{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:15:18Z","timestamp":1754158518209,"version":"3.41.2"},"reference-count":41,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EL"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The paper aims to understand the book subscription characteristics of the students at each college and help the library administrators to conduct efficient library management plans for books in the library. Unlike the traditional association rule mining (ARM) techniques which mine patterns from a single data set, this paper proposes a model, recency-frequency-college (RFC) model, to analyse book subscription characteristics of library users and then discovers interesting association rules from equivalence-class RFC segments.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A framework which integrates the RFC model and ARM technique is proposed to analyse book subscription characteristics of library users. First, the author applies the RFC model to determine library users\u2019 RFC values. After that, the author clusters library users\u2019 transactions into several RFC segments by their RFC values. Finally, the author discovers RFC association rules and analyses book subscription characteristics of RFC segments (library users).<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The paper provides experimental results from the survey data. It shows that the precision of the frequent itemsets discovered by the proposed RFC model outperforms the traditional approach in predicting library user subscription itemsets in the following time periods. Besides, the proposed approach can discover interesting and valuable patterns from library book circulation transactions.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title>\n<jats:p>Because RFC thresholds were assigned based on expert opinion in this paper, it is an acquisition bottleneck. Therefore, researchers are encouraged to automatically infer the RFC thresholds from the library book circulation transactions.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The paper includes implications for the library administrators in conducting library book management plans for different library users.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper proposes a model, the RFC model, to analyse book subscription characteristics of library users.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/el-06-2015-0086","type":"journal-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T07:08:19Z","timestamp":1474528099000},"page":"772-788","source":"Crossref","is-referenced-by-count":8,"title":["Knowledge discovery of digital library subscription by RFC itemsets"],"prefix":"10.1108","volume":"34","author":[{"given":"Cheng-Hsiung","family":"Weng","sequence":"first","affiliation":[]}],"member":"140","reference":[{"first-page":"18","article-title":"A new framework for itemset generation","year":"1998","key":"key2020121203383391500_ref001"},{"first-page":"2","article-title":"Customer clustering using RFM analysis","year":"2005","key":"key2020121203383391500_ref002"},{"issue":"2","key":"key2020121203383391500_ref004","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/170036.170072","article-title":"Mining association rules between sets of items in large databases","volume":"22","year":"1993","journal-title":"ACM SIGMOD Record"},{"first-page":"487","article-title":"Fast algorithms for mining association rules","year":"1994","key":"key2020121203383391500_ref003"},{"issue":"1","key":"key2020121203383391500_ref005","first-page":"307","article-title":"Fast discovery of association rules","volume":"12","year":"1996","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"issue":"16","key":"key2020121203383391500_ref006","doi-asserted-by":"crossref","first-page":"12551","DOI":"10.1016\/j.eswa.2012.04.086","article-title":"Effective product assignment based on association rule mining in retail","volume":"39","year":"2012","journal-title":"Expert Systems with Applications"},{"article-title":"Chapter 12","volume-title":"Database Marketing: Analyzing and Managing Customers","year":"2008","key":"key2020121203383391500_ref007"},{"issue":"2","key":"key2020121203383391500_ref008","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/253262.253327","article-title":"Beyond market baskets: generalizing association rules to correlations","volume":"26","year":"1997","journal-title":"ACM SIGMOD Record"},{"issue":"4","key":"key2020121203383391500_ref009","doi-asserted-by":"crossref","first-page":"2754","DOI":"10.1016\/j.eswa.2007.05.043","article-title":"Intelligent value-based customer segmentation method for campaign management: a case study of automobile retailer","volume":"34","year":"2008","journal-title":"Expert Systems with Applications"},{"issue":"16","key":"key2020121203383391500_ref011","doi-asserted-by":"crossref","first-page":"6531","DOI":"10.1016\/j.eswa.2013.06.002","article-title":"Mining high coherent association rules with consideration of support measure","volume":"40","year":"2013","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"key2020121203383391500_ref010","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.ipm.2009.09.009","article-title":"Mining fuzzy frequent itemsets for hierarchical document clustering","volume":"46","year":"2010","journal-title":"Information Processing and Management"},{"issue":"4","key":"key2020121203383391500_ref012","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.fss.2007.10.005","article-title":"Mining association rules from imprecise ordinal data","volume":"159","year":"2008","journal-title":"Fuzzy Sets and Systems"},{"issue":"3","key":"key2020121203383391500_ref013","doi-asserted-by":"crossref","first-page":"1716","DOI":"10.1016\/j.eswa.2010.07.097","article-title":"To mine association rules of customer values via a data mining procedure with improved model: an empirical case study","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"key":"key2020121203383391500_ref014","first-page":"339","article-title":"Analysis of user behavior in a public library using bibliomining","year":"2012","journal-title":"Advances in Environment, Computational Chemistry and Bioscience"},{"issue":"1","key":"key2020121203383391500_ref017","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s10618-006-0059-1","article-title":"Frequent pattern mining: current status and future directions","volume":"15","year":"2007","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"2","key":"key2020121203383391500_ref016","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/335191.335372","article-title":"Mining frequent patterns without candidate generation","volume":"29","year":"2000","journal-title":"ACM SIGMOD Record"},{"volume-title":"Data Mining: Concepts and Techniques","year":"2006","key":"key2020121203383391500_ref015"},{"issue":"4","key":"key2020121203383391500_ref018","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.eswa.2004.06.007","article-title":"An integrated data mining and behavioral scoring model for analyzing bank customers","volume":"27","year":"2004","journal-title":"Expert Systems with Applications"},{"issue":"8","key":"key2020121203383391500_ref019","doi-asserted-by":"crossref","first-page":"9483","DOI":"10.1016\/j.eswa.2011.01.146","article-title":"Mining association rules to support resource allocation in business process management","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"volume-title":"Strategic Database Marketing","year":"1994","key":"key2020121203383391500_ref020"},{"key":"key2020121203383391500_ref021","first-page":"229","article-title":"A data mining approach to new library book recommendations","volume-title":"Digital Libraries: People, Knowledge, and Technology","year":"2002"},{"edition":"1st ed.","volume-title":"e-Business Roadmap for Success","year":"1999","key":"key2020121203383391500_ref022"},{"issue":"4","key":"key2020121203383391500_ref023","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.eswa.2012.08.039","article-title":"Mining association rules for the quality improvement of the production process","volume":"40","year":"2013","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"key2020121203383391500_ref024","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1016\/j.eswa.2009.05.100","article-title":"DSS for computer security incident response applying CBR and collaborative response","volume":"37","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"3\/4","key":"key2020121203383391500_ref025","first-page":"77","article-title":"Are first-circulation patterns for monographs in the humanities different from the sciences?","volume":"37","year":"2013","journal-title":"Library Collections, Acquisitions, and Technical Services"},{"issue":"7","key":"key2020121203383391500_ref026","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1016\/j.compind.2013.04.011","article-title":"Association rule hiding in risk management for retail supply chain collaboration","volume":"64","year":"2013","journal-title":"Computers in Industry"},{"year":"2006","key":"key2020121203383391500_ref027","article-title":"The timely product recommendation based on RFM method"},{"issue":"1","key":"key2020121203383391500_ref028","first-page":"1","article-title":"Application of incremental mining and customer\u2019s value analysis to collaborative music recommendations","volume":"6","year":"2006","journal-title":"Journal of Information, Technology and Society"},{"volume-title":"Mining the Web: Transforming Customer Data into Customer Value","year":"2002","key":"key2020121203383391500_ref029"},{"issue":"3","key":"key2020121203383391500_ref030","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.im.2004.01.008","article-title":"Integrating AHP and data mining for product recommendation based on customer lifetime value","volume":"42","year":"2005","journal-title":"Information and Management"},{"first-page":"761","article-title":"The application of association rules of data mining in book-lending service","year":"2012","key":"key2020121203383391500_ref031"},{"issue":"1","key":"key2020121203383391500_ref032","first-page":"67","article-title":"Thoughts on RFM scoring","volume":"8","year":"2000","journal-title":"The Journal of Database Marketing"},{"issue":"7","key":"key2020121203383391500_ref033","doi-asserted-by":"crossref","first-page":"9046","DOI":"10.1016\/j.eswa.2011.01.025","article-title":"Forecasting changes in Korea composite stock price index (KOSPI) using association rules","volume":"38","year":"2011","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"key2020121203383391500_ref034","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1016\/j.ipm.2005.05.008","article-title":"The basis for bibliomining: frameworks for bringing together usage-based data mining and bibliometrics through data warehousing in digital library services","volume":"42","year":"2006","journal-title":"Information Processing and Management"},{"first-page":"441","article-title":"H-mine: hyper-structure mining of frequent patterns in large databases","year":"2001","key":"key2020121203383391500_ref035"},{"issue":"3","key":"key2020121203383391500_ref036","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/S0263-2373(00)00013-X","article-title":"Customer relationship management (CRM) in financial services","volume":"18","year":"2000","journal-title":"European Management Journal"},{"issue":"5","key":"key2020121203383391500_ref037","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1108\/02640471011081988","article-title":"The integration system for librarians\u2019 bibliomining","volume":"28","year":"2010","journal-title":"The Electronic Library"},{"issue":"6","key":"key2020121203383391500_ref038","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.knosys.2008.03.011","article-title":"Index-BitTableFI: an improved algorithm for mining frequent itemsets","volume":"21","year":"2008","journal-title":"Knowledge-Based Systems"},{"first-page":"1525","article-title":"Research on application of data mining based on FP-growth algorithm for digital library","year":"2011","key":"key2020121203383391500_ref039"},{"issue":"5","key":"key2020121203383391500_ref040","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.knosys.2011.02.010","article-title":"Mining fuzzy specific rare itemsets for education data","volume":"24","year":"2011","journal-title":"Knowledge-Based Systems"},{"key":"key2020121203383391500_ref041","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1007\/978-1-84882-762-2_63","article-title":"Applying RFM model and k-means method in customer value analysis of an outfitter","volume-title":"Global Perspective for Competitive Enterprise, Economy and Ecology","year":"2009"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/EL-06-2015-0086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-06-2015-0086\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/EL-06-2015-0086\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:07:22Z","timestamp":1753405642000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/34\/5\/772-788\/76990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016]]}},"alternative-id":["10.1108\/EL-06-2015-0086"],"URL":"https:\/\/doi.org\/10.1108\/el-06-2015-0086","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2016]]}}}