{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:11:42Z","timestamp":1747807902083},"reference-count":13,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2008,6]]},"abstract":"<jats:p> Activity data accumulated in real life, such as terrorist activities and governmental customer contacts, present special structural and semantic complexities. Activity data may lead to or be associated with significant business impacts, and result in important actions and decision making leading to business advantage. For instance, a series of terrorist activities may trigger a disaster to society, and large amounts of fraudulent activities in social security programs may result in huge government customer debt. Uncovering these activities or activity sequences can greatly evidence and\/or enhance corresponding actions in business decisions. However, mining such data challenges the existing KDD research in aspects such as unbalanced data distribution and impact-targeted pattern mining. This paper investigates the characteristics and challenges of activity data, and the methodologies and tasks of activity mining based on case-study experience in the area of social security. Activity mining aims to discover high impact activity patterns in huge volumes of unbalanced activity transactions. Activity patterns identified can be used to prevent disastrous events or improve business decision making and processes. We illustrate the above issues and prospects in mining governmental customer contacts data to recover customer debt. <\/jats:p>","DOI":"10.1142\/s0219622008002934","type":"journal-article","created":{"date-parts":[[2008,6,16]],"date-time":"2008-06-16T11:00:28Z","timestamp":1213614028000},"page":"259-273","source":"Crossref","is-referenced-by-count":15,"title":["ACTIVITY MINING: FROM ACTIVITIES TO ACTIONS"],"prefix":"10.1142","volume":"07","author":[{"given":"LONGBING","family":"CAO","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Technology, Sydney, P.O. BOX 123, Broadway, NSW 2007, Australia"}]},{"given":"YANCHANG","family":"ZHAO","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Technology, Sydney, P.O. BOX 123, Broadway, NSW 2007, Australia"}]},{"given":"CHENGQI","family":"ZHANG","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Technology, Sydney, P.O. BOX 123, Broadway, NSW 2007, Australia"}]},{"given":"HUAIFENG","family":"ZHANG","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Technology, Sydney, P.O. BOX 123, Broadway, NSW 2007, Australia"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.001"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2006100103"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.67"},{"key":"rf5","author":"Cao L. B.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006002271"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.02.006"},{"key":"rf11","volume-title":"Recent Advances in Data Mining and Granular Computing","author":"Han J.","year":"2005"},{"key":"rf12","volume-title":"Investigative Data Mining for Security and Criminal Detection","author":"Mena J.","year":"2003"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1503_3"},{"key":"rf15","volume-title":"Survival Data Mining: Modeling Customer Event Histories","author":"Potts W.","year":"2006"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1109\/69.553165"},{"key":"rf17","volume-title":"Survival Analysis and Event History Analysis","author":"Skop M.","year":"2005"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622006002258"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622008002934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T23:03:01Z","timestamp":1565132581000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622008002934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":13,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2008,6]]}},"alternative-id":["10.1142\/S0219622008002934"],"URL":"https:\/\/doi.org\/10.1142\/s0219622008002934","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,6]]}}}