Handheld Usage Data Mining for Handheld Data Protection

  • Wen-Chen Hu University of North Dakota
  • Naima Kaabouch University of North Dakota
  • Lei Chen Sam Houston State University
  • Hung-Jen Yang National Kaohsiung Normal University


Mobile handheld devices such as smart cellular phones are easily lost or stolen because of their small sizes and high mobility. Personal data such as addresses and messages stored in the devices may be revealed when the devices are lost. Handheld devices must include rigorous and convenient handheld data protection in case the devices are lost or stolen. This research proposes a novel approach for handheld data protection by using handheld usage data mining, which consists of five steps: (i) usage data gathering, (ii) usage data preparation, (iii) usage pattern discovery, (iv) usage pattern analysis and visualization, and (v) usage pattern applications. Handheld usage data is collected before applying this method. Usage patterns are discovered and saved by using finite automaton, which is then used to check device usage. When an unusual usage pattern such as an unlawful user trying to access the handheld data is detected, the device will automatically lock itself down until an action, such as entering a password, is taken. Experimental results show this method is effective and convenient for handheld data protection. Keywords: Handheld Security, Mobile Handheld Devices, Smartphones, Data Mining, Usage Mining, Usage Pattern Discovery, and Identification To cite this document: Wen-Chen Hu, Naima Kaabouch, Lei Chen, and Hung-Jen Yang, "Handheld Usage Data Mining for Handheld Data Protection", Contemporary Management Research, Vol. 9, No. 2, pp.93-108, 2013. Permanent link to this document http://dx.doi.org/10.7903/cmr.3845