Analysis of Purchasing Tendency using ID-POS Data of Social Login User

نویسندگان

  • Kohei Otake
  • Takashi Namatame
چکیده

This study targets social login registrants on an EC site and aims to clarify the difference between the purchasing tendency of social login registrants and general members by analyzing product purchasing history. The authors focused on the golf portal site that is the subject of this research. The authors analyzed the purchasing data comparing social login registrants with general members. It became clear that the social login registrants and general members have different distribution regarding the number of purchases and purchase type. Moreover, the social login registrants have a larger range of purchase types per purchase and they are purchasing from a variety of genres. In addition, the authors analyzed them with a focus on the relationship between products purchased. As the results of network analysis, it became clear that the existence of specific product combinations (concentrated sets on the network) more readily purchased simultaneously by Facebook users than by general members. Moreover, the authors compared each network tendency using a network index (degree, closeness and betweenness centrality). As the results, it became clear that social login registrants have less resistance to purchasing expensive products on an EC site compared with general members and golf gears act as a bridge for purchasing. Keywords—Social Networking Service; Consumer Behavior; Network Analysis; ID-POS Data

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Effect of Information Rate and Store Environment on Purchasing Value; Analysis of the Role of Confusion and Motivational Tendency

Objective A great number of customers spend much more time than expected on shopping because of a lot of reasons like variety in products. Thus, they may feel confused and disappointed. Such confusion can influence purchasing procedure and determine purchasing behavior. Such customers fail to purchase wisely and may face difficulty choosing appropriate and reasonable products. However, if the ...

متن کامل

Password-Free Login

Password-free login is a system that sets the user free from remembering the passwords used, so that the user can get an easy access to any website of his choice in a common password. The system is basically a password storage website that keeps all the login id's and password in a single database. The advantage of the system is that even if in mere future the user happens to forget the lo...

متن کامل

Personal Information Leaks with Automatic Login in Mobile Social Network Services

To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user’s ID and password. This security token is called a credential. Because such credentials are convenient for users, t...

متن کامل

Novel Remote User Authentication Scheme Using Bilinear Pairings

The paper presents a remote user authentication scheme using the properties of bilinear pairings. In the scheme, the remote system receives user login request and allows login to the remote system if the login request is valid. The scheme prohibits the scenario of many logged in users with the same login-ID, and provides a flexible password change option to the registered users without any assi...

متن کامل

Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards

Recently, Das et al. proposed a dynamic ID-based verifierfree password authentication scheme using smart cards. To resist the IDtheft attack, the user’s login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.’s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016