IJEME Vol. 7, No. 2, 8 Mar. 2017
Cover page and Table of Contents: PDF (size: 250KB)
Full Text (PDF, 250KB), PP.30-40
Views: 0 Downloads: 0
Business Intelligence, Customer Profitability, Customer Relationship Management, Data Mining, Machine Learning
Customer Relationship Management (CRM) system is used to manage company relations with the existing and prospect customers. Data mining is used in organization for decision making and forecasting of prospective customers. We have studied recent literature related to use of data mining techniques for CRM. Based on review of the contemporary literature, we analyzed different data mining techniques employed in different types of business, corporate sectors and organizations. We illustrated a critical review table which provides the problem addressed, proposed techniques, significance, limitations and suggested possible improvements for each proposed techniques review during this study. The critical review of the data mining techniques which are being used for CRM is provided in this paper.
Abdur Rahman, M.N.A. Khan,"An Assessment of Data Mining Based CRM Techniques for Enhancing Profitability", International Journal of Education and Management Engineering(IJEME), Vol.7, No.2, pp.30-40, 2017. DOI: 10.5815/ijeme.2017.02.04
1]H. Ahn, J. J. Ahn, K. J. Oh, and D. H. Kim, "Facilitating cross-selling in a mobile telecom market to develop customer classification model based on hybrid data mining techniques," Expert Systems with Applications, 38(5), 5005-5012, 2011.
[2]T. F. Bahari, and M. S. Elayidom, "An Efficient CRM-Data Mining Framework for the Prediction of Customer Behaviour," Procedia Computer Science, 46, 725-731, 2015.
[3]I. Bose, and X. Chen, "Exploring business opportunities from mobile services data of customers: An inter-cluster analysis approach," Electronic Commerce Research and Applications, 9(3), 197-208, 2010.
[4]Y. L. Chen, M. H. Kuo, S. Y. Wu, and K. Tang, "Discovering recency, frequency, and monetary (RFM) sequential patterns from customers' purchasing data," Electronic Commerce Research and Applications, 8(5), 241-251, 2009.
[5]J. D'Haen, D. Van den Poel, and D. Thorleuchter, "Predicting customer profitability during acquisition: Finding the optimal combination of data source and data mining technique," Expert systems with applications, 40(6), 2007-2012, 2013.
[6]P. Duchessi, and E. J. Lauría, "Decision tree models for profiling ski resorts' promotional and advertising strategies and the impact on sales," Expert Systems with Applications, 40(15), 5822-5829, 2013.
[7]S. Emtiyaz, and M. Keyvanpour, "Customers behavior modeling by semi-supervised learning in customer relationship management," arXiv preprint arXiv:1201.1670, 2012.
[8]A. Griva, C. Bardaki, S. Panagiotis, and D. Papakiriakopoulos, "A Data Mining Based Framework to Identify Shopping Missions," 2014.
[9]S. M. S. Hosseini, A. Maleki, and M. R. Gholamian, "Cluster analysis using data mining approach to develop CRM methodology to assess the customer loyalty," Expert Systems with Applications, 37(7), 5259-5264, 2010.
[10]M. Khajvand, K. Zolfaghar, S. Ashoori, and S. Alizadeh, "Estimating customer lifetime value based on RFM analysis of customer purchase behavior: Case study," Procedia Computer Science, 3, 57-63, 2011.
[11]S. H. Liao, Y. J. Chen, and M. Y. Deng, "Mining customer knowledge for tourism new product development and customer relationship management," Expert Systems with Applications, 37(6), 4212-4223, 2010.
[12]V. L. Miguéis, A. S. Camanho, and J. F. e Cunha, "Customer data mining for lifestyle segmentation," Expert Systems with Applications, 39(10), 9359-9366, 2012.
[13]B. Shim, K. Choi, and Y. Suh, "CRM strategies for a small-sized online shopping mall based on association rules and sequential patterns," Expert Systems with Applications, 39(9), 7736-7742, 2012.
[14]C. Pete, C. Julian, K . Randy, K. Thomas, R. Thomas, S. Colin, and W. Rüdiger "CRISP-DM," NCR, SPSS, DaimlerChrysler. USA , 2000, pp.1-76.
[15]S. Iqbal, M. Khalid, M. N. A. Khan, "A Distinctive Suite of Performance Metrics for Software Design", International Journal of Software Engineering & Its Applications, vol. 7, no. 5, (2013).
[16]S. Iqbal and M. N. A. Khan, "Yet another Set of Requirement Metrics for Software Projects", International Journal of Software Engineering & Its Applications, vol. 6, no. 1, (2012).
[17]M. Faizan, S. Ulhaq, M. N. A. Khan, "Defect Prevention and Process Improvement Methodology for Outsourced Software Projects", Middle-East Journal of Scientific Research, vol. 19, no. 5, (2014), pp. 674-682.
[18]M. Faizan, M. N.A. Khan, S. Ulhaq, "Contemporary Trends in Defect Prevention", A Survey Report. International Journal of Modern Education & Computer Science, vol. 4, no. 3, (2012).
[19]K. Khan, A. Khan, M. Aamir and M. N. A. Khan, "Quality Assurance Assessment in Global Software Development" World Applied Sciences Journal, vol. 24, no. 11, (2013).
[20]M. Amir, K. Khan, A. Khan, M. N. A. Khan, "An Appraisal of Agile Software Development Process", International Journal of Advanced Science & Technology, vol. 58, (2013).
[21]M. Khan and M. N. A. Khan, "Exploring Query Optimization Techniques in Relational Databases", International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[22]M. N. A. Khan, M. Khalid and S. UlHaq, "Review of Requirements Management Issues in Software Development", International Journal of Modern Education & Computer Science, vol. 5, no. (1), (2013).
[23]M. Umar and M. N. A. Khan, "A Framework to Separate NonFunctional Requirements for System Maintainability", Kuwait Journal of Science & Engineering, vol. 39, no. 1 B, (2012), pp. 211- 231.
[24]M. Umar and M. N. A. Khan, Analyzing Non-Functional Requirements (NFRs) for software development. In IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), (2011), pp. 675-678).
[25]M. N. A. Khan, C. R. Chatwin and R. C. Young, "A framework for post-event timeline reconstruction using neural networks", digital investigation, vol. 4, no. 3, (2007), pp. 146-157.
[26]M. N. A. Khan, C. R. Chatwin and R. C. Young, "Extracting Evidence from File system Activity using Bayesian Networks", International journal of Forensic computer science, vol. 1, (2007), pp. 50-63.
[27]M. N. A. Khan, "Performance analysis of Bayesian networks and neural networks in classification of file system activities", Computers & Security, vol. 31, no. 4, (2012), pp. 391-401.
[28]M. Rafique and M. N. A. Khan, "Exploring Static and Live Digital Forensics: Methods, Practices and Tools", International Journal of Scientific & Engineering Research, vol. 4, no. 10, (2013), pp. 1048-1056.
[29]M. S. Bashir and M. N. A. Khan, "Triage in Live Digital Forensic Analysis", International journal of Forensic Computer Science, vol. 1, (2013), pp. 35-44.
[30]A. Sarwar and M. N. A. Khan, "A Review of Trust Aspects in Cloud Computing Security", International Journal of Cloud Computing and Services Science (IJCLOSER), vol. 2, no. 2, (2013), pp. 116-122.
[31]A. H. Gondal and M. N. A. Khan, "A review of fully automated techniques for brain tumor detection from MR images", International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 2, (2013), pp. 55.
[32]A. Zia and M. N. A. Khan, "Identifying key challenges in performance issues in cloud computing", International Journal of Modern Education and Computer Science (IJMECS), vol. 4, no. 10, (2012), pp. 59.
[33]K. U. Rehman and M. N. A. Khan, "The Foremost Guidelines for Achieving Higher Ranking in Search Results through Search Engine Optimization", International Journal of Advanced Science and Technology, vol. 52, (2013), pp. 101-110.
[34]M. Khan and M. N. A. Khan, "Exploring query optimization techniques in relational databases", International Journal of Database Theory & Application, vol. 6, no. 3, (2013).
[35]R. Shehzad, M. N. KHAN and M. Naeem, "Integrating knowledge management with business intelligence processes for enhanced organizational learning", International Journal of Software Engineering and Its Applications, vol. 7, no. 2, (2013), pp. 83-91.
[36]S. U. Haq, M. Raza, A. Zia and M. N. A. Khan, "Issues in global software development: A critical review", Journal of Software Engineering and Applications, 4(10), 590, 2015.
[37]A. S. Shah, M. N. A. Khan and A. Shah. An appraisal of off-line signature verification techniques. International Journal of Modern Education and Computer Science, 7(4), 67-75, 2015.
[38]A. Zia and M. N. A. Khan, "A Scheme to Reduce Response Time in Cloud Computing Environment", International Journal of Modern Education and Computer Science (IJMECS), vol. 5, no. 6, (2013), pp. 56.
[39]M. Tariq and M. N. A. Khan, "The Context of Global Software Development: Challenges, Best Practices and Benefits", Information Management & Business Review, vol. 3, no. 4, (2011).
[40]A. Shahzad, M. Hussain and M. N. A. Khan, "Protecting from Zero-Day Malware Attacks", Middle-East Journal of Scientific Research, vol. 17, no. 4, (2013), pp. 455-464.
[41]A. A. Khan and M. Khan, "Internet content regulation framework", International Journal of U-& EService, Science & Technology, vol. 4, no. 3, (2011).
[42]K. Ullah and M. N. A. Khan, "Security and Privacy Issues in Cloud Computing Environment: A Survey Paper", International Journal of Grid and Distributed Computing, vol. 7, no. 2, (2014), pp. 89-98.
[43]A. A. Abbasi, M. N. A. Khan and S. A. Khan, "A Critical Survey of Iris Based Recognition Systems", Middle-East Journal of Scientific Research, vol. 15, no. 5, (2013), pp. 663- 668.
[44]M. N. A. Khan, S. A. Qureshi and N. Riaz, "Gender classification with decision trees", Int. J. Signal Process. Image Process. Patt. Recog, vol. 6, (2013), pp. 165-176.
[45]S. S. Ali and M. N. A. Khan, "ICT Infrastructure Framework for Microfinance Institutions and Banks in Pakistan: An Optimized Approach", International Journal of Online Marketing (IJOM), vol. 3, no. 2, 2013, pp. 75-86.
[46]A. Mahmood, M. Ibrahim and M. N. A. Khan, "Service Composition in the Context of Service Oriented Architecture", Middle East Journal of Scientific Research, vol. 15, no. 11, 2013.
[47]M. A. Masood and M. N. A. Khan, "Clustering Techniques in Bioinformatics", I. J. Modern Education and Computer Science, vol. 1, 2015, pp. 38-46.
[48]T. Ur Rehman, M. N. A. Khan, N. Riaz. Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies. International Journal of Information Technology and Computer Science (IJITCS), 5(3), 40, 2013.
[49]R. Ahmed, M. N. A. Khan. An Analytical Review of Stereovision Techniques to Reconstruct 3D Coordinates. International Journal of Information Technology and Computer Science (IJITCS), 5(7), 80. 2013.
[50]M.F. Malik, M. N. A. Khan. An Analysis of Performance Testing in Distributed Software Applications. International Journal of Modern Education & Computer Science, 8(7), 2016.
[51]R. Naz, M. N. A. Khan, M. Aamir. Scrum-Based Methodology for Product Maintenance and Support. IJEM-International Journal of Engineering and Manufacturing (IJEM), 6(1), 10, 2016.
[52]S. Rahman, M. N. A. Khan. Digital Forensics through Application Behavior Analysis. International Journal of Modern Education & Computer Science, 2016.
[53]S. Shafqat, M. N. A. Khan, N. Riaz, K. Khan. Identity Matrix: Architecture Framework for Trusted Cloud Computing through Cloud Intellect. Journal of Internet Technology, 17(4), 2016.
[54]G. Ahmed, M. N. A. Khan, M.S. Bashir. A Linux-based IDPS using Snort. Computer Fraud & Security, 2015(8), 13-18, 2015.
[55]M. Rafique, M. N. A. Khan. Profiling software applications for forensic analysis. Computer Fraud & Security, 2015(6), 13-18, 2015.
[56]M. Khan, M. Akram, N. Riaz. A comparative analysis of software protection schemes. Int. Arab J. Inf. Technol., 12(3), 286-295, 2015.
[57]G. Ahmed, M. Hussain, M. N. A. Khan. Characterizing Strengths of Snort-based IDPS. Research Journal of Recent Sciences. 2014.
[58]A., Abbasi, M. Khan. Iris-Pupil Thickness Based Method for Determining Age Group of a Person. International Arab Journal of Information Technology, No.6, November 2016.