{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:26:27Z","timestamp":1743027987328,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030311421"},{"type":"electronic","value":"9783030311438"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31143-8_8","type":"book-chapter","created":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T23:02:36Z","timestamp":1568588556000},"page":"104-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Data Mining Methodologies in the Banking Domain: A Systematic Literature Review"],"prefix":"10.1007","author":[{"given":"Veronika","family":"Plotnikova","sequence":"first","affiliation":[]},{"given":"Marlon","family":"Dumas","sequence":"additional","affiliation":[]},{"given":"Fredrik P.","family":"Milani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"unstructured":"Forbes Homepage. https:\/\/www.forbes.com\/sites\/louiscolumbus\/2017\/12\/24\/53-of-companies-are-adopting-big-data-analytics\/4cf12a2139a1. Accessed 26 May 2019","key":"8_CR1"},{"issue":"12","key":"8_CR2","doi-asserted-by":"publisher","first-page":"11303","DOI":"10.1016\/j.eswa.2012.02.063","volume":"39","author":"SH Liao","year":"2012","unstructured":"Liao, S.H., Chu, P.H., Hsiao, P.Y.: Data mining techniques and applications - a decade review from 2000 to 2011. Expert Syst. Appl. 39(12), 11303\u201311311 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"8_CR3","doi-asserted-by":"publisher","first-page":"3514","DOI":"10.1108\/IJCHM-07-2017-0461","volume":"30","author":"M Mariani","year":"2018","unstructured":"Mariani, M., Baggio, R., Fuchs, M., Hoepken, W.: Business intelligence and big data in hospitality and tourism: a systematic literature review. Int. J. Contemp. Hospit. Manage. 30(12), 3514\u20133554 (2018)","journal-title":"Int. J. Contemp. Hospit. Manage."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.accinf.2016.12.004","volume":"24","author":"F Amani","year":"2017","unstructured":"Amani, F., Fadlalla, A.: Data mining applications in accounting: a review of the literature and organizing framework. Int. J. Acc. Inform. Syst. 24, 32\u201358 (2017)","journal-title":"Int. J. Acc. Inform. Syst."},{"unstructured":"Murnion, P., Helfert, M.: A framework for decision support for learning management systems. In: 10th European Conference on e-Learning ECEL-2011, Brighton, UK (2011)","key":"8_CR5"},{"issue":"4","key":"8_CR6","first-page":"249","volume":"1","author":"Z Bi","year":"2014","unstructured":"Bi, Z., Cochran, D.: Big data analytics with applications. J. Manage. Anal. 1(4), 249\u2013265 (2014)","journal-title":"J. Manage. Anal."},{"doi-asserted-by":"crossref","unstructured":"Wongchinsri, P., Kuratach, W.: A survey - data mining frameworks in credit card processing. In: 13th International Conference on Electrical Engineering\/Electronics. Computer, Telecommunications and Information Technology (ECTI-CON), pp. 1\u20136. IEEE, Chiang Mai (2016)","key":"8_CR7","DOI":"10.1109\/ECTICon.2016.7561287"},{"issue":"18","key":"8_CR8","first-page":"1","volume":"2","author":"H Hassani","year":"2018","unstructured":"Hassani, H., Huang, X., Silva, E.: Digitalisation and big data mining in banking. Big Data Cogn. Comput. 2(18), 1\u201314 (2018)","journal-title":"Big Data Cogn. Comput."},{"key":"8_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26874-3","volume-title":"The Future of Digital Business Innovation: Trends and Practices","author":"V Morabito","year":"2016","unstructured":"Morabito, V.: The Future of Digital Business Innovation: Trends and Practices. Springer, Switzerland (2016). https:\/\/doi.org\/10.1007\/978-3-319-26874-3"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1017\/S0269888910000032","volume":"25","author":"G Mariscal","year":"2010","unstructured":"Mariscal, G., Marban, O., Fernandez, C.: A survey of data mining and knowledge discovery process models and methodologies. Knowl. Eng. Rev. 25(2), 137\u2013166 (2010)","journal-title":"Knowl. Eng. Rev."},{"key":"8_CR11","first-page":"438","volume-title":"Data Mining and Knowledge Discovery in Real Life Applications","author":"O Marban","year":"2009","unstructured":"Marban, O., Mariscal, G., Segovia, J.: A data mining and knowledge discovery process model. In: Julio, P., Adem, K. (eds.) Data Mining and Knowledge Discovery in Real Life Applications, pp. 438\u2013453. Paris I-Tech, Vienna (2009)"},{"issue":"3","key":"8_CR12","first-page":"37","volume":"17","author":"UM Fayyad","year":"1996","unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37\u201354 (1996a)","journal-title":"AI Mag."},{"issue":"11","key":"8_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/240455.240464","volume":"39","author":"UM Fayyad","year":"1996","unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: The KDD process for extracting useful knowledge from volumes of data. Commun. ACM 39(11), 27\u201334 (1996b)","journal-title":"Commun. ACM"},{"unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: Knowledge discovery and data mining: towards a unifying framework. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), Portland, Oregon, USA, pp. 82\u201388 (1996c)","key":"8_CR14"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888906000737","volume":"21","author":"LA Kurgan","year":"2006","unstructured":"Kurgan, L.A., Muslek, P.: A survey of knowledge discovery and data mining process models. Knowl. Eng. Rev. 21(1), 1\u201324 (2006)","journal-title":"Knowl. Eng. Rev."},{"unstructured":"SAS Institute: Data Mining Using SAS Enterprise MinerTM: A Case Study Approach. SAS Institute Inc., Cary, 1166NC (2013)","key":"8_CR16"},{"key":"8_CR17","series-title":"Advanced Information and Knowledge Processing","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-84628-183-0_1","volume-title":"Advanced Techniques in Knowledge Discovery and Data Mining","author":"KJ Cios","year":"2005","unstructured":"Cios, K.J., Kurgan, L.A.: Trends in data mining and knowledge discovery. In: Pal, N.R., Jain, L. (eds.) Advanced Techniques in Knowledge Discovery and Data Mining. Advanced Information and Knowledge Processing, pp. 1\u201326. Springer, London (2005). https:\/\/doi.org\/10.1007\/1-84628-183-0_1"},{"unstructured":"Moyle, S., Jorge, A.: RAMSYS - a methodology for supporting rapid remote collaborative data mining projects. In: ECML\/PKDD01 Workshop: Integrating Aspects of Data Mining, Decision Support and Meta-learning (IDDM-2001) (2001)","key":"8_CR18"},{"unstructured":"Solarte, J.: A proposed data mining methodology and its application to industrial engineering. Ph.D. Thesis, University of Tennessee (2002)","key":"8_CR19"},{"issue":"1","key":"8_CR20","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.is.2008.04.003","volume":"34","author":"O Marban","year":"2009","unstructured":"Marban, O., Segovia, J., Menasalvas, E., Fernandez-Baizan, C.: Toward data mining engineering: a software engineering approach. Inform. Syst. 34(1), 87\u2013107 (2009)","journal-title":"Inform. Syst."},{"unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele University Technical Report 1038TR\/SE-0401, ISSN:1353\u20137776; NICTA Technical Report 0400011T.1, 1\u201328 (2004)","key":"8_CR21"},{"unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. EBSE Technical Report No. EBSE-2007-01 (2007)","key":"8_CR22"},{"issue":"4","key":"8_CR23","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","volume":"80","author":"P Brereton","year":"2007","unstructured":"Brereton, P., Kitchenham, B.A., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the systematic literature review process within the software engineering domain. J. Syst. Softw. 80(4), 571\u2013583 (2007)","journal-title":"J. Syst. Softw."},{"doi-asserted-by":"crossref","unstructured":"Mansingh, G., Rao, L., Osei-Bryson, K.M., Mills, A.: Application of a data mining process model: a case study-profiling internet banking users in Jamaica. In: AMCIS, p. 439 (2010)","key":"8_CR24","DOI":"10.5176\/978-981-08-6308-1_36"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.procs.2017.08.280","volume":"113","author":"W Etaiwi","year":"2017","unstructured":"Etaiwi, W., Biltawi, M., Naymat, G.: Evaluation of classification algorithms for banking customer\u2019s behavior under apache spark data processing system. Proc. Comput. Sci. 113, 559\u2013564 (2017)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"8_CR26","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1504\/IJDATS.2008.020020","volume":"1","author":"DA Kumar","year":"2008","unstructured":"Kumar, D.A., Ravi, V.: Predicting credit card customer churn in banks using data mining. Int. J. Data Anal. Tech. Strategies 1(1), 4\u201328 (2008)","journal-title":"Int. J. Data Anal. Tech. Strategies"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.procs.2015.02.136","volume":"46","author":"TF Bahari","year":"2015","unstructured":"Bahari, T.F., Elayidom, M.S.: An efficient CRM-data mining framework for the prediction of customer behaviour. Proc. Comput. Sci. 46, 725\u2013731 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"8_CR28","volume-title":"Data Mining Techniques in CRM: Inside Customer Segmentation","author":"KK Tsiptsis","year":"2011","unstructured":"Tsiptsis, K.K., Chorianopoulos, A.: Data Mining Techniques in CRM: Inside Customer Segmentation. Wiley, Hoboken (2011)"},{"issue":"4","key":"8_CR29","first-page":"828","volume":"100","author":"M Moeini","year":"2016","unstructured":"Moeini, M., Alizadeh, S.H.: Proposing a new model for determining the customer value using RFM model and its developments (case study on the Alborz insurance company). J. Eng. Appl. Sci. 100(4), 828\u2013836 (2016)","journal-title":"J. Eng. Appl. Sci."},{"doi-asserted-by":"crossref","unstructured":"Neysiani, B. S., Soltani, N., Ghezelbash, S.: A framework for improving find best marketing targets using a hybrid genetic algorithm and neural networks. In: 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), pp. 733\u2013738. IEEE (2015)","key":"8_CR30","DOI":"10.1109\/KBEI.2015.7436136"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-319-96136-1_21","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"S Ghosh","year":"2018","unstructured":"Ghosh, S., Hazra, A., Choudhury, B., Biswas, P., Nag, A.: A comparative study to the bank market prediction. In: Perner, P. (ed.) MLDM 2018. LNCS (LNAI), vol. 10934, pp. 259\u2013268. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96136-1_21"},{"issue":"4","key":"8_CR32","first-page":"1","volume":"7","author":"I Met","year":"2017","unstructured":"Met, I., Tunali, G., Erko\u00e7, A., Tanrikulu, S., Dolgun, M.O.: Branch efficiency and location forecasting: application of Ziraat bank. J. Appl. Financ. Bank. 7(4), 1\u201313 (2017)","journal-title":"J. Appl. Financ. Bank."},{"issue":"4","key":"8_CR33","doi-asserted-by":"publisher","first-page":"932","DOI":"10.1108\/JM2-01-2017-0002","volume":"13","author":"S Khemakhem","year":"2018","unstructured":"Khemakhem, S., Ben Said, F., Boujelbene, Y.: Credit risk assessment for unbalanced datasets based on data mining, artificial neural network and support vector machines. J. Modell. Manage. 13(4), 932\u2013951 (2018)","journal-title":"J. Modell. Manage."},{"issue":"1","key":"8_CR34","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.ejor.2014.08.016","volume":"241","author":"R Geng","year":"2015","unstructured":"Geng, R., Bose, I., Chen, X.: Prediction of financial distress: an empirical study of listed Chinese companies using data mining. Eur. J. Oper. Res. 241(1), 236\u2013247 (2015)","journal-title":"Eur. J. Oper. Res."},{"issue":"3","key":"8_CR35","first-page":"e1299","volume":"9","author":"N Gulsoy","year":"2019","unstructured":"Gulsoy, N., Kulluk, S.: A data mining application in credit scoring processes of small and medium enterprises commercial corporate customers. Wiley Interdisc. Rev.: Data Min. Knowl. Discov. 9(3), e1299 (2019)","journal-title":"Wiley Interdisc. Rev.: Data Min. Knowl. Discov."},{"issue":"2","key":"8_CR36","first-page":"7","volume":"4","author":"JA Adeyiga","year":"2011","unstructured":"Adeyiga, J.A., Ezike, J.O.J., Omotosho, A., Amakulor, W.: A neural network based model for detecting irregularities in e-banking transactions. Afr. J. Comput. ICTs 4(2), 7\u201314 (2011)","journal-title":"Afr. J. Comput. ICTs"},{"key":"8_CR37","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.eswa.2016.09.029","volume":"67","author":"AF Colladon","year":"2017","unstructured":"Colladon, A.F., Remondi, E.: Using social network analysis to prevent money laundering. Expert Syst. Appl. 67, 49\u201358 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"8_CR38","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1016\/j.im.2016.05.009","volume":"53","author":"X Liu","year":"2016","unstructured":"Liu, X., Ye, Q.: The different impacts of news-driven and self-initiated search volume on stock prices. Inf. Manage. 53(8), 997\u20131005 (2016)","journal-title":"Inf. Manage."},{"unstructured":"Al-Radaideh, Q. A., Assaf, A. A., Alnagi, E.: Predicting stock prices using data mining techniques. In: The International Arab Conference on Information Technology (ACIT 2013) (2013)","key":"8_CR39"},{"issue":"5","key":"8_CR40","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1057\/palgrave.jors.2600941","volume":"51","author":"KA Smith","year":"2000","unstructured":"Smith, K.A., Willis, R.J., Brooks, M.: An analysis of customer retention and insurance claim patterns using data mining: a case study. J. Oper. Res. Soc. 51(5), 532\u2013541 (2000)","journal-title":"J. Oper. Res. Soc."},{"issue":"3","key":"8_CR41","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s10257-014-0267-y","volume":"13","author":"AM Karimi-Majd","year":"2015","unstructured":"Karimi-Majd, A.M., Mahootchi, M.: A new data mining methodology for generating new service ideas. Inform. Syst. e-Bus. Manage. 13(3), 421\u2013443 (2015)","journal-title":"Inform. Syst. e-Bus. Manage."},{"doi-asserted-by":"crossref","unstructured":"Montiel, J., Bifet, A., Abdessalem, T.: Predicting over-indebtedness on batch and streaming data. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 1504\u20131513. IEEE (2017)","key":"8_CR42","DOI":"10.1109\/BigData.2017.8258084"},{"issue":"6","key":"8_CR43","first-page":"13","volume":"8","author":"M Rajan","year":"2015","unstructured":"Rajan, M.: Credit scoring process using banking detailed data store. Int. J. Appl. Inform. Syst. (IJAIS) 8(6), 13\u201320 (2015)","journal-title":"Int. J. Appl. Inform. Syst. (IJAIS)"},{"issue":"2","key":"8_CR44","first-page":"157","volume":"8","author":"X Luo","year":"2014","unstructured":"Luo, X.: Suspicious transaction detection for anti-money laundering. Int. J. Secur. Appl. 8(2), 157\u2013166 (2014)","journal-title":"Int. J. Secur. Appl."},{"issue":"1\u20132","key":"8_CR45","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1002\/isaf.1372","volume":"23","author":"M Resta","year":"2016","unstructured":"Resta, M.: VaRSOM: a tool to monitor markets\u2019 stability based on value at risk and self-organizing maps. Intell. Syst. Acc. Financ.Manage. 23(1\u20132), 47\u201364 (2016)","journal-title":"Intell. Syst. Acc. Financ.Manage."},{"issue":"1","key":"8_CR46","first-page":"99","volume":"2","author":"A Kaddouri","year":"2013","unstructured":"Kaddouri, A.: Why human expertise is critical for data mining. Int. J. Comput. Inform. Technol. 2(1), 99\u2013108 (2013)","journal-title":"Int. J. Comput. Inform. Technol."},{"issue":"2","key":"8_CR47","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1016\/j.asoc.2010.11.028","volume":"11","author":"Y Peng","year":"2011","unstructured":"Peng, Y., Wang, G., Kou, G., Shi, Y.: An empirical study of classification algorithm evaluation for financial risk prediction. Appl. Soft Comput. 11(2), 2906\u20132915 (2011)","journal-title":"Appl. Soft Comput."},{"unstructured":"Clark, A.: The machine learning audit - CRISP-DM framework. ISACA 1 (2018)","key":"8_CR48"},{"unstructured":"Le Khac, N.A., Markos, S., Kechadi, M.T.: A data mining-based solution for detecting suspicious money laundering cases in an investment bank. In: Second International Conference on Advances in Databases, Knowledge, and Data Applications, pp. 235\u2013240. IEEE (2010)","key":"8_CR49"},{"key":"8_CR50","doi-asserted-by":"publisher","first-page":"20","DOI":"10.9790\/3021-03142025","volume":"31","author":"P Sridevi","year":"2013","unstructured":"Sridevi, P., Reddy, N.: Informative knowledge discovery using multiple data sources, multiple features and multiple data mining techniques. IOSR J. Eng. 31, 20\u201325 (2013)","journal-title":"IOSR J. Eng."},{"key":"8_CR51","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-79420-4_2","volume-title":"Data Mining for Business Applications","author":"Q Yang","year":"2009","unstructured":"Yang, Q.: Post-processing data mining models for actionability. In: Cao, L., Yu, P.S., Zhang, C., Zhang, H. (eds.) Data Mining for Business Applications, pp. 11\u201330. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-79420-4_2"},{"unstructured":"Yuan, H., Lau, R. Y., Xu, W., Pan, Z., Wong, M.: Mining individuals\u2019 behavior patterns from social media for enhancing online credit scoring. In: 22nd Pacific Conference on Information Systems (PACIS) Proceedings, Japan, p. 163 (2018)","key":"8_CR52"},{"key":"8_CR53","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.techfore.2017.07.027","volume":"130","author":"D Blazquez","year":"2018","unstructured":"Blazquez, D., Domenech, J.: Big data sources and methods for social and economic analyses. Technol. Forecast. Soc. Chang. 130, 99\u2013113 (2018)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"8_CR54","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/978-3-319-95204-8_51","volume-title":"Knowledge Management in Organizations","author":"S Ang\u00e9e","year":"2018","unstructured":"Ang\u00e9e, S., Lozano-Argel, S.I., Montoya-Munera, E.N., Ospina-Arango, J.D., Tabares-Betancur, M.S.: Towards an improved ASUM-DM process methodology for cross-disciplinary multi-organization big data and analytics projects. In: Uden, L., Hadzima, B., Ting, I.H. (eds.) KMO 2018. Communications in Computer and Information Science, vol. 877, pp. 613\u2013624. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95204-8_51"},{"doi-asserted-by":"crossref","unstructured":"Diaz, D., Theodoulidis, B., Abioye, E.: Cross-border challenges in financial markets monitoring and surveillance: a case study of customer-driven service value networks. In: 2012 Annual SRII Global Conference, pp. 146\u2013157. IEEE (2012)","key":"8_CR55","DOI":"10.1109\/SRII.2012.26"},{"issue":"2","key":"8_CR56","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10506-013-9152-0","volume":"22","author":"B Berendt","year":"2014","unstructured":"Berendt, B., Preibusch, S.: Better decision support through exploratory discrimination-aware data mining: foundations and empirical evidence. Artif. Intell. Law 22(2), 175\u2013209 (2014)","journal-title":"Artif. Intell. Law"},{"issue":"2","key":"8_CR57","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1002\/sres.823","volume":"24","author":"JCW Debuse","year":"2007","unstructured":"Debuse, J.C.W.: Extending data mining methodologies to encompass organizational factors. Syst. Res. Behav. Sci.: Off. J. Int. Federat. Syst. Res. 24(2), 183\u2013190 (2007)","journal-title":"Syst. Res. Behav. Sci.: Off. J. Int. Federat. Syst. Res."},{"issue":"2","key":"8_CR58","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3846\/20294913.2013.796501","volume":"19","author":"A Pivk","year":"2013","unstructured":"Pivk, A., Vasilecas, O., Kalibatiene, D., Rupnik, R.: On approach for the implementation of data mining to business process optimisation in commercial companies. Technol. Econ. Dev. Econ. 19(2), 237\u2013256 (2013)","journal-title":"Technol. Econ. Dev. Econ."},{"unstructured":"Lessmann, S., Listiani, M., Vo\u00df, S.: Decision support in car leasing: a forecasting model for residual value estimation. In: 31st International Conference on Information System (ICIS) Proceedings, St. Louise, p. 17 (2010)","key":"8_CR59"},{"doi-asserted-by":"crossref","unstructured":"Priebe, T., Markus, S.: Business information modeling: a methodology for data-intensive projects, data science and big data governance. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2056\u20132065. IEEE (2015)","key":"8_CR60","DOI":"10.1109\/BigData.2015.7363987"},{"doi-asserted-by":"crossref","unstructured":"Balkan, S., Goul, M.: A portfolio theoretic approach to administering advanced analytics: the case of multi-stage campaign management. In: 44th Hawaii International Conference on System Sciences, pp. 1\u201310. IEEE (2011)","key":"8_CR61","DOI":"10.1109\/HICSS.2011.22"},{"issue":"04","key":"8_CR62","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1142\/S0218001407005612","volume":"21","author":"L Cao","year":"2007","unstructured":"Cao, L., Zhang, C.: The evolution of KDD: towards domain-driven data mining. Int. J. Pattern Recogn. Artif. Intell. 21(04), 677\u2013692 (2007)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"issue":"6","key":"8_CR63","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1109\/TKDE.2010.32","volume":"22","author":"L Cao","year":"2010","unstructured":"Cao, L.: Domain-driven data mining: challenges and prospects. IEEE Trans. Knowl. Data Eng. 22(6), 755\u2013769 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"8_CR64","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/s10796-016-9637-y","volume":"19","author":"Y Li","year":"2017","unstructured":"Li, Y., Thomas, M.A., Osei-Bryson, K.M.: Ontology-based data mining model management for self-service knowledge discovery. Inform. Syst. Front. 19(4), 925\u2013943 (2017)","journal-title":"Inform. Syst. Front."},{"issue":"4","key":"8_CR65","first-page":"38","volume":"15","author":"J Lawler","year":"2017","unstructured":"Lawler, J., Joseph, A.: Big data analytics methodology in the financial industry. Inform. Syst. Educ. J. 15(4), 38\u201351 (2017)","journal-title":"Inform. Syst. Educ. J."},{"issue":"2","key":"8_CR66","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3233\/IDA-2008-12203","volume":"12","author":"B Kovalerchuk","year":"2008","unstructured":"Kovalerchuk, B., Vityaev, E.: Symbolic methodology for numeric data mining. Intell. Data Anal. 12(2), 165\u2013188 (2008)","journal-title":"Intell. Data Anal."},{"key":"8_CR67","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.asoc.2014.09.036","volume":"26","author":"Z Qin","year":"2015","unstructured":"Qin, Z., Wan, T., Dong, Y., Du, Y.: Evolutionary collective behavior decomposition model for time series data mining. Appl. Soft Comput. 26, 368\u2013377 (2015)","journal-title":"Appl. Soft Comput."}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31143-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:44:24Z","timestamp":1710351864000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31143-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030311421","9783030311438"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31143-8_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Business Informatics Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Katowice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bir2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/bir2019.ue.katowice.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}