Results for ' data mining'

963 found
Order:
  1. (1 other version)Data mining: Proprietary rights, people and proposals.Dinah Payne & Cherie Courseault Trumbach - 2009 - Business Ethics, the Environment and Responsibility 18 (3):241-252.
    This article focuses on the issue of data mining as it relates to the consumer and to the issue of whether the consumer's private information has any proprietary status. A brief review of data mining is provided as a background for a better understanding of the purposes and uses of data mining. Also examined are several issues of the ethics of data mining, including a review of stakeholders, who they are and which (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  2. KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  3.  29
    Phenomenal Data Mining: From Observations to Phenomena.John McCarthy - unknown
    • Conventional data mining infers relations among e.g. the fraction of supermarket baskets with diapers also contain beer. • Phenomenal data mining concerns relations between data and the phenomena underlying the data, e.g. y married couples keeping old friends buy diapers and • Example: The sales receipts of a supermarket usually not identify the customers. Grouping baskets by customer is possible and useful but requires new techniques.
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  5. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  16
    Data Mining Approach Improving Decision-Making Competency along the Business Digital Transformation Journey: A Case Study – Home Appliances after Sales Service.Hyrmet Mydyti - 2021 - Seeu Review 16 (1):45-65.
    Data mining, as an essential part of artificial intelligence, is a powerful digital technology, which makes businesses predict future trends and alleviate the process of decision-making and enhancing customer experience along their digital transformation journey. This research provides a practical implication – a case study - to provide guidance on analyzing information and predicting repairs in home appliances after sales services business. The main benefit of this practical comparative study of various classification algorithms, by using the Weka tool, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  9. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  9
    Using Data Mining Approach for Student Satisfaction With Teaching Quality in High Vocation Education.Bailin Chen, Yi Liu & Jinqiu Zheng - 2022 - Frontiers in Psychology 12.
    High vocation education is an important foundation for China to cultivate high teaching quality and technical and skilled talents. In the new era, the acceleration of the development of modern vocational education is put in a more prominent position. It is proposed that we should adhere to moral education, closely combine this with the needs of technological change and industrial upgrading, constantly improve the quality of high vocational education teaching, and cultivate more technical and skilled talents with both political integrity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from (...) warehouses? It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that go beyond concerns introduced in traditional information-retrieval techniques in computer databases and are not covered by present data-protection guidelines and privacy laws. (shrink)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  12.  9
    Intelligent Data Mining of Computer-Aided Extension Residential Building Design Based on Algorithm Library.Gao Zhihui & Zou Guangtian - 2021 - Complexity 2021:1-9.
    In recent years, with the development of construction industry, more scientific, systematic, fast, and intelligent calculation methods are needed to coordinate urban development and fierce market competition, and mathematical algorithm library plays an important role in artificial intelligence. Therefore, the author uses computer mathematical algorithm and extension theory to study and analyze the residential building design and intelligent data mining. It is found that the research of the computer-aided expression method of extension building planning is mainly the expression (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  42
    Using data-mining to identify and study patterns in lexical innovation on the web.Daphné Kerremans, Jelena Prokić, Quirin Würschinger & Hans-Jörg Schmid - 2018 - Pragmatics and Cognition 25 (1):174-200.
    This paper presents the NeoCrawler – a tailor-made webcrawler, which identifies and retrieves neologisms from the Internet and systematically monitors the use of detected neologisms on the web by means of weekly searches. It enables researchers to use the web as a corpus in order to investigate the dynamics of lexical innovation on a large-scale and systematic basis. The NeoCrawler represents an innovative web-mining tool which opens up new opportunities for linguists to tackle a number of unresolved and under-researched (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Data-mining probabilists or experimental determinists.Thomas Richardson, Laura Schulz & Alison Gopnik - 2007 - In Alison Gopnik & Laura Schulz (eds.), Causal learning: psychology, philosophy, and computation. New York: Oxford University Press. pp. 208--230.
  15.  35
    Prescription Data Mining and the Protection of Patients' Interests.David Orentlicher - 2010 - Journal of Law, Medicine and Ethics 38 (1):74-84.
    Pharmaceutical companies have long relied on direct marketing of their drugs to physicians through one-on-one meetings with sales representatives. This practice of “detailing” is substantial in its costs and its number of participants. Every year, pharmaceutical companies spend billions of dollars on millions of visits to physicians by tens of thousands of sales representatives.Critics have argued that drug detailing results in sub-optimal prescribing decisions by physicians, compromising patient health and driving up spending on medical care. In this view, physicians often (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  33
    From radioactivity to data mining: Günther Anders in the Anthropocene.Christopher John Müller - 2019 - Thesis Eleven 153 (1):9-23.
    This essay traces the complex constellation of ideas that informs Anders's turn to the generalizing expression ‘the human’ in his postwar work. It mobilizes the properties of radioactive material and digital data, which are both curiously imperceptible to our senses, to discuss Anders’s insistence on the universalizing pronoun `we' and assess its significance in the contemporary world. To do so, it aligns Anders's work with current debates about the Anthropocene and critiques of the use of the term ‘the human’ (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  17
    Data Mining for Evolving Fuzzy Association Rules for Predicting Monsoon Rainfall of India.C. T. Dhanya & D. Nagesh Kumar - 2009 - Journal of Intelligent Systems 18 (3):193-210.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  15
    Data mining applications in university information management system development.Ashima Kukkar, Amit Sharma, Juntao Fan & Minshun Zhang - 2022 - Journal of Intelligent Systems 31 (1):207-220.
    Nowadays, the modern management is promoted to resolve the issue of unreliable information transmission and to provide work efficiency. The basic aim of the modern management is to be more effective in the role of the school to train talents and serve the society. This article focuses on the application of data mining (DM) in the development of information management system (IMS) in universities and colleges. DM provides powerful approaches for a variety of educational areas. Due to the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19.  17
    Multi-Data Mining for Understanding Leadership Behavior.Naohiro Matsumura & Yoshihiro Sasaki - 2008 - In S. Iwata, Y. Oshawa, S. Tsumoto, N. Zhong, Y. Shi & L. Magnani (eds.), Communications and Discoveries From Multidisciplinary Data. Springer. pp. 81--94.
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  26
    Data Mining Techniques in Analyzing Process Data: A Didactic.Xin Qiao & Hong Jiao - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  20
    Data Mining and Hypothesis Refinement using a Multi-Tiered Genetic Algorithm.C. M. Taylor & A. Agah - 2010 - Journal of Intelligent Systems 19 (3):191-226.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  13
    Análisis mediante Data Mining de comentarios paulinos de Tomás de Aquino.Enrique Alarcón Moreno - 2021 - Studium Filosofía y Teología 24 (48):27-38.
    Data Mining es una tecnología de estadística computarizada para la extracción de pautas reiteradas y significativas a partir de datos cuantiosos. En este artículo se exponen primero los fundamentos para su aplicación al análisis de los textos. Después, se detalla la aplicación del análisis de afinidad a buena parte de los escritos de Tomás de Aquino. Y, finalmente, se muestran los resultados obtenidos del análisis de varios de sus comentarios paulinos.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Data Mining, Retrieval and Management-An Interactive Hybrid System for Identifying and Filtering Unsolicited E-mail.M. Dolores del Castillo & J. Ignacio Serrano - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 779-788.
     
    Export citation  
     
    Bookmark  
  24.  10
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...) before the improvement. The outcomes of proposed algorithms are analyzed in terms of various simulation parameters like average time, false alarm rate, absolute error as well as accuracy value. The results show that the improved algorithm advances the detection efficiency and accuracy using the designed detection model. The improved and tested detection model is then applied to a new intrusion detection system. After intrusion detection experiments, the experimental results show that the proposed system improves detection accuracy and reduces the false alarm rate. A significant improvement of 90.57% can be seen in detecting new attack type intrusion detection using the proposed algorithm. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  19
    Applying Educational Data Mining to Explore Viewing Behaviors and Performance With Flipped Classrooms on the Social Media Platform Facebook.Yu-Sheng Su & Chin-Feng Lai - 2021 - Frontiers in Psychology 12.
    In recent years, learning materials have gradually been applied to flipped classrooms. Teachers share learning materials, and students can preview the learning materials before class. During class, the teacher can discuss students' questions from their notes from previewing the learning materials. The social media platform Facebook provides access to learning materials and diversified interactions, such as sharing knowledge, annotating learning materials, and establishing common objectives. Previous studies have explored the effect of flipped classrooms on students' learning engagement, attitudes, and performance. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  27. Data mining and group profiling on the Internet.B. H. M. Custers - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
  28.  17
    (1 other version)Educational Data Mining Techniques for Student Performance Prediction: Method Review and Comparison Analysis.Yupei Zhang, Yue Yun, Rui An, Jiaqi Cui, Huan Dai & Xuequn Shang - 2021 - Frontiers in Psychology 12.
    Student performance prediction aims to evaluate the grade that a student will reach before enrolling in a course or taking an exam. This prediction problem is a kernel task toward personalized education and has attracted increasing attention in the field of artificial intelligence and educational data mining. This paper provides a systematic review of the SPP study from the perspective of machine learning and data mining. This review partitions SPP into five stages, i.e., data collection, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Symposium: Data Mining.Roger E. Backhouse - 2000 - Journal of Economic Methodology 7 (2):171-277.
  30.  18
    Application of data mining technology in college mental health education.Xiaocong Sun - 2022 - Frontiers in Psychology 13.
    In order to improve education and teaching methods and meet the “heart” needs of college students in the era of big data, this paper analyzes the application of data mining technology in college mental health education, and introduces database technology and decision tree algorithm to support college mental health work. This process verifies the feasibility of this kind of system with the help of an example. Using the test standards outlined in this document, 1.5 previous test tasks (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  15
    Identification of Factors Associated With School Effectiveness With Data Mining Techniques: Testing a New Approach.Fernando Martínez-Abad - 2019 - Frontiers in Psychology 10:494763.
    The study of school effectiveness and the identification of factors associated with it are growing fields of research in the education sciences. Moreover, from the perspective of data mining, great progress has been made in the development of algorithms for the modeling and identification of non-trivial information from massive databases. This work, which falls within this context, proposes an innovative approach for the identification and characterization of educational and organizational factors associated with high school effectiveness. Under a perspective (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola (eds.), Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  33. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  41
    The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  13
    Using Selected Data-Mining Methods in the Analysis of Data Concerning the Attitudes of Students towards the Issue of Vaccination.Anna Justyna Milewska, Karolina Milewska & Marcin Milewski - 2021 - Studies in Logic, Grammar and Rhetoric 66 (3):549-559.
    Preventive vaccination is one of the greatest successes of modern medicine. The SARS-CoV-2 epidemic, during which vaccination is the main method of prevention against death and severe disease, gave rise to a resurgence of anti-vaccine movements. The aim of this study was to analyse the attitudes of students towards vaccination and the COVID-19 pandemic. The statistical analysis was performed with the use of the following data-mining methods: correspondence analysis and basket analysis. The obtained results show that students of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  36
    Temporal data mining for educational applications.Carole R. Beal & Paul R. Cohen - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou (eds.), PRICAI 2008: Trends in Artificial Intelligence. Springer. pp. 66--77.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Data Mining, Retrieval and Management-Using Rough Set to Find the Factors That Negate the Typical Dependency of a Decision Attribute on Some Condition Attributes.Honghai Feng, Hao Xu, Baoyan Liu, Bingru Yang, Zhuye Gao & Yueli Li - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes In Computer Science. Springer Verlag. pp. 713-720.
  38.  33
    Data Mining and the Privatization of Accountability.Edward Tverdek - 2006 - Public Affairs Quarterly 20 (1):67-94.
  39.  13
    An Exploration of Factors Linked to Academic Performance in PISA 2018 Through Data Mining Techniques.Adriana Gamazo & Fernando Martínez-Abad - 2020 - Frontiers in Psychology 11:575167.
    International large-scale assessments, such as PISA, provide structured and static data. However, due to its extensive databases, several researchers place it as a reference in Big Data in Education. With the goal of exploring which factors at country, school and student level have a higher relevance in predicting student performance, this paper proposes an Educational Data Mining approach to detect and analyze factors linked to academic performance. To this end, we conducted a secondary data analysis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  76
    Statistical themes and lessons for data mining.Clark Glymour - manuscript
    Data mining is on the interface of Computer Science and Statistics, utilizing advances in both disciplines to make progress in extracting information from large databases. It is an emerging field that has attracted much attention in a very short period of time. This article highlights some statistical themes and lessons that are directly relevant to data mining and attempts to identify opportunities where close cooperation between the statistical and computational communities might reasonably provide synergy for further (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Chen Jake & Lonardi Stefano (eds.), Biological Data Mining. Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  34
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 sites (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  84
    All that glitters is not gold: Digging beneath the surface of data mining[REVIEW]Anthony Danna & Oscar H. Gandy - 2002 - Journal of Business Ethics 40 (4):373 - 386.
    This article develops a more comprehensive understanding of data mining by examining the application of this technology in the marketplace. In addition to exploring the technological issues that arise from the use of these applications, we address some of the social concerns that are too often ignored.As more firms shift more of their business activities to the Web, increasingly more information about consumers and potential customers is being captured in Web server logs. Sophisticated analytic and data (...) software tools enable firms to use the data contained in these logs to develop and implement a complex relationship management strategy. Although this new trend in marketing strategy is based on the old idea of relating to customers as individuals, customer relationship management actually rests on segmenting consumers into groups based on profiles developed through a firm's data mining activities. Individuals whose profiles suggest that they are likely to provide a high lifetime value to the firm are served content that will vary from that which is served to consumers with less attractive profiles. (shrink)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  44.  17
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each received cyber security event (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  25
    Data Mining in the Mixed Methods: Application to the Study of the Psychological Profiles of Athletes.José L. Pastrana, Rafael E. Reigal, Verónica Morales-Sánchez, Juan P. Morillo-Baro, Rocío Juárez-Ruiz de Mier, José Alves & Antonio Hernández-Mendo - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  14
    Efficient spatio-temporal data mining with GenSpace graphs.Howard J. Hamilton, Liqiang Geng, Leah Findlater & Dee Jay Randall - 2006 - Journal of Applied Logic 4 (2):192-214.
  48.  85
    Decision support systems for police: Lessons from the application of data mining techniques to “soft” forensic evidence. [REVIEW]Giles Oatley, Brian Ewart & John Zeleznikow - 2006 - Artificial Intelligence and Law 14 (1-2):35-100.
    The paper sets out the challenges facing the Police in respect of the detection and prevention of the volume crime of burglary. A discussion of data mining and decision support technologies that have the potential to address these issues is undertaken and illustrated with reference the authors’ work with three Police Services. The focus is upon the use of “soft” forensic evidence which refers to modus operandi and the temporal and geographical features of the crime, rather than “hard” (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49. Semantic cognition or data mining?Denny Borsboom & Ingmar Visser - 2008 - Behavioral and Brain Sciences 31 (6):714-715.
    We argue that neural networks for semantic cognition, as proposed by Rogers & McClelland (R&M), do not acquire semantics and therefore cannot be the basis for a theory of semantic cognition. The reason is that the neural networks simply perform statistical categorization procedures, and these do not require any semantics for their successful operation. We conclude that this has severe consequences for the semantic cognition views of R&M.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50. De la transparence au data mining : 14 ans d’évolution de la pharmacovigilance européenne.Marie-Catherine Concé Chemtob - forthcoming - Médecine et Droit.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 963