Electronic mail massively known as e-mail has been a competent and widely accepted
communication mechanism as the Internet community increases. This has necessitated
attention towards managing and maintaining e-mail because it is prone to misuse
both at individual and organizational levels (Taiwo et al., 2010). The major challenges
that are most supreme in e-mail management are disordered e-mail messages, and
congested and unstructured e-mails in mail boxes. It may be very hard to find stored
e-mail messages, search for previous e-mails with specified contents or features when
the mails are not well-structured and organized (Androutsopoulos et al., 2000).
E-mail messages are originally designed to be sent, accumulated in repository and
periodically collected and read by recipient, which amounts to the details of an event
or a meeting’s upcoming agenda for a particular organization. Schuff et al. (2007) have
studied e-mail to be widely used to synchronize real-time communication which does
not conform with its primary goal. The need for effective management of e-mails arose
since most people rely on e-mails for efficiency and effectiveness of communication as
mailboxes may become congested. Messages range from static organization knowledge
to conversations with such a wide possibility of messages. Users may find it difficult to
prioritize and successfully process the contents of new incoming messages. Also, it
may be difficult to find a previously stored message in the mailbox (Schuff et al., 2007).
Electronic mail is of different types and categories depending on the users’ interest.
Some important electronic mails such as confirmation of bank account or any account,
delivery or meeting notification are always received with good mind without any
complaint since they are expected e-mails. Away from this, there are some unscrupulous
and unanticipated e-mails from different sources such as newsletters, event planning,
marketing, error messages from broken Universal Resource Locator (URL), virus
e-mails and spam e-mails (Saldana, 2009).
Other categories include: transactional alerts, marketing, duplicates, opt-in
confirmations, welcome messages, opt-out confirmations, apologies and corrections to
the broken URL in the preceding e-mail, add notifications, inscrutable blank messages,
spam and viruses (Mock et al., 1997).
|