Abstract
As we become increasingly dependent on our computers and spending a major part of our day interacting with these machines, it is becoming important for lifeloggers and Human-Computer Interaction (HCI) researchers to capture this aspect of our life. In this paper, we present LoggerMan, a comprehensive logging tool to capture many aspects of our computer usage. It also comes with reporting capabilities to give insights to the data owner about his/her computer usage. In this work, we aim to address the current lack of logging software in this domain, which would help us, and other researchers, to build datasets for HCI experiments and also to better understand computer usage patterns. Our tool is published online (http://loggerman.org/) to be used freely by the community.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gurrin, C., Smeaton, A.F., Doherty, A.R.: LifeLogging: personal big data. Found. Trends Inf. Retr. 8(1), 1–125 (2014)
Liffick, B.W., Yohe, L.K.: Using surveillance software as an HCI tool. In: Information Systems Education Conference (2001)
The MITRE corporation. Widget observation simulation inspection tool. http://www.openchannelfoundation.org/projects/WOSIT. Accessed 07 Aug 2015
Frank, L.: OWL: A recommender system for it skills
Sullivan, K.P.H., Lindgren, E.: Computer Key-Stroke Logging and Writing: Methods and Applications. Studies in Writing, vol. 18. Elsevier, Oxford (2006)
Leijten, M., Van Waes, L.: Keystroke logging in writing research: using inputlog to analyze and visualize writing processes. Writ. Commun. 30(3), 358–392 (2013)
Stromqvist, S., Holmqvist, K., Johansson, V., Karlsson, H., Wengelin, A.: What keystroke-logging can reveal about writing. computer key-stroke logging and writing: methods and applications. Stud. Writ. 18, 45–72 (2006)
Leijten, M., Van Waes, L.: Inputlog: a logging tool for the research of writing processes. Technical report
Rodrigues, M., Gonçalves, S., Carneiro, D., Novais, P., Fdez-Riverola, F.: Keystrokes and clicks: measuring stress on e-learning students. In: Casillas, J., Martínez-López, F.J., Vicari, R., De la Prieta, F. (eds.) Management Intelligent Systems. AISC, vol. 220, pp. 119–126. Springer, Heidelberg (2013)
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. 8(3), 312–347 (2005)
Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Clustering di-graphs for continuously verifying users according to their typing patterns. In: 2010 IEEE 26th Convention of Electrical and Electronics Engineers in Israel (IEEEI), pp. 000445–000449 (2010)
Vizer, L.M.: Detecting cognitive and physical stress through typing behavior. In: CHI 2009 Extended Abstracts on Human Factors in Computing Systems, pp. 3113–3116. ACM (2009)
Kolakowska, A.: A review of emotion recognition methods based on keystroke dynamics and mouse movements. In: 2013 the 6th International Conference on Human System Interaction (HSI), pp. 548–555 (2013)
Yeh, T., Chang, T.-H., Miller, R.C.: Sikuli: Using GUI screenshots for search and automation. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, UIST 2009, pp. 183–192. ACM (2009)
Yeh, T., Chang, T.-H., Xie, B., Walsh, G., Watkins, I., Wongsuphasawat, K., Huang, M., Davis, L.S., Bederson, B.B.: Creating contextual help for GUIs using screenshots. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST 2011, pp. 145–154 (2011)
Hinbarji, Z., Albatal, R., Gurrin, C.: Dynamic user authentication based on mouse movements curves. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015, Part II. LNCS, vol. 8936, pp. 111–122. Springer, Heidelberg (2015)
Ahmed, A.A.E., Traore, I.: A new biometric technology based on mouse dynamics. IEEE Trans. Dependable Sec. Comput. 4(3), 165–179 (2007)
Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM (2004)
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co. (2002)
Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit. 36, 229–243 (2003)
Goldring, T.: User profiling for intrusion detection in windows nt. Comput. Sci. Stat. 35 (2003)
Acknowledgments
This publication has emanated from research conducted with the financial support of Science Foundation Ireland (SFI) under grant number SFI/12/RC/2289.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Hinbarji, Z., Albatal, R., O’Connor, N., Gurrin, C. (2016). LoggerMan, a Comprehensive Logging and Visualization Tool to Capture Computer Usage. In: Tian, Q., Sebe, N., Qi, GJ., Huet, B., Hong, R., Liu, X. (eds) MultiMedia Modeling. MMM 2016. Lecture Notes in Computer Science(), vol 9517. Springer, Cham. https://doi.org/10.1007/978-3-319-27674-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-27674-8_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27673-1
Online ISBN: 978-3-319-27674-8
eBook Packages: Computer ScienceComputer Science (R0)