Position: Home page » Computing » Decentralization of mobile user behavior characteristics

Decentralization of mobile user behavior characteristics

Publish: 2021-04-01 05:40:35
1. Decentralization is a phenomenon or structure, which can only appear in a system with many users or nodes, and each user can connect and influence other nodes. Generally speaking, everyone is the center, and everyone can connect and influence other nodes. This flat, open-source and equal phenomenon or structure is called "decentralization"< Br > at the same time, "decentralization" is one of the typical features of blockchain, which uses distributed storage and computing power. The rights and obligations of the whole network nodes are the same, and the data in the system is jointly maintained by the whole network nodes, so that the blockchain no longer relies on the central processing node to realize the distributed storage, recording and updating of data. Each blockchain follows a unified rule, which is based on a cryptographic algorithm rather than a credit certificate, and the data update process needs to be approved by the user, so that the blockchain does not need the endorsement of intermediaries and trust institutions< The characteristics of br> de centralization:
centralization is first reflected in diversification. In the Internet world, there are no more than several portals has the final say. Various websites have begun to voice their own voice, express different choices and different hobbies, and these websites are distributed in every corner of the Internet world. Br > decentralisation is followed by the centralization of people, and decentralisation of content has become a trend, and people have become the key force to determine the survival of websites. It's a great change to build a website with indivials who lack interaction to gather talents and contribute their wisdom in the form of a circle. That is user-oriented, humanized< < br > decentralized content: < br > decentralization is the form of social relationship and content generation formed in the development of the Internet, which is a new network content proction process relative to "centralization"< Br > compared with the early Internet (Web1.0) era, today's Web (Web2.0) content is no longer proced by professional websites or specific groups of people, but is created by all Internet users with equal rights. Anyone can express their views or create original content on the Internet to proce information together< Br > with the diversification of network service forms, the decentralized network model is becoming clearer and more possible. After the rise of Web2.0, the services provided by Wikipedia, Flickr, blogger and other network service providers are decentralized. Any participant can submit content, and Internet users can create or contribute content together< After that, with the emergence of more simple and easy-to-use decentralized network services, the characteristics of Web2.0 became more and more obvious. For example, the birth of services more suitable for ordinary Internet users, such as twitter and Facebook, made it easier and more diversified to proce or contribute content to the Internet, thus enhancing the enthusiasm of Internet users to participate in the contribution and recing the threshold of procing content. Eventually, every netizen becomes a tiny and independent information provider, making the Internet more flat and content proction more diversified.
2.

The essence of decentralization in blockchain technology is decentralization, distrust and collective maintenance

Decentralization: there is no centralized hardware or management organization in the whole network, the rights and obligations of any node are equal, and the damage or loss of any node will not affect the operation of the whole system. Therefore, it can also be considered that the blockchain system has excellent robustness

2. Distrust: the data exchange between each node in the whole system does not need mutual trust. The operation rules of the whole system are open and transparent, and all data contents are open. Therefore, within the specified rule range and time range of the system, nodes can not and cannot cheat other nodes

3. Collective maintenance: data blocks in the system are jointly maintained by all nodes with maintenance function in the whole system, and these nodes with maintenance function can be participated by anyone

{rrrrrrr}

extended data:

blockchain technology never excludes supervision, and supervision nodes can easily access any blockchain network. Due to the open and transparent nature of blockchain, regulators can more easily monitor the transaction data of the whole system, and because of its tamper proof nature

once a transaction occurs, it cannot be changed or deleted, and it is impossible to cheat the supervision by data fraud, which is more concive for the supervision department to supervise the market behavior. Therefore, blockchain will become an important tool of regtech

3.

The characteristics of decentralization in blockchain technology are decentralization, distrust and collective maintenance

Decentralization: there is no centralized hardware or management organization in the whole network, the rights and obligations of any node are equal, and the damage or loss of any node will not affect the operation of the whole system. Therefore, it can also be considered that the blockchain system has excellent robustness

2. Distrust: there is no need to trust each other when participating in the data exchange between each node in the whole system. The operation rules of the whole system are open and transparent, and all data contents are also open. Therefore, in the specified rule range and time range of the system, nodes cannot and cannot cheat other nodes

3. Collective maintenance: the data blocks in the system are jointly maintained by all the nodes with maintenance function in the whole system, and these nodes with maintenance function can be participated by anyone

extended data

blockchain technology has never excluded supervision, and supervision nodes can easily access any blockchain network. Because of the openness and transparency of the blockchain, the regulatory authorities can monitor the transaction data of the whole system more conveniently, and because of the anti tampering property of the blockchain

once a transaction occurs, it can't be changed or deleted, so it's impossible for the data fraud to hoodwink the supervision, which is more concive to the supervision of the regulatory authorities on the market behavior. Thus, blockchain will become an important tool for regulatory Technology (regtech)

source: network blockchain

4. First, the goal of refined operation. For example, if your proct is just a tool, I'm afraid it can't be said that there are too many refined operations. Generally, it's enough to do a good job in routine user behavior analysis, and then cooperate with user qualitative research to guide proct design; If it is a content-based proct, or a proct with both function and content, it really needs to be considered. 2. Design statistical framework suppose that users will frequently interact and use functions on your app, and browse or generate content at the same time, so you need to design your statistical framework well while designing procts. 2、 Data collection first lists the data items you need, then evaluates which parts need to be reported by app and which parts can be counted in the background, and then adds them on the front and back platforms. Generally speaking, the collected data reported by app must be carefully checked and tested before release, because once the version is released and the data collection goes wrong, not only the previous efforts are wasted, but also a lot of dirty data will be brought. At the same time, the running efficiency of the client may be reced, and the gain is not worth the loss. 2. After data collation and data collection, all kinds of original data need to be processed into intuitive and visible data needed by proct managers. Here, we need to do some basic data logical association and display, so we won't repeat it. 3. Data analysis according to the statistical framework designed at the beginning, you can clearly see the data you need. Of course, the above is just a more basic analysis. If you get these data, you can analyze that users who use a function also like B function. The two are closely related. Can you consider more integration or interface adjustment in front-end design; For example, by analyzing the click stream, what are the paths for most users to visit or use the app, and do they hide the core functions too deeply? For another example, we can analyze different user attributes, such as male users and female users. Do they have significant differences in user behavior? wait. There is a big gap between the data analysis methods and models of different procts, which cannot be explained at once. So the above are more examples. 3、 Some principles need to be noted: 1. The data itself is objective, but the data interpreted must be subjective. The same data analyzed by different people is likely to draw completely opposite conclusions, so we must not analyze it with opinions in advance (for example, if we have hypotheses, we can use the data to demonstrate them); 2. Data collection by app must be of low priority. It can't affect proct performance and user experience because of data collection, and it can't collect user's privacy data (although many domestic apps don't do this); 3. Data is not omnipotent. You should trust your own judgment.
5.

From January 2013 to June 2015, the average annual growth rate of the number of active users of mobile QQ group was 72%, which indicates that the network social life is growing. As of June 2015, the mobile QQ group accounted for 66% of the messages, far more than 34% of the PC. this shows that users are more likely to share social information on mobile Internet terminals. Like Tencent QQ, wechat can also build public groups

p>

in May 2014, Tencent mobile QQ launched an open topic community based on interest, interest tribe, to connect with QQ groups with common interest tags, forming a social ecosystem with interest aggregation. In addition, microblog group, microblog hot topics, internet post bar, Tianya community, maopu and other public communities also gather a large number of users, which have their own distinctive community life, reflecting the personalization and differentiation of users in social networks

2, more willing to interact and share

the report of digital trends, a science and technology website, shows that "compared with reading articles, people are more willing to share articles, which is a typical modern way of information consumption." Compared with the PC, in the era of mobile Internet, e to the simplicity of operation and the portability of network devices, users are more willing to participate in interaction and forward the information they contact. Moreover, users often participate in information interaction and sharing on multiple screens, that is, they receive information on the PC and participate in program interaction on the mobile

for example, many TV media use code scanning and shaking to interact with users across screens. Entertainment experience is easy to be sought after by users, and users are willing to share new information in the social network to attract social friends to participate. Once the social network is detonated, it will reap immeasurable market dividends

The simple operation of mobile Internet liberates users' right to speak, makes users enter a free state of "everyone is a communicator", and the information proced increases geometrically. According to IBM research, 90% of all the data obtained by the whole human civilization was generated in the past two years. By 2020, the world will generate 44 times as much data as it does today

it can be seen that the mobile Internet has proced a large amount of information, filling in every corner of the social network. Compared with massive information, users have limited attention resources. The larger the amount of information, the scarcer the attention resources

according to the 2014 China Mobile Internet user behavior insight report released by India's inmobi company, China's mobile Internet users spend an average of 146 minutes a day surfing the Internet through mobile phones and tablets, of which the effective media contact time is 5.8 hours

even if users spend all 5.8 hours on social networks to obtain information, they only get a small part of it. Moreover, in the face of the network's complex information, it is difficult for users to concentrate and easily be attracted by other information

4. Clear focus

the social change of user behavior in the mobile Internet era is also reflected in the fact that users pay more attention to hot events in front of them and are more willing to share events with clear focus, which is easy to form the effect of "one call group response"

the social behavior of users is more manifested in the social software of mobile instant messaging, while for the search software, the social behavior characteristics have not shown an obvious tendency, but the search volume of mobile terminal has been higher than that of PC terminal, and the trend of full social of mobile terminal in the future is very clear

in the era of mobile Internet, users' behavior is easy to be diverted in social activities, and their attention will be quickly attracted by the constantly updated hot events, so it is difficult to maintain long-term attention to the same event

characteristics

first, the number of network users is growing rapidly and the number is large. Information society is a society dominated by new technology instry and knowledge intensive instry. People's demand for knowledge and information becomes the main demand of society, and every member of society may become a knowledge demander

Secondly, the types of network users are constantly differentiated. In the physical world, the distribution of users has obvious regional characteristics; The network has broken the geographical restrictions, any place can become a place for information exchange, anyone can release and obtain information at any time. In this environment, the concept of user presents a new meaning, the network user structure is different, the occupation is scattered, and the instry is widely distributed

Thirdly, network users have different information needs. Everyone can be the procer, the transmitter and the receiver of information, and the user needs present the characteristics of multi-level and multi-directional. Any network actor may be at both ends of the information, and can not only publish information, but also receive information

extended data

the access and utilization of information by network users mainly depend on information retrieval and information browsing. Information retrieval is a kind of information acquisition behavior which has clear objectives, plans and can clearly express information needs; However, information browsing is a relatively random information acquisition behavior without specific information needs or difficult to clearly express information needs

it should be noted that information browsing behavior may not have a clear goal or a plan, but this does not mean that it does not have a purpose. As one of the user's information behaviors, browsing also has the purpose of behavior, that is to meet the known or unknown information needs

in the actual information acquisition activities, it is sometimes difficult to draw a clear line between them, and they are often linked, crossed or integrated. Information retrieval and information browsing are often referred to as information search. For the information search of network resources, the information search mode proposed by Carol C. Ku clearly describes its specific process

the most basic assumption of the kurso model is that the doubts and setbacks caused by the uncertainty of users' information needs will decrease with the advancement of information search process and the acquisition of more and more relevant information. She uses personal construction theory to describe how users construct the information they encounter

she also believes that the process of information search is a process of constantly modifying the expression of needs, and the formation of needs goals (viewpoint formation) is the key to the success of information search. Therefore, the cognitive process of meaning construction is the essence of korso's information search behavior model

6. The online time of mobile users is increasing year by year, and more than 71% of the time is on the Internet media; Mobile users are changing from simple content acquisition to interactive online services, personality and spiritual needs. They are pursuing high-quality and high flow paid content such as film and television variety videos, online mobile games, right reading, and are willing to pay for their preferences.
7. The user behavior of mobile phone users needs to start from the source, the access path, the time to view the page, which page to stay on and which page to leave.
8.

Mobile e-commerce refers to e-commerce activities carried out by wireless terminals such as mobile phones and handheld computers. the behavior characteristics of mobile e-commerce consumer groups are as follows:

  1. the proportion of men is relatively higher. From the data, it can be seen that the proportion of men in mobile Internet users is nearly twice that of women, and the gender gap is graally increasing, Girls like mobile shopping, while men have great demand in stock, finance, online financial management and personal account management

  2. the main user groups are young. According to the data survey, the consumers who access the Internet through wireless intelligent terminals are mainly 26-35 years old, reaching 50.7%, with a high degree of youth

  3. white collar workers and highly ecated people are more active, which is different from the characteristics of PC end shopping users. Highly ecated users and white-collar workers have stronger user stickiness in the mobile network, replacing the position of the main force of student groups in the past

  4. < / OL >

    the decision-making factors of mobile e-commerce consumer groups are as follows:

    1. consumer personality characteristics: the acceptance of new technology, the perception of stimulation and the attitude towards social interaction of mobile shopping consumers have an impact

    2. mobile terminal capability: there are some differences in technical characteristics between mobile network and wired network

    3. the security and convenience of payment channels

9. The number is large and relatively scattered. Due to different preferences and occupations, the choices are naturally different. Just like personnel workers, they will choose to download the dayhr mobile terminal; Love shopping, will choose to download Taobao client, and so on, these are endless examples
10. The behavior analysis of mobile terminal should be divided into website and app
website, which is similar to that of PC terminal, but more attention should be paid to the data of device, browser and region
app: Download source, usage rate, usage frequency, time, function, uninstall, etc. More detailed, we can analyze the crowd characteristics and usage habits of the app, which need to be combined with the specific software functions.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750