scispace - formally typeset
Proceedings ArticleDOI

Big data provenance and analytics in telecom contact centers

TLDR
This research paper identifies and list the key factors affecting the operational performance of a telecom contact center and the potential role of big data analytics and provenance in overcoming the performance bottlenecks and indicates that, despite of many challenges, the use of opportunities of Big Data analytics in telecom domain is unprecedented.
Abstract
Cloud computing and big data are the two important technology innovations which have the potential to restructure the value chain of telecom service providers. Apart from total cost saving, there are many operational and business objectives while adopting cloud computing technology into the telecom domain. Telecom service providers typically have terabytes of operational data available. When effectively analyzed, this information can help them to maintain consistent and appropriate service delivery across the seasonal peaks and valleys. Big data analytics offer telecom operators a real opportunity to gain a broad image of their day to day operations, customers, and more over organizations and innovative efforts to be taken. In this research paper we identify and list the key factors affecting the operational performance of a telecom contact center and the potential role of big data analytics and provenance in overcoming the performance bottlenecks. We present a case study evaluating how telecom companies can employ big data analytics in inbound and outbound contact centers for enhancement of operational performance. Results indicate that, despite of many challenges including lack of well-defined big data processing strategies, potential security threats and the need for workforce re-skilling, the use of opportunities of Big Data analytics in telecom domain is unprecedented.

read more

Citations
More filters
Journal ArticleDOI

A survey on data provenance in IoT

TL;DR: A number of design requirements of data provenance in IoT are proposed by analyzing the features of IoT data and applications and employing the requirements to discuss their pros and cons.
Journal ArticleDOI

Amalgamation of Customer Relationship Management and Data Analytics in Different Business Sectors—A Systematic Literature Review

TL;DR: The purpose of the research was to show the impact of IT-based techniques in the business world by surveyed 138 papers published between 1996 and 2021 in the area of analytical CRM.
Journal ArticleDOI

A Machine Learning Model for Personalized Tariff Plan based on Customer’s Behavior in the Telecom Industry

TL;DR: In this paper , a model was built after investigating various types of classification-based machine learning techniques including the traditional ones like decision tree, k-nearest neighbor, logistic regression, and artificial neural networks along with some ensemble techniques such as random forest, adaboost, gradient boosting machine, extreme gradient boosting, bagging, and stacking.
Proceedings ArticleDOI

Mathematical Formulation and Implementation of Query Inversion Techniques in RDBMS for Tracking Data Provenance

TL;DR: This paper proposes mathematical formulation and implementation of query inversion techniques to trace the provenance of data in a relational database management system (RDBMS) and builds mathematical formulations of inverse queries for most of the relational algebra operations and shows the formula for join operations.
Book ChapterDOI

Indian Telecom Industry: Challenges and Use of Analytics to Manage Customer Churn

TL;DR: The possibilities of harnessing the power of big data analytics, new techniques, and technologies that drive innovation in telecom are presented to help service providers make better decisions and react quickly to threats on the competitive horizon.
References
More filters
Journal ArticleDOI

Data mining with big data

TL;DR: A HACE theorem is presented that characterizes the features of the Big Data revolution, and a Big Data processing model is proposed, from the data mining perspective, which involves demand-driven aggregation of information sources, mining and analysis, user interest modeling, and security and privacy considerations.
Journal ArticleDOI

Determining the Number of Factors to Retain in EFA: An easy-to-use computer program for carrying out Parallel Analysis

TL;DR: This paper describes and illustrates how to apply Parallel Analysis with an easy-to-use computer program called ViSta-PARAN, a user-friendly application that can compute and interpret Parallel Analysis.
Journal ArticleDOI

Cloud computing security issues and challenges

TL;DR: Security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering are discussed and recommended security standards and management models to address these are suggested for technical and business community.

Cloud Computing Security Issues and Challenges

TL;DR: A detailed analysis of the cloud computing security issues and challenges focusing on the cloud Computing types and the service delivery types is introduced.
Related Papers (5)