您现在的位置: 精品资料网 >> 管理信息化 >> 数据仓 >> 资料信息

电信行业数据挖掘红皮书(pdf 194页)

所属分类:
数据仓
下载提示:
无法下载
文件大小:
2883 KB
下载地址:
相关资料:
电信行业,行业数据,数据挖掘,红皮书

电信行业数据挖掘红皮书(pdf 194页)内容简介

Contents
Preface   vii
The tEAM that wrote this redbook . . . . . . . . vii
Special notice  . . . . . . . . . . . . . . . . . . . . . . . . ix
IBM trademarks  . . . . . . . . . . . . . . . . . . . . . . ix
Comments welcome . . . . . . . . . . . . . . . . . . . ix
Chapter 1. Introduction . . . . . . . . . . . . . . . 1
1.1 Why you should mine your own business . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 What are the telecoms business issues to address?. . . . . . . . . . . . . . . 3
1.3 How this book is structured  . . . . . . 4
1.4 Who should read this book?  . . . . . . 6
Chapter 2. Business Intelligence archITecture overvIEw . . . . . . . . . . . . . . . 7
2.1 Business Intelligence  . . . . . . . . . . . 8
2.2 Data warehouse  . . . . . . . . . . . . . . . 8
2.2.1 Data sources  . . . . . . . . . . . . . . . . 10
2.2.2 Extraction/propagation  . . . . . . . . 10
2.2.3 Transformation/cleansing  . . . . . . 10
2.2.4 Data refining  . . . . . . . . . . . . . . . . 11
2.2.5 Datamarts  . . . . . . . . . . . . . . . . . . 12
2.2.6 Metadata  . . . . . . . . . . . . . . . . . . . 12
2.2.7 Operational Data Store (ODS)  . . 15
2.3 Analytical users rEQuirements  . . . 16
2.3.1 Reporting and query  . . . . . . . . . . 17
2.3.2 On-Line Analytical Processing (OLAP) . . . . . . . . . . . . . . . . . . . . . . . 17
2.3.4 Statistics  . . . . . . . . . . . . . . . . . . . 21
2.3.5 Data mining  . . . . . . . . . . . . . . . . . 21
2.4 Data warehouse, OLAP and data mining summary. . . . . . . . . . . . . . . 21
Chapter 3. A generic data mining method . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.1 What is data mining?  . . . . . . . . . . 24
3.2 What is new wITh data mining?  . . . 25
3.3 Data mining techniques  . . . . . . . . 27
3.3.1 Types of techniques  . . . . . . . . . . 27
3.3.2 Different applications that data mining can be used for . . . . . . . . . . 28
3.4 The generic data mining method  . 29
3.4.1 Step 1 - Defining the business issue. . . . . . . . . . . . . . . . . . . . . . . . . 32
3.4.2 Step 2 - Defining a data model to use. . . . . . . . . . . . . . . . . . . . . . . . 35
3.4.3 Step 3 - Sourcing and preprocessing the data . . . . . . . . . . . . . . . . . 37
3.4.4 Step 4 - Evaluating the data model . . . . . . . . . . . . . . . . . . . . . . . . . . 39
3.4.5 Step 5 -Choosing the data mining technique . . . . . . . . . . . . . . . . . . 41
3.4.6 Step 6 - IntERPreting the results  . . 42
3.4.7 Step 7 - Deploying the results  . . . 42
3.4.8 Skills rEQuired  . . . . . . . . . . . . . . . 43
3.4.9 Effort rEQuired  . . . . . . . . . . . . . . . 45
Chapter 4. How to discover the characteristics of your customers? . . . . 47
4.1 The business issue . . . . . . . . . . . . 48
4.1.1 How can data mining help? . . . . . 48
4.1.2 Where should we start?  . . . . . . . 49
4.2 The data to be used  . . . . . . . . . . . 51
4.2.1 Behavior data  . . . . . . . . . . . . . . . 51
4.2.2 Demographic data . . . . . . . . . . . . 52
4.2.3 AddITional data  . . . . . . . . . . . . . . 52
4.2.4 Data model for segmentation  . . . 53
4.3 Sourcing and preprocessing the data . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.3.1 Behavior data  . . . . . . . . . . . . . . . 55
4.3.2 Demographic data . . . . . . . . . . . . 55
4.4 Evaluating the data  . . . . . . . . . . . 56
4.5 The mining techniques  . . . . . . . . . 59
4.5.1 Choosing the mining techniques  . 59
4.5.2 Applying the mining techniques  . 60
4.6 IntERPreting the results  . . . . . . . . . 64
4.6.1 How to read and evaluate the results . . . . . . . . . . . . . . . . . . . . . . . . 64
4.6.2 IntERPreting the results from business perspective . . . . . . . . . . . . . . 67
4.7 Deploying the mining results  . . . . 73
4.7.1 Model deployment in various applications . . . . . . . . . . . . . . . . . . . . 73
4.7.2 Model deployment in marketing campaign process . . . . . . . . . . . . . 73
4.7.3 Model maintenance . . . . . . . . . . . 74
Chapter 5. Can you predict the customers who are likely to leave? . . . . 75
5.1 The business issue . . . . . . . . . . . . 76
5.1.1 How can data mining help? . . . . . 76
5.1.2 Where should we start?  . . . . . . . 76
5.1.3 Churn definITion  . . . . . . . . . . . . . . 77
5.1.4 Churn filtering  . . . . . . . . . . . . . . . 78
5.2 The data to be used  . . . . . . . . . . . 79
5.2.1 Churn indicator  . . . . . . . . . . . . . . 79
5.2.2 Customer information data  . . . . . 79
5.2.3 Call data  . . . . . . . . . . . . . . . . . . . 80
5.2.4 billing and payment data . . . . . . . 81
5.2.5 Key indices derived from call transaction data . . . . . . . . . . . . . . . . . 81
5.2.6 AddITional data  . . . . . . . . . . . . . . 81
5.2.7 Data model for churn prediction  . 81
5.3 Sourcing and preprocessing the data . . . . . . . . . . . . . . . . . . . . . . . . . 84
5.3.1 Churn indicator  . . . . . . . . . . . . . . 87
5.3.2 Customer information data  . . . . . 87
5.3.3 Call data  . . . . . . . . . . . . . . . . . . . 87
5.3.4 billing and payment data . . . . . . . 88
5.3.5 Key indices derived from transaction data . . . . . . . . . . . . . . . . . . . . 88
5.4 Evaluating the data  . . . . . . . . . . . 89
5.5 The mining technique  . . . . . . . . . . 92
5.5.1 Choosing the mining technique . . 92
5.5.2 Applying the mining technique  . . 93
5.6 IntERPreting the results  . . . . . . . . . 97
5.6.1 IntERPreting results from business perspective . . . . . . . . . . . . . . . . . 97
5.6.2 Performance comparison  . . . . . 105
5.7 Deploying the model . . . . . . . . . . 108
5.7.1 Model deployment in various applications . . . . . . . . . . . . . . . . . . . 108
5.7.2 Model deployment in retention campaign process . . . . . . . . . . . . . 109
5.7.3 Model maintenance . . . . . . . . . . 109
Chapter 6. How to discover true value of your customers? . . . . . . . . . . 111
6.1 The business issue . . . . . . . . . . . 112
6.1.1 How can data mining help? . . . . 112
6.1.2 Where should we start?  . . . . . . 112
6.2 The data to be used  . . . . . . . . . . 114
6.2.1 Financial data  . . . . . . . . . . . . . . 114
6.2.2 CredIT risk  . . . . . . . . . . . . . . . . . 114
6.2.3 Behavior measure  . . . . . . . . . . . 114
6.2.4 Data used  . . . . . . . . . . . . . . . . . 115
6.3 Sourcing and preprocessing the data . . . . . . . . . . . . . . . . . . . . . . . . 116
6.3.1 Financial data  . . . . . . . . . . . . . . 116
6.3.2 CredIT risk  . . . . . . . . . . . . . . . . . 116
6.3.3 Behavior measure  . . . . . . . . . . . 116
6.4 Evaluating the data  . . . . . . . . . . 118
6.4.1 CredIT risk prediction  . . . . . . . . . 118
6.4.2 Customer value function (CVF)  . 121
6.5 The mining technique(s)  . . . . . . . 122
6.5.1 Choosing mining technique for credIT risk prediction. . . . . . . . . . . . 122
6.5.2 Choosing mining technique for CVF . . . . . . . . . . . . . . . . . . . . . . . . 122
6.6 IntERPreting the results  . . . . . . . . 124
6.6.1 CredIT risk prediction  . . . . . . . . . 124
6.6.2 CVF  . . . . . . . . . . . . . . . . . . . . . . 129
6.7 Deploying the mining results  . . . 133
..............................

电信行业数据挖掘红皮书(pdf 194页)简介结束