{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:00:08Z","timestamp":1760709608358,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356410","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T23:01:01Z","timestamp":1525993261000},"page":"325-331","source":"Crossref","is-referenced-by-count":7,"title":["Customer churn analysis : A case study on the telecommunication industry of Thailand"],"prefix":"10.23919","author":[{"given":"Paweena","family":"Wanchai","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"&#x2018;Data mining techniques for marketing sales and customer relationship management&#x2019;","year":"2011","author":"linoff","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.09.038"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.09.080"},{"key":"ref13","first-page":"19","article-title":"&#x2018;Data Mining in Churn Analysis Model for Telecommunication Industry&#x2019;","volume":"1","author":"oseman","year":"2010","journal-title":"Journal of Statistical Modeling and Analytics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2009.730"},{"key":"ref15","article-title":"&#x2018;The Research on Applying Data Mining to Telecom Churn Management&#x2019;","author":"jin","year":"2012","journal-title":"&#x2018;Book The Research on Applying Data Mining to Telecom Churn Management&#x2019;"},{"key":"ref16","first-page":"693","article-title":"&#x2018;A proposed churn prediction model&#x2019;","volume":"2","author":"shaaban","year":"2012","journal-title":"International Journal of Engineering Research and Applications"},{"key":"ref17","first-page":"1694","article-title":"&#x2018;Predicting customer churn in mobile telephony industry using probabilistic classifiers in data mining&#x2019;","volume":"10","author":"kirui","year":"2013","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.031"},{"key":"ref19","first-page":"35","article-title":"&#x2018;A neuro-fuzzy classifier for customer churn prediction&#x2019;","volume":"19","author":"abbasimehr","year":"2011","journal-title":"Int J Comput Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TKDE.2013.109","article-title":"&#x2018;Data mining with big data&#x2019;","volume":"26","author":"wu","year":"2014","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.02.021"},{"journal-title":"&#x2018;Data Mining for Business Analytics Concepts Techniques and Applications in R&#x2019;","year":"2017","author":"shmueli","key":"ref6"},{"journal-title":"&#x2018;Spatial Data Mining Theory and Application&#x2019;","year":"2016","author":"li","key":"ref5"},{"journal-title":"Data Mining Concepts and Techniques","year":"2011","author":"han","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622008003204"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.11.083"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.09.009"},{"journal-title":"Data Mining Techniques and Algorithms","year":"2011","author":"chattamvelli","key":"ref9"},{"key":"ref20","first-page":"85","article-title":"&#x2018;Security on Electronic Transactions in Developing Countries: A Cluster and Decision Tree Mining Approach&#x2019;","author":"nabareseh","year":"2015","journal-title":"&#x2018;Book Security on Electronic Transactions in Developing Countries A Cluster and Decision Tree Mining Approach&#x2019;"},{"key":"ref22","first-page":"1157","article-title":"&#x2018;Hidden hyperchaotic attractor in a novel simple memristive neural network&#x2019;","volume":"8","author":"pham","year":"2014","journal-title":"Optoelectronics and Advanced Materials Rapid Communications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356410.pdf?arnumber=8356410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:24:11Z","timestamp":1527553451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356410","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}