skip to main content
10.1145/2702123.2702293acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits

Published:18 April 2015Publication History

ABSTRACT

With the recent advances in using data analytics to automatically infer one's personality traits from their social media data, users are facing a growing tension between the use of the technology to aid self development in workplace and the privacy concerns of such use. Given the richness of personality data that can be derived today and the varied sensitivity of revealing such data, it is a non-trivial task for users to configure their privacy settings for sharing and protecting their derived personality data. Here we present the design, development, and evaluation of an interactive visualization tool, VeilMe, which helps users configure the privacy settings for the use of their personality portraits derived from social media. Unlike other privacy configuration tools, our tool offers two distinct advantages. First, it presents a novel and intuitive visual interface that aids users in understanding and exploring their own personality traits derived from their social media data, and configuring their privacy preferences. Second, our tool helps users to jump start their privacy settings by suggesting initial sharing strategies based on a set of factors, including the users' personality and target audience. We have evaluated the use of our tool with 124 participants in an enterprise context. Our results show that VeilMe effectively supports various user privacy configuration tasks, and also suggest several design implications, including the approaches to personalized privacy configurations.

Skip Supplemental Material Section

Supplemental Material

suppl.mov

Supplemental video

References

  1. Adali, S., and Golbeck, J. Predicting personality with social behavior. In Proc. of ASONAM 2012, IEEE Computer Society (2012), 302--309. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bellotti, V., and Sellen, A. Design for privacy in ubiquitous computing environments. In Proc. of ECSCW '93, Kluwer Academic Publishers (1993), 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chen, J., Hsieh, G., Mahmud, J. U., and Nichols, J. Understanding individuals' personal values from social media word use. In Pro. of CSCW'14 (2014), 405--414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cohen, A. A value based perspective on commitment in the workplace. International Journal of Intercultural Relations 33, 4 (2009), 332--345.Google ScholarGoogle ScholarCross RefCross Ref
  5. Cormac, E. R. M. A Cognitive Theory of Metaphor. MIT Press, 1990.Google ScholarGoogle Scholar
  6. De Choudhury, M., Counts, S., and Horvitz, E. Predicting postpartum changes in emotion and behavior via social media. In Proc. of SIGCHI '13 (2013), 3267--3276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Egelman, S., Oates, A., and Krishnamurthi, S. Oops, i did it again: Mitigating repeated access control errors on facebook. In Proc. of SIGCHI '11, ACM (2011), 2295--2304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fang, L., and LeFevre, K. Privacy wizards for social networking sites. In Proc. of WWW '10, ACM (2010), 351--360. 00179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Funder, D. C. The personality puzzle. WW Norton & Co, 1997.Google ScholarGoogle Scholar
  10. Gilbert, E., and Karahalios, K. Predicting tie strength with social media. In Proc. of SIGCHI '09, ACM (2009), 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Golbeck, J., Robles, C., Edmondson, M., and Turner, K. Predicting ersonality from twitter. In Privacy, security, risk and trust in SocialCom '11 (2011), 149--156.Google ScholarGoogle Scholar
  12. Golbeck, J., Robles, C., and Turner, K. Predicting personality with social media. In Proc. CHI'11 EA, ACM (2011), 253--262. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gou, L., Zhou, M. X., and Yang, H. KnowMe and ShareMe: Understanding automatically discovered personality traits from social media and user sharing preferences. In Proc. of SIGCHI '14, ACM (2014), 955--964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Horvitz, E. Principles of mixed-initiative user interfaces. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '99, ACM (New York, NY, USA, 1999), 159--166. 00675. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Iachello, G., and Hong, J. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction 1, 1 (2007), 1--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Inc., F. Facebook audience preview, 2014.Google ScholarGoogle Scholar
  17. Junglas, I. A., Johnson, N. A., and Spitzmller, C. Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. of Info. Sys. 17, 4 (2008), 387--402.Google ScholarGoogle ScholarCross RefCross Ref
  18. Knijnenburg, B. P., Kobsa, A., and Jin, H. Preference-based location sharing: are more privacy options really better? In Proc. of SIGCHI '13, ACM (2013), 2667--2676. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Korzaan, M., Brooks, N., and Greer, T. Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business 1 (2009), 1--17.Google ScholarGoogle Scholar
  20. Lipford, H. R., Watson, J., Whitney, M., Froiland, K., and Reeder, R. W. Visual vs. compact: A comparison of privacy policy interfaces. In Proc. of SIGCHI '10, ACM (2010), 1111--1114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Liu, K., and Terzi, E. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5, 1 (Dec. 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Mairesse, F., Walker, M. A., Mehl, M. R., and Moore, R. K. Using linguistic cues for the automatic recognition of personality in conversation and text. J. Artif. Intell. Res.(JAIR) 30 (2007), 457--500. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mazzia, A., LeFevre, K., and Adar, E. The PViz comprehension tool for social network privacy settings. In Proc. of SOUPS '12, ACM (2012), 13:1--13:12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Olson, J. S., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. In Proc. of CHI '05 EA, ACM (2005), 1985--1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Palen, L., and Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '03, ACM (New York, NY, USA, 2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Patil, S., and Lai, J. Who gets to know what when: Configuring privacy permissions in an awareness application. In Proc. of SIGCHI '05, ACM (2005), 101--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Patil, S., Schlegel, R., Kapadia, A., and Lee, A. J. Reflection or action?: How feedback and control affect location sharing decisions. In Proc. of SIGCHI '14, ACM (2014), 101--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Pennacchiotti, M., and Popescu, A.-M. A machine learning approach to twitter user classification. In ICWSM (2011).Google ScholarGoogle Scholar
  29. Reeder, R. W., Bauer, L., Cranor, L. F., Reiter, M. K., Bacon, K., How, K., and Strong, H. Expandable grids for visualizing and authoring computer security policies. In Proc. of SIGCHI '08, ACM (2008), 1473--1482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Roberts, B. W., Kuncel, N. R., Shiner, R., Caspi, A., and Goldberg, L. R. The power of personality: The comparative validity of personality traits, socioeconomic status, and cognitive ability for predicting important life outcomes. Persp. on Psy. Sci. 2, 4 (2007), 313--345.Google ScholarGoogle Scholar
  31. Rode, J., Johansson, C., DiGioia, P., Filho, R. S., Nies, K., Nguyen, D. H., Ren, J., Dourish, P., and Redmiles, D. Seeing further: Extending visualization as a basis for usable security. In Proc. of SOUPS '06, ACM (2006), 145--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. Understanding and capturing people's privacy policies in a mobile social networking application. Personal Ubiq. Comput. 13, 6 (2009), 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Schlegel, R., Kapadia, A., and Lee, A. J. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In Proc. of SOUPS '11, ACM (2011), 14:1--14:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Shen, J., Brdiczka, O., and Liu, J. Understanding email writers: Personality prediction from email messages. In User Modeling, Adaptation, and Personalization. Springer, 2013, 318--330.Google ScholarGoogle Scholar
  35. Smith, H. J., Dinev, T., and Xu, H. Information privacy research: An interdisciplinary review. MIS quarterly 35, 4 (2011), 989--1016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sweeny, L. k-anonymity: A model for protecting privacy. Int. J. Unc. Fuzz. Knowl. Based Syst. 10, 05 (2002), 557--570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Tausczik, Y. R., and Pennebaker, J. W. The psychological meaning of words: LIWC and computerized text analysis methods. J. of Lang.and Soc. Psy. 29, 1 (2010), 24--54.Google ScholarGoogle ScholarCross RefCross Ref
  38. Westin, A. F., Maurici, D., Business, P. . A., LLP, P. W., and Associates, L. H. a. E-commerce & Privacy: What Net Users Want. Privacy & American Business, 1998.Google ScholarGoogle Scholar
  39. Yang, J., and Li, Y. Identifying user needs from social media. Tech. rep., IBM Tech. Report, 2013.Google ScholarGoogle Scholar
  40. Yarkoni, T. Personality in 100,000 words: A large-scale analysis of personality and word use among bloggers. J. of Res. in Personality 44, 3 (2010), 363--373.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
          April 2015
          4290 pages
          ISBN:9781450331456
          DOI:10.1145/2702123

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 April 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader