Title: WOM Scouter: mobile service for reputation extraction from weblogs

Authors: T. Kawamura, S. Nagano, M. Inaba, Y. Mizoguchi

Addresses: Corporate Research and Development Center, Toshiba Corp., Japan. ' Corporate Research and Development Center, Toshiba Corp., Japan. ' Corporate Research and Development Center, Toshiba Corp., Japan. ' Corporate Research and Development Center, Toshiba Corp., Japan

Abstract: In this paper, we introduce a mobile service that extracts reputations of a product from weblogs by cellular phones during shopping. In a mobile computing environment, it would be desirable for users to bind their real-world situation and useful information on the internet. However, the current typical devices for mobile computing, such as cellular phones, have small displays, limited operations, and narrow-band network. Thus, semantics can be useful in order to extract only the necessary information depending on the users| situation. Word-Of-Mouth (WOM) Scouter is an application for this purpose. If the user takes a photo of a product barcode on the package with a cellular phone camera, WOM Scouter first gets the product metadata (name, manufacturer, etc.) from the internet and collects blogs that review the product. Also, it analyses the blog contents with NLP techniques and ontologies. Then, it indicates the overall reputation (positive or negative), and other related products that are the subject of much discussion in the blogs. This paper illustrates each function of this service and a public experiment and evaluation at a real consumer electronics store and book-store in Tokyo in March 2006. This is a case of semantics use to provide an instant benefit in a mobile computing environment.

Keywords: ontology; product metadata; mobile services; m-services; reputation extraction; blogs; weblogs; product reputations; cellular phones; mobile phones; semantics; product reviews; consumer electronics; Japan; word of mouth.

DOI: 10.1504/IJMSO.2008.021891

International Journal of Metadata, Semantics and Ontologies, 2008 Vol.3 No.2, pp.132 - 141

Published online: 08 Dec 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article