publisher","unstructured":"Papadimitriou, C.H., Tsitsiklis, J.N.: The complexity of optimal queueing network control. In: Proceedings of the Ninth Annual Structure in Complexity Theory Conference, Amsterdam, The Netherlands, June 28 - July 1, 1994, pp. 318\u2013322. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SCT.1994.315792","DOI":"10.1109\/SCT.1994.315792"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Pazzani, M.J., Billsus, D.: Content-based recommendation systems. In: The Adaptive Web: Methods and Strategies of Web Personalization, pp. 325\u2013341. Springer, Cham (2007)","DOI":"10.1007\/978-3-540-72079-9_10"},{"key":"21_CR35","unstructured":"Prins, A., Mate, A., Killian, J.A., Abebe, R., Tambe, M.: Incorporating healthcare motivated constraints in restless bandit based resource allocation. NeurIPS 2020 Workshops: challenges of Real World Reinforcement Learning, Machine Learning in Public Health (Best Lightning Paper), Machine Learning for Health (Best on Theme), Machine Learning for the Developing World (2020)"},{"key":"21_CR36","unstructured":"Project, T.C.L.: The carbon cost of an email (2022). https:\/\/carbonliteracy.com\/the-carbon-cost-of-an-email\/. Accessed 16 Jan 2025"},{"key":"21_CR37","unstructured":"(source: Radicati), S.: Number of sent and received e-mails per day worldwide from 2017 to 2026 (2022). https:\/\/www.statista.com\/statistics\/456500\/daily-number-of-e-mails-worldwide\/. Accessed 16 Jan 2025"},{"key":"21_CR38","unstructured":"REES46: Rees46 CDP for ecommerce (2025). https:\/\/rees46.com\/en\/cdp. Accessed 22 Jan 2025"},{"key":"21_CR39","unstructured":"REES46-Datasets: Direct messaging campaigns dataset overview (2025). https:\/\/www.kaggle.com\/code\/mkechinov\/direct-messaging-campaigns-dataset-overview\/input?select=messages-demo.csv. Accessed 22 Jan 2025"},{"issue":"3","key":"21_CR40","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender systems. Commun. ACM 40(3), 56\u201358 (1997)","journal-title":"Commun. ACM"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Singh, G., Singh, H., Shriwastav, S.: Improving email marketing campaign success rate using personalization. Adv. Anal. Appl. 77\u201383 (2019)","DOI":"10.1007\/978-981-13-1208-3_8"},{"key":"21_CR42","unstructured":"Smartprofile: Smartprofile (2025). https:\/\/smartp.com\/. Accessed 10 June 2025"},{"key":"21_CR43","doi-asserted-by":"publisher","unstructured":"Smith, B., Linden, G.: Two decades of recommender systems at amazon.com. IEEE Internet Comput. 21(3), 12\u201318 (2017). https:\/\/doi.org\/10.1109\/MIC.2017.72","DOI":"10.1109\/MIC.2017.72"},{"key":"21_CR44","unstructured":"Taylor, B.: Sender reputation in a large webmail service. In: CEAS 2006 - The Third Conference on Email and Anti-Spam, July 27-28, 2006, Mountain View, California, USA (2006). http:\/\/www.ceas.cc\/2006\/listabs.html#19.pdf"},{"key":"21_CR45","doi-asserted-by":"publisher","unstructured":"Wang, S., Hu, L., Wang, Y., Cao, L., Sheng, Q.Z., Orgun, M.A.: Sequential recommender systems: challenges, progress and prospects. In: Kraus, S. (ed.) Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, pp. 6332\u20136338. ijcai.org (2019). https:\/\/doi.org\/10.24963\/ijcai.2019\/883","DOI":"10.24963\/ijcai.2019\/883"},{"key":"21_CR46","doi-asserted-by":"publisher","unstructured":"Wang, S., Xiong, G., Li, J.: Online restless multi-armed bandits with long-term fairness constraints. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a038, pp. 15616\u201315624 (2024). https:\/\/doi.org\/10.1609\/aaai.v38i14.29489","DOI":"10.1609\/aaai.v38i14.29489"},{"key":"21_CR47","unstructured":"Wang, S., Huang, L., Lui, J.C.S.: Restless-ucb, an efficient and low-complexity algorithm for online restless bandits (2020). https:\/\/proceedings.neurips.cc\/paper\/2020\/hash\/89ae0fe22c47d374bc9350ef99e01685-Abstract.html"},{"key":"21_CR48","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF00992698","volume":"8","author":"CJCH Watkins","year":"1992","unstructured":"Watkins, C.J.C.H., Dayan, P.: Technical note q-learning. Mach. Learn. 8, 279\u2013292 (1992). https:\/\/doi.org\/10.1007\/BF00992698","journal-title":"Mach. Learn."},{"key":"21_CR49","doi-asserted-by":"crossref","unstructured":"Weber, R.R., Weiss, G.: On an index policy for restless bandits. J. Appl. Probab. 27(3), 637\u2013648 (1990). http:\/\/www.jstor.org\/stable\/3214547","DOI":"10.2307\/3214547"},{"key":"21_CR50","unstructured":"White, J.: Bandit Algorithms for Website Optimization. O\u2019Reilly (2013)"},{"key":"21_CR51","doi-asserted-by":"crossref","unstructured":"Whittle, P.: Restless bandits: Activity allocation in a changing world. J. Appl. Probab. 25(A), 287\u2013298 (1988)","DOI":"10.1017\/S0021900200040420"},{"key":"21_CR52","doi-asserted-by":"crossref","unstructured":"Xiong, G., Wang, S., Yan, G., Li, J.: Reinforcement learning for dynamic dimensioning of cloud caches: a restless bandit approach. IEEE\/ACM Trans. Netw. (2023)","DOI":"10.1109\/TNET.2023.3235480"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Research Track and Applied Data Science Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-72243-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T12:14:54Z","timestamp":1759493694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-72243-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,4]]},"ISBN":["9783662722428","9783662722435"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-72243-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,4]]},"assertion":[{"value":"4 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecmlpkdd.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}