Skip to main content

Abstract

Emails constitute a rich source of a company’s information, replacing fax, letters, phone and memos as the dominant form of inter- and intra-business communication. An email system is now a place where task is received, managed and delegated in a company. For small companies, the backbone of modern business, sieving and analyzing tons of business emails consume much business time. There are abundant data mining techniques that can assist email analysis. This paper describes a web-based approach to parse and mine email logs from a POP3 server for content information. The email system affords users a computer-aided tool for decision making. can be associated with diseases with improved visualizations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. Loton, Web content mining with Java. West Sussex, England: Wiley, 2002.

    Google Scholar 

  2. A. Scime, Web Mining: Applications and Techniques. Hershey, PA: Idea Group Publishing, 2004.

    Google Scholar 

  3. D. Sullivan, Document Warehousing and Text Mining NY, NY: Wiley, 2003

    Google Scholar 

  4. A. Kao & S. Poteet, Text mining and natural language processing, SIGKDD Explorations, 7 (1): 2004, 1-2.

    Article  Google Scholar 

  5. R. J. Mooney & R. Bunescu, Mining knowledge from text using information extraction, SIGKDD Explorations, 7(1): 2004, 3-10.

    Article  Google Scholar 

  6. S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C. - W. Chia-Wei Hu, A Behavior-based Approach to Securing Email Systems. Mathematical Methods, Models and Architectures for Computer Networks Security", Proceedings Published by Springer Verlag, 2003: 1-26., St. Petersburg, Russia.

    Google Scholar 

  7. S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C. –W.Chia-Wei Hu, Behavior Profiling of E mail. 1st NSF/NIJ Symposium on Intelligence & Security Informatics,Tucson,Arizona,USA. 2003:1-17.

    Google Scholar 

  8. S. J. Stolfo and S. Hershkop, Email mining toolkit supporting law enforcement forensic analyses. ACM National Conference on Digital Government Research, 2005: 221 - 222 pp, Atlanta, Georgia.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Udoh, E. (2007). Mining E-Mail Content for a Small Enterprise. In: Sobh, T. (eds) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6268-1_33

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6268-1_33

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6267-4

  • Online ISBN: 978-1-4020-6268-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics