The Use of Interface Agents for eMail in Critical Incidents

This study reports on several typical scenarios of the use of email interface agents under the influence of critical incidents. The critical incident technique was employed to survey the actual users of an interface agent-based email notification application. Respondents were asked to provide the last most significant either positive or negative incident of the usage of interface agents in their email application, and sixty critical incidents were obtained. With regards to positive-outcome situations, one representative scenario was constructed. With respect to the negative-outcome events, three distinct scenarios were identified. Overall, it is concluded that users acknowledge the quality of an agent when it acts reliably, marketers should advertise only realistic agent capabilities, an agent’s intrusive behavior results in an immediate agent usage termination, operability issues sometimes force people to reject the technology, and users attempt to preserve the employment of an agent under the negative impacts of external factors.

[1]  Cheryl Tay,et al.  User competence in information technology: a critical incident analysis , 1994, Proceedings of TENCON'94 - 1994 IEEE Region 10's 9th Annual International Conference on: 'Frontiers of Computer Technology'.

[2]  P. Chisnall Mail and Internet Surveys: The Tailored Design Method , 2007, Journal of Advertising Research.

[3]  Debora Shaw,et al.  Handbook of usability testing: How to plan, design, and conduct effective tests , 1996 .

[4]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[5]  Steve Muylle,et al.  The conceptualization and empirical validation of web site user satisfaction , 2004, Inf. Manag..

[6]  Alexander Serenko,et al.  An Exploratory Investigation of the Self Serving Biases of Interface Agent Users , 2004, AMCIS.

[7]  Helen Cowie,et al.  Measuring workplace bullying , 2002 .

[8]  A. Light,et al.  Critical incident technique and explicitation interviewing in studies of information behavior , 2003 .

[9]  H. Lieberman,et al.  Agents for the User Interface , 2003 .

[10]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .

[11]  Carl Staelin,et al.  A Personal Email Assistant , 2002 .

[12]  Athanasios V. Vasilakos,et al.  Active electronic mail , 2002, SAC '02.

[13]  E. Rogers Diffusion of Innovations , 1962 .

[14]  Bengt-Erik Andersson,et al.  Studies in the reliability and validity of the critical incident technique. , 1964 .

[15]  Pattie Maes,et al.  Agents that reduce work and information overload , 1994, CACM.

[16]  Bart Selman,et al.  Bottom-up design of software agents , 1994, CACM.

[17]  Susan M. Keaveney,et al.  Customer Switching Behavior in Service Industries: An Exploratory Study , 1995 .

[18]  Jeffrey O. Kephart,et al.  MailCat: an intelligent assistant for organizing e-mail , 1999, AGENTS '99.

[19]  Michael A. Jones Entertaining Shopping Experiences: An Exploratory Investigation , 1999 .

[20]  Tetsuo Kinoshita,et al.  Design and implementation of agent-based flexible asynchronous messaging system , 1998, Proceedings 1998 International Conference on Parallel and Distributed Systems (Cat. No.98TB100250).

[21]  Gary P. Latham,et al.  The reliability and validity of the critical incident technique: A closer look. , 1974 .

[22]  Jonathan Helfman,et al.  Ishmail: Immediate Identification of Important Information , 1995 .

[23]  Susanne van Mulken,et al.  The impact of animated interface agents: a review of empirical research , 2000, Int. J. Hum. Comput. Stud..

[24]  Henry Lieberman,et al.  Aria: an agent for annotating and retrieving images , 2001, Computer.

[25]  J. C. Flanagan Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .

[26]  Kuo-Ching Wang,et al.  Critical service features in group package tour: An exploratory research , 2000 .

[27]  Janice R. Fauske,et al.  Principals and the Political Economy of Environmental Enactment , 2000 .

[28]  Mary Beth Rosson,et al.  Comparative usability evaluation: critical incidents and critical threads , 1994, CHI Conference Companion.