The experience sampling method on mobile devices

N Van Berkel, D Ferreira, V Kostakos - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
The Experience Sampling Method (ESM) is used by scientists from various disciplines to
gather insights into the intra-psychic elements of human life. Researchers have used the …

Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage

IH Sarker, ASM Kayes, P Watters - Journal of Big Data, 2019 - Springer
Due to the increasing popularity of recent advanced features and context-awareness in
smart mobile phones, the contextual data relevant to users' diverse activities with their …

Find me if you can: improving geographical prediction with social and spatial proximity

L Backstrom, E Sun, C Marlow - … of the 19th international conference on …, 2010 - dl.acm.org
Geography and social relationships are inextricably intertwined; the people we interact with
on a daily basis almost always live near us. As people spend more time online, data …

Privacy concerns for use of voice activated personal assistant in the public space

A Easwara Moorthy, KPL Vu - International Journal of Human …, 2015 - Taylor & Francis
A review of popular technology adoption models identified several factors that are likely to
influence Voice Activated Personal Assistant (VAPA) use in public spaces. To inform design …

Understanding and capturing people's privacy policies in a mobile social networking application

N Sadeh, J Hong, L Cranor, I Fette, P Kelley… - Personal and ubiquitous …, 2009 - Springer
A number of mobile applications have emerged that allow users to locate one another.
However, people have expressed concerns about the privacy implications associated with …

Empowerment through seamfulness: smart phones in everyday life

L Barkhuus, VE Polichar - Personal and Ubiquitous Computing, 2011 - Springer
In this paper, we describe research into use of multifunctional mobile phones by working
adults and posit the device as a plausible realization of ubiquitous computing. We …

Dimensionality of information disclosure behavior

BP Knijnenburg, A Kobsa, H ** - International Journal of Human …, 2013 - Elsevier
In studies of people's privacy behavior, the extent of disclosure of personal information is
typically measured as a summed total or a ratio of disclosure. In this paper, we evaluate …

Location-sharing technologies: Privacy risks and controls

JY Tsai, PG Kelley, LF Cranor, N Sadeh - Isjlp, 2010 - HeinOnline
Due to the ability of cell phone providers to use cell phone towers to pinpoint users'
locations, federal E911 requirements, the increasing popularity of GPS-capabilities in …

Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share

J Wiese, PG Kelley, LF Cranor, L Dabbish… - Proceedings of the 13th …, 2011 - dl.acm.org
As ubiquitous computing becomes increasingly mobile and social, personal information
sharing will likely increase in frequency, the variety of friends to share with, and range of …

From awareness to repartee: sharing location within social groups

L Barkhuus, B Brown, M Bell, S Sherwood… - proceedings of the …, 2008 - dl.acm.org
This paper investigates emergent practices around'microblogging', changing and sharing
status within a social group. We present results from a trial of'Connecto', a phone based …