Predicting smartphone operating system from personality and individual differences

Shaw, Heather and Ellis, David Alexander and Kendrick, Libby-Rae and Ziegler, Fenja and Wiseman, Richard (2016) Predicting smartphone operating system from personality and individual differences. Cyberpsychology, Behavior, and Social Networking, 19 (12). pp. 727-732.

[img]
Preview
PDF (manuscript_revision_two)
manuscript_revision_two.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (209kB)

Abstract

Android and iPhone devices account for over 90% of all smartphones sold world-wide. Despite being very similar in functionality, current discourse and marketing campaigns suggest that key individual differences exist between users of these two devices; however, this has never been investigated empirically. This is surprising, as smartphones continue to gain momentum across a variety of research disciplines. In this paper we consider if individual differences exist between these two distinct groups. In comparison to Android users, we found that iPhone owners are more likely to be female, younger, and increasingly concerned about their smartphone being viewed as a status object. Key differences in personality were also observed with iPhone users displaying lower levels of honesty-humility and higher levels of emotionality. Following this analysis, we were also able to build and test a model that predicted smartphone ownership at above chance level based on these individual differences. In line with extended self theory, the type of smartphone owned provides some valuable information about its owner. These findings have implications for the increasing use of smartphones within research particularly for those working within Computational Social Science and PsychoInformatics, where data is typically collected from devices and applications running a single smartphone operating system.

Item Type:
Journal Article
Journal or Publication Title:
Cyberpsychology, Behavior, and Social Networking
Additional Information:
Final publication is available from Mary Ann Liebert, Inc., publishers http://dx.doi.org/10.1089/cyber.2016.0324
Uncontrolled Keywords:
/dk/atira/pure/subjectarea/asjc/3200/3202
Subjects:
ID Code:
82230
Deposited By:
Deposited On:
17 Oct 2016 10:04
Refereed?:
Yes
Published?:
Published
Last Modified:
27 Sep 2020 03:30