skip to main content
10.1145/3313831.3376165acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open Access

Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email

Authors Info & Claims
Published:23 April 2020Publication History

ABSTRACT

A large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with stopping unwanted email. We investigated the user experience of unsubscribing from unwanted email messages by recruiting 18 individuals for via a lab study followed by semi-structured interviews. Based on unsubscribing practices of the study participants, we synthesized eight common unsubscription mechanisms and identified the corresponding user experience challenges. We further uncovered alternative practices aimed at circumventing the need to unsubscribe. Our findings reveal frustration with the prevailing options for limiting access to the self by managing email boundaries. We apply our insight to offer design suggestions that could help commercial providers improve the user experience of unsubscribing and provide users more control over the email they receive.

Skip Supplemental Material Section

Supplemental Material

a38-dev-presentation.mp4

mp4

30.7 MB

References

  1. Irwin Altman. 1976. A Conceptual Analysis. Environment and Behavior 8, 1 (1976), 7--29. DOI: http://dx.doi.org/10.1177/001391657600800102Google ScholarGoogle ScholarCross RefCross Ref
  2. Frank Bentley, Nediyana Daskalova, and Nazanin Andalibi. 2017. "If a Person is Emailing You, It Just Doesn't Make Sense": Exploring Changing Consumer Behaviors in Email. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). Association for Computing Machinery, New York, NY, USA, 85--95. DOI: http://dx.doi.org/10.1145/3025453.3025613Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Nediyana Daskalova, Frank R. Bentley, and Nazanin Andalibi. 2017. It's All About Coupons: Exploring Coupon Use Behaviors in Email. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17). Association for Computing Machinery, New York, NY, USA, 1152--1160. DOI: http://dx.doi.org/10.1145/3027063.3053339Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Dotan Di Castro, Zohar Karnin, Liane Lewin-Eytan, and Yoelle Maarek. 2016. You've Got Mail, and Here is What You Could Do With It! Analyzing and Predicting Actions on Email Messages. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). Association for Computing Machinery, New York, NY, USA, 307--316. DOI: http://dx.doi.org/10.1145/2835776.2835811Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Anders Ericsson and Herbert A. Simon. 1980. Verbal Reports as Data. Psychological Review 87, 3 (1980), 215--251. DOI: http://dx.doi.org/10.1037/0033--295X.87.3.215Google ScholarGoogle ScholarCross RefCross Ref
  6. Kim Flaherty. 2018. Top 10 Design Mistakes in the Unsubscribe Experience. (Apr 2018). Retrieved January 7, 2020 from https://www.nngroup.com/articles/unsubscribe-mistake.Google ScholarGoogle Scholar
  7. Iftah Gamzu, Liane Lewin-Eytan, and Natalia Silberstein. 2018. Unsubscription: A Simple Way to Ease Overload in Email. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). Association for Computing Machinery, New York, NY, USA, 189--197. DOI: http://dx.doi.org/10.1145/3159652.3159698Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Khim-Yong Goh, Kai-Lung Hui, and Ivan P. L. Png. 2015. Privacy and Marketing Externalities: Evidence from Do Not Call. Management Science 61, 12 (2015), 2982--3000. DOI: http://dx.doi.org/10.1287/mnsc.2014.2051Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Catherine Grevet, David Choi, Debra Kumar, and Eric Gilbert. 2014. Overload is Overloaded: Email in the Age of Gmail. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Association for Computing Machinery, New York, NY, USA, 793--802. DOI: http://dx.doi.org/10.1145/2556288.2557013Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. The Radicati Group. 2019. Email Statistics Report 2015--2019. (2019). Retrieved January 07, 2020 from https://www.radicati.com/wp/wp-content/uploads/2015/02/ Email-Statistics-Report-2015--2019-Executive-Summary. pdf.Google ScholarGoogle Scholar
  11. Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How Many Interviews Are Enough?: An Experiment with Data Saturation and Variability. Field Methods 18, 1 (2006), 59--82. DOI: http://dx.doi.org/10.1177/1525822X05279903Google ScholarGoogle ScholarCross RefCross Ref
  12. Il-Horn Hann, Kai-Lung Hui, Sang-Yong T. Lee, and Ivan P. L. Png. 2008. Consumer Privacy and Marketing Avoidance: A Static Model. Management Science 54, 6 (2008), 1094--1103. DOI: http://dx.doi.org/10.1287/mnsc.1070.0837Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Pedro Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, and Lorrie Cranor. 2012. Why Johnny Can't Opt out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '12). Association for Computing Machinery, New York, NY, USA, 589--598. DOI: http://dx.doi.org/10.1145/2207676.2207759Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Stephen T. Margulis. 2011. Three Theories of Privacy: An Overview. In Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, Sabine Trepte and Leonard Reinecke (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 9--17. DOI: http://dx.doi.org/10.1007/978--3--642--21521--6_2Google ScholarGoogle ScholarCross RefCross Ref
  15. Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press.Google ScholarGoogle Scholar
  16. Emilee Rader and Anjali Munasinghe. 2019. "Wait, Do I Know This Person?": Understanding Misdirected Email. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). Association for Computing Machinery, New York, NY, USA, Article Paper 290, 13 pages. DOI: http://dx.doi.org/10.1145/3290605.3300520Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jacquelyn Trussell. 2004. Is the CAN-SPAM Act the Answer to the Growing Problem of Spam. Loyola Consumer Law Review 175 16 (2004), 175--188. Issue 2. Available at: http://lawecommons.luc.edu/lclr/vol16/iss2/5.Google ScholarGoogle Scholar
  18. United States Congress. 2003. Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act). (2003).Google ScholarGoogle Scholar
  19. Hal Varian, Fredrik Wallenberg, and Glenn Woroch. 2005. The Demographics of the Do-Not-Call List. IEEE Security & Privacy 3, 1 (Jan 2005), 34--39. DOI: http://dx.doi.org/10.1109/MSP.2005.28Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulations (GDPR): A Practical Guide. Springer, Cham. DOI: http://dx.doi.org/10.1007/978--3--319--57959--7Google ScholarGoogle ScholarCross RefCross Ref
  21. Steve Whittaker and Candace Sidner. 1996. Email Overload: Exploring Personal Information Management of Email. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '96). Association for Computing Machinery, New York, NY, USA, 276--283. DOI: http://dx.doi.org/10.1145/238386.238530Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format