skip to main content
research-article

A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics

Published: 30 June 2017 Publication History

Abstract

Today, mobile devices like smartphones and tablets have become an indispensable part of people's lives, posing many new questions e.g., in terms of interaction methods, but also security. In this paper, we conduct a large scale, long term analysis of mobile device usage characteristics like session length, interaction frequency, and daily usage in locked and unlocked state with respect to location context and diurnal pattern. Based on detailed logs from 29,279 mobile phones and tablets representing a total of 5,811 years of usage time, we identify and analyze 52.2 million usage sessions with some participants providing data for more than four years.
Our results show that context has a highly significant effect on both frequency and extent of mobile device usage, with mobile phones being used twice as much at home compared to in the office. Interestingly, devices are unlocked for only 46 % of the interactions. We found that with an average of 60 interactions per day, smartphones are used almost thrice as often as tablet devices (23), while usage sessions on tablets are three times longer, hence are used almost for an equal amount of time throughout the day. We conclude that usage session characteristics differ considerably between tablets and smartphones. These results inform future approaches to mobile interaction as well as security.

References

[1]
Matthias Böhmer, Brent Hecht, Johannes Schöning, Antonio Krüger, and Gernot Bauer. 2011. Falling asleep with Angry Birds, Facebook and Kindle - A Large Scale Study on Mobile Application Usage. Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services - MobileHCI ‘11 January (2011), 47.
[2]
Guanling Chen and David Kotz. 2000. A Survey of Context-Aware Mobile Computing Research. Technical Report.
[3]
Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, and Matthew Smith. 2014. Now You See Me, Now You Don't - Protecting Smartphone Authentication from Shoulder Surfers. Sigchi (2014), 2937--2946.
[4]
Hossein Falaki, Ratul Mahajan, Srikanth Kandula, Dimitrios Lymberopoulos, Ramesh Govindan, and Deborah Estrin. 2010. Diversity in Smartphone Usage. Proceedings of the 8th international conference on Mobile systems, applications, and services - MobiSys ‘10 (2010), 179.
[5]
Benjamin Finley and Tapio Soikkeli. 2016. Multidevice mobile sessions: A first look. Pervasive and Mobile Computing (in press) (2016).
[6]
Preetinder S Gill, Ashwini Kamath, and Tejkaran Singh Gill. 2012. Distraction: an assessment of smartphone usage in health care work settings. Risk Manag Healthc Policy 5, 1 (2012), 105--14.
[7]
Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems.
[8]
Daniel Hintze, Rainhard Dieter Findling, Muhammad Muaaz, Eckhard Koch, and René Mayrhofer. 2015. CORMORANT: Towards Continuous Risk-Aware Multi-Modal Cross-Device Authentication. UbiComp 2015 Adjunct Publication (2015).
[9]
Daniel Hintze, Rainhard D Findling, Muhammad Muaaz, Sebastian Scholz, and René Mayrhofer. 2014. Diversity in Locked and Unlocked Mobile Device Usage. In UbiComp 2014 Adjunct Publication. 379--384.
[10]
Daniel Hintze, Rainhard Dieter Findling, Sebastian Scholz, and René Mayrhofer. 2014. Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. In Proceedings of MoMM 2014.
[11]
Daniel Hintze, Muhammad Muaaz, Rainhard Dieter Findling, Sebastian Scholz, Eckhard Koch, and René Mayrhofer. 2015. Confidence and Risk Estimation Plugins for Multi-Modal Authentication on Mobile Devices using CORMORANT. In Proceedings of MoMM 2015. 384--388.
[12]
Daniel Hintze and Andrew Rice. 2016. Picky: Efficient and Reproducible Sharing of Large Datasets Using Merkle-Trees. 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) (2016), 30--38.
[13]
Borja Jiménez. 2008. Modeling of Mobile End-User Context. Ph.D. Dissertation. Helsinki University of Technology.
[14]
Jeffrey H Kuznekoff and Scott Titsworth. 2013. The impact of mobile phone usage on student learning. Communication Education 62, 3 (2013), 233--252.
[15]
Min Kwon, Joon-Yeop Lee, Wang-Youn Won, Jae-Woo Park, Jung-Ah Min, Changtae Hahn, Xinyu Gu, Ji-Hye Choi, and Dai-Jin Kim. 2013. Development and validation of a smartphone addiction scale (SAS). PloS one 8, 2 (2013), e56936.
[16]
Heyoung Lee, Heejune Ahn, Samwook Choi, and Wanbok Choi. 2014. The SAMS: Smartphone Addiction Management System and Verification. Journal of Medical Systems 38, 1 (2014), 1.
[17]
Yu-Kang Lee, Chun-Tuan Chang, You Lin, and Zhao-Hong Cheng. 2014. The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress. Computers in Human Behavior 31 (2014), 373--383.
[18]
Yu-Hsuan Lin, Yu-Cheng Lin, Yang-Han Lee, Po-Hsien Lin, Sheng-Hsuan Lin, Li-Ren Chang, Hsien-Wei Tseng, Liang-Yu Yen, Cheryl C H Yang, and Terry B J Kuo. 2015. Time distortion associated with smartphone addiction: Identifying smartphone addiction via a mobile application (App). Journal of Psychiatric Research 65 (2015), 139--145.
[19]
Gonçalo M. S. Marques and Rui Pitarma. 2016. Smartphone Application for Enhanced Indoor Health Environments. Journal of Information Systems Engineering 8 Management 1, 4 (2016), 1--9.
[20]
Hendrik Müller, Jennifer Gove, and John Webb. 2012. Understanding Tablet Use - A Multi-Method Exploration. Proceedings of the 14th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI'12) (2012), 1--10.
[21]
Earl Oliver. 2010. The Challenges in Large-Scale Smartphone User Studies. Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement - HotPlanet ‘10 (2010), 1.
[22]
Antti Oulasvirta, Tye Rattenbury, Lingyi Ma, and Eeva Raita. 2011. Habits make smartphone use more pervasive. Personal and Ubiquitous Computing 16, 1 (jun 2011), 105--114.
[23]
Charlie Pinder, Russell Beale, and Robert J Hendley. 2016. Accept the Banana : Exploring Incidental Cognitive Bias Modification Techniques on Smartphones. CHI Extended Abstracts on Human Factors in Computing Systems (2016), 2923--2931.
[24]
Husnjak Siniša, Peraković Dragan, and Cvitić Ivan. 2016. Relevant Affect Factors of Smartphone Mobile Data Traffic. Promet - Traffic8Transportation 28, 4(2016), 435--444.
[25]
Tapio Soikkeli. 2011. The effect of context on smartphone usage sessions. Master's Thesis. Aalto University School of Science.
[26]
T. Soikkeli, J. Karikoski, and H. Hammainen. 2011. Diversity and End User Context in Smartphone Usage Sessions. 2011 Fifth International Conference on Next Generation Mobile Applications, Services and Technologies (Sept 2011), 7--12.
[27]
Khai N. Truong, Thariq Shihipar, and Daniel J. Wigdor. 2014. Slide to X: Unlocking the Potential of Smartphone Unlocking. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ‘14). ACM, New York, NY, USA, 3635--3644.
[28]
Niels van Berkel, Chu Luo, Theodoros Anagnostopoulos, Denzil Ferreira, Jorge Goncalves, Simo Hosio, and Vassilis Kostakos. 2016. A Systematic Assessment of Smartphone Usage Gaps. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (2016), 4711--4721.
[29]
Hannu Verkasalo. 2008. Contextual patterns in mobile service usage. Personal and Ubiquitous Computing 13, 5 (mar 2008), 331--342.
[30]
Daniel T. Wagner, Andrew Rice, and Alastair R. Beresford. 2013. Device Analyzer: Large-scale mobile data collection. In Big Data Analytics workshop, ACM Sigmetrics 2013.
[31]
Daniel T. Wagner, Andrew Rice, and Alastair R. Beresford. 2013. Device Analyzer: Understanding smartphone usage. In 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
[32]
Susan Wiedenbeck, Jim Waters, Leonardo Sobrado, and Jean-Camille Birget. 2006. Design and evaluation of a shoulder-surfing resistant graphical password scheme. Proceedings of the working conference on Advanced visual interfaces - AVI ‘06 (2006), 177.
[33]
Yafei Yang, Lu Xiao, Yongjin Kim, and David Julian. 2009. Case Study: Trust Establishment in Personal Area Networks. Proceedings of ISWPC 2009 (2009), 1--5.
[34]
Emanuel Von Zezschwitz, Paul Dunphy, and Alexander De Luca. 2013. Patterns in the Wild: A field study of the usability of pattern and pin-based authentication on Mobile Devices. Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (2013), 261--270.

Cited By

View all
  • (2024)ZMSProceedings of the 2024 USENIX Conference on Usenix Annual Technical Conference10.5555/3691992.3692003(173-189)Online publication date: 10-Jul-2024
  • (2024)A Comprehensive Study of Privacy Leakage Vulnerability in Android App LogsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695609(2510-2513)Online publication date: 27-Oct-2024
  • (2024)Demand-driven Urban Facility Visit PredictionACM Transactions on Intelligent Systems and Technology10.1145/362523315:2(1-24)Online publication date: 22-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 1, Issue 2
June 2017
665 pages
EISSN:2474-9567
DOI:10.1145/3120957
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 June 2017
Accepted: 01 May 2017
Revised: 01 April 2017
Received: 01 February 2017
Published in IMWUT Volume 1, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Daily interactions
  2. Device unlocking
  3. Locked usage
  4. Session length
  5. Smartphone
  6. Tablet
  7. Usage session
  8. User context

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)83
  • Downloads (Last 6 weeks)10
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ZMSProceedings of the 2024 USENIX Conference on Usenix Annual Technical Conference10.5555/3691992.3692003(173-189)Online publication date: 10-Jul-2024
  • (2024)A Comprehensive Study of Privacy Leakage Vulnerability in Android App LogsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695609(2510-2513)Online publication date: 27-Oct-2024
  • (2024)Demand-driven Urban Facility Visit PredictionACM Transactions on Intelligent Systems and Technology10.1145/362523315:2(1-24)Online publication date: 22-Feb-2024
  • (2024)InteractOut: Leveraging Interaction Proxies as Input Manipulation Strategies for Reducing Smartphone OveruseProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642317(1-19)Online publication date: 11-May-2024
  • (2023)Tracking the temporal flows of mobile communication in daily lifeNew Media & Society10.1177/1461444823115864625:4(732-755)Online publication date: 17-Apr-2023
  • (2023)Leveraging Mobile Technology for Public Health Promotion: A Multidisciplinary PerspectiveAnnual Review of Public Health10.1146/annurev-publhealth-060220-04164344:1(131-150)Online publication date: 3-Apr-2023
  • (2023)Achieving Digital Wellbeing Through Digital Self-control Tools: A Systematic Review and Meta-analysisACM Transactions on Computer-Human Interaction10.1145/357181030:4(1-66)Online publication date: 12-Sep-2023
  • (2023)DeepApp: characterizing dynamic user interests for mobile application recommendationWorld Wide Web10.1007/s11280-023-01161-326:5(2623-2645)Online publication date: 2-May-2023
  • (2022)Evaluating the impact of writing surface and configuration on muscle activation level during a handwriting task: An exploratory studyWork10.3233/WOR-20524271:4(1183-1191)Online publication date: 21-Apr-2022
  • (2022)UnlockLearning – Investigating the Integration of Vocabulary Learning Tasks into the Smartphone Authentication Processi-com10.1515/icom-2021-003721:1(157-174)Online publication date: 1-Apr-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media