ContextPhone: A Prototyping Platform for Context-Aware Mobile Applications
IEEE Pervasive Computing
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Current trends in web data analysis
Communications of the ACM - Entertainment networking
Deciphering Trends in Mobile Search
Computer
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
International Journal of Mobile Communications
Exploring the impact of handset upgrades on mobile content and service usage
International Journal of Mobile Communications
An agent-based system for collaborative informal learning in a pervasive environment
International Journal of Mobile Communications
Challenges and drivers in the 4G evolution in Korea
International Journal of Mobile Communications
A realistic mobility model for wireless networks of scale-free node connectivity
International Journal of Mobile Communications
An integrated model of mobile internet services usage and continuance
International Journal of Mobile Communications
Diffusion of mobile data in Finland
Netnomics
Handset-Based Data Collection Process and Participant Attitudes
International Journal of Handheld Computing Research
Young mobile users: Radical and individual - Not
Telematics and Informatics
Hi-index | 0.00 |
A comprehensive understanding of mobile service usage is increasingly difficult as a fragmented user base is accessing internet-based services using multiple wireless networks. In this paper, alternative data collection methods are reviewed. Surveys and end-user monitoring provide very detailed sample-based data, whereas wireless network data are less granular but cover an operator's entire subscriber base. Servers give detailed data on a focused user base. In future, survey-based methods will be increasingly complemented with automated measurements. Multifunctional mobile handsets and servers of internet-based service providers seem the most promising measurement points, whereas 2G/3G mobile networks are less useful as traffic leaks to alternative networks.