{"title":"Analysis of Demography, Psychograph and Behavioral Aspects of Telecom Customers Using Predictive Analytics to Increase Voice Package Sales","authors":"Billy Goenandar, Maya Ariyanti","doi":"10.29244/JCS.6.1.1-19","DOIUrl":null,"url":null,"abstract":"In 2018, Telkomsel's core business shifted its main services from Telephone and SMS services to Data and Digital services, since a declining trend of revenue starting 2014. However, telephone service still contributed 28.4% to the revenue and was the second largest, while SMS gave 4.1%. This research predicts voice package buyers using predictive analytics to identify customer profiles and significant variables to form appropriate target customer segmentation. Logistic regression was used to predict customers who would buy voice packages using 15 input variables. Next, analytics was done by dividing the data into 70% training data sets and 30% testing data obtained from customer voice package user data. The model accuracy gained 97.2%, and the top seven significant variables were formed. Then five clusters of customer segmentation were formed based on top significant variables using the K-Means clustering technique. Based on the results of the prediction model and clustering, behavioral targeting was conducted to provide targeted gimmick products based on five segmentations formed, and then it was divided into two main target customers by considering the similarity of behaviors based on revenue voice, minutes of voice usage, voice transactions, day of voice usage and data payload, thus it was more targeted.","PeriodicalId":46074,"journal":{"name":"Journal of Computer Security","volume":null,"pages":null},"PeriodicalIF":0.9000,"publicationDate":"2021-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29244/JCS.6.1.1-19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In 2018, Telkomsel's core business shifted its main services from Telephone and SMS services to Data and Digital services, since a declining trend of revenue starting 2014. However, telephone service still contributed 28.4% to the revenue and was the second largest, while SMS gave 4.1%. This research predicts voice package buyers using predictive analytics to identify customer profiles and significant variables to form appropriate target customer segmentation. Logistic regression was used to predict customers who would buy voice packages using 15 input variables. Next, analytics was done by dividing the data into 70% training data sets and 30% testing data obtained from customer voice package user data. The model accuracy gained 97.2%, and the top seven significant variables were formed. Then five clusters of customer segmentation were formed based on top significant variables using the K-Means clustering technique. Based on the results of the prediction model and clustering, behavioral targeting was conducted to provide targeted gimmick products based on five segmentations formed, and then it was divided into two main target customers by considering the similarity of behaviors based on revenue voice, minutes of voice usage, voice transactions, day of voice usage and data payload, thus it was more targeted.
期刊介绍:
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems and networks. It will also provide a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. The Journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications.