skip to main content
research-article

A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics

Published:30 June 2017Publication History
Skip Abstract Section

Abstract

Today, mobile devices like smartphones and tablets have become an indispensable part of people's lives, posing many new questions e.g., in terms of interaction methods, but also security. In this paper, we conduct a large scale, long term analysis of mobile device usage characteristics like session length, interaction frequency, and daily usage in locked and unlocked state with respect to location context and diurnal pattern. Based on detailed logs from 29,279 mobile phones and tablets representing a total of 5,811 years of usage time, we identify and analyze 52.2 million usage sessions with some participants providing data for more than four years.

Our results show that context has a highly significant effect on both frequency and extent of mobile device usage, with mobile phones being used twice as much at home compared to in the office. Interestingly, devices are unlocked for only 46 % of the interactions. We found that with an average of 60 interactions per day, smartphones are used almost thrice as often as tablet devices (23), while usage sessions on tablets are three times longer, hence are used almost for an equal amount of time throughout the day. We conclude that usage session characteristics differ considerably between tablets and smartphones. These results inform future approaches to mobile interaction as well as security.

References

  1. Matthias Böhmer, Brent Hecht, Johannes Schöning, Antonio Krüger, and Gernot Bauer. 2011. Falling asleep with Angry Birds, Facebook and Kindle - A Large Scale Study on Mobile Application Usage. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services - MobileHCI ‘11 January (2011), 47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Guanling Chen and David Kotz. 2000. A Survey of Context-Aware Mobile Computing Research. Technical Report. Google ScholarGoogle Scholar
  3. Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, and Matthew Smith. 2014. Now You See Me, Now You Don't - Protecting Smartphone Authentication from Shoulder Surfers. Sigchi (2014), 2937--2946. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hossein Falaki, Ratul Mahajan, Srikanth Kandula, Dimitrios Lymberopoulos, Ramesh Govindan, and Deborah Estrin. 2010. Diversity in Smartphone Usage. Proceedings of the 8th international conference on Mobile systems, applications, and services - MobiSys ‘10 (2010), 179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Benjamin Finley and Tapio Soikkeli. 2016. Multidevice mobile sessions: A first look. Pervasive and Mobile Computing (in press) (2016).Google ScholarGoogle Scholar
  6. Preetinder S Gill, Ashwini Kamath, and Tejkaran Singh Gill. 2012. Distraction: an assessment of smartphone usage in health care work settings. Risk Manag Healthc Policy 5, 1 (2012), 105--14.Google ScholarGoogle ScholarCross RefCross Ref
  7. Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Daniel Hintze, Rainhard Dieter Findling, Muhammad Muaaz, Eckhard Koch, and René Mayrhofer. 2015. CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication. UbiComp 2015 Adjunct Publication (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Daniel Hintze, Rainhard D Findling, Muhammad Muaaz, Sebastian Scholz, and René Mayrhofer. 2014. Diversity in Locked and Unlocked Mobile Device Usage. In UbiComp 2014 Adjunct Publication. 379--384. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Daniel Hintze, Rainhard Dieter Findling, Sebastian Scholz, and René Mayrhofer. 2014. Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. In Proceedings of MoMM 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Daniel Hintze, Muhammad Muaaz, Rainhard Dieter Findling, Sebastian Scholz, Eckhard Koch, and René Mayrhofer. 2015. Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. In Proceedings of MoMM 2015. 384--388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Daniel Hintze and Andrew Rice. 2016. Picky: Efficient and Reproducible Sharing of Large Datasets Using Merkle-Trees. 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) (2016), 30--38.Google ScholarGoogle Scholar
  13. Borja Jiménez. 2008. Modeling of Mobile End-User Context. Ph.D. Dissertation. Helsinki University of Technology.Google ScholarGoogle Scholar
  14. Jeffrey H Kuznekoff and Scott Titsworth. 2013. The impact of mobile phone usage on student learning. Communication Education 62, 3 (2013), 233--252.Google ScholarGoogle ScholarCross RefCross Ref
  15. Min Kwon, Joon-Yeop Lee, Wang-Youn Won, Jae-Woo Park, Jung-Ah Min, Changtae Hahn, Xinyu Gu, Ji-Hye Choi, and Dai-Jin Kim. 2013. Development and validation of a smartphone addiction scale (SAS). PloS one 8, 2 (2013), e56936.Google ScholarGoogle ScholarCross RefCross Ref
  16. Heyoung Lee, Heejune Ahn, Samwook Choi, and Wanbok Choi. 2014. The SAMS: Smartphone Addiction Management System and Verification. Journal of Medical Systems 38, 1 (2014), 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yu-Kang Lee, Chun-Tuan Chang, You Lin, and Zhao-Hong Cheng. 2014. The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior 31 (2014), 373--383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yu-Hsuan Lin, Yu-Cheng Lin, Yang-Han Lee, Po-Hsien Lin, Sheng-Hsuan Lin, Li-Ren Chang, Hsien-Wei Tseng, Liang-Yu Yen, Cheryl C H Yang, and Terry B J Kuo. 2015. Time distortion associated with smartphone addiction: Identifying smartphone addiction via a mobile application (App). Journal of Psychiatric Research 65 (2015), 139--145.Google ScholarGoogle ScholarCross RefCross Ref
  19. Gonçalo M. S. Marques and Rui Pitarma. 2016. Smartphone Application for Enhanced Indoor Health Environments. Journal of Information Systems Engineering 8 Management 1, 4 (2016), 1--9.Google ScholarGoogle Scholar
  20. Hendrik Müller, Jennifer Gove, and John Webb. 2012. Understanding Tablet Use - A Multi-Method Exploration. Proceedings of the 14th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI'12) (2012), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Earl Oliver. 2010. The Challenges in Large-Scale Smartphone User Studies. Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement - HotPlanet ‘10 (2010), 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Antti Oulasvirta, Tye Rattenbury, Lingyi Ma, and Eeva Raita. 2011. Habits make smartphone use more pervasive. Personal and Ubiquitous Computing 16, 1 (jun 2011), 105--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Charlie Pinder, Russell Beale, and Robert J Hendley. 2016. Accept the Banana : Exploring Incidental Cognitive Bias Modification Techniques on Smartphones. CHI Extended Abstracts on Human Factors in Computing Systems (2016), 2923--2931. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Husnjak Siniša, Peraković Dragan, and Cvitić Ivan. 2016. Relevant Affect Factors of Smartphone Mobile Data Traffic. Promet - Traffic8Transportation 28, 4(2016), 435--444.Google ScholarGoogle Scholar
  25. Tapio Soikkeli. 2011. The effect of context on smartphone usage sessions. Master's Thesis. Aalto University School of Science.Google ScholarGoogle Scholar
  26. T. Soikkeli, J. Karikoski, and H. Hammainen. 2011. Diversity and End User Context in Smartphone Usage Sessions. 2011 Fifth International Conference on Next Generation Mobile Applications, Services and Technologies (Sept 2011), 7--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Khai N. Truong, Thariq Shihipar, and Daniel J. Wigdor. 2014. Slide to X: Unlocking the Potential of Smartphone Unlocking. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ‘14). ACM, New York, NY, USA, 3635--3644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Niels van Berkel, Chu Luo, Theodoros Anagnostopoulos, Denzil Ferreira, Jorge Goncalves, Simo Hosio, and Vassilis Kostakos. 2016. A Systematic Assessment of Smartphone Usage Gaps. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (2016), 4711--4721. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Hannu Verkasalo. 2008. Contextual patterns in mobile service usage. Personal and Ubiquitous Computing 13, 5 (mar 2008), 331--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Daniel T. Wagner, Andrew Rice, and Alastair R. Beresford. 2013. Device Analyzer: Large-scale mobile data collection. In Big Data Analytics workshop, ACM Sigmetrics 2013.Google ScholarGoogle Scholar
  31. Daniel T. Wagner, Andrew Rice, and Alastair R. Beresford. 2013. Device Analyzer: Understanding smartphone usage. In 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.Google ScholarGoogle Scholar
  32. Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. 2006. Design and evaluation of a shoulder-surfing resistant graphical password scheme. Proceedings of the working conference on Advanced visual interfaces - AVI ‘06 (2006), 177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Yafei Yang, Lu Xiao, Yongjin Kim, and David Julian. 2009. Case Study: Trust Establishment in Personal Area Networks. Proceedings of ISWPC 2009 (2009), 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Emanuel Von Zezschwitz, Paul Dunphy, and Alexander De Luca. 2013. Patterns in the Wild: A field study of the usability of pattern and pin-based authentication on Mobile Devices. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (2013), 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
            Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 1, Issue 2
            June 2017
            665 pages
            EISSN:2474-9567
            DOI:10.1145/3120957
            Issue’s Table of Contents

            Copyright © 2017 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 June 2017
            • Accepted: 1 May 2017
            • Revised: 1 April 2017
            • Received: 1 February 2017
            Published in imwut Volume 1, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader