Tag Archives: Cell Phone

Ludwig-Maximilians-Universität München study: Predicting your personality from your smartphone data

1 Aug

A 2013 MIT Paper theorized that personality type could be predicted using cell phone data:

Predicting Personality Using Novel Mobile Phone-Based Metrics

Yves-Alexandre de Montjoye1,, Jordi Quoidbach2,∗, Florent Robic3,∗, and Alex (Sandy) Pentland1 1 Massachusetts Institute of Technology – The Media Laboratory, Cambridge, MA 2 Harvard University – Department of Psychology, Cambridge, MA 3 Ecole Normale Sup´erieure de Lyon, Lyon, France

Abstract. The present study provides the first evidence that personality can be reliably predicted from standard mobile phone logs. Using a set of novel psychology-informed indicators that can be computed from data available to all carriers, we were able to predict users’ personality with a mean accuracy across traits of 42% better than random, reaching up to 61% accuracy on a three-class problem. Given the fast growing number of mobile phone subscription and availability of phone logs to researchers, our new personality indicators open the door to exciting avenues for future research in social sciences. They potentially enable costeffective, questionnaire-free investigation of personality-related questions at a scale never seen before.

1 Introduction How much can one know about your personality just by looking at the way you use your phone? Determining the personality of a mobile phone user simply through standard carriers’ log has became a topic of tremendous interest. Mobile cellular subscriptions have hit 6 billion throughout the world [1] and carriers have increasingly made available phone logs to researchers [2] as well as to their commercial partners [3]. If predicted correctly, mobile phones datasets could thus provide a valuable unobtrusive and cost-effective alternative to surveybased measures of personality. For example, marketing and phone companies might seek to access dispositional information about their customers to design customized offers and advertisements [4]. Appraising users dispositions through automatically collected data could also benefit the field of human-computer interface where personality has become an important factor [5]. Finally, finding ways to extract personality and, more broadly, psycho-social variables from country scale datasets might lead to unprecedented discoveries in social sciences….                         http://web.media.mit.edu/~yva/papers/deMontjoye2013predicting.pdf

Resources:

What Your Phone Type Says About Your Personality                                                                        https://www.realsimple.com/health/mind-mood/smartphone-personality-differences

Mobile phone use and stress, sleep disturbances, and symptoms of depression among young adults – a prospective cohort study                                                                               https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3042390/

The Stress of Constantly Checking Your Phone                                                                                 https://www.verywellmind.com/constantly-checking-your-phone-4137954

Science Daily reported in Predicting your personality from your smartphone data

Everyone who uses a smartphone unavoidably generates masses of digital data that are accessible to others, and these data provide clues to the user’s personality. Psychologists at Ludwig-Maximilians-Universitaet in Munich (LMU) are studying how revealing these clues are.

For most people around the world, smartphones have become an integral and indispensable component of their daily lives. The digital data that these devices incessantly collect are a veritable goldmine — not only for the five largest American IT companies, who make use of them for advertising purposes. They are also of considerable interest in other contexts. For instance, computational social scientists utilize smartphone data in order to learn more about personality traits and social behavior. In a study that appears in the journal PNAS, a team of researchers led by LMU psychologist Markus Bühner set out to determine whether conventional data passively collected by smartphones (such as times or frequencies of use) provide insights into users’ personalities. The answer was clear cut. “Yes, automated analysis of these data does allow us to draw conclusions about the personalities of users, at least for most of the major dimensions of personality,” says Clemens Stachl, who used to work with Markus Bühner (Chair of Psychological Methodologies and Diagnostics at LMU) and is now a researcher at Stanford University in California.

The LMU team recruited 624 volunteers for their PhoneStudy project. The participants agreed to fill out an extensive questionnaire describing their personality traits, and to install an app that had been developed specially for the study on their phones for 30 days. The app was designed to collect coded information relating to the behavior of the user. The researchers were primarily interested in data pertaining to communication patterns, social behavior and mobility, together with users’ choice and consumption of music, the selection of apps used, and the temporal distribution of their phone usage over the course of the day. All the data on personality and smartphone use were then analyzed with the aid of machine-learning algorithms, which were trained to recognize and extract patterns from the behavioral data, and relate these patterns to the information obtained from the personality surveys. The ability of the algorithms to predict the personality traits of the users was then cross-validated on the basis of a new dataset. “By far the most difficult part of the project was the pre-processing of the huge amount of data collected and the training of the predictive algorithms,” says Stachl. “In fact, in order to perform the necessary calculations, we had to resort to the cluster of high-performance computers at the Leibniz Supercomputing Centre in Garching (LRZ).”

The researchers focused on the five most significant personality dimensions (the Big Five) identified by psychologists, which enable them to characterize personality differences between individuals in a comprehensive way. These dimensions relate to the self-assessed contribution of each of the following traits to a given individual’s personality: (1) openness (willingness to adopt new ideas, experiences and values), (2) conscientiousness (dependability, punctuality, ambitiousness and discipline), (3) extraversion (sociability, assertiveness, adventurousness, dynamism and friendliness), (4) agreeableness (willingness to trust others, good natured, outgoing, obliging, helpful) and (5) emotional stability (self-confidence, equanimity, positivity, self-control). The automated analysis revealed that the algorithm was indeed able to successfully derive most of these personality traits from combinations of the multifarious elements of their smartphone usage. Moreover, the results provide hints as to which types of digital behavior are most informative for specific self-assessments of personality. For example, data pertaining to communication patterns and social behavior (as reflected by smartphone use) correlated strongly with levels of self-reported extraversion, while information relating to patterns of day and night-time activity was significantly predictive of self-reported degrees of conscientiousness. Notably, links with the category ‘openness’ only became apparent when highly disparate types of data (e.g., app usage) were combined.

The results of the study are of great value to researchers, as studies have so far been almost exclusively based on self-assessments. The conventional method has proven to be sufficiently reliable in predicting levels of professional success, for instance…..                                                                                                                            https://www.sciencedaily.com/releases/2020/07/200717120152.htm

Citation:

Date:                July 17, 2020
Source:            Ludwig-Maximilians-Universität München
Summary:
Everyone who uses a smartphone unavoidably generates masses of digital data that are accessible to others, and these data provide clues to the user’s personality. Psychologists are now studying how revealing these clues are.

Journal Reference:

Clemens Stachl, Quay Au, Ramona Schoedel, Samuel D. Gosling, Gabriella M. Harari, Daniel Buschek, Sarah Theres Völkel, Tobias Schuwerk, Michelle Oldemeier, Theresa Ullmann, Heinrich Hussmann, Bernd Bischl, and Markus Bühner. Predicting personality from patterns of behavior collected with smartphonesPNAS, 2020 DOI: 10.1073/pnas.1920484117

Here is the press release from Ludwig-Maximilians-Universität München:

The most personal device

Munich, July 15th, 2020

Anyone who uses a smartphone leaves digital traces – in abundance. Such app data make it possible to draw conclusions about the personality of the user. LMU psychologists are researching their significance.

For many people, smartphones have long been personal companions in their daily lives. The digital traces that their owners leave around the clock are not only in great demand for the large American IT companies, for example for advertising purposes. They can also throw something off scientifically: social scientists, for example, use the data to find out more about people’s personality and social behavior. In a recent study published in the PNAS magazine, a team led by LMU psychologist Markus Bühner checkedthe question of whether there are already indications of the personality of the user from common behavior data of smartphones such as usage times or frequencies. The answer was clear: “Yes, we can automatically draw conclusions about the personality of the user, at least for most personality dimensions,” says Clemens Stachl, former member of the chair of Markus Bühner (psychological methodology and diagnostics) and now a researcher at Stanford University, USA.

As part of the PhoneStudy project, the LMU researchers asked a total of 624 volunteers to fill out an extensive personal questionnaire and to install the PhoneStudy research app developed at the LMU on their smartphones for 30 days. The app sent encrypted information about the behavior of the test participants to the server. The researchers primarily evaluated data on areas such as communication and social behavior, music consumption, app usage, mobility, general telephone activity and day and night activity. The scientists then fed both the data from the personality questionnaire and the behavior data from the smartphone into a machine learning algorithm. This algorithm, was then trained to recognize patterns in the behavioral data and then to associate them with higher or lower values ​​in the personality questionnaire. The algorithm’s ability to predict personality was then cross-validated using new data. “The most difficult part was the preprocessing of the enormous amount of data and the” training “of the algorithms,” says Stachl. “To do this, we had to access the LRZ high-performance computing cluster in Garching to make these calculations possible at all.” “The most difficult part was the preprocessing of the enormous amount of data and the” training “of the algorithms,” says Stachl. “To do this, we had to access the LRZ high-performance computing cluster in Garching to make these calculations possible at all.” “The most difficult part was the preprocessing of the enormous amount of data and the” training “of the algorithms,” says Stachl. “To do this, we had to access the LRZ high-performance computing cluster in Garching to make these calculations possible at all.”

The researchers focused on the five most important personality traits in psychology, the so-called Big Five. These five dimensions describe differences in human personality in a very global way. They include openness (how open a person describes new ideas, experiences and values), conscientiousness (how reliable, punctual, ambitious, and organized I assess myself), extraversion (gives hints on how sociable, assertive, adventurous, cheerful) someone describes), tolerance (how pleasant, accommodating, supportive and helpful a person is) and emotional stability (how confident, self-dominant and carefree a person assesses himself). The algorithm was able to automatically draw conclusions about most of the users’ personality traits from the combination of the behavioral data. The results also indicated which digital behaviors are informative for certain self-assessments of the personality. The communication and social behavior on the smartphone gave important clues as to how extravagant someone thinks, information about the day-night rhythm of users was particularly meaningful with regard to self-assessed conscientiousness. Openness could only be predicted through a variety of very different behavioral data. Which digital behaviors are informative for certain self-assessments of the personality. The communication and social behavior on the smartphone gave important clues as to how extravagant someone thinks, information about the day-night rhythm of users was particularly meaningful with regard to self-assessed conscientiousness. Openness could only be predicted through a variety of very different behavioral data. Which digital behaviors are informative for certain self-assessments of the personality. The communication and social behavior on the smartphone gave important clues as to how extravagant someone thinks, information about the day-night rhythm of users was particularly meaningful with regard to self-assessed conscientiousness. Openness could only be predicted through a variety of very different behavioral data.

The results are of great value to researchers, above all because personality diagnosis in psychology has so far been based almost exclusively on self-descriptions. These are useful for predicting professional success, for example. “Nevertheless, at the same time we know very little about how people actually behave in everyday life – apart from what they want to tell us in the questionnaire.” says Markus Bühner. “Smartphones are ubiquitous, widespread and have enormous technical capabilities, making them ideal research tools to see whether the self-descriptions also correspond to real behavior.”

Stachl is well aware that his research could also arouse desires in large IT companies. In addition to data protection and privacy protection, one has to work on taking a holistic view of the topic of artificial intelligence, says Stachl. “The focus of research must be on people, not machines. We must not use machine learning methods without thinking about it. ”The potential of possible applications is enormous, both in science and in business. “The possibilities of a data-driven society today can undoubtedly improve life for many people, but we also have to ensure that all participants in society can benefit from these developments.”
https://www.uni-muenchen.de/forschung/news/2020/stachl_smartphones.html

Technology Safety suggested 12 Tips on Cell Phone Safety and Privacy:

As cell phones become smarter, they’re more like mini computers that contain lots of personal information about us. Here are 12 easy steps to take to manage your privacy and safety when using your cell phone.

  1. Put a passcode on your phone.

The easiest thing for you to do is to put a passcode on your phone. Having a passcode will make it harder for someone to pick up your phone to scroll through, access your accounts, or install something malicious. In the event that your phone gets stolen or you lose it, it’ll make it a bit harder for others to get into your phone. Most phones just ask for a 4-digit passcode, but some phones will allow you to use a more complex passcode.

  1. Turn off location sharing.

Most phones have a GPS that can pinpoint your general or exact location. With this capability, many applications may collect and share your location information. However, many smartphones give you the option of managing your location sharing under the “settings.” You can pick and choose which applications may access your location or you can opt to turn off the location setting altogether.  Minimizing the location access can also help increase the battery life on your phone. If your phone doesn’t offer specific location-sharing settings, choose carefully when downloading new apps so you’re not sharing your location unknowingly.

  1. Turn off Bluetooth when not using.

Bluetooth allows your phone to communicate with other devices, such as the hands-free option in your car or your printer. If accessed by someone else though, they could misuse it to access your information or intercept your calls. Turn off the Bluetooth on your phone and turn it on only when you need to connect with other device. Many phones also allow users to set passcodes or additional security levels on their Bluetooth as well. Use all available options to increase your privacy.

  1. Check your privacy & security settings.

Most smartphones have settings that will help you manage your privacy and safety. You can find these controls through the settings on your phone or through the settings of a specific app. These settings may allow you to limit an application’s access to the data on your phone, including access to your location, pictures, contacts, notes, etc. You may even be able to block cookies and limit what data your mobile browser collects.

  1. What online accounts are you automatically logged into?

One of the convenient features of having a smartphone is to quickly access email or social media accounts with just a tap of a finger. However, this also means that you are always connected to accounts that may contain sensitive information. Consider logging out of certain accounts if you can so that others can’t access those accounts if they are using your phone. Keep in mind that depending on the type of phone you have, you might not be able to log out of some accounts, such as email accounts, but may have to remove the entire account from your phone. In this case, make your decision based on your own privacy and safety risk. While it may be inconvenient to access the account through the browser instead, it may be safer.

  1. Review the apps you download.

Know the apps that are on your phone, and if you have an unfamiliar app, delete it. Apps are easy to download and easy to forget, but depending on the app, it could be accessing private information or could be a monitoring program that someone surreptitiously installed.

  1. Put a password on your wireless carrier account to keep others from accessing your account.

If you’re worried that someone might be contacting your wireless carrier to obtain information about you and your account, you can ask your wireless carrier to put additional security on your account, such as a password. Only someone with this password will be allowed to make changes to your account.

  1. Lock down your online phone account.

Keep in mind that even if someone doesn’t have access to your phone, it might be possible for them to access your online account. Online accounts can include your wireless carrier account, call logs, your email or social media accounts, your Google Play/Apple AppStore, or iCloud account. Update the passwords and security questions for those accounts to ensure someone else can’t get access.

  1. Use virtual phone numbers (such as Google Voice) to keep your number private.

To further maximize your privacy, consider using a virtual number, such as Google Voice or a throw away number, so you don’t have to give out your actual phone number. A virtual phone number will also allow you to screen calls and make calls/send texts from the virtual number.

  1. Try not to store sensitive information on your phone.

Finally, although it may be tempting to store information such as passwords, account numbers, or personal information on your phone, the less sensitive information you have, the less likely someone else can access it. You might even want to consider deleting sensitive text messages or voicemails so they’re not stored on your phone.

  1. Use anti-virus and anti-spyware software on your phone.

After years of warnings, we are fairly used to ensuring we have anti-spyware, anti-malware, and anti-virus programs on our computers. This software should also be used on our smartphones as well. Search for programs in the app stores and discuss them with your wireless provider. Some phones come with built-in software that you won’t want to override.

  1. Take care when using safety apps.

There are many “personal safety apps” available for download that offer to increase the users’ personal safety – immediately connecting them with 911 or select trusted individuals. Several of these apps are designed and marketed specifically to survivors of violence. Before relying on any safety app in an emergency, be sure to test it out with friends and family to be sure that it works correctly for you. Your trusted friend may not receive your location with your emergency call or may not receive your call for help at all. Always know the quickest way to access 911 on your phone in case of an emergency. Many phones have a quick emergency call button that you can even dial without entering the phone’s passcode.                                                                                   https://www.techsafety.org/12tipscellphones

Resources:

CELL PHONE PRIVACY                                                                                                                aclu.org/issues/privacy-technology/location-tracking/cell-phone-privacy

Smartphone Privacy

Posted: Aug 01 2005  | Revised: Dec 19 2017                                                                                                                 https://privacyrights.org/consumer-guides/smartphone-privacy

Protecting Your Privacy: Phone and Cable Records                                                                          https://www.fcc.gov/consumers/guides/protecting-your-privacy

Personal Cellphone Privacy at Work                                                                                               https://www.shrm.org/ResourcesAndTools/hr-topics/technology/Pages/Personal-Cellphone-Privacy-at-Work.aspx

Where information leads to Hope. © Dr. Wilda.com

Dr. Wilda says this about that ©

Blogs by Dr. Wilda:

COMMENTS FROM AN OLD FART©
http://drwildaoldfart.wordpress.com/

Dr. Wilda Reviews ©
http://drwildareviews.wordpress.com/

Dr. Wilda ©
https://drwilda.com/

 

 

 

 

Parent homework: Common sense from Common Sense Media, family media resolutions

2 Jan

Moi wrote in American Academy of Pediatrics policy: Kids need to go on a media diet: Andrew Stevensen wrote in the Sydney Morning Herald article, The screens that are stealing childhood:

But it is not only adults who are on the iWay to permanent connection. As parents readily testify, many children don’t just use the devices, they are consumed by them.
These devices have an almost obsessive pull towards them,” says Larry Rosen, professor of psychology at California State University and author of iDisorder: Understanding Our Obsession with Technology and Overcoming its Hold on Us….
”The million-dollar question is whether there are risks in the transfer of real time to online time and the answer is that we just don’t know,” says Andrew Campbell, a child and adolescent psychologist….
Authoritative standards on appropriate levels of use are limited. The American Academy of Paediatrics recommends parents discourage TV for children under two and limit screen time for older children to less than two hours a day.
The guidelines, says Professor Rosen, are ”ludicrous” but the need for them and constant communication with young people about technology and how they use it, remains. ”It’s no longer OK to start talking to your kids about technology when they’re in their teens. You have to start talking to them about it as soon as you hand them your iPhone or let them watch television or Skype with grandma,” he says.
He suggests a ratio of screen time to other activities of 1:5 for very young children, 1:1 for pre-teens and 5:1 for teenagers. Parents should have weekly talks with their children from the start, looking for signs of obsession, addiction and lack of attention. http://www.smh.com.au/technology/technology-news/the-screens-that-are-stealing-childhood-20120528-1zffr.html

See, Technology Could Lead to Overstimulation in Kids http://www.educationnews.org/parenting/technology-could-lead-to-overstimulation-in-kids/
https://drwilda.com/tag/docs-to-parents-limit-kids-texts/

Caroline Knorr wrote the Common Sense Media article, Media Resolutions Every Family Should Make in 2014:

So, instead of trying to learn everything about your kids’ media life, take a step back. There are some practical, basic things every parent can do to shorten the distance between your kids’ ever-increasing immersion into the world of media and tech and your ability to manage it all. Adding these simple solutions to your New Year’s resolutions will start you off on the right foot.
Make a schedule — and make it detailed. You want to make sure your kids are getting a good balance of screen time and other activities? Write it all down. This step is so essential it’s recommended by the American Academy of Pediatrics. Some families can get by with a general “videogames-only-on-weekends policy.” But given that media use only increases as kids get older (see above), it’s a good idea to make a detailed daily or weekly plan that includes all the stuff your kids need to do (chores, homework) and all the stuff they want to do (video games, iPad, etc.).
Get to know your kid’s favorite device. Whether it’s your smart phone, their tablet, or the family computer, pick a device and familiarize yourself with it. Ask your kid to show you his or her favorite games, social networks, apps and other stuff they like. Learning the ins and outs of Minecraft will earn you some major street cred — and it’s fun. And knowing how your kids are interacting with content will help you enable features and settings that improve safety and privacy protections.
Review behavior dos and don’ts with Internet first-timers. Some basic rules to give your kids:
Do: Ask your parents if you can go online; have basic social skills; understand a site’s rules and know how to flag other users for misbehavior; recognize “red flags” (like if someone asks you personal questions like your name and address).
Don’t: Go online without a parent’s permission; share passwords; pretend to be someone else; share personal details, like name and address; be mean.
Put cell phones to bed. You’ve heard of sleepwalking? Now, there’s sleeptexting. Or just staying up really late to be online –- which interferes with sleep and school. Establish a charging station in your bedroom and make sure kids hand over all of their devices before night-night.
Make this the year you stop texting and driving. Studies show that texting and driving is as dangerous as drinking and driving –- and yet, many drivers (both teens and adults) continue to do it even though they know the risks. Together with your kids, visit itcanwait.com to learn more about the dangers of texting and driving, and take the pledge to stop.
http://www.commonsensemedia.org/blog/media-resolutions-every-family-should-make-in-2014?utm_source=131220_media_resolutions&utm_medium=email&utm_campaign=weekly

Because information posted on social media can go viral, it is important to use common sense in dealing with both parents and students. https://drwilda.com/2012/09/23/managing-school-facebook-relationships-can-be-challenging/
Teachers and others in responsible positions who deal with children must exercise common sense and not put themselves in situations which at the minimum will be awkward and which will lead to activity which is inappropriate.

Boundaries people. Boundaries.

Related:
Two studies: Social media and social dysfunction
https://drwilda.com/2013/04/13/two-studies-social-media-and-social-dysfunction/

Common Sense Media report: Kids migrating away from Facebook
https://drwilda.com/tag/the-impact-of-social-media-use-on-children/

Is ‘texting’ destroying literacy skills https://drwilda.com/2012/07/30/is-texting-destroying-literacy-skills/

Where information leads to Hope. © Dr. Wilda.com

Dr. Wilda says this about that ©

Blogs by Dr. Wilda:

COMMENTS FROM AN OLD FART©
http://drwildaoldfart.wordpress.com/

Dr. Wilda Reviews ©
http://drwildareviews.wordpress.com/

Dr. Wilda ©
https://drwilda.com/

The 05/29/13 Joy Jar

29 May

 

Moi is not a big cell phone user. She uses it on a need to use basis mainly because it is smarter than she is. She wanted to use the phone, but it wouldn’t work. Finally, she figured out that it wasn’t they battery or anything she did. The SIM card died or isn’t working. Today’s deposit into the ‘Joy Jar’ is a working cell phone just in case.

Right, my phone. When these things first appeared, they were so cool. Only when it was too late did people realize they are as cool as electronic tags on remand prisoners.”
David Mitchell,
Ghostwritten

Technology offers us a unique opportunity, though rarely welcome, to practice patience.”
Allan Lokos, Patience: The Art of Peaceful Living

But I’m acutely aware that the possibility of fraud is even more prevalent in today’s world because of the Internet and cell phones and the opportunity for instant communication with strangers.
Armistead Maupin

Email, instant messaging, and cell phones give us fabulous communication ability, but because we live and work in our own little worlds, that communication is totally disorganized.
Marilyn vos Savant

I think we have the attention span of a gnat. You know, with cell phones and Twitter.
Jeff Daniels

Apparently we love our own cell phones but we hate everyone else’s.
Joe Bob Briggs

To be honest, I think cell phones were invented by the devil.”
Joe Hill,
NOS4A2