The experience sampling method on mobile devices

N Van Berkel, D Ferreira, V Kostakos - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The Experience Sampling Method (ESM) is used by scientists from various disciplines to
gather insights into the intra-psychic elements of human life. Researchers have used the …

A lived informatics model of personal informatics

DA Epstein, A **, J Fogarty, SA Munson - Proceedings of the 2015 …, 2015 - dl.acm.org
Current models of how people use personal informatics systems are largely based in
behavior change goals. They do not adequately characterize the integration of self-tracking …

[HTML][HTML] Systematic review on privacy categorisation

P Inverardi, P Migliarini, M Palmiero - Computer Science Review, 2023 - Elsevier
In the modern digital world users need to make privacy and security choices that have far-
reaching consequences. Researchers are increasingly studying people's decisions when …

Android permissions: User attention, comprehension, and behavior

AP Felt, E Ha, S Egelman, A Haney, E Chin… - Proceedings of the …, 2012 - dl.acm.org
Android's permission system is intended to inform users about the risks of installing
applications. When a user installs an application, he or she has the opportunity to review the …

Privacy protection for preventing data over-collection in smart city

Y Li, W Dai, Z Ming, M Qiu - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
In smart city, all kinds of users' data are stored in electronic devices to make everything
intelligent. A smartphone is the most widely used electronic device and it is the pivot of all …

[BOEK][B] Divining a digital future: Mess and mythology in ubiquitous computing

P Dourish, G Bell - 2011 - books.google.com
A sociotechnical investigation of ubiquitous computing as a research enterprise and as a
lived reality. Ubiquitous computing (or ubicomp) is the label for a" third wave" of computing …

[BOEK][B] Smartphones as locative media

J Frith - 2018 - books.google.com
Smartphone adoption has surpassed 50% of the population in more than 15 countries, and
there are now more than one million mobile applications people can download to their …

Boundary negotiating artifacts in personal informatics: patient-provider collaboration with patient-generated data

CF Chung, K Dew, A Cole, J Zia, J Fogarty… - Proceedings of the 19th …, 2016 - dl.acm.org
Patient-generated data is increasingly common in chronic disease care management.
Smartphone applications and wearable sensors help patients more easily collect health …

Measuring user confidence in smartphone security and privacy

E Chin, AP Felt, V Sekar, D Wagner - … of the eighth symposium on usable …, 2012 - dl.acm.org
In order to direct and build an effective, secure mobile ecosystem, we must first understand
user attitudes toward security and privacy for smartphones and how they may differ from …

APK Auditor: Permission-based Android malware detection system

KA Talha, DI Alper, C Aydin - Digital Investigation, 2015 - Elsevier
Android operating system has the highest market share in 2014; making it the most widely
used mobile operating system in the world. This fact makes Android users the biggest target …