SlideShare a Scribd company logo
1 of 16
Download to read offline
Context detection and effects
on behavior
Elisa workshop on “Lifestyle Sensing and Behavioral
Analytics”, June 29th, 2012

Dr. Timo Smura, Dep. of Communications and Networking
(presented work by T. Soikkeli, J. Karikoski, H.-H. Jo, M. Karsai, et al.)




                                                                      timo.smura@aalto.fi
Outline

• Behavioral data collection in Aalto / Comnet
   – Multi-point measurements
   – Examples of data sets
   – Holistic view of service usage
• Ongoing work related to contexts and behavior
   –   Handset based measurements
   –   Location detection
   –   Context detection algorithms
   –   Context dependence of application and service usage
Behavioral data collection
Multi-point measurements
  Potential sources of digital behavioral data




Our data sources:

• Handset monitoring
  panels + questionnaires
• IP traffic measurements
• Web analytics systems
• Mobile operator
  accounting systems
Holistic view of service usage
Measurement points vs. service components




                                            Modified from: Smura, Kivi, Töyli 2009
Context detection and
effects on behavior
Handset-based measurements
Research process and data

•   Based on a software client installed to a panel of smartphones
•   Collects rich data about handset usage:
     –   What: Application, bearer
     –   Where: Base station cell IDs (hashed), WLAN SSID
     –   When: Time stamps
     –   How much: Time stamps, amount of generated traffic
•   Gives a detailed view of the usage patterns and behavior of panelists
     – All applications, also offline and WLAN usage
     – Location / context detection




                                                                 Source: Karikoski 2012
Handset-based measurements
Current focus areas
                                                        Shares of time and
1. Multi-channel communications                         usage per context

   services                                   17
                                                                     24
   – Diversification of communications                   29
                                              7
     channels (phone calls, SMS,              8                       8
     email, social media services)                       9
                                                                     12           Elsewhere
   – Effect of relationship type on                      12                       Other meaningful
     channel selection                                                            Office
                                                                                  Home
   – Mobile social phonebooks                 66                                  Abroad
                                                                     53
2. Location and context detection                        47

   –   Context detection algorithms
   –   Human behavior and time use in          2         3          3
       different locations and contexts    Share of Share of Share of
                                           total time sessions interaction
   –   Effects on usage: e.g., sessions,   spent (%)    (%)     time (%)

       applications / services
                                                             Sources: Karikoski & Soikkeli
Location detection based on cell ID




                                Source: Jo et al. 2012
Context detection algorithms
  Simplified version, not utilizing WLAN SSID data
A) Temporal boundaries for user’s trajectory in cells:   E) Criteria for assigning other contexts:




B) Duration, i.e., time spent by user in cell c:




C) ”Abroad” context determined by Mobile Network
Code (MNC)

D) For the cells in Finland, more detailed durations:




                                                                                       Sources: Soikkeli 2011, Jo et al. 2012
Application usage by context
Exemplary data from a single user during two days




                                                    Source: Jo et al. 2012
Context dependence of service usage
Fractions and intensities of service usage by context




                                                   Source: Jo et al. 2012
Conclusions (1/2)

• Aalto / Comnet collects rich data on mobile usage
   – Continues a series of measurements since 2005
   – Holistic view of mobile devices and services in Finland
• Each measurement methods has its pros and cons
   – Level of: Granularity, Coverage, Representativity
   – In terms of: Devices, Applications, Networks, Content
• Actors have different views to mobile usage and users
   – E.g., Device vendors vs. Operators vs. Content providers
   – Increasing value of user data induces competition
       • May lead to, e.g., traffic encryption, routing via own gateways
Conclusions (2/2)

• Data collected by current smartphones can be used to infer
  the context of people
   – Then use it as a variable to explain behavior
• By far, research has focused on developing and testing the
  technical algorithms for detecting the contexts
   – Demonstration of value with descriptive analysis of usage data
• Examples of statistical analyses on the effect of context on
  behavior are still rare
   – Typically based on survey-based studies and self-reported context
     and usage information
   – Ongoing / future work: combine existing theories and hypothesis-
     based statistical methods to the data collected in smartphone
     monitoring panels
References

• Soikkeli, T. (2011). The effect of context on smartphone
  usage sessions. M.Sc. Thesis.
• Karikoski, J., & Soikkeli, T. (In Press) Contextual usage
  patterns in smartphone communication
  services, Personal and Ubiquitous Computing.
• H.-H. Jo, M. Karsai, J. Karikoski, and K. Kaski,
  Spatiotemporal correlations of handset-based service
  usages, arXiv:1204.2169 (2012)
• Smura, T., Kivi, A., & Töyli, J. (2009). A Framework for
  Analysing the Usage of Mobile Services, info, vol. 11,
  no. 4, pp. 53-67.
Useful contacts in Aalto / Comnet

•   Project management:
     – Prof. Heikki Hämmäinen, Timo Smura
•   Researchers:
     – Handset-based measurements
         • Juuso Karikoski, Tapio Soikkeli
     – Mobile network traffic measurements
         • Antti Riikonen
     – Handset features and evolution
         • Timo Smura, Antti Riikonen
     – Web analytics –based research
         • Timo Smura
     – Bayesian Belief Networks –based analytics
         • Pekka Kekolahti
•   firstname.lastname@aalto.fi
•   http://momie.comnet.aalto.fi

More Related Content

Viewers also liked

Download
DownloadDownload
Downloadbutest
 
Topic extraction using machine learning
Topic extraction using machine learningTopic extraction using machine learning
Topic extraction using machine learningSanjib Basak
 
Classification with Naive Bayes
Classification with Naive BayesClassification with Naive Bayes
Classification with Naive BayesJosh Patterson
 
Emotion detection from text using data mining and text mining
Emotion detection from text using data mining and text miningEmotion detection from text using data mining and text mining
Emotion detection from text using data mining and text miningSakthi Dasans
 
How Sentiment Analysis works
How Sentiment Analysis worksHow Sentiment Analysis works
How Sentiment Analysis worksCJ Jenkins
 

Viewers also liked (6)

Download
DownloadDownload
Download
 
Topic extraction using machine learning
Topic extraction using machine learningTopic extraction using machine learning
Topic extraction using machine learning
 
Classification with Naive Bayes
Classification with Naive BayesClassification with Naive Bayes
Classification with Naive Bayes
 
Emotion mining in text
Emotion mining in textEmotion mining in text
Emotion mining in text
 
Emotion detection from text using data mining and text mining
Emotion detection from text using data mining and text miningEmotion detection from text using data mining and text mining
Emotion detection from text using data mining and text mining
 
How Sentiment Analysis works
How Sentiment Analysis worksHow Sentiment Analysis works
How Sentiment Analysis works
 

Similar to Context detection and effects on behavior

MoMIE research overview
MoMIE research overviewMoMIE research overview
MoMIE research overviewTimo Smura
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phoneguest314c4e
 
Thomas
ThomasThomas
Thomasanesah
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paperEman Kanjo
 
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...MicheleNati
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...Dustin Pytko
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
 
Mobile user context identification
Mobile user context identificationMobile user context identification
Mobile user context identificationRifad Mohamed
 
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesMindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...QuestBack AG
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesVille Antila
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next? PayamBarnaghi
 
2 lte and beyond in a sharing economy
2 lte and beyond in a sharing economy2 lte and beyond in a sharing economy
2 lte and beyond in a sharing economyCPqD
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecturePaulo Milheiro Mendes
 

Similar to Context detection and effects on behavior (20)

MoMIE research overview
MoMIE research overviewMoMIE research overview
MoMIE research overview
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
Your Are Your Mobile Phone
Your Are Your Mobile PhoneYour Are Your Mobile Phone
Your Are Your Mobile Phone
 
Thomas
ThomasThomas
Thomas
 
ASLP2 Social Research ICT Workplan 2013
ASLP2 Social Research ICT Workplan 2013ASLP2 Social Research ICT Workplan 2013
ASLP2 Social Research ICT Workplan 2013
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
 
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
Smartweek 2014 London: EU FP7 SocIoTal project overview - Michele Nati - Univ...
 
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...Assignment Of Sensing Tasks To IoT Devices  Exploitation Of A Social Network ...
Assignment Of Sensing Tasks To IoT Devices Exploitation Of A Social Network ...
 
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...
 
Mobile user context identification
Mobile user context identificationMobile user context identification
Mobile user context identification
 
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesMindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...
Workshop: 'Self-administered Mobile Survey Workshop' - Dr Michael Bosnjak, Fr...
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
 
Suneel
SuneelSuneel
Suneel
 
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using SmartphonesRoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
RoutineMaker: Towards End-user Automation of Daily Routines using Smartphones
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
2 lte and beyond in a sharing economy
2 lte and beyond in a sharing economy2 lte and beyond in a sharing economy
2 lte and beyond in a sharing economy
 
An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...An efficient approach on spatial big data related to wireless networks and it...
An efficient approach on spatial big data related to wireless networks and it...
 
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
 

More from Timo Smura

Techno-economic analysis of network investments
Techno-economic analysis of network investmentsTechno-economic analysis of network investments
Techno-economic analysis of network investmentsTimo Smura
 
Mobile handset population in Finland 2005-2012
Mobile handset population in Finland 2005-2012Mobile handset population in Finland 2005-2012
Mobile handset population in Finland 2005-2012Timo Smura
 
Smura 2011 Mobile Platforms Lecture 1
Smura 2011 Mobile Platforms Lecture 1Smura 2011 Mobile Platforms Lecture 1
Smura 2011 Mobile Platforms Lecture 1Timo Smura
 
Smura 2011 Mobile Platforms Lecture 2
Smura 2011 Mobile Platforms Lecture 2Smura 2011 Mobile Platforms Lecture 2
Smura 2011 Mobile Platforms Lecture 2Timo Smura
 
Mobile Handset Population in Finland 2005-2011
Mobile Handset Population in Finland 2005-2011Mobile Handset Population in Finland 2005-2011
Mobile Handset Population in Finland 2005-2011Timo Smura
 
Lectio_Praecursoria_Smura_23.03.2012
Lectio_Praecursoria_Smura_23.03.2012Lectio_Praecursoria_Smura_23.03.2012
Lectio_Praecursoria_Smura_23.03.2012Timo Smura
 

More from Timo Smura (6)

Techno-economic analysis of network investments
Techno-economic analysis of network investmentsTechno-economic analysis of network investments
Techno-economic analysis of network investments
 
Mobile handset population in Finland 2005-2012
Mobile handset population in Finland 2005-2012Mobile handset population in Finland 2005-2012
Mobile handset population in Finland 2005-2012
 
Smura 2011 Mobile Platforms Lecture 1
Smura 2011 Mobile Platforms Lecture 1Smura 2011 Mobile Platforms Lecture 1
Smura 2011 Mobile Platforms Lecture 1
 
Smura 2011 Mobile Platforms Lecture 2
Smura 2011 Mobile Platforms Lecture 2Smura 2011 Mobile Platforms Lecture 2
Smura 2011 Mobile Platforms Lecture 2
 
Mobile Handset Population in Finland 2005-2011
Mobile Handset Population in Finland 2005-2011Mobile Handset Population in Finland 2005-2011
Mobile Handset Population in Finland 2005-2011
 
Lectio_Praecursoria_Smura_23.03.2012
Lectio_Praecursoria_Smura_23.03.2012Lectio_Praecursoria_Smura_23.03.2012
Lectio_Praecursoria_Smura_23.03.2012
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Context detection and effects on behavior

  • 1. Context detection and effects on behavior Elisa workshop on “Lifestyle Sensing and Behavioral Analytics”, June 29th, 2012 Dr. Timo Smura, Dep. of Communications and Networking (presented work by T. Soikkeli, J. Karikoski, H.-H. Jo, M. Karsai, et al.) timo.smura@aalto.fi
  • 2. Outline • Behavioral data collection in Aalto / Comnet – Multi-point measurements – Examples of data sets – Holistic view of service usage • Ongoing work related to contexts and behavior – Handset based measurements – Location detection – Context detection algorithms – Context dependence of application and service usage
  • 4. Multi-point measurements Potential sources of digital behavioral data Our data sources: • Handset monitoring panels + questionnaires • IP traffic measurements • Web analytics systems • Mobile operator accounting systems
  • 5. Holistic view of service usage Measurement points vs. service components Modified from: Smura, Kivi, Töyli 2009
  • 7. Handset-based measurements Research process and data • Based on a software client installed to a panel of smartphones • Collects rich data about handset usage: – What: Application, bearer – Where: Base station cell IDs (hashed), WLAN SSID – When: Time stamps – How much: Time stamps, amount of generated traffic • Gives a detailed view of the usage patterns and behavior of panelists – All applications, also offline and WLAN usage – Location / context detection Source: Karikoski 2012
  • 8. Handset-based measurements Current focus areas Shares of time and 1. Multi-channel communications usage per context services 17 24 – Diversification of communications 29 7 channels (phone calls, SMS, 8 8 email, social media services) 9 12 Elsewhere – Effect of relationship type on 12 Other meaningful channel selection Office Home – Mobile social phonebooks 66 Abroad 53 2. Location and context detection 47 – Context detection algorithms – Human behavior and time use in 2 3 3 different locations and contexts Share of Share of Share of total time sessions interaction – Effects on usage: e.g., sessions, spent (%) (%) time (%) applications / services Sources: Karikoski & Soikkeli
  • 9. Location detection based on cell ID Source: Jo et al. 2012
  • 10. Context detection algorithms Simplified version, not utilizing WLAN SSID data A) Temporal boundaries for user’s trajectory in cells: E) Criteria for assigning other contexts: B) Duration, i.e., time spent by user in cell c: C) ”Abroad” context determined by Mobile Network Code (MNC) D) For the cells in Finland, more detailed durations: Sources: Soikkeli 2011, Jo et al. 2012
  • 11. Application usage by context Exemplary data from a single user during two days Source: Jo et al. 2012
  • 12. Context dependence of service usage Fractions and intensities of service usage by context Source: Jo et al. 2012
  • 13. Conclusions (1/2) • Aalto / Comnet collects rich data on mobile usage – Continues a series of measurements since 2005 – Holistic view of mobile devices and services in Finland • Each measurement methods has its pros and cons – Level of: Granularity, Coverage, Representativity – In terms of: Devices, Applications, Networks, Content • Actors have different views to mobile usage and users – E.g., Device vendors vs. Operators vs. Content providers – Increasing value of user data induces competition • May lead to, e.g., traffic encryption, routing via own gateways
  • 14. Conclusions (2/2) • Data collected by current smartphones can be used to infer the context of people – Then use it as a variable to explain behavior • By far, research has focused on developing and testing the technical algorithms for detecting the contexts – Demonstration of value with descriptive analysis of usage data • Examples of statistical analyses on the effect of context on behavior are still rare – Typically based on survey-based studies and self-reported context and usage information – Ongoing / future work: combine existing theories and hypothesis- based statistical methods to the data collected in smartphone monitoring panels
  • 15. References • Soikkeli, T. (2011). The effect of context on smartphone usage sessions. M.Sc. Thesis. • Karikoski, J., & Soikkeli, T. (In Press) Contextual usage patterns in smartphone communication services, Personal and Ubiquitous Computing. • H.-H. Jo, M. Karsai, J. Karikoski, and K. Kaski, Spatiotemporal correlations of handset-based service usages, arXiv:1204.2169 (2012) • Smura, T., Kivi, A., & Töyli, J. (2009). A Framework for Analysing the Usage of Mobile Services, info, vol. 11, no. 4, pp. 53-67.
  • 16. Useful contacts in Aalto / Comnet • Project management: – Prof. Heikki Hämmäinen, Timo Smura • Researchers: – Handset-based measurements • Juuso Karikoski, Tapio Soikkeli – Mobile network traffic measurements • Antti Riikonen – Handset features and evolution • Timo Smura, Antti Riikonen – Web analytics –based research • Timo Smura – Bayesian Belief Networks –based analytics • Pekka Kekolahti • firstname.lastname@aalto.fi • http://momie.comnet.aalto.fi