Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2971648.2971696acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Discovering different kinds of smartphone users through their application usage behaviors

Published: 12 September 2016 Publication History
  • Get Citation Alerts
  • Abstract

    Understanding smartphone users is fundamental for creating better smartphones, and improving the smartphone usage experience and generating generalizable and reproducible research. However, smartphone manufacturers and most of the mobile computing research community make a simplifying assumption that all smartphone users are similar or, at best, constitute a small number of user types, based on their behaviors. Manufacturers design phones for the broadest audience and hope they work for all users. Researchers mostly analyze data from smartphone-based user studies and report results without accounting for the many different groups of people that make up the user base of smartphones. In this work, we challenge these elementary characterizations of smartphone users and show evidence of the existence of a much more diverse set of users. We analyzed one month of application usage from 106,762 Android users and discovered 382 distinct types of users based on their application usage behaviors, using our own two-step clustering and feature ranking selection approach. Our results have profound implications on the reproducibility and reliability of mobile computing studies, design and development of applications, determination of which apps should be pre-installed on a smartphone and, in general, on the smartphone usage experience for different types of users.

    References

    [1]
    Nikola Banovic, Christina Brant, Jennifer Mankoff, and Anind Dey. 2014. ProactiveTasks: the short of mobile device use sessions. In Proceedings of the 2014 International Conference on Human-computer Interaction with Mobile Devices and Services. ACM, 243--252.
    [2]
    David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. the Journal of Machine Learning Research 3 (2003), 993--1022.
    [3]
    Matthias Böhmer, Brent Hecht, Johannes Schöning, Antonio Krüger, and Gernot Bauer. 2011. Falling asleep with Angry Birds, Facebook and Kindle: a large scale study on mobile application usage. In Proceedings of the 2011 International Conference on Human Computer Interaction with Mobile Devices and Services. ACM, 47--56.
    [4]
    Karen Church, Denzil Ferreira, Nikola Banovic, and Kent Lyons. 2015. Understanding the Challenges of Mobile Phone Usage Data. In Proceedings of the 2015 International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 504--514.
    [5]
    Trinh Minh Tri Do, Jan Blom, and Daniel Gatica-Perez. 2011. Smartphone usage in the wild: a large-scale analysis of applications and context. In Proceedings of the 2011 International Conference on Multimodal Interfaces. ACM, 353--360.
    [6]
    Hossein Falaki, Ratul Mahajan, Srikanth Kandula, Dimitrios Lymberopoulos, Ramesh Govindan, and Deborah Estrin. 2010. Diversity in smartphone usage. In Proceedings of the 2010 International Conference on Mobile systems, Applications, and Services. ACM, 179--194.
    [7]
    Denzil Ferreira, Jorge Goncalves, Vassilis Kostakos, Louise Barkhuus, and Anind K Dey. 2014. Contextual experience sampling of mobile application micro-usage. In Proceedings of the 2014 International Conference on Human-computer Interaction with Mobile Devices and Services. ACM, 91--100.
    [8]
    Daniel Hintze, Rainhard D Findling, Muhammad Muaaz, Sebastian Scholz, and René Mayrhofer. 2014. Diversity in locked and unlocked mobile device usage. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 379--384.
    [9]
    Ke Huang, Chunhui Zhang, Xiaoxiao Ma, and Guanling Chen. 2012. Predicting mobile application usage using contextual information. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 1059--1065.
    [10]
    Chakajkla Jesdabodi and Walid Maalej. 2015. Understanding usage states on mobile devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1221--1225.
    [11]
    Simon L Jones, Denzil Ferreira, Simo Hosio, Jorge Goncalves, and Vassilis Kostakos. 2015. Revisitation analysis of smartphone app use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1197--1208.
    [12]
    Philip Leroux, Klaas Roobroeck, Bart Dhoedt, Piet Demeester, and Filip De Turck. 2013. Mobile application usage prediction through context-based learning. Journal of Ambient Intelligence and Smart Environments 5, 2 (2013), 213--235.
    [13]
    Huoran Li, Xuan Lu, Xuanzhe Liu, Tao Xie, Kaigui Bian, Felix Xiaozhu Lin, Qiaozhu Mei, and Feng Feng. 2015. Characterizing Smartphone Usage Patterns from Millions of Android Users. In Proceedings of the 2015 ACM Conference on Internet Measurement Conference. ACM, 459--472.
    [14]
    Zhung-Xun Liao, Yi-Chin Pan, Wen-Chih Peng, and Po-Ruey Lei. 2013. On mining mobile apps usage behavior for predicting apps usage in smartphones. In Proceedings of the 2013 ACM International Conference on Information and Knowledge Management. ACM, 609--618.
    [15]
    R Lleti, M Cruz Ortiz, Luis A Sarabia, and M Sagrario Sánchez. 2004. Selecting variables for k-means cluster analysis by using a genetic algorithm that optimises the silhouettes. Analytica Chimica Acta 515, 1 (2004), 87--100.
    [16]
    Anmol Madan, Manuel Cebrian, David Lazer, and Alex Pentland. 2010. Social sensing for epidemiological behavior change. In Proceedings of the 2010 ACM International Conference on Ubiquitous Computing. ACM, 291--300.
    [17]
    Anmol Madan, Manuel Cebrian, Sai Moturu, Katayoun Farrahi, and others. 2012. Sensing the" health state" of a community. IEEE Pervasive Computing 4 (2012), 36--45.
    [18]
    Ujjwal Maulik and Sanghamitra Bandyopadhyay. 2002. Performance evaluation of some clustering algorithms and validity indices. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 12 (2002), 1650--1654.
    [19]
    Norbayah Mohd Suki and Norazah Mohd Suki. 2007. Mobile phone usage for m-learning: comparing heavy and light mobile phone users. Campus-Wide Information Systems 24, 5 (2007), 355--365.
    [20]
    Steven M Pincus. 1991. Approximate entropy as a measure of system complexity. Proceedings of the National Academy of Sciences 88, 6 (1991), 2297--2301.
    [21]
    Ahmad Rahmati and Lin Zhong. 2010. A longitudinal study of non-voice mobile phone usage by teens from an underserved urban community. arXiv preprint arXiv:1012.2832 (2010).
    [22]
    Choonsung Shin and Anind K Dey. 2013. Automatically detecting problematic use of smartphones. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 335--344.
    [23]
    Choonsung Shin, Jin-Hyuk Hong, and Anind K Dey. 2012. Understanding and prediction of mobile application usage for smart phones. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, 173--182.
    [24]
    Vijay Srinivasan, Saeed Moghaddam, Abhishek Mukherji, Kiran K Rachuri, Chenren Xu, and Emmanuel Munguia Tapia. 2014. Mobileminer: Mining your frequent patterns on your phone. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 389--400.
    [25]
    statista. 2016. Number of available applications in the Google Play Store from December 2009 to November 2015. statista. (2016). Retrieved March 26, 2016 from http://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/.
    [26]
    Robert Tibshirani, Guenther Walther, and Trevor Hastie. 2001. Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 63, 2 (2001), 411--423.
    [27]
    Niels van Berkel, Chu Luo, Theodoros Anagnostopoulos, Denzil Ferreira, Jorge Goncalves, Simo Hosio, and Vassilis Kostakos. 2016. A Systematic Assessment of Smartphone Usage Gaps. In Proceedings of the 2016 SIGCHI Conference on Human factors in Computing Systems. ACM, 4711--4721.
    [28]
    Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 2579-2605 (2008), 85.
    [29]
    Qiang Xu, Jeffrey Erman, Alexandre Gerber, Zhuoqing Mao, Jeffrey Pang, and Shobha Venkataraman. 2011. Identifying diverse usage behaviors of smartphone apps. In Proceedings of the 2011 ACM Conference on Internet Measurement Conference. ACM, 329--344.
    [30]
    Tingxin Yan, David Chu, Deepak Ganesan, Aman Kansal, and Jie Liu. 2012. Fast app launching for mobile devices using predictive user context. In Proceedings of the 2012 international conference on Mobile systems, Applications, and Services. ACM, 113--126.
    [31]
    Chunhui Zhang, Xiang Ding, Guanling Chen, Ke Huang, Xiaoxiao Ma, and Bo Yan. 2012. Nihao: A predictive smartphone application launcher. In Mobile Computing, Applications, and Services. Springer, 294--313.
    [32]
    Sha Zhao, Gang Pan, Yifan Zhao, Jianrong Tao, Jinlai Chen, Shijian Li, and Zhaohui Wu. 2016. Mining user attributes using large-scale app lists of smartphones. IEEE SYSTEMS JOURNAL 99 (2016), 1--9.

    Cited By

    View all
    • (2024)Understanding Documentation Use Through Log Analysis: A Case Study of Four Cloud ServicesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642721(1-17)Online publication date: 11-May-2024
    • (2024)HCI Research and Innovation in China: A 10-Year PerspectiveInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2323858(1-33)Online publication date: 22-Mar-2024
    • (2024)DDHCNExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.121564237:PBOnline publication date: 1-Feb-2024
    • Show More Cited By

    Index Terms

    1. Discovering different kinds of smartphone users through their application usage behaviors

      Recommendations

      Reviews

      Paparao S Kavalipati

      With the accelerating adoption of smartphones in the last decade, mobile applications have become increasingly popular as well, with app stores recording billions of downloads. It is of immense interest to phone manufacturers, carriers, and application developers to understand users and usage behaviors, as such knowledge can influence the design of optimal equipment and networking infrastructure in addition to attractive software. Research is still ongoing on this topic, and the underlying patterns are still elusive and not fully recognized. The authors here are attempting to address this challenge by offering new methods and insights, as well as valuable suggestions. According to the authors, the research community so far has been making a simplified assumption when considering users as characterized by a small number of types. Apparently, such a formulation could limit the reproducibility of results learned by different user studies. The authors here suggest a more detailed categorization of users that can potentially improve predictability by deriving more reliable conclusions. The paper is well written and well organized. The introduction contains a good explanation of the background, and the references provide adequate pointers to the relevant literature. Most of the paper describes how the authors have gleaned information out of raw usage data collected in a particular month. Some interesting ideas are floated here in the textual narration rather than being formally presented in algorithmic form. However, these suggestions are worthy of further experimentation by other practitioners and researchers. The dataset here consists of records of user ID, time stamp, and recent tasks utilized. In a preprocessing step, the apps used are extracted from this data and assigned a weight. This step also does filtering, and only active users are considered with some outliers discarded. Because there are thousands of apps, they are grouped into 29 semantic categories. Given these, along with each day divided into four parts, and considering the holidays and weekdays as separate, each user is represented by a vector of 232 dimensions. Clustering works on this user data and makes use of a hybrid method that combines the speed of k -means with the more natural scheme of MeanShift to determine 382 clusters, which represent the user categories. This k -means-MeanShift hybrid method is a novel contribution by the authors. Most of the clusters contain between 100 and 300 users, and the biggest contains 4,981 users. Because 232 features are still too many to characterize a group, the authors have used a selection method based on ranking the general and idiosyncratic features. Results are shown for three large clusters and three small clusters. The biggest cluster is that of night communicators that use phone and SMS past midnight more often. Their usage of the clocking apps in the morning, shopping apps in the afternoon, and music apps on holiday evenings is relatively less common. The second biggest cluster is that of screen checkers that wake up the phone, and perhaps check the time and any notifications, but do not unlock the screen. The smallest cluster reported has 113 users, and they use financial apps more often. They use stock apps more often in the morning on holidays and on weekday mornings and afternoons. They more often use navigation apps during workday mornings, puzzle games on holiday afternoons, and weather-related apps on holiday mornings. For more interesting correlations like these on evening learners, young parents, and car lovers, readers can refer to the full paper. Researchers, phone designers, and application developers will find these details interesting. Overall, this is an impressive paper that is innovative, timely, and thought provoking. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UbiComp '16: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing
      September 2016
      1288 pages
      ISBN:9781450344616
      DOI:10.1145/2971648
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 September 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Badges

      • Best Paper

      Author Tags

      1. clustering
      2. user groups

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      UbiComp '16

      Acceptance Rates

      UbiComp '16 Paper Acceptance Rate 101 of 389 submissions, 26%;
      Overall Acceptance Rate 764 of 2,912 submissions, 26%

      Upcoming Conference

      UBICOMP '24

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)149
      • Downloads (Last 6 weeks)15

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Understanding Documentation Use Through Log Analysis: A Case Study of Four Cloud ServicesProceedings of the CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642721(1-17)Online publication date: 11-May-2024
      • (2024)HCI Research and Innovation in China: A 10-Year PerspectiveInternational Journal of Human–Computer Interaction10.1080/10447318.2024.2323858(1-33)Online publication date: 22-Mar-2024
      • (2024)DDHCNExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.121564237:PBOnline publication date: 1-Feb-2024
      • (2024)Smartphone usage and its associated behaviours among undergraduate medical students in PakistanDiscover Education10.1007/s44217-024-00182-y3:1Online publication date: 28-Jun-2024
      • (2023)Is There Any Relation Between Smartphone Usage and Loneliness During the COVID-19 Pandemic?: A Study by Exploring Two Objective App Usage DatasetsEAI Endorsed Transactions on Pervasive Health and Technology10.4108/eetpht.9.36639Online publication date: 2-Aug-2023
      • (2023)Investigation of the Effects of Smartphone Use on the Dominant Thumb and Wrist of University StudentsMedical Records10.37990/medr.13095855:3(523-31)Online publication date: 18-Sep-2023
      • (2023)A Fast and Minimal System to Identify Depression Using Smartphones: Explainable Machine Learning–Based ApproachJMIR Formative Research10.2196/288487(e28848)Online publication date: 10-Aug-2023
      • (2023)A Mixed-Method Exploration into the Mobile Phone Rabbit HoleProceedings of the ACM on Human-Computer Interaction10.1145/36042417:MHCI(1-29)Online publication date: 13-Sep-2023
      • (2023)A Minimalistic Approach to Predict and Understand the Relation of App Usage with Students' Academic PerformanceProceedings of the ACM on Human-Computer Interaction10.1145/36042407:MHCI(1-28)Online publication date: 13-Sep-2023
      • (2023)You Are How You Use Apps: User Profiling Based on Spatiotemporal App Usage BehaviorACM Transactions on Intelligent Systems and Technology10.1145/359721214:4(1-21)Online publication date: 21-Jul-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media