314 research outputs found

    ์†Œ์…œ ๋„คํŠธ์›Œํฌ์™€ ์ด์ปค๋จธ์Šค ํ”Œ๋žซํผ์—์„œ์˜ ์ž ์žฌ ๋„คํŠธ์›Œํฌ ๋งˆ์ด๋‹

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2023. 2. ๊ถŒํƒœ๊ฒฝ.์›น ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค์˜ ํญ๋ฐœ์ ์ธ ๋ฐœ๋‹ฌ๋กœ ์‚ฌ์šฉ์ž๋“ค์€ ์˜จ๋ผ์ธ ์ƒ์—์„œ ํญ๋„“๊ฒŒ ์—ฐ๊ฒฐ๋˜๊ณ  ์žˆ๋‹ค. ์˜จ๋ผ์ธ ํ”Œ๋žซํผ ์ƒ์—์„œ, ์‚ฌ์šฉ์ž๋“ค์€ ์„œ๋กœ์—๊ฒŒ ์˜ํ–ฅ์„ ์ฃผ๊ณ ๋ฐ›์œผ๋ฉฐ ์˜์‚ฌ ๊ฒฐ์ •์— ๊ทธ๋“ค์˜ ๊ฒฝํ—˜๊ณผ ์˜๊ฒฌ์„ ๋ฐ˜์˜ํ•˜๋Š” ๊ฒฝํ–ฅ์„ ๋ณด์ธ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€ํ‘œ์ ์ธ ์˜จ๋ผ์ธ ํ”Œ๋žซํผ์ธ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค์™€ ์ด์ปค๋จธ์Šค ํ”Œ๋žซํผ์—์„œ์˜ ์‚ฌ์šฉ์ž ํ–‰๋™์— ๋Œ€ํ•ด ์—ฐ๊ตฌํ•˜์˜€๋‹ค. ์˜จ๋ผ์ธ ํ”Œ๋žซํผ์—์„œ์˜ ์‚ฌ์šฉ์ž ํ–‰๋™์€ ์‚ฌ์šฉ์ž์™€ ํ”Œ๋žซํผ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ ํ‘œํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ๊ตฌ๋งค๋Š” ์‚ฌ์šฉ์ž์™€ ์ƒํ’ˆ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ, ์‚ฌ์šฉ์ž์˜ ์ฒดํฌ์ธ์€ ์‚ฌ์šฉ์ž์™€ ์žฅ์†Œ ๊ฐ„์˜ ๊ด€๊ณ„๋กœ ๋‚˜ํƒ€๋‚ด์ง„๋‹ค. ์—ฌ๊ธฐ์— ํ–‰๋™์˜ ์‹œ๊ฐ„๊ณผ ๋ ˆ์ดํŒ…, ํƒœ๊ทธ ๋“ฑ์˜ ์ •๋ณด๊ฐ€ ํฌํ•จ๋  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋‘ ํ”Œ๋žซํผ์—์„œ ์ •์˜๋œ ์‚ฌ์šฉ์ž์˜ ํ–‰๋™ ๊ทธ๋ž˜ํ”„์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์ž ์žฌ ๋„คํŠธ์›Œํฌ๋ฅผ ํŒŒ์•…ํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ œ์‹œํ•œ๋‹ค. ์œ„์น˜ ๊ธฐ๋ฐ˜์˜ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค์˜ ๊ฒฝ์šฐ ํŠน์ • ์žฅ์†Œ์— ๋ฐฉ๋ฌธํ•˜๋Š” ์ฒดํฌ์ธ ํ˜•์‹์œผ๋กœ ๋งŽ์€ ํฌ์ŠคํŠธ๊ฐ€ ๋งŒ๋“ค์–ด์ง€๋Š”๋ฐ, ์‚ฌ์šฉ์ž์˜ ์žฅ์†Œ ๋ฐฉ๋ฌธ์€ ์‚ฌ์šฉ์ž ๊ฐ„์— ์‚ฌ์ „์— ์กด์žฌํ•˜๋Š” ์นœ๊ตฌ ๊ด€๊ณ„์— ์˜ํ•ด ์˜ํ–ฅ์„ ํฌ๊ฒŒ ๋ฐ›๋Š”๋‹ค. ์‚ฌ์šฉ์ž ํ™œ๋™ ๋„คํŠธ์›Œํฌ์˜ ์ €๋ณ€์— ์ž ์žฌ๋œ ์‚ฌ์šฉ์ž ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ํŒŒ์•…ํ•˜๋Š” ๊ฒƒ์€ ํ™œ๋™ ์˜ˆ์ธก์— ๋„์›€์ด ๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ์œ„ํ•ด ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋น„์ง€๋„ํ•™์Šต ๊ธฐ๋ฐ˜์œผ๋กœ ํ™œ๋™ ๋„คํŠธ์›Œํฌ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๊ฐ„ ์‚ฌํšŒ์  ๊ด€๊ณ„๋ฅผ ์ถ”์ถœํ•˜๋Š” ์—ฐ๊ตฌ๋ฅผ ์ œ์•ˆํ•˜์˜€๋‹ค. ๊ธฐ์กด์— ์—ฐ๊ตฌ๋˜์—ˆ๋˜ ๋ฐฉ๋ฒ•๋“ค์€ ๋‘ ์‚ฌ์šฉ์ž๊ฐ€ ๋™์‹œ์— ๋ฐฉ๋ฌธํ•˜๋Š” ํ–‰์œ„์ธ co-visitation์„ ์ค‘์ ์ ์œผ๋กœ ๊ณ ๋ คํ•˜์—ฌ ์‚ฌ์šฉ์ž ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ์˜ˆ์ธกํ•˜๊ฑฐ๋‚˜, ๋„คํŠธ์›Œํฌ ์ž„๋ฒ ๋”ฉ ๋˜๋Š” ๊ทธ๋ž˜ํ”„ ์‹ ๊ฒฝ๋ง(GNN)์„ ์‚ฌ์šฉํ•˜์—ฌ ํ‘œํ˜„ ํ•™์Šต์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์ ‘๊ทผ ๋ฐฉ์‹์€ ์ฃผ๊ธฐ์ ์ธ ๋ฐฉ๋ฌธ์ด๋‚˜ ์žฅ๊ฑฐ๋ฆฌ ์ด๋™ ๋“ฑ์œผ๋กœ ๋Œ€ํ‘œ๋˜๋Š” ์‚ฌ์šฉ์ž์˜ ํ–‰๋™ ํŒจํ„ด์„ ์ž˜ ํฌ์ฐฉํ•˜์ง€ ๋ชปํ•œ๋‹ค. ํ–‰๋™ ํŒจํ„ด์„ ๋” ์ž˜ ํ•™์Šตํ•˜๊ธฐ ์œ„ํ•ด, ANES๋Š” ์‚ฌ์šฉ์ž ์ปจํ…์ŠคํŠธ ๋‚ด์—์„œ ์‚ฌ์šฉ์ž์™€ ๊ด€์‹ฌ ์ง€์ (POI) ๊ฐ„์˜ ์ธก๋ฉด(Aspect) ์ง€ํ–ฅ ๊ด€๊ณ„๋ฅผ ํ•™์Šตํ•œ๋‹ค. ANES๋Š” User-POI ์ด๋ถ„ ๊ทธ๋ž˜ํ”„์˜ ๊ตฌ์กฐ์—์„œ ์‚ฌ์šฉ์ž์˜ ํ–‰๋™์„ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ์ธก๋ฉด์œผ๋กœ ๋‚˜๋ˆ„๊ณ , ๊ฐ๊ฐ์˜ ๊ด€๊ณ„๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ํ–‰๋™ ํŒจํ„ด์„ ์ถ”์ถœํ•˜๋Š” ์ตœ์ดˆ์˜ ๋น„์ง€๋„ํ•™์Šต ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ๋ฐฉ์‹์ด๋‹ค. ์‹ค์ œ LBSN ๋ฐ์ดํ„ฐ์—์„œ ์ˆ˜ํ–‰๋œ ๊ด‘๋ฒ”์œ„ํ•œ ์‹คํ—˜์—์„œ, ANES๋Š” ๊ธฐ์กด์— ์ œ์•ˆ๋˜์—ˆ๋˜ ๊ธฐ๋ฒ•๋“ค๋ณด๋‹ค ๋†’์€ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค€๋‹ค. ์œ„์น˜ ๊ธฐ๋ฐ˜ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์™€๋Š” ๋‹ค๋ฅด๊ฒŒ, ์ด์ปค๋จธ์Šค์˜ ๋ฆฌ๋ทฐ ์‹œ์Šคํ…œ์—์„œ๋Š” ์‚ฌ์šฉ์ž๋“ค์ด ๋Šฅ๋™์ ์ธ ํŒ”๋กœ์šฐ/ํŒ”๋กœ์ž‰ ๋“ฑ์˜ ํ–‰์œ„๋ฅผ ์ˆ˜ํ–‰ํ•˜์ง€ ์•Š๊ณ ๋„ ํ”Œ๋žซํผ์— ์˜ํ•ด ์„œ๋กœ์˜ ์ •๋ณด๋ฅผ ์ฃผ๊ณ ๋ฐ›๊ณ  ์˜ํ–ฅ๋ ฅ์„ ํ–‰์‚ฌํ•˜๊ฒŒ ๋œ๋‹ค. ์ด์™€ ๊ฐ™์€ ์‚ฌ์šฉ์ž๋“ค์˜ ํ–‰๋™ ํŠน์„ฑ์€ ๋ฆฌ๋ทฐ ์ŠคํŒธ์— ์˜ํ•ด ์‰ฝ๊ฒŒ ์•…์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. ๋ฆฌ๋ทฐ ์ŠคํŒธ์€ ์‹ค์ œ ์‚ฌ์šฉ์ž์˜ ์˜๊ฒฌ์„ ์ˆจ๊ธฐ๊ณ  ํ‰์ ์„ ์กฐ์ž‘ํ•˜์—ฌ ์ž˜๋ชป๋œ ์ •๋ณด๋ฅผ ์ „๋‹ฌํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ์ด๋ฃจ์–ด์ง„๋‹ค. ๋‚˜๋Š” ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ์ž ๋ฆฌ๋ทฐ ๋ฐ์ดํ„ฐ์—์„œ ์‚ฌ์šฉ์ž ๊ฐ„ ์‚ฌ์ „ ๊ณต๋ชจ์„ฑ(Collusiveness)์˜ ๊ฐ€๋Šฅ์„ฑ์„ ์ฐพ๊ณ , ์ด๋ฅผ ์ŠคํŒธ ํƒ์ง€์— ํ™œ์šฉํ•œ ๋ฐฉ๋ฒ•์ธ SC-Com์„ ์ œ์•ˆํ•œ๋‹ค. SC-Com์€ ํ–‰๋™์˜ ๊ณต๋ชจ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ์‚ฌ์šฉ์ž ๊ฐ„ ๊ณต๋ชจ ์ ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•˜๊ณ  ํ•ด๋‹น ์ ์ˆ˜๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ „์ฒด ์‚ฌ์šฉ์ž๋ฅผ ์œ ์‚ฌํ•œ ์‚ฌ์šฉ์ž๋“ค์˜ ์ปค๋ฎค๋‹ˆํ‹ฐ๋กœ ๋ถ„๋ฅ˜ํ•œ๋‹ค. ๊ทธ ํ›„ ์ŠคํŒธ ์œ ์ €์™€ ์ผ๋ฐ˜ ์œ ์ €๋ฅผ ๊ตฌ๋ณ„ํ•˜๋Š” ๋ฐ์— ์ค‘์š”ํ•œ ๊ทธ๋ž˜ํ”„ ๊ธฐ๋ฐ˜์˜ ํŠน์ง•์„ ์ถ”์ถœํ•˜์—ฌ ๊ฐ๋… ํ•™์Šต ๊ธฐ๋ฐ˜์˜ ๋ถ„๋ฅ˜๊ธฐ์˜ ์ž…๋ ฅ ๋ฐ์ดํ„ฐ๋กœ ํ™œ์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. SC-Com์€ ๊ณต๋ชจ์„ฑ์„ ๊ฐ–๋Š” ์ŠคํŒธ ์œ ์ €์˜ ์ง‘ํ•ฉ์„ ํšจ๊ณผ์ ์œผ๋กœ ํƒ์ง€ํ•œ๋‹ค. ์‹ค์ œ ๋ฐ์ดํ„ฐ์…‹์„ ์ด์šฉํ•œ ์‹คํ—˜์—์„œ, SC-Com์€ ๊ธฐ์กด ๋…ผ๋ฌธ๋“ค ๋Œ€๋น„ ์ŠคํŒธ ํƒ์ง€์— ๋›ฐ์–ด๋‚œ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ฃผ์—ˆ๋‹ค. ์œ„ ๋…ผ๋ฌธ์—์„œ ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด ์—ฐ๊ตฌ๋œ ์•”์‹œ์  ์—ฐ๊ฒฐ๋ง ํƒ์ง€ ๋ชจ๋ธ์€ ๋ ˆ์ด๋ธ”์ด ์—†๋Š” ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด์„œ๋„ ์‚ฌ์ „์— ์—ฐ๊ฒฐ๋˜์—ˆ์„ ๊ฐ€๋Šฅ์„ฑ์ด ๋†’์€ ์‚ฌ์šฉ์ž๋“ค์„ ์˜ˆ์ธกํ•˜๋ฏ€๋กœ, ์‹ค์‹œ๊ฐ„ ์œ„์น˜ ๋ฐ์ดํ„ฐ๋‚˜, ์•ฑ ์‚ฌ์šฉ ๋ฐ์ดํ„ฐ ๋“ฑ์˜ ๋‹ค์–‘ํ•œ ๋ฐ์ดํ„ฐ์—์„œ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์œ ์šฉํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜์—ฌ ๊ด‘๊ณ  ์ถ”์ฒœ ์‹œ์Šคํ…œ์ด๋‚˜, ์•…์„ฑ ์œ ์ € ํƒ์ง€ ๋“ฑ์˜ ๋ถ„์•ผ์—์„œ ๊ธฐ์—ฌํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€ํ•œ๋‹ค.Following the exploding usage on online services, people are connected with each other more broadly and widely. In online platforms, people influence each other, and have tendency to reflect their opinions in decision-making. Social Network Services (SNSs) and E-commerce are typical example of online platforms. User behaviors in online platforms can be defined as relation between user and platform components. A user's purchase is a relationship between a user and a product, and a user's check-in is a relationship between a user and a place. Here, information such as action time, rating, tag, etc. may be included. In many studies, platform user behavior is represented in graph form. At this time, the elements constituting the nodes of the graph are composed of objects such as users and products and places within the platform, and the interaction between the platform elements and the user can be expressed as two nodes being connected. In this study, I present studies to identify potential networks that affect the user's behavior graph defined on the two platforms. In ANES, I focus on representation learning for social link inference based on user trajectory data. While traditional methods predict relations between users by considering hand-crafted features, recent studies first perform representation learning using network/node embedding or graph neural networks (GNNs) for downstream tasks such as node classification and link prediction. However, those approaches fail to capture behavioral patterns of individuals ingrained in periodical visits or long-distance movements. To better learn behavioral patterns, this paper proposes a novel scheme called ANES (Aspect-oriented Network Embedding for Social link inference). ANES learns aspect-oriented relations between users and Point-of-Interests (POIs) within their contexts. ANES is the first approach that extracts the complex behavioral pattern of users from both trajectory data and the structure of User-POI bipartite graphs. Extensive experiments on several real-world datasets show that ANES outperforms state-of-the-art baselines. In contrast to active social networks, people are connected to other users regardless of their intentions in some platforms, such as online shopping websites and restaurant review sites. They do not have any information about each other in advance, and they only have a common point which is that they have visited or have planned to visit same place or purchase a product. Interestingly, users have tendency to be influenced by the review data on their purchase intentions. Unfortunately, this instinct is easily exploited by opinion spammers. In SC-Com, I focus on opinion spam detection in online shopping services. In many cases, my decision-making process is closely related to online reviews. However, there have been threats of opinion spams by hired reviewers increasingly, which aim to mislead potential customers by hiding genuine consumers opinions. Opinion spams should be filed up collectively to falsify true information. Fortunately, I propose the way to spot the possibility to detect them from their collusiveness. In this paper, I propose SC-Com, an optimized collusive community detection framework. It constructs the graph of reviewers from the collusiveness of behavior and divides a graph by communities based on their mutual suspiciousness. After that, I extract community-based and temporal abnormality features which are critical to discriminate spammers from other genuine users. I show that my method detects collusive opinion spam reviewers effectively and precisely from their collective behavioral patterns. In the real-world dataset, my approach showed prominent performance while only considering primary data such as time and ratings. These implicit network inference models studied on various data in this thesis predicts users who are likely to be pre-connected to unlabeled data, so it is expected to contribute to areas such as advertising recommendation systems and malicious user detection by providing useful information.Chapter 1 Introduction 1 Chapter 2 Social link Inference in Location-based check-in data 5 2.1 Background 5 2.2 Related Work 12 2.3 Location-based Social Network Service Data 15 2.4 Aspect-wise Graph Decomposition 18 2.5 Aspect-wise Graph learning 19 2.6 Inferring Social Relation from User Representation 21 2.7 Performance Analysis 23 2.8 Discussion and Implications 26 2.9 Summary 34 Chapter 3 Detecting collusiveness from reviews in Online platforms and its application 35 3.1 Background 35 3.2 Related Work 39 3.3 Online Review Data 43 3.4 Collusive Graph Projection 44 3.5 Reviewer Community Detection 47 3.6 Review Community feature extraction and spammer detection 51 3.7 Performance Analysis 53 3.8 Discussion and Implications 55 3.9 Summary 62 Chapter 4 Conclusion 63๋ฐ•

    Are Online Consumer Reviews Credible? A Predictive Model based on Deep Learning

    Get PDF
    As the importance of online consumer reviews has grown, the concerns about their credibility being damaged by the presence of fake reviews have also grown. Extant literature reveals the importance of online reviews for consumers. Yet, there is a lack of research in the literature that considers consumer perception while developing a predictive model for the credibility of online reviews. This research aims to fill this gap by combining two different streams in the literature namely human-driven and data-driven approaches. To do so, we use two datasets with different labelling approaches to develop a predictive model, the first one is labelled based on the Yelp filtering algorithm and the second one is labelled based on the crowdโ€™s perception towards credibility. Results from our predictive model reveal that it can predict credibility with a performance of 82% AUC, using reviewsโ€™ attributes namely, length, subjectivity, readability, extremity, external and internal consistency

    Spam Reviews Detection in the Time of COVID-19 Pandemic: Background, Definitions, Methods and Literature Analysis

    Get PDF
    This work has been partially funded by projects PID2020-113462RB-I00 (ANIMALICOS), granted by Ministerio Espanol de Economia y Competitividad; projects P18-RT-4830 and A-TIC-608-UGR20 granted by Junta de Andalucia, and project B-TIC-402-UGR18 (FEDER and Junta de Andalucia).During the recent COVID-19 pandemic, people were forced to stay at home to protect their own and othersโ€™ lives. As a result, remote technology is being considered more in all aspects of life. One important example of this is online reviews, where the number of reviews increased promptly in the last two years according to Statista and Rize reports. People started to depend more on these reviews as a result of the mandatory physical distance employed in all countries. With no one speaking to about products and services feedback. Reading and posting online reviews becomes an important part of discussion and decision-making, especially for individuals and organizations. However, the growth of online reviews usage also provoked an increase in spam reviews. Spam reviews can be identified as fraud, malicious and fake reviews written for the purpose of profit or publicity. A number of spam detection methods have been proposed to solve this problem. As part of this study, we outline the concepts and detection methods of spam reviews, along with their implications in the environment of online reviews. The study addresses all the spam reviews detection studies for the years 2020 and 2021. In other words, we analyze and examine all works presented during the COVID-19 situation. Then, highlight the differences between the works before and after the pandemic in terms of reviews behavior and research findings. Furthermore, nine different detection approaches have been classified in order to investigate their specific advantages, limitations, and ways to improve their performance. Additionally, a literature analysis, discussion, and future directions were also presented.Spanish Government PID2020-113462RB-I00Junta de Andalucia P18-RT-4830 A-TIC-608-UGR20 B-TIC-402-UGR18European Commission B-TIC-402-UGR1

    The 9th Conference of PhD Students in Computer Science

    Get PDF

    Robust Spammer Detection Using Collaborative Neural Network in Internet of Thing Applications

    Get PDF
    Spamming is emerging as a key threat to Internet of Things (IoT)-based social media applications. It will pose serious security threats to the IoT cyberspace. To this end, artificial intelligence-based detection and identification techniques have been widely investigated. The literature works on IoT cyberspace can be categorized into two categories: 1) behavior pattern-based approaches; and 2) semantic pattern-based approaches. However, they are unable to effectively handle concealed, complicated, and changing spamming activities, especially in the highly uncertain environment of the IoT. To address this challenge, in this paper, we exploit the collaborative awareness of both patterns, and propose a Collaborative neural network-based Spammer detection mechanism (Co-Spam) in social media applications. In particular, it introduces multi-source information fusion by collaboratively encoding long-term behavioral and semantic patterns. Hence, a more comprehensive representation of the feature space can be captured for further spammer detection. Empirically, we implement a series of experiments on two real-world datasets under different scenario and parameter settings. The efficiency of the proposed Co-Spam is compared with five baselines with respect to several evaluation metrics. The experimental results indicate that the Co-Spam has an average performance improvement of approximately 5% compared to the baselines

    Review on recent advances in information mining from big consumer opinion data for product design

    Get PDF
    In this paper, based on more than ten years' studies on this dedicated research thrust, a comprehensive review concerning information mining from big consumer opinion data in order to assist product design is presented. First, the research background and the essential terminologies regarding online consumer opinion data are introduced. Next, studies concerning information extraction and information utilization of big consumer opinion data for product design are reviewed. Studies on information extraction of big consumer opinion data are explained from various perspectives, including data acquisition, opinion target recognition, feature identification and sentiment analysis, opinion summarization and sampling, etc. Reviews on information utilization of big consumer opinion data for product design are explored in terms of how to extract critical customer needs from big consumer opinion data, how to connect the voice of the customers with product design, how to make effective comparisons and reasonable ranking on similar products, how to identify ever-evolving customer concerns efficiently, and so on. Furthermore, significant and practical aspects of research trends are highlighted for future studies. This survey will facilitate researchers and practitioners to understand the latest development of relevant studies and applications centered on how big consumer opinion data can be processed, analyzed, and exploited in aiding product design
    • โ€ฆ
    corecore