{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:08:27Z","timestamp":1749182907381,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031939648","type":"print"},{"value":"9783031939655","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-93965-5_29","type":"book-chapter","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T14:53:53Z","timestamp":1749135233000},"page":"416-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Personalized Pomodoro Productivity Tracking with\u00a0Privacy-Preserving Machine Learning in\u00a0Human-Computer Interaction"],"prefix":"10.1007","author":[{"given":"Durjoy","family":"Mistry","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bidita Sarkar","family":"Diba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jayonto","family":"Dutta Plabon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salah Uddin","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. F.","family":"Mridha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"29_CR1","unstructured":"Pew Research Center: How Americans use social media at work, Pew Research Reports (2016). https:\/\/www.pewresearch.org\/internet\/2016\/06\/22\/social-media-and-the-workplace\/"},{"issue":"1","key":"29_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s43093-021-00112-6","volume":"8","author":"E Shokery","year":"2022","unstructured":"Shokery, E., Hamza, A.: The use of social media at the workplace and its influence on productivity in the era of Covid-19. Future Bus. J. 8(1), 1\u201312 (2022)","journal-title":"Future Bus. J."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"29_CR4","unstructured":"SCTCC: How social media affects student productivity, St. Cloud Technical & Community College Report (2020). https:\/\/sctcc.edu\/news\/10-20-2020\/how-social-media-affects-student-productivity"},{"key":"29_CR5","first-page":"666","volume":"58","author":"C Montag","year":"2016","unstructured":"Montag, C., Walla, P.: Carrying the internet in your pocket: insights from psychology and neurobiology for mobile use and stress. Comput. Hum. Behav. 58, 666\u2013672 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"29_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00592-x","volume":"2","author":"I Sarker","year":"2021","unstructured":"Sarker, I.: Machine learning: algorithms, real-world applications, and research directions. SN Comput. Sci. 2(3), 1\u201321 (2021)","journal-title":"SN Comput. Sci."},{"key":"29_CR7","unstructured":"HubStaff: Time tracking software for remote teams (2023). https:\/\/hubstaff.com\/"},{"key":"29_CR8","unstructured":"Teramind: Employee monitoring software (2023). https:\/\/www.teramind.co\/"},{"key":"29_CR9","unstructured":"DeskTime: Productivity and time tracking software (2023). https:\/\/desktime.com\/"},{"key":"29_CR10","unstructured":"Time Doctor Tracker: Time tracking and productivity software (2023). https:\/\/www.timedoctor.com\/"},{"key":"29_CR11","unstructured":"ActivTrak: Workforce analytics and productivity software (2023). https:\/\/www.activtrak.com\/"},{"key":"29_CR12","unstructured":"Cirillo, F.: The Pomodoro technique: the acclaimed time-management system that has transformed how we work, currency (2018)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, ACM, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"issue":"3\u20134","key":"29_CR14","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"140339","DOI":"10.1109\/ACCESS.2024.3448470","volume":"12","author":"D Mistry","year":"2024","unstructured":"Mistry, D., Plabon, J.D., Diba, B.S., Mukta, M., Mridha, M.F.: Federated learning-based architecture for personalized next emoji prediction for social media comments. IEEE Access 12, 140339\u2013140358 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3448470","journal-title":"IEEE Access"},{"key":"29_CR16","unstructured":"Microsoft Research Blog: Privacy-preserving machine learning: maintaining confidentiality and preserving trust (2021). https:\/\/www.microsoft.com\/en-us\/research\/blog\/privacy-preserving-machine-learning\/"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"29_CR18","first-page":"1","volume":"7","author":"R Zhu","year":"2023","unstructured":"Zhu, R., Shi, L., Song, Y., Cai, Z.: Integrating gaze and mouse via joint cross-attention fusion net for students\u2019 activity recognition in e-learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3), 1\u201335 (2023)","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"66110","DOI":"10.1109\/ACCESS.2024.3354981","volume":"12","author":"NM Alruwais","year":"2024","unstructured":"Alruwais, N.M., Zakariah, M.: Student recognition and activity monitoring in e-classes using deep learning in higher education. IEEE Access 12, 66110\u201366128 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3354981","journal-title":"IEEE Access"},{"issue":"3","key":"29_CR20","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1108\/07378831111174413","volume":"29","author":"B Imler","year":"2011","unstructured":"Imler, B., Eichelberger, M.: Using screen capture to study user research behavior. Libr. Hi Tech. 29(3), 446\u2013454 (2011)","journal-title":"Libr. Hi Tech."},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Krieter, P.,\u00a0Breiter, A.: Analyzing mobile application usage: Generating log files from mobile screen recordings. In: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, ACM, pp. 1\u201310 (2018)","DOI":"10.1145\/3229434.3229450"},{"key":"29_CR22","doi-asserted-by":"publisher","first-page":"79315","DOI":"10.1109\/ACCESS.2023.3299331","volume":"11","author":"D Mistry","year":"2023","unstructured":"Mistry, D., Mridha, M.F., Safran, M., Alfarhood, S., Saha, A.K., Che, D.: Privacy-preserving on-screen activity tracking and classification in e-learning using federated learning. IEEE Access 11, 79315\u201379329 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3299331","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-93965-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T14:54:00Z","timestamp":1749135240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-93965-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031939648","9783031939655"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-93965-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"6 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}