The Application of User Event Log Data for Mental Health and Wellbeing Analysis

Many digital interaction technologies, including web-based interventions, smartphone applications, and telephone helplines, can provide a basis for capturing real time data of interactions between the user and the system. Such data is recorded in the form of log files, which records user events that range from simple keystrokes on a computer, user activated sensor data or duration/frequency of phone calls. These interactions can provide rich datasets amenable to user data analytics using machine learning and other analytics techniques. This data analysis can highlight usage patterns and user behaviours based on their interaction with the technology. User log data analysis can be descriptive statistics (what users have done), predictive analytics (what events will happen) and prescriptive (what action to take given a predicted event or outcome). This can also be thought of as spanning across different levels of user analytics from hindsight, insight and foresight. Predictive analytics are used with log data to provide predictions on future user behaviour based on early usage behaviours. Event logs are objective regarding usage, but usage may not correlate with the level of the system's user experience. Hence, ecological momentary assessment (EMA) of the user experience can be used augment user log data. Nevertheless, with the emergence of health applications and other app-based health services, we consider how user event logs can be specifically used within the mental health domain. This can provide beneficial insights into how users interact with mental health e-services, which can provide an indication of their current and future mental state.

[1]  L. Sweeney Simple Demographics Often Identify People Uniquely , 2000 .

[2]  Amy M. Bauer,et al.  Advances in mobile mental health: opportunities and implications for the spectrum of e-mental health services. , 2017, mHealth.

[3]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[4]  Rouslan A. Moro,et al.  Support Vector Machines (SVM) as a Technique for Solvency Analysis , 2008 .

[5]  John W. Tukey,et al.  Exploratory Data Analysis. , 1979 .

[6]  Tanzeem Choudhury,et al.  Sensing behavioral symptoms of mental health and delivering personalized interventions using mobile technologies , 2017, Depression and anxiety.

[7]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[8]  Cem Ersoy,et al.  A Review and Taxonomy of Activity Recognition on Mobile Phones , 2013 .

[9]  Marlon Dumas,et al.  Predictive Business Process Monitoring with LSTM Neural Networks , 2016, CAiSE.

[10]  Ali Idri,et al.  Empirical Studies on Usability of mHealth Apps: A Systematic Literature Review , 2015, Journal of Medical Systems.

[11]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[12]  C. Gresenz,et al.  Does relative deprivation predict the need for mental health services? , 2004, The journal of mental health policy and economics.

[13]  Marlon Dumas,et al.  Incremental and Interactive Business Process Model Repair in Apromore , 2017, BPM.

[14]  Murat Kulahci,et al.  Introduction to Time Series Analysis and Forecasting , 2008 .

[15]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[16]  Sean Becketti,et al.  Introduction to Time Series Using Stata , 2013 .

[17]  Harri Oinas-Kukkonen,et al.  Health Behavior Change Support Systems as a research discipline; A viewpoint , 2016, Int. J. Medical Informatics.

[18]  Alan Woodward,et al.  Frequent callers to crisis helplines: Who are they and why do they call? , 2015, The Australian and New Zealand journal of psychiatry.

[19]  Amy M. Bauer,et al.  Advances in Mobile Mental Health: Opportunities and Implications for the Spectrum of E-Mental Health Services. , 2018, Focus.

[20]  Maurice Mulvenna,et al.  HILDA - A Health Interaction Log Data Analysis Workflow to Aid Understanding of Usage Patterns and Behaviours , 2018 .

[21]  Risto Vaarandi,et al.  LogCluster - A data clustering and pattern mining algorithm for event logs , 2015, 2015 11th International Conference on Network and Service Management (CNSM).

[22]  Shlomo Berkovsky,et al.  Factors associated with persistent participation in an online diet intervention , 2012, CHI EA '12.

[23]  Tamara Munzner,et al.  Session Viewer: Visual Exploratory Analysis of Web Session Logs , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.

[24]  Bruce Neal,et al.  Rethinking the Dose-Response Relationship Between Usage and Outcome in an Online Intervention for Depression: Randomized Controlled Trial , 2013, Journal of medical Internet research.

[25]  Wei Xu,et al.  Advances and challenges in log analysis , 2011, Commun. ACM.

[26]  Steve Fox,et al.  Evaluating implicit measures to improve web search , 2005, TOIS.

[27]  L. Marsch,et al.  The future of mental health care: peer-to-peer support and social media , 2016, Epidemiology and Psychiatric Sciences.

[28]  John Kalafat,et al.  An evaluation of crisis hotline outcomes. Part 1: Nonsuicidal crisis callers. , 2007, Suicide & life-threatening behavior.

[29]  Joseph M. Hilbe,et al.  Practical Predictive Analytics and Decisioning Systems for Medicine: Informatics Accuracy and Cost-Effectiveness for Healthcare Administration and Delivery Including Medical Research , 2014 .

[30]  Konrad Paul Kording,et al.  Mobile Phone Sensor Correlates of Depressive Symptom Severity in Daily-Life Behavior: An Exploratory Study , 2015, Journal of medical Internet research.

[31]  J. Ross Quinlan,et al.  Induction of Decision Trees , 1986, Machine Learning.

[32]  Wil M. P. van der Aalst,et al.  Process Mining Techniques: an Application to Stroke Care , 2008, MIE.

[33]  James M. Rehg,et al.  iSurvive: An Interpretable, Event-time Prediction Model for mHealth , 2017, ICML.

[34]  E. Szigethy,et al.  A study protocol for a non-randomised comparison trial evaluating the feasibility and effectiveness of a mobile cognitive–behavioural programme with integrated coaching for anxious adults in primary care , 2018, BMJ Open.

[35]  Diane J. Cook,et al.  Data-Driven Activity Prediction: Algorithms, Evaluation Methodology, and Applications , 2015, KDD.

[36]  Diane J. Cook,et al.  Activity recognition on streaming sensor data , 2014, Pervasive Mob. Comput..

[37]  Stefan Priebe,et al.  Systematic review of patients' participation in and experiences of technology-based monitoring of mental health symptoms in the community , 2016, BMJ Open.

[38]  Ira Assent,et al.  Clustering high dimensional data , 2012 .

[39]  Martin Wiesner,et al.  Health Recommender Systems: Concepts, Requirements, Technical Basics and Challenges , 2014, International journal of environmental research and public health.

[40]  Eric Horvitz,et al.  The Lumière Project: Bayesian User Modeling for Inferring the Goals and Needs of Software Users , 1998, UAI.

[41]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[42]  Vipin Kumar,et al.  The Challenges of Clustering High Dimensional Data , 2004 .

[43]  Y. Neria,et al.  Understanding the mental health effects of indirect exposure to mass trauma through the media. , 2011, JAMA.

[44]  Susan T. Dumais,et al.  Understanding User Behavior Through Log Data and Analysis , 2014, Ways of Knowing in HCI.

[45]  R. Vaarandi Simple Event Correlator for real-time security log monitoring , 2006 .

[46]  Mark Weissman,et al.  Real-time telecommunication network management: extending event correlation with temporal constraints , 1995, Integrated Network Management.

[47]  Harri Oinas-Kukkonen,et al.  A foundation for the study of behavior change support systems , 2012, Personal and Ubiquitous Computing.

[48]  Ameet Talwalkar,et al.  Foundations of Machine Learning , 2012, Adaptive computation and machine learning.

[49]  Kyandoghere Kyamakya,et al.  Activity Recognition in Sensor Data Streams for Active and Assisted Living Environments , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[50]  Floor Sieverink,et al.  Opening the Black Box of Electronic Health: Collecting, Analyzing, and Interpreting Log Data , 2017, JMIR research protocols.

[51]  E. M. Wright,et al.  Adaptive Control Processes: A Guided Tour , 1961, The Mathematical Gazette.

[52]  Wil M. P. van der Aalst,et al.  Process Mining in Healthcare: Data Challenges When Answering Frequently Posed Questions , 2012, ProHealth/KR4HC.

[53]  Mika Klemettinen,et al.  A Knowledge Discovery Methodology for Telecommunication Network Alarm Databases , 1999 .

[54]  Cecily Morrison,et al.  Analyzing Engagement in a Web-Based Intervention Platform Through Visualizing Log-Data , 2014, Journal of medical Internet research.

[55]  Toshi A Furukawa,et al.  Smartphone Cognitive Behavioral Therapy as an Adjunct to Pharmacotherapy for Refractory Depression: Randomized Controlled Trial , 2017, Journal of medical Internet research.

[56]  Zoubin Ghahramani,et al.  An Introduction to Hidden Markov Models and Bayesian Networks , 2001, Int. J. Pattern Recognit. Artif. Intell..

[57]  R. C. Silver,et al.  Mental- and Physical-Health Effects of Acute Exposure to Media Images of the September 11, 2001, Attacks and the Iraq War , 2013, Psychological science.

[58]  István Vajk,et al.  Frequent Pattern Mining in Web Log Data , 2006 .

[59]  Keqiu Li,et al.  Optimized big data K-means clustering using MapReduce , 2014, The Journal of Supercomputing.

[60]  Toshi A Furukawa,et al.  Cognitive and Behavioral Skills Exercises Completed by Patients with Major Depression During Smartphone Cognitive Behavioral Therapy: Secondary Analysis of a Randomized Controlled Trial , 2018, JMIR mental health.

[61]  Saskia M Kelders,et al.  Understanding the Usage of Content in a Mental Health Intervention for Depression: An Analysis of Log Data , 2014, Journal of medical Internet research.

[62]  Risto Vaarandi,et al.  Using Security Logs for Collecting and Reporting Technical Security Metrics , 2014, 2014 IEEE Military Communications Conference.

[63]  D. Mohr,et al.  Harnessing Context Sensing to Develop a Mobile Intervention for Depression , 2011, Journal of medical Internet research.

[64]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[65]  Saskia M Kelders,et al.  Participants, Usage, and Use Patterns of a Web-Based Intervention for the Prevention of Depression Within a Randomized Controlled Trial , 2013, Journal of medical Internet research.

[66]  Klara Nahrstedt,et al.  Security Concerns in Android mHealth Apps , 2014, AMIA.

[67]  S. Michie,et al.  What design features are used in effective e-health interventions? A review using techniques from Critical Interpretive Synthesis. , 2012, Telemedicine journal and e-health : the official journal of the American Telemedicine Association.

[68]  Bradley N. Miller,et al.  GroupLens: applying collaborative filtering to Usenet news , 1997, CACM.

[69]  Laura N. Harvey Intimate reflections: private diaries in qualitative research , 2011 .

[70]  Barbara Pierscionek,et al.  The Effect of the General Data Protection Regulation on Medical Research , 2017, Journal of medical Internet research.

[71]  P. Finglas,et al.  Comparing Diet and Exercise Monitoring Using Smartphone App and Paper Diary: A Two-Phase Intervention Study , 2018, JMIR mHealth and uHealth.

[72]  Yoichi Shinoda,et al.  Information filtering based on user behavior analysis and best match text retrieval , 1994, SIGIR '94.

[73]  D. Moskowitz,et al.  Ecological momentary assessment: what it is and why it is a method of the future in clinical psychopharmacology. , 2006, Journal of psychiatry & neuroscience : JPN.