Multiple Email Addresses: A Socio-technical Investigation

This research investigates individuals’ everyday use of multiple electronic mail addresses. Email remains the dominant form of online communication. According to research by the Pew Internet & American Life Project, 93% of Internet users have sent or received email. [8] [16] In preliminary interviews I conducted, nearly all participants maintained multiple email addresses. These preliminary interviews, others’ research data, and a cursory analysis of market research data indicate that the use of multiple addresses is both common and mainstream. [14] The phenomenon is not well documented in either the technical or the popular literature, nor are the behaviors well supported within email applications. For example, many users employ workarounds to maintain multiple email addresses, but the process is often frustrating and error prone. This research agenda arose from a series of preliminary interviews I conducted on the organization, navigation, management and analysis of email by individuals. It became clear that many email addresses had specialized uses and that the functionality available in email applications for maintaining these multiple email addresses was inadequate. My future research will help better inform systems design by examining a common user behavior in email systems. In order to improve system design, the research seeks to answer the following questions. First, why do people maintain multiple email addresses? Second, what are the socio-technical explanations for this behavior? Third, what are the strategies and tools that people use to manage their own and others’ email addresses? How does user behavior vary across time and space and how do users organize their email collections. Finally, what are the implications of the existing strategies for the design of future email clients and servers?

[1]  Alexey Melnikov,et al.  Simple Authentication and Security Layer (SASL) , 2006, RFC.

[2]  Ann Lantz,et al.  Heavy Users of Electronic Mail , 1998, Int. J. Hum. Comput. Interact..

[3]  Madhu C. Reddy,et al.  A finger on the pulse: temporal rhythms and information seeking in medical work , 2002, CSCW '02.

[4]  John C. Klensin,et al.  Simple Mail Transfer Protocol , 2001, RFC.

[5]  A. Nation Online: How Americans Are Expanding Their Use of the Internet , 2002 .

[6]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[7]  John C. Tang,et al.  Rhythm modeling, visualizations and applications , 2003, UIST '03.

[8]  O. Alter,et al.  Electronic mail from a user perspective: Problems and remedies , 1995 .

[9]  John G. Myers Simple Authentication and Security Layer (SASL) , 1997, RFC.

[10]  Olle Bälter,et al.  Electronic mail in a working context , 1998 .

[11]  Jonathan B. Postel Rfc821: simple mail transfer protocol , 1982 .

[12]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[13]  David Gelernter,et al.  Lifestreams: an alternative to the desktop metaphor , 1996, CHI Conference Companion.

[14]  Deborah K. Barreau,et al.  Context as a Factor in Personal Information Management Systems , 1995, J. Am. Soc. Inf. Sci..

[15]  F. W. Lancaster,et al.  Vocabulary control for information retrieval , 1972 .

[16]  Xing Chen,et al.  Criteria for Evaluating AAA Protocols for Network Access , 2000, RFC.

[17]  Mark H. Chignell,et al.  Information archiving with bookmarks: personal Web space construction and organization , 1998, CHI.

[18]  John C. Tang,et al.  When Can I Expect an Email Response? A Study of Rhythms in Email Usage , 2003, ECSCW.

[19]  Hilary D. Burton FAMULUS revisited: Ten years of personal information systems , 1981, J. Am. Soc. Inf. Sci..

[20]  John G. Myers SMTP Service Extension for Authentication , 1999, RFC.

[21]  Meng Weng Wong SPF overview , 2004 .