Within the field of computing, many scenarios involve aspects of social networking, wherein users may establish associations representing relationships with other users, and may share data of interest with all or some associated users. In this context, a user may establish a social profile comprising data that identifies various aspects of the user to associated users, such as demographic information, a set of interests such as hobbies or professional skills, and a set of resources that are interesting to the user. Users may consent to having some aspects of his or her social profile shared; e.g., a user might generate a message (such as a personal status, a note about a particular topic, or a message directed to another user) that may initially be accessible only to users who are associated with the user, but may permit an associated user to repost the message for access by all of the users associated with the associated user (e.g., a friend of a user may be permitted to take the user's message and repost it to grant access to the friend's friends.) In this manner, data shared over a social network (and, in particular, data comprising the social profile of a user) may be propagated in select ways to others via the social network. Many social networks also allow users to form social groups associated with particular topics, such as a shared set of experiences (e.g., the members of a school class) or interests (e.g., a particular product, product vendor, or product area.)
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key factors or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The rich set of information represented within a social network, and particularly within the social profiles of users, associations among users, and the formation of social groups, may facilitate the advertising and targeting of products to users. In particular, vendors of products may present product offers to the users of various social groups that are highly targeted for the product. For example, the social network may detect user interest in a product among the users of a social group, such as by monitoring conversations among the users that relate to the product, product reviews of the product generated by the users, and search queries executed by the users that relate to the product. When an interested user group is detected, a vendor of the product may be notified, and may consent to the presentation of an offer to the user group relating to the product. The offer may be contingent upon many types of actions, e.g., testing or purchasing the product, influencing other users of the social network to test or purchase the product, or posting a user review of the product, and may involve many types of rewards, e.g., a discounted price or rebate on the product, an improved version of the product (such as an extended warranty or a device with more storage capacity), or an award of virtual currency conferring value within the social network. The social network may advertise the offer to the users of the social group in various ways, e.g., by notifying the user of the offer to the social group within an advertisement for the product, or by notifying the user of other users of the social network who have purchased the product. The social network may also be configured to detect a redemption of the offer by a user of the social group, and to provide the reward to the user on behalf of the vendor. The social network may also track the influence of users upon other users within the social network, and may present to the user a social influence profile indicating the effects of the user's actions on other users of the social network (such as the effectiveness of the user's product reviews.) In these and other ways, the social network and the information represented therein may be utilized to promote the sale of products and services among the users of various social groups.
To the accomplishment of the foregoing and related ends, the following description and annexed drawings set forth certain illustrative aspects and implementations. These are indicative of but a few of the various ways in which one or more aspects may be employed. Other aspects, advantages, and novel features of the disclosure will become apparent from the following detailed description when considered in conjunction with the annexed drawings.
The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to facilitate describing the claimed subject matter.
Within the field of computing, many scenarios involve a social network, wherein users may generate a personal representation in the form of a social profile, such as a set of personal descriptors of the user's identity, academic and professional background, and personal interests. Users may also form associations with other users of the social network, where such associations may represent familial relationships, friendships, acquaintanceships, academic and professional connections, and shared interests. The user may also consent to share the contents of the social profile with the associated users, either by affirmatively inviting an associated user to view a particular data item or by simply granting such other users access to the social profile, and may view the social profiles of the associated users. The users of the social network may also communicate through the delivery of various types of messages, such as private messages sent to one or more associated users or public messages that are shared with all of the associated users.
The users of the social network may also form various types of social groups, may represent, e.g., a set of users having a shared experience (such as the students of an academic class) or a shared interest (such as an appreciation for a particular genre of music), a social clique (such as a highly interconnected set of users), or an organization. The social groups may also be open (wherein anyone may join) or closed (wherein a user may be admitted only with the consent of the current members of the group), public or private, and may be hierarchically or anarchically organized (with or without defined leadership or roles.) In particular, a social group may comprise a set of users having a shared interest in a product, the products of a vendor, or a product area. The users of the social group may share data items that may be of interest to other users of the social group (e.g., links to product reviews or news articles relating to new or current products), and may engage in various conversations relating to such topics.
Also within the field of computing, many scenarios involve the advertisement of products to users 14 (e.g., through advertisements delivered via a network such as in websites or media broadcasts, or through applications that may be executed online or offline upon devices of the user 14.) These advertisements may occasionally be targeted to the user 14, e.g., by accessing demographic information associated with the user (such as the user's age, gender, and location) and presenting product advertisements that are generally persuasive for users 14 having such demographics. As a first example, a vendor of a product may choose to place advertisements in several websites, and for each website, may identify the demographics of typical visitors and may choose an advertisement for each website that is persuasive to viewers having such demographics. As a second example, a communication service, such as an email host or a chat network, may monitor communications involving a particular user 14, may identify one or more topics of conversation involving the user, and may present to the user 14 advertisements for products that are related to such topics. In these and other ways, advertisers may achieve improved effectiveness (such as ensuing product purchases) in response to the presented advertisements.
Presented herein are techniques for extending the opportunities and effectiveness of targeted advertising by utilizing the information represented in the social network 12. In particular, the membership of various users 14 in various social groups 24 may provide an opportunity for targeted advertising to the social group 24 based on the traits shared among the users 14 of the social group 24. For example, a social group 24 may be formed to discuss a particular product 24, a particular vendor of one or more products 24, or a particular product area, such as the field of mobile communication devices. The social network 12 may facilitate the marketing of products to these social groups 24 by detecting the user interests of the social group 24, as may be expressed, e.g., in the types of data items shared among the users 14 of the social group 24, in the conversations among the users 14 of the social group 24, and in the search queries executed within the social network 12 by the users 14 of the social group 24. Upon detecting a user interest among the users 14 of the social group 24 in a particular product or product area, the social network 12 may notify a vendor of the product. The vendor may then wish to make an offer relating to the product to the users 14 of the social group 24, such as a price discount or rebate for the product or an improved version of the product (such as included accessories or an extended service warranty), and the social network 12 may present the offer to the users 14. In this manner, the social network 12 may assist the vendor with the marketing of its products to social groups 24 that may be interested in such products, and may convey valuable offers to the users 14 of the social network 12.
Still another embodiment involves a computer-readable medium comprising processor-executable instructions configured to apply the techniques presented herein. An exemplary computer-readable medium that may be devised in these ways is illustrated in
The techniques discussed herein may be devised with variations in many aspects, and some variations may present additional advantages and/or reduce disadvantages with respect to other variations of these and other techniques. Moreover, some variations may be implemented in combination, and some combinations may feature additional advantages and/or reduced disadvantages through synergistic cooperation. The variations may be incorporated in various embodiments (e.g., the exemplary method 50 of
A first aspect that may vary among embodiments of these techniques relates to the scenarios wherein such techniques may be utilized. A first aspect that may vary among embodiments of these techniques relates to the scenarios wherein these techniques may be utilized. As a first example, these techniques may be utilized within many types of social networks 12 hosting many types of users 14, such as a genealogy social network configured to track families, a friendship social network configured to track friends, an academic or professional social network configured to track scholastic or business contacts, a dating social network configured to perform matchmaking services, and a gaming social network configured to connect users to instances of multiplayer games. As a second example of this first aspect, these techniques may be applied to promote many types of products 38 within many product areas 36 and offered by many types of vendors 40, such as manufactured, cultivated, or discovered articles; media items, such as movies; and tangible services (such as manufacturing or repairing an article) and intangible services (such as teaching a subject.) Those of ordinary skill in the art may devise many such scenarios wherein these techniques may be utilized.
A second aspect that may vary among embodiments of these techniques relates to the architecture of the embodiment. As a first example, an embodiment of these techniques may be implemented within the social network 12, or by a vendor 40 of one or more products 38 that interfaces with the social network 12, or by an independent service that interfaces with both the social network 12 and a set of vendors 40. As a second example of this second aspect, while
A third aspect that may vary among embodiments of these techniques relates to the manner of detecting user interest 84 in a product 38 among the users 14 of a social group 24 by monitoring the activities of the users 14. As a first example, an embodiment of these techniques may detect the user interest 84 by monitoring various messages 22 generated by such users 14, such as personal messages 22 sent by a first user 14 to a second user 14, status messages 22 generated by a user 14 and accessible by many other users 14, and comments comprising various conversations 32 among two or more users 14 of the social network 24. As a second example of this third aspect, an embodiment of these techniques may detect the user interest 84 by monitoring search queries 34 submitted by the users 14 of a social group 24 that are associated with the product 38 or the product area 36, which may indicate a user interest 84 of the user 14 that may be shared with other users 14 of the social group 24, or research into the product 38 by the user 14 on behalf of the other users 14 of the social group 24. As a third example of this third aspect, an embodiment of these techniques may detect the user interest 84 by monitoring user reviews generated by the users 14 of the social group 24 regarding the product 38 or the product area 36 containing the product 38; if the user review comprises a positive user review of the product 38, the user 14 (and possibly other users 14 of the social group 24) may have a user interest 84 in the product 38, and may be induced to purchase the product 38 through targeted advertising for the product 38, or, if the user 14 has already purchased the product 38, to promote the product 38 to other users 14 of the social group 24. As a fourth example of this third aspect, the social group 24 may solicit offers for a specific product 38, or for products 38 within a product area 36, and an embodiment of these techniques may be configured to detect the user interest 84 by receiving the solicitation from the social group 24 and sending the solicitation to the vendors 40 of the products 38. As a fifth example of this third aspect, the embodiment may detect a potential user interest 84 among the users 14 of the social group 24, such as a strong interest shared among the users 14 of the social group 24 in the products 38 of the vendor 40, that, even in the absence of detected expressions of user interest 84 in the product 38, may indicate a latent user interest 84 in the product 38, and that may indicate an opportunity for targeted advertising. Those of ordinary skill in the art may devise many ways of detecting user interest 84 among the users 14 of the social group 24 in the product 38 while implementing the techniques presented herein.
A fourth aspect that may vary among embodiments of these techniques relates to the types of offers 42 for various products 38 that may be provided by vendors 40 and extended to the users 14 of the social group 24. The offer 42 might generally specify an action to be performed by a user 14 of the social network 24 and a reward that the vendor 40 is willing to provide upon performance of the action. As a first example of this fourth aspect, the offer 42 may specify many types of actions, including a purchase of the product 38 by the user 14, a testing of the product 38 by the user 14 in order to induce a subsequent purchase, a promotion of the product 38 by the user 14 to other users 14 of the social group 24, or the posting by the user 14 of a user review of the product 38. For example, the offer 42 may also be redeemable upon a user 14 of the social group 24 influencing a second user 14 of the social group 24 to purchase the product 38, or may be extended to the users 14 of a first social group 24 and may be redeemable when a user 14 of the first social group 24 influences a user 14 of a second social group 24 regarding the product 38.
As a second example of this fourth aspect, many types of rewards may be offered by the vendor 40 in response to the action specified in the offer 42. For example, where the action of the offer 42 involves a purchase by the user 14 of the product 38, the reward may involve a reduced price for the product 38, such as a discount or a post-purchase rebate. The reward may also comprise the sale of an improved version of the product, such as a later model with additional features; a free inclusion or a discount on associated products 38, such as peripheral devices, accessories (e.g., printer toner or paper offered with a printer); or an extension or discount on a warranty for the product 38. The reward might also comprise an award of virtual currency, which may be redeemable for value within the social network 12.
As a third example of this fourth aspect, many types of conditions may be placed on the offer 42, either to limit the scope of the offer 42 to a particular set of users 14 or to encourage the users 14 the accept the offer 42. For example, the offer 42 may be limited to the users 14 of the social group 24, and may not be redeemable by users 14 outside of the social group 24, in order to make the offer 42 appear exclusive and of higher value. As one variation, the offer 42 may be extendable by the users 14 of the social group 24 to at least one user 14 outside the social group 24. As another example, the offer 24 may only be valid for a limited time, thus encouraging users 14 to take advantage of the offer 24 prior to its expiration.
As a fourth example of this fourth aspect, the offer 42 may encourage a set of users 14 of a social group 24 to take action regarding a product 38. As a first example, the offer 42 may be redeemable when two or more users 14 of the social group 24 purchase the product 38, e.g., a discount on a bulk purchase of the product 38 by several users 14 of the social group 24. As a second example, the offer 42 may involve increasing rewards for additional actions among the users 14 of the social group 24. For example, when a first user 14 influences a second user 14 to purchase the product 38, the first user 14 may receive a first reward, and when the second user 14 subsequently influences a third user 14 to purchase the product 38, the first user 14 may receive a second reward, as well as the second user 14 receiving a third reward. This type of offer 42 may encourage the cooperative promotion of the product 24 by several users 14 of the social group 24, and may particularly encourage “early adopters” who are the first members of the social group 24 to try, purchase, and/or promote the product 38.
As a fifth example of this fourth aspect, in addition to receiving an offer 42 from the vendor 40 and presenting the offer 42 to the users 14, the social network 12 may provide additional services relating to the offer 42 and the product 38. For example, in addition to notifying the users 14 of the availability of the offer 42, the social network 12 may provide e-commerce infrastructure to permit users 14 to complete transactions relating to the product 38. The social network 12 may also notify the vendor 40 of the actions of the users 14 relating to the product 38 and the offer 42, such as a purchase of the product 38 or the promotion of the product 38 to other users 14. The social network 12 may also facilitate the completion of the offer 42, e.g., by delivering a reward (such as an award of cash or virtual currency) to the users 14.
A fifth aspect that may vary among embodiments of these techniques relates to the presentation of the offer 42 to the users 14 of the social network 12. As a first example, when an offer 42 is extended by a vendor 40 to the social group 24, the users 14 of the social group 24 may be notified, e.g., by sending messages to the users 14 on behalf of the vendor 40 that describe the offer 42. As a second example of this fifth aspect, the social network 12 may present the offer 42 to the users 14 upon taking actions involving the social group 24, e.g., upon viewing any conversation 32 among the users 14 of the social group 24. As a third example of this fifth aspect, the social network 12 may present the offer 42 to the users 14 in the context of information about the product 38, e.g., while the user 14 is viewing a product review of the product 38. As a fourth example of this fifth aspect, the social network 12 may permit a user 14 to request to view all of the offers 42 for various products 38 extended by various vendors 40 to the users 14 of the social group 24. This presentation may also be filtered upon the request of the user 14, e.g., to show only offers 42 by a particular vendor 40, or only offers 42 relating to the products 38 within a particular product area 36. As a fifth example of this fifth aspect, the offer 42 may be presented to a user 14 after the user 14 has completed a purchase 102 of the product 38 (e.g., an offer 42 for a post-purchase rebate, an extension of a warranty, or a product accessory in exchange for a posting by the user 14 of a product review of the product 38 may be presented to the user at the conclusion of the purchase transaction.)
As a fifth example of this fifth aspect, the offer 42 may be presented to the user 14 in conjunction with an ordinary advertisement for the product 38; e.g., the advertisement may be customized with information pertinent to the user 14, the social group 24, and/or the offer 42. This customization might be performed for advertisements displayed outside of the social network 12; e.g., a user 14 may register with a social network 12 through a persistent set of login credentials, such as an OpenID profile, and a website outside of the social network 14 may, upon displaying an advertisement for the product 38, utilize the OpenID profile of the user 14 to identify the social groups 24 that include the user 14 and to display offers 42 extended to these social groups 24. The presentation of the offer 42 may also be customized in other ways, e.g., by displaying the number or names of other users 14 of the social group 24 who have redeemed the offer 42 and/or purchased the product 38. As a sixth example of this fifth aspect, when a first user 14 of the social group 24 redeems the offer 42 (e.g., when the social network 12 detects an offer redemption of the offer 42), other users 14 of the social group 24 may be spontaneously notified of the offer redemption by the first user 14.
A sixth aspect that may vary among embodiments of these techniques relates to additional features that may be included in the social network 14 relating to the extension of an offer 42 for a product 38 to the users 14 of a social group 24. As a first example, a user 14 of the social network 12 may be interested in redeeming an offer 42 for a product 38, but may have been extended several offers 42 for the product 38, and may have difficulty choosing among the offers 42. For example, the user 14 may be a member of many social groups 24 to which offers 42 have been extended, and the offers 42 may differ in redeeming actions and rewards. The social network 12 may assist the user 14 in selecting an offer 42 for the product 38 by comparing the available offers 42 and recommending one that may be appealing to the user 14. This recommendation may be based on the cost savings to the user 14 in purchasing the product 38 under different offers 42, but may also involve other considerations, e.g., the comparative value of product accessories included with the product 38 through various offers 42, the total savings to all members of a social group 24, and a comparative preference of the user 14 for a point-of-sale discount than a delayed post-sale rebate (such as a mail-in rebate.)
As a second example of this sixth aspect, an embodiment of these techniques may be configured to track the influence of users 14 on other users 14, such as the influential effects of the comments of the user 14 and the persuasiveness of product reviews of various products 38. This tracking may be achieved by evaluating the actions of a second user 14 (e.g., the actions of the second user 14 in reading a product review of a product 38, in rating the persuasiveness of a product review of a product 38, in reposting or referencing a comment or product review of a product 38, in choosing among products 38 in a product area 36, and in purchasing a product 38), and then identifying the actions of a first user that influenced the actions of the second user 14. This tracking may be useful, e.g., to notify the user 14 as to the effectiveness of his or her actions, such as by notifying a first user 14 when a second user 14 exhibits a user influence, such as purchasing the product 38, based on the actions of the first user 14. A user 14 may request to view an influence profile that indicates the effectiveness of the actions of the user 14 (e.g., the detected influence of the user's comments, recommendations, and product reviews on other users 14 of the social network 12, and the social network 12 may prepare and present to the user 14 an influence profile that indicates the influence of the user 14. This tracking may also be useful to identify influential users 14 who may be able to influence other users 14, and who therefore may be an appealing target for advertising (e.g., by offering a product 38 to the influential user 14 at a discount, the vendor 40 may be able to obtain an independent and persuasive product review that may improve sales of the product 38 to other users 14.)
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
As used in this application, the terms “component,” “module,” “system”, “interface”, and the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
Furthermore, the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Although not required, embodiments are described in the general context of “computer readable instructions” being executed by one or more computing devices. Computer readable instructions may be distributed via computer readable media (discussed below). Computer readable instructions may be implemented as program modules, such as functions, objects, Application Programming Interfaces (APIs), data structures, and the like, that perform particular tasks or implement particular abstract data types. Typically, the functionality of the computer readable instructions may be combined or distributed as desired in various environments.
In other embodiments, device 142 may include additional features and/or functionality. For example, device 142 may also include additional storage (e.g., removable and/or non-removable) including, but not limited to, magnetic storage, optical storage, and the like. Such additional storage is illustrated in
The term “computer readable media” as used herein includes computer storage media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions or other data. Memory 148 and storage 150 are examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by device 142. Any such computer storage media may be part of device 142.
Device 142 may also include communication connection(s) 156 that allows device 142 to communicate with other devices. Communication connection(s) 156 may include, but is not limited to, a modem, a Network Interface Card (NIC), an integrated network interface, a radio frequency transmitter/receiver, an infrared port, a USB connection, or other interfaces for connecting computing device 142 to other computing devices. Communication connection(s) 156 may include a wired connection or a wireless connection. Communication connection(s) 156 may transmit and/or receive communication media.
The term “computer readable media” may include communication media. Communication media typically embodies computer readable instructions or other data in a “modulated data signal” such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” may include a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
Device 142 may include input device(s) 154 such as keyboard, mouse, pen, voice input device, touch input device, infrared cameras, video input devices, and/or any other input device. Output device(s) 152 such as one or more displays, speakers, printers, and/or any other output device may also be included in device 142. Input device(s) 154 and output device(s) 152 may be connected to device 142 via a wired connection, wireless connection, or any combination thereof. In one embodiment, an input device or an output device from another computing device may be used as input device(s) 154 or output device(s) 152 for computing device 142.
Components of computing device 142 may be connected by various interconnects, such as a bus. Such interconnects may include a Peripheral Component Interconnect (PCI), such as PCI Express, a Universal Serial Bus (USB), firewire (IEEE 1394), an optical bus structure, and the like. In another embodiment, components of computing device 142 may be interconnected by a network. For example, memory 148 may be comprised of multiple physical memory units located in different physical locations interconnected by a network.
Those skilled in the art will realize that storage devices utilized to store computer readable instructions may be distributed across a network. For example, a computing device 160 accessible via network 158 may store computer readable instructions to implement one or more embodiments provided herein. Computing device 142 may access computing device 160 and download a part or all of the computer readable instructions for execution. Alternatively, computing device 142 may download pieces of the computer readable instructions, as needed, or some instructions may be executed at computing device 142 and some at computing device 160.
Various operations of embodiments are provided herein. In one embodiment, one or more of the operations described may constitute computer readable instructions stored on one or more computer readable media, which if executed by a computing device, will cause the computing device to perform the operations described. The order in which some or all of the operations are described should not be construed as to imply that these operations are necessarily order dependent. Alternative ordering will be appreciated by one skilled in the art having the benefit of this description. Further, it will be understood that not all operations are necessarily present in each embodiment provided herein.
Moreover, the word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as advantageous over other aspects or designs. Rather, use of the word exemplary is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims may generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
Also, although the disclosure has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The disclosure includes all such modifications and alterations and is limited only by the scope of the following claims. In particular regard to the various functions performed by the above described components (e.g., elements, resources, etc.), the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the disclosure. In addition, while a particular feature of the disclosure may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes”, “having”, “has”, “with”, or variants thereof are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising.”