{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:55:34Z","timestamp":1772121334993,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T00:00:00Z","timestamp":1688688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A comprehensive understanding of collocated social interactions can help campuses and organizations better support their community. Universities could determine new ways to conduct classes and design programs by studying how students have collocated in the past. However, this needs data that describe large groups over a long period. Harnessing user devices to infer collocation, while tempting, is challenged by privacy concerns, power consumption, and maintenance issues. Alternatively, embedding new sensors across the entire campus is expensive. Instead, we investigate an easily accessible data source that can retroactively depict multiple users on campus over a semester, a managed WiFi network. Despite the coarse approximations of collocation provided by WiFi network logs, we demonstrate that leveraging such data can express meaningful outcomes of collocated social interaction. Since a known outcome of collocating with peers is improved performance, we inspected if automatically\u2013inferred collocation behaviors can indicate the individual performance of project group members on a campus. We studied 163 students (in 54 project groups) over 14 weeks. After describing how we determine collocation with the WiFi logs, we present a study to analyze how collocation within groups relates to a student\u2019s final score. We found that modeling collocation behaviors showed a significant correlation (<jats:italic>Pearson\u2019s<\/jats:italic><jats:inline-formula><jats:alternatives><jats:tex-math>$r =0.24$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>r<\/mml:mi>\n                  <mml:mo>=<\/mml:mo>\n                  <mml:mn>0.24<\/mml:mn>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>) with performance (better than models of peer feedback or individual behaviors). These findings emphasize that it is feasible and valuable to characterize collocated social interactions with archived WiFi network logs. We conclude the paper with a discussion of applications for repurposing WiFi logs to describe collocation, along with privacy considerations, and directions for future work.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-023-00398-2","type":"journal-article","created":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T13:01:46Z","timestamp":1688734906000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Leveraging WiFi network logs to infer student collocation and its relationship with academic performance"],"prefix":"10.1140","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6871-3523","authenticated-orcid":false,"given":"Vedant","family":"Das Swain","sequence":"first","affiliation":[]},{"given":"Hyeokhyen","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Sargolzaei","sequence":"additional","affiliation":[]},{"given":"Bahador","family":"Saket","sequence":"additional","affiliation":[]},{"given":"Mehrab","family":"Bin Morshed","sequence":"additional","affiliation":[]},{"given":"Kathy","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Devashru","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Yexin","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Philipose","sequence":"additional","affiliation":[]},{"given":"Yulai","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Pl\u00f6tz","sequence":"additional","affiliation":[]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[]},{"given":"Gregory D.","family":"Abowd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"key":"398_CR1","volume-title":"Social behavior: its elementary forms","author":"GC Homans","year":"1974","unstructured":"Homans GC (1974) Social behavior: its elementary forms"},{"issue":"1","key":"398_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MPRV.2011.82","volume":"11","author":"P Lukowicz","year":"2011","unstructured":"Lukowicz P, Pentland S, Ferscha A (2011) From context awareness to socially aware computing. IEEE Pervasive Comput 11(1):32\u201341","journal-title":"IEEE Pervasive Comput"},{"issue":"1","key":"398_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TSMCB.2008.2006638","volume":"39","author":"DO Olgu\u00b4\u0131n","year":"2008","unstructured":"Olgu\u00b4\u0131n DO, Waber BN, Kim T, Mohan A, Ara K, Pentland A (2008) Sensible organizations: technology and methodology for automatically measuring organizational behavior. IEEE Trans Syst Man Cybern, Part B, Cybern 39(1):43\u201355","journal-title":"IEEE Trans Syst Man Cybern, Part B, Cybern"},{"issue":"4","key":"398_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle N, Pentland AS (2006) Reality mining: sensing complex social systems. Pers Ubiquitous Comput 10(4):255\u2013268","journal-title":"Pers Ubiquitous Comput"},{"key":"398_CR5","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/2750858.2804251","volume-title":"Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing","author":"R Wang","year":"2015","unstructured":"Wang R, Harari G, Hao P, Zhou X, Campbell AT (2015) Smartgpa: how smartphones can assess and predict academic performance of college students. In: Proceedings of the 2015 ACM international joint conference on pervasive and ubiquitous computing, pp 295\u2013306"},{"issue":"12","key":"398_CR6","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TMC.2018.2886333","volume":"18","author":"S Das","year":"2018","unstructured":"Das S, Chatterjee S, Chakraborty S, Mitra B (2018) Groupsense: a lightweight framework for group identification. IEEE Trans Mob Comput 18(12):2856\u20132870","journal-title":"IEEE Trans Mob Comput"},{"key":"398_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/PerCom.2013.6526713","volume-title":"2013 IEEE international conference on pervasive computing and communications (PerCom)","author":"T Nguyen","year":"2013","unstructured":"Nguyen T, Phung D, Gupta S, Venkatesh S (2013) Extraction of latent patterns and contexts from social honest signals using hierarchical Dirichlet processes. In: 2013 IEEE international conference on pervasive computing and communications (PerCom). IEEE, Los Alamitos, pp 47\u201355"},{"issue":"11","key":"398_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1592761.1592778","volume":"52","author":"K Shilton","year":"2009","unstructured":"Shilton K (2009) Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. Commun ACM 52(11):48\u201353","journal-title":"Commun ACM"},{"key":"398_CR9","volume-title":"Proc. ACM hum.-comput. Interact (CSCW)","author":"V Das Swain","year":"2019","unstructured":"Das Swain V, Reddy MD, Nies KA, Tay L, De Choudhury M, Abowd GD (2019) Birds of a feather clock together: a study of person\u2013organization fit through latent activity routines. In: Proc. ACM hum.-comput. Interact (CSCW)"},{"key":"398_CR10","first-page":"94","volume-title":"Proceedings of the 13th international conference on mobile and ubiquitous systems: computing, networking and services","author":"H Hong","year":"2016","unstructured":"Hong H, Luo C, Chan MC (2016) Socialprobe: understanding social interaction through passive wifi monitoring. In: Proceedings of the 13th international conference on mobile and ubiquitous systems: computing, networking and services, pp 94\u2013103"},{"key":"398_CR11","first-page":"1","volume-title":"IEEE INFOCOM 2016-the 35th annual IEEE international conference on computer communications","author":"J Shi","year":"2016","unstructured":"Shi J, Meng L, Striegel A, Qiao C, Koutsonikolas D, Challen G (2016) A walk on the client side: monitoring enterprise wifi networks using smartphone channel scans. In: IEEE INFOCOM 2016-the 35th annual IEEE international conference on computer communications. IEEE, Los Alamitos, pp 1\u20139"},{"issue":"4","key":"398_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3287073","volume":"2","author":"S Ware","year":"2018","unstructured":"Ware S, Yue C, Morillo R, Lu J, Shang C, Kamath J, Bamis A, Bi J, Russell A, Wang B (2018) Large-scale automatic depression screening using meta-data from wifi infrastructure. Proc ACM Interact Mob Wearable Ubiquitous Technol 2(4):1\u201327","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"398_CR13","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/BDCAT.2018.00029","volume-title":"2018 IEEE\/ACM 5th international conference on big data computing applications and technologies (BDCAT)","author":"MHS Eldaw","year":"2018","unstructured":"Eldaw MHS, Levene M, Roussos G (2018) Presence analytics: making sense of human social presence within a learning environment. In: 2018 IEEE\/ACM 5th international conference on big data computing applications and technologies (BDCAT). IEEE, Los Alamitos, pp 174\u2013183"},{"issue":"3","key":"398_CR14","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1111\/j.1744-6570.1987.tb00614.x","volume":"40","author":"SW Kozlowski","year":"1987","unstructured":"Kozlowski SW, Hults BM (1987) An exploration of climates for technical updating and performance. Pers Psychol 40(3):539\u2013563","journal-title":"Pers Psychol"},{"issue":"4","key":"398_CR15","doi-asserted-by":"publisher","first-page":"685","DOI":"10.2307\/3094828","volume":"46","author":"AC Edmondson","year":"2001","unstructured":"Edmondson AC, Bohmer RM, Pisano GP (2001) Disrupted routines: team learning and new technology implementation in hospitals. Adm Sci Q 46(4):685\u2013716","journal-title":"Adm Sci Q"},{"issue":"2","key":"398_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00146-009-0254-x","volume":"25","author":"R Fruchter","year":"2010","unstructured":"Fruchter R, Bosch-Sijtsema P, Ruohom\u00a8aki V (2010) Tension between perceived collocation and actual geographic distribution in project teams. AI Soc 25(2):183\u2013192","journal-title":"AI Soc"},{"issue":"2\u20133","key":"398_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1207\/S15327051HCI1523_4","volume":"15","author":"GM Olson","year":"2000","unstructured":"Olson GM, Olson JS (2000) Distance matters. Hum-Comput Interact 15(2\u20133):139\u2013178","journal-title":"Hum-Comput Interact"},{"issue":"5","key":"398_CR18","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1177\/1046496406292337","volume":"37","author":"S Geister","year":"2006","unstructured":"Geister S, Konradt U, Hertel G (2006) Effects of process feedback on motivation, satisfaction, and performance in virtual teams. Small Group Res 37(5):459\u2013489","journal-title":"Small Group Res"},{"key":"398_CR19","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1145\/1054972.1055017","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"G Mark","year":"2005","unstructured":"Mark G, Gonzalez VM, Harris J (2005) No task left behind? Examining the nature of fragmented work. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 321\u2013330"},{"issue":"3","key":"398_CR20","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1521\/jscp.1997.16.3.323","volume":"16","author":"JF Finch","year":"1997","unstructured":"Finch JF, Barrera M Jr, Okun MA, Bryant WH, Pool GJ, Snow-Turek AL (1997) The factor structure of received social support: dimensionality and the prediction of depression and life satisfaction. J Soc Clin Psychol 16(3):323\u2013342","journal-title":"J Soc Clin Psychol"},{"issue":"1","key":"398_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2224\/sbp.1990.18.1.41","volume":"18","author":"GG Ford","year":"1990","unstructured":"Ford GG, Procidano ME (1990) The relationship of self-actualization to social support, life stress, and adjustment. Soc Behav Pers Int J 18(1):41\u201351","journal-title":"Soc Behav Pers Int J"},{"key":"398_CR22","first-page":"333","volume-title":"Team effectiveness and decision making in organizations","author":"J Cannon-Bowers","year":"1995","unstructured":"Cannon-Bowers J, Tannenbaum S (1995) Defining team competencies and establishing team training requirements. In: Guzzo R, Salas E (eds) Team effectiveness and decision making in organizations. Jossey-Bass, San Francisco, pp 333\u2013380"},{"issue":"2","key":"398_CR23","doi-asserted-by":"publisher","first-page":"316","DOI":"10.2307\/3069458","volume":"44","author":"RT Sparrowe","year":"2001","unstructured":"Sparrowe RT, Liden RC, Wayne SJ, Kraimer ML (2001) Social networks and the performance of individuals and groups. Acad Manag J 44(2):316\u2013325","journal-title":"Acad Manag J"},{"key":"398_CR24","volume-title":"Understanding conflict and war: vol. 2: the conflict helix","author":"RJ Rummel","year":"1976","unstructured":"Rummel RJ (1976) Understanding conflict and war: vol. 2: the conflict helix. Sage, Beverly Hills"},{"issue":"3","key":"398_CR25","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1111\/j.1529-1006.2006.00030.x","volume":"7","author":"SW Kozlowski","year":"2006","unstructured":"Kozlowski SW, Ilgen DR (2006) Enhancing the effectiveness of work groups and teams. Psychol Sci Public Interest 7(3):77\u2013124","journal-title":"Psychol Sci Public Interest"},{"issue":"6","key":"398_CR26","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1287\/orsc.14.6.615.24872","volume":"14","author":"PJ Hinds","year":"2003","unstructured":"Hinds PJ, Bailey DE (2003) Out of sight, out of sync: understanding conflict in distributed teams. Organ Sci 14(6):615\u2013632","journal-title":"Organ Sci"},{"issue":"3","key":"398_CR27","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1287\/orsc.12.3.346.10098","volume":"12","author":"CD Cramton","year":"2001","unstructured":"Cramton CD (2001) The mutual knowledge problem and its consequences for dispersed collaboration. Organ Sci 12(3):346\u2013371","journal-title":"Organ Sci"},{"key":"398_CR28","first-page":"1118","volume-title":"Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing","author":"EH Trainer","year":"2016","unstructured":"Trainer EH, Kalyanasundaram A, Chaihirunkarn C, Herbsleb JD (2016) How to hackathon: socio-technical tradeoffs in brief, intensive collocation. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing, pp 1118\u20131130"},{"issue":"4","key":"398_CR29","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1177\/0193841X9001400403","volume":"14","author":"LS Aiken","year":"1990","unstructured":"Aiken LS, West SG (1990) Invalidity of true experiments: self-report pretest biases. Eval Rev 14(4):374\u2013390","journal-title":"Eval Rev"},{"issue":"4","key":"398_CR30","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1007\/s11135-011-9640-9","volume":"47","author":"I Krumpal","year":"2013","unstructured":"Krumpal I (2013) Determinants of social desirability bias in sensitive surveys: a literature review. Qual Quant 47(4):2025\u20132047","journal-title":"Qual Quant"},{"issue":"4","key":"398_CR31","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1177\/0003122416650963","volume":"81","author":"T Schr\u00f6der","year":"2016","unstructured":"Schr\u00f6der T, Hoey J, Rogers KB (2016) Modeling dynamic identities and uncertainty in social interactions: Bayesian affect control theory. Am Sociol Rev 81(4):828\u2013855","journal-title":"Am Sociol Rev"},{"issue":"3","key":"398_CR32","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MCOM.2015.7060497","volume":"53","author":"C Yang","year":"2015","unstructured":"Yang C, Shao H-R (2015) Wifi-based indoor positioning. IEEE Commun Mag 53(3):150\u2013157","journal-title":"IEEE Commun Mag"},{"key":"398_CR33","unstructured":"Cisco C (2014) https:\/\/www.cisco.com\/en\/US\/docs\/solutions\/Enterprise\/Mobility\/emob30dg\/Locatn.html. Accessed: 2023-07-05"},{"key":"398_CR34","unstructured":"Accuware AW (2016) https:\/\/www.accuware.com\/support\/wi-fi-location-monitor-accuracy\/. Accessed: 2020-05-10"},{"key":"398_CR35","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.enbuild.2011.12.037","volume":"47","author":"C Martani","year":"2012","unstructured":"Martani C, Lee D, Robinson P, Britter R, Ratti C (2012) Enernet: studying the dynamic relationship between building occupancy and energy consumption. Energy Build 47:584\u2013591","journal-title":"Energy Build"},{"key":"398_CR36","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/SmartCity.2015.85","volume-title":"2015 IEEE international conference on smart city\/SocialCom\/SustainCom (SmartCity)","author":"S Jiang","year":"2015","unstructured":"Jiang S, Zhu X, Huang J, Shou G (2015) Mining social groups in campus based on wireless detection. In: 2015 IEEE international conference on smart city\/SocialCom\/SustainCom (SmartCity). IEEE, Los Alamitos, pp 285\u2013288"},{"issue":"7","key":"398_CR37","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1080\/09613218.2018.1378498","volume":"46","author":"Y Wang","year":"2018","unstructured":"Wang Y, Shao L (2018) Understanding occupancy and user behaviour through wi-fi-based indoor positioning. Build Res Inf 46(7):725\u2013737","journal-title":"Build Res Inf"},{"key":"398_CR38","first-page":"1","volume-title":"Proceedings of the ACM on human-computer interaction 3(CSCW)","author":"C Zakaria","year":"2019","unstructured":"Zakaria C, Balan R, Lee Y (2019) Stressmon: scalable detection of perceived stress and depression using passive sensing of changes in work routines and group interactions. In: Proceedings of the ACM on human-computer interaction 3(CSCW), pp 1\u201329"},{"issue":"1","key":"398_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep05277","volume":"4","author":"Y-A De Montjoye","year":"2014","unstructured":"De Montjoye Y-A, Stopczynski A, Shmueli E, Pentland A, Lehmann S (2014) The strength of the strongest ties in collaborative problem solving. Sci Rep 4(1):1\u20136","journal-title":"Sci Rep"},{"key":"398_CR40","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/2307863.2307869","volume-title":"Proceedings of the 1st ACM workshop on mobile systems for computational social science","author":"MB Kjaergaard","year":"2012","unstructured":"Kjaergaard MB, Nurmi P (2012) Challenges for social sensing using wifi signals. In: Proceedings of the 1st ACM workshop on mobile systems for computational social science, pp 17\u201321"},{"issue":"2","key":"398_CR41","doi-asserted-by":"publisher","first-page":"238","DOI":"10.2307\/3069453","volume":"44","author":"KA Jehn","year":"2001","unstructured":"Jehn KA, Mannix EA (2001) The dynamic nature of conflict: a longitudinal study of intragroup conflict and group performance. Acad Manag J 44(2):238\u2013251","journal-title":"Acad Manag J"},{"issue":"5","key":"398_CR42","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.5.1300","volume":"74","author":"PJ Carnevale","year":"1998","unstructured":"Carnevale PJ, Probst TM (1998) Social values and social conflict in creative problem solving and categorization. J Pers Soc Psychol 74(5):1300","journal-title":"J Pers Soc Psychol"},{"issue":"2","key":"398_CR43","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.2.193","volume":"103","author":"SE Taylor","year":"1988","unstructured":"Taylor SE, Brown JD (1988) Illusion and well-being: a social psychological perspective on mental health. Psychol Bull 103(2):193","journal-title":"Psychol Bull"},{"issue":"1","key":"398_CR44","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1111\/j.1744-6570.2001.tb00085.x","volume":"54","author":"GS Van der Vegt","year":"2001","unstructured":"Van der Vegt GS, Emans BJ, Van De Vliert E (2001) Patterns of interdependence in work teams: a two-level investigation of the relations with job and team satisfaction. Pers Psychol 54(1):51\u201369","journal-title":"Pers Psychol"},{"issue":"5","key":"398_CR45","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1002\/job.1834","volume":"34","author":"JY Jiang","year":"2013","unstructured":"Jiang JY, Zhang X, Tjosvold D (2013) Emotion regulation as a boundary condition of the relationship between team conflict and performance: a multi-level examination. J Organ Behav 34(5):714\u2013734","journal-title":"J Organ Behav"},{"issue":"2","key":"398_CR46","doi-asserted-by":"publisher","first-page":"350","DOI":"10.2307\/2666999","volume":"44","author":"A Edmondson","year":"1999","unstructured":"Edmondson A (1999) Psychological safety and learning behavior in work teams. Adm Sci Q 44(2):350\u2013383","journal-title":"Adm Sci Q"},{"issue":"3","key":"398_CR47","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1177\/0013164406292085","volume":"67","author":"ML Loughry","year":"2007","unstructured":"Loughry ML, Ohland MW, DeWayne Moore D (2007) Development of a theory-based assessment of team member effectiveness. Educ Psychol Meas 67(3):505\u2013524","journal-title":"Educ Psychol Meas"},{"issue":"4","key":"398_CR48","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF01619355","volume":"7","author":"SM Pincus","year":"1991","unstructured":"Pincus SM, Gladstone IM, Ehrenkranz RA (1991) A regularity statistic for medical data analysis. J Clin Monit Comput 7(4):335\u2013345","journal-title":"J Clin Monit Comput"},{"key":"398_CR49","volume-title":"Linear regression analysis","author":"GA Seber","year":"2012","unstructured":"Seber GA, Lee AJ (2012) Linear regression analysis, vol 329. Wiley, New York"},{"issue":"3","key":"398_CR50","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/21.97458","volume":"21","author":"SR Safavian","year":"1991","unstructured":"Safavian SR, Landgrebe D (1991) A survey of decision tree classifier methodology. IEEE Trans Syst Man Cybern 21(3):660\u2013674","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"5","key":"398_CR51","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 29(5):1189\u20131232","journal-title":"Ann Stat"},{"issue":"4","key":"398_CR52","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1016\/j.csda.2010.11.018","volume":"55","author":"A Airola","year":"2011","unstructured":"Airola A, Pahikkala T, Waegeman W, De Baets B, Salakoski T (2011) An experimental comparison of cross-validation techniques for estimating the area under the roc curve. Comput Stat Data Anal 55(4):1828\u20131844","journal-title":"Comput Stat Data Anal"},{"key":"398_CR53","volume-title":"Advanced engineering mathematics","author":"E Kreyszig","year":"2010","unstructured":"Kreyszig E (2010) Advanced engineering mathematics. Wiley, New York"},{"issue":"6","key":"398_CR54","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138","volume":"69","author":"A Kraskov","year":"2004","unstructured":"Kraskov A, St\u00f6gbauer H, Grassberger P (2004) Estimating mutual information. Phys Rev E 69(6):066138","journal-title":"Phys Rev E"},{"issue":"3","key":"398_CR55","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.5194\/gmd-7-1247-2014","volume":"7","author":"T Chai","year":"2014","unstructured":"Chai T, Draxler RR (2014) Root mean square error (rmse) or mean absolute error (mae)?\u2013arguments against avoiding rmse in the literature. Geosci Model Dev 7(3):1247\u20131250","journal-title":"Geosci Model Dev"},{"issue":"10","key":"398_CR56","doi-asserted-by":"publisher","DOI":"10.1037\/h0048216","volume":"12","author":"M Nefzger","year":"1957","unstructured":"Nefzger M, Drasgow J (1957) The needless assumption of normality in Pearson\u2019s r. Am Psychol 12(10):623","journal-title":"Am Psychol"},{"issue":"4","key":"398_CR57","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.12.4.399","volume":"12","author":"GY Zou","year":"2007","unstructured":"Zou GY (2007) Toward using confidence intervals to compare correlations. Psychol Methods 12(4):399","journal-title":"Psychol Methods"},{"issue":"3","key":"398_CR58","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/ejsp.2752","volume":"51","author":"A Lovakov","year":"2021","unstructured":"Lovakov A, Agadullina ER (2021) Empirically derived guidelines for effect size interpretation in social psychology. Eur J Soc Psychol 51(3):485\u2013504","journal-title":"Eur J Soc Psychol"},{"issue":"2","key":"398_CR59","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1177\/2515245919847202","volume":"2","author":"DC Funder","year":"2019","unstructured":"Funder DC, Ozer DJ (2019) Evaluating effect size in psychological research: sense and nonsense. Adv Methods Pract Psychol Sci 2(2):156\u2013168","journal-title":"Adv Methods Pract Psychol Sci"},{"issue":"11","key":"398_CR60","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0187078","volume":"12","author":"V Kassarnig","year":"2017","unstructured":"Kassarnig V, Bjerre-Nielsen A, Mones E, Lehmann S, Lassen DD (2017) Class attendance, peer similarity, and academic performance in a large field study. PLoS ONE 12(11):0187078","journal-title":"PLoS ONE"},{"issue":"3","key":"398_CR61","doi-asserted-by":"publisher","first-page":"530","DOI":"10.2307\/2393737","volume":"42","author":"KA Jehn","year":"1997","unstructured":"Jehn KA (1997) A qualitative analysis of conflict types and dimensions in organizational groups. Adm Sci Q 42(3):530\u2013557","journal-title":"Adm Sci Q"},{"issue":"9","key":"398_CR62","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.1002\/smj.3032","volume":"40","author":"S Hasan","year":"2019","unstructured":"Hasan S, Koning R (2019) Prior ties and the limits of peer effects on startup team performance. Strateg Manag J 40(9):1394\u20131416","journal-title":"Strateg Manag J"},{"key":"398_CR63","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.adolescence.2017.09.007","volume":"61","author":"R Prakash","year":"2017","unstructured":"Prakash R, Beattie T, Javalkar P, Bhattacharjee P, Ramanaik S, Thalinja R, Murthy S, Davey C, Blanchard J, Watts C et al. (2017) Correlates of school dropout and absenteeism among adolescent girls from marginalized community in North Karnataka, South India. J Adolesc 61:64\u201376","journal-title":"J Adolesc"},{"issue":"7","key":"398_CR64","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1038\/npp.2016.7","volume":"41","author":"J-P Onnela","year":"2016","unstructured":"Onnela J-P, Rauch SL (2016) Harnessing smartphone-based digital phenotyping to enhance behavioral and mental health. Neuropsychopharmacology 41(7):1691\u20131696","journal-title":"Neuropsychopharmacology"},{"key":"398_CR65","first-page":"1","volume-title":"Proceedings of the 2019 CHI conference on human factors in computing systems","author":"J Rooksby","year":"2019","unstructured":"Rooksby J, Morrison A, Murray-Rust D (2019) Student perspectives on digital phenotyping: the acceptability of using smartphone data to assess mental health. In: Proceedings of the 2019 CHI conference on human factors in computing systems, pp 1\u201314"},{"issue":"3\u20134","key":"398_CR66","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al. (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"key":"398_CR67","unstructured":"Hubaux P (2020) Decentralized privacy-preserving proximity tracing. PhD thesis, Fraunhofer HHI"},{"key":"398_CR68","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/3338498.3358642","volume-title":"Proceedings of the 18th ACM workshop on privacy in the electronic society","author":"E Bagdasaryan","year":"2019","unstructured":"Bagdasaryan E, Berlstein G, Waterman J, Birrell E, Foster N, Schneider FB, Estrin D (2019) Ancile: enhancing privacy for ubiquitous computing with use-based privacy. In: Proceedings of the 18th ACM workshop on privacy in the electronic society, pp 111\u2013124"},{"key":"398_CR69","first-page":"95","volume-title":"Ubiquitous computing","author":"M Langheinrich","year":"2009","unstructured":"Langheinrich M (2009) Privacy in ubiquitous computing. In: Ubiquitous computing. CRC Press, Boca Raton, pp 95\u2013160"},{"key":"398_CR70","first-page":"1","volume-title":"2009 IEEE international symposium on technology and society","author":"JL Wang","year":"2009","unstructured":"Wang JL, Loui MC (2009) Privacy and ethical issues in location-based tracking systems. In: 2009 IEEE international symposium on technology and society. IEEE, Los Alamitos, pp 1\u20134"},{"key":"398_CR71","volume-title":"Der wert des privaten","author":"B R\u00f6ssler","year":"2001","unstructured":"R\u00f6ssler B et al. (2001) Der wert des privaten. Suhrkamp, Frankfurt am Main"},{"issue":"6","key":"398_CR72","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1038\/s42256-020-0194-1","volume":"2","author":"Y Sweeney","year":"2020","unstructured":"Sweeney Y (2020) Tracking the debate on Covid-19 surveillance tools. Nat Mach Intell 2(6):301\u2013304","journal-title":"Nat Mach Intell"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-023-00398-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-023-00398-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-023-00398-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,7]],"date-time":"2023-07-07T14:03:04Z","timestamp":1688738584000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-023-00398-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,7]]},"references-count":72,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["398"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-023-00398-2","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,7]]},"assertion":[{"value":"14 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"22"}}