Skip to main content

LoggerMan, a Comprehensive Logging and Visualization Tool to Capture Computer Usage

  • Conference paper
  • First Online:
MultiMedia Modeling (MMM 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9517))

Included in the following conference series:

Abstract

As we become increasingly dependent on our computers and spending a major part of our day interacting with these machines, it is becoming important for lifeloggers and Human-Computer Interaction (HCI) researchers to capture this aspect of our life. In this paper, we present LoggerMan, a comprehensive logging tool to capture many aspects of our computer usage. It also comes with reporting capabilities to give insights to the data owner about his/her computer usage. In this work, we aim to address the current lack of logging software in this domain, which would help us, and other researchers, to build datasets for HCI experiments and also to better understand computer usage patterns. Our tool is published online (http://loggerman.org/) to be used freely by the community.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gurrin, C., Smeaton, A.F., Doherty, A.R.: LifeLogging: personal big data. Found. Trends Inf. Retr. 8(1), 1–125 (2014)

    Article  Google Scholar 

  2. Liffick, B.W., Yohe, L.K.: Using surveillance software as an HCI tool. In: Information Systems Education Conference (2001)

    Google Scholar 

  3. The MITRE corporation. Widget observation simulation inspection tool. http://www.openchannelfoundation.org/projects/WOSIT. Accessed 07 Aug 2015

  4. Frank, L.: OWL: A recommender system for it skills

    Google Scholar 

  5. Sullivan, K.P.H., Lindgren, E.: Computer Key-Stroke Logging and Writing: Methods and Applications. Studies in Writing, vol. 18. Elsevier, Oxford (2006)

    Google Scholar 

  6. Leijten, M., Van Waes, L.: Keystroke logging in writing research: using inputlog to analyze and visualize writing processes. Writ. Commun. 30(3), 358–392 (2013)

    Article  Google Scholar 

  7. Stromqvist, S., Holmqvist, K., Johansson, V., Karlsson, H., Wengelin, A.: What keystroke-logging can reveal about writing. computer key-stroke logging and writing: methods and applications. Stud. Writ. 18, 45–72 (2006)

    Google Scholar 

  8. Leijten, M., Van Waes, L.: Inputlog: a logging tool for the research of writing processes. Technical report

    Google Scholar 

  9. Rodrigues, M., Gonçalves, S., Carneiro, D., Novais, P., Fdez-Riverola, F.: Keystrokes and clicks: measuring stress on e-learning students. In: Casillas, J., Martínez-López, F.J., Vicari, R., De la Prieta, F. (eds.) Management Intelligent Systems. AISC, vol. 220, pp. 119–126. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  10. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)

    Article  Google Scholar 

  11. Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Clustering di-graphs for continuously verifying users according to their typing patterns. In: 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI), pp. 000445–000449 (2010)

    Google Scholar 

  12. Vizer, L.M.: Detecting cognitive and physical stress through typing behavior. In: CHI 2009 Extended Abstracts on Human Factors in Computing Systems, pp. 3113–3116. ACM (2009)

    Google Scholar 

  13. Kolakowska, A.: A review of emotion recognition methods based on keystroke dynamics and mouse movements. In: 2013 the 6th International Conference on Human System Interaction (HSI), pp. 548–555 (2013)

    Google Scholar 

  14. Yeh, T., Chang, T.-H., Miller, R.C.: Sikuli: Using GUI screenshots for search and automation. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 183–192. ACM (2009)

    Google Scholar 

  15. Yeh, T., Chang, T.-H., Xie, B., Walsh, G., Watkins, I., Wongsuphasawat, K., Huang, M., Davis, L.S., Bederson, B.B.: Creating contextual help for GUIs using screenshots. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST 2011, pp. 145–154 (2011)

    Google Scholar 

  16. Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015, Part II. LNCS, vol. 8936, pp. 111–122. Springer, Heidelberg (2015)

    Google Scholar 

  17. Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Sec. Comput. 4(3), 165–179 (2007)

    Article  Google Scholar 

  18. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM (2004)

    Google Scholar 

  19. Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. (2002)

    Google Scholar 

  20. Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit. 36, 229–243 (2003)

    Article  MATH  Google Scholar 

  21. Goldring, T.: User profiling for intrusion detection in windows nt. Comput. Sci. Stat. 35 (2003)

    Google Scholar 

Download references

Acknowledgments

This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) under grant number SFI/12/RC/2289.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zaher Hinbarji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Hinbarji, Z., Albatal, R., O’Connor, N., Gurrin, C. (2016). LoggerMan, a Comprehensive Logging and Visualization Tool to Capture Computer Usage. In: Tian, Q., Sebe, N., Qi, GJ., Huet, B., Hong, R., Liu, X. (eds) MultiMedia Modeling. MMM 2016. Lecture Notes in Computer Science(), vol 9517. Springer, Cham. https://doi.org/10.1007/978-3-319-27674-8_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27674-8_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27673-1

  • Online ISBN: 978-3-319-27674-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics