A Store Recommendation Procedure in Ubiquitous Market for User Privacy

U-마켓에서의 사용자 정보보호를 위한 매장 추천방법

  • 김재경 (경희대학교 경영대학 경영학과) ;
  • 채경희 (경희대학교 경영대학 경영학과) ;
  • 구자철 (한국과학기술원 산업공학과)
  • Published : 2008.09.30

Abstract

Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Keywords

References

  1. Adomavicius, G. and Tuzhilin, A., "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 6, 2005, pp. 734-749 https://doi.org/10.1109/TKDE.2005.99
  2. Al-Muhtadi, J., Ranganathan, A., Campbell, R., and Mickunas, M.D., "A flexible, privacy- preserving authentication framework for ubiquitous computing environments," In International Workshop on Smart Appliances and Wearable Computing(IWSAWC 2002), pp. 771-776
  3. Bell, G., and Dourish, P., "Yesterday's tomorrows: notes on ubiquitous computing's dominant vision," Ubiquit Comput, Vol. 11, 2007, pp. 133-143 https://doi.org/10.1007/s00779-006-0071-x
  4. Beresford, A., and Stajano, F., "Location pri vacy in pervasive computing," IEEE Pervasive Computing, Vol. 2, No. 1, 2003, pp. 46-55 https://doi.org/10.1109/MPRV.2003.1186725
  5. Brown, P.J., Bovey, J.D., and Chen, X., "Context-aware applications: From the laboratory to the marketplace," IEEE Personal Communications, Vol. 4, No. 5, 1997, pp. 58-64 https://doi.org/10.1109/98.626984
  6. Degemmis, M., Lops P., and Semeraro, G., "A content-collaborative recommender that exploits WordNet-based user profiles for neighborhood formation," User Modeling and User-Adapted Interaction, Vol. 17, No. 3, 2007, pp. 217-255 https://doi.org/10.1007/s11257-006-9023-4
  7. Dey, A.K., "Context-aware computing: The CyberDesk project," AAAI 1998 Spring Symposium on Intelligent Environments Technical Report SS-98-02, 1998, pp. 51-54
  8. Dey, A.K., Abowd, G.D., and Wood, A., "A CyberDesk: A Framework for providing self-integrating context-aware services," Knowledge-Based Systems, Vol. 11, 1999, pp. 3-13
  9. Fano, A.E., "Shopper's Eye: Using Locationbased Filtering for a Shopping Agent in the Physical World," Proceedings of the Second International Conference on Autonomous Agents(Agents'98), pp. 416-421
  10. Hill, W., Stead, L., Rosenstein, M., and Furnas, G., "Recommending and evaluating choices in a virtual community of use," Proceedings of CHI 1995 Conference on Human Factors in Computing Systems, 1995, pp. 194- 201
  11. Jang, S. and Woo, W., "ubi-UCAM: A unified context-aware application model," Lecture Note Artificial Intelligence(LNAI), Vol. 2680, 2003, pp. 178-189
  12. Jessup, L.M. and Robey, D., "The relevance of social issues in ubiquitous computing environments," Communications of ACM, Vol. 45, No. 12, 2002, pp. 88-91
  13. Jin, X., Mobasher, B., and Zhou, Y., "A Web Recommendation System Based on Maximum Entropy," Information Technology : Coding and Computing(ITCC), No. 1, 2005, pp. 213-218
  14. Kaufman, L. and Rousseeuw, P.J., Finding groups in data: An introduction to cluster analysis, New York: John Wiley and Sons., 1990
  15. Keegan, S. and O`Hare, G.M.P., "Easishop: Delivering Cross Merchant Product Comparison Shopping for the Mobile User," Proceedings of the15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), 5th-8th September Barcalona, Spain, IEEE Press
  16. Kim, H.K., Lee, K.J., and Kim, J.K., "A peer-to-peer CF-recommendation for ubiquitous environment," PRIMA, 2006, pp. 678- 683
  17. Konstan, J., Miller, B., Maltz, D., Herlocer, J., Gordon, L., and Rield, J., "Grouplens: Applying collaborative filtering to usenet news," Communications of ACM, Vol. 40, 1997, pp. 77-87 https://doi.org/10.1145/245108.245126
  18. Krulwich, B., "LIFESTYLE FINDER : Intelligent User Profiling Using Large-Scale Demographic Data," Artificial Intelligence Magazine, Vol. 18, No. 2, 1997, pp. 37-45
  19. Lemire, D., Boley, H., McGrath, S., and Ball, M., "Collaborative filtering and inference rules for context-aware learning object recommendation," International Journal of Interactive Technology and Smart Education, Vol. 2, No. 3, 2005, pp. 179-188 https://doi.org/10.1108/17415650580000043
  20. Marco Degemmis, Pasquale Lops, Giovanni Semeraro., "A content-collaborative recom mender that exploits WordNet-based user profiles for neighborhood," User Model User-Adap Inter, 2007. pp. 217-255
  21. Mehta, B., Hofmann, T., and Fankhauser, P., "Lies and propaganda: Detecting spam users in collaborative filtering," In IUI'07: Proceedings of Intelligent user interfaces, ACM Press, 2007, pp. 14-21
  22. Montaner, M., Lopez, B., and Rosa, J.L., "A taxonomy of recommender agents on the internet," Artificial Intelligence Review, Vol. 19, 2003, pp. 285-330 https://doi.org/10.1023/A:1022850703159
  23. Pazzani, M.J., "A framework for collaborative, content-based and demographic filtering," Artificial Intelligence Review, Vol. 13, No. 5, 1999, pp. 393-408 https://doi.org/10.1023/A:1006544522159
  24. Ren, K., Lou, W., Kim, K., and Deng, R., "A novel privacy preserving authentication and access control scheme for pervasive computing environments," IEEE Transactions on Vehicular Technology, Vol. 55, 2006, pp. 1373-1384 https://doi.org/10.1109/TVT.2006.877704
  25. Rensnick, P., Iacovou, N., Suchak, M., Bergstrom, P., and Riedl, J., "GroupLens: An open architecture for collaborative filtering of netnews," Proceedings of the Computer Supported Cooperative Work conference, 1994, pp. 175-186
  26. Ryan, N.S., Pascoe, J., and Morse, D.R., "Enhanced reality fieldwork: The contextaware archaeological," Computer Applications in Archaeology, 1997
  27. Sadeh, N., Chan, T-C, Van, L., Kwon O., and Takizawa, K., "Creating an open agent environment for context-aware m-Commerce in agentcities: Challenges in open agent environments," LNAI, Springer Verlag, 2003, pp. 152-158
  28. Schafer, J.B., Konstan, J., and Riedl, J., "Recommender System in E-Commerce," Proceedings of the ACM Conference on Electronic Commerce, 1999
  29. Sarwar, B., Karypis, G., Konstan, J., and Riedl, J., "Analysis of recommendation algorithms for e-Commerce," Proceedings of the ACM Conference on Electronic Commerce, 2000, pp. 158-167
  30. Shahabi, C., and Banaei-Kashani, F., "Efficient and anonymous web-usage mining for web personalization," Information Journal on Computing, Vol. 15, No. 2, 2003, pp. 123-147
  31. Srivastava, J., Cooleyz, R., Deshpande, M., and Tan, P.N., "Web usage mining: Discovery and applications of usage patterns from web data," Proceedings of the 2000 ACM SIGKDD Conference, 2000, pp. 13-23
  32. Weiser, M. "The computer for the 21st Century," Sci Am, Vol. 265, No. 3, 1991, pp. 94-104
  33. Yan, T., Jacobsen, M., Garcia-Molina, H., and Dayal, U., "From user access patterns to dynamic hypertext linking," Proc Fifth Int World Wide Web Conf on Computer Networks and ISDN, 1996, pp. 1007-1014