Sie sind auf Seite 1von 16

1

1. Citation: E. Shmueli, V.K. Singh, B. Lepri, and A. Pentland,


”Sensing, Understanding, and Shaping Social Behavior”, IEEE
Transactions on Computational Social Systems, 2014 (to appear).
2

Sensing, Understanding, and Shaping Social


Behavior
Erez Shmueli∗ , Vivek Kumar Singh∗ , Bruno Lepri and Alex ”Sandy” Pentland

Abstract—An ability to understand social systems through the aid of understand the spread of diseases in social networks
computational tools is central to the emerging field of Computational and devise mechanisms to curtail it. Similarly a data-
Social Systems. Such understanding can answer epistemological driven approach can be used to understand which
questions on human behavior in a data-driven manner, and provide
users have the highest persuasive ability in a com-
prescriptive guidelines for persuading humans to undertake certain
actions in real world social scenarios. The growing number of works munity and incentivize them to promote healthier life-
in this sub-field has the potential to impact multiple walks of human styles.
life including health, wellness, productivity, mobility, transportation, The first aim of this paper is to provide a functional
education, shopping, and sustenance. (and not exhaustive) survey of recent advances in
The contribution of this paper is two-fold. First, we provide a sensing, understanding, and shaping human behavior.
functional survey of recent advances in sensing, understanding, and
This work broadens the existing literature by adopting
shaping human behavior, focusing on real world behavior of users as
measured using passive sensors. Second, we present a case study
a singular perspective. It focuses on real world behav-
on how trust, an important building block of computational social ior of users as measured using passive sensors.
systems, can be quantified, sensed, and applied to shape human Our work has a different focus from the large
behavior. Our findings suggest that: 1) trust can be operationalized array of recent work on understanding cyber-world
and predicted via computational methods (passive sensing and social behavior e.g. [48], [40], [45]. Clearly, each of
network-analysis), and 2) trust has a significant impact on social these approaches have advanced the state of the art
persuasion; in fact, it was found to be significantly more effective than
the closeness of ties in determining the amount of behavior change.
in understanding user-behavior in online settings.
However, multiple studies have shown that users’
Index Terms—Social systems; Persuasive computing; Mobile sens- real world behavior (face-to-face interactions, mobility
ing; Trust; Social influence. patterns, calls, life-style choices) varies dramatically
from their cyber behavior: cyber identities are often
adopted; and sometimes even in direct contrast with
1 I NTRODUCTION how users behave in the real world [90], [92]. In fact,
An ability to understand social systems through the some of the more recent ‘cyber’ studies have found
aid of computational tools is central to the emerging that most influential peers even in cyber settings are
field of Computational Social Systems. This paper those with whom the user interacts frequently in the
discusses the recent advances in computational ap- real world [10].
proaches to sense, understand and shape human behavior. Moreover, with the growth in mobile and quantified
We consider this topic to be of utmost importance sensing, we expect an ever-increasing proportion of
because: 1) it can answer epistemological questions user data to come inscribed with real-world spatio-
on human behavior in a data-driven manner, and 2) temporal coordinates and social networking platforms
provide prescriptive guidelines for persuading hu- to become more and more attuned to real world
mans to undertake certain actions in the real world face-to-face interactions. Recent adoption of ‘Places’
social scenarios. The growth spurt in this sub-field and ‘Events’ features on Facebook, a ‘mobile-first’
has the potential to impact multiple walks of human platform growth for Instagram, and ‘real-world’ social
life including health, wellness, productivity, mobility, networking on Highlight, Banjo, Glancee are all early
transportation, education, shopping, and sustenance. indicators of this transition. We expect these trends
For example, computational tools can be used to to continue and undergo exponential growth in the
coming decade.
∗ Indicates equal contribution.
This work also differs in focus from the survey
• E. Shmueli, V.K. Singh and A.S. Pentland are with the Media Lab, based approaches adopted in social psychology to un-
Massachusetts Institute of Technology, Cambridge, MA USA. E-mail:
{shmueli, singhv, pentland}@mit.edu.
derstand human behavior. While theoretically sound,
• B. Lepri is with the Media Lab, Massachusetts Institute of Technology, these surveys tend to be expensive and often un-
Cambridge, MA USA and the Fondazione Bruno Kessler, Trento, Italy. suitable for long term longitudinal analysis. Further
E-mail: lepri@fbk.eu.
they tend to be subjective and suffer from perception
3

bias [33]. However, as the field of computational aspects of human biometric signals. Efforts like face-
social systems is still evolving, we are seeing multiple recognition [95], speaker recognition [14], and gaze
studies that combine surveys with passive sensing. tracking [63] are now reasonably matured and left out
Such studies are included in the work to highlight of active in-depth discussion.
how survey based methods could potentially be aug- To provide a functional summary of the state of
mented or replaced by passive sensing methods in the the art, we organize the discussion into four cate-
near future. gories based on two dimensions: personal versus in-
The second aim of this paper is to present a case terpersonal, and short-term versus long-term behavior
study on how trust, an important building block as shown in table 1. Generally speaking, a lot more
of computational social systems, can be quantified, progress has been made on understanding personal
sensed, and applied to shape human behavior. Trust and short-term behaviors but there has been a steady
is a central component of social and economic interac- stream of research efforts focusing on other aspects in
tions among humans [59]. Bruce Scheiner in his book recent years.
’Liars and outliers’ has further argued the case that As the primary focus of this paper is on social be-
enabling trust is essential to the thriving of societies havior we will specifically highlight scenarios where
[85]. Using a rich and dense sampling of the lives of inter-personal (i.e. social) behavior has been found to
100+ participants living in a single community for a be predictive of personal actions and behavior (e.g.
year [2], we demonstrate how: (1) trust can be oper- in health, sickness, affect, emotions, and financial
ationalized through a questionnaire and trusted rela- wellbeing).
tionships be predicted using computational methods
based on passive sensing (of calls, SMS and Bluetooth 2.1 Personal + Short-term
interactions) and network analysis, and (2) trust has a
significant impact on social persuasion: it was found 2.1.1 Emotional states
to be significantly more effective than the closeness of There exists a large body of literature in machine
ties in determining the amount of behavior change. analysis of human emotions e.g. [76], [71]. Most of
The rest of the paper is organized as follows. Section these works attempt to recognize a set of prototypic
2 surveys the recent state of the art in sensing and expressions of basic emotions like happiness and
understanding human behavior. Section 3 discusses anger from either face images/video or speech signal.
how computational methods are being employed to There has been a spurt of recent work which tries
aid behavior change in social settings. Section 4 de- to use social signals as a proxy for human affect.
scribes our recent results on quantifying, predicting Multiple efforts use phone usage data to predict daily
and operationalizing trust as factor for behavioral positive and negative affective states [51] and daily
change and section 5 summarizes our contributions happiness states [9].
and presents an outlook for the emerging sub-field.
2.1.2 Actions, poses, and gestures
Various user actions such as sitting, eating, drinking
2 S ENSING AND U NDERSTANDING B EHAV-
etc. have been very well studied in image and video
IOR processing literature [12], [102]. Recent advances in
There is a rich emerging literature on understanding sensor modalities e.g. Kinect and ego-centric cameras
social behavior using sensors. The applications stud- have allowed such detections to happen at much
ied in this context include health, mobility, personal- higher accuracy and response rates [77], [93]. Similarly
ity, dating, meetings, affect, wellness, interest, gaze, there exists a plethora of work on gesture and pose
overspending, and political interests. Similarly the recognition [62], [87] using audio, visual, and related
modalities/sensors employed include audio, video, modalities. With the growth of wearable computing
GPS, accelerometers, gaze trackers, skin conductivity there are also recent trends on wearable gloves and
sensors, thermal sensing, call data records, and so on. body suits that have been used for such action recog-
In this section we sample a non-exhaustive array nition [100]. Since most of these actions are short
of works which bring out the variety of works being term effects and often detected with high accuracy
pursued. In keeping with the focus of the paper, we do there has been little active interest in employing social
not consider purely cyber-behavior or purely survey- sensing mechanisms for these types of actions and
driven real-world behavior. Similarly we study indi- poses.
vidual behavior, social behavior and their interplay There is also an emerging growth in sensor modali-
but leave out the pure community/network under- ties and the kind of measurements about human body
standing literature. Further, wherever possible we possible via them. For example, there have been a
focus on higher level derived features and behav- growth of ‘quantified-self’ sensors that measure the
iors rather than raw sensing via a modality. Lastly, distance and the steps walked, calories burnt, ac-
the sensing and signal processing community has celerometer, heart rate, body temperature, gaze, skin
made significant progress at understanding different conductance, portable ECG scans, sugar levels, and
4

TABLE 1
A summary of works on sensing and understanding behavior
Personal Inter-personal
Short-term Emotional states [76], [71], [51], [9] Roles in meetings [37], [30], [103], [61], [5], [67]
Actions, poses, and gestures [62], [87], [77], [93], Outcomes of short-term group interactions [73] ,[72], [33],
[62], [87] , [100] [26], [25]
Long-term Personality [6],[75],[26], [89], [17] Community structure[33], [56], [49]
Health and wellness [23], [56], [20], [55] Organizational effectiveness [68], [66]
Financial behavior [47], [88] , [70]

so on. However these devices measure body signals that can be used to detect the onset of contagious
rather than long term behavior and hence are left outbreaks. In fact they show how the social net-
outside the main focus of this survey. work structure can be used to identify certain ‘hubs’
whose monitoring allows for a much earlier and
2.2 Personal + Long term more accurate prediction of the onset of the outbreak.
Again, [55] uses high-resolution data on face-to-face
2.2.1 Personality
interactions in a pediatric hospital ward, obtained
Personality is often described as the long term ty- from wearable proximity sensors, for simulating the
pology of innate human characteristics that influ- spread of a disease inside this community. A review
ence multiple actions taken by an individual. Hence of the recent efforts at using mobile phones for health
identifying it is of interest in multiple applications sensing been presented in [99] and ’perspectives on
including healthcare, product recommendation, and Pervasive Health from some of the field’s leading
financial well-being. A number of different theories researchers’ can be found in [28].
have been defined to study personality. However the
most commonly used approaches are the Big-5 [39] 2.2.3 Financial behavior
and the locus-of-control [74]. Both have been studied There has been a small but active movement towards
by multiple groups using different modalities. For using spending and other financial logs of users to
example [6] describes a method for using short in- identify their spending behavior. For example, [47]
troduction videos created by users to identify aspects analyzed the spending logs for a large population and
of their big-5 personality traits. Similarly [75] uses a found that individuals who tend to have a positive
combination of audio-visual features to identify both economic outlook tend to visit diverse geo-locations
big-5 and locus-of-control personality traits. for spending.
Interestingly, multiple efforts have started exploring There is growing evidence that an individual’s fi-
the use of social signals e.g. interactions with others nancial parameters: both income and spending are
via mobile phones to identify personality traits. For closely related to the social behavior. For example
example, [26] and [17] describes methods that use [70] has found that more socially diverse individu-
the cell-phone usage characteristics (e.g. time taken to als tend to have higher income. Similarly [88] has
respond, incoming vs outgoing call ratio, number of found that couple’s spending behavior in terms of
sent/received SMS) to predict personalities. Instead, the propensity to explore diverse businesses, become
[89] shows that individual personality traits can be loyal customers, and overspend can be predicted by
predicted using structural characteristics (centrality analyzing their social behavior.
measures, triads, transitivity) extracted from the call
and proximity networks obtained from mobile phone
2.3 Interpersonal + Short-term
data.
2.3.1 Roles in meetings
2.2.2 Health and wellness Understanding user roles in official meetings has gen-
Multiple efforts have been combining quantified-self erated significant research interest [37]. For example,
signals to create longer term reports of healthiness [5] described a method for using audio features for
of individuals. For example, The UbiFit Garden [23], detecting roles in meetings. Multiple efforts since then
a joint project between Intel and the University of have employed audio-visual sensing to undertake
Washington, captured levels of physical activity and more sophisticated analysis of meeting roles [30],
related this information to personal health. [103], [61]. As summarized in [37], different research
Recently, multiple efforts have explored the use of groups have focused on different aspects of this
social sensing to detect flu onset both at an individual process, including interaction management, internal
and a community level. For example [56] and [31] states, and relationships. While most of the research
show how phone based social interaction features (e.g. has been undertaken using audio and visual sensors,
locations visited, people encountered) can be used to other sensors like socio-metric badges have also re-
predict the onset of influenza. Similarly [20] presents a cently been applied for analyzing meeting behavior
method for wi-fi based tracking of social interactions [67].
5

2.3.2 Outcomes of short-term group interaction behavior. Using on-body sensors in large groups of
Pentland [73] argues that certain inter-personal sig- people for extended periods of time in naturalistic
nals have deep biological roots and provoke largely settings, they tried to identify, measure, and quantify
automatic responses in nearby others, modifying their social interactions, group behavior, and organizational
mood, level of trust, interest, etc. These signals and dynamics. Using these automatic measurements, they
their response thus form an independent ’side chan- were able to predict employees self-assessments of
nel’ parallel to the linguistic channel. Such signals job satisfaction and their own perceptions of group
include gaze, interest level, dominance, as well as interaction quality.
social features like conversational turn taking. There Similarly, in another effort [66] the authors found
is growing evidence that such features can be used that the social interaction patterns between nurses
to predict salary negotiations, hiring interviews, and could be used to predict the daily average length of
speed-dating conversations [25]. These works are stay (LOS) and number of delays for their patients.
based on vocal social signals including overall activity
(the total amount of energy in the speech signals), 3 S HAPING B EHAVIOR
influence (the statistical influence of one person on the
speaking patterns of the others), consistency (stability Most of the research on persuasive technologies is
of the speaking patterns of each person), and mimicry comprised under the umbrella of the term captology
(the imitation between people involved in the inter- [34], which refers to the study of machines designed
actions). Similarly, other works have used cellular to influence people’s attitudes and behaviors through
phones equipped with proximity sensors and vocal persuasion and social influence but not through co-
activity detectors to undertake automatic analysis of ercion. In particular, a number of applications have
everyday social interactions in groups of several tens been recently designed and implemented to promote
of individuals [72], [33]. positive behaviors like eating healthy foods, reducing
carbon footprint, stopping smoking habits, and so
on. Automatic persuasive interventions could have
2.4 Interpersonal + Long-term
a number of advantages: first of all, they are cost-
2.4.1 Community structure: closeness, trust, strength efficient. Then, they can be delivered anytime and
of ties, and friendship anywhere: for example, just when they can have
The work on using passive sensing to understand the highest impact on the users. Studies conducted
friendships, social ties, and the ensuing community in public places showed that motivational messages
patterns was pioneered by Eagle and Pentland in delivered at the time of making a choice inspired
their ‘reality mining’ work [33] in 2006. Since then, individuals to take simple decisions to improve their
there have been multiple efforts that have shown how health, such as choosing a staircase and not an es-
Bluetooth, infra-red, wi-fi, and GPS sensors logs can calator [41]. However, if we contrast persuasion in
be used to infer social structure and closeness of ties human-human interaction and persuasion in human-
[56], [49]. While bluetooth and infra-red sensing are machine interaction, we still have a limited capability
typically used for indoor one-on-one interaction as- of machines for real-time understanding of people’s
sessment, wi-fi and GPS logs are used for coarser (but individual traits, activities and social dynamics. As a
often wider coverage) analysis of people’s mobility consequence, most of the current persuasive systems
and co-location patterns. lack flexibility and cannot personalize and adapt their
Our case study in this paper (detailed in section message to the broader context the target person(s) is
4) pays particular attention to the role of trust in (are) in.
social ties. In particular we show how call, sms, and As we described in Section 2, the automatic anal-
Bluetooth based social interaction signals can be used ysis of human behavior has been progressing in the
to predict trust in relationship and quantify its role in last few years thanks to the shared awareness that
mediating persuasion. computer systems can provide better and more ap-
propriate services to people only if they can under-
2.4.2 Organizational effectiveness stand much more about their attitudes, preferences,
People’s social ties and flow of information and ex- personality, social relationships etc., as well as about
pertise are closely tied to their performance. While what people are doing, the activities they have been
this is obvious already through short-term meet- engaged in the past, their routines and lifestyles.
ing scenarios, the real impact lies in understanding In our survey of persuasive systems we will focus
long-term longitudinal performance. [68] describes a mainly on systems that use information about behav-
method that uses wearable electronic badges capable iors obtained by passive sensing to induce behavioral
of automatically measuring the amount of face-to- changes on users.
face interaction, conversational time, physical prox- Following the definition given by Oinas-Kukkonen
imity to other people, and physical activity levels in and Harjumaa [65], we also characterize persuasive
order to capture individual and collective patterns of technologies looking at how they induce changes
6

on behaviors: (i) through a direct interaction and a large portion of the work in the field of persuasive
resorting to a human-computer persuasion strategy or systems have resorted to an active role of the computer
(ii) through a mediation and so resorting to computer- and to a direct human-computer interaction.
mediated persuasion strategy (see table 2). In the first For example, several persuasive systems use a goal-
case, the system plays an active role and uses in- setting strategy [53] as key component for inducing
teraction patterns similar to social communication to behavioral changes. In Fish’n’Steps [52] each partic-
induce a change in the user. This approach assumes ipant has assigned a step count goal for each week
that the computing system have a strong interaction of the study. Then, the ability of the participants in
with the user. In the second case, the system behaves reaching their daily step count goal is mapped to the
in an implicit way: it may purposely work as a trig- state (growth and emotional state) of a virtual pet,
ger of an informational cascade or it may purposely a fish in fish tank. Similarly, Gasser et al. employed
build links among people or it may simply show the assigned goals in their study of lifestyle automated
behavior of peers to induce mimicry. The first two coaching to provide users with feedback about their
examples are network interventions while the latter is physical activity and vegetable and fruit intake [36].
a social comparison strategy. In general, the computer- More recently, Consolvo et al. [24] designed UbiFit,
mediated approach has the advantage of not requiring a mobile application that shows to the users detailed
a strong and long interaction with a machine and information about their activity behavior and the
to use the innate ability of humans to engage in goal-attainment status. UbiFit uses several sensors
relationships characterized by social influence, peer embedded in the Mobile Sensing Platform (MSP) [18]
pressure, and mimicking. for inferring different type of activities (e.g. walking,
cycling, running, etc.). The metaphor used for giving
feedback is the one of a garden that blooms during
3.1 Human Computer Persuasion the week as physical activities are performed. Differ-
The Computers as Social Actors (CASA) paradigm ent types of flowers represent the types of activities
have argued that people apply social rules to com- relevant for the American College of Sports Medicine
puters [81]. Following this paradigm, the captology (ACSM): Cardio (pink flowers), Strength (blue), Flex-
researchers have explored the usage of computers as ibility (white), and Walking (sunflowers).
persuaders. When the computers are used as per- Houston [22] and Chick Clique [94] adds to this
suaders, often the designers assumes that the sys- goal-setting strategy a social dimension giving to the
tem is the focus of the attention of the user and users the functionality of sharing their step counts
he/she exploits the fact that computers invoke so- and their progress toward daily step goals with other
cial responses from users (especially, but not only, users.
when being endowed with anthropomorphic charac- More recently Orji et al. [69] have discussed how the
teristics). In particular, the majority of these studies persuasive messages can be customized to different
investigated the persuasiveness of a computer agent personality types (based on 7 classes for gamers based
delivering a monologue. Stern et al. [1] compared the on BrainHex1 ) and connected the findings with the
persuasiveness of a message delivered by recorded psychology of health behavior change (as identified
human speech to the same message delivered by by Health Belief Model [83]) to find patterns in
synthesized speech. The human voice was perceived gamers motivation that can inform the choice of game
as more favorable, but no differences in persuasion mechanics in designing games to motivate behavior
were found. change. Similarly Kaptein et al. [44] discuss how
Bickmore et al. [8] designed Laura, an animated persuasive messages work differently for users with
conversational agent displayed on a wall-mounted different ‘persuadability scores’. However, the role
touch screen display, who acts as a virtual exercise played by the system is still an active role.
advisor. In their study, the participants had to ne- Purpura et al. [78] provide a critical discussion on
gotiate with Laura the daily step count goal. The the social and ethical aspects of such persuasive sys-
negotiation took into account the current day’s num- tems, which essentially tread on the thin line between
ber of steps and the step count history and tried persuasion, encouragement, and coercion. Lastly, a
to gradually move each participant to her/his final great summary of the other recent efforts in persua-
step count goal at the end of the study. In a more sion (especially in health scenarios) is provided in
recent study, Schulman and Bickmore [86] described [28].
the effects of a computer agent designed to engage
a user in a persuasive dialogue on attitudes about 3.2 Computer Mediated Human-Human Persua-
regular physical exercise. The outcomes of the study sion
showed that participants had a significant increase in Recently, some studies suggested that social inter-
positive attitudes following the persuasive dialogue. actions can be used by machines to induce users’
Even when no explicit effort is done by the design-
ers to have machines being perceived as social entities, 1. http://blog.brainhex.com/
7

TABLE 2
A summary of works on shaping behavior
Human-Computer Persuasion Computer Mediated Human-Human Persuasion
Conversational Agents [8], [86], [69], [44] Social Awareness [7], [29], [91], [46], [4]
Goal-setting [52], [36], [24], [22], [94] Network Interventions [2], [58], [98]

behavioral change without requiring an active role by trust within geographically separated groups that are
the computer and a direct and exclusive interaction using the Meeting Mediator.
with the users. As we said, the advantages of using Another interesting study is the one conducted by
the computer as a mediator and not as direct per- Balaam et al. [4] in which a multi-user public display
suader is mainly related to the possibility of using was used to enhance the interactional synchrony vi-
the behaviors of peers for inducing changes. Here, sualizing subtle feedback about users’ behavior. The
we survey systems using 2 different strategies based findings from this study suggest that social dynamics
on a computer-mediated persuasion. The first one is a can be used by machines to support group behavior
social comparison strategy where the role of system without requiring a direct and exclusive interaction
is to show information about peers behaviors to elicit with the users. Finally, Baumer et al. [7] have pre-
indirectly in the user a better awareness of his own sented an argument for the design of ‘open-ended’
behavior or a tendency to mimic the behavior of social awareness systems where users can define their
others. The second one, instead, is based on network own health goals by looking at their and their peers
interventions whereby the role of the system may be mobile health data. In all these examples, the focus is
to suggest a change in the network structure or to hint specifically on human-human interaction rather than on
specific peer-to-peer interactions. In both the cases the explicit human-computer interaction.
computer makes use of people to induce changes on
the user. 3.2.2 Network Interventions
Several studies have highlighted the influence of so-
3.2.1 Social Awareness cial networks on individual behaviors [19], [96], and
Some recent works have attempted at devising sys- [97]. In a recent review published on Science, Valente
tems that present members of working group with [97] made an effort to systematize the research efforts
information about their social behavior, with the goal on network interventions, namely purposeful efforts
of modifying it and making it more conducive to to leverage social networks and social network data
efficient group dynamics [7] ,[29], [46], and [91]. to generate social influence, induce and accelerate
DiMicco et al. [29] have investigated several periph- behavioral change and/or pursue and achieve desir-
eral displays that visualize the amount of participa- able outcomes among individuals, communities, or-
tion of a small working group member in terms of ganizations, etc. In particular, Valente identified four
speaking activity, with the purpose of stimulating self- major classes of network interventions: (i) targeting
reflection and improving individual social behavior. the influential subjects and use them for spreading the
A similar approach with the same purpose was desired behavior, (ii) segmenting and targeting groups
pursued by Sturm and colleagues [91] using a tabletop with particular network characteristics, (iii) altering
device as peripheral display to show not only the (or designing and building) the network structure,
speaking time but also the gaze behavior of the par- and (iv) inducing particular peer-to-peer interaction.
ticipants. Their results are similar to the ones found A recent study, conducted by our group [2], tested
by DiMicco et al.: less overlapping speech, but no an experimental intervention for inducing changes
effect on gaze behavior. In both these studies, the in fitness-related physical activities and habits. The
information about the behavior of each individual intervention was based on inducing particular peer-
member was available to the whole group. to-peer interaction and, more specifically, on a social
Kim et al. [46] designed the Meeting Mediator, a mechanism in which subjects were rewarded based
mobile system that detects social interactions and pro- on their peers performance rather than their own.
vides real-time feedback to enhance group collabora- The main idea behind this mechanism is to incen-
tion and performance. Social interactions are captured tivize subjects to exert (positive or negative) pressure
using Sociometric Badges [68]. The badges can collect on peers (see [58] for a theoretical foundation of
unbiased and richer data than traditional methods by the mechanism). In reality, such peer pressure may
sensing body movement, proximity to other badges, take many forms other than incentivizing fitness-
and speech characteristics such as speaking speed and related physical activities. For instance, in an energy
tone of voice. By visualizing this data in real-time on consumption scenario examples of positive pressure
the mobile phone of each user, the Meeting Mediator include giving energy-saving advices to a neighbor
induces changes in group collaboration patterns. In while examples of negative pressure include inducing
particular, the results shows greater productivity and guilt or shame [43]. As we said, in [2] the goal was
8

to encourage people to increase their daily physical [79]. At the society level, high levels of trust impose
activity. The physical activity level was captured using social controls on political and economic institutions,
the accelerometer sensors of the participants’ mobile thereby increasing accountability, productivity and
phones. effectiveness [79]. Scheiner further argued trust to be
Each participant had assigned two peers: some essential to the thriving of societies [85].
participants had close friends as their peers while Despite its importance, a clear scientific definition
other participants had strangers as their peers. of trust that is well accepted across disciplines is
The study tested three different conditions: (i) missing. To illustrate that, a recent study by Castaldo
the ”self-monitoring” control condition (or individual [15] pulled together 72 published definitions of trust
feedback), whereby participants were rewarded for from numerous academic disciplines. Following are a
their own increased physical activity, (ii) the ”peer- few commonly used definitions:
view” condition (or social comparison), whereby the
• ”an individual may be said to have trust in the
participant was shown the buddies’ physical activities
occurrence of an event if he expects its occurrence
levels, but she/he was still rewarded for his/her own
and his expectation leads to behavior which he
activity level, and (iii) the ”peer-reward” condition,
perceives to have greater negative motivational
in which the buddies instead received a reward pro-
consequences if the expectation is not confirmed
portional to the participants activity. This condition
than positive motivational consequences if it is
simulates a network intervention and, more precisely,
confirmed” [27].
the social mechanism based on inducing peer-to-peer
• ”accepted vulnerability to another’s possible but
interactions and peer pressure.
not expected ill will (or lack of good will) toward
A more detailed explanation of this study is re-
one” [3].
ported in Section 4.4 where we analyze in detail the
• ”the willingness of a party to be vulnerable to the
role played by levels of closeness and trust on the
actions of another party based on the expectation
efficacy of ”peer-view” and ”peer-reward” conditions.
that the other will perform a particular action
In a work environment setting, Waber et al. [98]
important to the trustor, irrespective of the ability
conducted a two-phase study to investigate the effects
to monitor or control that other party” [59].
of strong relationships inside social groups and to
• ”The extent to which a person is confident in, and
investigate how to increase the strength of groups in
willing to act on the basis of, the words, actions,
the workplace. In the first phase of the study, the re-
and decisions of another” [60].
searchers measured the interactions between workers
• ”a state involving confident positive expectations
at the call center of a large bank based in US. These
about another’s motives with respect to oneself
interactions were measured using Sociometric Badges
in situations entailing risk” [50].
[68]. They found that the strength of an individual’s
• ”expectations, assumptions or beliefs about the
social group is positively associated to the productiv-
likelihood that another’s future actions will be
ity. In the second phase of the study, the researchers
beneficial, favorable or at least not detrimental”
showed that by giving breaks to employees at the
[82].
same time they increased the strength of the social
• ”a psychological state comprising the intention to
groups of an individual. Interestingly, the interven-
accept vulnerability based upon positive expec-
tion had an effect not only on the strength of the
tations of the intentions or behavior of another”
individuals social networks but also on increasing the
[84].
productivity of the individuals. This study could be
considered another example of network intervention Note that multiple fields like sensor networks, elec-
and in particular a good example of altering/building tronic commerce, and multi-agent coordination also
the network structure. employ ‘trust’ as a term to capture aspects of rep-
utation, sensor veracity or authority. Our focus on
this paper is on inter-personal relationships between
4 T RUST human beings. However, as can be seen above, even
Trust is a central component of social and economic within the interpersonal/social focus, there exist mul-
interactions among humans [57]. Trust is often linked tiple variations in the definition of trust. This variety
with the functioning of individuals, organizations and of trust definitions and the differences between them
societies, resulting, usually, in positive outcomes. For is described by Borum [11] as follows: ”The science
instance, an individual that has an extensive net- is improving, but there is still a sense that, as in
work with high levels of trust, may obtain dividends the proverb, researchers are often trying to define an
from collaboration with others, by increasing access elephant, while only being able to touch a particular
to distinct resources [21]. In organizations, trust is part of it.”.
seen as a catalyst for collaboration and coordina- In this section we suggest a way to computationally
tion between individuals which have the potential to operationalize trust, measure it via passive sensing,
improve information diffusion and innovation [13], and quantify its effect on social persuasion.
9

4.1 Datasets subjects daily life as possible.


A partial version of the Friends and Family dataset
In this study, we use the Friends and Family dataset,
is publicly shared for the research community 2 .
first introduced by Aharony et al. [2]. The Friends and
Family dataset is based on a yearlong study, which
used the ”Funf” mobile phone platform, surveys, 4.2 Operationalizing trust
receipts/credit card statement, and a Facebook appli- As previously pointed out, trust has no clear scientific
cation, to collect an immensely rich and dense dataset definition common to different disciplines. Moreover,
on the lives of the 130 participants (approximately the meaning of ”trusting someone in a relationship” is
64 families). The participants were all members of dependent on the context of the relationship. Indeed,
a young-family residential living community at a a subject X may trust a subject Y in a professional
major North American university. All members of the context but she may not trust the same person for
community were couples, in which at least one of the babysitting her children. For this reason, we designed
members was affiliated with the university. The com- a questionnaire, having a simple operative way for
munity was composed of over 400 residents, approx- assessing the trust relationship between two individu-
imately half of which had children. The community als. The questionnaire aims at modeling three different
had many ties of friendship between its members dimensions of trust (i.e., health, finance and family) by
Each participant was equipped with an Android- asking the following questions:
based mobile phone incorporating the Funf platform. 1) Would you ask person X for help in sickness?
This platform is essentially a passive sensing software 2) Would you ask person X for a hundred dollar
explicitly designed for collecting mobile data, such as loan?
Bluetooth of nearby devices, call and SMS logs, GPS 3) Would you ask person X for babysitting?
location and accelerometer. In this paper, we focus on
The rationale behind the choice of these questions is
the Call, SMS and Bluetooth logs.
that they cover the three key ingredients of the daily
In addition to the passive data collection, sub- life of our participants: health, finance, and family.
jects completed surveys at regular intervals. Monthly The questionnaire was administered to the partici-
surveys included questions about self-perception of pants of the Friends and Family study, at the begin-
relationships, group affiliation, interactions, and also ning of the study, and their answers are utilized in
standard scales like the Big-Five personality test [42]. the following subsections as a measure of trust.
Daily surveys included questions like mood, sleep,
and other activity logging. In this paper, we focus on
a survey administered as part of the study in order 4.3 Predicting trust
to determine the closeness and trust relationships In this section, we demonstrate how the interaction
between participants. between a pair of individuals, captured through sen-
As incentive, the participants were able to keep the sors in their mobile phone devices, can be used to
phone at the end of the study, and were compensated predict the trust relationship between them.
extra for every out-of-routine task, such as filling out
surveys. Moreover, participation in interventions or 4.3.1 Features and target variables
sub-experiments was completely optional. We considered three modalities for user interactions:
Compared with previous social computing obser- Calls, SMS and Bluetooth (BT) logs. Each of these
vatory studies (e.g. [64], [33], [32]), the Friends and interaction modalities captures a different mode of
Family community includes a more diverse subject human interaction.
pool and provides a unique perspective into a phase • BT logs: captured the physical co-location of par-
of life that has not been traditionally studied in the ticipants. The BT logs were created by scanning
field of ubiquitous computing - married couples and for nearby devices every five minutes in order
young families. to provide an estimate of the face to face inter-
The study undertaken was approved by the Insti- actions happening between the participant and
tutional Review Board (IRB) and conducted under other individuals. Knowing the BT identifiers of
strict protocol guidelines. The protection of partic- each smartphone in the study, we could thus
ipant privacy and sensitive information was a key infer when two participants’ phones were in
consideration. For example, data were linked to coded proximity. The five minutes sampling frequency
identifiers for participants and to not their real world prevented draining the battery while achieving a
personal identifiers. All human-readable text, such as high enough resolution to detect social interac-
phone numbers and text messages, was captured as tion.
hashed identifiers, and never saved in clear text. Col- • Call logs: captured distant, synchronous interac-
lected data were physically secured and de-identified tions. Hence the interacting individuals could be
before being aggregated for analysis. Additionally,
data collection was designed to be as unobtrusive to 2. http://realitycommons.media.mit.edu/friendsdataset.html
10

at different locations but were communicating at combination (All) to classify one trust variable (Health,
the same time. Finance, Family and All).
• SMS logs: captured the distant, asynchronous, For our experiments, we used the Weka software
textual interactions. Unlike calls, and face-to-face (version 3.68) [38] and applied the J48 classifier (based
interaction, in this interaction mode the users on C4.5 [80]) with the following default settings:
could be separated in both space and time. use unpruned tree (U)=false; Confidence threshold
For each relationship (u1 , u2 ), between the two par- for pruning (C)=0.25; minimum number of instances
ticipants u1 and u2 , in the Friends and Family dataset, per leaf (M)=2; use reduced error pruning (R)=false;
we extracted six social-behavioral features from each number of folds for reduced error pruning(N)=3; use
one of the three interaction networks above (i.e., Call, binary splits only (B)=false; do not perform subtree
SMS and BT): raising (S)=false; do not clean up after the tree has
been built (L)=false; Laplace smoothing for predicted
1) The number of interactions between u1 and u2 .
probabilities (A)=false; seed for random data shuffling
2) The total number of interactions for u1 .
(Q)=1.
3) The total number of interactions for u2 .
4) The betweeness centrality of the edge (u1 , u2 ). We employed a ten-fold cross validation strategy.
5) The betweeness centrality of the node u1 . Hence, each experiment consisted of executing 10 clas-
6) The betweeness centrality of the node u2 . sification tasks as follows. First, the whole dataset was
divided into ten partitions. Then in each execution,
Where the betweeness centrality of a node/edge is one of the 10 partitions was used for testing and the
the number of shortest paths from all nodes in the net- remaining 9 partitions were used for training. Finally,
work to all others that pass through that node/edge the results of the 10 classification tasks were averaged.
[35].
Figure 1 shows the accuracy (i.e., the percentage
We also defined three YES/NO target variables,
of correctly classified instances) for each one of the
Health, Finance and Family, corresponding to the three
16 trust-level classification experiments. For compari-
trust domain questions that were described in Sub-
son, we also include the accuracy of a simple ZeroR
section 4.2. In addition, we defined a fourth variable,
classifier which always return the majority class as
ALL, which had the value YES if at least one of the
prediction. Since the dataset is highly imbalanced, the
three other corresponding variables had the value
accuracy of the ZeroR classifier is already high and
YES, and NO otherwise.
ranges between 81.88% to 90.94%. Nevertheless, the
J48 with any one of the four sets of features outper-
4.3.2 Preprocessing forms the results of the ZeroR classifier. For example,
In order to reduce noise caused by participants with when using the All set of features, the accuracy ranges
incomplete data, we performed two stages of filtering: between 93.89% and 95.04%.
(1) We retained only relationships for which both
participants had at least one call, one SMS and one 100

BT interactions during the period of the study and 95

(2) We retained only relationships for which the three 90 J48 - Call
Accuracy (%)

trust questions were filled. At the end of the two J48 - SMS
85
filtering stages, our dataset contained 916 instances J48 - BT

(i.e., relationships with 24 social-behavioral features 80 J48 - All


ZeroR - None
and 4 trust target variables). 75
Unsurprisingly, for each one of the trust domains,
70
the number of trusted instances was significantly Health Finance Family All
smaller than the numbers of untrusted instances. For
example, for the Health variable, only 148 out of the Fig. 1. Classification of trust-level: Accuracy results.
916 values were YES. Similarly, the Finance variable The error bars depict the 95% confidence intervals
had only 83 YES values, the Family variable had only (over the 10 fold executions).
136 YES values and the All variable had only 166 YES
values.
Since the dataset is highly imbalanced, we also
applied two well-known measures for assessing the
4.3.3 Experimental setup and results quality of classification in the case of imbalanced
We turn now to investigate the predictive power of the datasets.
social-behavioral mobile features at classifying trust Figures 2 and 3 show the Area Under the ROC
variables. Curve (AUC) measure and the F measure respectively,
We performed a total of 16 trust-level classification for each one of the 16 trust-level classification exper-
experiments. Each experiment consisted of using the iments. As can be seen in the figures, for each one
features of one modality (Call, SMS, BT) or their of the 16 experiments, the results obtained by the
11

J48 classifier are significantly better than those of the 4.4 Social influence and trust
baseline ZeroR classifier. Trust is integral to the idea of social influence - it
is easier to influence or persuade someone who is
1.2 trusting and people tend to mimic actions more often
1 of those who they trust (e.g. [54]). In this section, we
demonstrate the above idea using the FunFit experi-
0.8 J48 - Call
ment that was first described in [2]. In addition, we
Accuracy (%)

J48 - SMS
0.6
J48 - BT show, that under certain circumstances, trust plays a
0.4 J48 - All more significant role than closeness, when it comes to
ZeroR - None
social influence.
0.2
FunFit is a fitness and physical activity experimen-
0
Health Finance Family All
tal intervention conducted within the Friends and
Family study population between October to Decem-
Fig. 2. Classification of trust-level: AUC results. The ber of 2010. The experiment was presented to partici-
error bars depict the 95% confidence intervals (over pants as a wellness game to help them increase their
the 10 folds executions). daily activity levels. 108 subjects elected to participate
and were divided into three experimental conditions:
1) Control - subjects saw only their own progress
and were given reward based solely on their
1
own activity.
0.9
0.8
2) Peer View - subjects were shown their own
0.7 progress and the progress of two ”buddies” also
J48 - Call
Accuracy (%)

0.6
J48 - SMS in the same experimental group, and were given
0.5
J48 - BT reward based solely on their own activity.
0.4
0.3
J48 - All 3) Peer Reward - subjects were shown their own
ZeroR - None
0.2 progress and the progress of two ”buddies”
0.1 also in the same experimental group, but their
0
Health Finance Family All
rewards depended solely on the performance of
their buddies.
Fig. 3. Classification of trust-level: F Measure results. Out of the 108 subjects, eleven subjects were re-
The error bars depict the 95% confidence intervals moved from the study pool due to prolonged tech-
(over the 10 folds executions). nical issues that prevented reliable activity tracking,
long durations of out of town travel, or dropping out
of the longitudinal study entirely. The remaining 97
Figures 1-3 also illustrate the difference in predic- subjects were distributed among the three experimen-
tion power between the different modalities. As can tal groups as follows: 16 in the Control group, 40 in
be seen across the three figures, the Call features seem the Peer View group and 41 in the Peer Reward group.
to obtain better classification results than the SMS The Peer Reward condition involved peer-to-peer
features, which in turn obtain better results than the payment incentives, and the effects of mixing of
BT features. The results for the All features seem to money and personal relationship is known to be com-
be in par with those of the Call features (i.e., the SMS plex and context-dependent. Since our sample size
and BT features do not add prediction power on top was not large enough to analyze the relationship be-
of the Call features). tween trust, amount of peer-to-peer economic reward,
One explanation to the poor prediction ability of and experimental outcome, we decided to focus on
the BT features compared to that of the Call and the Peer View condition in our analysis.
SMS features is the specific setting of the Friends and During the initial 23 days of the experiment (Oct 5
Family study. A lot of the face to face interactions - Oct 27), denoted as P1, the baseline activity levels
between participants are likely to happen by chance, of the subjects were collected. The actual intervention
due to the small geographical region that they all live period was divided into two periods: Oct 28 - Nov
in. Call and SMS interactions on the contrary, require 15, denoted as P2, and Nov 16 - Dec 5, denoted
explicit actions by the interacting sides. These results as P3. During these two intervention periods, the
corroborate the findings of [101] that networks de- subjects were given feedback on their performance
rived from co-location and face-to-face conversations in the form of a monetary reward. The monetary
may be quite different. reward was calculated as a function of the subject’s
Table 3 summarizes the results of the 16 experi- activity and was divided according to the subject’s
ments together with the results of the four ZeroR experimental condition. The game was not designed
experiments. as a competition, and every subject had the potential
12

TABLE 3
A summary of the trust classification results.

Target Features Model Instances YES NO TP FP TN FN Precision Recall Accuracy AUC F


Health Call J48 916 768 148 113 16 752 35 0.88 0.76 94.43 0.91 0.82
Health SMS J48 916 768 148 95 20 748 53 0.83 0.64 92.03 0.86 0.72
Health BT J48 916 768 148 81 41 727 67 0.66 0.55 88.21 0.84 0.60
Health All J48 916 768 148 111 18 750 37 0.86 0.75 94.00 0.89 0.80
Health None ZeroR 916 768 148 0 0 768 148 0.00 0.00 83.84 0.50 0.00
Finance Call J48 916 833 83 47 14 819 36 0.77 0.57 94.54 0.74 0.65
Finance SMS J48 916 833 83 30 13 820 53 0.70 0.36 92.79 0.71 0.48
Finance BT J48 916 833 83 9 9 824 74 0.50 0.11 90.94 0.57 0.18
Finance All J48 916 833 83 51 13 820 32 0.80 0.61 95.09 0.83 0.69
Finance None ZeroR 916 833 83 0 0 833 83 0.00 0.00 90.94 0.50 0.00
Family Call J48 916 780 136 96 22 758 40 0.81 0.71 93.23 0.88 0.76
Family SMS J48 916 780 136 78 13 767 58 0.86 0.57 92.25 0.80 0.69
Family BT J48 916 780 136 56 33 747 80 0.63 0.41 87.66 0.83 0.50
Family All J48 916 780 136 103 21 759 33 0.83 0.76 94.10 0.89 0.79
Family None ZeroR 916 780 136 0 0 780 136 0.00 0.00 85.15 0.50 0.00
All Call J48 916 750 166 132 17 733 34 0.89 0.80 94.43 0.92 0.84
All SMS J48 916 750 166 101 17 733 65 0.86 0.61 91.05 0.81 0.71
All BT J48 916 750 166 86 52 698 80 0.62 0.52 85.59 0.84 0.57
All All J48 916 750 166 133 23 727 33 0.85 0.80 93.89 0.89 0.83
All None ZeroR 916 750 166 0 0 780 136 0.00 0.00 81.88 0.50 0.00

to earn the maximal reward (up to $5 was allocated according to their closeness level to their two Buddies:
every three days). For further information on the (1) None of the buddies is close and (2) at least one
FunFit experimental design, the reader is referred to of the buddies is close. The closeness level that was
[2]. reported in a survey as part of the Friends and Family
The results in [2] suggest that there is a notion of dataset, was measured at a scale of 0 to 7, and simi-
a complex contagion [16] like effect related to pre- larly to [2], we used a threshold of 3 to indicate a close
existing social ties between participants. Our focus friend. We then tested the influence of the closeness
here is to zoom-in to these results and analyze how level in buddies on the improvement in activity level
closeness and trust, as two different types of social in the same way that we did it for the trust level. As
ties, interplay in this contagion process. In order to shown in Table 5, in the Peer View condition, subjects
undertake this analysis, we first divided the subjects that have at least one close buddy obtain roughly no
into two groups according to their trust level in their additional improvement (i.e., 0.02%) in their activity
two Buddies: (1) None of the buddies is trusted level compared to subjects with 0 close buddies.
and (2) at least one of the buddies is trusted. The Finally, comparing the results in tables 4 and 5
trust level was determined according to our operative indicates that in the ”Peer View” condition, the ad-
definition: a buddy is considered trusted if at least ditional improvement that trusted buddies obtain is
one of the three trust questions is answered YES. We significantly higher than that of close buddies (4.95%
then tested the influence of the trust level in bud- compared to 0.02%).
dies on the improvement in activity level as follows: For completeness, Table 6 illustrates the similarity
(1) We calculated the average user activity level for and difference between the trust and closeness rela-
each period and each group; (2) We calculated the tionships in the FunFit experiment. As can be seen in
improvement in activity level (measured in %) from the table, out of the 162 relationships (corresponding
period P1 to period P3 for each group (similarly to to the 81 subjects in the Peer View and Peer Reward
[2] we focus on P3 since we want to look at longer- groups), 118 are neither trusted nor close; 18 are both
term adherence); and (3) We calculated the difference trusted and close; 5 are trusted but not close and 22
(delta) in improvement between the two groups. As are close but not trusted.
shown in Table 4, in the Peer View condition, subjects
that have at least one trusted buddy obtain additional 4.5 Limitations
4.95% improvement in their activity level compared to The study described in the current Section has a some
subjects with 0 trusted buddies. limitations: (i) the relatively small size of the sample;
Next, we divided the subjects into two groups (ii) the fact that it comes from a population living in
13

TABLE 4
Activity level of participants in the FunFit experiment, grouped according to their trust level in buddies.

Trusted Buddies
Condition Period 0 At least 1 Delta
N Mean STD % Improvement N Mean STD % Improvement
P1 31 1.331 0.481 8 1.408 0.396
Peer View -0.62% 4.33% 4.95%
P3 31 1.323 0.420 9 1.469 0.455

TABLE 5
Activity level of participants in the FunFit experiment, grouped according to their closeness level to buddies.

Close Buddies
Condition Period 0 At least 1 Delta
N Mean STD % Improvement N Mean STD % Improvement
P1 25 1.346 0.413 14 1.349 0.553
Peer View 0.65% 0.67% 0.02%
P3 25 1.355 0.420 15 1.358 0.454

TABLE 6 and so on, and also create practical solutions that use
Contrasting trust and closeness relationships. this knowledge to persuade users to take actions bene-
Trusted ficial for individual and societal good. Together, these
approaches will impact multiple aspects of human
YES NO life including health and wellness, civic infrastructure,
emergency response, economic wellbeing, quality of
YES 17 22 life, and organizational effectiveness.
Close

Our survey in this paper has a specific focus on


NO 5 118 real world behaviors of users as measured using pas-
sive sensors such as cameras, microphones, wearable
sensors and mobile phones. In the last few years, the
automatic analysis of human behavior from passive
the same environment (our subjects were all married sensor data has been applied to multiple domains in-
graduate students living in a campus facility of a ma- cluding health and wellness, emotional states, roles in
jor US university); and finally (iii) the non-availability meetings, outcomes of short-term interactions, organi-
of behavioral data concerning the interaction with zational effectiveness and so on. Although a lot more
people not participating in the data collection, a fact progress has been made on understanding personal
that is common to many other studies of this type. and short-term behaviors, there has been a steady
However, the first two problems are at least partially stream of research efforts focusing on other aspects
attenuated by the large variability of the sample in in recent years.
terms of provenance and cultural background (e.g. With regard to behavior shaping, captology studies
country of origin, religion, ethnicity, etc.), which can have traditionally focused on the use of computers
be expected to correspond to a wide palette of in- as active persuaders. Recently, multiple studies have
teraction behaviors that efficaciously counterbalance suggested that (computer-mediated) social interactions
the effects of samples small size and of living-place may work better than computers-as-persuaders in many
homogeneity. scenarios. One possible explanation for this is that
humans are much more socially aware, adaptive, and
persuasive than computers in most practical situa-
5 S UMMARY tions. Further, they also create opportunities for ‘be-
The first part of this paper surveys the recent ad- havior mimicking’ in such systems.
vances in computational approaches to sense, under- In the second part of this paper, we have presented
stand and shape human behavior. We consider this a case study on how trust, an important building block
topic to be extremely timely as such sensor driven of computational social systems, can be quantified,
understanding of people, organizations, and societies sensed, and applied to shape human behavior. Us-
at scale is now becoming possible for the first time. ing a rich and dense sampling of the lives of 100+
The avalanche of data coming from the emerging participants living in a single community for a year
social computational systems will soon allow us to [2], we have demonstrated that: (1) trust can be oper-
verify and refine multiple theories in organizational ationalized through a questionnaire and trusted rela-
communication, information flow, social psychology tionships be predicted using computational methods
14

based on passive sensing (calls, SMS and Bluetooth [16] D. Centola and M. Macy. Complex contagions and the weak-
interactions) and network analysis, and (2) trust has a ness of long ties1. American Journal of Sociology, 113(3):702–
734, 2007.
significant impact on social persuasion: it was found [17] G. Chittaranjan, J. Blom, and D. Gatica-Perez. Mining large-
to be significantly more effective than the closeness of scale smartphone data for personality studies. Personal and
ties in determining the amount of behavior change. Ubiquitous Computing, 17(3):433–450, 2013.
[18] T. Choudhury, G. Borriello, S. Consolvo, D. Hähnel, B. L. Har-
In this paper, we validate our findings about trust rison, B. Hemingway, J. Hightower, P. V. Klasnja, K. Koscher,
and social persuasion based on a fitness and physical A. LaMarca, J. A. Landay, L. LeGrand, J. Lester, A. Rahimi,
activity intervention study. However, the relationship A. D. Rea, and D. Wyatt. The mobile sensing platform:
An embedded activity recognition system. IEEE Pervasive
between trust and social persuasion is a key element Computing, 7(2):32–41, 2008.
in a variety of scenarios. In the future, we plan to [19] N. A. Christakis and J. H. Fowler. The spread of obesity in
validate our findings in additional real-world settings a large social network over 32 years. New England Journal of
Medicine, 357(4):370–379, 2007.
such as energy consumption, mobility, sustainable [20] N. A. Christakis and J. H. Fowler. Social network sensors for
living, and economic well-being. early detection of contagious outbreaks. PloS one, 5(9):e12948,
2010.
[21] J. S. Coleman. Social capital in the creation of human capital.
ACKNOWLEDGEMENTS American journal of sociology, pages S95–S120, 1988.
This research was partially sponsored by the Army [22] S. Consolvo, K. Everitt, I. E. Smith, and J. A. Landay. De-
sign requirements for technologies that encourage physical
Research Laboratory under Cooperative Agreement activity. In CHI, pages 457–466, 2006.
Number W911NF-09-2-0053. Views and conclusions [23] S. Consolvo, D. W. McDonald, T. Toscos, M. Y. Chen,
in this document are those of the authors and should J. Froehlich, B. Harrison, P. Klasnja, A. LaMarca, L. LeGrand,
R. Libby, et al. Activity sensing in the wild: a field trial
not be interpreted as representing the policies, either of ubifit garden. In Proceedings of the SIGCHI Conference on
expressed or implied, of the sponsors. Human Factors in Computing Systems, pages 1797–1806. ACM,
2008.
[24] S. Consolvo, D. W. McDonald, T. Toscos, M. Y. Chen,
R EFERENCES J. Froehlich, B. L. Harrison, P. V. Klasnja, A. LaMarca,
L. LeGrand, R. Libby, I. E. Smith, and J. A. Landay. Activity
[1] S. E. S. aand John W. Mullennix, C. lynn Dyson, and S. J. Wil- sensing in the wild: a field trial of ubifit garden. In CHI,
son. The persuasiveness of synthetic speech versus human pages 1797–1806, 2008.
speech. Human Factors, 41(4):588–595, 1999. [25] J. R. Curhan and A. Pentland. Thin slices of negotiation:
[2] N. Aharony, W. Pan, C. Ip, I. Khayal, and A. Pentland. Social Predicting outcomes from conversational dynamics within
fmri: Investigating and shaping social mechanisms in the real the first 5 minutes. Journal of Applied Psychology, 92(3):802,
world. Pervasive and Mobile Computing, 7(6):643–659, 2011. 2007.
[3] A. Baier. Trust and antitrust. Ethics, 96(2):231–260, 1986.
[26] Y.-A. de Montjoye, J. Quoidbach, F. Robic, and A. S. Pent-
[4] M. Balaam, G. Fitzpatrick, J. Good, and E. Harris. Enhancing
land. Predicting personality using novel mobile phone-based
interactional synchrony with an ambient display. In CHI,
metrics. In Social Computing, Behavioral-Cultural Modeling and
pages 867–876, 2011.
Prediction, pages 48–55. Springer, 2013.
[5] S. Banerjee and A. I. Rudnicky. Using simple speech–based
[27] M. Deutsch. The effect of motivational orientation upon trust
features to detect the state of a meeting and the roles of the
and suspicion. Human relations, 13(2):123–139, 1960.
meeting participants. 2004.
[6] L. M. Batrinca, N. Mana, B. Lepri, F. Pianesi, and N. Sebe. [28] A. Dey and D. Estrin. Perspectives on pervasive health from
Please, tell me about yourself: automatic personality assess- some of the field’s leading researchers. Pervasive Computing,
ment using short self-presentations. In Proceedings of the 13th IEEE, 10(2):4–7, April 2011.
international conference on multimodal interfaces, pages 255–262. [29] J. M. DiMicco, K. J. Hollenbach, A. Pandolfo, and W. Ben-
ACM, 2011. der. The impact of increased awareness while face-to-face.
[7] E. P. Baumer, S. J. Katz, J. E. Freeman, P. Adams, A. L. Human-Computer Interaction, 22(1-2):47–96, 2007.
Gonzales, J. Pollak, D. Retelny, J. Niederdeppe, C. M. Olson, [30] W. Dong, B. Lepri, A. Cappelletti, A. S. Pentland, F. Pianesi,
and G. K. Gay. Prescriptive persuasion and open-ended social and M. Zancanaro. Using the influence model to recognize
awareness: Expanding the design space of mobile health. In functional roles in meetings. In Proceedings of the 9th interna-
Proceedings of the ACM 2012 conference on Computer Supported tional conference on Multimodal interfaces, pages 271–278. ACM,
Cooperative Work, pages 475–484. ACM, 2012. 2007.
[8] T. W. Bickmore, L. Caruso, K. Clough-Gorr, and T. Heeren. [31] W. Dong, A. Pentland, and K. A. Heller. Graph-coupled
’it’s just like you talk to a friend’ relational agents for older hmms for modeling the spread of infection. In UAI, pages
adults. Interacting with Computers, 17(6):711–735, 2005. 227–236, 2012.
[9] A. Bogomolov, B. Lepri, and F. Pianesi. Happiness recog- [32] N. Eagle, M. Macy, and R. Claxton. Network diversity and
nition from mobile phone data. ASE/IEEE Social Computing economic development. Science, 328(5981):1029–1031, 2010.
conference, 2013. [33] N. Eagle and A. Pentland. Reality mining: sensing complex
[10] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. Kramer, C. Marlow, social systems. Personal and ubiquitous computing, 10(4):255–
J. E. Settle, and J. H. Fowler. A 61-million-person experi- 268, 2006.
ment in social influence and political mobilization. Nature, [34] B. Fogg. Persuasive technology: Using computers to change what
489(7415):295–298, 2012. we think and do. Morgan Kaufmann, 1999.
[11] R. Borum. The science of interpersonal trust. 2010. [35] L. C. Freeman. A set of measures of centrality based on
[12] M. Brand, N. Oliver, and A. Pentland. Coupled hidden betweenness. Sociometry, pages 35–41, 1977.
markov models for complex action recognition. In Computer [36] R. Gasser, D. Brodbeck, M. Degen, J. Luthiger, R. Wyss, and
Vision and Pattern Recognition, 1997. Proceedings., 1997 IEEE S. Reichlin. Persuasiveness of a mobile lifestyle coaching
Computer Society Conference on, pages 994–999. IEEE, 1997. application using social facilitation. In Proceedings of the First
[13] R. S. Burt. The network structure of social capital. Research International Conference on Persuasive Technology for Human
in organizational behavior, 22:345–423, 2000. Well-being, PERSUASIVE’06, pages 27–38. Springer-Verlag,
[14] J. P. Campbell Jr. Speaker recognition: A tutorial. Proceedings 2006.
of the IEEE, 85(9):1437–1462, 1997. [37] D. Gatica-Perez. Automatic nonverbal analysis of social
[15] S. Castaldo. Trust in market relationships. Edward Elgar interaction in small groups: A review. Image and Vision
Publishing, 2007. Computing, 27(12):1775–1787, 2009.
15

[38] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, techniques for interactive applications. Computer Vision and
and I. H. Witten. The weka data mining software: an update. Image Understanding, 98(1):4–24, 2005.
ACM SIGKDD Explorations Newsletter, 11(1):10–18, 2009. [64] J. M. Norvilitis, M. M. Merwin, T. M. Osberg, P. V. Roehling,
[39] J.-D. Haynes and G. Rees. Decoding mental states from brain P. Young, and M. M. Kamas. Personality factors, money
activity in humans. Nature Reviews Neuroscience, 7(7):523–534, attitudes, financial knowledge, and credit-card debt in college
2006. students1. Journal of Applied Social Psychology, 36(6):1395–
[40] B. Huberman, D. Romero, and F. Wu. Social networks that 1413, 2006.
matter: Twitter under the microscope. Available at SSRN [65] H. Oinas-Kukkonen and M. Harjumaa. A systematic frame-
1313405, 2008. work for designing and evaluating persuasive systems. In
[41] S. Intille. A new research challenge: persuasive technology Persuasive Technology, volume 5033 of Lecture Notes in Com-
to motivate healthy aging. IEEE Transactions on Information puter Science, pages 164–176. Springer Berlin Heidelberg,
Technology in Biomedicine, 8(3):235–237, 2004. 2008.
[42] O. P. John and S. Srivastava. The big five trait taxonomy: [66] D. O. Olguı́n, P. A. Gloor, and A. Pentland. Wearable
History, measurement, and theoretical perspectives. Handbook sensors for pervasive healthcare management. In Pervasive
of personality: Theory and research, 2:102–138, 1999. Computing Technologies for Healthcare, 2009. PervasiveHealth
[43] E. Kandel and E. P. Lazear. Peer pressure and partnerships. 2009. 3rd International Conference on, pages 1–4. IEEE, 2009.
Journal of Political Economy, 100(4):pp. 801–817, 1992. [67] D. O. Olguın, P. A. Gloor, and A. S. Pentland. Capturing
[44] M. Kaptein, J. Lacroix, and P. Saini. Individual differences in individual and group behavior with wearable sensors. In
persuadability in the health promotion domain. In Persuasive Proceedings of the 2009 aaai spring symposium on human behavior
technology, pages 94–105. Springer, 2010. modeling, SSS, volume 9, 2009.
[45] D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the [68] D. O. Olguı́n, B. N. Waber, T. Kim, A. Mohan, K. Ara,
spread of influence through a social network. In Proceedings and A. Pentland. Sensible organizations: Technology and
of the ninth ACM SIGKDD international conference on Knowledge methodology for automatically measuring organizational be-
discovery and data mining, pages 137–146. ACM, 2003. havior. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE
[46] T. Kim, A. Chang, L. Holland, and A. Pentland. Meeting Transactions on, 39(1):43–55, 2009.
mediator: enhancing group collaborationusing sociometric [69] R. Orji, R. L. Mandryk, J. Vassileva, and K. M. Gerling. Tailor-
feedback. In CSCW, pages 457–466, 2008. ing persuasive health games to gamer type. In Proceedings of
the SIGCHI Conference on Human Factors in Computing Systems,
[47] C. Krumme, A. Llorente, M. Cebrian, et al. The predictability
pages 2467–2476. ACM, 2013.
of consumer visitation patterns. Scientific reports, 3, 2013.
[70] W. Pan, N. Aharony, and A. Pentland. Fortune monitor or
[48] R. Kumar, J. Novak, and A. Tomkins. Structure and evolution
fortune teller: Understanding the connection between interac-
of online social networks. In Link Mining: Models, Algorithms,
tion patterns and financial status. In Privacy, security, risk and
and Applications, pages 337–357. Springer, 2010.
trust (passat), 2011 ieee third international conference on and 2011
[49] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, ieee third international conference on social computing (socialcom),
and A. T. Campbell. A survey of mobile phone sensing. pages 200–207. IEEE, 2011.
Communications Magazine, IEEE, 48(9):140–150, 2010.
[71] M. Pantic and L. J. Rothkrantz. Toward an affect-sensitive
[50] R. J. Lewicki and B. B. Bunker. Trust in relationships: A model multimodal human-computer interaction. Proceedings of the
of development and decline. Jossey-Bass, 1995. IEEE, 91(9):1370–1390, 2003.
[51] R. LiKamWa, Y. Liu, N. D. Lane, and L. Zhong. Moodscope: [72] A. S. Pentland. Automatic mapping and modeling of human
building a mood sensor from smartphone usage patterns. In networks. Physica A: Statistical Mechanics and its Applications,
MobiSys, pages 389–402, 2013. 378(1):59–67, 2007.
[52] J. J. Lin, L. Mamykina, S. Lindtner, G. Delajoux, and H. B. [73] A. S. Pentland. Honest signals. MIT press, 2010.
Strub. Fish’n’steps: Encouraging physical activity with an [74] E. J. Phares. Locus of control in personality. General Learning
interactive computer game. In Proceedings of the 8th Interna- Press Morristown, NJ, 1976.
tional Conference on Ubiquitous Computing, UbiComp’06, pages [75] F. Pianesi, N. Mana, A. Cappelletti, B. Lepri, and M. Zanca-
261–278, Berlin, Heidelberg, 2006. Springer-Verlag. naro. Multimodal recognition of personality traits in social
[53] E. A. Locke and G. P. Latham. Building a practically use- interactions. In Proceedings of the 10th international conference
ful theory of goal setting and task motivation – a 35-year on Multimodal interfaces, pages 53–60. ACM, 2008.
odyssey, 2002. [76] O. Pierre-Yves. The production and recognition of emotions
[54] R. López-Pérez. Reciprocity, social influence, and trust. 2005. in speech: features and algorithms. International Journal of
[55] A. Machens, F. Gesualdo, C. Rizzo, A. E. Tozzi, A. Barrat, Human-Computer Studies, 59(1):157–183, 2003.
and C. Cattuto. An infectious disease model on empirical [77] H. Pirsiavash and D. Ramanan. Detecting activities of daily
networks of human contact: bridging the gap between dy- living in first-person camera views. In Computer Vision and
namic network data and contact matrices. BMC Infectious Pattern Recognition (CVPR), 2012 IEEE Conference on, pages
Diseases, 13, Apr 2013. 2847–2854. IEEE, 2012.
[56] A. Madan, M. Cebrian, S. Moturu, K. Farrahi, and S. Pent- [78] S. Purpura, V. Schwanda, K. Williams, W. Stubler, and P. Sen-
land. Sensing the health stateof a community. 2012. gers. Fit4life: the design of a persuasive technology promot-
[57] M. L. Manapat, M. A. Nowak, and D. G. Rand. Information, ing healthy behavior and ideal weight. In Proceedings of the
irrationality, and the evolution of trust. Journal of Economic SIGCHI Conference on Human Factors in Computing Systems,
Behavior & Organization, 2012. pages 423–432. ACM, 2011.
[58] A. Mani, I. Rahwan, and A. Pentland. Inducing peer pressure [79] R. D. Putnam. Comunidade e democracia: a experiência da Itália
to promote cooperation. Scientific Reports, 2013. moderna. FGV Editora, 2005.
[59] R. C. Mayer, J. H. Davis, and F. D. Schoorman. An integrative [80] J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan
model of organizational trust. Academy of management review, Kaufmann, 1993.
20(3):709–734, 1995. [81] B. Reeves and C. Nass. The Media Equation: How People
[60] D. J. McAllister. Affect-and cognition-based trust as founda- Treat Computers, Television, and New Media Like Real People and
tions for interpersonal cooperation in organizations. Academy Places. Cambridge University Press, New York, NY, USA,
of management journal, 38(1):24–59, 1995. 1996.
[61] L. McCowan, D. Gatica-Perez, S. Bengio, G. Lathoud, [82] S. L. Robinson. Trust and breach of the psychological con-
M. Barnard, and D. Zhang. Automatic analysis of multimodal tract. Administrative science quarterly, pages 574–599, 1996.
group actions in meetings. Pattern Analysis and Machine [83] I. M. Rosenstock. The health belief model and preventive
Intelligence, IEEE Transactions on, 27(3):305–317, 2005. health behavior. Health Education & Behavior, 2(4):354–386,
[62] S. Mitra and T. Acharya. Gesture recognition: A survey. 1974.
Systems, Man, and Cybernetics, Part C: Applications and Reviews, [84] D. M. Rousseau, S. B. Sitkin, R. S. Burt, and C. Camerer. Not
IEEE Transactions on, 37(3):311–324, 2007. so different after all: A cross-discipline view of trust. Academy
[63] C. H. Morimoto and M. R. Mimica. Eye gaze tracking of management review, 23(3):393–404, 1998.
16

[85] B. Schneier. Liars and outliers: enabling the trust that society Erez Shmueli is a post-doctoral associate
needs to thrive. Wiley. com, 2012. at the MIT Media Lab, at the Human Dy-
[86] D. Schulman and T. W. Bickmore. Persuading users through namics group headed by Prof. Alex “Sandy”
counseling dialogue with a conversational agent. In PER- Pentland. He holds a BA degree in Computer
SUASIVE, page 25, 2009. Science from the Open University and MSc
[87] J. Shotton, T. Sharp, A. Kipman, A. Fitzgibbon, M. Finocchio, and PhD degrees in Information Systems En-
A. Blake, M. Cook, and R. Moore. Real-time human pose gineering from Ben-Gurion University of the
recognition in parts from single depth images. Communica- Negev, under the supervision of Prof. Yuval
tions of the ACM, 56(1):116–124, 2013. Elovici. His professional experience includes
[88] V. K. Singh, L. Freeman, B. Lepri, and A. S. Pentland. Classi- five years as a programmer and a team
fying spending behavior using socio-mobile data. HUMAN, leader in the Israeli Air-Force and three years
2(2):pp–99, 2013. as a project manager in Deutsche Telekom Laboratories at Ben-
[89] J. Staiano, B. Lepri, N. Aharony, F. Pianesi, N. Sebe, and Gurion University of the Negev. His main research interests include
A. Pentland. Friends don’t lie: inferring personality traits Information Security and Privacy, Databases, Big Data Analytics and
from social network structure. In Proceedings of the 2012 ACM Social Networks.
Conference on Ubiquitous Computing, pages 321–330. ACM,
2012.
[90] C. Steinfield, N. B. Ellison, and C. Lampe. Social capital,
self-esteem, and use of online social network sites: A longi-
tudinal analysis. Journal of Applied Developmental Psychology,
29(6):434–445, 2008.
Vivek Kumar Singh is a post-doctoral re-
[91] J. Sturm, O. H. van Herwijnen, A. Eyck, and J. M. B. Terken.
searcher working with the Human Dynamics
Influencing social dynamics in meetings through a peripheral
group at the MIT Media Lab. He holds a Ph.D.
display. In ICMI, pages 263–270, 2007.
in Computer Science from the University of
[92] K. Subrahmanyam, S. M. Reich, N. Waechter, and G. Es-
California, Irvine. He obtained his bachelors
pinoza. Online and offline social networks: Use of social
and masters degrees in Computer Science
networking sites by emerging adults. Journal of Applied
from the National University of Singapore
Developmental Psychology, 29(6):420–433, 2008.
and was a full-time Lecturer at the Institute of
[93] E. A. Suma, B. Lange, A. Rizzo, D. M. Krum, and M. Bolas.
Technical Education, Singapore for 4 years.
Faast: The flexible action and articulated skeleton toolkit.
His research interests lie at the intersection
In Virtual Reality Conference (VR), 2011 IEEE, pages 247–248.
of Big Data, Computational Social Science,
IEEE, 2011.
and Multimedia Information Systems.
[94] T. Toscos, A. M. Faber, S. An, and M. P. Gandhi. Chick clique:
persuasive technology to motivate teenage girls to exercise.
In CHI Extended Abstracts, pages 1873–1878, 2006.
[95] M. Turk and A. Pentland. Eigenfaces for recognition. Journal
of cognitive neuroscience, 3(1):71–86, 1991.
[96] T. W. Valente. Social Networks and Health: Models, Methods, and
Applications. Oxford University Press, 2010. Bruno Lepri is a researcher at Fondazione
[97] T. W. Valente. Network interventions. Science, 337(6090):49– Bruno Kessler (FBK) and affiliate researcher
53, 2012. at MIT Media Lab. From January 2014, he
[98] B. Waber. People analytics: How social sensing technology will lead the Mobile and Social Computing Lab
transform business and what it tell us about the future of the work. (MobS) at FBK. He is currently co-leading
Pearson Education, 2013. the research activities inside the Mobile Ter-
[99] K. Wac. Smartphone as a personal, pervasive health infor- ritorial Lab, a joint living lab launched by
matics services platform: literature review. Yearbook of medical Telecom Italia, FBK, MIT Media Lab, and
informatics, 7(1):83, 2012. Telefonica. In 2009, he received his Ph.D.
[100] R. Y. Wang and J. Popović. Real-time hand-tracking with in Computer Science from the University of
a color glove. In ACM Transactions on Graphics (TOG), Trento. His research interests include com-
volume 28, page 63. ACM, 2009. putational social science, big data and personal data, pervasive and
[101] D. Wyatt, T. Choudhury, J. Bilmes, and J. A. Kitts. Inferring ubiquitous computing, and human behavior understanding.
colocation and conversation networks from privacy-sensitive
audio with implications for computational social science.
ACM Transactions on Intelligent Systems and Technology (TIST),
2(1):7, 2011.
[102] J. Yamato, J. Ohya, and K. Ishii. Recognizing human action
in time-sequential images using hidden markov model. In Alex ’Sandy’ Pentland directs MITs Human
Computer Vision and Pattern Recognition, 1992. Proceedings Dynamics Laboratory and the MIT Media
CVPR’92., 1992 IEEE Computer Society Conference on, pages Lab Entrepreneurship Program, co-leads the
379–385. IEEE, 1992. World Economic Forum Big Data and Per-
[103] M. Zancanaro, B. Lepri, and F. Pianesi. Automatic detection sonal Data initiatives, and is a Board member
of group functional roles in face to face interactions. In for Nissan, Motorola Mobility, Telefonica, and
Proceedings of the 8th international conference on Multimodal Harvard Business Review. He has previously
interfaces, pages 28–34. ACM, 2006. helped create and direct MITs Media Labo-
ratory, the Media Lab Asia laboratories at the
Indian Institutes of Technology, and Strong
Hospitals Center for Future Health. In 2012
Forbes named Sandy one of the ’seven most powerful data scientists
in the world’, along with Google founders and the CTO of the United
States, and in 2013 he won the McKinsey Award from Harvard
Business Review. He is among the most-cited computational sci-
entists in the world, and a pioneer in computational social science,
organizational engineering, wearable computing (Google Glass),
image understanding, and modern biometrics. His most recent book
is ‘Social Physics,’ published by Penguin Press.

Das könnte Ihnen auch gefallen