Measuring Personality for Automatic Elicitation of Privacy Preferences

The increasing complexity and ubiquity in user connectivity, computing environments, information content, and software, mobile, and web applications transfers the responsibility of privacy management to the individuals. Hence, making it extremely difficult for users to maintain the intelligent and targeted level of privacy protection that they need and desire, while simultaneously maintaining their ability to optimally function. Thus, there is a critical need to develop intelligent, automated, and adaptable privacy management systems that can assist users in managing and protecting their sensitive data in the increasingly complex situations and environments that they find themselves in. This work is a first step in exploring the development of such a system, specifically how user personality traits and other characteristics can be used to help automate determination of user sharing preferences for a variety of user data and situations. The Big-Five personality traits of openness, conscientiousness, extroversion, agreeableness, and neuroticism are examined and used as inputs into several popular machine learning algorithms in order to assess their ability to elicit and predict user privacy preferences. Our results show that the Big-Five personality traits can be used to significantly improve the prediction of user privacy preferences in a number of contexts and situations, and so using machine learning approaches to automate the setting of user privacy preferences has the potential to greatly reduce the burden on users while simultaneously improving the accuracy of their privacy preferences and security.

[1]  J. Hunter Culture Wars: The Struggle To Define America , 1991 .

[2]  Kevin Murphy,et al.  Active Learning of Causal Bayes Net Structure , 2006 .

[3]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[4]  O. John,et al.  Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German , 2007 .

[5]  Anita Sharma,et al.  Personality and Patterns of Facebook Usage , 2016 .

[6]  P. Vernon,et al.  Heritability of the big five personality dimensions and their facets: a twin study. , 1996, Journal of personality.

[7]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[8]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[9]  Jonathan Grudin,et al.  Toward Understanding Preferences for Sharing and Privacy , 2004 .

[10]  Antonio Terracciano,et al.  Personality trait development from age 12 to age 18: longitudinal, cross-sectional, and cross-cultural analyses. , 2002, Journal of personality and social psychology.

[11]  Andreas Christmann,et al.  Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.

[12]  Sara B. Kiesler,et al.  Mental models of robotic assistants , 2002, CHI Extended Abstracts.

[13]  G. Āllport,et al.  Trait-names: A psycho-lexical study. , 1936 .

[14]  H. E. P. Cattell,et al.  The original big five : A historical perspective , 1996 .

[15]  Gustavo S. Mesch Is online trust and trust in social institutions associated with online disclosure of identifiable information online? , 2012, Comput. Hum. Behav..

[16]  Oliver Günther,et al.  Self-disclosure and Privacy Calculus on Social Networking Sites: The Role of Culture , 2012, WI 2012.

[17]  R. McCrae,et al.  Personality profiles of cultures: aggregate personality traits. , 2005, Journal of personality and social psychology.

[18]  G. W. Allport,et al.  Trait-Names: A Psycho-lexical Study. No. 211. , 1936 .

[19]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[20]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[21]  Sandra Petronio,et al.  Communication Privacy Management Theory , 2015, Engaging Theories in Interpersonal Communication.

[22]  Florian Schaub Dynamic privacy adaptation in ubiquitous computing , 2014 .

[23]  Allison Woodruff,et al.  Would a Privacy Fundamentalist Sell Their DNA for $1000 ... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences , 2014, SOUPS.

[24]  Jonathan Grudin,et al.  A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.

[25]  Dennis R. Wixon,et al.  CHI '02 Extended Abstracts on Human Factors in Computing Systems , 2002, CHI 2002.

[26]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[27]  R. McCrae,et al.  The Geographic Distribution of Big Five Personality Traits , 2007 .

[28]  E. Thompson Development and validation of an international English big-five Mini-Markers , 2008 .

[29]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[30]  Y. Laouris,et al.  Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook ™ profiles as an example , 2010 .

[31]  P. Costa,et al.  Normal Personality Assessment in Clinical Practice: The NEO Personality Inventory. , 1992 .

[32]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[33]  D. Nettle The evolution of personality variation in humans and other animals. , 2006, The American psychologist.

[34]  Lorna M. Lopez,et al.  Meta-analysis of genome-wide association studies for personality , 2012, Molecular Psychiatry.

[35]  Adam N. Joinson,et al.  Watching me, watching you: privacy attitudes and reactions to identity card implementation scenarios in the United Kingdom , 2006, Journal of information science.

[36]  Gerrit C. van der Veer,et al.  CHI '05 Extended Abstracts on Human Factors in Computing Systems , 2005, CHI 2005.