Determining typical smartphone usage: What data do we need?
journal contributionposted on 2019-04-03, 14:28 authored by Thom WilcocksonThom Wilcockson, David A. Ellis, Heather Shaw
Problematic smartphone use is an emerging issue in behavioral addiction research. At the same time, measuring smartphone use with mobile apps has become increasingly common. However, understanding how much data are necessary requires careful consideration if the field is to move forward. Here, we examine how much time should be spent measuring mobile phone operation to reliably infer general patterns of usage and repetitive checking behaviors. In a second analysis, we consider whether a self-report measure of problematic smartphone use is associated with real-time patterns of use. Results suggest that smartphone usage collected for a minimum of 5 days will reflect typical weekly usage (in hours), but habitual checking behaviors (uses lasting <15 seconds) can be reliably inferred within 2 days. These measurements did not reliably correlate with a self-reported measure. We conclude that patterns of smartphone use are repetitive and our results suggest that checking behavior is a particularly consistent and efficient measure when quantifying typical and problematic smartphone usage.
This work was partially funded by a Faculty of Science and Technology research grant (PSA7866) from Lancaster University, and by a Research Investment Fund (RIF2014-31) from the University of Lincoln.
- Sport, Exercise and Health Sciences
Published inCyberpsychology, Behavior, and Social Networking
Pages395 - 398
CitationWILCOCKSON, T.D.W., ELLIS, D.A. and SHAW, H., 2018. Determining typical smartphone usage: What data do we need?. Cyberpsychology, Behavior, and Social Networking, 21 (6), pp.395-398.
Publisher© Mary Ann Liebert, Inc.
- AM (Accepted Manuscript)
Publisher statementThis work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/
NotesFinal publication is available from Mary Ann Liebert, Inc., publishers https://doi.org/10.1089/cyber.2017.0652