[1] J. A. Golbeck, "Computing and applying trust in web-based social networks," PhD, College Park, University of Maryland, 2005.
[2] J. Golbeck, C. Robles, and K. Turner, "Predicting Personality with Social Media," ACM 978-1-4503-0268, pp. 253-262, 2011.
[3] N. B. Ellison, "Social network sites: Definition, history, and scholarship," Journal of Computer Mediated Communication, vol. 13, pp. 210-230, 2007.
[4] Y. Amichai-Hamburger and G. Vinitzky, "Social network use and personality," Computers in Human Behavior, vol. 26, pp. 1289-1295, 2010.
[5] J. Feist, G. J. Feist, and T.-A. Roberts, Theories of personality: McGraw-Hill New York, 2006.
[6] M. D. Back, J. M. Stopfer, S. Vazire, S. Gaddis, S. C. Schmukle, B. Egloff, and S. D. Gosling, "Facebook profiles reflect actual personality, not self-idealization," Psychological Science, vol. 21, pp. 372-374, 2010.
[7] P. Bonhard and M. Sasse, "’Knowing me, knowing you’—Using profiles and social networking to improve recommender systems," BT Technology Journal, vol. 24, pp. 84-98, 2006.
[8] M. Goeksel and C. P. Lam, "System and method for utilizing social networks for collaborative filtering," ed: Google Patents, 2010.
[9] Y.-M. Li, C.-Y. Lai, and C.-H. Lin, "Discovering Influential Nodes for Viral Marketing," in the 42nd Hawaii International Conference on System Sciences - IEEE, Hawaii, USA, 2009.
[10] Y.-M. Li, C.-H. Lin, and C.-Y. Lai, "Identifying influential reviewers for word-of-mouth marketing," Electronic Commerce Research and Applications, pp. 294–304, 2010.
[11] S. Ahmed and C. Ezeife, "Discovering influential nodes from trust network," in Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013, pp. 121-128.
[12] Z. Zhu, "Discovering the influential users oriented to viral marketing based on online social network," Physica A: Statistical Mechanics and its Applications, 2013.
[13] K. Wakita and T. Tsurumi, "Finding community structure in mega-scale social networks:[extended abstract]," in Proceedings of the 16th international conference on World Wide Web, 2007, pp. 1275-1276.
[14] Y. Zhao, E. Levina, and J. Zhu, "Community extraction for social networks," Proceedings of the National Academy of Sciences, vol. 108, pp. 7321-7326, 2011.
[15] P. P. Zubcsek and M. Sarvary, "Advertising to a social network," Quantitative Marketing and Economics, vol. 9, pp. 71-107, 2011.
[16] P.-T. Chen and H.-P. Hsieh, "Personalized mobile advertising: Its key attributes, trends, and social impact," Technological Forecasting and Social Change, vol. 79, pp. 543-557, 2012.
[17] R. R. McCrae and O. P. John, "An introduction to the five‐factor model and its applications," Journal of personality,vol. 60, pp. 175-215, 1992.
[18] C. Sand, A Guide to the Big Five Personality Traits: Openness, Conscientiousness, Extraversion, Agreeableness, and Neuroticism: Webster's Digital Services, 2012.
[19] R. R. McCrae and P. T. Costa, "Validation of the five-factor model of personality across instruments and observers," Journal of personality and social psychology, vol. 52, pp. 81-90, 1987.
[20] T. Oren and N. Ghasem-Aghaee, "Personality representation processable in fuzzy logic for human behavior simulation," in Summer Computer Simulation Conference, 2003, pp. 11-18.
[21] P. T. Costa and R. R. MacCrae, Revised NEO Personality Inventory (NEO PI-R) and NEO Five-Factor Inventory (NEO FFI): Professional Manual: Psychological Assessment Resources, 1992.
[22] B. E. de Raad and M. E. Perugini, Big five assessment: Hogrefe & Huber Publishers, 2002.
[23] A. Aly and A. Tapus, "A model for synthesizing a combined verbal and nonverbal behavior based on personality traits in human-robot interaction," in Proceedings of the 8th ACM/IEEE international conference on Human-robot interaction, 2013, pp. 325-332.
[24] A. Zoumpoulaki, N. Avradinis, and S. Vosinakis, "A multi-agent simulation framework for emergency evacuations incorporating personality and emotions," in Artificial Intelligence: Theories, Models and Applications, ed: Springer, 2010, pp. 423-428.
[25] M. A. S. Nunes and R. Hu, "Personality-based recommender systems: an overview," in Proceedings of the sixth ACM conference on Recommender systems, 2012, pp. 5-6.
[26] M. D. Ekstrand, J. T. Riedl, and J. A. Konstan, "Collaborative filtering recommender systems," Foundations and Trends in Human-Computer Interaction, vol. 4, pp. 81-173, 2011.
[27] L. F. Capretz and F. Ahmed, "Making sense of software development and personality types," IT professional, vol. 12, pp. 6-13, 2010.
[28] H. Keller and S. J. Karau, "The importance of personality in students’ perceptions of the online learning experience," Computers in Human Behavior, vol. 29, pp. 2494-2500, 2013.
[29] O. Nov, O. Arazy, C. López, and P. Brusilovsky, "Exploring personality-targeted UI design in online social participation systems," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2013, pp. 361-370.
[30] T. Zhou and Y. Lu, "The effects of personality traits on user acceptance of mobile commerce," Intl. Journal of Human–Computer Interaction, vol. 27, pp. 545-561, 2011.
[31] D. Quercia, M. Kosinski, D. Stillwell, and J. Crowcroft, "Our Twitter profiles, our selves: Predicting personality with Twitter," in Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom), 2011, pp. 180-185.
[32] Y. Kalish and G. Robins, "Psychological predispositions and network structure: The relationship between individual predispositions, structural holes and network closure," Social Networks, vol. 28, pp. 56-84, 2006.
[33] L. Qiu, H. Lin, J. Ramsay, and F. Yang, "You are what you tweet: Personality expression and perception on twitter," Journal of Research in Personality, vol. 46, pp. 710-718, 2012.
[34] D. O. Olguın, P. A. Gloor, and A. S. Pentland, "Capturing individual and group behavior with wearable sensors," in Proceedings of the 2009 aaai spring symposium on human behavior modeling, SSS, 2009.
[35] S. G. Roberts, R. Wilson, P. Fedurek, and R. Dunbar, "Individual differences and personal social network size and structure," Personality and Individual Differences, vol. 44, pp. 954-964, 2008.
[36] J. Golbeck, C. Robles, M. Edmondson, and K. Turner, "Predicting personality from twitter," in Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom), 2011, pp. 149-156.
[37] D. Quercia, R. Lambiotte, D. Stillwell, M. Kosinski, and J. Crowcroft, "The personality of popular facebook users," in Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, 2012, pp. 955-964.
[38] J. Staiano, B. Lepri, N. Aharony, F. Pianesi, N. Sebe, and A. Pentland, "Friends don't lie: inferring personality traits from social network structure," in Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012, pp. 321-330.
[39] L. Li, A. Li, B. Hao, Z. Guan, and T. Zhu, "Predicting Active Users' Personality Based on Micro-Blogging Behaviors," PloS one, vol. 9, p. e84997, 2014.
[40] م. گ. فرشی, رویکردی نوین در ارزیابی شخصیت. تبریز: نشر جامعه پژوه, 1380.
[41] J. Scott, Social network analysis: SAGE Publications Limited, 2012.
[42] G. Holmes, M. Hall, and E. Prank, Generating rule sets from model trees: Springer, 1999.
[43] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update," ACM SIGKDD explorations newsletter, vol. 11, pp. 10-18, 2009.
[44] R. Poli and J. Koza, Genetic Programming: Springer, 2014.
[45] D. Searson, "GPTIPS: Genetic programming & symbolic regression for MATLAB," Available from gptips. sourceforge. net,[Accessed 10 February, 2010], 2009.