34
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Warranty operation enhancement through social media knowledge: a deep-learning methods

, , &
Pages 273-311 | Received 11 Mar 2023, Accepted 05 Dec 2023, Published online: 22 Apr 2024

Abstract

People use social media as free channels to share their sentiments and experiences during all stages of consuming a product or service. Likewise, corporations depend on social media as feedback sources that influence the positioning of their products/services in the market. This paper aims to recognise the frequent product flaws and warranty issues through social network mining. We have performed ontology-based methods, text mining, and sentiment analysis using deep learning methods on social media data to investigate product failures, symptoms, and the correlation between warranty programs and customer behaviour. Correspondingly, a multi-sources mining approach has been incorporated into social media mining to cover all the occasions. Furthermore, we promoted a decision support system to learn practically through customer feedback. Finally, to validate the accuracy and reliability of the results, we used the claimed data of the laptop industry to compare our derivatives and machine learning validation metrics to ensure accuracy.

1. Introduction

The most important way to elevate products and develop services is by using customer comments and preferences (Cui et al. Citation2017). Classic techniques for gathering data about productFootnote1 failures and defects were questionnaires, warranty claims, customer complaints, and after-sales service providers’ data. However, these methods are restricted and not comprehensive (Alkahtani et al. Citation2018; Zheng et al. Citation2020). Since time and population constraints affect the data gathering comprehensiveness in products’ failures during the warranty period, it is recommended to use a more considerable population of users in addition to the classical techniques. Considering the position of social networks in today’s business and their vital role in shaping the reputation of organizations, products and services, some of the most important channels to examine the reflection of a product/service are social networks (Alkahtani et al. Citation2018; Guo et al. Citation2020; Zheng et al. Citation2020, Citation2021).

As mentioned above, discovering all kinds of product defects is not reachable in warranty channels. Besides, a warranty as a contractual agreement obligates the warranty service providers to repair all the product failures using the repair or replacement solutions. Therefore, it is essential to assume a suitable approach to discover the frequent failures and then adopt the right warranty strategy to increase customer satisfaction and decrease expenses (Fang and Hsu Citation2019; Shokouhyar et al. Citation2021). One of the most significant issues that warranty service providers face is recognizing the frequency of product defects. Understanding the relationship between the product’s failures and the designing, manufacturing, repairing, and maintaining processes are essential in order to find opportunities for enhancing quality and reliability due to the costs associated with failures and the consequence of product failure on customer satisfaction (Alkahtani et al. Citation2018; Fang and Hsu Citation2019; Grambau et al. Citation2019; Shokouhyar et al. Citation2021).

Previous literature such as (Shokouhyar et al. Citation2021; Zheng et al. Citation2021; Sarmast, et al. Citation2023) confess social media data as a vital information reference for discovering product weaknesses. In fact, the importance of the combination of social media mining with machine learning tools is stated in Pourranjbar and Shokouhyar (Citation2023) and is used for electronic waste management prediction which is a significant post-sale concern along with other post-sale costs. However, they mainly focus on the organization and classification of defect-related texts and ignore the details of these defects, which can provide worthy oversight understanding (Zheng et al. Citation2020; Zheng et al. Citation2021). In the preceding literature, researchers used product defect data from social networks to sustain decision-support models in manufacturing to produce more qualified products. In fact, what has been mainly discussed is product troubleshooting through design modification and manufacturing mechanisms. Moreover, papers focusing on warranty solutions mainly used warranty claims data.

This paper focuses on social media mining using data mining methods based on ontology to investigate and reveal the knowledge beyond the users’ feedback and use the informative threads extracted in a sentiment analysis process through deep learning techniques, which are used to scan the sentences and find the related texts (Trappey et al. Citation2018; Zheng et al. Citation2020). We tried to keep our approach domain-neutralFootnote2 and reveal the potential aspects of social networks in integrating the complete information from multi-source channelsFootnote3. A framework is determined to use the information gained from social media to lead the warranty service providers in the decision-making process (Jeong et al. Citation2017; Alkahtani et al. Citation2018; Wang et al. Citation2020). This framework discovers the most frequent failures, vulnerable components and main causes for defects of a product and provides the service provider with insight into suitable strategy. We will confirm that the useful threads found in social media data can cover customers’ most frequent failures compared to the claimed data. The specific help of the current model is that the company would get aware of the problems before a warranty claim occurs (Kulesza et al. Citation2019; Shokouhyar et al. Citation2021).

The current research widens the sights of how social media data can assist warranty service providers in discovering the most vulnerable components of their products and improving their service by maintaining the right choice between repair or replacement strategy using online data, which is barely discussed in other researches. The article’s innovations are considered in more detail as follows.

This paper contributes to three main aspects.

  • First, using the multi-channels of social media data leads to a wider source of data related to warranty services and is not limited to warranty claims.

  • Second, it reveals the frequent failures, including the related component and symptoms of the defects and the main causes for a product’s features’ flaws, using a deep learning method based on the product’s ontology.

  • Third, it presents a model to improve the warranty services strategies by considering the details of product defects to discover the vulnerable components, symptoms, and main causes to organize the warranty plan and optimized product-serviceFootnote4 approach.

2. Research questions and process

Research questions are raised in the following, and try to discuss the main concerns of the research, the study procedure, and calculations:

  1. In relation to stated data, how much valid information can be obtained via social network data mining to improve products and services?

  2. Can a warranty service provider enhance and adequately support its decisions, operations, and strategy using the information they have obtained?

  3. Which optimization factors can be used to assist the use of a decision support system in warranty service??

The above questions are answered through the following approaches and procedures:

  1. Examining the literature on warranty service models and product defect identification with an emphasis on social media mining, employing multi-channel social networks, the calculation method, and the numerical example with a statistical comparison between social media findings and claimed dataFootnote5 (Tuarob and Tucker Citation2015; Liu et al. Citation2019).

  2. Applying deep learning techniques based on ontology and data mining to social media data related to the relationship between product defects/warranty issues and customer usage, providing new insights into social media data in warranty service provider strategies. Establish a role.

  3. A comprehensive decision support system is presented to model decision factors and gain broader clarity through customer feedback, leading to better warranty operations.

The whole model seeks to answer the questions through a systematic and methodological approach, and its summary is shown in (Shokouhyar et al. Citation2021).

Figure 1. Research methodology.

Figure 1. Research methodology.

We defined three steps to structure the model. Since our research focuses on three main areas: (1) Product defect detection, (2) Warranty services, (3) Social media mining, the first step begins with a literature review based on the following specifications. We reviewed related publications and studies to identify examples and similar models that have worked for product defects from user feedback (including social media). In addition, the warranty rules and standards of warranty service providers have been revised. Considering text mining and deep learning methodology as the main research method, we explored various models and tools. Then we focused on the connections of defects identified by social media with warranty programs (repair/exchange solutions). In the second step, we collected data from LENOVO's warranty service provider to explore ontology and terminology, device architecture, and common customer failures. Next, we explored social media sources using the Product Failure Ontology and mapped them to warranty models, plans, and devices. We then proposed a decision support system to detect equipment failures and repair warranty services. In the third step, we presented the conclusions as part of a comprehensive calculation and discussion. Finally, we presented strategic proposals, conclusions and recommendations for future research (Shokouhyar et al. Citation2021).

3. Literature review

In this section, according to the research approach, which is the warranty service improvement based on the discovery of the product’s frequent defects through social media, there is a review of warranty service solutions and their combination with the Product-Service system. Then, the literature on using social network mining and its relative methods in order to analyse the results with warranty services will be presented.

3.1. Warranty service

The existing literature on warranty service is extensive. First, consider the need for warranty management and its main functions. Murthy and Blischke (Citation2010) showed that from the customer’s perspective, warranty service should be considered as the next role. (1) ensure the necessary reliability, and (2) ensure sustainability. In addition, from the manufacturer’s point of view, three important features in warranty service have been introduced. (1) limiting bad services and accountability, (2) distinguishing products and related services from competing products, and (3) using effective promotional tools. In fact, good and robust warranty management is only successful if the design system and development process are synchronized with customer feedback, can be changed and improved based on data obtained during the warranty period, and proper guidelines are applied. These are confessed by Tapiero et al. (Citation2019) but only the post-sales product failure costs are admitted in their dynamic approach to quality control when manufacturing product using the economic design of quality control samples. However, this paper proves the importance of social media mining in bringing the result of failures and their frequencies to business management decisions. According to Blischke and Murthy (Citation1992), warranty policies have classifications that serve as primary levels for further investigation and group policies based on post-sales product development.

The warranty service offerings in our product service system can be categorized into the following basic warranty types: (1) Free Replacement Warranty (FRW): This means that consumers can have their products repaired and defective components replaced free of charge. (2) Prorated Guarantee (PRW): This is a type in which the customer bears part of the predetermined repair costs within the warranty period. (3) Combined Warranty (CW): The CW type is a mixed type of FRW and PRW, and the customer can select the type of product warranty (Fang and Hsu Citation2019). In addition, there are also complex types of warranties. In such cases, different warranty terms apply to different product components (He et al. Citation2018). The warranty period is not fixed to a specific period and is determined by product usage and similar factors (Murthy and Blischke Citation2000). Iskandar and Murthy (Citation2003) developed a complex warranty-type repair/replacement strategy model that describes a method to repair when a defect occurs at a certain age of the product or when it reaches a certain level of use. Regardless of the different types of warranties, this paper focuses on the failures that could happen at any time during the warranty period or even after the warranty period. Therefore, the whole data mining system could provide results for any manager seeking improvement in any steps of post-sale development.

Further aspects of warranty management need to be considered by companies; costs and customer satisfaction are a direct variable, which needs to be managed so that it remains at an optimal level. In order to ensure that both factors are balanced, companies need to carefully process customer feedback in the duration of warranty periods with a view to determining an optimum period and policy. Special effort has been made by researchers to improve the operation as a whole. Detailed and accurate data on the performance of a system can be derived from modern production systems by means of information systems. For example, Jeong et al. (Citation2007) proposed a decision support system that brings process-state knowledge from several crucial channels and uses these elements to identify the most potential cause for a product issue. Also, Fang and Hsu (Citation2019) describe a preventive maintenance policy to decrease customer loss, ameliorate dissatisfaction, and reduce warranty expenses. Moreover, (Dai et al. Citation2017) identify causes of failure in designing a suitable warranty policy based on two-dimensional warranty data. In addition, Arabi et al. (Citation2017) provide a model based on game theory to promote a novel approach to illustrate the optimal warranty period and the out-of-warranty replacement period. Zuo et al. (Citation2000) promotes a policy for warranty service regarding multi-state repairable products to determine the repair/replacement policies by using models for forecasting warranty cost and the effecting factors such as a combination of replacement and minimal repair. However, there is little effort in providing a streaming system using an LSTM network to deliver defects of a product from social media mining to a warranty cost management system.

3.2. Social media data for warranty service

providing valuable information and data for customers and interested parties is a key purpose of websites and content on Social Media (D’Haen et al. Citation2016). It has been established that, given the characteristics of various external stakeholders, customer satisfaction can be adversely affected by social media analytics (Wang et al. Citation2020). The data from the website has been shown in previous reviews to give more detailed analyses than the information available on the market (Meire et al. Citation2017). A useful tool for corporate awareness of the community and its products and services is social media. Because the social media pages are updated daily, they offer more benefits than websites. Platforms are also more readily available and available at hand, such as Facebook and Twitter posts, in view of the regular use of social networks. As shown by Meire et al. (Citation2017), social media data is much easier to analyse than unstructured text on websites (Chan et al. Citation2015). As a result of this study, with data analysis using the Samsung Mobile Facebook page, the role of social media in improving operating and production decision making has been proven (Chan et al. Citation2015). That is why this research concentrates on different channels of social media and ensures their results by comparing them with operational data that are derived from warranty claims (Sharif & Shokouhyar Citation2021).

For corporations, the tacit knowledge beyond social network data provides new opportunities and challenges to identify and exploit this source of information with a view to improving operational processes (Ramanathan et al. Citation2017; Choi et al. Citation2020). For example, Matthias et al. (Citation2017) has focused on applying and exploiting Big Data to create competitive advantages by introducing a model to show how they help sustainable improvement and customer satisfaction. Beyond the sentiment analysis in social media channels, Ullah et al. (Citation2023) contributes to the creation of a quality-related lexical dictionary based on an evaluation framework and the automatic labelling of the data in accordance with those labels prior to their use as training data for the BiLSTM model. A dataset of Amazon product reviews is used to assess the suggested model which is approximately near to the deep learning approach of the current paper but lacks the effort of converting the output result to useful data for the cost management system. Facebook now has 300 million, and Twitter is 396.5 million users, as stated by Statista. And among users aged 25–34, Twitter is the most popular. Therefore, in order to gain valuable customer insights and use them to advance business performance, it is necessary to be agile enough to take advantage of the knowledge results (Wieneke and Lehrer Citation2016; Trappey et al. Citation2018). So, Kühl et al. (Citation2019) present a feasibility study by prioritizing and quantifying the customer essentials and requirements from social media data using a supervised machine-learning method on the Twitter data from the field of e-mobility. Extracting useful knowledge from user-generated media is also explained and confirmed by Wang et al. (Citation2018). In this regard, to cover the risks of biased ideas in one social media channel, such as Twitter, we utilized different social networks that attract a wide diversity of people with different levels of education and professionality. To facilitate the organizations using the unstructured data from social media, Yadav and Vishwakarma (Citation2020) provide a survey of famous deep learning models utilized in sentiment analysis using taxonomy implications. Moreover, to complete the approach of using data analysis in intelligent manufacturing and service systems, Shukla et al. (Citation2019) review the papers providing big data analytics to improve the decision-making process, and Ali Hasan et al. (Citation2018) adopted a hybrid approach that involves a machine Learning-based sentiment analysis for Twitter Accounts. Besides, Zhan et al. (Citation2020) has researched how social media can deliver virtual platforms to enable organizational learning and innovation in the new product development process. However, we chose the LSTM networks to provide deep learning since Long Short-Term Memory networks are a type of recurrent neural network capable of learning order dependence in sequence prediction problems. This is the behaviour in complex problem areas such as machine translation and clustering of words in social media channels.

Focusing on social media data for defects and warranty service, there has been some research about identifying the product’s discontinuation and disruption from social media with illustration (Zavala et al. Citation2019). Moreover, Jin et al. (Citation2015) demonstrate discovering customer needs based on data mining to improve product design. It also has worked on sentences belonging to specific features and components of products and then discovered the engineering factors that can be enhanced. Since we have provided an ontology-based system and taught our system to investigate the defects related to the products’ features and components, the mentioned usage is also applicable. To continue the investigation through social media data for product corrigible features, Zheng et al. (Citation2020) uses three filters for sentiment analysis, component-symptom examination, and similarity investigation to present a product defect detection model (PDDM) based on deep learning methods while Agüero-Torales et al. (Citation2021) work on deep learning methods based on multilingual sentiment analysis on 11 social media data. To collect and analyse the customers’ feedback based on ontology, Alkahtani et al. (Citation2018) provided a Decision Support System (DSS) to decide on warranty failure information correctly which is only based on operational data that are derived from warranty claims and do not cover the out-of-warranty period or defects that are not resulted in a claim. and (Gavrilova et al. Citation2017) used a managerial practice for effective knowledge management based on ontology engineering and knowledge structuring techniques.

3.3. Decision Support Systems

Decision Support Systems primary focus is to encourage good decision making by organisations. By providing sufficient solutions and improvements in planning, the DSS has managed to reduce complexity and uncertainty over the past 50 years. To exfoliate the DSS, Kumar and Thakurta (Citation2021) have revealed the three underlying themes of DSS as ‘Plan’, ‘Design’, and ‘Use’ by using Lexical analysis, topic modelling, and other data mining techniques to develop content analysis procedure. Ko and Gillani (Citation2020) has developed a taxonomy for DSS using semantic text mining to improve business analytics. However, these systems lack a live decision support system that could facilitate decision-making and help managers with a predictive approach. Also, complexity and uncertainty have led organizations to collaborative planning, and multiple partners participate in deciding on a subject successfully. Rockwell et al. (Citation2009) has provided a Decision Support Ontology (DSO) to enable the process of decision-making within a joint approach, and it has been built upon the Web Ontology Language (OWL) which is the base of our research in analysing the social media data.

Using customers’ feedback and perspectives improves the total approach to managing a company. Ducange et al. (Citation2019) Uses a DSS that can efficiently help companies in managing promotional and marketing campaigns on different social media channels. Furthermore, Nave et al. (Citation2018) have provided a DSS framework to follow customer sentiments in social media, with a focus on the tourism industry and the SMEsFootnote6 that can’t afford heavy expenses for monitoring their reputation through social channels and reviews. Warranty issues and the prediction of defects frequencies and using them for different managerial targets, such as warranty cost management issues, are the potentials that are hardly found in researches. In close relation to this paper’s objective, Abrahams et al. (Citation2014) has provided a framework to investigate product defects from user-generated texts and social media data with a focus on the automotive industry which relies only on one source of data. Considering the growth in today’s competitive market, there is always a petition to diminish repair and warranty costs. So, Pérez-Fernández et al. (Citation2017) have introduced a DSS to decrease costs belonging to warranty services and promote a method in which the manufacturers can prioritize the decisions about the product’s parts, improving to accelerate cost optimization. In addition, the efficacious root causes diagnosis of faults and providing a first-time repair would decrease the operation cost. The mentioned research limited the data input on the real customer claims and ignores the potential dissatisfactions that are not found in operational data sources.

3.4. Text mining

The increasing use of social media for making a framework to analyse social content has been confirmed and demonstrated by Ampofo et al. (Citation2015). It has explained the challenges of conducting text mining in online social media environments, such as the availability of social media data, research ethics, and the integrity of the data collection. Some research has also presented a detailed survey of the text mining tools and methods as well as the methodology adopted by Kim and Ha (Citation2022) to propose a new deep learning residual control chart based on the asymmetrical count response variable with highly correlated explanatory variables. Moreover, Maynard et al. (Citation2017) has revealed a framework that incorporates collecting data, semantic research, aggregation, semantic inquiry, and visualization tools. This approach allows reviewers to deeply explore the data and execute complicated semantic search queries over social media content (He et al. Citation2016). In this regard, Kabakus et al. (Citation2017) proposes a TwitterSentiDetector that classifies tweet sentiments into positive, negative, and neutral using polarity scores derived from sentiment lexicons together with the suggested linguistic methodologies. Furthermore, Shen et al. (Citation2019) employ bilingual text mining to analyse the trends of online to offline commerce from the social media point of view while the current research relies on machine learning and deep learning techniques to enhance the dynamic approach to mining live data.

Digging through social media content relies on specific reasons and purposes (Trappey, et al. Citation2018). This paper proposes a DSS framework based on social media data with a focus on customer opinions on after-sale services, especially warranty services (Aggarwal and Wang Citation2011). In this regard, Khare and Chougule (Citation2012) have worked on a ‘Domain Aware Text & Association Mining (DATAM)’ system that enhances after-sales service and repairing for the automobile industry. Using the most frequent symptoms of defects demonstrated that DATAM can recognize all anomalous signs through the following steps: (1) analysing the service manuals and instructions to identify the repairs, (2) association mining to find the social media content, (3) semantic comparison and mapping the previous steps, and, (4) checking for taking suitable action that are the close basis for designing our ontology-based system. Rajpathak et al. (Citation2012) has presented a novel model to monitor the devices continuously and take corrective actions in the case of defection. So, it proposes a ‘domain-specific Association and Text mining system for Knowledge discovery’ (ASTEK) that integrates both history and knowledge-based approaches. A summary of the most related literature and gaps covered in this research are shown in .

Table 1. Summery of literature in different fields of study-sorted by year.

4. Methodology

In this section, the methodology used is presented. This framework includes four steps, (1) data sources and data blending, (2) data analysis with deep learning technique, (3) data model and Decision Support System and (4) result evaluation. Each step is detailed and comprised of the following paragraphs:

4.1. Data sources and data blending

The collection of customers’ reviews and comments on devices and products can be done from a variety of sources. Some of them include organizational platforms, such as surveys, email marketing, contact centre content and complaints channels. The review of a product’s reputation and the overall atmosphere shall also be conducted on social media platforms, including Twitter, Facebook, Instagram, Skype, WhatsApp etc. Some channels are also for professionals to exchange highly technical feedback and bugs, such as device/brand forums, Reddit threads, XDA developer sites, GitHub, etc.

In this case, in order to cover all possible probabilities, we’re combining data collection sources. In order to gather data, the advantages of using more than one source are as follows:

  • The sources are supporting one another. Different channels of feedback allow for individual freedom. It can increase accuracy, reliability and efficiency to collect data from a variety of sources.

  • Results attribute the clustering. Tracking different sources for consumer reviews can help attribute the feedback and cluster the results by different levels of people, items, and technologies.

  • The process of determining the effectiveness of different strategies enhances. Given that each channel has its own applications and users, the result would have a better match and integration.

  • Merging multiple datasets often demonstrates valuable knowledge that might not be covered unless the data is combined. Useful information provides a new and unique perspective that might lead to better decisions.

  • Data blending includes getting data from different sources and creating a single, unique dataset for data visualization and analysis. Data blending qualifies a data analyst to use any type of data from any source in their examination for accurate perspicuity.

We define the following steps for data collection and data blending:

  1. The first step in gathering data is to demonstrate the information and data sources that are practical enough to cover the research questions. In this paper, we determined the information related to defects in multiple sources.

  2. The next step would be investigating the data sources such as Twitter and Facebook for the general assessment of the product and its defects and exploring through LENOVO Forums, Reddit application, GitHub, and XDA-developers site to analyse the technical information and cluster the findings (Shokouhyar et al. Citation2021).

  3. We then identify the appropriate data set from various sources. There could be a vast range of formats, or several file types can be found. Each data source must have the same dimension to be blended.

  4. Then, we merge the data from different sources and customize each connection based on the common dimension to confirm that the data blend is integrated.

That is the procedure we take to examine social media data collection. Since we want to examine the validation of the social media data and the methodology adopted, we analyse the results and match them with the secondary data. In fact, we receive operational dataFootnote7 from the warranty service companies related to the LENOVO brand, discover the product’s defect ontology, and compare the social media data with operational data results. We cooperated with LENOVO company representatives, which delivers aftersales and warranty services for its products, such as laptops. The primary data from the LENOVO representative includes the warranty period’s length, the ratio of the warranty usage and costs, warranty usage categories and strategies, and different defects and failures related to the product.

4.1.1. Data collection from Twitter (Schwitter and Liebe Citation2020)

Twitter as a social network was launched in 2006, in which users communicate with each other on their personalized pages by sharing limited messages. Although its main focus was the exchange of data and facts, additional features for social interactions have been developed recently. Such as sharing other tweets (retweeting) or replying, giving like mentioning users, sharing pictures, links, and other multimedia data, and using Hashtags (#) before words is a popular tool to tag specific tweets.

Twitter proposes APIsFootnote8 to allow the public to access their data: the Streaming API and the REST API (Representational State Transfer). Specific conditions have to be observed to access any one of the APIs.

Since Twitter has established the developer account by providing a name, description, and domain, the developer’s Twitter application is registered. This application certifies the user for the application of the Twitter API and authorizes the user the access key and token through the application management tool.

4.1.1.1. Streaming API

utilizing the streaming API, Twitter gives access to (a sample of) all published tweets on Twitter. The specific data will be sent to the user constantly After sending a request to the API. The Streaming API only sends out real-time tweets.

4.1.1.2. REST API

REST (Representational State Transfer) is a general software that represents a set of limitations for developing web services. All requesters will access the data and manage the web service using a predefined set of stateless operations.

4.1.2. Data collection from Facebook

Facebook is an American online social media founded in 2004. Users on Facebook create a profile displaying personal information about themselves. They can communicate with any other users who have agreed to be their ‘friend’ or, with different privacy settings, to the public, by sharing posts containing text, photos, and multimedia.

Facebook has established a new feature and analytics API for researchers called ‘Facebook Open Research & Transparency’ (FORT). To find the trends and discover the derivatives on Facebook pages, academics and researchers can use these collections of APIs.

The sample API code in FORT:

4.1.3. Data collection from other sources

Reddit is an American social news website for ranking web content and creating discussions between different people. Members can post content such as links, text posts, and multimedia to the site that can be rated by other users. Prioritizing the posts is by topic and are in ‘communities’ or ‘subreddits’. Reddit has an API that authorizes you to access a lot of information on Reddit with JSON formatting. Most pages on Reddit can also be accessed through json by simply adding ‘.json’ to the end of a URL.

The LENOVO forum community platform helps developers and users get interested in developing or using apps and services for LENOVO platforms, services, and devices. Anyone can join the discussion, regardless of experience level or where they exist in the ecosystem of LENOVO company. LENOVO forum is one of the data collection sources used in this research and can be analyzed for the target keywords by using a Crawler. Crawler is a program developed to crawl through web pages and get indexed data. The indexed data (usually in .json format) is the raw data prepared to get clean and structured.

XDA-Developers stands for a social network consisting of millions of developers from any kind of Android and Windows operating system that use this platform and forums to share their issues, abate about the OSFootnote9 versions, and communicate about their experiences and different devices. To determine the software failures more accurately, the XDA-Developers is also one of the data gathering sources that can be examined using the Crawlers developed to get the indexed data and target keywords. The raw data of the XDA-Developers is ready to use after the data preparation process.

GitHub is a platform with more than 73 million users that provides Internet hosting for software development and proposes distributed version control and source code management. This platform is used by millions of developers, engineers, and companies to share their issues and debate about the OS versions, device software, and hardware and share their experiences about different devices such as laptops. Crawlers can explore this platform to get the indexed data and target keywords. The raw data from GitHub will be blended with other sources after the data preparation process. After collecting data from multiple data sources, we should step forward to data cleaning and preparation.

4.2. Data analysis with deep learning technique

Data preparation is a fundamental stage of data analysis. Data preparation uses the techniques of qualifying data to be ready for analysis. The whole process is presented in . There are steps to prepare data for examination:

Figure 2. Data analysis with deep learning technique.

Figure 2. Data analysis with deep learning technique.

4.2.1. Data cleaning

Data cleaning means identification and modification of errors and removing unwanted words. Since the data sources are vast and complicated, some operations need to be done to cleanse and purify the data, such as removing the spam words, symbols, duplicates, and irrelevant values and converting the word types into a typical kind.

4.2.2. Data structuring and integration

This means modelling and organizing data from different data channels into a unified format that will match the requirements. It is necessary to sort them into defined data structures and patterns to continue more operations on them. Sometimes a change in the data scale or distribution function is needed (Shokouhyar, Ahmadi and Ashrafzadeh Citation2021). After that, the conversion of words to lowercase and applying the lemmatization were done in the Gensim library to get the root words.

4.2.3. Ontology development

Social media sentiment analysis based on domain ontology has been developed to determine the defects among user-generated comments effectively. The Web Ontology Language (OWL) is manipulated to describe ontology due to its complete framework for illustrating ontologies. OWL advocates the following features Classes, Taxonomic relations, Datatype properties, Objects properties, Individuals and Restrictions. According to Bechhofer-2009, classes show the concepts of the domain and relationships are determined in Protégé (Alkahtani et al. Citation2018). The ontology has been designed using the warranty service instructions and guidelines. The output is used as one of the inputs of the next step for the creation of feature vectors. Sample data is shown in the following and .

Figure 3. Sample ontology of laptop’s components and features in Protégé.

Figure 3. Sample ontology of laptop’s components and features in Protégé.

Figure 4. Sample ontology of processor’s components and features in Protégé.

Figure 4. Sample ontology of processor’s components and features in Protégé.

4.2.4. Creation of feature vectors and word-embedding

In the current step, the outputs of steps two and three will be used to empower the learning method to analyze the social media data. In this regard, we manipulated the TF-IDFFootnote10 features with word embeddings obtained from the Word2VecFootnote11 model. These features are combined because the TF-IDF operates on the bag-of-words model and extracts the most defective components by capturing the semantic relationship based on the product ontology and failures terminology (Afaq and Manocha Citation2023). Besides, the Word2Vec model sustains the syntactic and semantic relations among words. Consequently, the word vectors are created by the Word2Vec model in the Gensim library. Then, the Scikit library sets each document’s TF-IDF information. The online latent semantic indexing model uses 2 LSTMFootnote12 networks for each incoming data stream, compares the document and incrementally updates the term-defect document matrix and defect-document matrix (Pathak et al. Citation2021). Reminding the paper’s purpose that seeks the defects among the social media threads, the sentimental filter is used to determine and highlight the negative and neutral sentences. Considering the regular components and symptoms of the device, the filter also classifies the data into subjectively related threads (Zheng et al. Citation2020; Li et al. Citation2022). That means the ones containing a defect in the device components or showing defect symptoms are determined and can be derived from a post and its replies and comments (Zheng et al. Citation2020).

Assuming N(α,x) is the number of terms α occur in document x, which is the sentence obtaining streaming data from multi-channel sources of social networks, |X| is the length of document x, |X| is the total number of documents in the entire collection of the social media data streaming and |xX:αx| Denotes the total number of documents in which term α occurs. As a result, the TF-IDF is calculated according to EquationEquation (1): (1) TFIDF=N(α,x)|x|×log|X||xX:αx|(1)

The word vectors are created by the Word2Vec model in the Gensim library, and TF-IDF is applied to word vectors for the documents  X={x1,x2,,xn}, which denotes a vector x with M dimensions. in which mth the item represents the weight of the mth term calculated by the TF-IDF score using EquationEquation (1), and the actual term is shown by its word vector obtained from Word2Vec. The LSTM Networks 1 and 2 have been used in the research of Pathak et al. (Citation2021), with the learning mechanism shown in . The previous iteration extracts the term-defect matrix Xt1 and finds latent space representation yt. LSTM network 2 obtains yt and inputs document representation xt and discovers the term-defect matrix Xt. Therefore, the proposed model works online by altering Xi and yi while maintaining only one LSTM model active at time t. The LSTM networks are shown in .

Figure 5. LSTM 1 learning mechanism.

Figure 5. LSTM 1 learning mechanism.

Figure 6. LSTM networks.

Figure 6. LSTM networks.

4.2.5. Deep learning analysis validation metrics

According to the literature review (Zheng et al. Citation2020), the performance evaluation metrics for deep learning and sentiment analysis methods are Precision, Recall and F-Measure. We have measured the mentioned metrics to evaluate the methodology we have used. The following metrics are calculated according to EquationEquations (7)–(9). (7) Precision=TPTP+FP (7) (8) Recall=TPTP+FN(8) (9) FMeasure=2×Precision×RecallPrecision+Recall (9)

*TP = True Positive; FP = False Positive; FN = False Negative.

4.3. The DSS model with the ontology approach

4.3.1. Data model

After data analysis is completed, the threads, which are the inputs of the decision support system (DSS), have the structure described in . The structure used is augmented in Rockwell et al. (Citation2009). Each property object belongs to a data table with the following format where the i,j,p,qN. Samples of tables are shown in .

Table 2. Information captured for threads.

Table 3. Table samples.

The interactions between the objects are shown in .

Figure 7. Objects interactions.

Figure 7. Objects interactions.

4.3.2. Data association

For data association, we use the joint table of different data obtained from the deep learning method, which relates the objects with a specific logic as follows:

  • Symptoms and related components, causes, and solutions are in one thread containing replies or comments.

  • The above symptoms and issues are repeated in other threads, and the related components, causes, and solutions are mentioned.

The generated DSS model incorporates many rules such as the below (Rajpathak et al. Citation2012), to call the symptoms, causes, components, and solutions:

If the issue happened, use the related ‘symptomi’, find the related ‘causej’ from the {Joint table of Symptoms and related Causes}, then find the corresponding ‘componentp’ from the {Joint table of Causes and related Components}, then consider the ‘solutionq’ from the {Joint table of Components and related Solutions}.

Using the data obtained from social networks is not enough to obtain the critical results and outputs from this research. Therefore, we provide the claimed data in after-sales service and warranty agencies and the related manuals to create a database of symptoms, causes, components, and solutions based on the claimed data. Consequently, we received relevant information to compare the results gained from social media and agencies to have the highest degree of compliance with the actual marks and deliver more efficient consequences. The first output of the whole process is to determine the components among the threads which had the most numbers of defects from the social media point of view:

Failures found in social media are shown with Fs, and FsCoj represents the components related to the failures. Due to the 80–20 rule, known as the ‘Pareto Principle’, that asserts 80% of outputs result from 20% of all causes, to find the most defective components from the social media point of view, we search through the data until the number of failures related to the most defective components reaches the 80% of total failures.

The same operation has been done for the operational data from the claimed data in after-sales service and warranty agencies. Failures found in claimed data are shown with Fo, and FoCom represents the components related to the failures.

The whole model is shown in .

Figure 8. Distinguishing the components.

Figure 8. Distinguishing the components.

We divided the results into two groups:

  1. Failures common with the agencies’ results.

  2. Failures not common with the agencies’ results.

4.3.2.1. Failures common with the agencies’ results

For the first group, the most defective and known components are determined. These items are common between the representatives and the social media reports for making failures. Cot represents the components related to the failures and is common with the agencies’ results.

To represent the common failures (Fc (Cot)), we use the following: (1) Fc(Cot)=FsFo(Cot)={Cot|CotFs,Fo}(1)

The (1) shows the critical components that should be focused on.

To represent the symptoms of the common failure (Fc (Spt)), we use the following: (2) Fc(Spt)={Spt|Cot,SptJT(Spi,Cop,,n)}(2)

4.3.2.2. Failures not common with the agencies’ results

The second group needs a more technical examination and deeper analysis. These items are the ones that agencies have encountered less than the people using the products. If these kinds of failures won’t be reviewed, they can cause severe dissatisfaction and warranty costs rise. So, all the Symptoms, Causes, and solutions related to these defective components should be studied and reviewed. Cor represents the components related to the failures and are not common with the agencies’ results.

To represent these failures (Fnc (Cor)), we use the following: (3) Fnc(Cor)=FsFo (Cor)={Cor|CotFs,Cot Fo}(3)

To represent the symptoms of the failure (Fnc (Spr)), we use the following: (4) Fnc(Spr)={Spr|Cor,SprJT(Spi,Cop,,n)}(4)

4.3.3. Optimizing the warranty service solution

Another way of optimizing the whole system is to make the best decision between replacing a failed tool and repairing it. Many factors affect the choice, such as age and the condition of the defect detected, The mean time between failures (MTBF), the item’s mean time to first failure (MTTF), the remaining time of the warranty period, and costs of the repair/replacement choices. For example, (Rao Citation2011) has adopted an algorithmic approach and a DSS for making the best choice between repairing or replacing a failed item. The next step after investigating the most defective items and the most probable failures is to figure out the best conditions for the warranty period to optimize the cost. Jack and Murthy (Citation2001) has a simple function for optimizing the warranty cost by making the best choice between repairing and replacing an item. To integrate the whole model using the theorem of Jack and Murthy (Citation2001), let’s consider the cost of repairing a failed item as CRP=0wr(x)*dx  and the cost of replacing it as CRC. (*r(x) indicates the hazard rate). The duration of the warranty period is in (0,W) intervals and K and L in (0,W) are the optimal parameters that are the best time to satisfy the (K,L) strategy in Jack and Murthy (Citation2001) by minimizing the total cost as J(K,L). In fact, in the Jack and Murthy (Citation2001) the MTBF and MTTF of the product are the most effective factors for determining the L and K, which are the intervals at which the product should be repaired or replaced based on the time of failure. According to the theorem, during (0,K) and (L,W) the product should be repaired. While, during the (K,L) the product should be replaced. In this research, we involve the components of the product. So, the warranty service provider could obtain two different approaches. First, the warranty service provider can define different warranty periods (W) for each component of the product and consequently, the optimum L and K would be different for each component due to different MTBF and MTTF. Second, it can define the warranty period (W) and the optimum L and K for the product based on the most defective components due to their MTBF and MTTF.

So, the objective is: (5) Minimum J(K,L)=CRP(K,L)+CRC(K,L)(5) (6) Subject to 0KLW(6)

5. Calculations and deployment

The data preparation and calculation have been implemented for the LENOVO Laptops to ensure the DSS model validation through the social media channels mentioned in the previous sections. Operational data about this device was also captured from the LENOVO representatives to prove the model’s efficiency. The calculations are sorted into six parts. We have presented the operational and social media data statistics in the following. Then, we analysed the association between both sources of data. Afterwards, the research method was validated through a comparison of different methodologies and the calculation of related metrics. Finally, the warranty cost for the operational data is presented to validate the optimisation method.

5.1. Statistics of operational data

In this section, we provide the data collected from the agencies about the device’s custom failures, the related symptoms and components, and the corresponding solutions they maintained to resolve the device issues (Shokouhyar et al. Citation2021). We have studied the data between 2021 Feb to 2022 Jan. We have examined 431 issues that had a warranty claim and had been submitted into the agency’s database according to . The total components being affected were 28 that have been repaired or replaced by the warranty service provider. According to the operational results, the number of replacements is about 28% of the total issues, and the number of replacements of the hard disks was the most.

Table 4. Total statistics of operational data for LENOVO laptops.

The operation described in the previous section has been done for the operational data from the claimed data in the after-sales service. Failures and all the defective components found in the claimed data are shown in . Due to the 80–20 rule, known as the ‘Pareto Principle’, to find the most defective components, we search through the data until the number of failures related to the most defective components reaches 80% of total failures. Examinations stated that among 28 components that seemed to be the vulnerable components, only 3 of the components were the most defective ones. According to , the Hard disk was the most vulnerable component. It has created most of the expenses. More than 70% of the replacements belonged to these most defective components. shows the most defective items of the laptop according to the warranty claimed data.

Figure 9. Graph of claimed data based on the Pareto Principle.

Figure 9. Graph of claimed data based on the Pareto Principle.

Table 5. Details of claimed data.

Besides, the agencies’ manuals and procedures also have been studied to examine the recommendations for the failures. These manuals have mentioned the probable defects and failures for different product components and described the failure symptoms, the influenced components, and the corresponding causes. They have been used to choose the #data, ontology and related text categories correctly. There are some related procedures to clarify the agencies’ and customers’ responsibilities and the scope of the warranty services that can assist the companies in clearing the rules and optimising the additive expenses.

5.2. Statistics for social media report

In this section, we provide the data collected from different social media channels to figure out the device’s custom failures, the related symptoms and components (Ko et al. Citation2018), and the corresponding causes mentioned in the posts. We have studied the data between 2021 Feb to 2022 Jan. In order to classify the total data captured from the different sources, the number of issues and related details are presented in . We have examined 5483 threads from different social media channels that had an issue and had made the customer show negative sentiments or contain any of the #texts shown in . The detailed statistics of the mentioned experiment have been presented in . Most of the threads belonged to Twitter and Facebook. The scattering data used from different social channels is shown in .

Figure 10. Threads scattering in social media.

Figure 10. Threads scattering in social media.

Table 6. Statistics for social media issues.

The operation described in Section 4.3.2 has been done for the social media data and Failures, and the most defective components found in different sources are shown in . Due to the 80–20 rule, known as the ‘Pareto Principle’, we search through the data until the number of failures related to the most defective components reaches 80% of total failures. Examinations stated that only 5 of the components are the most defective among the different channel results. According to , the Hard disk was the most vulnerable component in the four channels of social networks. shows the most defective items of the laptop according to social media data.

Figure 11. Sample detail data for social media issues.

Figure 11. Sample detail data for social media issues.

Table 7. The most defective items according to social media.

Beside the most defective components, we have also discovered the related symptoms of each component. The most frequent symptoms for the most defective items are shown in . Moreover, the graphs for all frequent symptoms are presented in . Remarkably, the Pareto Principle has also detected the frequent symptoms for each defective component. In fact, symptoms common in 80% of the failures of the component have been discovered and shown in the following tables and graphs.

Figure 12. Graph for the most frequent symptoms of Hard disk failure.

Figure 12. Graph for the most frequent symptoms of Hard disk failure.

Figure 13. Graph for the most frequent symptoms of Battery failure.

Figure 13. Graph for the most frequent symptoms of Battery failure.

Figure 14. Graph for the most frequent symptoms of Keyboard failure.

Figure 14. Graph for the most frequent symptoms of Keyboard failure.

Figure 15. Graph for the most frequent symptoms of Ports failure.

Figure 15. Graph for the most frequent symptoms of Ports failure.

Figure 16. Graph for the most frequent symptoms of OS failure.

Figure 16. Graph for the most frequent symptoms of OS failure.

Table 8. The most frequent symptoms of Hard disk.

Table 9. The most frequent symptoms of Battery.

Table 10. The most frequent symptoms of Keyboard.

Table 11. The most frequent symptoms of Ports.

Table 12. The most frequent symptoms of OS.

5.3. Social media and operational data association

The most defective components of LENOVO laptops are presented in . These items are the most defective components common between the agent’s results and the social media reports. Other defective components found in social media mining are the same as those found in operational data. The only difference between the two groups of items is OS. Obviously, problems with OS are not related to the laptop warranty service provider’s responsibilities. According to the tables above and below, all of the defects and components found in the operational data sources were the exact defects and components found in social media. However, the number of defects and the most vulnerable components found in social media was more than the operational data, as we see according to and . That means social media can provide more information than those that exist in agencies. As presented in , the most defective components of social media and the operational data examination are the same, which can prove the accuracy of the data mining through social networks. shows the frequency of the defects in social media compared to operational data.

Figure 17. Sample of common failures in operation vs social media.

Figure 17. Sample of common failures in operation vs social media.

Table 13. The most defective components common in operations and social media.

According to operational data and social media mining, some failure symptoms are more common and frequent among users. The graph of the symptoms’ frequency is presented in . Consequently, this data is used to discover the failures’ main causes. This part has been investigated through the operational data, which are more accurate. In fact, the frequent symptoms have been matched with the main reasons for the related failure according to the agencies’ claimed data. The main reasons for the failures are shown in . Besides, the frequency of the main reasons has also been described and illustrated in and .

Figure 18. The frequency of symptoms.

Figure 18. The frequency of symptoms.

Figure 19. Graph for most frequent symptoms’ reasons.

Figure 19. Graph for most frequent symptoms’ reasons.

Table 14. Main causes for the most frequent symptoms according to operational data.

As shown, one of the most frequent failures belongs to the Battery which is a concern in today’s energy management systems. As mentioned in Shi et al. (Citation2023), the outputs of the failures especially the battery drains could be used as an input for optimizing the battery management systems development. By fusing the power of physical process models with the adaptability of machine learning approaches, this will significantly increase the predictive and modelling capability for long-range connections across multiple timelines.

5.4. Comparison of methods in sentiment analysis

After data preparation and extracting informative threads, we tagged 2000 threads with their real sentiments. Then, we used 10-fold cross-validation to conduct on different classifiers, which can analyze the sentiment of the threads in order to evaluate their performance and compare them with each other same as the comparison with the model proposed in this research. The classifiers used are presented in , and the F-measure metric is calculated for all of them (Zheng et al. Citation2020).

Table 15. F-measures for different classifiers.

According to , all the classifiers are below 0.95. However, the Gradient Boosting Decision Tree and K-Nearest Neighbor have the highest F-measures. Since F-measure allows a model to be evaluated by taking both the precision and recall into account using a single score, we have presented the mentioned metric to compare the different classifiers and also make a basement for our methodology to learn more accurately (Zheng et al. Citation2020).

5.5. Deep learning analysis validation

According to Section 4.2.5 and the previous section, we have collected the data for the research’s method’s validation. In this case, we tagged 2000 threads with their real sentiments. Then, we used 10-fold cross-validation to conduct our research model in order to evaluate its performance and accuracy. The result of the validation is presented in (Zheng et al. Citation2020).

Table 16. Methodology validation metrics.

The comparison of the F-measure metric for the current research and other sentiment analyzers and classifiers is presented in . As shown in the figure below, the research method has the top accuracy according to the F-measure metric (Zheng et al. Citation2020).

Figure 20. F-measure comparison between different methods of sentiment analysis.

Figure 20. F-measure comparison between different methods of sentiment analysis.

5.6. The warranty cost function based on optimum L and K

As explained in Section 4.3.3, the warranty cost function is optimized according to Jack and Murthy (Citation2001). We have collected the data for the cost calculations, and all of the factors are shown in and . According to the following table, we have decreased the cost of the warranty service due to an optimized strategy for warranty service based on the repair/replacement solution. In this table, we defined the optimum K and L according to each component’s replacement and repair cost based on a three-year warranty period. Then, we reviewed the operational data and considered those of the replacements which could have been repaired instead and vice versa. Finally, the cost was recalculated to measure the decrease in warranty service costs.

Figure 21. Graph for decreasing the warranty service cost.

Figure 21. Graph for decreasing the warranty service cost.

Table 17. Warranty service cost for operational data.

6. Discussion and research limitations

This paper promotes the advantages of social media data contribution to warranty service enhancement. Many popular social networks have been mined, blended, and prepared to generate valuable and informative threads. The proposed approach enables the model to analyse data at the sentence level to extract the sentiment of the threads and frequent failures of the product using product components and defects’ ontology. The method uses online latent semantic indexing with regularisation constraints in long short-term memory networks. The informative threads deriving from social media networks are processed serially, and the deep learning-based model incrementally develops the model according to online streaming data. The model categorises the whole data into different properties like issues, symptoms, and components. The research methodology is tested by Precision, Recall and F-Measure metrics and is compared to other sentiment classifiers to evaluate the model’s performance and accuracy. The results show that the highest F-measure amount (0.9763) belongs to the proposed research model. The next high F-measure amount was recorded for the Gradient Boosting Decision Tree, while the lowest F-measure amount was documented for the Decision Tree.

Finally, the threads have been analysed, and the frequent failures have been identified. The results indicate that according to the 80–20 rule, known as the ‘Pareto Principle’, 80% of the failures occurred to 20% of the components of the product. This conclusion is proved by both operational and social media data with the same results. So, to answer the research questions, it is identified that the obtained data from social media is sufficient to determine the system’s current state and leads to valid information for enhancing the products and services. In fact, the study demonstrates a correlation between the social media data and the operational data that support each other. According to and and and , the most frequent defects found in a warranty service provider have been covered 100% by social media data totally.

Firstly, using social media data widens the scope of data gathering and lets in all data from different sources. So, the warranty database is not restricted to the claimed data. Secondly, it reveals the most repeated failed items and their frequency with online streaming data that help find the most vulnerable components, the main causes of the defects, and the frequent symptoms. Third, it proposes a model that facilitates warranty strategies by considering the details of product defects to systematise the warranty plan and costs. and show that finding the most vulnerable components leads to adopting the correct strategy and can decrease the total cost of warranty services. As shown in and , finding the vulnerable components, their failure cause, and the details of warranty solutions (warranty period, MTBF, and MTTF) using EquationEquations (5) and Equation(6), we have defined the optimum L, k according to the (Jack and Murthy Citation2001). Then, we rechecked the operational data to find the improving points according to the component’s condition in claim time. We have found that some component replacements were technically unnecessary due to Jack and Murthy (Citation2001) strategy. So, we have modified the replacements with repair costs for the most defective components to see the result. The costs have decreased for all the most defective components. The Hard disk, as the most defective component of the LENOVO laptops, could have a 22% lower cost if the above strategy is used.

The presented method in this research has some constraints and limitations. The gathered social media data is not clean, containing many issues such as spelling or errors in referring, mistyping and inaccurate data associated with a defect claim. Besides, it can contain duplicated data on the company’s different official pages and sources have been used. Thus, the companies should carefully cleanse the data using the cleaning and preparation process that contains structuring, integrating, and associating according to the 4.2 section. Also, this study was limited to English language posts, which causes issues with its generalizability and should be developed with multilingual mining methods to increase the model’s accuracy. Another challenge facing is the considerable volume of data accumulated from multiple sources causes the data preparation process, complicated and extended. This problem is solved using advanced methods and developed tools such as machine learning techniques and data mining software. Despite the constraints and the complicated data mining process, the results are aligned with the research hypothesis. The data shown in supports the above statement, as the common failures in social media cover 100% of the repetitive defects recorded in internal databases. Therefore, monitoring the online data improves the company’s ability to detect product issues before the customer claims warranty services.

7. Conclusion

It is believed that not only focusing on the customer’s needs and expectations before manufacturing products is necessary, but also additional attention is needed after a product and service are delivered. While the warranty service centres are the frontline to encounter customer problems, the article’s motivation was the concern of them to reach the following objectives that are among the most important concerns of top managers:

  • Analysing the frequent product failures to optimize the warranty services during the warranty period: Investigating the likely defects and the most frequent failures that may be a potential warranty claim will widen the horizons of a manager prioritising the company’s development opportunities and cost management issues.

  • Keeping the customers satisfied and fulfilled by detecting the root causes of defects and rectifying them: Being informed about the most frequent dissatisfactions and inconveniences in their products and services will support them to be prepared enough to confront the failures quickly and will equip them to address the customers’ problems as soon as possible.

  • Being the active source and channel to transfer customer feedback: Along with the customer service department and call centre feedback, the new source of data will support the managers to enhance their input data and check the accuracy and validity of internal data. This will help managers and companies to enrich their infrastructure and performance to bring their operational results closer to the results perceived by customers.

  • Determining the frequent failures and related symptoms to improve the production process and after-sale services: Since the methodology introduced in this paper is not only restricted to warranty issues and any issue that is related to a product or service can be investigated through social media channels and is able to be learned by an artificial intelligence system, the system is ready to be used to enhance different departments and infrastructures and be the basis of improvement opportunities in a company.

Hence, this paper promotes a decision support system (DSS) to cover the above concern using the streaming data of online social channels in a data preparation process based on ontology and deep learning methods. Besides, the claimed data has been collected from the LENOVO Agencies. Then the most defective components and frequent failures were detected from both data sources to optimise the warranty solutions. The result stated that both data sources are matched with each other, and the conclusions support the main objectives of the research. So, companies can use social networks to enhance their warranty services as well as manufacturing operations. As mentioned in the previous researches, it is considered that companies use social media mainly to send and receive data and information for different purposes such as marketing, promotions, etc. In that respect, social media, a helpful tool for corporations, carries more benefits than websites since it is up to date most of the time due to daily usage. In this regard, the research has shown how companies and managers can benefit from social media data, incorporating data preparation and ontology-based deep learning from multi-source data channels like Twitter, Facebook, Reddit, etc. A case study in the laptop industry is used to validate the efficacy and reliability of the research approach. The method used is not only beneficial for any IT devices such as laptops and mobile phones but also can be used for any product such as automobiles or home furniture and electrical tools. In fact, any device which is negotiated by users on social media channels is able to be investigated for frequent defects and failures. Regardless of using social media data, other machine learning methods, such as Naive Bayes are also applicable to the current methodology, and since Most Artificial Intelligence work involves either Machine Learning or Deep Learning, and the ‘intelligent’ behavior of machines requires knowledge, the whole system can be used for a failure prediction system including failure patterns and frequencies used in warranty and guarantee periods. Moreover, the model is also usable as an input for Low-fidelity and High-fidelity models which are considered in Müller (Citation2019) and provides customer preferences and priorities to the mentioned models and enriches the algorithms that approximate the simulations at both fidelity levels. Future research will incorporate the following components:

  • A more complex cost optimization function to cover all the elements affecting the cost management issue.

  • Maintaining the customer behaviour to the whole approach and solving the issues that can occur in the customer-agent relationship.

  • Application of ‘game theory’ to the research for promoting the product-service system using the product, use, or result-oriented system.

Abbreviations
Pss=

Product-Service System

DSS=

Decision Support System

API=

Application Programming Interface

ML=

Machine Learning

DL=

Deep Learning

LSTM=

Long Short-Term Memory Networks

OWL=

Web Ontology Language

SME=

Small and Medium-sized Enterprises

FORT=

Facebook Open Research and Transparency

OS=

Operating System

TF-IDF=

Term Frequency-Inverse Document Frequency

MBTF=

Mean time Between Failures

MTTF=

Mean time To First Failure

Disclosure statement

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Data availability statement

Data sharing is not applicable to this article as no new data were created or analysed in this study.

Correction Statement

This article has been corrected with minor changes. These changes do not impact the academic content of the article.

Notes

1 Any product containing consumer, industrial, service products can be included in this paper’s scope.

2 The approach ignores any area outside of its narrowly defined functions.

3 The paper gets data from several social channels instead of a single channel.

4 A product-service approach is built on the notion that businesses must deliver the product’s function rather than the actual product. The approach is common as a way to facilitate cooperative consumption of both goods and services.

5 Data provided from customers’ warranty claims.

6 Small and medium-sized enterprises.

7 Data provided from warranty claims in companies.

8 An API (Application Programming Interface) is a way for two or more programs to communicate with each other.

9 Operating Systems.

10 Term Frequency - Inverse Document Frequency.

11 Word2vec is a method used in natural language processing that utilizes a neural network model to understand the connections between words from a vast collection of text.

12 long short-term memory networks.

References

  • Abrahams AS, Fan W, Wang GA, Zhang Z, Jiao J. 2014. An integrated text analytic framework for product defect discovery. POMS. 24(6):975–990. doi: 10.1111/poms.12303.
  • Afaq Y, Manocha A. 2023. Blockchain and deep learning integration for various application: a review. Comput Inf. 64(1):1–14. doi: 10.1080/08874417.2023.2173330
  • Aggarwal CC, Wang H. 2011. Text mining in social networks. In: Social network data analytics Vol. 26. Boston: Springer.
  • Agüero-Torales MM, Abreu Salas JI, López-Herrera AG. 2021. Deep learning and multilingual sentiment analysis on social media. Appl Soft Comput. 107:107373. doi: 10.1016/j.asoc.2021.107373.
  • Alkahtani M, Choudhary A, De A, Harding J. 2018. A decision support system based on ontology and data mining to improve design using warranty data. Comput Ind Eng. 128:1027–1039. doi: 10.1016/j.cie.2018.04.033.
  • Ampofo L, Collister S, O’Loughlin B, Chadwick A, Halfpenny PJ, Procter PJ. 2015. Text mining and social media: when quantitative meets qualitative and software meets people. In: Halfpenny P, Proctor R, editors. Innovation in digital research methods. Thousand Oaks: SAGE Publications Ltd; p. 161–192.
  • Arabi M, Mansour S, Shokouhyar S. 2017. Optimizing a warranty–based sustainable product service system using game theory. Int J Sustain Eng. 11(5):330–341. doi: 10.1080/19397038.2017.1387187.
  • Blischke WR, Murthy DNP. 1992. Product warranty managemnet- I: a taxonomy for warranty policies. Eur J Oper Res. 62(2):127–148. doi: 10.1016/0377-2217(92)90242-2.
  • Chan HK, Lacka E, Yee RW, Lim MK. 2015. The role of social media data in operations and production management. Int J Prod Res. 55(17):5027–5036. doi: 10.1080/00207543.2015.1053998.
  • Choi J, Oh S, Yoon J, Lee J-M, Coh B-Y. 2020. Identification of time-evolving product opportunities via social media mining. Technol Forecast Soc Change. 156:120045. doi: 10.1016/j.techfore.2020.120045.
  • Cui R, Gallino S, Moreno A, Zhang DJ. 2017. The operational value of social media information. Prod Oper Manag. 27(10):1749–1769. doi: 10.1111/poms.12707.
  • D’Haen J, Van den Poel D, Thorleuchter D, Benoit DF. 2016. Integrating expert knowledge and multilingual web crawling data in a lead qualification system. Decis Support Syst. 82:69–78. doi: 10.1016/j.dss.2015.12.002.
  • Dai A, He Z, Liu Z, Yang D, He S. 2017. Field reliability modeling based on two-dimensional warranty data with censoring times. Qual Eng. 29(3):468–483. doi: 10.1080/08982112.2017.1319955.
  • Ducange P, Fazzolari M, Petrocchi M, Vecchio M. 2019. An effective decision support system for social media listening based on cross-source sentiment analysis models. Eng Appl Artif Intell. 78:71–85. doi: 10.1016/j.engappai.2018.10.014.
  • Fang C-C, Hsu C-C. 2019. A study of making optimal marketing and warranty decisions for repairable products. J Enterp Inf Manag. 32:152–169.
  • Gavrilova T, Leshcheva I, Strakhovich E. 2017. Gestalt principles of creating learning business ontologies for knowledge codification. Knowl Manag Res Pract. 13(4):418–428. doi: 10.1057/kmrp.2013.60.
  • Grambau J, Hitzges A, Otto B. 2019. Reference architecture framework for enhanced social media data analytics for predictive maintenance models. 2019 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC) p. 1–8.
  • Guo Y, Fan D, Zhang X. 2020. Social media–based customer service and firm reputation. IJOPM. 40(5):575–601. doi: 10.1108/IJOPM-04-2019-0315.
  • Hasan A, Moin S, Karim A, Shamshirband S. 2018. Machine learning-based sentiment analysis for twitter accounts. MCA. 23(1):11. doi: 10.3390/mca23010011.
  • He S, Zhang Z, Jiang W, Bian D. 2018. Predicting field reliability based on two-dimensional warranty data with learning effects. J Qual Technol. 50(2):198–206. doi: 10.1080/00224065.2018.1436831.
  • He W, Tian X, Chen Y, Chong D. 2016. Actionable social media competitive analytics for understanding customer experiences. J Comput Inf Syst. 56(2):145–155. doi: 10.1080/08874417.2016.1117377.
  • Iskandar BP, Murthy DNP. 2003. Repair-replace strategies for two-dimensional warranty policies. Math Comput Model. 38(11–13):1233–1241. doi: 10.1016/S0895-7177(03)90125-7.
  • Jack N, Murthy DNP. 2001. A servicing strategy for items sold under warranty. J Oper Res Soc. 52(11):1284–1288. doi: 10.1057/palgrave.jors.2601223.
  • Jeong B, Yoon J, Lee J-M. 2017. Social media mining for product planning: a product opportunity mining approach based on topic modeling and sentiment analysis. Int J Inf Manage. 48:280–290. doi: 10.1016/j.ijinfomgt.2017.09.009.
  • Jeong I-J, Leon VJ, Villalobos JR. 2007. Integrated decision-support system for diagnosis, maintenance planning, and scheduling of manufacturing systems. Int J Prod Res. 45(2):267–285. doi: 10.1080/00207540600678896.
  • Jin J, Ji P, Liu Y, Johnson Lim SC. 2015. Translating online customer opinions into engineering characteristics in QFD: a probabilistic language analysis approach. Eng Appl Artif Intell. 41:115–127. doi: 10.1016/j.engappai.2015.02.006.
  • Kabakus A, Talha, R, Kara. 2017. TwitterSentiDetector: a domain-independent Twitter sentiment analyser. INFOR. 56(2):137–162.
  • Khare V, Chougule R. 2012. Decision support for improved service effectiveness using domain aware texy mining. Knowl Based Syst. 33:29–40. doi: 10.1016/j.knosys.2012.03.005.
  • Kim J-M, Ha ID. 2022. Deep learning-based residual control chart for count data. Qual Eng. 34(3):370–381. doi: 10.1080/08982112.2022.2044049.
  • Ko A, Gillani S. 2020. A research review and taxonomy development for decision support and business analytics using semantic text mining. Int J Info Tech Dec Mak. 19(01):97–126. doi: 10.1142/S0219622019300076.
  • Ko N, Jeong B, Choi S, Yoon J. 2018. Identifying product opportunities using social media mining: application of topic modeling and chance discovery theory. IEEE Access. 6:1680–1693. doi: 10.1109/ACCESS.2017.2780046.
  • Kühl N, Mühlthaler M, Goutier M. 2019. Supporting customer-oriented marketing with artificial intelligence: automatically quantifying customer needs from social media. Electron Markets. 30(2):351–367. doi: 10.1007/s12525-019-00351-0.
  • Kulesza R, Lipiak J, Salwin M. 2019. a product-service system-literature review. Res Logist Prod. 9(1):5–14.
  • Kumar R, Thakurta R. 2021. Exfoliating decision support system: a synthesis of themes using text mining. Inf Syst E-Bus Manage. 19(1):247–279. doi: 10.1007/s10257-020-00490-4.
  • Li X, Zhang J, Du Y, Zhu J, Fan Y, Chen X. 2022. A novel deep learning-based sentiment analysis method enhanced with Emojis in microblog social networks. Enterp Inf Syst. 17(5):2037160. doi: 10.1080/17517575.2022.2037160.
  • Liu Y, Jiang C, Zhao H. 2019. Assessing product competitive advantages from the perspective of customers by mining user-generated content on social media. Decis Support Syst. 123:113079. doi: 10.1016/j.dss.2019.113079.
  • Matthias O, Fouweather I, Gregory I, Vernon A. 2017. Making sense of Big Data – can it transform operations management? IJOPM. 37(1):37–55. doi: 10.1108/IJOPM-02-2015-0084.
  • Maynard D, Roberts I, Greenwood MA, Rout D, Bontcheva K. 2017. A framework for real-time semantic social media analysis. Web Semant. 44:75–88. doi: 10.1016/j.websem.2017.05.002.
  • Meire M, Ballings M, Van den Poel D. 2017. The added value of social media data in B2B customer acquisition systems: a real-life experiment. Decis Support Syst. 104:26–37. doi: 10.1016/j.dss.2017.09.010.
  • Müller J. 2019. An algorithmic framework for the optimization of computationally expensive bi-fidelity black-box problems. INFOR. 58(2):264–289. doi: 10.1080/03155986.2019.1607810.
  • Murthy DNP, Blischke WR. 2000. Strategic warranty management: a life-cycle approach. IEEE Trans Eng Manage. 47(1):40–54. doi: 10.1109/17.820724.
  • Murthy DNP, Blischke WR. 2010. Warranty data and effective warranty management. J Product Develop. 12:202–219.
  • Nave M, Rita P, Guerreiro J. 2018. A decision support system framework to track consumer sentiments in social media. J Hosp Mark Manag. 27(6):693–710. doi: 10.1080/19368623.2018.1435327.
  • Pathak AR, Pandey M, Rautaray S. 2021. Topic-level sentiment analysis of social media data using deep learning. Appl Soft Comput. 108:107440. doi: 10.1016/j.asoc.2021.107440.
  • Pérez-Fernández L, Conde J, Sebastián MA. 2017. Decision support system to decrease warranty and intangible cost in automative industry. Procedia Manuf. 13:1143–1150. doi: 10.1016/j.promfg.2017.09.176.
  • Pourranjbar A, Shokouhyar S. 2023. Shedding light on the efficiency of the product-service system in waste from electrical and electronic equipment: a social media analysis of consumer tweets. J Cleaner Prod. 415:137545. doi: 10.1016/j.jclepro.2023.137545.
  • Rajpathak D, Chougule R, Bandyopadhyay P. 2012. A domain-specific decision support system for knowledge discovery using association and text mining. Knowl Inf Syst. 31(3):405–432. doi: 10.1007/s10115-011-0409-1.
  • Ramanathan U, Subramanian N, Parrott G. 2017. Role of social media in retail network operations and marketing to enhance customer satisfaction. IJOPM. 37(1):105–123. doi: 10.1108/IJOPM-03-2015-0153.
  • Rao BM. 2011. A decision support model for warranty servicing of repairable items. Comput Oper Res. 38:112–130.
  • Rockwell J, Grosse IR, Krishnamurty S. 2009. A decision support ontology for collaborative decision making in engineering design. 2009 International Symposium on Collaborative Technologies and Systems. p. 1–9. doi: 10.1109/CTS.2009.5067456.
  • Sarmast Z, Shokouhyar S, Ghanadpour SH, Shokoohyar S. 2023. Unravelling the potential of social media data analysis to improve the warranty service operation. IMDS. 123(5):1281–1309. doi: 10.1108/IMDS-07-2022-0427.
  • Schwitter N, Liebe U. 2020. Going digital: web data collection using Twitter as an example. Oxford: Oxfam GB; p. 30.
  • Sharif Z, Shokouhyar S. 2021. Promoting consumer’s attitude toward refurbished mobile phones: a social media analytics approach. Resour Conserv Recycl. 167:105398. 105398. doi: 10.1016/j.resconrec.2021.105398.
  • Shen C, Chen M, Wang C. 2019. Analyzing the trend of O2O commerce by bilingual text mining on social media. Comput Hum Behav. 101:474–483. doi: 10.1016/j.chb.2018.09.031.
  • Shi D, Zhao J, Eze C, Wang Z, Wang J, Lian Y, Burke AF. 2023. Cloud-based artificial intelligence framework for battery management system. Energies. 16(11):4403. doi: 10.3390/en16114403.
  • Shokouhyar S, Ahmadi S, Ashrafzadeh M. 2021. Promoting a novel method for warranty claim prediction based on social network data. Reliab Eng Syst Saf. 216:108010. doi: 10.1016/j.ress.2021.108010.
  • Shukla N, Tiwari MK, Beydoun G. 2019. Next generation smart manufacturing and service systems using big data. Comput Ind Eng. 128:905–910. doi: 10.1016/j.cie.2018.12.026.
  • Tapiero C, Reisman A, Ritchken P. 2019. Product failures, manufacturing reliability and quality control: a dynamic framework. INFOR. 25(2):152–164. doi: 10.1080/03155986.1987.11732035.
  • Trappey AJ, Trappey CV, Fan C-Y, Lee IJ. 2018. Consumer driven product technology function deployment using social media and patent mining. Adv Eng Inform. 36:120–129. doi: 10.1016/j.aei.2018.03.004.
  • Tuarob S, Tucker C. 2015. Quantifying product favorability and extracting notable product features using large scale social media data. J Comput Inf Sci Eng. 15(3)doi: 10.1115/1.4029562.
  • Ullah A, Khan K, Khan A, Ullah S. 2023. Understanding quality of products from customers’ attitude using advanced machine learning methods. Computers. 12(3):49. doi: 10.3390/computers12030049.
  • Wang WM, Li Z, Tian ZG, Wang JW, Cheng MN. 2018. Extracting and summarizing affective features and responses from online product descriptions and reviews: A Kansei text mining approach. Eng Appl Artif Intell. 73:149–162. doi: 10.1016/j.engappai.2018.05.005.
  • Wang Y, Zhang M, Tse YK, Chan HK. 2020. Unpacking the impact of social media analytics on customer satisfaction: do external stakeholder characteristics matter? IJOPM. 40(5):647–669. doi: 10.1108/IJOPM-04-2019-0331.
  • Wieneke A, Lehrer C. 2016. Generating and exploiting customer insights from social media data. Electron Markets. 26(3):245–268. doi: 10.1007/s12525-016-0226-1.
  • Yadav A, Vishwakarma DK. 2020. Sentiment analysis using deep learning architectures: a review. Artif Intell Rev. 53(6):4335–4385. doi: 10.1007/s10462-019-09794-5.
  • Zavala A, Marquez J, Emmanuel R. 2019. Visual analytics for identifying product disruptions and effects via social media. Int J Prod Econ. 208:544–559. doi: 10.1016/j.ijpe.2018.12.020.
  • Zhan Y, Tan KH, Chung L, Chen L, Xing X. 2020. Leveraging social media in new product development: organisational learning processes, mechanisms and evidence from China. IJOPM. 40(5):671–695. doi: 10.1108/IJOPM-04-2019-0318.
  • Zheng L, He Z, He S. 2020. a novel probabilistic graphic model to detect product defects from social media data. Decis Support Syst. 137:113369. doi: 10.1016/j.dss.2020.113369.
  • Zheng L, He Z, He S. 2021. An integrated probabilistic graphic model and FMEA approach to identify product defects from social media data. Expert Syst Appl. 178(:115030. doi: 10.1016/j.eswa.2021.115030.
  • Zuo MJ, Liu B, Murthy DNP. 2000. Replacement ± repair policy for multi-state deteriorating products under warranty. Eur J Oper Res. 123(3):519–530. doi: 10.1016/S0377-2217(99)00107-1.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.