|| T. J. Coan and A. M. Ostrander, “E-Mail Life Cycle Management: Keeping Watch Over the Rising Tide,” International Legal Technology Association, White Paper, Jul. 2009.|
 J. Vandermeer, “Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk,” Information Systems Security, 2006, pp.64-75.
 J. P. Kesan, “Cyber-Working or Cyber-Shirking?: A First Principles Examination on Electronic Privacy in the Workspace,” Florida Law Review, vol. 54, 2002, pp. 289-332.
 AMA Press Room, “2007 Electronic Monitoring & Surveillance Survey,” American Management Association and The ePolicy Institute, Feb. 2008.
 J. R. Tyler, D. M. Wilkinson, and B. A. Huberman, “Email as spectroscopy: Automated discovery of community structure within organizations, “ The Information Society, 21, pp. 133-141, 2005.
 K.. Yelupula, and S. Ramaswamy, “Social network analysis for email classification,” Proceedings of the 46th Annual Southeast Regional Conference, pp. 469-474, 2008.
 J. Shetty, and J. Adibi, The Enron Dataset Database Schema and Brief Statistical Report. http://www.isi.edu/~adibi/Enron/Enron_Dataset_Report.pdf.
 R. D. Twining, M. M. Williamson, and M. Mowbray, “Email prioritization: Reducing delays on legitimate mail caused by junk mail,” Proceedings of the USENIX Annual Technical Conference, pp. 45-58, 2004.
 P-A Chirita, J. Diederich, and W. Nejdl, “MailRank: Using ranking for spam detection,” Proceedings of the ACM CIKM Conference on Information and Knowledge Management, pp. 373-380, 2005.
 C-Y Tseng, J-W Huang, and M-S Chen, “ProMail: Using progressive email social network for spam detection,” Proceedings of the Pan-Asia Conference on Knowledge Discovery and Data Mining, pp. 833-840, 2007.
 C-Y Tseng, and M-S Chen, “Incremental SVM model for spam detection on dynamic email social networks,” Proceedings of the IEEE International Conference on Computational Science and Engineering, 2009.
 C. Neustaedter, A. J. Brush, M. Smith, and D. Fisher, “The social network and relationship finder: Social sorting for email triage,” Proceedings of the Second Conference on Email and Anti-Spam, 2005.
 C. Neustaedter, A. J. Brush, and M. Smith,”Beyond “From” and “Received”: Exploring the dynamics of email triage,” Proceedings of the 2005 Conference on Human Factors in Computing Systems, pp. 1977-1980, 2005.
 D. Fisher, A. J. Brush, B. Hogan, M. Smith, and A. Jacobs, “Using social metadata in email triage: Lessons from the field,” Proceedings of the 2007 Conference on Human-Computer Interaction, pp. 13-22, 2007.
 S. Yoo, Y. Yang, F. Lin, and I-C Moon, “Mining social networks for personalized email prioritization,” Proceedings of the 15th Conference on Knowledge Discovery and Data Mining, pp. 967-976, 2009.
 W-Y Ma, K-J Chen, “Introduction to CKIP Chinese word segmentation system for the first international Chinese word segmentation bakeoff,” Proceedings of the second SIGHAN workshop on Chinese language processing, pp. 168-171, 2003.
 M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor. Newsl.,11, pp. 10-18, 2009.
 Y. EL-Manzalawy and V. Honavar, “Integrating Libsvm into Weka environment,” 2005. Software available at: http://www.cs.iastate.edu/~yasser/wlsvm.
 Cross-validation (statistics), http://en.wikipedia.org/wiki/Cross-validation_(statistics).
 J. Han, and M. Kamber, Data Mining: Concepts and Techniques, Elsevier, San Francisco, 2006.
 林昕潔, 「以SVM與詮釋資料設計書籍分類系統」,國立交通大學資訊科學與工程研究所,碩士論文,2006。
 G. Salton and M. J. McGill, Introduction to Modern Information Retrieval. McGraw-Hill, Inc. New York, NY, USA, 1986.
 G. Salton and C. Buckley, “Term-weighting approaches in automatic text retrieval,” Inf. Process. Manage., vol. 24, pp. 513-523, 1988.
 G. Salton, E. A. Fox and H. Wu, “Extended Boolean Information Retrieval,” 1982
 V. Vapnik, “The Nature of Statistical Learning Theory. 1995,” NY Springer
 R. O. Duda and P. E. Hart, Pattern Classification and Scene Analysis. Wiley New York, 1973.
 M.James, Classification algorithms. John Wiley & Sons, Inc. 1985.
 C. Apte, F. Damerau, and S.M. Weiss, “Text Mining with Decision Trees and Decision Rules”, in Conference on Automated Learning and Discovery, Carnegie-Mellon University, June 1998.
 C. Apte, F. Damerau, and S.M. Weiss, “Automated Learning of Decision Rules for Text Categorization”, in ACM Transactions on Information Systems, 1994.
 P. Domingos and M. Pazzani, “Beyond independence: Conditions for the optimality of the simple bayesian classifier, ”in 13th International Conference on Machine Learning(ICML'96), 1996, pp. 105-112.
 Frawley, W. J., S. G. Paitetsky and C. J. Matheus, “Knowledge Discovery in Databases: An Overview,” Communications of the ACM, Vol. 39, 1996, pp.1-34.
 Fayyad, U., G. P. Shapiro and P. Smyth, “From Data Mining to Knowledge Discovery in Database”, AI Magazine, Vol. 17, 1996, pp.37-54.