1,532 research outputs found
Churn classification model for local telecommunication company based on rough set theory
Customer care plays an important role in a company especially in managing churn for Telecommunication Company. Churn is perceived as the behaviour of a customer to leave or to terminate a service. This behaviour causes the loss of profit to companies because acquiring new customer requires higher investment compared to retaining existing ones. Thus, it is necessary to consider an efficient classification model to reduce the rate of churn. Hence, the purpose of this paper is to propose a new classification model based on the Rough Set Theory to classify customer churn. The results of the study show that the proposed Rough Set classification model outperforms the existing models and contributes to significant accuracy improvement.Keywords: customer churn; classification model; telecommunication industry; data mining;rough set
Customer Demographic Segmentation Based On Telecom Behavioral Data
In the modern world, digitalization becomes ubiquitous and covers almost every aspect of the business and daily life. Telecom services providers have a major role in these processes due to their involvement in collecting, storing and processing enormous amounts of customer data. This also includes personal telecom services usage data, which if correctly interpreted, might be used for many different purposes. Using telecom data to predict certain demographic characteristics of the customers is helpful in more than one aspect: 1) It could add the acquired knowledge into customer segmentation to better target different customer groups. 2) Such data could be used in cases where traditional historic data is not available- the potential strength of predicting customer credit worthiness based on behavior data is still not fully explored. 3) Last but definitely not least, is the use of data for verifying customer identification in fraud detection.
In this paper, an overview of some successful use of telecom data for non-telecom services is shown, as well as with a set of real telco data, statistical techniques are used to demonstrate the relation between mobile telecom services usage and subscription owners’ age. Use of alternative customer data could have enormous implication both on traditional predictive models and could alter the role of the telecoms, making them one of the most important information sources for financial institutions, which operate with sensitive customer data
Recommended from our members
Agent based modelling and simulation: An examination of customer retention in the UK mobile market
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Customer retention is an important issue for any business, especially in mature markets such as the UK mobile market where new customers can only be acquired from competitors. Different methods and techniques have been used to investigate customer retention including statistical methods and data mining. However, due to the increasing complexity of the mobile market, the effectiveness of these techniques is questionable. This study proposes Agent-Based Modelling and Simulation (ABMS) as a novel approach to investigate customer retention. ABMS is an emerging means of simulating behaviour and examining behavioural consequences. In outline, agents represent customers and agent relationships represent processes of agent interaction. This study follows the design science paradigm to build and evaluate a generic, reusable, agent-based (CubSim) model to examine the factors affecting customer retention based on data extracted from a UK mobile operator. Based on these data, two data mining models are built to gain a better understanding of the problem domain and to identify the main limitations of data mining. This is followed by two interrelated development cycles: (1) Build the CubSim model, starting with modelling customer interaction with the market, including interaction with the service provider and other competing operators in the market; and (2) Extend the CubSim model by incorporating interaction among customers. The key contribution of this study lies in using ABMS to identify and model the key factors that affect customer retention simultaneously and jointly. In this manner, the CubSim model is better suited to account for the dynamics of customer churn behaviour in the UK mobile market than all other existing models. Another important contribution of this study is that it provides an empirical, actionable insight on customer retention. In particular, and most interestingly, the experimental results show that applying a mixed customer retention strategy targeting both high value customers and customers with a large personal network outperforms the traditional customer retention strategies, which focuses only on the customer‘s value.This work is funded by the Brunel Department of Information Systems and Computing (DISC
Securing Cloud Storage by Transparent Biometric Cryptography
With the capability of storing huge volumes of data over the Internet, cloud storage has become a popular and desirable service for individuals and enterprises. The security issues, nevertheless, have been the intense debate within the cloud community. Significant attacks can be taken place, the most common being guessing the (poor) passwords. Given weaknesses with verification credentials, malicious attacks have happened across a variety of well-known storage services (i.e. Dropbox and Google Drive) – resulting in loss the privacy and confidentiality of files. Whilst today's use of third-party cryptographic applications can independently encrypt data, it arguably places a significant burden upon the user in terms of manually ciphering/deciphering each file and administering numerous keys in addition to the login password.
The field of biometric cryptography applies biometric modalities within cryptography to produce robust bio-crypto keys without having to remember them. There are, nonetheless, still specific flaws associated with the security of the established bio-crypto key and its usability. Users currently should present their biometric modalities intrusively each time a file needs to be encrypted/decrypted – thus leading to cumbersomeness and inconvenience while throughout usage. Transparent biometrics seeks to eliminate the explicit interaction for verification and thereby remove the user inconvenience. However, the application of transparent biometric within bio-cryptography can increase the variability of the biometric sample leading to further challenges on reproducing the bio-crypto key.
An innovative bio-cryptographic approach is developed to non-intrusively encrypt/decrypt data by a bio-crypto key established from transparent biometrics on the fly without storing it somewhere using a backpropagation neural network. This approach seeks to handle the shortcomings of the password login, and concurrently removes the usability issues of the third-party cryptographic applications – thus enabling a more secure and usable user-oriented level of encryption to reinforce the security controls within cloud-based storage. The challenge represents the ability of the innovative bio-cryptographic approach to generate a reproducible bio-crypto key by selective transparent biometric modalities including fingerprint, face and keystrokes which are inherently noisier than their traditional counterparts. Accordingly, sets of experiments using functional and practical datasets reflecting a transparent and unconstrained sample collection are conducted to determine the reliability of creating a non-intrusive and repeatable bio-crypto key of a 256-bit length. With numerous samples being acquired in a non-intrusive fashion, the system would be spontaneously able to capture 6 samples within minute window of time. There is a possibility then to trade-off the false rejection against the false acceptance to tackle the high error, as long as the correct key can be generated via at least one successful sample. As such, the experiments demonstrate that a correct key can be generated to the genuine user once a minute and the average FAR was 0.9%, 0.06%, and 0.06% for fingerprint, face, and keystrokes respectively.
For further reinforcing the effectiveness of the key generation approach, other sets of experiments are also implemented to determine what impact the multibiometric approach would have upon the performance at the feature phase versus the matching phase. Holistically, the multibiometric key generation approach demonstrates the superiority in generating the bio-crypto key of a 256-bit in comparison with the single biometric approach. In particular, the feature-level fusion outperforms the matching-level fusion at producing the valid correct key with limited illegitimacy attempts in compromising it – 0.02% FAR rate overall. Accordingly, the thesis proposes an innovative bio-cryptosystem architecture by which cloud-independent encryption is provided to protect the users' personal data in a more reliable and usable fashion using non-intrusive multimodal biometrics.Higher Committee of Education Development in Iraq (HCED
- …