We all know that the basis of product operation is the burying point. The unique identification of the user in the burying point is like Lu Zhishen hearing Qiantang Chaoxin and executive list comprehend his own life, that is, the user who triggers an anonymous identity and the real identity user in a certain scenario. Then, the user behaviors in the two states are aggregated into executive list one user, and the unique identification of the user is completed. 1. Why do users need to be identified? The user's unique identifier is the user's unique identity ID, and the same identity ID will be regarded as the same user.
When designing a data collection scheme for buried points, how to identify the uniqueness of users has a great impact on the accuracy of data. That is, how executive list to distinguish a user as this user and not the other user is very important, because if the uniqueness of the user cannot be identified, all the data related to the user will be inaccurate, such as: cumulative executive list The number of users, the number of new users, and the number of active users. Therefore, selecting an appropriate user ID is particularly important to improve the accuracy of user behavior analysis, especially user-related analysis such as funnel, retention, and grouping.
What is a user ID? Today, with the rapid development of the Internet, we are all actively integrating into the world, information is flowing at a high speed, and executive list it is no longer as blocked as before. Various Internet products are also embracing their users with an unprecedented open attitude. When users reach an application, they can use most of the functions in executive list the application in an anonymous (non-login) state. At this time, the user's anonymous ID is generally Refers to the device ID. In some key business links such as payment, recharge, and points, the application will require users to log in in a certain way.