[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2556288.2557398acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

KnowMe and ShareMe: understanding automatically discovered personality traits from social media and user sharing preferences

Published: 26 April 2014 Publication History

Abstract

There is much recent work on using the digital footprints left by people on social media to predict personal traits and gain a deeper understanding of individuals. Due to the veracity of social media, imperfections in prediction algorithms, and the sensitive nature of one's personal traits, much research is still needed to better understand the effectiveness of this line of work, including users' preferences of sharing their computationally derived traits. In this paper, we report a two- part study involving 256 participants, which (1) examines the feasibility and effectiveness of automatically deriving three types of personality traits from Twitter, including Big 5 personality, basic human values, and fundamental needs, and (2) investigates users' opinions of using and sharing these traits. Our findings show there is a potential feasibility of automatically deriving one's personality traits from social media with various factors impacting the accuracy of models. The results also indicate over 61.5% users are willing to share their derived traits in the workplace and that a number of factors significantly influence their sharing preferences. Since our findings demonstrate the feasibility of automatically inferring a user's personal traits from social media, we discuss their implications for designing a new generation of privacy-preserving, hyper-personalized systems.

References

[1]
Agarwal, R., Ahuja, M., Carter, P., and Gans, M. Early and late adopters of IT innovations: extensions to innovation diffusion theory. In Proc. DIGIT '98 (1998), 1--18.
[2]
Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '12, ACM (New York, NY, USA, 2012), 367376.
[3]
Barrick, M. R., and Mount, M. K. The big five personality dimensions and job performance: a metaanalysis. Personnel psychology 44, 1 (1991), 1--26.
[4]
Bellotti, V., and Sellen, A. Design for privacy in ubiquitous computing environments. In Proc. ECSCW '93 (1993), 77--92.
[5]
BOND, M. H. Localizing the imperial outreach the big five and more in chinese culture. American Behavioral Scientist 44, 1 (2000), 63--72.
[6]
Chen, J., Hsieh, G., Mahmud, J., and Nichols, J. Understanding individuals personal values from social media word use. In To appear in CSCW '2014 (2014).
[7]
Cohen, J. Statistical power analysis for the behavioral sciencies. Routledge, 1988.
[8]
De Choudhury, M., Counts, S., and Horvitz, E. Predicting postpartum changes in emotion and behavior via social media. In Proc. CHI'2013 (2013), 3267--3276.
[9]
De Raad, B., Perugini, M., Hrebckov, M., and Szarota, P. Lingua franca of personality taxonomies and structures based on the psycholexical approach. Journal of Cross-Cultural Psychology 29, 1 (1998), 212--232.
[10]
Eriksson, E., Artman, H., and Swartling, A. The secret life of a persona. In Proc. CHI'2013 (2013), 2677--2686.
[11]
Ford, J. K. Brands Laid Bare. John Wiley & Sons, 2005.
[12]
Funder, D. C. The personality puzzle. WW Norton & Co, 1997.
[13]
Golbeck, J., Robles, C., Edmondson, M., and Turner, K. Predicting personality from twitter. In Proc. SocialCom'2011 (2011), 149--156.
[14]
Golbeck, J., Robles, C., and Turner, K. Predicting personality with social media. In CHI'11 Extended Abstracts (2011), 253--262.
[15]
Goldberg, L. R. The development of markers for the big--ve factor structure. Psychological Assessment 4, 1 (1992), 26.
[16]
Hu, M., Yang, H., Zhou, M., Gou, L., Li, Y., and Haber, E. OpinionBlocks: a crowd-powered, self-improving interactive visual analytic system for understanding opinion text. In Proc. INTERACT '2013 (2013), 116--134.
[17]
Iachello, G., and Hong, J. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction 1, 1 (2007), 1--137.
[18]
Junglas, I. A., Johnson, N. A., and Spitzmller, C. Personality traits and concern for privacy: an empirical study in the context of location-based services. Euro. J. of Info. Sys. 17, 4 (2008), 387--402.
[19]
Knijnenburg, B., Kobsa, A., and Jin, H. Preference-based location sharing: are more privacy options really better? In Proc. CHI '2013 (New York, NY, USA, 2013), 2667--2676.
[20]
Korzaan, M., Brooks, N., and Greer, T. Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business 1 (2009), 1--17.
[21]
Mahmud, J., Zhou, M., Megiddo, N., Nichols, J., and Drews, C. Recommending targeted strangers from whom to solicit information on social media. In Proc. IUI '2013 (2013), 37--48.
[22]
Mairesse, F., Walker, M. A., Mehl, M. R., and Moore, R. K. Using linguistic cues for the automatic recognition of personality in conversation and text. J. Artif. Intell. Res.(JAIR) 30 (2007), 457--500.
[23]
Maslow, A., Frager, R., and Fadiman, J. Motivation and personality, vol. 2. Harper & Row New York, 1970.
[24]
Nissenbaum, H. Privacy in context: Technology, policy, and the integrity of social life. Stanford Uni. Press, 2009.
[25]
Olson, J., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. In Proc. CHI '2005 EA, ACM (2005), 1985--1988.
[26]
P&AB, C. P. A. A major shift since 2000 and why. Privacy & American Business Newsletter 10, 6 (2003).
[27]
Pennacchiotti, M., and Popescu, A.-M. A machine learning approach to twitter user classification. In ICWSM (2011).
[28]
Robert, P., and Escoufier, Y. A unifying tool for linear multivariate statistical methods: The RV- coefflcient. Applied Statistics 25, 3 (1976), 257.
[29]
Schwartz, S. H. Basic human values: Theory, measurement, and applications. Revue francaise de sociologie, 2006.
[30]
Shen, J., Brdiczka, O., and Liu, J. Understanding email writers: Personality prediction from email messages. In Proc. UMAP '2013. Springer, 2013, 318--330.
[31]
Shi, P., Xu, H., and Chen, Y. Using contextual integrity to examine interpersonal information boundary on social network sites. In Proc. CHI' 2013 (2013), 35--38.
[32]
Smith, H. J., Dinev, T., and Xu, H. Information privacy research: An interdisciplinary review. MIS quarterly 35, 4 (2011), 989--1016.
[33]
Smith, H. J., and Milberg, S. J. Information privacy: measuring individuals' concerns about organizational practices. MIS Q. 20, 2 (June 1996), 167--196.
[34]
Tausczik, Y. R., and Pennebaker, J. W. The psychological meaning of words: LIWC and computerized text analysis methods. Journal of Language and Social Psychology 29, 1 (2010), 24--54.
[35]
Triandis, H. C., and Suh, E. M. Cultural influences on personality. Annual review of psychology 53, 1 (2002), 133--160.
[36]
Xu, H., Dinev, T., Smith, J., and Hart, P. Information privacy concerns: linking individual perceptions with institutional privacy assurances. Journal of the Association for Information Systems 12, 12 (2011), 1.
[37]
Xu, H., Teo, H.-H., Tan, B. C., and Agarwal, R. The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems 26, 3 (2009), 135--174.
[38]
Yang, H., and Li, Y. Identifying user needs from social media. IBM Tech. Report (2013).
[39]
Yarkoni, T. Personality in 100,000 words: A large-scale analysis of personality and word use among bloggers. J. research in personality 44, 3 (2010), 363--373.

Cited By

View all
  • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
  • (2023)Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint Bayesian LearningACM Transactions on Management Information Systems10.1145/360787514:3(1-20)Online publication date: 12-Sep-2023
  • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
  • Show More Cited By

Index Terms

  1. KnowMe and ShareMe: understanding automatically discovered personality traits from social media and user sharing preferences

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2014
      4206 pages
      ISBN:9781450324731
      DOI:10.1145/2556288
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 26 April 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. basic values
      2. big 5 personality
      3. fundamental needs
      4. personality traits
      5. privacy
      6. social media

      Qualifiers

      • Research-article

      Conference

      CHI '14
      Sponsor:
      CHI '14: CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2014
      Ontario, Toronto, Canada

      Acceptance Rates

      CHI '14 Paper Acceptance Rate 465 of 2,043 submissions, 23%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)71
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
      • (2023)Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint Bayesian LearningACM Transactions on Management Information Systems10.1145/360787514:3(1-20)Online publication date: 12-Sep-2023
      • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
      • (2023)The role of the big geographic sort in online news circulation among U.S. Reddit usersScientific Reports10.1038/s41598-023-33247-313:1Online publication date: 25-Apr-2023
      • (2023)Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing modelInformation & Management10.1016/j.im.2023.10385860:7(103858)Online publication date: Nov-2023
      • (2022)Developing insights from the collective voice of target users in TwitterJournal of Big Data10.1186/s40537-022-00611-59:1Online publication date: 2-Jun-2022
      • (2022)What Users Want From Cloud Deletion and the Information They Need: A Participatory Action StudyACM Transactions on Privacy and Security10.1145/354657826:1(1-34)Online publication date: 7-Nov-2022
      • (2022)Reading Personality Preferences From Motion Patterns in Computer Mouse OperationsIEEE Transactions on Affective Computing10.1109/TAFFC.2020.302329613:3(1619-1636)Online publication date: 1-Jul-2022
      • (2022)Deep Learning-Based User Privacy Settings Recommendation in Online Social Networks2022 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN55064.2022.9892734(1-9)Online publication date: 18-Jul-2022
      • (2022)Mapping HCI research methods for studying social media interactionComputers in Human Behavior10.1016/j.chb.2021.107131129:COnline publication date: 1-Apr-2022
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media