Browse Definitions:
Definition

Predictive Index (PI)

The Predictive Index® (PI®) is a theory-based, self-report measurement of normal, adult, work-related personality that was developed and validated for use within occupational and organizational populations.

The PI is used for a variety of human resource management (HRM) purposes, including employee selection, executive on-boarding, leadership development, succession planning, performance coaching, team-building and organizational culture change, among others. Using the PI to increase understanding of the particular strengths and characteristics of staff members can also help increase employee engagement and productivity and decrease staff turnover.

The test employs a free-choice (as opposed to forced-choice) response format, in which individuals are presented with two lists of descriptive adjectives, both containing 86 items, and are asked to endorse those which they feel describe them (the “self” domain), and then those which they feel coincide with how they feel others expect them to behave (the “self-concept” domain). Summing across these two domains yields a third implied domain (the “synthesis”), which can be interpreted as reflecting an employee’s observable behavior in the workplace.

The assessment is un-timed, generally takes approximately five to ten minutes to complete, and is available in paper-and-pencil, desktop and Web-based formats.

The PI measures four primary and fundamental personality constructs:

1. Dominance: The degree to which an individual seeks to control his or her environment. Individuals who score high on this dimension are independent, assertive and self-confident. Individuals who score low on this dimension are agreeable, cooperative and accommodating.

2. Extroversion: The degree to which an individual seeks social interaction with other people. Individuals who score high on this dimension are outgoing, persuasive and socially-poised. Individuals who score low on this dimension are serious, introspective and task-oriented.

3. Patience: The degree to which an individual seeks consistency and stability in his or her environment. Individuals who score high on this dimension are patient, consistent and deliberate. Individuals who score low on this dimension are fast-paced, urgent and intense.

4. Formality: The degree to which an individual seeks to conform to formal rules and structure. Individuals who score high on this dimension are organized, precise and self-disciplined. Individuals who score low on this dimension are informal, casual and uninhibited.

The PI® also measures two secondary personality constructs, which are derived from a combination of each of the four primary personality constructs described previously:

1. Decision-making: Measures how an individual processes information and makes decisions. Individuals who score high on this dimension are objective, logical and are primarily influenced by facts and data. Individuals who score low on this dimension are subjective, intuitive and are primarily influenced by feelings and emotions.

2. Response level: Measures an individual’s overall responsiveness to the environment, which is reflected in his or her energy, activity level and stamina. Individuals who score high on this dimension have an enhanced capacity to sustain activity and tolerate stress over longer periods of time. Individuals who score low on this dimension have less of this capacity.

The PI has been in wide-spread commercial use since 1955. Minor revisions were made to the assessment in 1958, 1963, 1988 and 1992 to improve the PI’s psychometric (psychological testing) properties and to ensure that each of the individual items on the assessment conformed to appropriate and contemporary language norms.

The PI is currently used by over 8,000 organizations across a wide variety of industries and company sizes and is available in 70 languages including Braille. In 2013, over two million people around the world completed the PI assessment.

See an introduction to the Predictive Index:

This was last updated in September 2015

Continue Reading About Predictive Index (PI)

Join the conversation

7 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Companies in Florida and Georgia are welcome to request more information on Predictive Index from Predictive Results at 904-269-2299 or PredictiveResults.com
Cancel
There are several relevant articles at <a href="http://www.predictiveresults.com"> our site</a>.
Cancel
Braille is not a language.
Cancel
Have you advice on how someone should approach the survey .?
Cancel
The history of the PI along with lots more information can be found on our site. http://www.pimidlantic.com/predictive_index_assessment
Cancel
And this article discusses how to approach the Predictive Index and other pre-employment exams.

http://www.pimidlantic.com/blogs/how-to-pass-a-pre-employment-assessment
Cancel
Hi there. Is there any academic reference that I can use to reference the Predictive Index? Cheers. Carla
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close