{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:43:00Z","timestamp":1774539780985,"version":"3.50.1"},"reference-count":25,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1016\/s0957-4174(02)00030-1","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T15:24:03Z","timestamp":1034004243000},"page":"103-112","source":"Crossref","is-referenced-by-count":297,"title":["Turning telecommunications call details to churn prediction: a data mining approach"],"prefix":"10.1016","volume":"23","author":[{"given":"Chih-Ping","family":"Wei","sequence":"first","affiliation":[]},{"given":"I-Tang","family":"Chiu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0957-4174(02)00030-1_BIB1","series-title":"Data mining techniques: For marketing, sales, and customer support","author":"Berry","year":"1997"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB2","series-title":"Customer retention","author":"Berson","year":"2000"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB3","series-title":"Classification and regression trees","author":"Breiman","year":"1984"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB4","unstructured":"Burge, P., & Shawe-Taylor, J. (1997). Detecting cellular fraud using adaptive prototypes. Proceedings of AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management (pp. 9\u201313). RI: Providence."},{"key":"10.1016\/S0957-4174(02)00030-1_BIB5","series-title":"Discovering data mining: From concept to implementation","author":"Cabena","year":"1998"},{"issue":"6","key":"10.1016\/S0957-4174(02)00030-1_BIB6","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/5254.809570","article-title":"Distributed data mining in credit card fraud detection","volume":"14","author":"Chan","year":"1999","journal-title":"IEEE Intelligent Systems"},{"issue":"6","key":"10.1016\/S0957-4174(02)00030-1_BIB7","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/69.553155","article-title":"Data mining: An overview from a database perspective","volume":"8","author":"Chen","year":"1996","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB8","doi-asserted-by":"crossref","unstructured":"Clark, P., & Boswell, R. (1991). Rule induction with CN2: Some recent improvements. Proceedings of the Fifth European Conference (EWSL'91) (pp. 151\u2013163).","DOI":"10.1007\/BFb0017011"},{"issue":"4","key":"10.1016\/S0957-4174(02)00030-1_BIB9","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF00116835","article-title":"The CN2 induction algorithm","volume":"3","author":"Clark","year":"1989","journal-title":"Machine Learning"},{"issue":"2","key":"10.1016\/S0957-4174(02)00030-1_BIB10","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1023\/A:1009740009307","article-title":"Visual data mining: Recognizing telephone calling fraud","volume":"1","author":"Cox","year":"1997","journal-title":"Journal of Data Mining and Knowledge Discovery"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB11","series-title":"Fuzzy sets, rough sets and decision making processes","article-title":"Modelling customer retention with statistical techniques, rough data models, and genetics programming","author":"Eiben","year":"1998"},{"issue":"5","key":"10.1016\/S0957-4174(02)00030-1_BIB12","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/64.539016","article-title":"Constructing Bayesian networks to predict uncollectible telecommunications accounts","volume":"11","author":"Ezawa","year":"1996","journal-title":"IEEE Expert"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB13","series-title":"Knowledge discovery in databases","first-page":"1","article-title":"Knowledge discovery in databases: An overview","author":"Frawley","year":"1991"},{"issue":"10\u201311","key":"10.1016\/S0957-4174(02)00030-1_BIB14","first-page":"885","article-title":"Customer retenion, loyalty, and satisfaction in the German mobile cellular telecommunications market","volume":"25","author":"Gerpott","year":"2001","journal-title":"Telecommunications Policy"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB15","doi-asserted-by":"crossref","unstructured":"Kappert, C. B., & Omta, S. W. F. (1997). Neural networks and business modeling\u2014an application of neural modeling techniques to prospect profiling in the telecommunications industry. Proceedings of the 30th Hawaii International Conference on System Science (Vol. 5) (pp. 465\u2013473).","DOI":"10.1109\/HICSS.1997.663206"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB16","unstructured":"Michalski, R. S., Mozetic, I., Hong, J., & Lavrac, N. (1986). The multipurpose incremental learning system AQ15 and its testing application to three medical domains. Proceedings of American Association for Artificial Intelligence (AAAI-86) (Vol. 2) (pp. 1041\u20131045)."},{"key":"10.1016\/S0957-4174(02)00030-1_BIB17","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/BF00116251","article-title":"Induction of decision trees","volume":"1","author":"Quinlan","year":"1986","journal-title":"Machine Learning"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB18","series-title":"C4.5: Programs for machine learning","author":"Quinlan","year":"1993"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB19","series-title":"Learning internal representations by error propagation","first-page":"318","volume":"Vol. 1","author":"Rumelhart","year":"1986"},{"issue":"1","key":"10.1016\/S0957-4174(02)00030-1_BIB26","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0167-9236(00)00123-8","article-title":"Knowledge management and data mining for marketing","volume":"31","author":"Shaw","year":"2001","journal-title":"Decision Support Systems"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB20","unstructured":"SPSS Inc. (1999). Working with telecommunications: Churning in the telecommunications industry. SPSS White Paper (available at: http:\/\/www.spss.com\/downloads\/papers\/)."},{"key":"10.1016\/S0957-4174(02)00030-1_BIB21","doi-asserted-by":"crossref","unstructured":"Taniguchi, M., Haft, M., Hollm\u00e9n, J., & Tresp, V. (1998). Fraud detection in communications networks using neural and probabilistic methods. Proceedings of International Conference in Acoustics, Speech and Signal Processing (ICASSP'98) (pp. 1241\u20131244).","DOI":"10.1109\/ICASSP.1998.675496"},{"issue":"4","key":"10.1016\/S0957-4174(02)00030-1_BIB22","first-page":"60","article-title":"Telecommunications data mining for target marketing","volume":"12","author":"Wei","year":"2000","journal-title":"Journal of Computers"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB24","series-title":"Computer systems that learn: Classification and prediction methods from statistics, neural nets, machine learning, and expert systems","author":"Weiss","year":"1991"},{"key":"10.1016\/S0957-4174(02)00030-1_BIB25","doi-asserted-by":"crossref","unstructured":"Yang, Y., Pierce, T., & Carbonell, J. (1998). A study on retrospective and on-line event detection. Proceedings of 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 28\u201336) New York: ACM Press.","DOI":"10.1145\/290941.290953"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417402000301?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417402000301?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T04:05:09Z","timestamp":1580875509000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417402000301"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["S0957417402000301"],"URL":"https:\/\/doi.org\/10.1016\/s0957-4174(02)00030-1","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}