VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits

With the recent advances in using data analytics to automatically infer one's personality traits from their social media data, users are facing a growing tension between the use of the technology to aid self development in workplace and the privacy concerns of such use. Given the richness of personality data that can be derived today and the varied sensitivity of revealing such data, it is a non-trivial task for users to configure their privacy settings for sharing and protecting their derived personality data. Here we present the design, development, and evaluation of an interactive visualization tool, VeilMe, which helps users configure the privacy settings for the use of their personality portraits derived from social media. Unlike other privacy configuration tools, our tool offers two distinct advantages. First, it presents a novel and intuitive visual interface that aids users in understanding and exploring their own personality traits derived from their social media data, and configuring their privacy preferences. Second, our tool helps users to jump start their privacy settings by suggesting initial sharing strategies based on a set of factors, including the users' personality and target audience. We have evaluated the use of our tool with 124 participants in an enterprise context. Our results show that VeilMe effectively supports various user privacy configuration tasks, and also suggest several design implications, including the approaches to personalized privacy configurations.

[1]  Eytan Adar,et al.  The PViz comprehension tool for social network privacy settings , 2012, SOUPS.

[2]  Sibel Adali,et al.  Predicting Personality with Social Behavior , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[3]  Jason I. Hong,et al.  End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..

[4]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[5]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[6]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[7]  Michelle X. Zhou,et al.  KnowMe and ShareMe: understanding automatically discovered personality traits from social media and user sharing preferences , 2014, CHI.

[8]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[9]  Adam J. Lee,et al.  Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.

[10]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[11]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[12]  Earl R. Mac Cormac A cognitive theory of metaphor , 1985 .

[13]  Aaron Cohen,et al.  A value based perspective on commitment in the workplace: An examination of Schwartz's basic human values theory among bank employees in Israel , 2009 .

[14]  Eric Horvitz,et al.  Predicting postpartum changes in emotion and behavior via social media , 2013, CHI.

[15]  Eric Horvitz,et al.  Principles of mixed-initiative user interfaces , 1999, CHI '99.

[16]  Ninghui Li,et al.  End-User Privacy in Human–Computer Interaction , 2009 .

[17]  Marilyn A. Walker,et al.  Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text , 2007, J. Artif. Intell. Res..

[18]  Huahai Yang,et al.  Identifying User Needs from Social Media , 2013 .

[19]  Jennifer Golbeck,et al.  Predicting personality with social media , 2011, CHI Extended Abstracts.

[20]  D. Funder The Personality Puzzle , 1996 .

[21]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[22]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[23]  George Lakoff,et al.  A Cognitive Theory of Metaphor. , 1987 .

[24]  Jennifer Golbeck,et al.  Predicting Personality from Twitter , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[25]  Tal Yarkoni Personality in 100,000 Words: A large-scale analysis of personality and word use among bloggers. , 2010, Journal of research in personality.

[26]  Shriram Krishnamurthi,et al.  Oops, I did it again: mitigating repeated access control errors on facebook , 2011, CHI.

[27]  Sameer Patil,et al.  Reflection or action?: how feedback and control affect location sharing decisions , 2014, CHI.

[28]  Paul Dourish,et al.  Seeing further: extending visualization as a basis for usable security , 2006, SOUPS '06.

[29]  Lujo Bauer,et al.  Expandable grids for visualizing and authoring computer security policies , 2008, CHI.

[30]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[31]  Oliver Brdiczka,et al.  Understanding Email Writers: Personality Prediction from Email Messages , 2013, UMAP.

[32]  Jonathan Grudin,et al.  A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.

[33]  Alfred Kobsa,et al.  Preference-based location sharing: are more privacy options really better? , 2013, CHI.

[34]  A. Caspi,et al.  The Power of Personality: The Comparative Validity of Personality Traits, Socioeconomic Status, and Cognitive Ability for Predicting Important Life Outcomes , 2007, Perspectives on psychological science : a journal of the Association for Psychological Science.

[35]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[36]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.

[37]  Robert W. Reeder,et al.  Visual vs. compact: a comparison of privacy policy interfaces , 2010, CHI.

[38]  Ana-Maria Popescu,et al.  A Machine Learning Approach to Twitter User Classification , 2011, ICWSM.

[39]  Jeffrey Nichols,et al.  Understanding individuals' personal values from social media word use , 2014, CSCW.