{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:33:01Z","timestamp":1776112381590,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290605.3300604","type":"proceedings-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T17:36:58Z","timestamp":1556559418000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Opportunities for Automating Email Processing"],"prefix":"10.1145","author":[{"given":"Soya","family":"Park","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Amy X.","family":"Zhang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Luke S.","family":"Murray","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"David R.","family":"Karger","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Foundry 376. 2017. Mailspring. https:\/\/getmailspring.com.  Foundry 376. 2017. Mailspring. https:\/\/getmailspring.com."},{"key":"e_1_3_2_2_2_1","volume-title":"Context-Aware Recommender Systems","author":"Adomavicius Gediminas","unstructured":"Gediminas Adomavicius and Alexander Tuzhilin . 2011. Context-Aware Recommender Systems . Springer US , Boston, MA , 217--253. Gediminas Adomavicius and Alexander Tuzhilin. 2011. Context-Aware Recommender Systems. Springer US, Boston, MA, 217--253."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176398"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642672"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025613"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138016"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095034.1095062"},{"key":"e_1_3_2_2_8_1","unstructured":"boomerang. 2016. boomerang. http:\/\/www.boomeranggmail.com.  boomerang. 2016. boomerang. http:\/\/www.boomeranggmail.com."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143463"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020165.3020189"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985715"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055068"},{"key":"e_1_3_2_2_13_1","unstructured":"Senad Dizdar. 2011. CloudHQ. https:\/\/linux.die.net\/man\/1\/procmail.  Senad Dizdar. 2011. CloudHQ. https:\/\/linux.die.net\/man\/1\/procmail."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.129"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111471"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI '09)","author":"Dredze Mark","year":"2009","unstructured":"Mark Dredze , Bill N. Schilit , and Peter Norvig . 2009 . Suggesting Email View Filters for Triage and Search . In Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI '09) . AAAI, Palo Alto, CA, USA, 1414--1419. https:\/\/www.aaai.org\/ocs\/index.php\/ IJCAI\/IJCAI-09\/paper\/viewFile\/488\/909 Mark Dredze, Bill N. Schilit, and Peter Norvig. 2009. Suggesting Email View Filters for Triage and Search. In Proceedings of the Twenty-First International Joint Conference on Artificial Intelligence (IJCAI '09). AAAI, Palo Alto, CA, USA, 1414--1419. https:\/\/www.aaai.org\/ocs\/index.php\/ IJCAI\/IJCAI-09\/paper\/viewFile\/488\/909"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 13th international conference on Intelligent user interfaces (IUI '08)","author":"Dredze Mark","year":"2008","unstructured":"Mark Dredze , Hanna M. Wallach , Danny Puller , and Fernando Pereira . 2008 . Automatically classifying emails into activities . In Proceedings of the 13th international conference on Intelligent user interfaces (IUI '08) . ACM, New York, NY, USA, 199--206. Mark Dredze, Hanna M. Wallach, Danny Puller, and Fernando Pereira. 2008. Automatically classifying emails into activities. In Proceedings of the 13th international conference on Intelligent user interfaces (IUI '08). ACM, New York, NY, USA, 199--206."},{"key":"e_1_3_2_2_18_1","unstructured":"Mozilla Foundation. 2004. Mozilla Thunderbird. https:\/\/www. thunderbird.net\/.  Mozilla Foundation. 2004. Mozilla Thunderbird. https:\/\/www. thunderbird.net\/."},{"key":"e_1_3_2_2_19_1","unstructured":"Google. 2014. Google Inbox. https:\/\/inbox.google.com\/.  Google. 2014. Google Inbox. https:\/\/inbox.google.com\/."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819981"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557013"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031634"},{"key":"e_1_3_2_2_23_1","unstructured":"Philip A. Guenther. 1990. procmail. https:\/\/linux.die.net\/man\/1\/ procmail.  Philip A. Guenther. 1990. procmail. https:\/\/linux.die.net\/man\/1\/ procmail."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/142750.142751"},{"key":"e_1_3_2_2_25_1","volume-title":"Deduction of Procmail Recipes from Classified Emails. CMSC724 Database Management Systems, individual research project report","author":"Hung Edward","year":"2001","unstructured":"Edward Hung . 2001. Deduction of Procmail Recipes from Classified Emails. CMSC724 Database Management Systems, individual research project report ( 2001 ). Edward Hung. 2001. Deduction of Procmail Recipes from Classified Emails. CMSC724 Database Management Systems, individual research project report (2001)."},{"key":"e_1_3_2_2_26_1","unstructured":"IFTTT. 2010. IFTTT Gmail. https:\/\/ifttt.com\/gmail.  IFTTT. 2010. IFTTT Gmail. https:\/\/ifttt.com\/gmail."},{"key":"e_1_3_2_2_27_1","unstructured":"GrexIt Inc. 2011. hiver. https:\/\/hiverhq.com.  GrexIt Inc. 2011. hiver. https:\/\/hiverhq.com."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939801"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11735106_41"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025954"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357323"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/62266.62293"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_2_2_34_1","unstructured":"Mailbird. 2013. Mailbird. https:\/\/www.getmailbird.com.  Mailbird. 2013. Mailbird. https:\/\/www.getmailbird.com."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858262"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988706"},{"key":"e_1_3_2_2_37_1","unstructured":"Microsoft. 2018. Microsoft Flow. https:\/\/flow.microsoft.com\/en-us\/.  Microsoft. 2018. Microsoft Flow. https:\/\/flow.microsoft.com\/en-us\/."},{"key":"e_1_3_2_2_38_1","unstructured":"Michael Muller and Daniel Gruen. 2002. Collaborating within not through email: Users reinvent a familiar technology.  Michael Muller and Daniel Gruen. 2002. Collaborating within not through email: Users reinvent a familiar technology."},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings ECSCW 2005 (ECSCW '05)","author":"Michael","unstructured":"Michael J. Muller and Daniel M. Gruen. 2005. Working together inside an emailbox . In Proceedings ECSCW 2005 (ECSCW '05) . Springer, Dordrecht, 103--122. Michael J. Muller and Daniel M. Gruen. 2005. Working together inside an emailbox. In Proceedings ECSCW 2005 (ECSCW '05). Springer, Dordrecht, 103--122."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020165.3020175"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358975"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 2005 Conference on Email and Anti-Spam (CEAS).","author":"Neustaedter Carman","year":"2005","unstructured":"Carman Neustaedter , A J. Bernheim Brush , Marc Smith , and Danyel Fisher . 2005 . The Social Network and Relationship Finder: Social Sorting for Email Triage . Proceedings of the 2005 Conference on Email and Anti-Spam (CEAS). Carman Neustaedter, A J. Bernheim Brush, Marc Smith, and Danyel Fisher. 2005. The Social Network and Relationship Finder: Social Sorting for Email Triage. Proceedings of the 2005 Conference on Email and Anti-Spam (CEAS)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647358"},{"key":"e_1_3_2_2_44_1","unstructured":"Carnegie Mellon University Cyrus Project. 2008. sieve. http:\/\/sieve.info.  Carnegie Mellon University Cyrus Project. 2008. sieve. http:\/\/sieve.info."},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of InfoVis 2001 The IEEE Symposium on Information Visualization (InfoVis '01)","author":"Rohall Steven L.","year":"2001","unstructured":"Steven L. Rohall , Daniel Gruen , Paul Moody , and Seymour Kellerman . 2001 . Email visualizations to aid communications . In Proceedings of InfoVis 2001 The IEEE Symposium on Information Visualization (InfoVis '01) . IEEE, 15. Steven L. Rohall, Daniel Gruen, Paul Moody, and Seymour Kellerman. 2001. Email visualizations to aid communications. In Proceedings of InfoVis 2001 The IEEE Symposium on Information Visualization (InfoVis '01). IEEE, 15."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503418"},{"key":"e_1_3_2_2_47_1","volume-title":"Proceedings of the 2006 international workshop on Mining software repositories (MSR '06)","author":"Singh Nikash","year":"2006","unstructured":"Nikash Singh , Martin Tomitsch , and Mary Lou Maher . 2006 . Understanding the management and need for awareness of temporal information in email . In Proceedings of the 2006 international workshop on Mining software repositories (MSR '06) . ACM, New York, NY, USA, 137--143. Nikash Singh, Martin Tomitsch, and Mary Lou Maher. 2006. Understanding the management and need for awareness of temporal information in email. In Proceedings of the 2006 international workshop on Mining software repositories (MSR '06). ACM, New York, NY, USA, 137--143."},{"key":"e_1_3_2_2_48_1","volume-title":"Basics of qualitative research: Grounded theory procedures and techniques","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet M Corbin . 1990. Basics of qualitative research: Grounded theory procedures and techniques . Sage Publications, Inc. Anselm Strauss and Juliet M Corbin. 1990. Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126603"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.09.019"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985745"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1241889.1241902"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1037725"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2001%262_5"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107494"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063683"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702194"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274465"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210001"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","location":"Glasgow Scotland Uk","acronym":"CHI '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290605.3300604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:07Z","timestamp":1750204387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300604"}},"subtitle":["A Need-Finding Study"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":60,"alternative-id":["10.1145\/3290605.3300604","10.1145\/3290605"],"URL":"https:\/\/doi.org\/10.1145\/3290605.3300604","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}