evaluating the practical use of this approach as a de-
cision support system. Second, investigating the pos-
sibility of predicting the likelihood that an e-mail in
a thread is an anomaly. As an e-mail thread becomes
larger, it would then be possible to assign a senior cus-
tomer support agent to the e-mail thread before it be-
comes anomalous. And thus, possibly, improving the
customer support experience for the customer.
REFERENCES
Allan, J., Carbonell, J. G., Doddington, G., Yamron, J., and
Yang, Y. (1998). Topic detection and tracking pilot
study final report.
Boldt, M., Borg, A., Ickin, S., and Gustafsson, J. (2020).
Anomaly detection of event sequences using multiple
temporal resolutions and markov chains. Knowledge
and Information Systems, 62(2):669–686.
Borg, A., Ahlstrand, J., and Boldt, M. (2020). Predicting
e-mail response time in corporate customer support.
In Proceedings of the 22nd International Conference
on Enterprise Information Systems - Volume 1: ICEIS,
volume 1, pages 305–314.
Chandola, V., Banerjee, A., and Kumar, V. (2007). Outlier
detection: A survey. ACM Computing Surveys, 14:15.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM Comput. Surv.,
41(3).
Church, K. and de Oliveira, R. (2013). What’s up with
whatsapp?: Comparing mobile instant messaging be-
haviors with traditional sms. In Proceedings of the
15th International Conference on Human-computer
Interaction with Mobile Devices and Services, Mo-
bileHCI ’13, pages 352–361, New York, NY, USA.
ACM.
Flach, P. (2012). Machine learning: the art and science of
algorithms that make sense of data. Cambridge Uni-
versity Press.
Friedman, M., Last, M., Makover, Y., and Kandel, A.
(2007). Anomaly detection in web documents using
crisp and fuzzy-based cosine clustering methodology.
Information Sciences, 177(2):467 – 475.
Halpin, N. (2016). The customer service report: Why great
customer service matters even more in the age of e-
commerce and the channels that perform best.
I.H. Witten, E. F. and Hall, M. (2011). Data Mining - Prac-
tical Machine Learning Tools and Techniques (3rd
ed.). Elsevier.
Janssens, J. H., Postma, E. O., and van den Herik, J. H.
(2011). Maritime anomaly detection using stochastic
outlier selection. In MAD 2011 Workshop Proceed-
ings, page 121. Citeseer.
Kooti, F., Aiello, L. M., Grbovic, M., Lerman, K., and
Mantrach, A. (2015). Evolution of conversations in
the age of email overload. In Proceedings of the 24th
International Conference on World Wide Web, WWW
’15, pages 603–613, Republic and Canton of Geneva,
Switzerland. International World Wide Web Confer-
ences Steering Committee.
Lex, A., Gehlenborg, N., Strobelt, H., Vuillemot, R., and
Pfister, H. (2014). Upset: Visualization of intersecting
sets. IEEE Transactions on Visualization and Com-
puter Graphics, 20(12):1983–1992.
Maaten, L. v. d. and Hinton, G. (2008). Visualizing data
using t-sne. Journal of machine learning research,
9(Nov):2579–2605.
Pamula, R., Deka, J., and Nandi, S. (2011). An outlier de-
tection method based on clustering. Emerging Appli-
cations of Information Technology, International Con-
ference on, 0:253–256.
Rafaeli, A., Altman, D., and Yom-Tov, G. (2019). Cog-
nitive and emotional load influence response time of
service agents: A large scale analysis of chat service
conversations. In Proceedings of the 52nd Hawaii In-
ternational Conference on System Sciences.
Vettigli, G. Minisom: minimalistic and numpy-
based implementation of the self orga-
nizing map. GitHub.[Online]. Available:
https://github.com/JustGlowing/minisom/.
Woods, D., Patterson, E. S., and Roth, E. M. (2002). Can we
ever escape from data overload? A cognitive systems
diagnosis. Cognition, Technology & Work, 4:22–36.
Yilmazel, O., Symonenko, S., Balasubramanian, N., and
Liddy, E. D. (2005). Leveraging one-class svm and
semantic analysis to detect anomalous content. In In-
ternational Conference on Intelligence and Security
Informatics, pages 381–388. Springer.
Zhao, Y., Nasrullah, Z., and Li, Z. (2019). Pyod: A python
toolbox for scalable outlier detection. Journal of Ma-
chine Learning Research, 20(96):1–7.
ICEIS 2021 - 23rd International Conference on Enterprise Information Systems
394