follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open

Author Topic: WOM Protocol’s Authentication Method: The Future of Marketing?  (Read 2631 times)

Offline emmaglory

  • Full Member
  • *
  • Activity: 189
  • points:
    5405
  • Karma: -12
  • love to live honestly
  • Trade Count: (0)
  • Referrals: 0
  • Last Active: February 18, 2021, 09:29:12 AM
    • View Profile

  • Total Badges: 11
    Badges: (View All)
    10 Posts First Post Fourth year Anniversary







Trust is notoriously difficult and timely to build, yet it is incredibly delicate. One wrong move can break trust forever.

Consumer culture and advertising are built on brand image and trust. Something is bought because the purchaser trusts the product and the brand behind it. But as the digital world has grown, advertising has changed dramatically.

Influencer marketing has shifted advertising in recent times. Brands leverage individuals with highly engaged followings to promote their brands in a seemingly more organic, yet still highly targeted manner.

In the beginning, these recommendations were well received by fans since they trusted the influencer and believed the product endorsements to be genuine. Much like most advertising trends, influencer marketing started out highly successful but has deteriorated quickly.

In the present, people don’t appreciate products being pushed onto them when they can tell the endorsement is not genuine. We recently introduced you to Word of Mouth Protocol (WOM), a blockchain-based protocol that provides a way to monetize word-of-mouth recommendations – the most effective product persuasion technique throughout all of the time.

WOM is driven by a combination of artificial intelligence (AI) and human contribution to building trust between product promoters and consumers. Individuals that contribute to the network are called ‘authenticators’ and they work with the AI to sort the genuine content from the nonsense. Let’s take a look at how it works.



Why use authenticators?

Billions of product recommendations are made every day and as we’ve already established, not all of them are genuine. WOM enables an equilibrium of trust to be created between the content creators and the consumers by using authenticators.

On one side, the creator is able to release content and suggest brands they enjoy. On the other side, consumers know that the recommendation is genuine. Authenticators create a bridge of trust between the two sides by working together to reach a consensus: is this word-of-mouth recommendation genuine or not?

Authenticators play this role in the network for two reasons: to build trust and earn compensation.








How authentication works

Within the WOM network, there are WOM tokens and Reputation (RP) Tokens. RP tokens are used to reflect authentication power, where the more RP tokens you have, the more influence you can have on the network. RP tokens are 1:1 with WOM tokens and it’s possible to switch between the two at any time.

Financial risk or incentive is used to motivate authenticators to judge content truthfully. To achieve this, in order to be an authenticator you have to stake RP tokens on your verdict. Authenticators that incorrectly judge content will lose RP tokens. On the other hand, if you correctly authenticate content you will receive a portion of the tokens that were lost by authenticators on the wrong side.

Authenticators are able to stake more RP tokens to give themselves higher authentication power, knowingly increasing the potential risk and reward. The tokens that are awarded to the ‘correct’ authenticators are the tokens that are lost by the ‘incorrect’ authenticators. Tokens are distributed proportionally based on the authentication power of the authenticators.


Authenticators earn rewards based on user engagement on the content they successfully authenticate.



Reaching consensus



Decisions are made through the consensus process called proof-of-utility which has several dimensions, each of which is weighted:

1) The authentication power (50%)
2) The accumulated staking time since account creation (20%)
3) The accumulated number of RP Tokens staked since account creation (15%)
4) The last staking time (10%)
5) The age of the authenticator account (5%)

Using the above dimensions and weights, authenticators are judged by their overall authentication power. The consensus is therefore achieved by taking into account the authenticator's decisions, but also providing each decision the appropriate amount of influence based on the above dimensions.

Authentication power is weighted high because it increases with the reputation of the authenticator. The more reputation tokens one has and is willing to risk, the higher the perceived reputation within the ecosystem, which is a significant position.

This weighted process means that consensus is not reached based on one key factor such as the number of tokens held or merely just the ratio of votes. Instead, the amount of tokens at risk plays a key role, alongside a number of key account activities that are used to determine the trust of the account.

Content must be authenticators by at least three authenticators. If it is not, all stakes are returned in full.

Overall, this process means that trustworthy, genuine authenticators that have proven their worth have a larger impact on the authentication process, which helps to build trust within the ecosystem.



Judging the content

When a content piece needs authentication, authenticators evaluate the quality of the piece based on three parameters:

The authenticity of the content
The creativity of the content
The positivity of the recommendation – does the content show the product or service in a positive light and create desire?
Collusion between authenticators is dissuaded because the subsequent reward is based on the performance of the content. If consumer interaction is bad, the rewards are bad. Therefore, incentives for collusion are smaller than the incentives for correct behavior.



Sourcing trustworthy content


To strengthen the system to another degree, content creators that are creating word-of-mouth content are also financially incentivized to be genuine and trustworthy actors.

Content creators are required to stake WOM tokens to list their content for authentication. Upon evaluation, the content creator may be eligible to receive a reward if their content is above a certain threshold. On the flip side, if the content is below a threshold the creator will lose their tokens WOM tokens.

Using the three judging parameters, content creators are therefore strongly encouraged to create authentic, trustworthy word-of-mouth product recommendations to be rewarded instead of penalized.


Conclusion

WOM has built an authentication system that aims to filter out illegitimate product recommendations by:

Incentivising content creators to make authentic content
Incentivising authenticators to reach the correct judgment on each and every content piece
Weighting authenticators to provide proven authenticators with stronger reputations more influence






Altcoins Talks - Cryptocurrency Forum


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here Ads bidding Bidding Open


 

ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod