Purchase Influence Mining: Identifying Top-k Items Attracting Purchase of Target Item

Sungchul Kim, Jinyoung Yeo, Eunyee Koh, Nedim Lipka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Web logs in e-commerce sites consist of user actions on items such as visiting an item description page, adding an item to a wishlist, and purchasing an item. Those items could be represented as nodes in a graph while viewing their relationships as edges according to the user actions. Based on the item graph, identifying items that attract users to purchase the target item could be practically used for supporting business decisions. To do this, we introduce a new task, called 'Purchase Influence Mining', that finds the top-k items (PIM-items) maximizing the estimated purchase influence from them to a target item. We solve this problem by modeling the purchase influence as the shortest path between item pair. According to the result, our approach more consistently finds the k PIM-items than the baseline.

Original languageEnglish
Title of host publicationWWW 2016 Companion - Proceedings of the 25th International Conference on World Wide Web
PublisherAssociation for Computing Machinery, Inc
Pages57-58
Number of pages2
ISBN (Electronic)9781450341448
DOIs
Publication statusPublished - 2016 Apr 11
Event25th International Conference on World Wide Web, WWW 2016 - Montreal, Canada
Duration: 2016 May 112016 May 15

Publication series

NameWWW 2016 Companion - Proceedings of the 25th International Conference on World Wide Web

Conference

Conference25th International Conference on World Wide Web, WWW 2016
Country/TerritoryCanada
CityMontreal
Period16/5/1116/5/15

Bibliographical note

Publisher Copyright:
© 2016 owner/author(s).

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Purchase Influence Mining: Identifying Top-k Items Attracting Purchase of Target Item'. Together they form a unique fingerprint.

Cite this