scholarly journals A Survey of Psychological Personality Classification Approaches

2020 ◽  
Vol 4 (2) ◽  
pp. 79-89
Author(s):  
Mervat Ragab Bakry ◽  

Online social networks (OSNs) have become essential ways for users to socially share information and feelings, communicate, and thoughts with others through online social networks. Online social networks such as Twitter and Facebook are some of the most common OSNs among users. Users’ behaviors on social networks aid researchers for detecting and understanding their online behaviors and personality traits. Personality detection is one of the new difficulties in social networks. Machine learning techniques are used to build models for understanding personality, detecting personality traits, and classifying users into different kinds through user generated content based on different features and measures of psychological models such as PEN (Psychoticism, Extraversion, and Neuroticism) model, DISC (Dominance, Influence, Steadiness, and Compliance) model, and the Big-five model (Openness, Extraversion, Consciousness, Agreeableness, and Neurotic) which is the most accepted model of personality. This survey discusses the existing works on psychological personality classification.

Author(s):  
Andrea Tundis ◽  
Leon Böck ◽  
Victoria Stanilescu ◽  
Max Mühlhäuser

Online social networks (OSNs) represent powerful digital tools to communicate and quickly disseminate information in a non-official way. As they are freely accessible and easy to use, criminals abuse of them for achieving their purposes, for example, by spreading propaganda and radicalising people. Unfortunately, due to their vast usage, it is not always trivial to identify criminals using them unlawfully. Machine learning techniques have shown benefits in problem solving belonging to different application domains, when, due to the huge dimension in terms of data and variables to consider, it is not feasible their manual assessment. However, since the OSNs domain is relatively young, a variety of issues related to data availability makes it difficult to apply and immediately benefit from such techniques, in supporting the detection of criminals on OSNs. In this perspective, this paper wants to share the experience conducted in using a public dataset containing information related to criminals in order to both (i) extract specific features and to build a model for the detection of terrorists on Facebook social network, and (ii) to highlight the current limits. The research methodology as well as the gathered results are fully presented and then the data-related issues, emerged from this experience, are discussed. .


2015 ◽  
Vol 2015 (1) ◽  
pp. 41-60 ◽  
Author(s):  
Yan Shoshitaishvili ◽  
Christopher Kruegel ◽  
Giovanni Vigna

Abstract The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person). Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.


AI and Ethics ◽  
2021 ◽  
Author(s):  
Ryan Steed ◽  
Aylin Caliskan

AbstractResearch in social psychology has shown that people’s biased, subjective judgments about another’s personality based solely on their appearance are not predictive of their actual personality traits. But researchers and companies often utilize computer vision models to predict similarly subjective personality attributes such as “employability”. We seek to determine whether state-of-the-art, black box face processing technology can learn human-like appearance biases. With features extracted with FaceNet, a widely used face recognition framework, we train a transfer learning model on human subjects’ first impressions of personality traits in other faces as measured by social psychologists. We find that features extracted with FaceNet can be used to predict human appearance bias scores for deliberately manipulated faces but not for randomly generated faces scored by humans. Additionally, in contrast to work with human biases in social psychology, the model does not find a significant signal correlating politicians’ vote shares with perceived competence bias. With Local Interpretable Model-Agnostic Explanations (LIME), we provide several explanations for this discrepancy. Our results suggest that some signals of appearance bias documented in social psychology are not embedded by the machine learning techniques we investigate. We shed light on the ways in which appearance bias could be embedded in face processing technology and cast further doubt on the practice of predicting subjective traits based on appearances.


Author(s):  
Putra Wanda ◽  
Marselina Endah Hiswati ◽  
Huang J. Jie

Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Deep learning is growing algorithm that gains a big success in computer vision problem. Currently, many research communities have proposed deep learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Notably, this article describes how deep learning makes the OSN security technique more intelligent for detecting malicious activity by establishing a classifier model.


Entropy ◽  
2020 ◽  
Vol 22 (1) ◽  
pp. 119
Author(s):  
Thanh Trinh ◽  
Dingming Wu ◽  
Joshua Zhexue Huang ◽  
Muhammad Azhar

Event-based social networks (EBSNs) are widely used to create online social groups and organize offline events for users. Activeness and loyalty are crucial characteristics of these online social groups in terms of determining the growth or inactiveness of the social groups in a specific time frame. However, there is less research on these concepts to clarify the existence of groups in event-based social networks. In this paper, we study the problem of group activeness and user loyalty to provide a novel insight into online social networks. First, we analyze the structure of EBSNs and generate features from the crawled datasets. Second, we define the concepts of group activeness and user loyalty based on a series of time windows, and propose a method to measure the group activeness. In this proposed method, we first compute a ratio of a number of events between two consecutive time windows. We then develop an association matrix to assign the activeness label for each group after several consecutive time windows. Similarly, we measure the user loyalty in terms of attended events gathered in time windows and treat loyalty as a contributive feature of the group activeness. Finally, three well-known machine learning techniques are used to verify the activeness label and to generate features for each group. As a consequence, we also find a small group of features that are highly correlated and result in higher accuracy as compared to the whole features.


Author(s):  
Ruchi Mittal ◽  
M.P.S Bhatia

Nowadays, social media is one of the popular modes of interaction and information diffusion. It is commonly found that the main source of information diffusion is done by some entities and such entities are also called as influencers. An influencer is an entity or individual who has the ability to influence others because of his/her relationship or connection with his/her audience. In this article, we propose a methodology to classify influencers from multi-layer social networks. A multi-layer social network is the same as a single layer social network depict that it includes multiple properties of a node and modeled them into multiple layers. The proposed methodology is a fusion of machine learning techniques (SVM, neural networks and so on) with centrality measures. We demonstrate the proposed algorithm on some real-life networks to validate the effectiveness of the approach in multi-layer systems.


Technologies ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 64
Author(s):  
Panagiotis Kantartopoulos ◽  
Nikolaos Pitropakis ◽  
Alexios Mylonas ◽  
Nicolas Kylilis

Social media has become very popular and important in people’s lives, as personal ideas, beliefs and opinions are expressed and shared through them. Unfortunately, social networks, and specifically Twitter, suffer from massive existence and perpetual creation of fake users. Their goal is to deceive other users employing various methods, or even create a stream of fake news and opinions in order to influence an idea upon a specific subject, thus impairing the platform’s integrity. As such, machine learning techniques have been widely used in social networks to address this type of threat by automatically identifying fake accounts. Nonetheless, threat actors update their arsenal and launch a range of sophisticated attacks to undermine this detection procedure, either during the training or test phase, rendering machine learning algorithms vulnerable to adversarial attacks. Our work examines the propagation of adversarial attacks in machine learning based detection for fake Twitter accounts, which is based on AdaBoost. Moreover, we propose and evaluate the use of k-NN as a countermeasure to remedy the effects of the adversarial attacks that we have implemented.


Sign in / Sign up

Export Citation Format

Share Document