References
- Anderson, I., Maitland, J., Sherwood, S., Barkhuus, L., Chalmer, M., Hall, M., … Muller, H. (2007). Shakra: Tracking and sharing daily activity levels with unaugmented mobile phones. Mobile Networks and Applications, 12(2–3), 185–199. doi:10.1007/s11036-007-0011-7
- Bentley, F., & Metcalf, C. (2007). Sharing motion information with close family and friends. In Proceedings of the ACM conference on human factors in computing systems (pp. 1361–1370). San Jose, CA. doi:10.1016/j.chemosphere.2006.10.046
- Berg, S., Taylor, A. S., & Harper, R. (2003). Mobile phones for the next generation: Device designs for teenagers. In Proceedings of the ACM conference on human factors in computing systems (pp. 433–440). Fort Lauderdale, FL.
- Bogdan, C., & Sundblad, O. (1999). A cue-based, integrated system for supporting social awareness. Technical Report TRITA-NA-D9904, CID.
- Caldwell, M. A., & Peplau, L. A. (1982). Sex differences in same-sex friendship. Sex Roles, 8(7), 721–732. doi:10.1007/BF00287568
- Chen, Y., Chen, Y., Randriambelonoro, M., Geissbuhler, A., & Pu, P. (2017). Design considerations for social fitness applications: Comparing chronically Ill patients and healthy adults. In Proceedings of the ACM conference on computer supported cooperative work and social computing (pp. 1753–1762). Portland, OR.
- Chen, Y., & Pu, P. (2014). HealthyTogether: Exploring social incentives for mobile fitness applications. In Proceedings of the international symposium of Chinese CHI (pp. 25–34). Toronto, ON. doi:10.1089/g4h.2013.0066
- Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005). Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the ACM conference on human factors in computing systems (pp. 81–90). Portland, OR.
- Csikszentmihalyi, M., Larson, R., & Prescott, S. (1977). The ecology of adolescent activity and experience. Journal of Youth and Adolescence, 6(3), 281–294. doi:10.1007/BF02138940
- Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Journal of Social Issues, 59(2), 323–342. doi:10.1111/1540-4560.00067
- Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. doi:10.1287/isre.1060.0080
- Dong, M., Chen, L., & Wang, L. (2019). Investigating the user behaviors of sharing health-and fitness-related information generated by Mi band on Weibo. International Journal of Human–Computer Interaction, 35(9), 773–786. doi:10.1080/10447318.2018.1496968
- Epstein, D. A., Jacobson, B. H., Bales, E., McDonald, D. W., & Munson, S. A. (2015). From nobody cares to way to go!: A design framework for social sharing in personal informatics. In Proceedings of the ACM conference on computer supported cooperative work & social computing (pp. 1622–1636). Vancouver, BC.
- Formann, A. K. (1984). Die latent-class-analyse: Einführung in Theorie und Anwendung. Beltz. Weinheim, Germany: Beltz-Verlag.
- Guo, H., Chen, L., Chen, G., & Lv, M. (2015). An interpretable orientation and placement invariant approach for smartphone based activity recognition. In Proceedings of IEEE international conference on ubiquitous intelligence & computing (pp. 143–150). Beijing, China.
- Guo, H., Chen, L., Chen, G., & Lv, M. (2016). Smartphone-based activity recognition independent of device orientation and placement. International Journal of Communication Systems, 29(16), 2403–2415. doi:10.1002/dac.v29.16
- Guo, H., Chen, L., Peng, L., & Chen, G. (2016). Wearable sensor based multimodal human activity recognition exploiting the diversity of classifier ensemble. In Proceedings of the ACM international joint conference on pervasive and ubiquitous computing (pp. 1112–1123). Heidelberg, Germany.
- Hassib, M., Buschek, D., Wozniak, P., & Alt, F. (2017). HeartChat: Heart rate augmented mobile chat to support empathy and awareness. In Proceedings of the ACM conference on human factors in computing systems (pp. 2239–2251). Denver, CO.
- Hays, R. B. (1984). The development and maintenance of friendship. Journal of Social and Personal Relationships, 1(1), 75–98. doi:10.1177/0265407584011005
- Khalil, A., & Connelly, K. (2006). Context-aware telephony: Privacy preferences and sharing patterns. In Proceedings of the ACM conference on computer supported cooperative work (pp. 469–478). Montréal, QC.
- Kim, S., Kientz, J., Patel, S., & Abowd, G. (2008). Are you sleeping?: Sharing portrayed sleeping status within a social network. In Proceedings of the ACM conference on computer supported cooperative work (pp. 619–628). San Diego, CA.
- Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S. A., & Jones, S. (2011). Who’s your best friend?: Targeted privacy attacks In location-sharing social networks. In Proceedings of the international conference on ubiquitous computing (pp. 177–186). doi:10.1177/1753193411427832
- Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109–125. doi:10.1057/jit.2010.6
- Kumaraguru, P., & Cranor, L. F. (2005). Privacy indexes: A survey of Westin’s studies. Pittsburgh, PA: Carnegie Mellon University, School of Computer Science, Institute for Software Research International.
- Larson, R., & Csikszentmihalyi, M. (1983). The experience sampling method. New Directions for Methodology of Social & Behavioral Science, 15, 41–56.
- Lv, M., Chen, L., Chen, T., & Chen, G. (2018). Bi-view semi-supervised learning based semantic human activity recognition using accelerometers. IEEE Transactions on Mobile Computing, 17(9), 1991–2001. doi:10.1109/TMC.2018.2793913
- Metaxas, G., Metin, B., Schneider, J., Markopoulos, P., & Ruyter, B. (2009). Awareness of daily life activities. In Awareness systems (pp. 351–365). London: Springer-Verlag.
- Miluzzo, E., Lane, N., Eisenman, S., & Campbell, A. (2007). CenceMe – Injecting sensing presence into social networking applications. In Proceedings of the European conference on smart sensing and context (pp. 1–28). Kendal, UK.
- Newman, M. W., Lauterbach, D., Munson, S. A., Resnick, P., & Morris, M. E. (2011). “It’s not that I don’t have problems, I’ m just not putting them on facebook”: Challenges and opportunities in using online social networks for health. In Proceedings of the ACM conference on computer supported cooperative work (pp. 341–350). Hangzhou, China.
- Oulasvirta, A., Petit, R., Raento, M., & Tiitta, S. (2007). Interpreting and acting on mobile awareness cues. Human-Computer Interaction, 22(1), 97–135.
- Oulasvirta, A., Raento, M., & Tiitta, S. (2005). ContextContacts: Re-designing smartphone’s contact book to support mobile awareness and collaboration. In Proceedings of the international conference on human computer interaction with mobile devices and services (pp. 167–174). doi:10.1016/j.alcohol.2006.03.004
- Patil, S., Schlegel, R., Kapadia, A., & Lee, A. (2014). Reflection or action?: How feedback and control affect location sharing decisions. In Proceedings of the ACM conference on human factors in computing systems (pp. 101–110). doi:10.1177/1753193413478349
- Peng, L., Chen, L., Wu, M., & Chen, G. (2018). Complex activity recognition using acceleration, vital sign, and location data. IEEE Transactions on Mobile Computing, 18(7), 1488–1498.
- Peng, L., Chen, L., Wu, X., Guo, H., & Chen, G. (2017). Hierarchical complex activity representation and recognition using topic model and classifier level fusion. IEEE Transactions on Biomedical Engineering, 64(6), 1369–1379. doi:10.1109/TBME.2016.2604856
- Peng, L., Chen, L., Ye, Z., & Zhang, Y. (2018). AROMA: A deep multi-task learning based simple and complex human activity recognition method using wearable sensors. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(2), Article 74. doi:10.1145/3214277
- Raij, A., Ghosh, A., Kumar, S., & Srivastava, M. (2011). Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the ACM conference on human factors in computing systems (pp. 11–20). doi:10.1016/j.alcohol.2010.08.018
- Shih, F., & Boortz, J. (2013). Understanding people’s preferences for disclosing contextual information to smartphone apps. In Proceedings of the international conference on human aspects of information security, privacy, and trust (pp. 186–196). Las Vegas, NV.
- Teodoro, R., & Naaman, M. (2013). Fitter with Twitter: Understanding personal health and fitness activity in social media. In International Conference on Weblogs and Social Media (pp. 611–620). Boston, MA.
- Wiese, J., Kelley, P. G., Cranor, L. F., Dabbish, L., Hong, J. I., & Zimmerman, J. (2011). Are you close with me? Are you nearby?: Investigating social groups, closeness, and willingness to share. In Proceedings of the ACM international conference on ubiquitous computing (pp. 197–206). Beijing, China.
- Xie, J., Knijnenburg, B. P., & Jin, H. (2014). Location sharing privacy preference: Analysis and personalized recommendation. In Proceedings of the ACM international conference on Intelligent User Interfaces (pp. 189–198). Haifa, Israel.
- Yuan, N. J., Zhong, Y., Zhang, F., Xie, X., Lin, C. Y., & Rui, Y. (2016). Who will reply to/retweet this tweet?: The dynamics of intimacy from online social interactions. In Proceedings of the ACM international conference on web search and data mining (pp. 3–12). San Francisco, CA.