Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

COMPUTINGPRACTICES

Edgar H. Sibley The Information Lens system is a prototype intelligent information-sharing


Panel Editor
system that is designed to include not only good user interfaces for
supporting the problem-solving activity of individuals, but also good
organizational interfaces for supporting the problem-solving activities
of groups.

IIUTELLIGEUT lUFORlWATIOU-WARING
SYSTEMS

THOMAS W. MALONE, KENNETH R. GRANT, FRANKLYN A. TURBAK,


STEPHEN A. BROBST, and MICHAEL D. COHEN

Much of the work that has been done on computer- It is already a common experience in mature
mediated communication systems (e.g., electronic computer-based messaging communities for people
mail, computer conferencing, and electronic bulletin to feel flooded with large quantities of electronic
boards) has focused on technical capabilities and “junk mail” [5, 11, 21, 341. In current systems people
standards for transporting and storing messages. We often adopt crude methods, such as removing them-
propose to shift our focus to a more general problem, selves entirely from distribution lists that (are of oc-
the information-sharing problem, which has to do with casional interest, in order to avoid being inundated.
disseminating information so that it reaches those At the same time, it is also common for people to be
people to whom it is valuable without interfering ignorant of facts that would facilitate their work and
with those to whom it is not. This problem will that are known elsewhere in their organization. Our
become increasingly important with advances in system uses techniques from artificial intelligence
communication technology, and we suggest three and user-interface design to help solve both these
fundamental approaches to its solution. Our charac- problems: It helps people filter, sort, and prioritize
terization of these approaches will be illustrated messages that are already addressed to them, and it
with examples from a series of informal studies that also helps them find useful messages they would not
we have conducted on how people share informa- otherwise have received.
tion in organizations, and through a description of We believe that the most important use of systems
an intelligent information-sharing system that we like this will not be to just reduce the flow of “junk
have developed called the Information Lens. mail,” but to dramatically increase the amount of
useful information that can be exchanged electroni-
This research was supported in part by Citibank, N.A.; Xerox Corporation; cally without leading to information overload. Many
Wang Laboratories, Inc.; Bankers Trust Company; the Management in the
1990s Program at the Sloan School of Management, MIT; the Center for Infor- previous communication technologies (e.g., the
mation Systems Research at MIT: and the National Science Foundation under printing press, broadcast television, photocopiers)
Grant SES-8213169. Portions of this article appeared previously in [4] and
P51. have increased the amount of information ex-
changed, although their usefulness has been, to
0 1967 ACM OOOl-0782/87/0500-0390 750 some extent, bounded by the limits of information

390 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

overload (e.g., [22]). Computer technology can not to computer-mediated communication systems (see
only increase the amount, speed, and distance of [29] for an exception), and we believe they hold
information flow, it can also increase the selectivity substantial promise, although they do have limita-
with which the information is disseminated. tions (e.g., see [2, 231). We will see how information-
Viewing the problem of information sharing in sharing systems that support the composition of doc-
this general way suggests that much of the work that uments as well as their retrieval allow much more
has been done separately on information-retrieval sophisticated retrieval possibilities.
systems (such as bibliographic search systems) and Before proceeding, it is important to clarify our
database management systems is potentially relevant use of the term filtering. Even though the term has
to the design of computer-mediated communication a literal connotation of leaving things out, we use it
systems. Our discussion shows how concepts from here in a more general sense that includes selecting
both these fields are incorporated in the Information things from a larger set of possibilities. As noted
Lens system and how information-sharing systems above, this positive kind of filtering (i.e., selection)
like this can help integrate communications with may be much more important in information-
both other kinds of systems. One of the key ideas sharing systems than the negative kind of filtering
behind the system is that many of the unsolved (i.e., removal).
problems of natural-language understanding can be
avoided in intelligent information-sharing systems Studies of Information Sharing in Organizations
through the use of semistructured templates (or We made several preliminary studies of how various
frames) for different types of messages. These tem- kinds of information are shared in organizations. We
plates can be used by senders to facilitate message conducted relatively unstructured interviews with
composition. The same templates can then be used 19 people about their information-filtering experi-
by recipients to facilitate construction of a set of ences, needs, and desires, and more structured inter-
rules for filtering and categorizing messages. views with over 30 people that focused on different
kinds of information-filtering environments: (1) pro-
BACKGROUND cessing the contents of their in-box, (2) reading and
The most common approach to the information- dealing with electronic mail, (3) scanning electronic
sharing problem in current electronic messaging bulletin boards, and (4) examining a table of con-
environments is distribution lists or conferencing tents as a basis for deciding which articles to read in
structures based on interest groups (e.g., see [lo]). a journal. In each case we asked the subjects to
Users associate themselves with centralized distribu- explain why they made the filtering decisions they
tion lists or conference topics that are used to dis- did. We then used these “expert protocols” to iden-
perse messages pertaining to particular subjects. tify the general processes and specific kinds of
Users can associate themselves with as many or as knowledge and decision rules that people use for
few distribution lists as they wish. Senders can then extracting valuable information from a large pool of
address messages to these distribution lists or confer- available sources.
ence topics without having to know the specific One valuable outcome of these organizational
individuals who will receive the messages. studies was the refinement of our notions of three
Although distribution lists and conferences are different approaches that could be incorporated in
topical in nature, their focus is generally much an automated message filtering system. We refer to
broader than the interests of a single person. these techniques as the cognitive, social, and economic
Furthermore, since these topics are often targeted approaches to information filtering.
for relatively large audiences, it is usually impos-
sible for the content of all information distributed Cognitive Filtering. This approach works by charac-
to be of interest to all recipients. Users implicitly terizing the contents of a message and the informa-
specify a general area of interest by associating tion needs of potential message recipients and then
themselves with particular distribution lists or con- using these representations to intelligently match
ferences, but they are ultimately responsible for de- messages to receivers. Distribution lists and simple
ciding on a per-message basis which information is keyword matching are rudimentary forms of cogni-
of interest within this context. tive filtering.
Another method of dealing with the information- Participants in our studies often identified the
sharing problem is keyword filtering and other tech- content of a message by matching against certain
niques developed for large text-retrieval systems keywords or phrases in its text. From this assess-
(e.g., [24]). Such techniques have rarely been applied ment of the content of a message, a decision is made

May 1987 Volume 30 Number 5 Communications of the ACM 391


Computing Practices

regarding its applicability to current information ation in evaluating potential information gain. If the
needs. Throughout our organizational studies, vari- number of recipients of some piece of information is
ations on the cognitive approach were frequently very high (i.e., form letters and bulk mailings), then
cited by subjects as a useful technique. the cost per person of formulating the information
Decisions are often based on much more sophisti- will be fairly small to the sender. However, the opti-
cated heuristics than a simple keyword search. Com- mal piece of information to a reader is ofte:n one
plex combinations of both positive and negative that is customized to the reader’s needs-at great
keyword-filtering techniques were used (e.g., “I expense to the sender.
would do an exclusive scan looking for telecommu- There is, however, an important trade-off that
nications articles except for voice mail. In other sub- takes place between quality and personalization.
jects I would do the opposite-I would search for a Even though published articles have a large number
word that would trigger a hit.“). People also used of recipients, the value of the information they con-
other kinds of information (such as the day of the tain is often considerable. In fact, publications with
week on which a meeting occurs) that are not easily a larger audience seem to have more appeal, at least
recognized using keyword methods, and they used in part, because they can afford to publish higher
informal characteristics of items that may not occur quality information. By spreading the cost over a
in the text at all (e.g., “That article sounds too large number of subscribers, a large-volumse publica-
OR-ish [operations research], so I wouldn’t be inter- tion can afford to absorb the higher cost of providing
ested.“). The Information Lens system is designed extremely well-formulated and carefully selected in-
to support a variety of these cognitive-filtering formation to its readers. Ensuring this high level of
techniques. quality is, of course, one of the primary goals of an
editor. The Information Lens currently includes the
Social Filtering. The social approach to information
potential to filter on criteria such as whether the
filtering works by supporting the personal and orga-
message is addressed to the receiver individually or
nizational interrelationships of individuals in a com-
to a distribution list. We will see how much more
munity. It complements the cognitive approach by
elaborate economic-filtering mechanisms, such as
focusing on the characteristics of a message’s sender,
pricing schemes, could also be used.
in addition to its topic.
One important dimension used for filtering by
THE INFORMATION LENS SYSTEM
participants in our studies was the organizational
In order to explore possibilities for these different
relationship between sender and receiver. For exam-
approaches to information sharing, we have devel-
ple, one participant said, “This message is from my
oped a prototype information-sharing system called
supervisor. That means it’s probably of importance
the Information Lens. The current version of this
to me.” The use of organizational and personal rela-
system emphasizes the cognitive approach ,to infor-
tionships for filtering can often be quite subtle: “I
mation filtering and exploits, in a simple w,ay, such
would have to respond to a memo based on several
techniques from artificial intelligence as frames, pro-
requirements. , . . If it came from James Long [chair-
duction rules, and inheritance. Our discussion will
man of the board], . . . I would react quickly-that
suggest how more elaborate kinds of processing and
would be an alert. If it came from Sarah Rowe, . . .
other approaches to filtering could also be included
who is next in the hierarchy, . . . that would be an-
in the same general framework.
other alert flag. If it came from John Ryan, . . . who is
There are five key ideas that form the basis of the
my direct manager, . . . that would be a real immedi-
Information Lens system. Though some of these
ate alert flag-because , , . I deal with him person-
ideas are empirically testable, we treat them here as
ally. I work with him, assisting him on matters.” We
premises for our system design.
will see how this kind of filtering can be used in the
Information Lens system. (1) A rich set of semistructured messagetypes (or
frames) can form the basis for an intelligent
Economic Filtering. The economic-filtering approach
information-sharing system. For example, meet-
relies on various kinds of cost-benefit assessments
ing announcements can be structured as tem-
and explicit or implicit pricing mechanisms. We
plates that include fields for “date,” “time,”
found that persons often had to make a cost-versus-
“place,” “ organizer,” and “topic,” as well as any
value decision to determine whether or not to pro-
additional unstructured information (e.g., [g]).
cess a particular item. The length of a message was
There are three reasons why this idea is impor-
one of the primary factors used by recipients
tant:
to estimate its cost.
A more subtle economic-filtering technique was to (a) Semistructured messagesenable computers to
use the cost of a message to its sender as a consider- automatically process a much wider range of

392 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

information than would otherwise be possi- (4 users can continue to use their existing system
ble. By letting people compose messages with no change;
that already have much of their essential
information structured in fields, we elimi- 0-4 users who make small changes receive some
immediate benefit;
nate the need for any kind of automatic
parsing or understanding of free-text mes- (cl groups of users who adopt the changes receive
sages while still representing enough infor- additional benefits beyond the individual
mation to allow quite sophisticated rules to benefits.
process the messages.
System Overview
(b) Much of the processing that people already do
In order to provide a natural integration with the
with the information they receive reflects a set
capabilities that people already use, our system is
of semistructured messagetypes. In our in-
built on top of an existing electronic mail system.
formal studies, we found that people often
Users can continue to send and receive their mail as
described their filtering heuristics accord-
usual, and have the option of using centrally main-
ing to categories of documents being fil-
tained distribution lists and manually classifying
tered (e.g., “This is a brochure advertising a
messages into folders. The Lens system additionally
seminar. I usually throw these away unless
provides four important optional capabilities:
the title intrigues me or unless it looks like
(1) Structured message templates are available for
a brochure I could use as a model for the
message composition; (2) receivers can specify rules
ones I write.“).
to automatically filter and classify messages arriving
(c) Even if no automatic processing of messages in their mailbox; (3) senders can include as an ad-
were involved, providing senders with a set of dressee of a message, in addition to specific individ-
semistructured messagetemplates would often uals or distribution lists, a special mailbox (currently
be helpful. Two of the people in our infor- named “Anyone”) to indicate that the sender is will-
mal interviews mentioned simple examples ing to have this message automatically redistributed
of this phenomenon: One remarked about to anyone else who might be interested; and (4) re-
how helpful it would be if any memo re- ceivers can specify rules that find and show mes-
questing some kind of action included, in a sages addressed to “Anyone” that they would not
prominent place, the deadline by which the otherwise have seen. By gradually adding new mes-
action needed to be taken; a second com- sage types and new rules, users can continually in-
mented about how wonderful it would be if crease the helpfulness of the system without ever
all the meeting invitations he received in- being dependent on its ability to perfectly filter all
cluded a field about why he was supposed messages.
to be there. We will see below how mes-
System Architecture. The Lens system was written in
sage templates can be provided in a flexible
the Interlisp-D programming environment using
way that encourages, but does not require,
Loops, an object-oriented extension of Lisp. The sys-
their use.
tem runs on Xerox 1108 and 1109 processors con-
(2) Sets of production rules (that may include multiple nected by an Ethernet. We use parts of the Lafite
levels of reasoning in addition to Boolean selection mail system and the XNS network protocols already
criteria) can be used to conveniently specify auto- provided in that environment. Message construction
matic processing for these messages. aids and individual filtering rules all operate on per-
sonal workstations.
(3) The use of semistructured messagetypes and auto- As Figure 1 (next page) illustrates, messages that
matic rules for processing them can be greatly sim-
include “Anyone” as an addressee will be delivered
plified by a consistent set of display-oriented editors
by the existing mail server directly to the explicit
for composing messages,constructing rules, and
addressees as well as to an automatic mail sorter
defining new messagetemplates.
that runs on a workstation and periodically retrieves
(4) The definition and use of semistructured messages messages from the special mailbox. This automatic
and processing rules are simplified if the message mail sorter may then, in turn, send the message to
types are arranged in a frame inheritance lattice. several additional recipients whose rules select it.
(5) The initial introduction and later evolution of a Implementation Status. The Information Lens system
group communication system can be facilitated if currently exists in prototype form. As of this writing,
the process can occur as a series of small changes, the system has been in regular use by about five
each of which has the following properties: members of our research group for over a year, and

May 1987 Volume 30 Number 5 Communicationsof the ACM 393


Computing Practices

a larger scale test has just begun at an industrial


research center.
Malone Messages
The Lens system is based on a set of semistructured
Jones messages. For each message type, the system in-
To: Green cludes a template with a number of fields or slots for
Brown
holding information. Associated with each field are
Anyone
several properties, including the default value of the
field, a list of likely alternative values for the field,
Anyone
and an explanation of why the field is part of the
template.
Figure 2 shows a sample of the highly graphical
interaction through which users can construct mes-
Messages that include “Anyone” as an addressee are sages using these templates (see [31] for a similar
automatically distributed to all receivers whose interest approach to constructing database retrieval queries).
profiles select the messages as well as to the other explicit After selecting a field of a message by pointing with
addressees. a mouse, users can point with the mouse a,gain to
see the field’s default value, an explanation of the
field’s purpose, or a list of likely alternatives for fill-
FIGURE1. The Lens System Includes Components in the Users’ ing in the field. If a user selects one of these alterna-
Workstations and in a Central Server (called “Anyone”) tives, that value is automatically inserted in the

_?_ “_n ‘” .‘( i ,n,’ ,/

Deliver Save Cancel

Topic: Let-Is
Day : M 0 t-1ICIa :i
Meeting Date:
Time: ‘:::I?I>
Place: E53..301
Text:

Some templates already have a number of default values filled in for


different fields.

FIGURE2. Messages Are Composed with a Display-Oriented Editor and


Templates That Have Pop-Up Menus Associated with the Template Fields

394 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

NT/ Bug Fix Request ~ LENS Bug Fix Request

j” Action Request <.


‘---.-
Request for inforrnation

i’ ’ Meeting Proposal
!a
,-.z- Seminar Notice
/
,,” ,,, Meeting Announcement +- LENS Meeting Announcement
,i’ ,i -..
!2 / -.- Meeting Cancellation
:i 1’
/’ --- New LENS Sysout
Message k.------_- --- Software Release =:I:-
‘a,, - Notice &I;;.. --- Bug Fix Announcement
I;
“8, ,;, ‘,.. -.-. Publication Announcement
i, :>., --\
‘.,, ‘L< ., NY1 Article
“,, ‘*,,,‘I
!, :,.” Network Discussion Item
,,
“8,
‘\ ’ Conference Opener
‘\ -- Bug Fix Comrnitrnent
I Cornrnitrnent =ZIII-
-- Meeting Acceptance

FIGURE3. The Message Templates Are Arranged in a Network


with More General Types at the “Top” (shown at the left) and
More Specific Types at the “Bottom” (shown at the right)

message text. Users can also directly edit any fields terest, (2) physical actions or labelled button presses
at any time using the built-in display-oriented text instead of complex syntax, and (3) rapid incremental
editor. For example, users can add as much free text reversible operations whose impact on the object of
as they desire in the text field of the message. interest is immediately visible.” We believe that
By providing a wealth of domain-specific knowl- these features help explain the simplicity of using
edge about the default and alternative values for these editors.
particular types of messages, the system can make
the construction of some messages much easier. For Message Types
example, Figure 2 shows how some message tem- To further simplify the construction and use of mes-
plates, such as a regular weekly meeting announce- sage templates, they are arranged in a network so
ment, may have default values already filled in for that all subtypes of a given template inherit the field
most of their fields and require only a few key- names and property values (e.g., defaults, explana-
strokes or mouse clicks to complete and send off. tions, and alternatives) from the parent template.
Users who do not want to take advantage of these Any subtype may, in turn, add new fields or over-
message construction aids can simply select the most ride any of the property values inherited from the
general message type (message)and use the text edi- parent (e.g., see [3] and (73). For example, the semi-
tor to fill in the standard fields (To, From, and Sub- nar announcement template adds a field for speaker
ject) just as they would have done in the previous that is not present in its parent template meeting
mail system. We expect, however, that the added announcement. The LENS meeting announcement
convenience provided by semistructured templates (Figure 2) adds a number of default values that are
will be a significant incentive for senders to use tem- not present in its parent. The inheritance network
plates in constructing some of their messages. This, eliminates the need to continually reenter redun-
in turn, will greatly increase the amount of informa- dant information when constructing new templates
tion receivers can use in constructing automatic that resemble old ones, and it provides a natural
processing rules for incoming messages. way of organizing templates, thus making it easier
for senders to select the right one.
Direct Manipulation. Both the message editor and The message type lattice is made visible to the
the rule editor (described below) embody the user through the message type browser. Figure 3
features that Shneiderman [28, p. 2511 used to shows this lattice browser for our sample network of
characterize “direct manipulation” interfaces: message types. Users select a template to use in con-
“(1) continuous representation of the object of in- structing a new message by clicking with the mouse

May 1987 Volume 30 Number 5 Communications of the ACM 395


Computing Practices

Save Cancel

IF
clefault. To:
E .,.~11 a r1,3f. i on Frorn:
ci 1 t r I- n 3 t i ‘.i r: ;I, cc :
Subject: ‘Staff Meeting
Date:
Sender:
Topic :
Day:
Meeting Date:
Time:
Place:
Characteristics:
Text:

THEN
Move To: %df~lvlcatings

,,)

FIGURE4. Rules for Processing Messages Are Composed


Using the Same Kind of Editor and the Same Templates As
Those Used for Composing Messages in the First Place

on the desired message type in this browser. By tor, like the message editor shown in Figure 2, for
clicking with a different mouse button, users can creating and modifying the template definitions
view or modify the rules associated with a particular themselves. We expect that in some (e.g., rarely
message type. Like the other message-type charac- used) regions of the network anyone should1 be able
teristics, these rules are inherited by the subtypes of to use this “template editor” to modify an existing
a message template. Thus, for example, with the net- message type or define a new one, while in other
work shown in Figure 3, the rules for processing regions, only specifically designated people should
“notices” and “messages” would be applied to incom- have access to this capability. In the current version
ing “meeting announcements” as well as the rules of the system, a simple version of this edito.r can be
specifically designed for meeting announcements. used to personalize the default, explanation, iand alter-
natives properties of the fields in existing msessage
Group Definition of Message Types. The network
types.
shown in Figure 3 includes some message types that
A given user’s personal profile consists of these cus-
we believe will be useful in almost all organizations
tomizations of the message types, together with a set
(e.g., meeting announcements) and some that are im-
of personal rules for processing messages (see the
portant only in our environment (e.g., LENS meeting
next section) and a set of hierarchically arranged
announcement). Different groups can develop de-
folders for message storage.
tailed structures to represent the information of spe-
cific concern to them. For example, a product design Message Purpose. One characteristic of message
team might have an elaborate network of message classes that is critical in formulating filtering rules is
types describing different aspects of the product the purpose of the message. We expect that an impor-
(e.g., market size estimates, response time estimates, tant part of the frame inheritance network for mes-
alternative power supply vendors). Then, for in- sage types will be a taxonomy of the various com-
stance, marketing specialists who believe that the munication acts that a message might embody (e.g.,
critical factors determining potential market size for [13, 27, 351). For example, messages whose purpose
the product are cost and response time can devote is to request information should be routed tlo people
most of their attention to the messages concerning who know about the topic of the message, whereas
these factors and ignore all the rest of the technical messages whose purpose is to provide information
specifications for the product. should be routed to people who are interestled in the
We have developed another display-oriented edi- topic of the message.

396 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

Rules ated with the message type. Certain rules set the
The Lens environment allows users to build rules for characteristics of messages, based on other field val-
finding, filtering, and sorting messages. Rules consist ues, and then other rules can test messages for these
of a test and an action; if a message satisfies the test, characteristics. For example, Figures 5d and 5e show
then the action specified by the rule is performed on how we can construct a single rule that determines
the message. Figure 4 shows how a display-oriented whether a message is from a VIP and then test for
editor is used to construct rules. This editor uses this characteristic in other rules. This kind of ab-
rule templates based on the same message types as straction mechanism has obvious advantages over a
those used for message construction. We expect that mechanism that requires repetition of the specifica-
this template-based graphical rule construction will tions of a VIP in all the rules that need to test for
be much easier for inexperienced computer users this characteristic. Although specifications in differ-
than more conventional rule or query languages. ent fields are implicitly anded, the characteristics
Constructing the IF part of a rule involves filling mechanism also makes it possible to construct tests
in selection specifications for the different message that include any combination of features in any
fields. The simplest kind of selection specification is combination of fields (i.e., arbitrary Boolean combi-
a string that should appear somewhere in the speci- nations between fields).
fied field. More complex specifications for a field can
be constructed by combining strings with and, or,
not, and parentheses (i.e., arbitrary Boolean combi-
IF Message type: Action request
nations are possible within a field). If specifications Action deadline: Today, Tomorrow
appear in more than one field, then all specifications THEN Move to: Urgent
must be satisfied at once for the rule to succeed (i.e.,
specifications in different fields are implicitly anded). (a)
As in the message editor, the default, alternatives,
and explanation menus are available in the rule edi-
tor: here they facilitate the construction of selection IF Message type: Meeting announcement
specifications. To specify the action (THEN) of a Day: Not Tuesday
rule, users select the word THEN on the rule tem- THEN Delete
plate and then choose an action from the menu.
Typical actions classify messages in specific folders (W
(Figure 5a) or delete messages (Figure 5b). In order to
retain maximum flexibility, it is also possible to
have arbitrary Lisp functions called as either the IF IF Message type: Request for information
or the THEN part of a rule. Subject: Al, LISP
THEN Show
Rules can also be used to find messages of interest
that are addressed to “Anyone,” but which a particu-
lar user would not otherwise see. Figure 5c shows an
example. The Show option for the action of a rule
indicates that the central mail sorter should forward
IF From: Silk, Siegel
messages that satisfy the rule test to the person who THEN SET CHARACTERISTIC: VIP
constructed the rule.
Message Characteristics. In our informal studies of W
how people filter information, we observed many
instances of what could be modeled as a kind of
multilevel processing: In the first phase, items were IF Message type: Action request
Characteristic: VIP
classified (e.g., “This message is from someone
THEN Move to: Urgent
I don’t know . . .” or “This article sounds too
OR-ish . . .” ), and then, in the second phase, some
action was taken (e.g., “. . . so I will throw it away.“). @I
A production-rule formalism like the one we are
using is, of course, well suited for representing this FIGURE5. Rules Can Move Messages to Folders,
kind of multilevel reasoning. We capture a simple Delete Messages, Set “Characteristics” to Be Used
form of it by including a field for characteristics in by Other Rules, or Select Messages Addressed
every rule template, in addition to the fields associ- to “Anyone” to Be Shown to a Given User

May 1987 Volume 30 Number 5 Communications of the ACM 397


Computing Practices

Group Use of Message Types. Individuals who begin ing messages and product descriptions according to
using this system before most other people do can precisely the criteria that are important to a.given
get some immediate benefit from constructing rules buyer. Air travelers, for instance, might specify rules
using only the fields present in all messages (To, with which their own “automated buyers’ agents”
From, Subject, Date). Groups who begin to use a set of could compare a wide range of possible flights and
common message types can get much greater bene- select the one that best matches their preferences in
fits by constructing more sophisticated rules for terms of such factors as cost, convenient arrival and
dealing with more specialized message types. For departure times, window seats versus aisle seats,
example, a general rule might try to recognize “bug minimum number of stops, and so forth. A !fairly
reports” based on the word bug in the subject field, simple set of such rules could, in many cases, do a
although this would be a very fallible test. A com- better job of preference matching than all but the
munity that uses a common template for bug reports most conscientious and knowledgeable human
can construct rules that deal only with messages the travel agents.
senders classify as bug reports. These rules can use
Natural-Language Processing and Information-Retrieval
specialized information present in the template such
Techniques. It is easy to imagine even more sophis-
as the system in which the bug occurred, the ur-
ticated facilities in this framework that could use
gency of the request for repair, and so forth. From
whatever natural-language understanding capabili-
the viewpoint of organization theory, we know that
ties are available to parse unstructured documents
“internal codes” are among the most important pro-
into the templates used by Lens. The extracted fields
ductive assets of an organization [l, 181. In effect,
could then be used for automatic filtering or other
the Lens system provides a medium in which this
processing after which human readers could look at
collective language of an organization can be defined
the full text of selected articles to do more accurate
and redefined.
processing themselves. We have already seen how
the Lens facilities can be used without any auto-
Future Directions matic natural-language understanding capabilities.
Connections with External lnformation Sources. One However, as natural-language parsers become more
of the desirable aspects of the system architecture powerful and accurate, rules like those specified in
we have described is its versatility in dealing with Lens will become more useful for processing a much
external information sources. As indicated above wider range of documents.
messages that are sent to users of the Lens system It is also important to realize that this framework
from people who do not use the system are simply can easily incorporate many existing techniques for
represented as messages of type “message.” When information retrieval in unstructured text (e.g., see
Lens users send messages to others outside the sys- [N]). For example, rules for documents that include
tem, all the fields in the template that are not part of free-text fields could specify adjacency conditions
the standard message header are sent as part of the for keywords in the text fields, and other techniques
text field. such as term truncation and addition of synonyms
It is also possible to do more intelligent translation could also clearly be used (e.g., [23]).
into and out of certain message types. For instance, Extended Knowledge Base. Our system curre:ntly in-
we currently receive daily on-line transmission of cludes lists of topics that are provided as alternatives
selected articles from the New York Times (via the for the topic field in different kinds of messalges. One
system developed in [8]). When the “Anyone” server possible extension to our system is to generallize
receives these messages, it parses out the fields these topic lists into a topic network (similar to the
already present in the wire service feed (e.g., “title,” network of message types that already exists) that
“subject, ” “category,” and “priority”), and formats represents topic-subtopic relationships. Then, for
these messages as Lens templates with the same instance, receivers who indicated an interest in the
fields. Users of our system are then able to construct topic “artificial intelligence” could automatilcally
elaborate sets of production rules for selecting the receive messages about subtopics such as “frames,”
articles they wish to see and sorting them into and “production rules.”
categories. Another extension we would like to explore
One of the most interesting possibilities for such involves adding a knowledge-base server that ,would
systems occurs in the formation of computer-based keep copies of public messages. As per computer
markets (e.g., see [16]). For example, techniques like conferencing systems, users would then be atble to
those described here can be used to screen advertis- retrieve these messages at a later time even if they

399 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

did not receive the messages originally. Significant sages. A more elaborate kind of support would allow
power can also be added to the system by viewing receivers to create lists of people whose opinions
field values as database objects rather than mere they value on various topics. When these people
text strings. Rules could then access information read messages, they may choose to “endorse” them.
from these embedded objects in deciding how to han- Messages can then be prioritized for a given receiver
dle messages. For example, rules could check the job based on the number of endorsements received from
title or organizational position of the message sender people on that receiver’s endorsement list. An ob-
if these characteristics were stored in a central vious extension would allow assigning different
database. weights to different endorsers and letting endorsers
indicate the strength of their endorsements. For
Forms Processing. One of the attractive features of
high-volume topics, this process can be formal-
the general system architecture we are using is that
ized still further by having some people perform as
it is relatively easy to gradually add more and more
“editors” who select messages according to both
kinds of knowledge (see [li’]). For example, we
relevance and quality.
would like to experiment with having the system
automatically reply or otherwise respond to certain Economic Filtering. One feature of most current
kinds of messages. Meeting announcements that message systems that is highlighted by an economic
meet certain criteria, for instance, could automati- perspective is that the cost of sending multiple cop-
cally be added to a calendar database. More elabo- ies of messages is borne primarily by recipients. The
rate forms-processing systems could be built on top economic approach to information filtering implies
of the capabilities we already have. For instance, an that it might sometimes be in the best interest of an
accounting clerk might have rules for automatically electronic-mail community to shift these incentives
processing travel expense reports that met certain so that senders of messages are charged in a way
criteria for being “routine,” and saving all “nonrou- that reflects some of the costs to receivers [g]. For
tine” forms for the personal attention of the clerk. example, senders of unsolicited messages could be
This kind of “fail soft” approach to forms processing charged (in actual money or through a point system)
is much more flexible than many traditional in proportion to the value of the time people will
approaches. spend reading their messages, that is, more for long
messages and for messages sent to many people, and
Other Approaches to Information Filtering possibly even more for messages to highly paid re-
The Information Lens system relies primarily on the cipients. An even more extreme version would
cognitive filtering approach, by characterizing the allow people who receive “junk mail” to cause the
information contents of a message and the informa- sender to be penalized by means of a surcharge.
tion needs of potential message recipients. Even A somewhat subtler way to reduce “junk mail” is
though the system depends on its human users to suggested by the observation that receivers use the
encode and interpret this information, the success of cost of a message to its sender as a consideration in
the system still relies on the ability of the message filtering. An electronic messaging system can use
and rule templates to represent the information this approach by letting senders spend limited re-
being communicated. Social and economic filtering
sources to signal receivers that a message deserves
suggest ways of facilitating information sharing that more than the usual priority. Some receivers might
do not require the system to represent message then have “asking prices” on their mailboxes that
content. screen out all messages below a certain cost [5].
Social Filtering. We have already seen how the Other receivers might construct rules that use the
Information Lens can include rules that process mes- cost to the sender as one of a number of factors in
sages according to characteristics of the sender. So- filtering and prioritizing messages.
cial filtering relies not just on the characteristics of In any system where senders pay some of the
the author, but also on the references and recom- costs of communication (including current systems
mendations of other people. For instance, it is our where the cost is mostly time), there is a disincen-
experience that almost no one actually scans all po- tive for people with potentially valuable information
tentially relevant journals in their field; people read to disseminate it. To remedy this deficiency, the
the articles that colleagues most often refer to and recipients of valuable information can sometimes
recommend. A rudimentary kind of support for this compensate the sender. For example, Turoff [33]
process already exists in most electronic messaging describes a system that supports an internal “free
systems in the form of facilities for forwarding mes- market” for information and services within an

May 1987 Volume 30 Number 5 Communicationsof the ACM 399


ComputingPractices

organization. Certain kinds of information are highly many social forces at work in organizations that af-
desirable, and employees who know (or have skills fect how responsive people are to each other’s com-
to obtain) this information can sell the information munications, and in many cases these forces would
or “contract out” some of their time to high bidders strongly discourage people from automatically delet-
anywhere in the organization. ing messages addressed to them personally. A much
more likely scenario, we believe, is that people will
Combined Approaches. It is important to realize that
use the capabilities of the system to sort and priori-
the most useful information-sharing systems are
tize messages addressed to them personally and will
likely to be combinations of the approaches we have
use automatic deletion primarily for nonpersonal
described. For example, pricing schemes are likely
messages addressed to large numbers of people via
to work much more effectively when topic structur-
distribution lists, conference topics, and bulletin
ing mechanisms are in place to indicate which topics
boards.
receivers are willing to pay for and which they
In this case, of course, the ability of receivers
would have to be paid to read about. One problem
with this approach, however, is that senders might to filter out “public” messages that are unlikely
to be interesting to them increases the usefulness
try to receive extra payments by classifying their
of the public communication channel in two ways:
messages into highly valued topic areas-for which
(1) Receivers are more likely to attend to communi-
the messages were actually irrelevant. This problem
cation channels whose “richness” (i.e., probability of
could be minimized through social or economic fil-
tering mechanisms. For example, “editors” could be being interesting) is greater, and (2) senders are
likely to send out more information if they are not
paid to filter information on certain topics. Editors
worried about incurring the displeasure of many
who filter well would be able to charge more for
uninterested receivers whose mailboxes would be
their services, and those who did not would find
their “subscribers” dwindling away. cluttered.

Imperfect Finding. Another concern occasionally ex-


Potential Problems with Systems of This Type
pressed about systems like this is that people may
Almost any powerful technology that has the poten-
have difficulty knowing what they want and do not
tial to benefit people also has potentials for misuse
want to see until they have seen it. Here, of course,
or unintended negative consequences. The system
the relevant comparison should be not to a:n omni-
we have described is intended to help avoid some
scient and perfect system, but to the plausible alter-
potential negative consequences of computer-
natives that are available. No system, including the
mediated communication systems (e.g., information
one described here, can do a perfect job of finding
overload for individuals) and at the same time to
all and only the information in which a given user is
take advantage of some even greater potential bene-
interested. We believe, however, that capabilities
fits (e.g., selective sharing of much more information
like those we have described increase the likelihood
in organizations as a whole). In order to use a new
that people will find useful information they would
technology wisely, it is important to try to anticipate
not otherwise have encountered.
and encourage beneficial uses and to anticipate and
One simple mechanism for helping people find
avoid possible negative consequences. Since much of
messages they do not know they want is to give
this article has been devoted to describing potential
them the option of seeing some number of randomly
benefits from systems of this type, in this section we
chosen messages each day. (These messages should,
briefly describe a few potentials for misuse and some
of course, be chosen from the “public” messages ad-
possible remedies.
dressed to “Anyone” and not from private messages
Excessive Filtering. Some people, on hearing descrip- between individuals.) Some of the random messages
tions of this system, worry that it might be used to may, in fact, be of interest and may lead thleir recipi-
decrease the flow of information in an organization. ents to establish filters that select other similar mes-
For instance, certain individuals might use it to filter sages in the future. A slightly more sophisticated
out messages personally addressed to them and thus version of this approach is to have each user’s rules
to become less responsive to information from other assign a “probable interest value” to all messages.
people in their organization. While this is a possibil- Techniques used for document ranking (such as
ity, we believe it is an unlikely one. The system lets term weighting) could be helpful for this purpose
users decide how cautious or how reckless they [20, 231. The system could then show a user all mes-
want to be in specifying rules for automatic deletion sages above some “interest threshold,” and a sample
of the messages they receive. There are already of other messages that are below that threshold, but

400 Communications of the ACM May 1987 Volume 30 Number 5


Computing Practices

randomly selected in a way that favors messages of new kind of nonintrusive and (in some cases) non-
higher probable interest. objectionable method for conducting instant “opin-
ion surveys” or “market research.” Clearly, careful
Excessive Processing Loads. In the prototype version
thought is needed about when and how these possi-
of the Lens system, there is only one “Anyone”
bilities are desirable, but we think the possibilities
server for all the users of the system. Clearly, when
are quite intriguing.
systems like this are used on a larger scale, such a
single server could easily become overloaded. It is a Conflicts of Interest. Most of the capabilities for in-
straightforward matter, however, to have multiple formation sharing that are included in the current
“Anyone” servers spread throughout an organiza- Information Lens system can be expected to work
tion, each one, for example, serving a different best in communities where people share goals and
group, department, or division. Each of these servers where there are not strong conflicts of interest about
can, in turn, have rules that determine when to for- whether certain kinds of information are worthy of
ward messages they receive on to other “Anyone” attention. When there are such conflicts-for exam-
servers elsewhere in the organization. ple, when an “advertiser” wants you to pay attention
Privacy Concerns. Many important issues of privacy to something that you will in fact regard as “junk
and security are raised by any computer-mediated mail”-then filtering capabilities like those we have
communication system that carries personally or described can sometimes be defeated. For instance,
organizationally sensitive information. These issues someone who wants many people to read a particu-
are, of course, important in systems like the one we lar message can indicate that the message is about a
have described, but they are not unique here. For popular topic when, in fact, the message is not about
instance, it is already common in electronic-mail that topic at all. It is, of course, possible to evolve
systems to restrict the audience for certain messages filters to combat such maneuvers (e.g., “delete all
by addressing the messages only to specific individ- messages from X, regardless of the topic indicated”),
uals or to distribution lists whose membership is but this kind of “game” can continue to escalate
restricted. The Information Lens system uses the with each side adopting more and more subtle
underlying mail system in this way and adds one techniques to filter out (or filter in) the messages.
more level of “public” information (i.e., messages We believe that situations involving conflicts of
addressed to “Anyone”). We have also implemented interest like this are probably better handled by the
a simple extension to the system that allows mes- social and economic approaches to information
sages to be addressed to “Anyone-in-( distribution filtering [14].
list name).”
There are also some intriguing new possibilities RELATED WORK
raised by intelligent information-sharing systems There are several other previous approaches to
that are not present in all computer-mediated com- structuring information sharing in electronic com-
munication systems. For example, the rules about munities that have been used much less widely than
how people filter, select, and prioritize their mes- distribution lists, conference topics, and keyword re-
sages constitute a new kind of potentially sensitive trieval methods. These include (1) using associative
information that is stored in the system. Would em- links between textual items to represent relation-
ployees, for instance, want their supervisors to know ships such as references to earlier (or later) docu-
that they had filters selecting notices about job op- ments on similar topics, replies to previous mes-
portunities in other parts of the company? It is not sages, or examples of general concepts (e.g., [6, 321);
clear, however, that people’s rules should always be and (2) representing and using detailed knowledge
kept completely confidential. Sometimes, for in- about specific tasks such as calendar management or
stance, people may want others to know that they project management (e.g., [26]). Our system is, in
are interested in certain topics, so as to encourage some sense, at an intermediate level between these
the formation of interest groups. There may also be two approaches. It includes more knowledge about
times when it is desirable to tell the senders of mes- specific domains than simple associative links, but it
sages addressed to “Anyone” how many people’s can be used for communicating about any domain,
rules actually selected the messages, without reveal- even those for which it has no specific knowledge.
ing the names of the recipients. Similarly, there may A few systems (e.g., [19]) have used artificial-
be times when it is desirable to display the numbers intelligence techniques such as production rules to
(but not the names) of people interested in different reason about the contents of messages from the pres-
topics, Devices like these could thus provide a ence or absence of keywords in unstructured text.

May 1987 Volume 30 Number 5 Communicationsof the ACM 401


Computing Practices

We have not focused on facilitating the kind of 19. McCune, B.P., Tong, R.M., Dean, J.S., and Shapiro, D.G. RUBRIC:
A system for rule-based information retrieval. IEEE Trrrns. Soffw.
real-time information sharing that occurs in face-to- Eng. SE-II, 9 (Sept. 1985), 939-944.
face meetings (e.g., [25, 301) or teleconferencing 20. Noreault. M.K., and McGill, M.J. Automatic ranked oulput from
Boolean searches in SIRE. 1. ASIS 28 (1977). 333-339.
(e.g., [12]). We believe, however, that the aids we 21. Palme, J. You have 134 unread mail do you want to read them now?
described could be useful in some real-time meet- In IFIP Conference on Compufer Based Message Services (Nottingham.
U.K.). IFIP, 1984.
ings [especially those involving very many people), 22. Pool, I. Tracking the flow of information. Science 221.4611 (Aug.
and that these aids could eliminate the need for 1983), 609-613.
23. Salton. G. Another look at automatic text-retrieval systems.
some meetings altogether. Commun. ACM 29. 7 (July 1986). 648-656.
24. Salton, G.. and McGill, M. Introduction fo Modern lnforrnafion Re-
frieval. McGraw-Hill, New York, 1983.
Acknowledgments. Much recent work on the Infor- 25. Sari”. SK., and Greif. I. Computer-based real-time conferencing sys-
mation Lens system has been done by Kum-Yew Lai, tems. Computer 18 (Oct. 1985), 33-45.
26. Sathi. A., Fox. MS., and Greenberg, M. Representation of activity
Ramana Rao, and David Rosenblitt. Kevin Crowston knowledge for project management ZEEE Trans. Pattern Anal. Mach.
implemented and maintains the mail gateway be- Infell. PAMI-7, 5 (1985), 531-552.
27. Searle, J. A taxonomy of illocutionary acts. In Minnesota Studies in
tween our system and the outside network world, fhe Philosophy of Language. K. Gunderson. Ed. University of Minne-
Chee-Seng Chow helped implement the first version sota Press. Minneapolis, Minn.. 1975.
28. Shneiderman, B. The future of interactive systems and the emer-
of the central mail sorter, and Constance Perin col- gence of direct manipulation. Behav. Inf. Technol. I, 2 (1982).
laborated in some of the early studies on information 237-256.
29. Stallman. R. ZMail Manual. MIT Artificial Intelligence Laboratory,
sharing in organizations. We gratefully acknowledge Cambridge, Mass., 1983.
all of these contributions. 30. Stefik. M.. Foster, G.. Bobrow, D.G., Kahn, K.. Lanning. S.. and Such-
man, L. Beyond the chalkboard: Computer support for collaboration
and problem solving in meetings. Commun. ACM 30, 1 ~(Jan.1987),
REFERENCES 32-47.
1. Arrow, K. Limits of Organizafion. Norton, New York, 1974. 31. Too. F.N.. Williams, M.D., Fikes, R.E.. Henderson, D.A., and Malone,
2. Blair, D.C.. and Maron, M.E. An evaluation of retrieval effectiveness T.W. RABBIT: An intelligent database assistant. In Proceedings of the
for a full-text document-retrieval system. Commun. ACM 28. 3 (Mar. Nafional Conference of the American Association for Artificial Znfelli-
1985). 289-299. gence (Pittsburgh. Pa., Aug. 18-20). American Association for Artifi-
3. Brachman. R., and Schmolze. J. An overview of the KL-ONE Knowl- cial Intelligence. 1982.
edge Representation System. Cognitive Sci. 9 (19851, 171-216. 32. Trigs, R. Network approach to text handling for the online scientific
4. Brobst, S.A., Malone, T.W., Grant, K.R., and Cohen, M.D. Toward community. Ph.D. thesis. CSTR-1346, Dept. of Computer Science,
intelligent message routing systems. In Computer Message Systems- Univ. of Maryland, College Park, Nov. 1983.
85: Proceedings of the 2nd International Symposium on Computer Mes- 33. Turoff, M. Information, Value and the Infernal Marketplace. New Jersey
sage Systems. R. Uhlig. Ed. North-Holland, Amsterdam, 1986. Institute of Technology, Newark, 1983.
5. Denning, P. Electronic junk. Commun. ACM 23, 3 (Mar. 1982). 34. Wilson, P.. Maude. T., Marshall, C., and Heaton, N. Th’a active mail-
163-165. box-Your on-line secretary. In IFIP Conference on Computer Based
6. Englebart, D.C.. and English, V.K. Research center for augmenting Message Services (Nottingham, U.K.). IFIP, 1984.
human intellect. In Proceedings of the Fall Joint Computing Congress. 35. Winograd. T., and Flores, F. Understanding Computers a.ld Cognition:
(Dec.). AFIPS Press, Reston. Va., 1968, pp. 395-410. A New Foundation for Design. Ablex, Norwood, N.J., 1986.
7. Fikes, R., and Kehler, T. The role of frame-based representation in
reasoning. Commun. ACM 28, 9 (Sept. 1985). 904-920.
8. Gifford, D.K., Baldwin, R.W.. Berlin, ST., and Lucassen, J.T. An CR Categories and Subject Descriptors: H.l.2 [Models and Princi-
architecture for large scale information systems. In Proceedings of the ples]: User/Machine Systems; H.2.1 [Database Management]: Logical
10th ACM Symposium on Operating Systems Principles (Orcas Island, Design-dafa models; schema and subschema; H.2.3 [Database Manage-
Wash., Dec.). ACM, New York, 1985. pp. 161-170. ment]: Languages-data description languages (DDL); H.2.4 [Database
9. Goldstein, I.P., and Bobrow, D.G. Descriptions for a programming Management]: Systems-distributed systems; H.3.1 [Information Storage
environment. In Proceedings of the 1st Annual National Conference on and Retrieval]: Content Analysis and Indexing; H.3.4 [Information Stor-
Arfificial Intelligence (Stanford, Calif., Aug.). American Association age and Retrieval]: Systems and Software: H.4.1 [Information Systems
for Artificial Intelligence, 1980. Applications]: Office Automation; H.4.3 [Information Systlems Applica-
10. Hiltz, S.R.. and Turoff, M. The Network Nation: Human Communica- tions]: Communications Applications; 1.2.1 [Artificial Intelligence]:
fion via Compufer. Addison-Wesley, Reading, Mass., 1978. Applications and Expert Systems-office automation; 12.4 [Artificial
11. Hiltz, S.R., and Turoff, M. Structuring computer-mediated commu- Intelligence]: Knowledge Representation Formalisms and h4ethods-
nication systems to avoid information overload. Commun. ACM 28, 7 frames and scripts; representations; 1.7.2 [Text Processing]: Document
(July 1985). 680-689. Preparation-format and notation
12. Johansen, R. Teleconferencing and Beyond: Communications in the General Terms: Design, Economics, Human Factors, Management
Office of the Future. McGraw-Hill, New York, 1984. Additional Key Words and Phrases: Information Lens
13. Kedzierski, B. Communication and management support in system
development environments. In Proceedings of the Conference on
Human Factors in Computer Systems (Gaithersburg, Md., Mar. 15-17). Received 6/86; revised 9/86; accepted 9/86
National Bureau of Standards, Washington, DC.. 1982, pp. 163-168.
14. Malone, T. Designing organizational interfaces. In Proceedings of the
CHI 85 Conference on Human Factors in Computing Sysfems (San Fran- Authors’ Present Addresses: Thomas W. Malone, Kenneth 17. Grant,
cisco, Calif.. Apr. 14-18). ACM, New York, 1985, pp. 66-72. Frankly” A. Turbak, Stephen A. Brobst, Massachusetts Institute of Tech-
1.5. Malone, T.W., Grant, K.R., and Turbak, F.A. The Information Lens: nology, Cambridge, MA 02139; Michael D. Cohen, University of Michi-
An intelligent system for information sharing in organizations. In gan, Ann Arbor, MI 48104.
Proceedings of the CHI 86 Conference on Human Factors in Computing
Sysfems (Boston, Mass., Apr. 13-17). ACM, New York, 1986, pp. l-8.
16. Malone, T.W., Yates, J., and Benjamin, R.I. Electronic markets and Permission to copy without fee all or part of this material is granted
electronic hierarchies. Commun. ACM. To be published. provided that the copies are not made or distributed for direct commer-
17. Malone, T.W., Grant, K.R., Lai. K.Y., Rao, R., and Rosenblitt, D. cial advantage, the ACM copyright notice and the title of the publication
Semi-structured messages are surprisingly useful for computer- and its date appear, and notice is given that copying is by permission of
supported coordination. ACM Trans. Off. Inf Sysf. To be published. the Association for Computing Machinery. To copy otherwise, or to
18. March, J.G., and Simon, H.A. Organizations. Wiley, New York, 1958. republish, requires a fee and/or specific permission.

402 Communications of the ACM May 1987 Volume 30 Number 5

You might also like