Publication Cover
Cybernetics and Systems
An International Journal
Volume 40, 2009 - Issue 7
264
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

CUSTOMER SEGMENTATION AND CLASSIFICATION FROM BLOGS BY USING DATA MINING: AN EXAMPLE OF VOIP PHONE

, &
Pages 608-632 | Published online: 04 Sep 2009

REFERENCES

  • Asano , E. 2007 . A public outreach in epilepsy surgery using a serial novel on BLOG: A preliminary report . Brain & Development 29 : 102 – 104 .
  • Borzemski , L. 2006 . The use of data mining to predict web performance . Cybernetics and Systems 37 : 587 – 608 .
  • Chakrabarti , S. 2000 . Data mining for hypertext: A tutorial survey . SIGKDD Exploration 1 : 1 – 11 .
  • Chang , C.-C. and Lin , C.-J. 2001 . LIBSVM: A library for support vector machines. Software available at http://www.csie.ntu.edu.tw/_cjlin/libsvm .
  • Chau , M. and Xu , J. 2007 . Mining communities and their relationships in blogs: A study of online hate groups . International Journal of Human – Computer Studies 65 : 57 – 70 .
  • Chen , H. and Chau , M. 2004 . Web mining: Machine learning for web applications . Annual Review of Information Science and Technology (ARIST) 38 : 289 – 329 .
  • Cho , Y. H. , Kim , J. K. , and Kim , S. H. 2002. A personalized recommender system based on web usage mining and decision tree induction. Expert Systems with Applications 23: 329–342.
  • Cohen , E. and Krishnamurthy , B. 2006 . A short walk in the Blogistan . Computer Networks 50 : 615 – 630 .
  • Cristianini , N. and Shawe-Taylor , J. 2000 . An introduction to support vector machines and other kernel-based learning methods . Cambridge : Cambridge University Press .
  • Du , H. S. and Wagner , C. 2006 . Weblog success: Exploring the role of technology . International Journal of Human-Computer Studies 64 : 789 – 798 .
  • Epstein , M. , Friedl , M. , and Yuthas , K. 2009 . Managing customer value . CMA Management : 28 – 31 .
  • Facca , F. M. and Lanzi , P. L. 2005 . Mining interesting knowledge from weblogs: A survey . Data & Knowledge Engineering 53 : 225 – 241 .
  • Freeman , A. J. and Skapura , M. D. 1992 . Neural networks: Algorithms, applications, and programming techniques . Reading , MA : Addison Wesley .
  • Gil-Saura , I. and Ruiz-Molina , M. 2009 . Customer segmentation based on commitment and ICT use . Industrial Management & Data Systems 109 : 206 – 223 .
  • HaCohen-Kerner , Y. , Stern , I. , Korkus , D. , and Fredj , E. 2007 . Automatic machine learning of keyphrase extraction from short HTML documents written in Hebrew . Cybernetics and Systems 38 : 1 – 21 .
  • Hof , R. 2005 . Blogs on ice: Signs of a business model? Business Week Online – The Tech Beat , June 2, 2005. Available at http://www.businessweek.com/the_thread/techbeat/archives/2005/06/blogs_on_ice_si.html (accessed May 19, 2009).
  • Hsu , C.-W. , Chang , C.-C. , and Lin , C.-J. 2009 . A practical guide to support vector classification. Available at http://www.csie.ntu.edu.tw/~cjlin/libsvm/index.html (accessed May 19, 2009) .
  • Kohonen , T. 1990 . The self-organizing map . Proceedings of the IEEE 78 : 1464 – 1480 .
  • Kolari , P. and Joshi , A. 2004 . Web mining: research and practice . Computing in Science & Engineering 6 : 49 – 53 .
  • Kosala , R. and Blockeel , H. 2000 . Web mining research: A survey . ACM SIGKDD Explorations 2 : 1 – 15 .
  • Kukolj , D. , Atlagic , B. , and Petrov , M. 2006 . Data clustering using a reorganizing neural network . Cybernetics and Systems 37 ( 7 ): 779 – 790 .
  • Kumar , R. , Raghavan , P. , Rajagopalan , S. , and Tomkins , A. 1999 . Trawling the web for emerging cyber-communities . Computer Networks 31 : 1481 – 1493 .
  • Lappas , G. 2007 . An overview of web mining in social benefit areas. The 9th IEEE International Conference on E-Commerce Technology and 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Service, July 23–26, 683–690 .
  • Larkin , M. 2005. Blogs: New way to communicate about infectious diseases. The Lancet Infectious Diseases 5: 748.
  • Lin , Y.-S. and Huang , J.-Y. 2006 . Internet blogs as a tourism marketing medium: A case study . Journal of Business Research 59 : 1201 – 1205 .
  • Lu , Z. , Lin , F. , and Ying , H. 2007 . Design of decision tree via kernelized hierarchical clustering for multiclass support vector machines . Cybernetics and Systems 38 : 187 – 202 .
  • Mathieu , J. 2007 . Blogs, podcasts, and wikis: The new names in information dissemination . Journal of the American Dietetic Association : 553 – 555 .
  • Nardi , B. A. , Schiano , D. J. , Gumbrecht , M. , and Swartz , L. 2004 . Why we blog . Communications of the ACM 47 : 41 – 46 .
  • Olafsson , S. , Li , X. , and Wu , S. 2008 . Operations research and data mining . European Journal of Operational Research 187 : 1429 – 1448 .
  • Oransky , I. 2005 . Cancer blogs . Lancet Oncology 6 : 838 – 839 .
  • Philip , D. W. 1992 . Neural computing: Theory and practice . New York : Van Nostrand Reinhold .
  • Porter , L. V. , Trammell , K. D. , Chung , D. , and Kim , E. 2007 . Blog power: Examining the effects of practitioner blog use on power in public relations . Public Relations Review 33 : 92 – 95 .
  • Qin , J. , Zhou , Y. , Reid , E. , Lai , G. , and Chen , H. 2006 . Unraveling internet terrorist groups' exploitation of the web: technical sophistication, media richness, and web interactivity. Proceedings of the Workshop on Intelligence and Security Informatics (WISI 06), Singapore .
  • Quinlan , J. R. 1986 . Induction of decision trees . Machine Learning 1 : 81 – 106 .
  • Quinlan , J. R. 1993 . C4.5: Programs for machine learning . San Mateo , CA : Morgan Kaufmann .
  • Rahman , M. K. M. , Pi , Y. , Wang , C. , Tommy , W. S. , and Wu , S. 2007 . A flexible multi-layer self-organizing map for generic processing of tree-structured data . Pattern Recognition 40 ( 5 ): 1406 – 1424 .
  • Rosenbloom , A. 2004 . The blogosphere . Communications of the ACM 47 : 31 – 33 .
  • Rumelhart , D. E. and McClelland , J. L. 1986 . Parallel distributed processing , Vol. 1 . Cambridge , MA : MIT Press .
  • Salas , R. , Moreno , S. , Allende , H. , and Moraga , C. 2007 . A robust and flexible model of hierarchical self-organizing maps for non-stationary environments . Neurocomputing 70 : 2744 – 2757 .
  • Seiffert , U. and Jain , L. 2002 . Self-Organizing Neural Networks: Recent Advances and Applications. Studies in Fuzziness and Soft Computing, 78 . Berlin : Springer .
  • Simkin , L. 2008 . Achieving market segmentation from B2B sectorisation . Journal of Business & Industrial Marketing 23 : 464 – 474 .
  • Su , C.-T. and Shiue , Y.-R. 2003. Intelligent scheduling controller for shop floor control systems: A hybrid genetic algorithm/decision tree learning approach. International Journal of Production Research 12: 2619–2641.
  • Todoroki , S. , Konishi , T. , and Inoue , S. 2006 . Blog-based research notebook: personal informatics workbench for high-throughput experimentation . Applied Surface Science 252 : 2640 – 2645 .
  • Trammell , K. D. 2006 . Blog offensive: an exploratory analysis of attacks published on campaign blog posts from a political public relations perspective . Public Relations Review 32 : 402 – 406 .
  • Vapnik , V. , Golowich , S. , and Smola , A. J. 1996 . Support vector method for function approximation, regression estimation, and signal processing . In Advances in Neural Information Processing Systems . Cambridge , MA : MIT Press .
  • Wang , B. and Liu , Z. 2003 . Web mining research . Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2003) : 84 – 89 .
  • Wang , C. , Lu , J. , and Zhang , G. 2007 . Mining key information of web pages: A method and its application . Expert Systems with Applications 33 : 425 – 433 .
  • Wood-Black , F. and Pasquarelli , T. 2007 . Blogs . Journal of Chemical Health & Safety 14 : 37 .
  • Wu , G. and Chang , E. Y. 2005 . KBA: Kernel boundary alignment considering imbalanced data distribution . IEEE Transactions on Knowledge and Data Engineering 17 : 786 – 795 .
  • Wu , X. , Kumar , V. , Quinlan , J. , Ghosh , J. , Yang , Q. , Motoda , H. , McLachlan , G. , Ng , A. , Liu , B. , Yu , P. , Zhou , Z. , Steinbach , M. , Hand , D. , and Steinberg , D. 2008 . Top 10 algorithms in data mining . Knowledge and Information Systems 14 : 1 – 37 .
  • Zhou , Y. , Reid , E. , Qin , J. , Chen , H. , and Lai , G. 2005 . US domestic extremist groups on the web: Link and content analysis . IEEE Intelligent Systems 20 : 44 – 51 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.