A Trace-Driven Analysis on the User Behaviors in Social E-commerce Network

被引:0
作者
Luo, Zhongwen [1 ]
Zhu, Huanhuan [1 ]
Zeng, Deze [2 ]
Yao, Hong [1 ]
机构
[1] China Univ Geosci, Wuhan 430074, Peoples R China
[2] Univ Aizu, Aizu Wakamatsu, Fukushima, Japan
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2014年
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
E-commerce has become one of the common commercial activities in people's daily lives. The major advantage of e-commerce over conventional commercial activities is the information transparency while people can freely share their opinions and comments. Such information has profound influence on user behaviors in e-commerce activities. Meanwhile, social network service (SNS) has also become the most popular way to get and share information on the Internet. Therefore, it is quite natural to put e-commerce and SNS together. Recently, there emerge many online social e-commerce network (SECON) services, which not only allow users to conduct e-commerce transactions but also enable users to share information as in the other SNS like Twitter. Although conventional SNS has been widely investigated, little is known about SECON. To address this problem, we conduct a trace-driven analysis on a successful SECON called Jumei, with millions of users. Our analysis is based on shared information and all activities they created, all these data are crawled from the website of Jumei. We shed light on the user activity characteristics in SECON. By analyzing the crawled data, we discover that the social ties have an important influence on commercial activities. However, to our surprise, there are many differences between SECON and SNS: (a) the network topology structure is greatly different from SNS, (b) strong ties play a more crucial role than in SNS, same to viral marketing intuition, and (c) the behavior of adoption activity is influenced weakly by peers in the social network, for example, nearly 60% users influenced by only one information propagated from social links before they decided to buy it. Furthermore, we find that it takes a long time to adopt what their followees have bought.
引用
收藏
页码:4108 / 4113
页数:6
相关论文
共 9 条
  • [1] [Anonymous], 2013, P 22 INT C WORLD WID, DOI DOI 10.1145/2488388.2488398
  • [2] [Anonymous], 2013, Proceedings of the 22nd International Conference on World Wide Web, DOI [10.1145/2488388.2488521, DOI 10.1145/2488388.2488521]
  • [3] [Anonymous], 2009, WWW 09 P 18 INT WORL, DOI DOI 10.1145/1526709.1526806
  • [4] [Anonymous], 2011, P 12 ACM C EL COMM
  • [5] [Anonymous], 2003, KDD 03
  • [6] Budak Ceren., 2011, Limiting the spread of misinformation in social networks, P665, DOI DOI 10.1145/1963405.1963499ENCEONWORLDWIDEWEB-WWW
  • [7] Li H., 2012, Vehicular Technology Conference (VTC Fall), 2012 IEEE, P1, DOI [10.1038/ijo.2012.195, DOI 10.1109/PESGM.2012.6343965]
  • [8] Wang G., 2013, P 22 INT C WORLD WID, DOI DOI 10.1145/2488388.2488506
  • [9] Xiao LX, 2012, PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, P469, DOI 10.1109/ICCT.2012.6511264