Social Mining Social Computing.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

Supporting End-User Access
By: Mr Hashem Alaidaros MIS 211 Lecture 4 Title: Data Base Management System.
Data Mining Glen Shih CS157B Section 1 Dr. Sin-Min Lee April 4, 2006.
Chapter 9 Business Intelligence Systems
Chapter 9 Competitive Advantage with Information Systems for Decision Making © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 9 DATA WAREHOUSING Transparencies © Pearson Education Limited 1995, 2005.
Chapter 3 Database Management
1 ACCTG 6910 Building Enterprise & Business Intelligence Systems (e.bis) Introduction to Data Mining Olivia R. Liu Sheng, Ph.D. Emma Eccles Jones Presidential.
WebMiningResearch ASurvey Web Mining Research: A Survey By Raymond Kosala & Hendrik Blockeel, Katholieke Universitat Leuven, July 2000 Presented 4/18/2002.
DATA WAREHOUSING.
Data Mining By Archana Ketkar.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Metodi Quantitativi per Economia, Finanza e Management Lezione n°2.
Building Knowledge-Driven DSS and Mining Data
CS157A Spring 05 Data Mining Professor Sin-Min Lee.
Data mining By Aung Oo.
Presented To: Madam Nadia Gul Presented By: Bi Bi Mariam.
DASHBOARDS Dashboard provides the managers with exactly the information they need in the correct format at the correct time. BI systems are the foundation.
Data Mining: A Closer Look
Chapter 8 Marketing Research and Sales Forecasting
Gavin Russell-Rockliff BI Technical Specialist Microsoft BIN305.
TURKISH STATISTICAL INSTITUTE INFORMATION TECHNOLOGIES DEPARTMENT (Muscat, Oman) DATA MINING.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
1 © Goharian & Grossman 2003 Introduction to Data Mining (CS 422) Fall 2010.
Data Mining Techniques
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Bina Nusantara 2 C H A P T E R INFORMATION SYSTEM BUILDING BLOCKS.
Intelligent Systems Lecture 23 Introduction to Intelligent Data Analysis (IDA). Example of system for Data Analyzing based on neural networks.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Data Mining and Application Part 1: Data Mining Fundamentals Part 2: Tools for Knowledge Discovery Part 3: Advanced Data Mining Techniques Part 4: Intelligent.
Chapter 9 Business Intelligence and Information Systems for Decision Making.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 9 Competitive Advantage with Information Systems for Decision Making.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
Introduction to Web Mining Spring What is data mining? Data mining is extraction of useful patterns from data sources, e.g., databases, texts, web,
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
Fox MIS Spring 2011 Data Mining Week 9 Introduction to Data Mining.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
1 Reviewing Data Warehouse Basics. Lessons 1.Reviewing Data Warehouse Basics 2.Defining the Business and Logical Models 3.Creating the Dimensional Model.
Data Mining By Dave Maung.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
CS157B Fall 04 Introduction to Data Mining Chapter 22.3 Professor Lee Yu, Jianji (Joseph)
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Data Mining In contrast to the traditional (reactive) DSS tools, the data mining premise is proactive. Data mining tools automatically search the data.
3-1 Data Mining Kelby Lee. 3-2 Overview ¨ Transaction Database ¨ What is Data Mining ¨ Data Mining Primitives ¨ Data Mining Objectives ¨ Predictive Modeling.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
1 Introduction to Data Mining C hapter 1. 2 Chapter 1 Outline Chapter 1 Outline – Background –Information is Power –Knowledge is Power –Data Mining.
MIS2502: Data Analytics Advanced Analytics - Introduction.
DATA MINING PREPARED BY RAJNIKANT MODI REFERENCE:DOUG ALEXANDER.
CS507 Information Systems. Lesson # 11 Online Analytical Processing.
Unclassified//For Official Use Only 1 RAPID: Representation and Analysis of Probabilistic Intelligence Data Carnegie Mellon University PI : Prof. Jaime.
Data Mining Concepts and Techniques Course Presentation by Ali A. Ali Department of Information Technology Institute of Graduate Studies and Research Alexandria.
Chapter 2 Data, Text, and Web Mining. Data Mining Concepts and Applications  Data mining (DM) A process that uses statistical, mathematical, artificial.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
KNOWLEDGE MANAGEMENT (KM) Session # 33. Corporate Intranet A Conceptual Model INTRANET Production Team— New Product Budget Director— New Product Knowledge.
Data Resource Management – MGMT An overview of where we are right now SQL Developer OLAP CUBE 1 Sales Cube Data Warehouse Denormalized Historical.
Data mining in web applications
Survey on Different Data Mining Techniques for E- Crimes
DATA MINING © Prentice Hall.
Knowledge Management Landscape (in US)
Web Mining Department of Computer Science and Engg.
Data Warehousing Data Mining Privacy
Information Systems in Organizations
Presentation transcript:

Social Mining Social Computing

Data Mining Data mining is an important new information technology used to identify significant data from vast amounts of records It is also part of a process called knowledge discovery in databases, which presents and processes data to obtain knowledge.

Goal and Usefulness of Data Mining Goals: Improve quality of interaction between the system and it’s users. Improve decision making Usefulness: An automatic analysis and discovery tool for extraction of useful knowledge from huge amounts of valuable information.

Knowledge Discovery Process

Data Mining Tasks Data Mining Methods Association Rules Clustering Classification Forecast Decision trees and rules Non-linear regression Classification Methods Example based methods Probabilistic Graphical Dependency Models Relational Learning Models

Statistical Inference vs Data Mining Formal statistical Inference is “assumption-driven.” Hypothesis is first formed and then validated against data. Data Mining is “discovery-driven.” In the sense, patterns and hypothesis are automatically extracted from data.

Data Mining – Practical Usage Direct Marketing; Fraud Control; Credit Analysis; Outlier Analysis.

Effective implementation of Data Mining Development of a Data Warehouse Data Warehouse - Functions in three layers: staging, integration and access. The functions are in the DW to meet the users' reporting needs. Staging is used to store raw data for use by developers (analysis and support). Integration layer is used to integrate data and to have a level of abstraction from users. Access layer is for getting data out for users.

Contd. Decision Support Systems Knowledge Discovery in Databases B. Ease and Simplicity of Data Mining Tools Produce an automated real-time detection of patterns or anomalies. Decision Support Systems Knowledge Discovery in Databases Data Warehouse

Contd. C. Knowledge of Data Analysis Database specialists and computer scientists can contribute the most in this area.

Three chief facilities of Search Engines Gather a set of Web Pages that form the universe from where users can retrieve information. Represent pages in this universe in a fashion that attempts to capture their content. They allow searchers to issue queries, employing information retrieval algorithms that attempt to find most relevant pages from the universe.

Data Mining and Web Search Engines A customer service database stores two types of service information: Unstructured customer service reports. Structured Data on Sales, Employees, and Customers. Most search engines have advanced search capabilities that will allow the user to specify additional search parameters to obtain more refined results. DBMS acts as an access to involve search engines in a data warehouse environment.

Differences in Web Search and Data Mining Web searches are usually started with some sort of query in a search engine. While Data Mining does its searching based on the data itself, data mining tools and specified output format.

Role of Social Scientists Contribute to; Research. Development of Rules for flagging anomalous behavior. Identify and understand elements in the data sets. Develop guidelines and methods to ascertain which data mining techniques are the most effective in a particular case.

Assael’s Consumer Information Acquisition and Processing Model

Conceptual Model of Information and Source Utilization

Model of Information Needs

Consumer-Oriented Information Search Model

Contd.

Contd.

Contd.

Examples from the Economist According to the Economist, there’s a big market for such software. “By one estimate there are more than 100 programs for network analysis, also known as link analysis or predictive analysis. The raw data used may extend far beyond phone records to encompass information available from private and governmental entities, and internet sources such as Facebook. IBM, the supplier of the system used by Bharti Airtel, says its annual sales of such software, now growing at double-digit rates, will exceed $15 billion by 2015. In the past five years IBM has spent more than $11 billion buying makers of network-analysis software. Gartner, a market-research firm, ranks the technology at number two in its list of strategic business operations meriting significant investment this year.”

For Example The article also touches on more sophisticated systems that integrate additional information, including V.S. Subrahmanian’s work on STOP: “Called SOMA(Stochastic Opponent Modeling Agents) is a formal, logical-statistical reasoning framework that uses data about past behavior of terror groups in order to learn rules about the probability of an organization, community, or person taking certain actions in different situations.) SOMA Terror Organization Portal, it analyses a wide range of information about politics, business and society in Lebanon to predict, with surprising accuracy, rocket attacks by the country’s Hizbullah militia on Israel. Attacks tend to increase, for example, as more money from Islamic charities flows into Lebanon. Attacks decrease during election years, particularly as more Hizbullah members run for office and campaign energetically. By the middle of 2010 SOMA was sucking up data from more than 200 sources, many of them newspaper websites. The number of sources will have more than doubled by the end of the year.”

References www.emeraldinsight.com/0264-0473.htm www.economist.com/node/16910031 Journal of Financial Crime Vol.12 No.1

Mohd. Ali Khan Murtaza Marvi Musa Bin Hamid Syed Mohsin Hussain Thank You Mohd. Ali Khan Murtaza Marvi Musa Bin Hamid Syed Mohsin Hussain