Presentation on theme: "By Srishti Gahlot (sg2856) 1. 2 What do you mean by online behavior? Why do we need to analyze online behavior and personalize it? How do we analyze this."— Presentation transcript:
2 What do you mean by online behavior? Why do we need to analyze online behavior and personalize it? How do we analyze this behavior? Comparison between Amazon and ebay Security issues Future work
3 What do you mean by online behavior? Online behavior refers to organized and unorganized interactions with both human and nonhuman elements in online environments. Salient features of online behavior: Sociability Utility Reciprocity
4 Why do we need to analyze online behavior and personalize it? Expanding WWW and dependence on web Ecommerce and marketing firm can Campaign and advertize Customize shopping experience Profit
5 How do we analyze this behavior? Recommendation system: analyzes patterns of user interest in products to provide personalized recommendations that suit a user’s taste. Eg Amazon, Netflix Types of strategies used in Recommendation Systems: a. Content based filtering b. Collaborative filtering
6 Content based filtering Creates profile (demographic info, questionnaire) Gather external information Independent of other users
8 Collaborative filtering filtering for information or patterns using collaboration analyzes relationships between users and interdependencies among products to identify new user-item associations. 1. Look for users who share the same rating patterns with the active user 2. Use the ratings from those like-minded users to calculate a prediction for the active user Main Aim
9 Architecture N dimensional vector of items Components are positive for purchased or positively rated items Multiplies with inverse frequency Sparse vector Recommendation is based on similarity Cosine similarity
10 Recommendation System for Amazon Uses item-to-item collaborative filtering Purchased and rated items recommendation list.
11 Recommendation System for eBay Content based filtering recommendation Feedback Profile Dissatisfied/neutral/satisfied + comments
12 Security Issues Risk of unwanted exposure of information The recommender can violate the users trust in three ways: Exposure: Undesired access to personal user information Bias: Manipulation of users’ recommendations to inappropriately change the items that are recommended
13 Sabotage: Intentionally reducing the recommendation accuracy of a recommender A recommendation system must win the trust of its users on two following grounds: a.The system will protect their information appropriately b.The recommendation made by the system should be accurate
14 Future work Experiments are being done to somehow combine these two algorithms to come up with a more powerful recommender system Content-Boosted Collaborative Filtering algorithm(CBCF) performance is not very large (4%)
Your consent to our cookies if you continue to use this website.