Towards Extracting Personality Trait Data from Interaction Behaviour Nick Fine and Willem-Paul Brinkman School of Information Systems, Computing and Mathematics.

Slides:



Advertisements
Similar presentations
Web-site Design Strategy.  For P2 you need to explain how each of your 3 websites has employed ‘usability’ features;  these include: importance to success.
Advertisements

1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Back to Table of Contents
Story-Based Test Automation Using Free Tools
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
The Cycle of Science Research question about the real world Research question about the real world Theory Interpretation Statistical analyses Statistical.
Towards Customized User Interface Skins: Investigating User Personality and Skin Colour Batul Saati May Salem Willem-Paul Brinkman.
The art and science of measuring people l Reliability l Validity l Operationalizing.
INFO 310 User Centered Design. User centered design (Allen, 1996) Identify a user population Investigate the information needs of the user group Discover.
Towards Customized Emotional Design: an Explorative Study of User Personality and User Interface Skin Preferences Willem-Paul Brinkman Nick Fine.
Component-specific usability testing Dr Willem-Paul Brinkman Lecturer Department of Information Systems and Computing Brunel University
Using activity data to support your users Tom Franklin University of Manchester and Franklin Consulting
Developing an instrument to assess the impact of attitude and social norms on user selection of an interface design: a repertory grid approach Willem-Paul.
Personalising emotional skin designs Willem-Paul Brinkman & Nick Fine
Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal.
Understanding Active Directory
Genderization of Social Media By: Rakhi, Lisa, Mary, and Tricia.
Towards Appraising Online Stores SEPI Research Group, Department of Computer Science and AI University of Malta 1 CSAW 2004 Towards Appraising Online Stores.
Section 13.1 Add a hit counter to a Web page Identify the limitations of hit counters Describe the information gathered by tracking systems Create a guest.
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
Architecture Tutorial Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
Consumer Behavior, Market Research
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
The Personalised University Clifford Sanders Online Projects Manager Gareth McAleese Web Development Manager.
Chapter Eight Database Applications and Implications.
Commercial-in-Confidence 1 Information Architect and the Development Internet Application Tweek Presentation May 2001.
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
Tutor: Prof. A. Taleb-Bendiab Contact: Telephone: +44 (0) CMPDLLM002 Research Methods Lecture 8: Quantitative.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter Daniele Quercia, Michal Kosinski, David Stillwell, Jon Crowcroft COMP4332 Wong Po.
Protecting Patron Information in a Consortial Environment Issues and Strategies Jennifer Kuntz
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
Informed Consent to Address Trust, Control, and Privacy Concerns in User Profiling Thea van der Geest, Willem Pieterson, Peter de Vries.
Music Australia Engaging partners and audiences Robyn Holmes, Curator of Music, National Library of Australia.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
Log files presented to : Sir Adnan presented by: SHAH RUKH.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
CHAPTER 8 Segmenting and Analyzing the Target Market.
Predicting Personality from Twitter 1 Predicting Personality with Social Media 2 Jennifer Golbeck, Cristina Robles, Michon Edmondson 1, Karen Turner SocialCom.
Elaine Ménard & Margaret Smithglass School of Information Studies McGill University [Canada] July 5 th, 2011 Babel revisited: A taxonomy for ordinary images.
Srivastava J., Cooley R., Deshpande M, Tan P.N.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
EBSCOadmin Overview Tutorial support.ebsco.com. EBSCOadmin is a powerful administrative platform that offers a wealth of options for customizing your.
Experimental Research Methods in Language Learning Chapter 6 Ethical Considerations in Experimental Research.
The effects of Peer Pressure, Living Standards and Gender on Underage Drinking Psychologist- Kanari zukoshi.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Personalising Interaction using Profiled Skins Nick Fine Research Start: March 2004.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Chapter 8 Strategies for Marketing, Sales, and Promotion Electronic Commerce.
CHECKLIST SYSTEM REQUIREMENTS Done For Further Testing Browser Requirements Internet Explorer version 6.0 or 7.0 Testing of CIR (avg. minimum bandwidth)
9.1 Audience Appreciation
A Multi-Dimensional Configurable Access Control Framework for Mobile Applications By: Yaira K. Rivera Sánchez Major Advisor: Steven A. Demurjian.
Sitecues Metrics David Young (617) Discussion Document.
SOFTWARE TESTING TRAINING TOOLS SUPPORT FOR SOFTWARE TESTING Chapter 6 immaculateres 1.
Chapter 6 : User interface design
Automated ad placement
Chapter 4 Consumer Behavior, Online Market Research, and
Latest Updates on BlackHawk Mines Music : Privacy Policy
Web Mining Ref:
Research Ethics Matthew Billington
Conducting Research in the Social Sciences
Chapter 12: Automated data collection methods
Athabasca University School of Computing and Information Science
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
So you were told to make a website
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
What is E- marketing? Internet marketing is any marketing activity that is connected online through the use of Internet technologies.
Presentation transcript:

Towards Extracting Personality Trait Data from Interaction Behaviour Nick Fine and Willem-Paul Brinkman School of Information Systems, Computing and Mathematics Brunel University {nick.fine, Keywords: logging, log file recording, user interface skins, reskinning, user interface design

Problem 1: Avoiding Average Average user interfaces = average interaction Why interact with a UI that is designed for the average individual? UI skinning technology allows for easy change of the UI – but how can this best be achieved?

Problem 2: Segmenting Large User Populations If not designing for average, need to target certain subsets of the larger population: –how are they identified? –how are they designed for?

Approach 1) Segment large user populations by a defining trait – Personality –why Personality? CASA (Reeves and Nass), Similarity Attaction Hypothesis (Byrne and Nelson), Colour Theory 2) Determine Personality through log file recording –Informs designers of the Personality types of the target population without needing to ask the users directly 3) Produce Profiled User Interface Skins (ProSkins) that are designed for the target segment –e.g. Red UI skin colour for extroverts –e.g. Low edge complexity for introverts –e.g. Agreeable personality represented for Agreeable users

Towards the Individual: Designing for Subsets

Log File Recording Segment profiles established using log file recording methods to capture: –User interactive behavioural measures Mouse clicks (navigation, feature use, sessions) Effort values UI Skin selection –User questionnaire data Personality (IPIP-NEO, TIPI) UI Skin Preference Music Preference (STOMP) General Demographics (age, gender, country)

Experimental Platform: Infrastructure Client-Server over TCP/IP Microsoft.NET 1.1 Framework Access Database

Experimental Platform: Application Architecture

Analysis Looking for relationships between user Personality and recorded interactive behaviour Personality Dimensions “Big Five” (Costa and McRae) Openness to new experience Conscientiousness Extroversion Agreeableness Neuroticism (as measured by the IPIP-NEO) Interactive Behaviours Number of events in session (N, M, SD) Total events of all sessions Correlation – events and N sessions Intercept Slope

Results

Ethical Issues

Position Statement In order to provide personalisation and customisation services greater information about users is required. Log File Recording (LFR) provides a means to collect this information in an unobtrusive manner. How can HCI develop LFR as a research method within an ethical framework?

Issues What kind of information is acceptable to record? Personally/non personally identifiable?

General demographics e.g. Age, Gender, Country Content measures e.g. WWW sites visited Non-Content measures e.g. User interface skin choices/configuration Personal measures e.g. Personality, Intelligence, Cognitive Style Session measures e.g. application usage, feature usage, mouse clicks, number of sessions, mean times

Issues Is it acceptable/possible to record data which can then be used to identify the individual? If the data recorded is not personally identifiable, what potential harm is there? If no harm, then why the need to disclose?!

Logging is Already Ubiquitous! Log file recording is and has been recording user interactive behaviour for decades: e.g. web server logs cookies media player content search engines/indexes any IP access door security systems photocopiers content management systems license plate recognition systems CCTV

Protecting Users Anonymity –Not personally identifiable, therefore no risk to individual privacy Informed consent –Full disclosure and permission Ability to view logged data and/or source code –The “open source” philosophy Ability for user to turn off logging/opt out –User has option to withdraw from logging at any time

Giving to Get How can we gain trust and overcome user scepticism regarding LFR? If users perceived usability data derived from LFR as harmless then more people would contribute usability data freely. distributed.net ProSkin?

Questions?