Personality segmentation of users through mining their mobile usage patterns

被引:15
|
作者
Razavi, Rouzbeh [1 ]
机构
[1] Kent State Univ, Dept Management & Informat Syst, Kent, OH 44242 USA
关键词
Mobile usage; Big-Five personality traits; Segmentation; Pattern mining; BIG; 5; SMARTPHONE; INFORMATION; TRAITS; ONLINE; ENVIRONMENTS; QUALITY; IMPACT;
D O I
10.1016/j.ijhcs.2020.102470
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users' interactions with their mobile devices leave behind unique digital footprints that can reveal important information about their characteristics, including their personality. By deploying a wide range of machine learning algorithms and by analyzing patterns of mobile usage data from more than 400 users, this study examines the personality determinants of various mobile usage attributes. Considering the Big-Five personality traits (agreeableness, conscientiousness, extraversion, neuroticism, and openness), correlations between mobile usage attributes and personality traits are presented and discussed. Moreover, the study examines the possibility of predicting users' personality segments from their mobile usage attributes. Using the K-means clustering algorithm, three distinct personality segments are detected. Subsequently, different machine learning classification models are trained to predict the personality segments of users based on their mobile usage attributes. The results suggest that users' personality segments can be correctly predicted, with an overall accuracy of 76.17%. The number of contacts on the device is found to be the most significant predictor followed by the frequency and duration of outgoing calls, and then the average time spent on social media applications. Additionally, the study discusses the practical implications of the findings from the perspectives of users, service providers and mobile application providers.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Visiting Patterns and Personality of Foursquare Users
    Chorley, Martin J.
    Colombo, Gualtiero B.
    Allen, Stuart M.
    Whitaker, Roger M.
    2013 IEEE THIRD INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING (CGC 2013), 2013, : 271 - 276
  • [22] Mining Patterns of Sensitive Data Usage
    Avdiienko, Vitalii
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 891 - 894
  • [23] Users' Personality Traits as Predictors of UCC Usage on the Internet
    Moon, Yun Ji
    Kang, Sora
    Rowley, Chris
    Han, Juhee
    Kim, Min Sun
    COMPUTER APPLICATIONS FOR WEB, HUMAN COMPUTER INTERACTION, SIGNAL AND IMAGE PROCESSING AND PATTERN RECOGNITION, 2012, 342 : 209 - +
  • [24] Mining the Usage Patterns of ROS Primitives
    Santos, Andre
    Cunha, Alcino
    Macedo, Nuno
    Arrais, Rafael
    dos Santos, Filipe Neves
    2017 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2017, : 3855 - 3860
  • [25] Mining usage patterns for the Android API
    Borges, Hudson S.
    Valente, Marco Tulio
    PEERJ COMPUTER SCIENCE, 2015, 2015 (07)
  • [26] Mining usage behavior change for credit card users
    Department of Industrial Engineering and Management, Yuan-Ze University, 135 Yuan-Tung Rd., Chung-Li, Taoyuan, Taiwan
    WSEAS Trans. Inf. Sci. Appl., 2007, 3 (529-536):
  • [27] Web usage mining based on WAN users' behaviors
    Yan, Hao
    Zhang, Bo
    Zhang, Yibo
    Liu, Fang
    Lei, Zhenming
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [28] Usage of annotation tags in the problem of mining similar users
    Vedernikov, Oleksii
    2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 2, 2015, : 110 - 116
  • [29] A Study of Age and Gender seen through Mobile Phone Usage Patterns in Mexico
    Sarraute, Carlos
    Blanc, Pablo
    Burroni, Javier
    2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), 2014, : 836 - 843
  • [30] Contextual patterns in mobile service usage
    Hannu Verkasalo
    Personal and Ubiquitous Computing, 2009, 13 : 331 - 342