SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.6, 2011


       Direct Marketing with the Application of Data Mining
                                M Suman, T Anuradha, K Manasa Veena*
                               KLUNIVERSITY,GreenFields,vijayawada,A.P
                                   *Email: manasaveena_555@yahoo.com


Abstract
For any business to be successful it must find a perfect way to approach its customers. Marketing plays a
huge role in this. Mass marketing and direct marketing are the two types of it. Mass marketing targets
everybody in the society and thus it has less impact on valued customers where direct marketing
concentrates mainly on these valued and un loyal customers and promotes only to them which in turn
makes profits. For this separation of customers based on their loyalty data mining algorithms and tools are
used. In this paper we discussed the approach of implementation of data mining for direct marketing. We
mainly concentrated and studied on why we apply data mining for direct marketing, how we apply and
problems one faces while applying data mining concept for direct marketing and the solutions for them in
direct marketing.

Keywords: Direct marketing, Data mining,Decision tree.


1. INTRODUCTION
In marketing a product ,there are several forms of sub disciplines, and one of them is
direct marketing which involves messages sent directly to consumers usually through email, telemarketing
and direct mail.As the traditional forms of advertising (radio, newspapers, television,etc.) may not be the
best use of their promotional budgets, many companies or service providers with a specific market use this
method of marketing.
1.1 Where we use direct marketing
 For example, a company which sells a hair loss prevention product or life insurance policy would have to
find a radio station whose format appealed to older male listeners who might be experiencing this problem.
There would be no guarantee that this group would be listening to that particular station at the exact time
the company's ads were broadcast. Money spent on a radio spot (or television commercial or newspaper ad)
may or may not reach the type of consumer who would be interested in a hair restoring product.

This is where direct marketing becomes very appealing. Instead of investing in a scattershot means of
advertising, companies with a specific type of potential customer can send out literature directly to a list of
pre-screened individuals. Direct marketing firms      may also keep addresses of those who match a certain
age group or income level or special interest. Manufacturers of a new dog shampoo might benefit from
having the phone numbers and mailing addresses of pet store owners or dog show
participants. Direct marketing works best when the recipients accept the fact that their personal information
might be used for this purpose. Some customers prefer to receive targeted catalogues which offer more
variety than a general mailing.

2. DATA MINING
Data mining is the process of extracting hidden patterns from data. It is commonly used in a wide range of
profiling practices, such as marketing, surveillance, fraud detection and scientific discovery.

Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data
from different perspectives and summarizing it into useful information - information that can be used to
increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for
analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and
summarize the relationships identified. Technically, data mining is the process of finding correlations or
patterns among dozens of fields in large relational databases.
2.1. Data mining in direct marketing

                                                      1
Journal of Information Engineering and Applications                                              www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.6, 2011

As we already discussed, in Direct marketing, concentrates on a particular group of customers( not loyal
and beneficial).So, the data mining technique called the Supervised Classification is used to classify the
customers for marketing.
2.2 The Process
DMT will extract customer data, append it with extensive demographic, financial and lifestyle information,
then identify hidden, profitable market segments that are highly responsive to promotions.
2.3 Decision tree
A Decision tree is a popular classification technique that results in flowchart like tree structure where each
node denotes test on a attribute value and each branch represents an outcome of test. The leaves represent
classes. Using Training data Decision tree generate a tree that consists of nodes that are rules and each leaf
node represents a classification or decision. The data usually plays important role in determining the quality
of the decision tree. If there are number of classes, then there should be sufficient training data available
that belongs to each of the classes. Decision trees are predictive models, used to graphically organize
information about possible options, consequences and end value. They are used in computing for
calculating probabilities.
 Example-
                          CUSTOMER DATA




                                                    LOYAL
        UNLOYAL




        ACTION A                                ACTION B




Fig 1:A decicion tree based on customer’s loyalty

2.4 Building A Decision Tree In Direct Marketing
Decision-tree learning algorithms, such as ID3 or C4.5 are among the most powerful and popular predictive
methods for classification. So here in direct marketing we classify the customers on basis of their attributes
like sex, age, location, purchase history, feedback details etc.
2.5 Algorithm
C4.5 Builds decision trees from set of training data using the concept of Information entropy.
The training data is a set S = s1, s2... of already classified samples. Each sample si = x1, x2... is a vector
where x1, x2... represent attributes or features of the sample. The training data is augmented with a vector C
= c1, c2... where c1, c2... represent the class to which each sample belongs. At each node of the tree, C4.5
chooses one attribute of the data that most effectively splits its set of samples into subsets enriched in one
class or the other. Its criterion is the normalized information gain (difference in entropy) that results from
choosing an attribute for splitting the data. The attribute with the highest normalized information gain is
chosen to make the decision. The C4.5 algorithm then recurses on the smaller sublists. In general, steps in
C4.5 algorithm to build decision tree are:
1. Choose attribute for root node
2. Create branch for each value of that attribute
3. Split cases according to branches
4. Repeat process for each branch until all cases in the branch have the same class.



                                                       2
Journal of Information Engineering and Applications                                           www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.6, 2011

3. PROBLEMS IN CLASSIFICATION
According to Charles X.Ling and Chenghui Li,the classification of data base involves the following
situations:
In the first situation, some (say X%) of the customers in the database have already bought the product,
through previous mass marketing or passive promotion. X is usually rather small, typically around 1.Data
mining can be used to discover patterns of buyers, in order to single out likely buyers from the current non-
buyers,(100-X%)of all customers. More specifically, data mining for direct marketing in the first situation
can be discovered in:
1. Get the database of all customers, among which X% are buyers.
2. Data mining on the data set based on Geo-demographic information, transforming address and area
codes, deal with missing values, etc.
3. Applying algorithm to prepare objects, classes .
4. Evaluate the patterns formed by applying dmt on testing set.
5. Use the patterns found to predict likely buyers among the current non-buyers
6. Promote to the likely buyers(called rollout).
  In the second situation, a brand new product is to be promoted to the customers in the data base, so none
of them are buyers. In this case, pilot study is conducted, in which a small portion(say 5%) of the customers
is choosen randomly as the target of promotion. Again, X% of the customers in the pilot group may
respond to the promotion. Then data mining is performed in the pilot group to find the likely buyers in the
whole database.
Specific problems encountered while data mining on data sets for direct marketing are
1. Imbalance class distribution: Because only a small amount of buyers are likely means positive but most
of the algorithms can work on this type of sets. they assume that 100% are unlikely. Many data mining and
machine learning researchers have recognized and studied this problem in recent years(Farwett &
Provost,19s96;Kubat, Holte, & Matwin; Lewis & Catleltl; Pazzani, Merz, Murphy, Ali, Hume & Brunk).
2. Predictive accuracy cannot be used as a suitable evaluation criterion for the data mining process.
Classifying can be difficult. Means considering likely buyers as non-buyers and non-buyers as buyers
should be avoided.
4.SOLUTIONS
Ranking of non-buyers makes it possible to choose any number of likely buyers for the promotion.It also
provides a fine distinction among chosen customers to apply different means of promotion.
Lift analysis has been widely used in database marketing previously(Hughes,1996).A lift reflects the
redistribution of responders in the testing set after the testing examples are ranked.
5. CONCLUSION
Direct marketing is widely used in the fields of marketing like telemarketing,direct mail marketing,email
marketing etc.,data mining is applied on this marketing strategy to avoid human flaws in classifying the
customers based on their loyalty.We discussed the problems one faces in applying the datamining for direct
marketing and discussed their solutions.

6. ACKNOWLEDGEMENTS

This work was supported by Mrs. T Anuradha Assoc.professor and Mr. M Suman Assoc. Professor
,Department of Electronics and Computer Science Engineering, KLUniversity.

7. REFERENCES

[1] J.R. Quinlan, Morgan Kaufmann, C4.5 Programs for Machine Learning. 1993.


                                                      3
Journal of Information Engineering and Applications                                  www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.6, 2011

[2] A.Berson, K. Thearling, and S.J. Smith, Building Data Mining Applications for CRM. McGraw-Hill.
1999.
[3] G.K.Gupta, Introduction to data mining with case study ,Prentice Hall of India.2006.
[4] Mehmed Kantardzic, (2003), Data Mining: Concepts, Models,Methods, and Algorithms, John Wiley &
Sons.
[5] Farwett & Provost,19s96;Kubat, Holte, & Matwin;Lewis & Catleltl;Pazzani,Merz,Murphy,Ali, Hume &
Brunk.
[6]data-mine.com/white_papers/direct_marketing.
[7] The Application of Data Mining For Direct
Marketing Purushottam R Patil, Pravin Revankar, Prashant Joshi
Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09.




                                                4
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Contenu connexe

Tendances

Big Data
Big DataBig Data
Big Datasiware
 
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A Survey
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A SurveyIRJET- Customer Buying Prediction using Machine-Learning Techniques: A Survey
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A SurveyIRJET Journal
 
Marketing Analytics Meets Artificial Intelligence: Six Strategies for Success
Marketing Analytics Meets Artificial Intelligence: Six Strategies for SuccessMarketing Analytics Meets Artificial Intelligence: Six Strategies for Success
Marketing Analytics Meets Artificial Intelligence: Six Strategies for SuccessMiguel Mello
 
Cross Selling Through Database Marketing
Cross Selling Through Database MarketingCross Selling Through Database Marketing
Cross Selling Through Database MarketingAnkit Gupta
 
Optimization of digital marketing campaigns
Optimization of digital marketing campaignsOptimization of digital marketing campaigns
Optimization of digital marketing campaignsArmando Vieira
 
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...IJTET Journal
 
Customer Churn Prediction using Association Rule Mining
Customer Churn Prediction using Association Rule MiningCustomer Churn Prediction using Association Rule Mining
Customer Churn Prediction using Association Rule Miningijtsrd
 
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationIJERA Editor
 
Customer Segmentation Project
Customer Segmentation ProjectCustomer Segmentation Project
Customer Segmentation ProjectAditya Ekawade
 
DSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankDSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankEric Esajian
 
Equitec Case - Consumer Behavior
Equitec Case - Consumer BehaviorEquitec Case - Consumer Behavior
Equitec Case - Consumer Behaviorbdorne
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discoveryHoang Nguyen
 
Predicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using ClassificationPredicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using ClassificationVishva Abeyrathne
 
An impact of knowledge mining on satisfaction of consumers in super bazaars
An impact of knowledge mining on satisfaction of consumers in super bazaarsAn impact of knowledge mining on satisfaction of consumers in super bazaars
An impact of knowledge mining on satisfaction of consumers in super bazaarsIAEME Publication
 

Tendances (18)

Big Data
Big DataBig Data
Big Data
 
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A Survey
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A SurveyIRJET- Customer Buying Prediction using Machine-Learning Techniques: A Survey
IRJET- Customer Buying Prediction using Machine-Learning Techniques: A Survey
 
Marketing Analytics Meets Artificial Intelligence: Six Strategies for Success
Marketing Analytics Meets Artificial Intelligence: Six Strategies for SuccessMarketing Analytics Meets Artificial Intelligence: Six Strategies for Success
Marketing Analytics Meets Artificial Intelligence: Six Strategies for Success
 
Cross Selling Through Database Marketing
Cross Selling Through Database MarketingCross Selling Through Database Marketing
Cross Selling Through Database Marketing
 
Optimization of digital marketing campaigns
Optimization of digital marketing campaignsOptimization of digital marketing campaigns
Optimization of digital marketing campaigns
 
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...
 
Customer Churn Prediction using Association Rule Mining
Customer Churn Prediction using Association Rule MiningCustomer Churn Prediction using Association Rule Mining
Customer Churn Prediction using Association Rule Mining
 
Segmentation
SegmentationSegmentation
Segmentation
 
Customer 360 brochure
Customer 360  brochureCustomer 360  brochure
Customer 360 brochure
 
Using Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer SegmentationUsing Data Mining Techniques in Customer Segmentation
Using Data Mining Techniques in Customer Segmentation
 
Customer Segmentation Project
Customer Segmentation ProjectCustomer Segmentation Project
Customer Segmentation Project
 
DSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBankDSO528GroupProject-PortugueseBank
DSO528GroupProject-PortugueseBank
 
Equitec Case - Consumer Behavior
Equitec Case - Consumer BehaviorEquitec Case - Consumer Behavior
Equitec Case - Consumer Behavior
 
Data mining and knowledge discovery
Data mining and knowledge discoveryData mining and knowledge discovery
Data mining and knowledge discovery
 
20 ccp using logistic
20 ccp using logistic20 ccp using logistic
20 ccp using logistic
 
Predicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using ClassificationPredicting Bank Customer Churn Using Classification
Predicting Bank Customer Churn Using Classification
 
Cis 500 assignment 4
Cis 500 assignment 4Cis 500 assignment 4
Cis 500 assignment 4
 
An impact of knowledge mining on satisfaction of consumers in super bazaars
An impact of knowledge mining on satisfaction of consumers in super bazaarsAn impact of knowledge mining on satisfaction of consumers in super bazaars
An impact of knowledge mining on satisfaction of consumers in super bazaars
 

Similaire à Applying Data Mining for Direct Marketing

Bus169 Kotler Chapter 04
Bus169 Kotler Chapter 04Bus169 Kotler Chapter 04
Bus169 Kotler Chapter 04Alwyn Lau
 
Data Mining Concepts with Customer Relationship Management
Data Mining Concepts with Customer Relationship ManagementData Mining Concepts with Customer Relationship Management
Data Mining Concepts with Customer Relationship ManagementIJERA Editor
 
Data Science Use Cases in Retail & Healthcare Industries.pdf
Data Science Use Cases in Retail & Healthcare Industries.pdfData Science Use Cases in Retail & Healthcare Industries.pdf
Data Science Use Cases in Retail & Healthcare Industries.pdfKaty Slemon
 
Using Big Data & Analytics to Create Consumer Actionable Insights
Using Big Data & Analytics to Create Consumer Actionable InsightsUsing Big Data & Analytics to Create Consumer Actionable Insights
Using Big Data & Analytics to Create Consumer Actionable Insights莫利伟 Olivier Maugain
 
Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Seerat Malik
 
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime Value
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime ValueAHP Based Data Mining for Customer Segmentation Based on Customer Lifetime Value
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime ValueIIRindia
 
Managing marketing information to gain customer insights. Marketing
Managing marketing information to gain customer insights. MarketingManaging marketing information to gain customer insights. Marketing
Managing marketing information to gain customer insights. MarketingDearMudassir
 
Data mining techniques and dss
Data mining techniques and dssData mining techniques and dss
Data mining techniques and dssNiyitegekabilly
 
Basic components of MIS, its applications and outcomes
Basic components of MIS, its applications and outcomesBasic components of MIS, its applications and outcomes
Basic components of MIS, its applications and outcomesRolling Plans Pvt. Ltd.
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...ijdmtaiir
 
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold  Digging Beneath The Surface Of Data MiningAll That Glitters Is Not Gold  Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold Digging Beneath The Surface Of Data MiningJim Webb
 
Data strategy - The Business Game Changer
Data strategy - The Business Game ChangerData strategy - The Business Game Changer
Data strategy - The Business Game ChangerAmit Pishe
 
6 Key best practices to enhance Marketing with AI
6 Key best practices to enhance Marketing with AI6 Key best practices to enhance Marketing with AI
6 Key best practices to enhance Marketing with AISophie LEHMANN
 
MARKET RESEARCH WEEK 2.pptx
MARKET RESEARCH WEEK 2.pptxMARKET RESEARCH WEEK 2.pptx
MARKET RESEARCH WEEK 2.pptxPreciousChanaiwa
 

Similaire à Applying Data Mining for Direct Marketing (20)

Bus169 Kotler Chapter 04
Bus169 Kotler Chapter 04Bus169 Kotler Chapter 04
Bus169 Kotler Chapter 04
 
Data Mining Concepts with Customer Relationship Management
Data Mining Concepts with Customer Relationship ManagementData Mining Concepts with Customer Relationship Management
Data Mining Concepts with Customer Relationship Management
 
seminar
seminarseminar
seminar
 
Data Science Use Cases in Retail & Healthcare Industries.pdf
Data Science Use Cases in Retail & Healthcare Industries.pdfData Science Use Cases in Retail & Healthcare Industries.pdf
Data Science Use Cases in Retail & Healthcare Industries.pdf
 
Ques data mining
Ques data miningQues data mining
Ques data mining
 
Using Big Data & Analytics to Create Consumer Actionable Insights
Using Big Data & Analytics to Create Consumer Actionable InsightsUsing Big Data & Analytics to Create Consumer Actionable Insights
Using Big Data & Analytics to Create Consumer Actionable Insights
 
Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Data Mining: What is Data Mining?
Data Mining: What is Data Mining?
 
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime Value
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime ValueAHP Based Data Mining for Customer Segmentation Based on Customer Lifetime Value
AHP Based Data Mining for Customer Segmentation Based on Customer Lifetime Value
 
Data analytics
Data analyticsData analytics
Data analytics
 
Managing marketing information to gain customer insights. Marketing
Managing marketing information to gain customer insights. MarketingManaging marketing information to gain customer insights. Marketing
Managing marketing information to gain customer insights. Marketing
 
Data mining techniques and dss
Data mining techniques and dssData mining techniques and dss
Data mining techniques and dss
 
Datamining
DataminingDatamining
Datamining
 
Basic components of MIS, its applications and outcomes
Basic components of MIS, its applications and outcomesBasic components of MIS, its applications and outcomes
Basic components of MIS, its applications and outcomes
 
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
Analysis of Sales and Distribution of an IT Industry Using Data Mining Techni...
 
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold  Digging Beneath The Surface Of Data MiningAll That Glitters Is Not Gold  Digging Beneath The Surface Of Data Mining
All That Glitters Is Not Gold Digging Beneath The Surface Of Data Mining
 
Why one2one?
Why one2one?Why one2one?
Why one2one?
 
Data strategy - The Business Game Changer
Data strategy - The Business Game ChangerData strategy - The Business Game Changer
Data strategy - The Business Game Changer
 
6 Key best practices to enhance Marketing with AI
6 Key best practices to enhance Marketing with AI6 Key best practices to enhance Marketing with AI
6 Key best practices to enhance Marketing with AI
 
E marketing research
E marketing researchE marketing research
E marketing research
 
MARKET RESEARCH WEEK 2.pptx
MARKET RESEARCH WEEK 2.pptxMARKET RESEARCH WEEK 2.pptx
MARKET RESEARCH WEEK 2.pptx
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Dernier (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Applying Data Mining for Direct Marketing

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.6, 2011 Direct Marketing with the Application of Data Mining M Suman, T Anuradha, K Manasa Veena* KLUNIVERSITY,GreenFields,vijayawada,A.P *Email: manasaveena_555@yahoo.com Abstract For any business to be successful it must find a perfect way to approach its customers. Marketing plays a huge role in this. Mass marketing and direct marketing are the two types of it. Mass marketing targets everybody in the society and thus it has less impact on valued customers where direct marketing concentrates mainly on these valued and un loyal customers and promotes only to them which in turn makes profits. For this separation of customers based on their loyalty data mining algorithms and tools are used. In this paper we discussed the approach of implementation of data mining for direct marketing. We mainly concentrated and studied on why we apply data mining for direct marketing, how we apply and problems one faces while applying data mining concept for direct marketing and the solutions for them in direct marketing. Keywords: Direct marketing, Data mining,Decision tree. 1. INTRODUCTION In marketing a product ,there are several forms of sub disciplines, and one of them is direct marketing which involves messages sent directly to consumers usually through email, telemarketing and direct mail.As the traditional forms of advertising (radio, newspapers, television,etc.) may not be the best use of their promotional budgets, many companies or service providers with a specific market use this method of marketing. 1.1 Where we use direct marketing For example, a company which sells a hair loss prevention product or life insurance policy would have to find a radio station whose format appealed to older male listeners who might be experiencing this problem. There would be no guarantee that this group would be listening to that particular station at the exact time the company's ads were broadcast. Money spent on a radio spot (or television commercial or newspaper ad) may or may not reach the type of consumer who would be interested in a hair restoring product. This is where direct marketing becomes very appealing. Instead of investing in a scattershot means of advertising, companies with a specific type of potential customer can send out literature directly to a list of pre-screened individuals. Direct marketing firms may also keep addresses of those who match a certain age group or income level or special interest. Manufacturers of a new dog shampoo might benefit from having the phone numbers and mailing addresses of pet store owners or dog show participants. Direct marketing works best when the recipients accept the fact that their personal information might be used for this purpose. Some customers prefer to receive targeted catalogues which offer more variety than a general mailing. 2. DATA MINING Data mining is the process of extracting hidden patterns from data. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery. Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. 2.1. Data mining in direct marketing 1
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.6, 2011 As we already discussed, in Direct marketing, concentrates on a particular group of customers( not loyal and beneficial).So, the data mining technique called the Supervised Classification is used to classify the customers for marketing. 2.2 The Process DMT will extract customer data, append it with extensive demographic, financial and lifestyle information, then identify hidden, profitable market segments that are highly responsive to promotions. 2.3 Decision tree A Decision tree is a popular classification technique that results in flowchart like tree structure where each node denotes test on a attribute value and each branch represents an outcome of test. The leaves represent classes. Using Training data Decision tree generate a tree that consists of nodes that are rules and each leaf node represents a classification or decision. The data usually plays important role in determining the quality of the decision tree. If there are number of classes, then there should be sufficient training data available that belongs to each of the classes. Decision trees are predictive models, used to graphically organize information about possible options, consequences and end value. They are used in computing for calculating probabilities. Example- CUSTOMER DATA LOYAL UNLOYAL ACTION A ACTION B Fig 1:A decicion tree based on customer’s loyalty 2.4 Building A Decision Tree In Direct Marketing Decision-tree learning algorithms, such as ID3 or C4.5 are among the most powerful and popular predictive methods for classification. So here in direct marketing we classify the customers on basis of their attributes like sex, age, location, purchase history, feedback details etc. 2.5 Algorithm C4.5 Builds decision trees from set of training data using the concept of Information entropy. The training data is a set S = s1, s2... of already classified samples. Each sample si = x1, x2... is a vector where x1, x2... represent attributes or features of the sample. The training data is augmented with a vector C = c1, c2... where c1, c2... represent the class to which each sample belongs. At each node of the tree, C4.5 chooses one attribute of the data that most effectively splits its set of samples into subsets enriched in one class or the other. Its criterion is the normalized information gain (difference in entropy) that results from choosing an attribute for splitting the data. The attribute with the highest normalized information gain is chosen to make the decision. The C4.5 algorithm then recurses on the smaller sublists. In general, steps in C4.5 algorithm to build decision tree are: 1. Choose attribute for root node 2. Create branch for each value of that attribute 3. Split cases according to branches 4. Repeat process for each branch until all cases in the branch have the same class. 2
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.6, 2011 3. PROBLEMS IN CLASSIFICATION According to Charles X.Ling and Chenghui Li,the classification of data base involves the following situations: In the first situation, some (say X%) of the customers in the database have already bought the product, through previous mass marketing or passive promotion. X is usually rather small, typically around 1.Data mining can be used to discover patterns of buyers, in order to single out likely buyers from the current non- buyers,(100-X%)of all customers. More specifically, data mining for direct marketing in the first situation can be discovered in: 1. Get the database of all customers, among which X% are buyers. 2. Data mining on the data set based on Geo-demographic information, transforming address and area codes, deal with missing values, etc. 3. Applying algorithm to prepare objects, classes . 4. Evaluate the patterns formed by applying dmt on testing set. 5. Use the patterns found to predict likely buyers among the current non-buyers 6. Promote to the likely buyers(called rollout). In the second situation, a brand new product is to be promoted to the customers in the data base, so none of them are buyers. In this case, pilot study is conducted, in which a small portion(say 5%) of the customers is choosen randomly as the target of promotion. Again, X% of the customers in the pilot group may respond to the promotion. Then data mining is performed in the pilot group to find the likely buyers in the whole database. Specific problems encountered while data mining on data sets for direct marketing are 1. Imbalance class distribution: Because only a small amount of buyers are likely means positive but most of the algorithms can work on this type of sets. they assume that 100% are unlikely. Many data mining and machine learning researchers have recognized and studied this problem in recent years(Farwett & Provost,19s96;Kubat, Holte, & Matwin; Lewis & Catleltl; Pazzani, Merz, Murphy, Ali, Hume & Brunk). 2. Predictive accuracy cannot be used as a suitable evaluation criterion for the data mining process. Classifying can be difficult. Means considering likely buyers as non-buyers and non-buyers as buyers should be avoided. 4.SOLUTIONS Ranking of non-buyers makes it possible to choose any number of likely buyers for the promotion.It also provides a fine distinction among chosen customers to apply different means of promotion. Lift analysis has been widely used in database marketing previously(Hughes,1996).A lift reflects the redistribution of responders in the testing set after the testing examples are ranked. 5. CONCLUSION Direct marketing is widely used in the fields of marketing like telemarketing,direct mail marketing,email marketing etc.,data mining is applied on this marketing strategy to avoid human flaws in classifying the customers based on their loyalty.We discussed the problems one faces in applying the datamining for direct marketing and discussed their solutions. 6. ACKNOWLEDGEMENTS This work was supported by Mrs. T Anuradha Assoc.professor and Mr. M Suman Assoc. Professor ,Department of Electronics and Computer Science Engineering, KLUniversity. 7. REFERENCES [1] J.R. Quinlan, Morgan Kaufmann, C4.5 Programs for Machine Learning. 1993. 3
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.6, 2011 [2] A.Berson, K. Thearling, and S.J. Smith, Building Data Mining Applications for CRM. McGraw-Hill. 1999. [3] G.K.Gupta, Introduction to data mining with case study ,Prentice Hall of India.2006. [4] Mehmed Kantardzic, (2003), Data Mining: Concepts, Models,Methods, and Algorithms, John Wiley & Sons. [5] Farwett & Provost,19s96;Kubat, Holte, & Matwin;Lewis & Catleltl;Pazzani,Merz,Murphy,Ali, Hume & Brunk. [6]data-mine.com/white_papers/direct_marketing. [7] The Application of Data Mining For Direct Marketing Purushottam R Patil, Pravin Revankar, Prashant Joshi Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09. 4
  • 5. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).