Quantified Self Approaches for Reflective Learning in the Workplace Quantified Approaches Self for Reflective Learning in the Workplace V

Total Page:16

File Type:pdf, Size:1020Kb

Quantified Self Approaches for Reflective Learning in the Workplace Quantified Approaches Self for Reflective Learning in the Workplace V Verónica Rivera Pelayo Design and Application of Quantified Self Approaches for Reflective Learning in the Workplace Quantified Approaches Self for Reflective Learning in the Workplace V. Rivera Pelayo Rivera V. Verónica Rivera Pelayo DESIGN AND AppLICATION OF QUANTIFIED SELF ApprOACHES FOR REFLECTIVE LEARNING IN THE WORKPLACE Design and Application of Quantified Self Approaches for Reflective Learning in the Workplace by Verónica Rivera Pelayo Dissertation, genehmigt von der Fakultät für Wirtschaftswissenschaften des Karlsruher Instituts für Technologie (KIT), 2015 Tag der mündlichen Prüfung: 2. Februar 2015 Referenten: Prof. Dr. Rudi Studer, Univ.-Prof. Dr. Stefanie Lindstaedt Impressum Karlsruher Institut für Technologie (KIT) KIT Scientific Publishing Straße am Forum 2 D-76131 Karlsruhe KIT Scientific Publishing is a registered trademark of Karlsruhe Institute of Technology. Reprint using the book cover is not allowed. www.ksp.kit.edu This document – excluding the cover – is licensed under the Creative Commons Attribution-Share Alike 3.0 DE License (CC BY-SA 3.0 DE): http://creativecommons.org/licenses/by-sa/3.0/de/ The cover page is licensed under the Creative Commons Attribution-No Derivatives 3.0 DE License (CC BY-ND 3.0 DE): http://creativecommons.org/licenses/by-nd/3.0/de/ Print on Demand 2015 ISBN 978-3-7315-0406-1 DOI 10.5445/KSP/1000047818 To my love Jan & my family — mam´a,pap´ay hermana Abstract Learning by reflection has been identified as one of the core processes for im- proving work performance. However, theories of reflective learning are of a cognitive or sociological nature and do not sufficiently consider the use of tech- nologies to enhance reflective learning processes. The aim of this thesis is to investigate if and how Quantified Self approaches can aid reflective learning at the workplace. Quantified Self (QS) is a collaboration of users and tool ma- kers who share an interest in self-knowledge through self-tracking, resulting in a variety of tools to collect personally relevant information. These are rather experimental approaches and currently there is no unifying framework that clusters and connects these many emergent tools with the goals and benefits of their use. From a theoretical perspective, this thesis contributes with an integrated model that provides a framework for technical support of reflective learning, derived from unifying reflective learning theory with a conceptual framework of Quan- tified Self tools. To instantiate our approach, mobile and web-based applications have been iteratively designed and developed following a design-based research methodology. Within the first use case of the empirical validation, we introduce and evaluate mood self-tracking in distinct work scenarios of the telecommunications and IT sector. The second use case explores the impact of reflection on trading behavior by integrating mood self-tracking in experimental asset markets. In the third use case, an application to track feedback from audiences enables reflective learning support for lecturers and public speakers. These applications have been evaluated in thirteen studies that demonstrate the support of reflective learning and measure the impact on work performance. The results of these user studies lead to the validation of the holistic approach through a body of empirical application-oriented insights. This thesis provides a novel approach for reflective learning support by transferring and adapting practices from the Quantified Self to workplace settings. i Acknowledgments I would like to express my profound gratitude to Prof. Dr. Rudi Studer for his constant support, unconditional supervision and useful feedback throughout this research work. For me it was an honor to have him as my Doktorvater and be part of his excellent team. I am deeply thankful to him for giving me the freedom to be creative in my research in an innovative field, yet being always present with his advice and mentorship. I am also proud of having Univ.-Prof. Dr. Stefanie Lindstaedt as my co-advisor. I would like to thank her for her generosity and hospitality, for sharing with me her extensive experience and knowledge, and for her valuable time and comments before, during and after my stay in Graz. It was a pleasure having the advice of these two great scientists and leaders. I would also like to thank Prof. Dr. Thomas Setzer and Prof. Dr. Oliver Stein for taking the time to review my thesis, giving their feedback from I would like to give my deepest gratitude and thanks to Valentin Zacharias, who supervised my work, guided me during the whole journey and offered me encouragement. Thanks for introducing me to the Quantified Self; it has not only contributed to my innovative research, but also changed my life. This thesis would not have been possible without him and his invaluable support. I am particularly grateful to Lars M ¨uller for being such a great fellow adventurer in MIRROR and for his valuable contribution to my research. Special thanks go to Simone Braun who was not only an unconditional colleague and friend but also a role model from whom I could learn so much. Had it not been for her, I would have not embarked on this exciting experiential academic journey I undertook. Thanks to Andreas Schmidt and Christine Kunzmann for their supporting advice and constant encouragement. I will never have enough words to thank all of them the inspiring discussions, valuable feedback as well as great help on my journey to accomplish this thesis and to become a good researcher. I thank all my colleagues and students at FZI Forschungszentrum Informatik and all the people I worked with in MIRROR for their feedback, help and col- laboration in the realization of this work. Special thanks to Philipp Astor and Achim Hendriks for their support and great joint work with the MoodMarket as well as to Angela Fessl for our joint work with the MoodMap App. I am partic- ularly grateful to Athanasios Mazarakis for so many constructive discussions, iii Acknowledgments his valuable advice and significant help. I also want to thank Heike D¨ohmer, Merc`eM ¨uller-Gorchs, Basil Ell, Julia Hoxha, Markus Ewald, and Christian Reichelt for their friendship and contribution to my daily work and life. I thank all the students that contributed to this research. I hope you have learned Inra K ¨uhn Johannes Munk, Emanuel Laci´c, Tomislav Duriˇci´c, and Leif Becker for their support and great joint work. I also thank Karlsruhe House of Young Scientists which financially supported my stay in Graz and the European Commission for funding the MIRROR Project. Thanks to all collaborating organizations (especially to my close collabo- rators Ellen Leenarts, Hans Dirkzwager, Andrew Patterson, Marco Parigi and Michele Biol`e) and anonymous participants in my studies. Thanks to all the people who have influenced my life and career. My immense thank to Jan Gutzeit for always believing in me and accompanying me in good and bad times. I am so lucky and grateful to have Jan in my life. I would like to express my deepest and most sincere appreciation to my parents Ma Carmen and Jos´eAntonio and sister Noem´ı: gracias mam´a,pap´ay hermana, por vuestro amor incondicional y por apoyarme en cada uno de mis d´ıas. Gracias por haberme transmitido todos esos valores que hacen de m´ıla persona que soy hoy y por ayudarme a llegar hasta aqu´ıy seguir adelante. Espero que est´eisorgullosos de m´ı. Thank you very much to my whole family and my friends, who have supported me from a distance and encouraged me to overcome every difficulty For those whom I may have left out, you may be the last but you are certainly not the least. I greatly appreciate all your invaluable contributions. This would not have been possible without you. Thank you! iv Contents List of Figures ................................. xiii List of Tables .................................. xvi 1 Introduction ................................. 1 1.1 Motivation and Problem Statement . 1 1.2 Research Questions . 3 1.3 Research Approach . 3 1.4 Contributions . 6 1.5 Thesis Structure . 7 1.6 Publications . 7 I Theoretical Model Overview ..................................... 13 2 Background ................................. 15 2.1 Reflective Learning at Work . 15 2.1.1 Reflective Learning by Boud et al. 16 2.2 Quantified Self . 18 2.2.1 The Quantified Self Community . 18 2.2.2 The Quantified Self Approaches . 20 3 Unification of Reflective Learning and the Quantified Self .... 25 3.1 Integrated Model of Reflective Learning and Quantified Self . 25 3.2 Tracking Cues . 26 3.2.1 Tracking Means . 27 3.2.2 Tracked Aspects . 28 3.2.3 Purposes . 29 3.3 Triggering . 29 3.3.1 Active Triggering . 29 3.3.2 Passive Triggering . 30 3.4 Recalling and Revisiting Experiences . 30 v Contents 3.4.1 Contextualizing . 30 3.4.2 Data Fusion: Objective, Self, Peer and Group Assessment . 32 3.4.3 Data Analysis: Aggregation, Averages, etc. 32 3.4.4 Visualization . 32 3.5 Exemplary Applications . 33 3.5.1 Philips DirectLife . 33 3.5.2 Moodscope . 34 3.6 Related Work . 35 3.6.1 The Quantified Self and Personal Informatics . 35 3.6.2 Computer-Supported Reflective Learning . 37 II Implementation and Empirical Validation Overview ..................................... 43 4 Use Case I: Emotions in the Telecommunications and IT Sector . 45 4.1 Work Context, Requirements and Challenges . 45 4.1.1 British Telecom – FWS Department . 46 4.1.2 British Telecom – Telecommunications Call Centers . 47 4.1.3 Regola – Software Solutions Department . 49 4.2 MoodMap App . 51 4.2.1 MoodMap App: IMRLQS Support Dimensions . 52 4.2.2 MoodMap App 1.0 . 55 4.2.3 MoodMap App 2.0 . 58 4.2.4 MoodMap App 3.0 . 67 4.2.5 Implementation .
Recommended publications
  • Adapting Game Content with a Player Typology
    Lappeenranta-Lahti University of Technology LUT School of Engineering Science Software Engineering Master's Programme in Software Engineering and Digital Transformation Mika Savolainen ADAPTING GAME CONTENT WITH A PLAYER TYPOLOGY Examiners: D.Sc. (Tech.) Jussi Kasurinen Prof. D.Sc. (Tech.) Kari Smolander Supervisor: D.Sc. (Tech.) Jussi Kasurinen Prof. D.Sc. (Tech.) Kari Smolander TIIVISTELMÄ Lappeenrannan-Lahden teknillinen yliopisto School of Engineering Science Tietotekniikan koulutusohjelma Master's Programme in Software Engineering and Digital Transformation Mika Savolainen Pelisisällön mukauttaminen pelaajatypologialla Diplomityö 2019 54 sivua, 3 kuvaa, 13 taulukkoa, 2 liitettä Työn tarkastajat: D.Sc. (Tech.) Jussi Kasurinen Prof. D.Sc. (Tech.) Kari Smolander Hakusanat: pelit, pelaajatyypit, pelaajatypologia, pelinkehitys Keywords: video games, player types, player typology, game development Tämä diplomityö tutkii pelaajatypologian käyttöä peliominaisuuksien suunnitteluun ja kehittämiseen. Tätä varten toteutetaan kirjallisuuskatsaus ja kartoitetaan eri pelaajatypologioita, jonka avulla luodaan uusi pelaajatypologia. Tämän typologian perusteella suunnitellaan peliominaisuuksia, jotka lisätään toimintaseikkailupeliin. Pelaajatyyppien ja peliominaisuuksien välinen korrelaatio testataan tapaustutkimuksessa ja tulokset analysoidaan Pearsonin ja Spearmanin korrelaatiokertoimilla. ii ABSTRACT Lappeenranta-Lahti University of Technology LUT School of Engineering Science Software Engineering Master's Programme in Software Engineering and Digital
    [Show full text]
  • AVG Android App Performance and Trend Report H1 2016
    AndroidTM App Performance & Trend Report H1 2016 By AVG® Technologies Table of Contents Executive Summary .....................................................................................2-3 A Insights and Analysis ..................................................................................4-8 B Key Findings .....................................................................................................9 Top 50 Installed Apps .................................................................................... 9-10 World’s Greediest Mobile Apps .......................................................................11-12 Top Ten Battery Drainers ...............................................................................13-14 Top Ten Storage Hogs ..................................................................................15-16 Click Top Ten Data Trafc Hogs ..............................................................................17-18 here Mobile Gaming - What Gamers Should Know ........................................................ 19 C Addressing the Issues ...................................................................................20 Contact Information ...............................................................................21 D Appendices: App Resource Consumption Analysis ...................................22 United States ....................................................................................23-25 United Kingdom .................................................................................26-28
    [Show full text]
  • Andrew Phay Whatcom CD [email protected]
    New Technology for Use in Your District Andrew Phay Whatcom CD [email protected] Smart Phones • Takes the place of GPS, Camera, Data Logger, Notes • GPS o iPhone/iPad – MoronX GPS, SpyGlass o Android – MyTracks, GPSLogger • Document Editing– Docs To Go, Google Docs, Office Suite Pro • Notes & To-Dos’– Evernote, Awesome Note • File Access – DropBox, Box.net • LogMeIn • Soilweb • Calendar sharing and reminders • Email • Weather iPad/Tablets • Mapping/GPS – MyTracks, GPSLogger, GISPro, Google Earth, ArcGIS • Word/Excel/PowerPoint – Docs to Go • Notes – Evernote • Photos/video – GPS tags • Conferencing – Skype, FaceTime • Remote Desktop – LogMeIn • File Access – DropBox, Box.net • Scan/Sign/Edit/Draw • Friend Finder – Device Locator • Security – can wipe from AppleID login • Email • Weather – USGS flooding app • Cases/Keyboards/Other accessories o Pen/GPS/Otter Box GPS Test Web LogMeIn iPad iPhone EverNote Web: Evernote iPad: Evernote Screen Shot Screen Shot iPhone: Evernote Screen Shot Other Hardware • Cameras - Waterproof/Dustproof/Fog-resistant • Portable Projectors File Syncing • DropBox – 2gb free o On smartphones, PC, Mac, Integrates with Docs2Go o Can share a link through email that others can download. • Box.net – 5gb free o Same kind of stuff Online Mapping • ArcGIS.com • Google Maps - My Places • Google Fusion Tables Website Management • Drupal • WordPress • SquareSpace • Google Sites News Aggregators Password Manager • Holds all my passwords • One Master password • On smartphones • Generates passwords • Browser Plugin • Security is great! Browser Plugins • News Aggregators • Lastpass • Screenshots - Fireshot • Download helpers – DownloadThemAll • Morning Coffee Teleconferencing/ Desktop Sharing • LogMeIn - free • Skype - free • Crossloop - free • Join.me – free • GoToMeeting • WebEx Social Networking • Facebook • LinkedIn • Twitter • Google+ • Google Groups Thanks! Andrew Phay [email protected] 360-354-2035 x129 .
    [Show full text]
  • A Security Framework for Mobile Health Applications on Android Platform
    A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM MUZAMMIL HUSSAIN FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY OF MALAYA UniversityKUALA LUMPUR of Malaya 2017 A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM MUZAMMIL HUSSAIN THESIS SUBMITTED IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY UNIVERSITY OF MALAYA UniversityKUALA LUMPUR of Malaya 2017 UNIVERSITY OF MALAYA ORIGINAL LITERARY WORK DECLARATION Name of Candidate: Muzammil Hussain Matric No: WHA130038 Name of Degree: Doctor of Philosophy Title of Project Paper/Research Report/Dissertation/Thesis (“this Work”): A SECURITY FRAMEWORK FOR MOBILE HEALTH APPLICATIONS ON ANDROID PLATFORM Field of Study: Network Security (Computer Science) I do solemnly and sincerely declare that: (1) I am the sole author/writer of this Work; (2) This Work is original; (3) Any use of any work in which copyright exists was done by way of fair dealing and for permitted purposes and any excerpt or extract from, or reference to or reproduction of any copyright work has been disclosed expressly and sufficiently and the title of the Work and its authorship have been acknowledged in this Work; (4) I do not have any actual knowledge nor do I ought reasonably to know that the making of this work constitutes an infringement of any copyright work; (5) I hereby assign all and every rights in the copyright to this Work to the University of Malaya (“UM”), who henceforth shall be owner of the copyright in this Work and that any reproduction or use in any form or by any means whatsoever is prohibited without the written consent of UM having been first had and obtained; (6) I am fully aware that if in the course of making this Work I have infringed any copyright whether intentionally or otherwise, I may be subject to legal action or any other action as may be determined by UM.
    [Show full text]
  • Vulnerability and Growth in Video Game Narratives 2019
    Master's thesis Thomas Fusdahl Vulnerability and Growth in Video Game Narratives 2019 Master's thesis Approaches to Storytelling in Dark Souls 3 and Thomas Fusdahl Hellblade: Senua's Sacrifice NTNU May 2019 Faculty of Humanities Department of Design Norwegian University of Science and Technology Vulnerability and Growth in Video Game Narratives Approaches to Storytelling in Dark Souls 3 and Hellblade: Senua's Sacrifice Thomas Fusdahl Medievitenskap Submission date: May 2019 Supervisor: Sara Brinch Norwegian University of Science and Technology Thomas Fusdahl Vulnerability and Growth in Video Game Narratives Approaches to Storytelling in Dark Souls 3 and Hellblade: Senua's Sacrifice Master’s thesis in Medievitenskap Master’s thesis Master’s Supervisor: Sara Brinch May 2019 NTNU Faculty of Humanities Faculty of Humanities Faculty Norwegian University of Science and Technology of Science University Norwegian Thomas Fusdahl Vulnerability and Growth in Video Game Narratives Approaches to Storytelling in Dark Souls 3 and Hellblade: Senua's Sacrifice Master’s thesis in Medievitenskap Supervisor: Sara Brinch May 2019 Norwegian University of Science and Technology Faculty of Humanities Faculty of Humanities Acknowledgments: After finally finishing I want to thank the people who believed in me when I didn’t. Most of all my parents for both financial and moral support. I couldn’t have done it without you. Additionally, I want to thank my supervisor Sara Brinch for her understanding and support and helping me believe in the project. Lastly, I want to give a shout out to the Easy Allies, an online media outlet that has made it fun to stay engaged in both the culture and business of video games.
    [Show full text]
  • Understanding and Detecting Wake Lock Misuses for Android Applications
    ✓ Artifact evaluated by FSE Understanding and Detecting Wake Lock Misuses for Android Applications Yepang Liux Chang Xu‡ Shing-Chi Cheungx Valerio Terragnix xDept. of Comp. Science and Engineering, The Hong Kong Univ. of Science and Technology, Hong Kong, China ‡State Key Lab for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China x{andrewust, scc*, vterragni}@cse.ust.hk, ‡[email protected]* ABSTRACT over slow network connections, it may take a while for the transaction to complete. If the user's smartphone falls asleep Wake locks are widely used in Android apps to protect crit- while waiting for server messages and does not respond in ical computations from being disrupted by device sleeping. time, the transaction will fail, causing poor user experience. Inappropriate use of wake locks often seriously impacts user To address this problem, modern smartphone platforms al- experience. However, little is known on how wake locks are low apps to explicitly control when to keep certain hardware used in real-world Android apps and the impact of their mis- awake for continuous computation. On Android platforms, uses. To bridge the gap, we conducted a large-scale empiri- wake locks are designed for this purpose. Specifically, to keep cal study on 44,736 commercial and 31 open-source Android certain hardware awake for computation, an app needs to ac- apps. By automated program analysis and manual investi- quire a corresponding type of wake lock from the Android gation, we observed (1) common program points where wake OS (see Section 2.2). When the computation completes, the locks are acquired and released, (2) 13 types of critical com- app should release the acquired wake locks properly.
    [Show full text]
  • Privatumo Apsaugos Metodas Nuo Buvimo Vietos Nustatymo Mobiliesiems Įrenginiams Baigiamasis Magistro Studijų Projektas
    Kauno technologijos universitetas Informatikos fakultetas Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams Baigiamasis magistro studijų projektas Deimantė Zemeckytė Projekto autorė Prof. Jevgenijus Toldinas Vadovas Kaunas, 2021 Kauno technologijos universitetas Informatikos fakultetas Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams Magistro studijų projektas Informacijos ir informaciniu technologijų sauga (621E10003) Deimantė Zemeckytė Projekto autorė Prof. Jevgenijus Toldinas Vadovas Doc. Statys Maciulevičius Recenzentas Kaunas, 2021 2 Kauno technologijos universitetas Informatikos fakultetas Deimantė Zemeckytė Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams Akademinio sąžiningumo deklaracija Patvirtinu, kad mano, Deimantė Zemeckytė, baigiamasis projektas tema „Privatumo apsaugos metodas nuo buvimo vietos nustatymo mobiliesiems įrenginiams“ yra parašytas visiškai savarankiškai ir visi pateikti duomenys ar tyrimų rezultatai yra teisingi ir gauti sąžiningai. Šiame darbe nei viena dalis nėra plagijuota nuo jokių spausdintinių ar internetinių šaltinių, visos kitų šaltinių tiesioginės ir netiesioginės citatos nurodytos literatūros nuorodose. Įstatymų nenumatytų piniginių sumų už šį darbą niekam nesu mokėjęs. Aš suprantu, kad išaiškėjus nesąžiningumo faktui, man bus taikomos nuobaudos, remiantis Kauno technologijos universitete galiojančia tvarka. Deimantė Zemeckytė (vardą ir pavardę įrašyti ranka) (parašas) Deimantė Zemeckytė. Privatumo apsaugos
    [Show full text]
  • Preventing Duplicate Bug Reports by Continuously Querying Bug Reports
    EMSE manuscript No. (will be inserted by the editor) Preventing Duplicate Bug Reports by Continuously Querying Bug Reports Abram Hindle · Curtis Onuczko Received: date / Accepted: date Abstract Bug deduplication or duplicate bug report detection is a hot topic in software engineering information retrieval research, but it is often not de- ployed. Typically to de-duplicate bug reports developers rely upon the search capabilities of the bug report software they employ, such as Bugzilla, Jira, or Github Issues. These search capabilities range from simple SQL string search to IR-based word indexing methods employed by search engines. Yet too often these searches do very little to stop the creation of duplicate bug reports. Some bug trackers have more than 10% of their bug reports marked as duplicate. Perhaps these bug tracker search engines are not enough? In this paper we propose a method of attempting to prevent duplicate bug reports before they start: continuously querying. That is as the bug reporter types in their bug report their text is used to query the bug database to find duplicate or related bug reports. This continuously querying bug reports allows the reporter to be alerted to duplicate bug reports as they report the bug, rather than formulat- ing queries to find the duplicate bug report. Thus this work ushers in a new way of evaluating bug report deduplication techniques, as well as a new kind of bug deduplication task. We show that simple IR measures can address this problem but also that further research is needed to refine this novel process that is integrate-able into modern bug report systems.
    [Show full text]
  • Geo-Tracking Tracking Routes, Syncing Coordinates
    geo-tracking tracking routes, syncing coordinates overview: If you are taking photos with a device that does not have a built in GPS, you can add geographic coordinates to those photos by associating those images with a recording of your route from a device that has GPS capabilities. This is useful when you have a camera with no built-in GPS but you do have a cell phone with GPS capabilities or a stand-alone GPS device. Because both your photos and the recording of your route include time information, the photos can look to a file of your route — a GPX file — and see where you were, when, and thus where you were when each photo was taken. For this to work, the date and time on the device recording images and the device recording your route should be closely synced. creating a route: There are numerous applications for Android and iOS that allow you to record geographical routes and export that information. Here we are using the app My Tracks for Android (myTracks for iOS). It is free and works well enough for our purposes. Once you have synced your phone and camera clocks, hit the red record button on the My Tracks app. By default, the app will continue to record your route until you tell it to stop. Go for a walk, car trip, or jet ski ride and take some photos as you go (though please not while you’re driving). When you have finished your route and taking photos, hit the stop button. You will be prompted to give your route a name.
    [Show full text]
  • An Android Application for Capturing Mobility Behavior
    EasyTracker: An Android application for capturing mobility behavior Alexandros Doulamis Nikos Pelekis Yannis Theodoridis Dept. of Informatics Dept. of Statistics & Insurance Sci. Dept. of Informatics University of Piraeus University of Piraeus University of Piraeus Piraeus, Greece Piraeus, Greece Piraeus, Greece [email protected] [email protected] [email protected] Abstract — This paper presents EasyTracker, a mobile EasyTracker provides end users with personalized privacy application developed for the Android O/S that enable the functionality [8]. storage, analysis and map visualization of routes of mobile The second key functionality is that EasyTracker allows users. Furthermore, it enable users to manually annotate part a user to annotate parts of her track with labels and therefore of their routes with labels describing their activity and to describe her current activity (e.g. “stopped at café A”, behavior (e.g. “home having breakfast”, “travelling by car to “driving towards office”) [9]. Such feature can turn out to be work”, etc.). Of equal importance, the application encapsulates very useful for automatic fill-in of surveys performed in several state-of-the-art line simplification algorithms for transportation science or for researchers working on activity compressing the trajectories drawn from collected GPS recognition who are usually restricted to use manually records, as well as segmenting trajectories into homogeneous processed surveys. parts in order to facilitate automatic auditing of the user’s manual annotation. Third, EasyTracker encapsulates state-of-the-art algorithms that process in an online fashion the received Keywords - EasyTracker; GPS data; trajectory; path; track; stream of GPS recordings and transforms it into meaningful privacy; compression; segmentation; Android OS tracks, ready to be stored into a trajectory database [10] for further analysis.
    [Show full text]
  • Edoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones
    eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones Xiao Ma∗†, Peng Huang∗, Xinxin Jin∗, Pei Wang‡, Soyeon Park∗, Dongcai Shen∗ Yuanyuan Zhou∗, Lawrence K. Saul∗ and Geoffrey M. Voelker∗ ∗Univ. of California at San Diego, †Univ. of Illinois at Urbana-Champaign, ‡Peking Univ., China Abstract profiling [18, 36, 46, 52], energy efficient hardware [21, 30], operating systems [7, 10, 15, 29, 42, 49, 50, 51], lo- The past few years have witnessed an evolutionary cation services [14, 20, 26, 31], displays [5, 17] and net- change in the smartphone ecosystem. Smartphones have working [4, 6, 32, 41, 43]. Previous work has achieved gone from closed platforms containing only pre-installed notable improvements in smartphone battery life, yet the applications to open platforms hosting a variety of third- focus has primarily been on normal usage, i.e., where the party applications. Unfortunately, this change has also led energy used is needed for normal operation. to a rapidincrease in Abnormal Battery Drain (ABD) prob- In this work, we address an under-explored, yet emerg- lems that can be caused by software defects or miscon- ing type of battery problem on smartphones – Abnormal figuration. Such issues can drain a fully-charged battery Battery Drain (ABD). within a couple of hours, and can potentially affect a sig- nificant number of users. This paper presents eDoctor, a practical tool that helps 1.1 Abnormal Battery Drain Issues regular users troubleshoot abnormal battery drain issues on smartphones. eDoctor leverages the concept of exe- ABD refers to abnormally fast draining of a smartphone’s cution phases to capture an app’s time-varying behavior, battery that is not caused by normal resource usage.
    [Show full text]
  • Appropriate Obfuscation of Location Information on an Application Level for Mobile Devices
    Appropriate obfuscation of location information on an application level for mobile devices Empower user to regain control of their location privacy DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Software Engineering & Internet Computing eingereicht von Christoph Hochreiner Matrikelnummer 0726292 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Privatdoz. Dipl.-Ing. Mag.rer.soc.oec. Dr.techn. Edgar Weippl Mitwirkung: Univ. Lektor Dr.techn. Markus Huber, MSc Wien, TODOTT.MM.JJJJ (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Appropriate obfuscation of location information on an application level for mobile devices Empower user to regain control of their location privacy MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Software Engineering & Internet Computing by Christoph Hochreiner Registration Number 0726292 to the Faculty of Informatics at the Vienna University of Technology Advisor: Privatdoz. Dipl.-Ing. Mag.rer.soc.oec. Dr.techn. Edgar Weippl Assistance: Univ. Lektor Dr.techn. Markus Huber, MSc Vienna, TODOTT.MM.JJJJ (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Christoph Hochreiner Jungerstraße 16, 4950 Altheim Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]