ABSTRACT
A large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with stopping unwanted email. We investigated the user experience of unsubscribing from unwanted email messages by recruiting 18 individuals for via a lab study followed by semi-structured interviews. Based on unsubscribing practices of the study participants, we synthesized eight common unsubscription mechanisms and identified the corresponding user experience challenges. We further uncovered alternative practices aimed at circumventing the need to unsubscribe. Our findings reveal frustration with the prevailing options for limiting access to the self by managing email boundaries. We apply our insight to offer design suggestions that could help commercial providers improve the user experience of unsubscribing and provide users more control over the email they receive.
Supplemental Material
Available for Download
The auxiliary material contains a single PDF file named unsubscribing-supplementarymaterials.pdf \ The PDF file contains: (i) the screening questionnaire sent during recruitment of participants asking for various demographic information, email preferences, and contact information for the study protocol, (ii) the think aloud protocol used during the in-lab session, and (iii) post-study semi-structured interview, asking about participants' unsubscribing practices, other email specific questions, internet behavior, and feedback on the study session.
- Irwin Altman. 1976. A Conceptual Analysis. Environment and Behavior 8, 1 (1976), 7--29. DOI: http://dx.doi.org/10.1177/001391657600800102Google ScholarCross Ref
- Frank Bentley, Nediyana Daskalova, and Nazanin Andalibi. 2017. "If a Person is Emailing You, It Just Doesn't Make Sense": Exploring Changing Consumer Behaviors in Email. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). Association for Computing Machinery, New York, NY, USA, 85--95. DOI: http://dx.doi.org/10.1145/3025453.3025613Google ScholarDigital Library
- Nediyana Daskalova, Frank R. Bentley, and Nazanin Andalibi. 2017. It's All About Coupons: Exploring Coupon Use Behaviors in Email. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17). Association for Computing Machinery, New York, NY, USA, 1152--1160. DOI: http://dx.doi.org/10.1145/3027063.3053339Google ScholarDigital Library
- Dotan Di Castro, Zohar Karnin, Liane Lewin-Eytan, and Yoelle Maarek. 2016. You've Got Mail, and Here is What You Could Do With It! Analyzing and Predicting Actions on Email Messages. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). Association for Computing Machinery, New York, NY, USA, 307--316. DOI: http://dx.doi.org/10.1145/2835776.2835811Google ScholarDigital Library
- K. Anders Ericsson and Herbert A. Simon. 1980. Verbal Reports as Data. Psychological Review 87, 3 (1980), 215--251. DOI: http://dx.doi.org/10.1037/0033--295X.87.3.215Google ScholarCross Ref
- Kim Flaherty. 2018. Top 10 Design Mistakes in the Unsubscribe Experience. (Apr 2018). Retrieved January 7, 2020 from https://www.nngroup.com/articles/unsubscribe-mistake.Google Scholar
- Iftah Gamzu, Liane Lewin-Eytan, and Natalia Silberstein. 2018. Unsubscription: A Simple Way to Ease Overload in Email. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). Association for Computing Machinery, New York, NY, USA, 189--197. DOI: http://dx.doi.org/10.1145/3159652.3159698Google ScholarDigital Library
- Khim-Yong Goh, Kai-Lung Hui, and Ivan P. L. Png. 2015. Privacy and Marketing Externalities: Evidence from Do Not Call. Management Science 61, 12 (2015), 2982--3000. DOI: http://dx.doi.org/10.1287/mnsc.2014.2051Google ScholarDigital Library
- Catherine Grevet, David Choi, Debra Kumar, and Eric Gilbert. 2014. Overload is Overloaded: Email in the Age of Gmail. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Association for Computing Machinery, New York, NY, USA, 793--802. DOI: http://dx.doi.org/10.1145/2556288.2557013Google ScholarDigital Library
- The Radicati Group. 2019. Email Statistics Report 2015--2019. (2019). Retrieved January 07, 2020 from https://www.radicati.com/wp/wp-content/uploads/2015/02/ Email-Statistics-Report-2015--2019-Executive-Summary. pdf.Google Scholar
- Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How Many Interviews Are Enough?: An Experiment with Data Saturation and Variability. Field Methods 18, 1 (2006), 59--82. DOI: http://dx.doi.org/10.1177/1525822X05279903Google ScholarCross Ref
- Il-Horn Hann, Kai-Lung Hui, Sang-Yong T. Lee, and Ivan P. L. Png. 2008. Consumer Privacy and Marketing Avoidance: A Static Model. Management Science 54, 6 (2008), 1094--1103. DOI: http://dx.doi.org/10.1287/mnsc.1070.0837Google ScholarDigital Library
- Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny Can't Opt out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). Association for Computing Machinery, New York, NY, USA, 589--598. DOI: http://dx.doi.org/10.1145/2207676.2207759Google ScholarDigital Library
- Stephen T. Margulis. 2011. Three Theories of Privacy: An Overview. In Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Sabine Trepte and Leonard Reinecke (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 9--17. DOI: http://dx.doi.org/10.1007/978--3--642--21521--6_2Google ScholarCross Ref
- Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press.Google Scholar
- Emilee Rader and Anjali Munasinghe. 2019. "Wait, Do I Know This Person?": Understanding Misdirected Email. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, Article Paper 290, 13 pages. DOI: http://dx.doi.org/10.1145/3290605.3300520Google ScholarDigital Library
- Jacquelyn Trussell. 2004. Is the CAN-SPAM Act the Answer to the Growing Problem of Spam. Loyola Consumer Law Review 175 16 (2004), 175--188. Issue 2. Available at: http://lawecommons.luc.edu/lclr/vol16/iss2/5.Google Scholar
- United States Congress. 2003. Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act). (2003).Google Scholar
- Hal Varian, Fredrik Wallenberg, and Glenn Woroch. 2005. The Demographics of the Do-Not-Call List. IEEE Security & Privacy 3, 1 (Jan 2005), 34--39. DOI: http://dx.doi.org/10.1109/MSP.2005.28Google ScholarDigital Library
- Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulations (GDPR): A Practical Guide. Springer, Cham. DOI: http://dx.doi.org/10.1007/978--3--319--57959--7Google ScholarCross Ref
- Steve Whittaker and Candace Sidner. 1996. Email Overload: Exploring Personal Information Management of Email. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '96). Association for Computing Machinery, New York, NY, USA, 276--283. DOI: http://dx.doi.org/10.1145/238386.238530Google ScholarDigital Library
Index Terms
- Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email
Recommendations
Shades of gray: a closer look at emails in the gray area
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityEvery day, millions of users spend a considerable amount of time browsing through the messages in their spam folders. With newsletters and automated notifications responsible for 42% of the messages in the user's inboxes, inevitably some important ...
Preventing Spam Email by Delivery Limitation in RMX
IDEAS '15: Proceedings of the 19th International Database Engineering & Applications SymposiumOn the rule-based email exchange system called RMX, similar to general mailing lists, anyone can send emails by sending to an address unique to RMX. However, there is a security problem that we cannot prevent spam emails and accidentally sending email ...
Comments