[1] | M. Castells, La sociedad red: unavisión global. Alianza Editorial, 2006. |
[2] | O. Miralbell, “Portales de destinosturísticosen Internet: unareflexiónestratégica,” Métodos Inf., vol. 8, no. 42, pp. 74–81, 2010. |
[3] | S. Park, D. Wang, and D. Fesenmaier, “Assessing structure in American online purchase of travel products,” Anatolia, vol. 22, no. 3, pp. 401–417, 2011. |
[4] | L. Li and D. Buhalis, “E-Commerce in China: The case of travel,” Int. J. Inf. Manage., vol. 26, no. 2, pp. 153–166, 2006. |
[5] | Stadista, “E-commerce and mail-order trade: statistics and market data,” 2014. [Online]. Available:http://www.statista.com/markets/10/e-commerce-mail-order-trade/. |
[6] | Dirección de Estudios, Estadísticas Documentales, “Informesobre el comercioelectrónicoen España a través de entidades de medios de pago”, 2013. [Online]. Available: http://www.cmt.es/c/document_library/get_file?uuid=e995b42a-bd79-4dc2-a7ea-b0e068033da9&groupId=10138 |
[7] | R.-C. Chen, T.-S. Chen, and C.-C. Lin, “A new binary support vector system for increasing detection rate of credit card fraud,” Int. J. Pattern Recognit. Artif.Intell., vol. 20, no. 02, pp. 227–239, 2006. |
[8] | B. Walder, “Sources and determinants of innovations-the role of market forces,” B. Walder, K. Weiermaier, A. Sancho Innov. Prod. Dev. Tour. Berlin, Erich Schmidt Verlag, vol. 164, 2006. |
[9] | A.-M. Hjalager, “Repairing innovation defectiveness in tourism,” Tour. Manag., vol. 23, no. 5, pp. 465–474, 2002. |
[10] | S. Chaudhuri, U. Dayal, and V. Narasayya, “An overview of business intelligence technology,” Commun.ACM, vol. 54, no. 8, pp. 88–98, 2011. |
[11] | A. Alzua-Sorzabal, J. K. Gerrikagoitia, and E. Torres-Manzanera, “Opening and closing Internet booking channel for hotels: A first approximation,” Tour. Manag. Perspect., vol. 5, no. 0, pp. 5–9, 2013. |
[12] | U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, “From data mining to knowledge discovery in databases,” AI Mag., vol. 17, no. 3, p. 37, 1996. |
[13] | N. Laleh and M. A. Azgomi, “A taxonomy of frauds and fraud detection techniques,” in Information Systems, Technology and Management, Springer, 2009, pp. 256–267. |
[14] | S. Jha, M. Guillen, and J. Christopher Westland, “Employing transaction aggregation strategy to detect credit card fraud,” Expert Syst. Appl., vol. 39, no. 16, pp. 12650–12657, 2012. |
[15] | S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, “Data mining for credit card fraud: A comparative study,” Decis. Support Syst., vol. 50, no. 3, pp. 602–613, 2011. |
[16] | R. A. Fisher, “The use of multiple measurements in taxonomic problems,” Ann. Eugen., vol. 7, no. 2, pp. 179–188, 1936. |
[17] | J.-C. Kim, D.-H. Kim, J.-J. Kim, J.-S. Ye, and H.-S. Lee, “Segmenting the Korean housing market using multiple discriminant analysis,” Constr. Manag. Econ., vol. 18, no. 1, pp. 45–54, 2000. |
[18] | E. K. Laitinen, “Predicting a corporate credit analyst’s risk estimate by logistic and linear models,” Int. Rev. Financ. Anal., vol. 8, no. 2, pp. 97–121, 1999. |
[19] | L. J. Trevino and J. D. Daniels, “FDI theory and foreign direct investment in the United States: a comparison of investors and non-investors,” Int. Bus. Rev., vol. 4, no. 2, pp. 177–194, 1995. |
[20] | E. Duman and M. H. Ozcelik, “Detecting credit card fraud by genetic algorithm and scatter search,” Expert Syst. Appl., vol. 38, no. 10, pp. 13057–13063, 2011. |
[21] | V. S. Desai, J. N. Crook, and G. A. Overstreet Jr, “A comparison of neural networks and linear scoring models in the credit union environment,” Eur. J. Oper.Res., vol. 95, no. 1, pp. 24–37, 1996. |
[22] | C. Chuang and R. Lin, “Constructing a reassigning credit scoring model,” Expert Syst. Appl., vol. 36, no. 2, pp. 1685–1694, 2009. |
[23] | W. Kay Olsen, A. Warde, and L. Martens, “Social differentiation and the market for eating out in the UK,” Int. J. Hosp. Manag., vol. 19, no. 2, pp. 173–190, 2000. |
[24] | E. K. Laitinen and T. Laitinen, “Bankruptcy prediction: application of the Taylor’s expansion in logistic regression,” Int. Rev. Financ. Anal., vol. 9, no. 4, pp. 327–349, 2001. |
[25] | E. H. Suh, K. C. Noh, and C. K. Suh, “Customer list segmentation using the combined response model,” Expert Syst. Appl., vol. 17, no. 2, pp. 89–97, 1999. |
[26] | F. E. Harrell and K. L. Lee, “A comparison of the discrimination of discriminant analysis and logistic regression under multivariate normality,” Biostat. Stat. Biomed. Public Heal. Environ. Sci. North-Holland, New York, United States, pp. 333–343, 1985. |
[27] | R. Wehrens and L. M. C. Buydens, “Self-and super-organizing maps in R: the Kohonen package,” J. Stat. Softw., vol. 21, no. 5, pp. 1–19, 2007. |
[28] | L. Breiman, “Random forests,” Mach. Learn., vol. 45, no. 1, pp. 5–32, 2001. |
[29] | I. Kurt, M. Ture, and A. T. Kurum, “Comparing performances of logistic regression, classification and regression tree, and neural networks for predicting coronary artery disease,” Expert Syst. Appl., vol. 34, no. 1, pp. 366–374, 2008. |
[30] | S. Zhang, C. Tjortjis, X. Zeng, H. Qiao, I. Buchan, and J. Keane, “Comparing data mining methods with logistic regression in childhood obesity prediction,” Inf. Syst. Front., vol. 11, no. 4, pp. 449–460, 2009. |
[31] | R. E. Davis, K. Elder, D. Howlett, and E. Bouzaglou, “Relating storm and weather factors to dry slab avalanche activity at Alta, Utah, and Mammoth Mountain, California, using classification and regression trees,” Cold Reg. Sci. Technol., vol. 30, no. 1, pp. 79–89, 1999. |
[32] | T.-S. Lee, C.-C. Chiu, Y.-C. Chou, and C.-J. Lu, “Mining the customer credit using classification and regression tree and multivariate adaptive regression splines,” Comput. Stat. Data Anal., vol. 50, no. 4, pp. 1113–1130, 2006. |
[33] | D. Sánchez, M. A. Vila, L. Cerda, and J.-M. Serrano, “Association rules applied to credit card fraud detection,” Expert Syst. Appl., vol. 36, no. 2, pp. 3630–3640, 2009. |
[34] | T. Bellotti and J. Crook, “Support vector machines for credit scoring and discovery of significant features,” Expert Syst. Appl., vol. 36, no. 2, pp. 3302–3308, 2009. |
[35] | V. Vapnik, “Statistical learning theory. 1998.” Wiley, New York, 1998. |
[36] | R.-C. Chen, M.-L. Chiu, Y.-L. Huang, and L.-T. Chen, “Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines,” in Intelligent Data Engineering and Automated Learning--IDEAL 2004, Springer, 2004, pp. 800–806. |
[37] | I. Bose and R. K. Mahapatra, “Business data mining - a machine learning perspective,” Inf. Manag., vol. 39, no. 3, pp. 211–225, 2001. |
[38] | D. Vidaurre, C. Bielza, and P. Larrañaga, “Classification of neural signals from sparse autoregressive features,” Neurocomputing, 2013. |