Chan, P., Fan, W., Prodromidis, A., and Stolfo, S., 1999, “Distributed data mining in credit card fraud detection”, IEEE Intelligent Systems, 67-74.
Chauchat, J.-H., Rakotomalala, R., Carloz, M., and Pelletier, C., 2001, “Targeting Customer Groups using Gain and Cost Matrix: a Marketing Application”, ECML/PKDD-01 Workshop on Data Mining for Marketing Applications, 12th European Conference on Machine Learning (ECML’01) and 5th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’01), September, 2001, Freiburg, Germany.
Chiang, W. K., Chhajed, D., and Hess, J. D., 2003, “Direct Marketing, Indirect Profits: A Strategic Analysis of Dual-Channel Supply-Chain Design”, Management Science, 49(1):1-20.
Cooke, A. D. J., Sujan, H., Sujan, M., and Weitz, B. A., 2002, “Marketing the Unfamiliar: The Role of Context and Item-Specific Information in Electronic Agent Recommendations.” Journal of Marketing Research, 39(4):488-497.
Cortes, C., Fisher, K., Pregibon, D., and Rogers, A., 2000, “HANCOCK: A Language for Extracting Signatures from Data Streams”, In Proceedings of the Sixth ACM International Conference on Knowledge Discovery and Data Mining, 9-17, 2000.
Cox, B., 2002, “Adventures in the Shipping Wars”, Jupitermedia.
Danaher, P. J., Wilson, I. W., and Davis, R. A., 2003, “A Comparison of Online and Offline Consumer Brand Loyalty.” Marketing Science, 22(4):461-476.
Delhagen, K., 2003, “Succeeding With Your 2002 To 2003 Transition,” Forrester Research, FirstLook Archive.
DeSarbo, W. S. and Cron W. L., 1988, “A Maximum Likelihood Methodology for Clusterwise Linear Regression,” Journal of Classification, 5:249-282.
Dillon, W. R., Kumar A., and Borrero, M. S., 1993, “Capturing Individual Differences in Paired Comparisons: An Extended BTL Model Incorporating Descriptor Variables,” Journal of Marketing Research, 30:42-51.
DMA, 2004, “Survey Studies Why Consumers Abandon Online Shopping Carts; Shipping and Handling Costs Trigger 52% of Abandonment’’, The Direct Marketing Association Newsstand, January 14, 2004.
Ericsson, R., 2003, “Delve Into Data With Business Intelligence,” Windows Server System Magazine, March 2003 Issue.
Fawcett, T. and Provost, F., 1997, “Adaptive Fraud Detection”, Data Mining and Knowledge Discovery, 1-28, 1997, Kluwer Academic Publishers.
Fraley, C. and Raftery, A. E., 1998, “How many clusters? Which clustering method? Answers via Model-Based Cluster Analysis”, Computer Journal, 41:578-588.