skip to main content
10.1145/1353343.1353424acmotherconferencesArticle/Chapter ViewAbstractPublication PagesedbtConference Proceedingsconference-collections
research-article
Free Access

Social ties and their relevance to churn in mobile telecom networks

Published:25 March 2008Publication History

ABSTRACT

Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individual in a network are less important than their ties (relationships) with other individuals in the network. Exploring the nature and strength of these ties can help understand the structure and dynamics of social networks and explain real-world phenomena, ranging from organizational efficiency to the spread of information and disease.

In this paper, we examine the communication patterns of millions of mobile phone users, allowing us to study the underlying social network in a large-scale communication network. Our primary goal is to address the role of social ties in the formation and growth of groups, or communities, in a mobile network. In particular, we study the 'evolution of churners in an operator's network spanning over a period of four months. Our analysis explores the propensity of a subscriber to churn out of a service provider's network depending on the number of ties (friends) that have already churned. Based on our findings, we propose a spreading activation-based technique that predicts potential churners by examining the current set of churners and their underlying social network. The efficiency of the prediction is expressed as a lift curve, which indicates the fraction of all churners that can be caught when a certain fraction of subscribers were contacted.

References

  1. W. H. Au, K. C. Chan, X. Yao. A novel evolutionary data mining algorithm with application to churn prediction. IEEE Transaction on Evolutionary Computation, 7, 6 (2003), pp. 532--545. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Backstrom, D. Huttenlocher, J. Kleinberg, X. Lan. Group Formation in Large Social Networks: Membership, Growth and Evolution. In Proceedings of ACM SIGKDD (Philadelphia, PA, USA, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A.-L. Barabasi, R. Albert. Emergence of scaling in random networks. Science, 286 (1999), pp. 509--512.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Brin, L. Page. The anatomy of a large-scale hypertextual Web search engine. In Proceedings of Seventh International WWW Conference (Brisbane, Australia, 1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Burt. Structural Holes: The Social Structure of Competition. Harvard, 1992.Google ScholarGoogle Scholar
  6. A. Clauset, M. E. J. Newman, C. Moore. Finding community structure in very large networks. Physical Review E, 70, 066111 (2004).Google ScholarGoogle ScholarCross RefCross Ref
  7. P. Domingos, M. Richardson. Mining the Network Value of Customers. In Proceedings of ACM CIKM (San Francisco, CA, USA, 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Euler, T. Churn prediction in telecommunications using Miningmart. In Proceedings of the Workshop on Data Mining and Business (DMBiz, 2005).Google ScholarGoogle Scholar
  9. M. Girvan, M. E. J. Newman. Community structure in social and biological networks. In Proceedings of Natl. Acad. Sci. 99 (2002), pp. 7821--7826.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Goldenberg, B. Libai, E. Muller. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth. Marketing Letters, 12:3 (2001), pp.211--223.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Granovetter. The Strength of Weak Ties. American Journal of Sociology, 78(6), 1973, pp. 1360--1380.Google ScholarGoogle ScholarCross RefCross Ref
  12. R. Guha, R. Kumar, P. Raghavan, A. Tomkins. Propagation of Trust and Distrust. In Proc. of WWW Conference (New York, NY, USA, 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Hoff, A. Raftery, M. Handcock. Latent space Approaches to social network analysis. Journal of the American Statistical Association, 97 (2002).Google ScholarGoogle Scholar
  14. S. Kamvar, M. Schlosser, H. Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of WWW Conference (Budapest, Hungary, 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H. Kautz, B. Selman, M. Shah. ReferralWeb: Combining social networks and collaborative filtering. Communications of the ACM, 40:3 (1997), pp. 63--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Kempe, J. Kleinberg, E. Tardos. Maximizing the Spread of Influence through a Social Network. In Proceedings of ACM CIKM (Washington, DC, USA, 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. In Proceedings of ACM SODA (Baltimore, MD, US, 1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Kumar, J. Novak, A. Tomkins. Structure and Evolution of Online Social Networks. In Proceedings of ACM SIGKDD (Philadelphia, PA, USA, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Levien, A. Aiken. Attack-resistant trust metrics for public key certification. In Proceedings of USENIX Security Symposium (San Antonio, Texas, USA, 1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Q. Lu, L. Getoor. Link-based Classification. In Proceedings of 20th International Conference on Machine Learning (pp. 496--503, 2003).Google ScholarGoogle Scholar
  21. S. Macskassy and F. Provost. Classification in Networked Data: A toolkit and a univariate case study. Journal of Machine Learning Research. 8(May):935--983, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. V. Mahajan, E. Muller, F. Bass. New Product Diffusio0 Models in Marketing: A Review and Directions for Research. Journal of Marketing, 54:1 (1990) PP. 1--26.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. Milgram. The small world problem. Psychology Today, Vol. 2 (1967), pp. 60--67.Google ScholarGoogle Scholar
  24. M. Mozer, R. Wolniewicz, D. B. Grimes, E. Johnson, H. Kaushanky. Predicting Subscriber Dissatisfaction and Improving Retention in Wireless Telecommunications Industry. IEEE Transactions on Neural Networks, 11 (2000), pp. 690--696. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A.Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, A. Joshi. On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications. In Proceedings of ACM CIKM, (Arlington, VA, USA, 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M.Newman. The structure and function of complex networks. SIAM Review, 45 (2003), pp.167--256.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. Peyton Young. The Diffusion of Innovations in Social Networks. Santa Fe Institute Working Paper.02-04-018 (2002).Google ScholarGoogle Scholar
  28. M. Richardson, R. Agrawal, P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference (Sanibel Island, FL, USA, 2003).Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Richardson, P. Domingos. Mining Knowledge-Sharing Sites for Viral Marketing. In Proceedings of ACM CIKM (Edmonton, Alberta, Canada, 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Sarkar, A. Moore. Dynamic social network analysis using latent space models. ACM SIGKDD Explorations Newsletter Volume 7, Issue 2 (2005) pp: 31--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Wasserman, Stanley and Katherine Faust. 1997. Social Network Analysis: Methods and Applications: Cambridge University Press.Google ScholarGoogle Scholar
  32. C. Ziegler, G. Lausen. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (Taipei, Taiwan, 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Social ties and their relevance to churn in mobile telecom networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EDBT '08: Proceedings of the 11th international conference on Extending database technology: Advances in database technology
        March 2008
        762 pages
        ISBN:9781595939265
        DOI:10.1145/1353343

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 March 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate7of10submissions,70%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader