LoggerMan, a Comprehensive Logging and Visualization Tool to Capture Computer Usage

  • Zaher HinbarjiEmail author
  • Rami Albatal
  • Noel O’Connor
  • Cathal Gurrin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9517)


As we become increasingly dependent on our computers and spending a major part of our day interacting with these machines, it is becoming important for lifeloggers and Human-Computer Interaction (HCI) researchers to capture this aspect of our life. In this paper, we present LoggerMan, a comprehensive logging tool to capture many aspects of our computer usage. It also comes with reporting capabilities to give insights to the data owner about his/her computer usage. In this work, we aim to address the current lack of logging software in this domain, which would help us, and other researchers, to build datasets for HCI experiments and also to better understand computer usage patterns. Our tool is published online ( to be used freely by the community.


Logging tool Computer usage Lifelogging Human-computer interaction User modeling 



This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) under grant number SFI/12/RC/2289.


  1. 1.
    Gurrin, C., Smeaton, A.F., Doherty, A.R.: LifeLogging: personal big data. Found. Trends Inf. Retr. 8(1), 1–125 (2014)CrossRefGoogle Scholar
  2. 2.
    Liffick, B.W., Yohe, L.K.: Using surveillance software as an HCI tool. In: Information Systems Education Conference (2001)Google Scholar
  3. 3.
    The MITRE corporation. Widget observation simulation inspection tool. Accessed 07 Aug 2015
  4. 4.
    Frank, L.: OWL: A recommender system for it skillsGoogle Scholar
  5. 5.
    Sullivan, K.P.H., Lindgren, E.: Computer Key-Stroke Logging and Writing: Methods and Applications. Studies in Writing, vol. 18. Elsevier, Oxford (2006)Google Scholar
  6. 6.
    Leijten, M., Van Waes, L.: Keystroke logging in writing research: using inputlog to analyze and visualize writing processes. Writ. Commun. 30(3), 358–392 (2013)CrossRefGoogle Scholar
  7. 7.
    Stromqvist, S., Holmqvist, K., Johansson, V., Karlsson, H., Wengelin, A.: What keystroke-logging can reveal about writing. computer key-stroke logging and writing: methods and applications. Stud. Writ. 18, 45–72 (2006)Google Scholar
  8. 8.
    Leijten, M., Van Waes, L.: Inputlog: a logging tool for the research of writing processes. Technical reportGoogle Scholar
  9. 9.
    Rodrigues, M., Gonçalves, S., Carneiro, D., Novais, P., Fdez-Riverola, F.: Keystrokes and clicks: measuring stress on e-learning students. In: Casillas, J., Martínez-López, F.J., Vicari, R., De la Prieta, F. (eds.) Management Intelligent Systems. AISC, vol. 220, pp. 119–126. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  10. 10.
    Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)CrossRefGoogle Scholar
  11. 11.
    Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Clustering di-graphs for continuously verifying users according to their typing patterns. In: 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI), pp. 000445–000449 (2010)Google Scholar
  12. 12.
    Vizer, L.M.: Detecting cognitive and physical stress through typing behavior. In: CHI 2009 Extended Abstracts on Human Factors in Computing Systems, pp. 3113–3116. ACM (2009)Google Scholar
  13. 13.
    Kolakowska, A.: A review of emotion recognition methods based on keystroke dynamics and mouse movements. In: 2013 the 6th International Conference on Human System Interaction (HSI), pp. 548–555 (2013)Google Scholar
  14. 14.
    Yeh, T., Chang, T.-H., Miller, R.C.: Sikuli: Using GUI screenshots for search and automation. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 183–192. ACM (2009)Google Scholar
  15. 15.
    Yeh, T., Chang, T.-H., Xie, B., Walsh, G., Watkins, I., Wongsuphasawat, K., Huang, M., Davis, L.S., Bederson, B.B.: Creating contextual help for GUIs using screenshots. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST 2011, pp. 145–154 (2011)Google Scholar
  16. 16.
    Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015, Part II. LNCS, vol. 8936, pp. 111–122. Springer, Heidelberg (2015) Google Scholar
  17. 17.
    Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Sec. Comput. 4(3), 165–179 (2007)CrossRefGoogle Scholar
  18. 18.
    Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM (2004)Google Scholar
  19. 19.
    Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. (2002)Google Scholar
  20. 20.
    Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit. 36, 229–243 (2003)zbMATHCrossRefGoogle Scholar
  21. 21.
    Goldring, T.: User profiling for intrusion detection in windows nt. Comput. Sci. Stat. 35 (2003)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Zaher Hinbarji
    • 1
    Email author
  • Rami Albatal
    • 1
  • Noel O’Connor
    • 1
  • Cathal Gurrin
    • 1
  1. 1.Insight Centre for Data AnalyticsDublin City UniversityDublinIreland

Personalised recommendations