Social profiling is the process of constructing a user's profile using his or her publicly and voluntarily shared social data. In general, profiling refers to the data science process of generating a person's profile with computerized algorithms and technology. There are many mediums and platforms for sharing these information with the help of the increasing number of successful social networks, including but not limited to LinkedIn, Google+, Facebook and Twitter etc.
- 1 Social profile and social data
- 2 Social media profiling
- 3 Marketing
- 4 Tools
- 5 Online activist social profile
- 6 Social credit score in China
- 7 References
A person's social data refers to the personal data that they publicly and voluntarily share either online or offline (for more information, see social data revolution). A large amount of these data, including one's language, location and interest, is shared through social media and social network. Altogether, this information can construct a person's social profile.
Personalized meta-search engines
The ever-increasing online content has resulted in the lack of proficiency of centralized search engine's results. It can no longer satisfy user's demand for information. A possible solution that would increase coverage of search results would be meta-search engines, an approach that collects information from numerous centralized search engines. A new problem thus emerges, that is too much data and too much noise is generated in the collection process. Therefore, a new technique called personalized meta-search engines emerges, which refers to a user's profile (largely social profile) to filter the search results. A user's profile can be a combination of a number of things, including but not limited to, "a user's manual selected interests, user's search history", and personal social network data.
Social media profiling
According to Warren and Brandeis (1890), disclosure of private information and the misuse of it can damage people's feelings and cause considerable damage in people's lives. Social networks provide people access to intimate online interactions; therefore, information access control, information transactions, privacy issues, connections and relationships on social media etc. have become important research fields and are subject to general concern of the public. According to Ricard Fogues and other co-authors, "any privacy mechanism has at its base an access control", that dictate "how permissions are given, what elements can be private, how access rules are defined, and so on". Current access control for social media accounts tend to still be very simplistic: there is very limited diversity in the category of relationships on for social network accounts. User's relationships to others are, on most platforms, only categorized as "friend" or "none-friend" and people may leak important information to "friends" inside their social circle but not necessarily users to they consciously want to share the information to. The below section is concerned with social media profiling and what profiling information on social media accounts can achieve.
A lot of information are voluntarily shared on online social networks, and many people rest assured that different social network accounts on different platforms won't be linked as long as they don't grant permission to these links. However, according to Diane Gan, information gathered online enabled "target subjects to be identified on other social networking sites such as Foursquare, Instagram, LinkedIn, Facebook and Google+, where more personal information was leaked".
The majority of social networking platforms use the "opt out approach" for their features. If users wish to protect their privacy, it is user's own responsibility to check and change the privacy settings as a number of them are set to default option. A major social network platforms have developed geo-tag functions and are in popular usage. This is concerning because 39% users have experienced profiling hacking; 78% burglars have used major social media networks and Google Street-view to select their victims; an astonishing 54% of burglars attempted to break into empty houses when people posted their statuses and geo-locations.
Formation and maintenance of social media accounts and its relationships with others are associated with various social outcomes. For many firms, customer relationship management is essential and partially done through Facebook. Before the emergence and prevalence of social media, customer identification is primarily functioned upon information that a firm can directly acquire: for example, it may be through a customer's purchasing process or volunteered act of completing a survey/loyalty program. However, the rise of social media has greatly reduced the process of building a customer's profile/model based on such available data. Marketers now greatly seek customer information through Facebook; this may include a variety of information users disclose to all users or partial users on Facebook: name, gender, date of birth, e-mail address, sexual orientation, marital status, interests, hobbies, favorite sports team(s), favorite athlete(s), or favorite music, more importantly Facebook connections.
First launched on the Internet in March 2006, Twitter is a platform on which users can connect and communicate with any other user in just 140 characters. Like Facebook, Twitter is also a crucial tunnel for users to leak important information, often unconsciously, but able to be accessed and collected by others.
According to Rachel Numer, in a sample of 10.8 million tweets by more than 5,000 users, their posed and publicly shared information are enough to reveal a user's income range. A postdoctoral researcher from the University of Pennsylvania, Daniel Preoţiuc-Pietro and his colleagues were able to categorize 90% of users into corresponding income groups. Their existing collected data, after being fed into a machine-learning model, generated reliable predictions on the characteristics of each income group.
Photo on the right depicts an mobile app called Streamd.in. It displays live tweets on Google Maps by using geo-location details attached to the tweet, and traces the user's movement in the real world.
The advent and universality of social media network have boosted the role of images and visual information dissemination. Many visual information on social media transmits messages from the author, location information and other personal information. In a study done by Cristina Segalin, Dong Seon Cheng and Marco Cristani, they found that profiling user posts' photos can reveal personal traits such as personality and mood. In the study, convolutional neural networks (CNNs) is introduced. It builds on the main characteristics of computational aesthetics CA (emphasizing "computational methods", "human aesthetic point of view", and "the need to focus on objective approaches") defined by Hoenig (Hoenig, 2005). This tool can extract and identify content in photos.
In a study called "A Rule-Based Flickr Tag Recommendation System", the author suggests personalized tag recommendations, largely based on user profiles and other web resources. It has proven to be useful in many aspects: "web content indexing", "multimedia data retrieval", and enterprise Web searches.
Nowadays, marketers and retailers are increasing their market presence by creating their own pages on social media, on which they post information, ask people to like and share to enter into contests, and much more. Studies show that on average a person spends about 23 minutes on a social networking site per day. Therefore, companies from small to large ones are investing in gathering user behavior information, rating, reviews, and more.
Until 2006, communications online are not content led in terms of the amount of time people spend online. However, content sharing and creating has been the primary online activity of general social media users and that has forever changed online marketing. In the book Advanced Social media Marketing, the author gives an example of how a New York wedding planner might identify his audience when marketing on Facebook. Some of these categories may include: (1) who live in the United States; (2) Who live within 50 miles of New York; (3) Age 21 and older; (4) engaged female. No matter you choose to pay cost per click or cost per impressions/views "the cost of Facebook Marketplace ads and Sponsored Stories is set by your maximum bid and the competition for the same audiences". The cost of clicks is usually $0.5–1.5 each.
Klout is a popular online tool that focuses on assessing a user's social influence by social profiling. It takes several social media platforms (such as Facebook, Twitter etc.) and numerous aspects into account and generate a user's score from 1-100. Regardless of one's number of likes for a post, or connections on LinkedIn, social media contains plentiful personal information. Klout generates a single score that indicates a person's influence.
In a study called "How Much Klout do You Have...A Test of System Generated Cues on Source Credibility" done by Chad Edwards, Klout scores can influence people's perceived credibility. As Klout Score becomes a popular combined-into-one-score method of accessing people's influence, it can be a convenient tool and a biased one at the same time. A study of how social media followers influence people's judgments done by David Westerman illustrates that possible bias that Klout may contain. In one study, participants were asked to view six identical mock Twitter pages with only one major independent variable: page followers. Result shows that pages with too many or too fewer followers would both decrease its credibility, despite of its similar content. Klout score may be subject to the same bias as well.
While this is sometimes used during recruitment process, it remains to be controversial.
Kred not only assigns each user an influence score, but also allows each user to claim a Kred profile and Kred account. Through this platform, each user can view how top influencers engage with their online community and how each of your online action impacted your influence scores.
Several suggestions that Kred is giving to the audience about increasing influence are: (1) be generous with your audience, free comfortable sharing content from your friends and tweeting others; (2) join an online community; (3) create and share meaningful content; (4) track your progress online.
Follower Wonk is specifically targeted towards Twitter analytics, which helps users to understand follower demographics, and optimizes your activities to find which activity attracts the most positive feedback from followers.
Keyhole is a hashtag tracking and analytics device that tracks Instagram, Twitter and Facebook hashtag data. It is a service that allows you to track which top influencer is using a certain hashtag and what are the other demographic information about the hastag. When you enter a hashtag on its website, it will automatically randomly sample users that currently used this tag which allows user to analyze each hashtag they are interested in.
The prevalence of the Internet and social media has provided online activists both a new platform for activism, and the most popular tool. While online activism might stir up great controversy and trend, few people actually participate or sacrifice for relevant events. It becomes an interesting topic to analyse the profile of online activists. In a study done by Harp and his co-authors about online activist in China, Latin America and United States. The majority of online activist is male in Latin America and China with a median income of $10,000 or less, while the majority of online activist is female in United States with a median income of $30,000 - $69,999; and the education level of online activists in the United States tend to be postgraduate work/education while activists in other countries have lower education levels.
A closer examination of their online shared content shows that the most shared information online include five types:
- To fundraise: Out of the three countries, China's activists have the most content on fundraise out of the three.
- To post links: Latin American activists have does the most on posting links.
- To promote debate or Discussion: Both Latin America's and China's activists posts more contents to promote debate or discussion than American activists do.
- To post information such as announcements and news: American activists post more such content than the activists from other countries.
- To communicate with Journalist: In this section, China's activists gets the lead.
Social credit score in China
The Chinese government hopes to establish a "social-credit system" that aims to score "financial creditworthiness of citizens", social behavior and even political behaviour. This system will be combining big data and social profiling technologies. According to Celia Hatton from BBC News, everyone in China will be expected to enroll in a national database that includes and automatically calculates fiscal information, political behavior, social behavior and daily life including minor traffic violations – a single score that evaluates a citizen's trustworthiness.
Credibility scores, social influence scores and other comprehensive evaluations of people aren't rare in other countries. However, China's "social-credit system" remains to be controversial as this single score can be a reflection of a person's every aspect. Indeed, "much about the social-credit system remains unclear".
How would companies be limited by credit score system in China?
Although the implementation of social credit score remains controversial in China, Chinese government aims to fully implement this system by 2018. According to Jake Laband (the deputy director of the Beijing office of the US-China Business Council), low credit scores will "limit eligibility for financing, employment, and Party membership, as well restrict real estate transactions and travel." Social credit score will not only be affected by legal criteria, but also social criteria, such as contract breaking. However, this has been a great concern for privacy for big companies due to the huge amount of data that will be analyzed by the system.
- Kanojea, Sumitkumar; Mukhopadhyaya, Debajyoti; Girase, Sheetal (2016). "User Profiling for University Recommender System using Automatic Information Retrieval". Procedia Computer Science. 78: 5–12. doi:10.1016/j.procs.2016.02.002.
- Vu, Xuan Truong; Abel, Marie-Hélène; Morizet-Mahoudeaux, Pierre (2015-10-01). "A user-centered and group-based approach for social data filtering and sharing". Computers in Human Behavior. Computing for Human Learning, Behaviour and Collaboration in the Social and Mobile Networks Era. 51, Part B: 1012–1023. doi:10.1016/j.chb.2014.11.079.
- Fontinelle, Amy (2017-02-06). "Social Data". Investopedia. Retrieved 2017-04-03.
- Saoud, Zakaria; Kechid, Samir (2016-04-01). "Integrating social profile to improve the source selection and the result merging process in distributed information retrieval". Information Sciences. 336: 115–128. doi:10.1016/j.ins.2015.12.012.
- Lawrence, Steve; Giles, C. Lee (1999-07-08). "Accessibility of information on the web". Nature. 400 (6740): 107–9. doi:10.1038/21987. ISSN 0028-0836. PMID 10428673.
- D. Warren, Samuel; D. Brandeis, Louis (December 1890). "The Right to Privacy". Harvard Law Review. IV.
- Fogues, Ricard; Such, Jose M.; Espinosa, Agustin; Garcia-Fornes, Ana (2015-05-04). "Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services". International Journal of Human–Computer Interaction. 31 (5): 350–370. doi:10.1080/10447318.2014.1001300. hdl:10251/65888. ISSN 1044-7318.
- Gan, Diane; Jenkins, Lily R. (2015-03-23). "Social Networking Privacy—Who's Stalking You?". Future Internet. 7 (1): 67–93. doi:10.3390/fi7010067.
- "Social Media And Crime". Retrieved 2017-04-23.
- Park, Namkee; Lee, Seungyoon; Kim, Jang Hyun (2012-09-01). "Individuals' personal network characteristics and patterns of Facebook use: A social network approach". Computers in Human Behavior. 28 (5): 1700–1707. doi:10.1016/j.chb.2012.04.009.
- van Dam, Jan-Willem; van de Velden, Michel (2015-02-01). "Online profiling and clustering of Facebook users". Decision Support Systems. 70: 60–72. doi:10.1016/j.dss.2014.12.001.
- Zhu, Feng; Zhang, Xiaoquan (Michael) (2013-05-29). "Impact of Online Consumer Reviews on Sales: The Moderating Role of Product and Consumer Characteristics". Journal of Marketing. 74 (2): 133–148. CiteSeerX 10.1.1.471.520. doi:10.1509/jmkg.74.2.133.
- "Money Talks--and Tweets: Start Your Search!". eds.a.ebscohost.com. Retrieved 2017-04-23.
- Segalin, Cristina; Cheng, Dong Seon; Cristani, Marco (2017-03-01). "Social profiling through image understanding: Personality inference using convolutional neural networks". Computer Vision and Image Understanding. Image and Video Understanding in Big Data. 156: 34–50. doi:10.1016/j.cviu.2016.10.013.
- Cagliero, Luca; Fiori, Alessandro; Grimaudo, Luigi (2013-01-01). Ramzan, Naeem; Zwol, Roelof van; Lee, Jong-Seok; Clüver, Kai; Hua, Xian-Sheng, eds. Social Media Retrieval. Computer Communications and Networks. Springer London. pp. 169–189. doi:10.1007/978-1-4471-4555-4_8. ISBN 9781447145547.
- "Facebook Dominates, the Emergence of reddit and Hulu: Taking a Look at 4 Years of Distracting Websites at RescueTime". RescueTime Blog. 2011-10-03. Retrieved 2017-04-07.
- Engineers., Institute of Electrical and Electronics; Society., IEEE Communications (2011-01-01). 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application : [IMSAA 11] : December 12-13, 2011, Bangalore, India. IEEE. ISBN 9781457713286. OCLC 835764725.
- Dave., Evans (2012-01-01). Social media marketing : an hour a day. Wiley. ISBN 9781118227671. OCLC 796208293.
- Tom, Funk (2013-01-01). Advanced Social Media Marketing How to Lead, Launch, and Manage a Successful Social Media Program. Apress. ISBN 9781430244080. OCLC 981044629.
- Edwards, Chad; Spence, Patric R.; Gentile, Christina J.; Edwards, America; Edwards, Autumn (2013-09-01). "How much Klout do you have … A test of system generated cues on source credibility". Computers in Human Behavior. 29 (5): A12–A16. doi:10.1016/j.chb.2012.12.034.
- Westerman, David; Spence, Patric R.; Van Der Heide, Brandon (2012-01-01). "A social network as information: The effect of system generated reports of connectedness on credibility on Twitter". Computers in Human Behavior. 28 (1): 199–206. doi:10.1016/j.chb.2011.09.001.
- Descôteaux, Josée (2009-09-01). "[Laura Archer. Her empty hands, her eyes, her instinct...and her passion]". Perspective Infirmiere: Revue Officielle de l'Ordre des Infirmieres et Infirmiers du Quebec. 6 (5): 7–8. ISSN 1708-1890. PMID 20120298.
- "China invents the digital totalitarian state". The Economist. 2016-12-17. Retrieved 2017-04-14.
- Hatton, Celia (2015-10-26). "China 'social credit': Beijing sets up huge system". BBC News. Retrieved 2017-04-14.
- "How Can Individuals, Companies be Limited by Bad Social Credit in China?: Start Your Search!". eds.b.ebscohost.com. Retrieved 2017-09-29.