Промышленный лизинг Промышленный лизинг  Методички 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 [ 123 ] 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222

Jane also racks up about the same usage every month on her mobile phone. She has four salespeople reporting to her that call her throughout the day, often leaving messages on her mobile phone voice mail when they do not reach her in the car. Her calls include calls to management, potential customers, and other colleagues. Her calls, though, are always quite short- almost always a minute or two, since she is usually scheduling meetings. Working in a small business, she is sensitive to privacy and to the cost of the calls so out of habit uses land lines for longer discussions.

Now, what happens if Jane and John both get an offer from a competitor? Who is more likely to accept the competing offer (or churn in the vocabulary of wireless telecommunications companies)? At first glance, we might suspect that Jane is the more price-sensitive and therefore the more susceptible to another offer. However, a second look reveals that if changing carriers would require her to change her telephone number it would be a big inconvenience for Jane. (In the United States, number portability has been a long time coming. It finally arrived in November 2003, shortly before this edition was published, perhaps invalidating many existing churn models.) By looking at the number of different people who call her, we see that Jane is quite dependent on her wireless telephone number; she uses features like voicemail and stores important numbers in her cell phone. The number of people she would have to notify is inertia that keeps her from changing providers. John has no such inertia and might have no allegiance to his wireless provider-as long as a competing provider can provide uninterrupted service for his 45-minute call on Wednesday mornings.

Jane also has a lot of influence. Since she talks to so many different people, they will all know if she is satisfied or dissatisfied with her service. She is a customer that the cellular company wants to keep happy. But, she is not a customer that traditional methods of segmentation would have located.

The Power of Link Analysis

Link analysis is played two roles in this analysis of cellular phone data. The first was visualization. The ability to see some of the graphs representing call patterns makes patterns for things like inertia or influence much more obvious. Visualizing the data makes it possible to see patterns that lead to further questions. For this example, we chose two profitable customers considered similar by previous segmentation techniques. Link analysis showed their specific calling patterns and suggested how the customers differ. On the other hand, looking at the call patterns for all customers at the same time would require drawing a graph with hundreds of thousands or millions of nodes and hundreds of millions of edges.



Second, link analysis can apply the concepts generated by visualization to larger sets of customers. For instance, a churn reduction program might avoid targeting customers who have high inertia or be sure to target customers with high influence. This requires traversing the call graph to calculate the inertia or influence for all customers. Such derived characteristics can play an important role in marketing efforts.

Different marketing programs might suggest looking for other features in the call graph. For instance, perhaps the ability to place a conference call would be desirable, but who would be the best prospects? One idea would be to look for groups of customers that all call each other. Stated as a graph problem, this group is a fully connected subgraph. In the telephone industry, these subgraphs are called communities of interest. A community of interest may represent a group of customers who would be interested in the ability to place conference calls.

Lessons Learned

Link analysis is an application of the mathematical field of graph theory. As a data mining technique, link analysis has several strengths:

It capitalizes on relationships.

It is useful for visualization.

It creates derived characteristics that can be used for further mining.

Some data and data mining problems naturally involve links. As the two case studies about telephone data show, link analysis is very useful for telecommunications-a telephone call is a link between two people. Opportunities for link analysis are most obvious in fields where the links are obvious such as telephony, transportation, and the World Wide Web. Link analysis is also appropriate in other areas where the connections do not have such a clear manifestation, such as physician referral patterns, retail sales data, and forensic analysis for crimes.

Links are a very natural way to visualize some types of data. Direct visualization of the links can be a big aid to knowledge discovery. Even when automated patterns are found, visualization of the links helps to better understand what is happening. Link analysis offers an alternative way of looking at data, different from the formats of relational databases and OLAP tools. Links may suggest important patterns in the data, but the significance of the patterns requires a person for interpretation.

Link analysis can lead to new and useful data attributes. Examples include calculating an authority score for a page on the World Wide Web and calculating the sphere of influence for a telephone user.



Although link analysis is very powerful when applicable, it is not appropriate for all types of problems. It is not a prediction tool or classification tool like a neural network that takes data in and produces an answer. Many types of data are simply not appropriate for link analysis. Its strongest use is probably in finding specific patterns, such as the types of outgoing calls, which can then be applied to data. These patterns can be turned into new features of the data, for use in conjunction with other directed data mining techniques.



1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 [ 123 ] 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222