Skip to main content

social networks and coming deep personality analysis

An exerpt from this article on the social consequences of social networks and the increasing amount of time that people are spending on them follows:

"but would you want a potential employer to see pictures of you off your head in Ibiza from back in the day? With the latest figures showing that one in 13 of us are using Facebook, this redefinition of public and private is already happening."

This statement assumes that such an incident as some one partying a bit beyond their normal mode in some exotic land would be taken alone as a representation of their character. However this is not at all assured. I see the many data points that people provide on social networks as ways to gain statistical shaping of their average behavior over algorithmic judgments of their behavior over time. It is over time that the invariant nature of personality truly shows up, not in a single picture viewed out of context. That said, the question remains will such a statistical analysis be possible ?

I see absolutely no reason to think it isn't absolutely inevitable. As people built profiles on social networks that track their evolution over years and possibly decades, that deep information about the minutia of human lives will be a gold mine of data for analysis. Already Facebook uses the data from likes and the keywords used in status and wall postings to infer the amenability of individuals to advertisements but this is only a stones throw from inferring how a persons attitudes are changing over time, how those attitudes correlate with indicated life events, how those events shape new behavior. Over the massive sample of people online interacting across all the areas of their life that they can indicate on a social network a new type of predictive analysis will be able to be pieced together. I can imagine a future where such an analysis is done on a persons profile, compiled over 10 years on a site to determine how likely they are to perform certain actions but as well to infer how likely their friends might be. The potential to gain deep insights into the nature of personality will allow businesses with access to such profiles to infer for example, that the revelry in Ibiza was taken out of context or was simply a rare example (out of the set of examples known from the analysis of the sample data) of that person on the edge and should be weighed as insignificant toward the decision to hire that person for a job or some other evaluative reason.

Psychologists and sociologists will lead the way to creating these new deep life analysis tools and their work will be used by marketers to pick out the best targets both for buying their products or services but also for evangelizing those products or services to their friends. A future will come where such analysis will reveal precisely who is more likely to be a gold mine for distributing "the word" for a business. Who is more likely to buy a dress in the next 6 months and why. Who is more likely to be leaving on a vacation in the next 6 months, actions that are difficult to predict without having a specific bit of information stating intention will be predictable form the massive amount of historical data being gathered across multiple areas of interest by the social networks. It is going to be very interesting indeed to see how this shapes what is to come.


Anonymous said…
What is logically possible is that we are just being simulated on some future google server that has a few idle moments to dream up our lives from the fingerprint our true selves left behind.
David Saintloth said…
Nope, if we live in a multiverse (evidence of which seems to be positive from the recent Bicep2 announcement) I realized a devastating argument to the simulation concept in its this post from 2012:

Popular posts from this blog

Engineers versus Programmers

I have found as more non formally trained people enter the coding space, the quality of code that results varies in an interesting way.

The formalities of learning to code in a structured course at University involve often strong focus on "correctness" and efficiency in the form of big O representations for the algorithms created.

Much less focus tends to be placed on what I'll call practical programming, which is the type of code that engineers (note I didn't use "programmers" on purpose) must learn to write.

Programmers are what Universities create, students that can take a defined development environment and within in write an algorithm for computing some sequence or traversing a tree or encoding and decoding a string. Efficiency and invariant rules are guiding development missions. Execution time for creating the solution is often a week or more depending on the professor and their style of teaching code and giving out problems. This type of coding is devo…

Highly targeted Cpg vaccine immunotherapy for a range of cancer


This will surely go down as a seminal advance in cancer therapy. It reads like magic:

So this new approach looks for the specific proteins that are associated with a given tumors resistance to attack by the body's T cells, it then adjusts those T cells to be hyper sensitive to the specific oncogenic proteins targeted. These cells become essentially The Terminator​ T cells in the specific tumor AND have the multiplied effect of traveling along the immune pathway of spreading that the cancer many have metastasized. This is huge squared because it means you can essentially use targeting one tumor to identify and eliminate distal tumors that you many not even realize exist.

This allows the therapy for treating cancer to, for the first time; end the "wack a mole" problem that has frustrated traditional shot gun methods of treatment involving radiation and chemotherapy ...which by their nature unfortunately damage parts of the body that are not cancer laden but …

AgilEntity Architecture: Action Oriented Workflow

Permissions, fine grained versus management headache
The usual method for determining which users can perform a given function on a given object in a managed system, employs providing those Users with specific access rights via the use of permissions. Often these permissions are also able to be granted to collections called Groups, to which Users are added. The combination of Permissions and Groups provides the ability to provide as atomic a dissemination of rights across the User space as possible. However, this granularity comes at the price of reduced efficiency for managing the created permissions and more importantly the Groups that collect Users designated to perform sets of actions. Essentially the Groups serve as access control lists in many systems, which for the variable and often changing environment of business applications means a need to constantly update the ACL’s (groups) in order to add or remove individuals based on their ability to perform certain actions. Also, the…