3,409
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      The Application of User Event Log Data for Mental Health and Wellbeing Analysis

      proceedings-article
      1 , 1 , 1 , 1 , 1
      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)
      Human Computer Interaction Conference
      4 - 6 July 2018
      User event log, log analytics, machine learning, data mining, mental health, digital interaction technology, m-Health, e-Health
      Bookmark

            Abstract

            Many digital interaction technologies, including web-based interventions, smartphone applications, and telephone helplines, can provide a basis for capturing real time data of interactions between the user and the system. Such data is recorded in the form of log files, which records user events that range from simple keystrokes on a computer, user activated sensor data or duration/frequency of phone calls. These interactions can provide rich datasets amenable to user data analytics using machine learning and other analytics techniques. This data analysis can highlight usage patterns and user behaviours based on their interaction with the technology. User log data analysis can be descriptive statistics (what users have done), predictive analytics (what events will happen) and prescriptive (what action to take given a predicted event or outcome). This can also be thought of as spanning across different levels of user analytics from hindsight, insight and foresight. Predictive analytics are used with log data to provide predictions on future user behaviour based on early usage behaviours. Event logs are objective regarding usage, but usage may not correlate with the level of the system’s user experience. Hence, ecological momentary assessment (EMA) of the user experience can be used augment user log data. Nevertheless, with the emergence of health applications and other app-based health services, we consider how user event logs can be specifically used within the mental health domain. This can provide beneficial insights into how users interact with mental health e-services, which can provide an indication of their current and future mental state.

            Content

            Author and article information

            Contributors
            Conference
            July 2018
            July 2018
            : 1-14
            Affiliations
            [0001]Ulster University Jordanstown Shore Road, Newtownabbey Northern Ireland
            Article
            10.14236/ewic/HCI2018.4
            f6856abe-2db7-4088-91b8-020551d9d90d
            © Turkington et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            HCI
            32
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2018.4
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            machine learning,User event log,log analytics,data mining,mental health,digital interaction technology,m-Health,e-Health

            REFERENCES

            1. 2017 “Activity Recognition in Sensor Data Streams for Active and Assisted Living Environments” IEEE Transactions on Circuits and Systems for Video Technology

            2. American Psychiatric Association 2014 Desk Reference to the Diagnostic Criteria From DSM-5®, American Psychiatric Pub

            3. 2017 “Incremental and interactive business process model repair in apromore” Proceedings of the BPM Demos.CRC Press 2017, to appear),

            4. 2012 “Clustering high dimensional data” Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2 4 340 350

            5. 2017 “Sensing behavioral symptoms of mental health and delivering personalized interventions using mobile technologies” Depression and anxiety

            6. 2008 “Support vector machines (SVM) as a technique for solvency analysis”

            7. 2015 Adaptive control processes: a guided tour Princeton university press

            8. 2018 February The Necessity of Using Mixed Methods for Assessment of mHealth Interventions: Application in the “Full Flow of Data-sharing” Project In Diabetes Technology & Therapeutics 20 A43 A44

            9. 2016 “Death by suicide: a report based on the Northern Ireland Coroner‟s database.”

            10. 2011 “Harnessing context sensing to develop a mobile intervention for depression” Journal of medical Internet research 13 3 e55

            11. 2014 “Optimized big data K-means clustering using MapReduce” The Journal of Supercomputing 70 3 1249 1259

            12. 2017 “iSurvive: An Interpretable, Event-time Prediction Model for mHealth” International Conference on Machine Learning 970

            13. 2013 “Rethinking the dose-response relationship between usage and outcome in an online intervention for depression: randomized controlled trial” Journal of medical Internet research 15 10 e231

            14. 2014 “Understanding user behavior through log data and analysis” in Ways of Knowing in HCI Springer 349 372

            15. 2004 “Does relative deprivation predict the need for mental health services” J Ment Health Policy Econ 7 4 167 175

            16. 1996 “From data mining to knowledge discovery in databases” AI magazine 17 3 37

            17. 2005 “Evaluating implicit measures to improve web search” ACM Transactions on Information Systems (TOIS) 23 2 147 168

            18. 2012 “Factors associated with persistent participation in an online diet intervention” CHI’12 Extended Abstracts on Human Factors in Computing Systems ACM 2375

            19. 2018 “Cognitive and Behavioral Skills Exercises Completed by Patients with Major Depression During Smartphone Cognitive Behavioral Therapy: Secondary Analysis of a Randomized Controlled Trial” JMIR mental health 5 1 e4

            20. 2001 “An introduction to hidden Markov models and Bayesian networks” International Journal of Pattern Recognition and Artificial Intelligence 15 01 9 42

            21. 2009 “The WEKA data mining software: an update” ACM SIGKDD explorations newsletter 11 1 10 18

            22. 2011 Data mining: concepts and techniques Elsevier

            23. 2011 Intimate reflections: Private diaries in qualitative research. Qualitative Research 11 6 664 682

            24. 2014 “Security Concerns in Android mHealth Apps” AMIA ...Annual Symposium proceedings.AMIA Symposium 2014 645 654

            25. 2017 “Advances in mobile mental health: opportunities and implications for the spectrum of e-mental health services” mHealth 3

            26. 1998 “The Lumiere project: Bayesian user modeling for inferring the goals and needs of software users” Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence Morgan Kaufmann Publishers Inc. 256

            27. 2013 “A review and taxonomy of activity recognition on mobile phones” BioNanoScience 3 2 145 171

            28. 2006 “Frequent pattern mining in web log data” Acta Polytechnica Hungarica 3 1 77 90

            29. 1999 “Data clustering: a review” ACM computing surveys (CSUR) 31 3 264 323

            30. 1995 “Real-time telecommunication network management: extending event correlation with temporal constraints” in Integrated Network Management IV Springer 290 301

            31. 2018 Comparing Diet and Exercise Monitoring Using Smartphone App and Paper Diary: A Two-Phase Intervention Study. JMIR mHealth and uHealth 6 1 e17

            32. 2007 “An evaluation of crisis hotline outcomes part 1: Nonsuicidal crisis callers” Suicide and Life-threatening behavior 37 3 322 337

            33. & van 2016,“Health behavior change support systems as a research discipline; a viewpoint” International journal of medical informatics 96 3 10

            34. 2013 “Participants, usage, and use patterns of a web-based intervention for the prevention of depression within a randomized controlled trial” Journal of medical Internet research 15 8 e172

            35. 1999 A knowledge discovery methodology for telecommunication network alarm databases University of Helsinki Helsinki, Finland

            36. 1997,“GroupLens: applying collaborative filtering to Usenet news” Communications of the ACM 40 3 77 87

            37. 2014 “Activity recognition on streaming sensor data” Pervasive and mobile computing 10 138 154

            38. 2007 “Session viewer: Visual exploratory analysis of web session logs” Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on IEEE 147

            39. 2013 “Process mining in healthcare: Data challenges when answering frequently posed questions” in Process Support and Knowledge Representation in Health Care Springer 140 153

            40. 2008 “Process mining techniques: an application to stroke care” Studies in health technology and informatics 136 573

            41. 2017 “Smartphone Cognitive Behavioral Therapy as an Adjunct to Pharmacotherapy for Refractory Depression: Randomized Controlled Trial” Journal of medical Internet research 19 11 e373

            42. 2013 “How IT Should Deepen Big Data Analysis to Support Customer-Centricity” Gartner G00248980

            43. 2014 Practical predictive analytics and decisioning systems for medicine: Informatics accuracy and cost-effectiveness for healthcare administration and delivery including medical research Academic Press

            44. 2015 “Data-driven activity prediction: Algorithms, evaluation methodology, and applications” Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ACM 805

            45. 2012 Foundations of machine learning MIT press

            46. 2015 Introduction to time series analysis and forecasting John Wiley & Sons

            47. 1994 “Information filtering based on user behavior analysis and best match text retrieval” SIGIR’94 Springer 272

            48. 2012 “What design features are used in effective e-health interventions? A review using techniques from critical interpretive synthesis” Telemedicine and e-Health 18 2 137 144

            49. 2014 “Analyzing engagement in a web-based intervention platform through visualizing log-data” Journal of medical Internet research 16 11 e252

            50. 2006 “Ecological momentary assessment: what it is and why it is a method of the future in clinical psychopharmacology” Journal of psychiatry & neuroscience : JPN 31 1 13 20

            51. 2018 “HILDA - A Health Interaction Log Data Analysis Workflow to Aid Understanding of Usage Patterns and Behaviours” no. Symposium on Social Interactions in Complex Intelligent Systems (SICIS-2018) 4-6 April 2018 Liverpool, UK

            52. 2016 “The future of mental health care: peer-to-peer support and social media” Epidemiology and psychiatric sciences 25 2 113 122

            53. 2011 “Understanding the mental health effects of indirect exposure to mass trauma through the media” Jama 306 12 1374 1375

            54. 2013 “A foundation for the study of behavior change support systems” Personal and ubiquitous computing 17 6 1223 1235

            55. 2012 “Advances and challenges in log analysis” Communications of the ACM 55 2 55 61

            56. 2014 Ways of Knowing in HCI Springer

            57. 1986 “Induction of decision trees” Machine Learning 1 1 81 106

            58. 2017 “The Effect of the General Data Protection Regulation on Medical Research” Journal of medical Internet research 19 2 e47

            59. 2015 “Mobile Phone Sensor Correlates of Depressive Symptom Severity in Daily-Life Behavior: An Exploratory Study” Journal of medical Internet research 17 7 e175

            60. & van 2017 “Opening the Black Box of Electronic Health: Collecting, Analyzing, and Interpreting Log Data” JMIR research protocols 6 8 e156

            61. 2013 “Mental-and physical-health effects of acute exposure to media images of the September 11, 2001, attacks and the Iraq War” Psychological Science 24 9 1623 1634

            62. 2015 “Frequent callers to crisis helplines: Who are they and why do they call?” Australian & New Zealand Journal of Psychiatry 49 1 54 64

            63. 2004 “The challenges of clustering high dimensional data” in New directions in statistical physics Springer 273 309

            64. 2000 “Simple demographics often identify people uniquely” Health (San Francisco) 671 1 34

            65. 2018 “A study protocol for a non-randomised comparison trial evaluating the feasibility and effectiveness of a mobile cognitive-behavioural programme with integrated coaching for anxious adults in primary care” BMJ open 8 1 e019108-2017-019108

            66. 2017 “Predictive business process monitoring with LSTM neural networks” International Conference on Advanced Information Systems Engineering Springer 477

            67. 2006 “Connecting Older People: Consumer Engagement with Digital Services” London, Ofcom

            68. 1977 Exploratory data analysis Reading, Mass

            69. 2006 “Simple Event Correlator for real-time security log monitoring” Hakin9 Magazine 1 6 28 39

            70. 2005 Tools and Techniques for Event Log Analysis Tallinn University of Technology Press

            71. 2012 “Security event processing with simple event correlator” Information Systems Security Association Journal 10 8 30 37

            72. 2015 “LogCluster-A data clustering and pattern mining algorithm for event logs” Network and Service Management (CNSM), 2015 11th International Conference on IEEE 1

            73. 2014 “Using security logs for collecting and reporting technical security metrics” Military Communications Conference (MILCOM), 2014 IEEE IEEE 294

            74. 2014 “Understanding the usage of content in a mental health intervention for depression: an analysis of log data” Journal of medical Internet research 16 1 e27

            75. 2016 “Systematic review of patients’ participation in and experiences of technology-based monitoring of mental health symptoms in the community” BMJ open 6 6 e008362-2015-008362

            76. Wellcome Trust 2016 July 2016-last update, Analysis: Research and the General Data Protection Regulation-2012/0011(COD) [Homepage of Wellcome Trust], [Online]. Available: http://wellcome.ac.uk/sites/default/files/new-data-protection-regulation-key-clauses-wellcome-jul16.pdf [2018, 2018-02-13]

            77. 2014 “Health recommender systems: concepts, requirements, technical basics and challenges” International journal of environmental research and public health 11 3 2580 2607

            78. 2000 “CRISP-DM: Towards a standard process model for data mining” Proceedings of the 4th international conference on the practical applications of knowledge discovery and data mining Citeseer 29

            79. 2016 Data Mining: Practical machine learning tools and techniques Morgan Kaufmann

            80. 2015 “Empirical studies on usability of mHealth apps: a systematic literature review” Journal of medical systems 39 2 1

            Comments

            Comment on this article