{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:23Z","timestamp":1750220063652,"version":"3.41.0"},"reference-count":87,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T00:00:00Z","timestamp":1678665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"<jats:p>Although building a 360-degree comprehensive view of a customer has been a long-standing goal in marketing, this challenge has not been successfully addressed in many marketing applications because fractured customer data stored across different \u201csilos\u201d are hard to integrate under \u201cone roof\u201d for several reasons. Instead of integrating customer data, in this article we propose to integrate several domain-specific partial customer views into one consolidated or composite customer profile using a Deep Learning-based method that is theoretically grounded in Kolmogorov\u2019s Mapping Neural Network Existence Theorem. Furthermore, our method needs to securely access domain-specific or siloed customer data only once for building the initial customer embeddings. We conduct extensive studies on two industrial applications to demonstrate that our method effectively reconstructs stable composite customer embeddings that constitute strong approximations of the ground-truth composite embeddings obtained from integrating the siloed raw customer data. Moreover, we show that these data-security preserving reconstructed composite embeddings not only perform as well as the original ground-truth embeddings but significantly outperform partial embeddings and state-of-the-art baselines in recommendation and consumer preference prediction tasks.<\/jats:p>","DOI":"10.1145\/3578710","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T11:28:42Z","timestamp":1674041322000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Don\u2019t Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings"],"prefix":"10.1145","volume":"14","author":[{"given":"Moshe","family":"Unger","sequence":"first","affiliation":[{"name":"Tel Aviv University, Israel"}]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[{"name":"Stern School of Business, New York University, USA"}]},{"given":"Sahana (Shahana)","family":"Sen","sequence":"additional","affiliation":[{"name":"BMCC, City University of New York, USA"}]},{"given":"Alexander","family":"Tuzhilin","sequence":"additional","affiliation":[{"name":"Stern School of Business, New York University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,13]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2931100"},{"key":"e_1_3_2_5_1","volume-title":"Handbook of Marketing Analytics","author":"Ansari Asim","year":"2018","unstructured":"Asim Ansari and Yang Li. 2018. Big data analytics. In Handbook of Marketing Analytics. Edward Elgar Publishing."},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2018.1113"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.45.1.60"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/info10040122"},{"key":"e_1_3_2_9_1","article-title":"How Marketers Fulfill Customers\u2019 Desire for Real-Time Brand Experiences","author":"Bhambhri Anjul","year":"2020","unstructured":"Anjul Bhambhri. 2020. How Marketers Fulfill Customers\u2019 Desire for Real-Time Brand Experiences. https:\/\/www.ana.net\/magazines\/show\/id\/forward-2020-08-adobe-future-of-customer-experience.","journal-title":"https:\/\/www.ana.net\/magazines\/show\/id\/forward-2020-08-adobe-future-of-customer-experience"},{"key":"e_1_3_2_10_1","unstructured":"Vladimir Bobrikov Elena Nenova and Dmitry I. Ignatov. 2016. What is a fair value of your recommendation list? In Proceedings of the 3rd Workshop on Experimental Economics and Machine Learning co-located with the 13th International Conference on Concept Lattices and Their Applications (CLA\u201916) . 1\u201312."},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780080949611"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7637-6_27"},{"key":"e_1_3_2_13_1","first-page":"002224372110525","article-title":"EXPRESS: Attribute sentiment scoring with online text reviews: Accounting for language structure and missing attributes","author":"Chakraborty Ishita","year":"2021","unstructured":"Ishita Chakraborty, Minkyung Kim, and K. Sudhir. 2021. EXPRESS: Attribute sentiment scoring with online text reviews: Accounting for language structure and missing attributes. Journal of Marketing Research (2021), 00222437211052500.","journal-title":"Journal of Marketing Research"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_15_1","article-title":"Learning phrase representations using RNN encoder-decoder for statistical machine translation","author":"Cho Kyunghyun","year":"2014","unstructured":"Kyunghyun Cho, Bart Van Merri\u00ebnboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014).","journal-title":"arXiv preprint arXiv:1406.1078"},{"key":"e_1_3_2_16_1","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung Junyoung","year":"2014","unstructured":"Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555 (2014).","journal-title":"arXiv preprint arXiv:1412.3555"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09744-1"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3215328.3215336"},{"key":"e_1_3_2_20_1","volume-title":"Handbook of Marketing Analytics","author":"Dzyabura Daria","year":"2018","unstructured":"Daria Dzyabura and Hema Yoganarasimhan. 2018. Machine learning and marketing. In Handbook of Marketing Analytics. Edward Elgar Publishing."},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2015.12.003"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90003-8"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01273"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.2501\/IJMR-2017-050"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16527"},{"key":"e_1_3_2_26_1","article-title":"AWS re:Invent 2012, Day 1 Keynote","author":"Hastings Reed","year":"2012","unstructured":"Reed Hastings. 2012. AWS re:Invent 2012, Day 1 Keynote. http:\/\/www.youtube.com\/watch?v=8FJ5DBLSFe4. YouTube video; see the video at 44:40 min.","journal-title":"http:\/\/www.youtube.com\/watch?v=8FJ5DBLSFe4"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"e_1_3_2_28_1","first-page":"11","volume-title":"Proceedings of the International Conference on Neural Networks","volume":"3","author":"Hecht-Nielsen Robert","year":"1987","unstructured":"Robert Hecht-Nielsen. 1987. Kolmogorov\u2019s mapping neural network existence theorem. In Proceedings of the International Conference on Neural Networks, Vol. 3. IEEE Press New York, 11\u201314."},{"key":"e_1_3_2_29_1","article-title":"Session-based recommendations with recurrent neural networks","author":"Hidasi Bal\u00e1zs","year":"2015","unstructured":"Bal\u00e1zs Hidasi, Alexandros Karatzoglou, Linas Baltrunas, and Domonkos Tikk. 2015. Session-based recommendations with recurrent neural networks. arXiv preprint arXiv:1511.06939 (2015).","journal-title":"arXiv preprint arXiv:1511.06939"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1745249.1745300"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(89)90020-8"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539381"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00035"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109933"},{"key":"e_1_3_2_37_1","first-page":"4171","volume-title":"Proceedings of NAACL-HLT","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of NAACL-HLT. 4171\u20134186."},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2020.11.001"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1509\/jm.15.0420"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498388"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412238"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371793"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"e_1_3_2_45_1","volume-title":"Master Data Management","author":"Loshin David","year":"2010","unstructured":"David Loshin. 2010. Master Data Management. Morgan Kaufmann."},{"key":"e_1_3_2_46_1","volume-title":"Using Information to Develop a Culture of Customer Centricity: Customer Centricity, Analytics, and Information Utilization","author":"Loshin David","year":"2013","unstructured":"David Loshin and Abie Reifer. 2013. Using Information to Develop a Culture of Customer Centricity: Customer Centricity, Analytics, and Information Utilization. Elsevier."},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijresmar.2020.04.005"},{"key":"e_1_3_2_48_1","article-title":"Perils of location tracking? Personalized and interpretable privacy preservation in consumer mobile trajectories","author":"Macha Meghanath","year":"2020","unstructured":"Meghanath Macha, Beibei Li, Natasha Zhang Foutz, and Anindya Ghose. 2020. Perils of location tracking? Personalized and interpretable privacy preservation in consumer mobile trajectories. Personalized and Interpretable Privacy Preservation in Consumer Mobile Trajectories (June 16, 2020) (2020).","journal-title":"Personalized and Interpretable Privacy Preservation in Consumer Mobile Trajectories (June 16, 2020)"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363554"},{"volume-title":"The Age of Analytics: Competing in a Data-driven World","year":"2016","key":"e_1_3_2_50_1","unstructured":"McKinsey. 2016. The Age of Analytics: Competing in a Data-driven World. Technical Report. Technical report, San Francisco: McKinsey & Company."},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.4.2.111"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.1.51"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.8.2.151"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(86)90001-1"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(87)90035-2"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1344.17313"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-014-0007-7"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2019.1188"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219828"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502535"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148730"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190616"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7637-6_1"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA164453"},{"key":"e_1_3_2_65_1","first-page":"291","volume-title":"Proceedings of the 5th International Conference on Computer and Information Technology","volume":"1","author":"Sarwar Badrul M.","year":"2002","unstructured":"Badrul M. Sarwar, George Karypis, Joseph Konstan, and John Riedl. 2002. Recommender systems for large-scale e-commerce: Scalable neighborhood formation using clustering. In Proceedings of the 5th International Conference on Computer and Information Technology, Vol. 1. Citeseer, 291\u2013324."},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094670506294666"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_8"},{"key":"e_1_3_2_68_1","article-title":"mvn2vec: Preservation and collaboration in multi-view network embedding","author":"Shi Yu","year":"2018","unstructured":"Yu Shi, Fangqiu Han, Xinwei He, Xinran He, Carl Yang, Jie Luo, and Jiawei Han. 2018. mvn2vec: Preservation and collaboration in multi-view network embedding. arXiv preprint arXiv:1801.06597 (2018).","journal-title":"arXiv preprint arXiv:1801.06597"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.008"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3357895"},{"key":"e_1_3_2_71_1","volume-title":"Introduction to Data Mining","author":"Tan Pang-Ning","year":"2016","unstructured":"Pang-Ning Tan, Michael Steinbach, and Vipin Kumar. 2016. Introduction to Data Mining. Pearson Education India."},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2015.0956"},{"issue":"3","key":"e_1_3_2_73_1","first-page":"3","article-title":"Personalization: The state of the art and future directions","volume":"3","author":"Tuzhilin Alexander","year":"2009","unstructured":"Alexander Tuzhilin. 2009. Personalization: The state of the art and future directions. Business Computing 3, 3 (2009), 3\u201343.","journal-title":"Business Computing"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0256-z"},{"key":"e_1_3_2_75_1","article-title":"Information governance program implementation and strategies in banking sector","author":"Tyagi Ayan","year":"2021","unstructured":"Ayan Tyagi. 2021. Information governance program implementation and strategies in banking sector. Available at SSRN 3804620 (2021).","journal-title":"Available at SSRN 3804620"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386243"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783273"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/883"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1509\/jm.15.0413"},{"key":"e_1_3_2_80_1","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/978-3-642-35289-8_34","volume-title":"Neural Networks: Tricks of the Trade","author":"Weston Jason","year":"2012","unstructured":"Jason Weston, Fr\u00e9d\u00e9ric Ratle, Hossein Mobahi, and Ronan Collobert. 2012. Deep learning via semi-supervised embedding. In Neural Networks: Tricks of the Trade. Springer, 639\u2013655."},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2015.2406"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_16"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/585"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2789866"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2021.1295"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158369"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1050.0488"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3578710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:50Z","timestamp":1750183730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,13]]},"references-count":87,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3578710"],"URL":"https:\/\/doi.org\/10.1145\/3578710","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"type":"print","value":"2158-656X"},{"type":"electronic","value":"2158-6578"}],"subject":[],"published":{"date-parts":[[2023,3,13]]},"assertion":[{"value":"2022-05-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}