Topic
Device Usage
About: Device Usage is a research topic. Over the lifetime, 450 publications have been published within this topic receiving 6208 citations.
Papers published on a yearly basis
Papers
More filters
••
13 Jun 2007TL;DR: This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities, and presents several case studies of field deployments on people's personal phones to demonstrate how MyExperience can be used effectively to understand how people use and experience mobile technology.
Abstract: This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities. MyExperience combines the following two techniques: 1) passive logging of device usage, user context, and environmental sensor readings, and 2) active context-triggered user experience sampling to collect in situ, subjective user feedback. MyExperience currently runs on mobile phones and supports logging of more than 140 event types, including: 1) device usage such as communication, application usage, and media capture, 2) user context such as calendar appointments, and 3) environmental sensing such as Bluetooth and GPS. In addition, user experience sampling can be targeted to moments of interest by triggering off sensor readings. We present several case studies of field deployments on people's personal phones to demonstrate how MyExperience can be used effectively to understand how people use and experience mobile technology.
556 citations
•
08 Jul 2003
TL;DR: In this article, a transponder-based payment system is presented to the RFID reader for completion of a transaction request, and a process server receives the transaction request and satisfies it in accordance with a predetermined payment criteria.
Abstract: (Figure IA) includes a fob (102) including a transponder, and a RFID reader (104) for interrogating the transponder. The system may further include a payment device (110) separate and distinct from the fob. In exemplary operation, the fob identifying information, or the payment device information, may be presented to the RFID reader for completion of a transaction request. A process server may receive the transaction request and satisfy the transaction request in accordance with a predetermined payment criteria. The process server may additionally augment a rewards account based on fob or payment device usage, thereby incenting fob usage in one instance and payment device usage in the other.
207 citations
••
TL;DR: Six conceptual models of assistive technology–related models are reviewed here: Cook and Hussey's Human-Activity–Assistive Technology model; the World Health Organization's International Classification of Functioning, Disability, and Health; Scherer's Matching Person and Technology model%; Gitlin's model of an AT user's “career”; social cognition decision-making theories; and Rogers' Perceived Attributes Theory.
Abstract: Predictive conceptual models help us frame research questions, interpret results, and guide clinical practice. Although numerous models have appeared in the assistive technology (AT) literature, none has been shown to predict AT usage. The lack of a valid predictive model indicates the need for development of new approaches to modeling AT outcomes. This article proposes a user-centered conceptual model that predicts AT usage as a function of the perceived relative advantages of AT. Device usage is not modeled as a one-time, all-or-nothing proposition, but as a decision process recurring over time. The influence of parallel interventions working concurrently with, or as an alternative to, AT is a central consideration that ultimately drives AT usage. Usage is shown as a proximal influence on AT impact, and AT impact is shown to be a predictor of future use. Research is cited supporting various elements of the new model.
186 citations
•
26 Apr 2004TL;DR: A device usage monitoring and control system for accomplishing parental monitoring and controlling of devices connected to a home network includes a permissions module receiving and storing control commands from a parent defining permissions with respect to one or more children as discussed by the authors.
Abstract: A device usage monitoring and control system for accomplishing parental monitoring and control of devices connected to a home network includes a permissions module receiving and storing control commands from a parent defining permissions with respect to one or more children. The permissions specify levels of access to devices connected to a home network and/or classifications of media content consumable via the devices. A control module grants a child access to the devices and/or media content via the devices based on the levels of access. A monitoring module monitors the child's usage of the devices and/or the child's consumption of media content via the devices, stores a related usage history, and communicates the usage history to the parent.
185 citations
•
13 Apr 2006TL;DR: In this article, mobile device usage is monitored and restricted by pushing enabling/disabling events from an administrator the device, which impose a certain set of rules that can "lock" certain features provided by the device according to permissions and pre-established policies, for a certain period of time.
Abstract: Mobile device usage may be monitored and restricted by pushing enabling/disabling events from an administrator the device. The events impose a certain set of rules that can “lock” certain features provided by the device, according to permissions and pre-established policies, for a certain period of time. Such restricted periods may coincide with meetings or other events in which distractions should be kept to a minimum or be during regular, predetermined time periods. Preferably, the rules include conditional locks that allow a user to use a feature a reasonable number of times before the lock is activated to place the onus on the user for minimizing such distractions, while enabling the user to maintain access to such a vital communication tool. Cancel packets may also be used to not only control but to monitor the application of the rule sets and when certain conditions are breaches, which provides an employer with sufficient information to use in auditing device usage or in reprimanding users for misuse of a privilege such as the use of mobile data communications devices.
184 citations