scispace - formally typeset
Search or ask a question
Topic

Device Usage

About: Device Usage is a research topic. Over the lifetime, 450 publications have been published within this topic receiving 6208 citations.


Papers
More filters
Proceedings ArticleDOI
13 Jun 2007
TL;DR: This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities, and presents several case studies of field deployments on people's personal phones to demonstrate how MyExperience can be used effectively to understand how people use and experience mobile technology.
Abstract: This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities. MyExperience combines the following two techniques: 1) passive logging of device usage, user context, and environmental sensor readings, and 2) active context-triggered user experience sampling to collect in situ, subjective user feedback. MyExperience currently runs on mobile phones and supports logging of more than 140 event types, including: 1) device usage such as communication, application usage, and media capture, 2) user context such as calendar appointments, and 3) environmental sensing such as Bluetooth and GPS. In addition, user experience sampling can be targeted to moments of interest by triggering off sensor readings. We present several case studies of field deployments on people's personal phones to demonstrate how MyExperience can be used effectively to understand how people use and experience mobile technology.

556 citations

Patent
08 Jul 2003
TL;DR: In this article, a transponder-based payment system is presented to the RFID reader for completion of a transaction request, and a process server receives the transaction request and satisfies it in accordance with a predetermined payment criteria.
Abstract: (Figure IA) includes a fob (102) including a transponder, and a RFID reader (104) for interrogating the transponder. The system may further include a payment device (110) separate and distinct from the fob. In exemplary operation, the fob identifying information, or the payment device information, may be presented to the RFID reader for completion of a transaction request. A process server may receive the transaction request and satisfy the transaction request in accordance with a predetermined payment criteria. The process server may additionally augment a rewards account based on fob or payment device usage, thereby incenting fob usage in one instance and payment device usage in the other.

207 citations

Journal ArticleDOI
TL;DR: Six conceptual models of assistive technology–related models are reviewed here: Cook and Hussey's Human-Activity–Assistive Technology model; the World Health Organization's International Classification of Functioning, Disability, and Health; Scherer's Matching Person and Technology model%; Gitlin's model of an AT user's “career”; social cognition decision-making theories; and Rogers' Perceived Attributes Theory.
Abstract: Predictive conceptual models help us frame research questions, interpret results, and guide clinical practice. Although numerous models have appeared in the assistive technology (AT) literature, none has been shown to predict AT usage. The lack of a valid predictive model indicates the need for development of new approaches to modeling AT outcomes. This article proposes a user-centered conceptual model that predicts AT usage as a function of the perceived relative advantages of AT. Device usage is not modeled as a one-time, all-or-nothing proposition, but as a decision process recurring over time. The influence of parallel interventions working concurrently with, or as an alternative to, AT is a central consideration that ultimately drives AT usage. Usage is shown as a proximal influence on AT impact, and AT impact is shown to be a predictor of future use. Research is cited supporting various elements of the new model.

186 citations

Patent
26 Apr 2004
TL;DR: A device usage monitoring and control system for accomplishing parental monitoring and controlling of devices connected to a home network includes a permissions module receiving and storing control commands from a parent defining permissions with respect to one or more children as discussed by the authors.
Abstract: A device usage monitoring and control system for accomplishing parental monitoring and control of devices connected to a home network includes a permissions module receiving and storing control commands from a parent defining permissions with respect to one or more children. The permissions specify levels of access to devices connected to a home network and/or classifications of media content consumable via the devices. A control module grants a child access to the devices and/or media content via the devices based on the levels of access. A monitoring module monitors the child's usage of the devices and/or the child's consumption of media content via the devices, stores a related usage history, and communicates the usage history to the parent.

185 citations

Patent
13 Apr 2006
TL;DR: In this article, mobile device usage is monitored and restricted by pushing enabling/disabling events from an administrator the device, which impose a certain set of rules that can "lock" certain features provided by the device according to permissions and pre-established policies, for a certain period of time.
Abstract: Mobile device usage may be monitored and restricted by pushing enabling/disabling events from an administrator the device. The events impose a certain set of rules that can “lock” certain features provided by the device, according to permissions and pre-established policies, for a certain period of time. Such restricted periods may coincide with meetings or other events in which distractions should be kept to a minimum or be during regular, predetermined time periods. Preferably, the rules include conditional locks that allow a user to use a feature a reasonable number of times before the lock is activated to place the onus on the user for minimizing such distractions, while enabling the user to maintain access to such a vital communication tool. Cancel packets may also be used to not only control but to monitor the application of the rule sets and when certain conditions are breaches, which provides an employer with sufficient information to use in auditing device usage or in reprimanding users for misuse of a privilege such as the use of mobile data communications devices.

184 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
70% related
Wireless
133.4K papers, 1.9M citations
68% related
Wireless sensor network
142K papers, 2.4M citations
66% related
Software
130.5K papers, 2M citations
65% related
Cloud computing
156.4K papers, 1.9M citations
65% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202121
202028
201933
201833
201727
201641