{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:46:42Z","timestamp":1760708802844},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T00:00:00Z","timestamp":1424908800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s11424-015-3268-0","type":"journal-article","created":{"date-parts":[[2015,2,25]],"date-time":"2015-02-25T15:14:10Z","timestamp":1424877250000},"page":"381-392","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Integrating OWA and data mining for analyzing customers churn in E-commerce"],"prefix":"10.1007","volume":"28","author":[{"given":"Jie","family":"Cao","sequence":"first","affiliation":[]},{"given":"Xiaobing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhifei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,26]]},"reference":[{"issue":"2","key":"3268_CR1","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.eswa.2005.11.037","volume":"32","author":"J Burez","year":"2007","unstructured":"Burez J and Poel D V D, CRM at a pay-TV company: Using analytical model to reduce customer attrition by targeted marketing for subscription services, Expert Systems with Applications, 2007, 32(2): 277\u2013288.","journal-title":"Expert Systems with Applications"},{"issue":"1\u20132","key":"3268_CR2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/j.eswa.2007.07.036","volume":"35","author":"J Burez","year":"2008","unstructured":"Burez J and Poel D V D, Separating financial from commercial customer churn: A modeling step towards resolving the conflict between the sales and credit department, Expert Systems with Applications, 2008, 35(1\u20132): 497\u2013514.","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"3268_CR3","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.ejor.2008.06.027","volume":"197","author":"N Glady","year":"2009","unstructured":"Glady N, Baesens B, and Croux C, Interfaces with other disciplines modeling churn using customer lifetime value, European Journal of Operational Research, 2009, 197(1): 402\u2013411.","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"3268_CR4","doi-asserted-by":"crossref","first-page":"4374","DOI":"10.1016\/j.eswa.2008.05.002","volume":"36","author":"J J H Liou","year":"2009","unstructured":"Liou J J H, A novel decision rules approach for customer relationship management of the airline market, Expert Systems with Applications, 2009, 36(3): 4374\u20134381.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"3268_CR5","doi-asserted-by":"crossref","first-page":"6714","DOI":"10.1016\/j.eswa.2008.08.050","volume":"36","author":"P C Pendharkar","year":"2009","unstructured":"Pendharkar P C, Genetic algorithm based neural network approaches for predicting churn in cellular wireless network services, Expert Systems with Applications, 2009, 36(3): 6714\u20136720.","journal-title":"Expert Systems with Applications"},{"key":"3268_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1002\/int.10096","volume":"18","author":"J I Pelaez","year":"2003","unstructured":"Pelaez J I and Dona J M, Majority additive-ordered weighting averaging: A new neat ordered weighting averaging operator based on the majority process, International Journal of Intelligent Systems, 2003, 18: 469\u2013481.","journal-title":"International Journal of Intelligent Systems"},{"issue":"7","key":"3268_CR7","doi-asserted-by":"crossref","first-page":"5259","DOI":"10.1016\/j.eswa.2009.12.070","volume":"37","author":"S M S Hosseini","year":"2010","unstructured":"Hosseini S M S, Maleki A, and Gholamian M R, Cluster analysis using data mining approach to develop CRM methodology to assess the customer loyalty, Expert Systems with Applications, 2010, 37(7): 5259\u20135264.","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"3268_CR8","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/07421222.2002.11045717","volume":"19","author":"D Gefen","year":"2002","unstructured":"Gefen D and Ridings M C, Implementation team responsiveness and user evaluation of customer relationship management: A quasi-experimental design study of social exchange theory, J. Manage. Inf. Syst., 2002, 19(1): 47\u201370.","journal-title":"J. Manage. Inf. Syst."},{"issue":"6","key":"3268_CR9","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1108\/02634500510624147","volume":"23","author":"E Ngai","year":"2005","unstructured":"Ngai E, Customer relationship management research (1992\u20132002), Mark. Intell. Plann., 2005, 23(6): 582\u2013605.","journal-title":"Mark. Intell. Plann."},{"issue":"3","key":"3268_CR10","first-page":"82","volume":"41","author":"R Ling","year":"2001","unstructured":"Ling R and Yen D, Customer relationship management: An analysis framework and implementation strategies, J. Comput. Inf. Syst., 2001, 41(3): 82\u201397.","journal-title":"J. Comput. Inf. Syst."},{"issue":"8\/9","key":"3268_CR11","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1108\/02635570210445871","volume":"102","author":"Y Xu","year":"2002","unstructured":"Xu Y, Yen D, Lin B, et al., Adopting customer relationship management technology, Ind. Manage. Data. Syst., 2002, 102(8\/9): 442\u2013452.","journal-title":"Ind. Manage. Data. Syst."},{"key":"3268_CR12","volume-title":"E-Business Customer Service","author":"J Anton","year":"2002","unstructured":"Anton J and Hoeck M, E-Business Customer Service, Santa Monica, CA, The Anton Press, 2002."},{"key":"3268_CR13","volume-title":"Report highlight for market trends: CRM services","author":"Gartner Group","year":"2006","unstructured":"Gartner Group, Report highlight for market trends: CRM services, Asia\/Pacific, 2006\u20132007."},{"issue":"5","key":"3268_CR14","first-page":"63","volume":"42","author":"V Sugumaran","year":"2002","unstructured":"Sugumaran V, An agent-based knowledge management framework for the E-commerce environment, J. Comput. Inf. Syst., 2002, 42(5): 63\u201373.","journal-title":"J. Comput. Inf. Syst."},{"key":"3268_CR15","volume-title":"Strategic Database Marketing","author":"A M Hughes","year":"1994","unstructured":"Hughes A M, Strategic Database Marketing, Chicago, Probus Publishing Company, 1994."},{"key":"3268_CR16","first-page":"293","volume":"15","author":"C F Lo","year":"2008","unstructured":"Lo C F, Wu H H, and Chang E C, et al., Applying data mining to an outfitter\u2019s customer loyalty, and value analysis, Journal of Quality, 2008, 15: 293\u2013303.","journal-title":"Journal of Quality"},{"key":"3268_CR17","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.elerap.2009.03.002","volume":"8","author":"Y L Chen","year":"2009","unstructured":"Chen Y L, Kuo M H, Wu S Y, et al., Discovering recency, frequency, and monetary (RFM) sequential patterns from customers\u2019 purchasing data, Electronic Commerce Research and Applications, 2009, 8: 241\u2013251.","journal-title":"Electronic Commerce Research and Applications"},{"key":"3268_CR18","doi-asserted-by":"crossref","first-page":"5866","DOI":"10.1016\/j.eswa.2008.07.018","volume":"36","author":"C Yeh","year":"2009","unstructured":"Yeh C, Yang K J, and Ting T M, Knowledge discovery on RFM model using Bernoulli sequence, Expert Systems with Applications, 2009, 36: 5866\u20135871.","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"3268_CR19","first-page":"193","volume":"8","author":"B C Su","year":"2006","unstructured":"Su B C, Lin S J, and Lee C C, Using RFM, Bayesian stochastic model and ARIMA for customer state forecasting, Journal of E-Business, 2006, 8(2): 193\u2013218.","journal-title":"Journal of E-Business"},{"issue":"2","key":"3268_CR20","doi-asserted-by":"crossref","first-page":"1816","DOI":"10.1016\/j.eswa.2007.12.005","volume":"36","author":"H E Yang","year":"2009","unstructured":"Yang H E, Wu C C, and Wang K C, An empirical analysis of online game service satisfaction and loyalty, Expert Systems with Applications, 2009, 36(2): 1816\u20131825.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"3268_CR21","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1287\/isre.13.3.316.77","volume":"13","author":"S Devaraj","year":"2002","unstructured":"Devaraj S, Fan M, and Kohli R, Antecedents of B2C channel satisfaction and preference: Validating E-commerce metrics, Information Systems Research, 2002, 13(3): 316\u2013333.","journal-title":"Information Systems Research"},{"key":"3268_CR22","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/21.87068","volume":"18","author":"R R Yager","year":"1988","unstructured":"Yager R R, On ordered weighted averaging aggregation in multicriteria decision making, IEEE Transactions on Systems, Man and Cybernetics, 1988, 18: 183\u2013190.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"3268_CR23","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/0165-0114(93)90194-M","volume":"59","author":"R R Yager","year":"1993","unstructured":"Yager R R, Families of OWA operators, Fuzzy Sets and Systems, 1993, 59: 125\u2013148.","journal-title":"Fuzzy Sets and Systems"},{"key":"3268_CR24","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/(SICI)1098-111X(199601)11:1<49::AID-INT3>3.3.CO;2-L","volume":"11","author":"R R Yager","year":"1996","unstructured":"Yager R R, Quantifier guided aggregation using OWA operators, International Journal of Intelligent Systems, 1996, 11: 49\u201373.","journal-title":"International Journal of Intelligent Systems"},{"issue":"2","key":"3268_CR25","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.cie.2006.12.002","volume":"52","author":"Y M Wang","year":"2007","unstructured":"Wang Y M, Luo Y, and Liu X W, Two new models for determining OWA operator weights, Computers & Industrial Engineering, 2007, 52(2): 203\u2013209.","journal-title":"Computers & Industrial Engineering"},{"key":"3268_CR26","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.ejor.2006.09.041","volume":"182","author":"R Sadiq","year":"2007","unstructured":"Sadiq R and Tesfamariam S, Probability density functions based weights for ordered weighted averaging (OWA) operators: An example of water quality indices, European Journal of Operational Research, 2007, 182: 1350\u20131368.","journal-title":"European Journal of Operational Research"},{"key":"3268_CR27","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.ins.2004.09.003","volume":"175","author":"Y M Wang","year":"2005","unstructured":"Wang Y M and Parkan C, A mini-max disparity approach for obtaining OWA operator weights, Information Sciences, 2005, 175: 20\u201329.","journal-title":"Information Sciences"},{"key":"3268_CR28","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/S0165-0114(02)00267-1","volume":"136","author":"R Fulle\u2019r","year":"2003","unstructured":"Fulle\u2019r R and Majlender P, On obtaining minimal variability OWA operator weights, Fuzzy Sets and Systems, 2003, 136: 203\u2013215.","journal-title":"Fuzzy Sets and Systems"},{"issue":"8","key":"3268_CR29","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1016\/j.patrec.2007.01.001","volume":"28","author":"S Redmond","year":"2007","unstructured":"Redmond S and Heneghan C, A method for initialising the K-means clustering algorithm using KD-trees, Pattern Recognition Letters, 2007, 28(8): 965\u2013973.","journal-title":"Pattern Recognition Letters"},{"issue":"9","key":"3268_CR30","doi-asserted-by":"crossref","first-page":"10839","DOI":"10.1016\/j.eswa.2011.02.086","volume":"38","author":"S Kalyani","year":"2011","unstructured":"Kalyani S and Swarup K S, Particle swarm optimization based K-means clustering approach for security assessment in power systems, Expert Systems with Applications, 2011, 38(9): 10839\u201310846.","journal-title":"Expert Systems with Applications"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-3268-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11424-015-3268-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-015-3268-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T07:36:06Z","timestamp":1566372966000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11424-015-3268-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,26]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["3268"],"URL":"https:\/\/doi.org\/10.1007\/s11424-015-3268-0","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,26]]}}}