Paper Title:
Data Mining Techniques to Enhance Customer Lifetime Value
  Abstract

It is proved by many studies that it is more costly to acquire than to retain customers. Consequently, evaluating current customers to keep high value customers and enhance their lifetime value becomes a critical factor to decide the success or failure of a business. This study applies data from customer and transaction databases of a department store, based on RFM model to do clustering analysis to recognize high value customer groups for cross-selling promotions.

  Info
Periodical
Advanced Materials Research (Volumes 225-226)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
3-7
DOI
10.4028/www.scientific.net/AMR.225-226.3
Citation
C. C. Lin, D. H. Shih, "Data Mining Techniques to Enhance Customer Lifetime Value", Advanced Materials Research, Vols. 225-226, pp. 3-7, 2011
Online since
April 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: De Ling Yang, Wan Ming Chen
Abstract:According to the existing insufficiency of researches of enterprise informatization level evaluation, building an evaluation model of...
823
Authors: Bao Ling Liu
Chapter 1: Materials Behavior
Abstract:The Supervisory Information System (SIS) [1]is widely installed in power plant of more than 300MW. Its massive data contains valuable...
223
  | Authors: Yuan Ming Yuan, Chan Le Wu
Chapter 1: Computer Science and Theory, Related Studies
Abstract:Data quantity of Big Data was too big to be processed with traditional clustering analysis technologies. Time consuming was long, problem of...
82
Authors: Ren Xu
Chapter 4: System Modeling and Algorithms for Intelligent Automation and Control Systems
Abstract:In this paper, the loyalty model has been established based on Petri Net (PN) technology. Then, combining with the Petri Net Algorithm of the...
295
Authors: Jiang Kun Mao, Fan Zhan
Chapter 6: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development
Abstract:Intrusion detection system as a proactive network security technology, is necessary and reasonable to add a static defense. However, the...
2499