Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2684103.2684156acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage

Published: 08 December 2014 Publication History

Abstract

Smartphones and tablets are an indispensable part of modern communication and people spend considerable time interacting with their devices every day. While substantial research has been conducted concerning smartphone usage, little is known about how tablets are used. This paper studies mobile device usage characteristics like session length, interaction frequency, and daily usage in locked and unlocked state with respect to location context. Based on logs from 1,585 Android devices (470 years of total usage time), we derive and analyze 23 million usage sessions. We found that devices remain locked for 60% of the interactions and usage at home occurs twice as frequent as at work. With an average of 58 interactions per day, smartphones are used twice as often as tablets, while tablet sessions are 2.5 times longer, resulting in almost equal aggregated daily usage. We conclude that usage session characteristics differ considerably between tablets and smartphones.

References

[1]
G. Chen and D. Kotz. A survey of context-aware mobile computing research. Technical Report TR2000-381, Dartmouth College, 2000.
[2]
H. Falaki, R. Mahajan, S. Kandula, D. Lymberopoulos, R. Govindan, and D. Estrin. Diversity in Smartphone Usage. Proc. MobiSys 2010, 2010.
[3]
Gartner. Gartner says worldwide tablet sales grew 68 percent in 2013, with android capturing 62 percent of the market, 2014. URL http://www.gartner.com/newsroom/id/2674215.
[4]
D. Hintze, R. D. Findling, M. Muaaz, S. Scholz, and R. Mayrhofer. Diversity in Locked and Unlocked Mobile Device Usage. In Proceedings of the 2014 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, 2014.
[5]
B. Jiménez. Modeling of Mobile End-User Context. Master's thesis, Helsinki University of Technology, 2008.
[6]
M. Lindorfer, S. Volanis, A. Sisto, M. Neugschwandtner, E. Athanasopoulos, F. Maggi, C. Platzer, S. Zanero, and S. Ioannidis. Andradar: Fast discovery of android applications in alternative markets. In S. Dietrich, editor, Detection of Intrusions and Malware, and Vulnerability Assessment, volume 8550 of Lecture Notes in Computer Science, pages 51--71. Springer International Publishing, 2014.
[7]
H. Müller, J. L. Gove, and J. S. Webb. Understanding tablet use: A multi-method exploration. In Proceedings of the 14th Conference on Human-Computer Interaction with Mobile Devices and Services (Mobile HCI 2012), 2012.
[8]
E. Oliver. The Challenges in Large-Scale Smartphone User Studies. Proc. HotPlanet 2010, 2010.
[9]
A. Oulasvirta, T. Rattenbury, L. Ma, and E. Raita. Habits make smartphone use more pervasive. Personal and Ubiquitous Computing, 16(1):105--114, 2011.
[10]
P. Riedl and R. Mayrhofer. Towards a practical, scalable self-localization system for android phones based on wlan fingerprinting. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pages 98--101, 2012.
[11]
Y. Shao, X. Luo, and C. Qian. Rootguard: Protecting rooted android phones. Computer, 47(6):32--40, June 2014.
[12]
T. Soikkeli. The effect of context on smartphone usage sessions. Master's thesis, Aalto University School of Science, 2011.
[13]
T. Soikkeli, J. Karikoski, and H. Hämmäinen. Diversity and End User Context in Smartphone Usage Sessions. In Proc. NGMAST 2011, pages 7--12, 2011.
[14]
K. N. Truong, T. Shihipar, and D. J. Wigdor. Slide to X: Unlocking the Potential of Smartphone Unlocking. In Proc. CHI 2014, pages 3635--3644, 2014.
[15]
H. Verkasalo. Contextual patterns in mobile service usage. Personal and Ubiquitous Computing, 13(5):331--342, 2008.
[16]
D. T. Wagner, A. Rice, and A. R. Beresford. Device Analyzer: Large-scale mobile data collection. In Big Data Analytics workshop, ACM Sigmetrics 2013, 2013.
[17]
D. T. Wagner, A. Rice, and A. R. Beresford. Device Analyzer: Understanding smartphone usage. In Proc. MobiQuitous 2013, 2013.
[18]
S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget. Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proceedings of the Working Conference on Advanced Visual Interfaces, AVI '06, pages 177--184, 2006.
[19]
G. Yang. Discovering significant places from mobile phones -- a mass market solution. In R. Fuller and X. Koutsoukos, editors, Mobile Entity Localization and Tracking in GPS-less Environnments, volume 5801 of Lecture Notes in Computer Science, pages 34--49. Springer Berlin Heidelberg, 2009.
[20]
E. V. Zezschwitz, P. Dunphy, and A. D. Luca. Patterns in the Wild: A Field Study of the Usability of Pattern and PIN-based Authentication on Mobile Devices Emanuel. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, pages 261--270, 2013.

Cited By

View all
  • (2022)UnlockLearning – Investigating the Integration of Vocabulary Learning Tasks into the Smartphone Authentication Processi-com10.1515/icom-2021-003721:1(157-174)Online publication date: 1-Apr-2022
  • (2022)Utilising the co-occurrence of user interface interactions as a risk indicator for smartphone addictionPervasive and Mobile Computing10.1016/j.pmcj.2022.10167786:COnline publication date: 1-Oct-2022
  • (2022)Everything you control is not everythingComputers and Security10.1016/j.cose.2022.102778119:COnline publication date: 27-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '14: Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia
December 2014
464 pages
ISBN:9781450330084
DOI:10.1145/2684103
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • JKU: Johannes Kepler Universität Linz

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 December 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Daily interactions
  2. Device unlocking
  3. Locked usage
  4. Session length
  5. Smartphone
  6. Tablet
  7. Usage session
  8. User context

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MoMM '14

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)UnlockLearning – Investigating the Integration of Vocabulary Learning Tasks into the Smartphone Authentication Processi-com10.1515/icom-2021-003721:1(157-174)Online publication date: 1-Apr-2022
  • (2022)Utilising the co-occurrence of user interface interactions as a risk indicator for smartphone addictionPervasive and Mobile Computing10.1016/j.pmcj.2022.10167786:COnline publication date: 1-Oct-2022
  • (2022)Everything you control is not everythingComputers and Security10.1016/j.cose.2022.102778119:COnline publication date: 27-Jun-2022
  • (2022)ApículaComputers and Security10.1016/j.cose.2022.102775119:COnline publication date: 1-Aug-2022
  • (2022)Ibn SinaComputers and Security10.1016/j.cose.2022.102753119:COnline publication date: 27-Jun-2022
  • (2021)A Task Execution Scheme for Dew Computing with State-of-the-Art SmartphonesElectronics10.3390/electronics1016200610:16(2006)Online publication date: 19-Aug-2021
  • (2021)Comparing Concepts for Embedding Second-Language Vocabulary Acquisition into Everyday Smartphone InteractionsProceedings of Mensch und Computer 202110.1145/3473856.3473863(11-20)Online publication date: 5-Sep-2021
  • (2021)The Android Platform Security ModelACM Transactions on Privacy and Security10.1145/344860924:3(1-35)Online publication date: 28-Apr-2021
  • (2021)“It's Like Being Gone For A Second”Proceedings of the 23rd International Conference on Mobile Human-Computer Interaction10.1145/3447526.3472026(1-17)Online publication date: 27-Sep-2021
  • (2020)Researching Mobile LearningAdvancing Educational Research With Emerging Technology10.4018/978-1-7998-1173-2.ch003(33-53)Online publication date: 2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media