Thuraisingham | Web Data Mining and Applications in Business Intelligence and Counter-Terrorism | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 544 Seiten

Thuraisingham Web Data Mining and Applications in Business Intelligence and Counter-Terrorism


Erscheinungsjahr 2003
ISBN: 978-0-203-49951-1
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 544 Seiten

ISBN: 978-0-203-49951-1
Verlag: CRC Press
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

Thuraisingham Web Data Mining and Applications in Business Intelligence and Counter-Terrorism jetzt bestellen!

Zielgruppe


Intelligence analysts, market planners and researchers, business development, product planners, strategic planners, business managers and corporate executives, senior systems analyst and designers, application development managers and project leaders


Autoren/Hrsg.


Weitere Infos & Material


Introduction

Trends
Supporting Technologies for Web Data Mining
Web Data Mining Concepts
Web Data Mining and Counter-Terrorism
Organization of This Book
How Do We Proceed?

PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MINING
WORLD WIDE WEB AND E-COMMERCE
Evolution of the Web
Introduction to E-Commerce
Relationship to Web Data Mining
Summary
DATA MINING

Data Mining Technologies
Concepts and Techniques in Data Mining

Directions and Trends in Data Mining

Relationship to Web Mining
Summary
CORE DATA MINING TECHNOLOGIES
Data Management and Data Warehousing

Statistical Reasoning

Machine Learning

Visualization

Parallel Processing

Decision Support

Architectural Support for Data Mining

Relationship to Web Data Mining

Summary

WEB DATABASE MANAGEMENT
Web Databases

Semi-Structured Databases

Metadata, Ontologies, and the Web

Distributed, Heterogeneous and Legacy Databases on the Web

Data Warehousing on the Web

Architectural Aspects

Relationship to Web Data Mining

Summary

INFORMATION RETRIEVAL SYSTEMS
Text Retrieval

Image Retrieval

Video Retrieval

Audio Retrieval

Multimedia Data and Information Management

Question Answering Systems

Markup Languages

Relationship to Web Data Mining

Summary

INFORMATION MANAGEMENT TECHNOLOGIES
Collaboration and Data Management

Knowledge Management

Agents for the Web

Training and Distance Learning

Wireless Information Management and Pervasive Computing

Sensor Information Management

Quality-Of-Service Aspects

Some Directions

Relationship to Web Data Mining

Summary

THE SEMANTIC WEB
Semantic Web Concepts

RDF

Role of Ontologies

Agents and the DAML Program

Semantic Web as a Database

XML, RDF, and Interoperability

Web Services

Note on E-Commerce and Semantic Web

Web versus the Semantic Web

Data Mining and the Semantic Web

Summary

PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS
DATA MINING AND THE WEB
Mining Data on the Web
Mining Usage Patterns
Web Structure Mining
Applications and Directions
Summary

PROCESSES AND TECHNIQUES FOR WEB DATA MINING
Process of Web Data Mining

Web Data Mining Outcomes, Approaches, and Techniques

Web Data Mining versus Data Mining
Summary
MINING THE DATABASES ON THE WEB
Concepts in Web Database Mining

Mining Semi-Structured Databases

Metadata and Web Mining

Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web

Architectures and Web Data Mining

Summary

INFORMATION RETRIEVAL AND WEB DATA MINING
Search Engines and Web Data Mining

Multimedia Data Mining and the Web

Some Other Aspects

Summary

INFORMATION MANAGEMENT AND WEB DATA MINING
Collaborative Data Mining
Knowledge Management and Web Data Mining
Training and Web Data Mining
Agents and Web Data Mining
Wireless Computing and Web Data Mining
Sensor Web Mining
Quality of Service and Web Data Mining
Other Aspects
Summary
SEMANTIC WEB MINING
Concepts In Semantic Web Mining
XML, RDF, and Web Data Mining
Ontologies and Web Data Mining
Agents and Web Data Mining
Web Mining and the Semantic Web as a Database
Semantic Interoperability and Web Mining
Web Services and Web Mining
Web Mining versus Semantic Web Mining
A Note on E-Commerce and Semantic Web Mining
Summary

MINING USAGE PATTERNS AND STRUCTURE ON THE WEB
Web Usage Mining Outcomes and Techniques
Web Usage Mining Analysis
CRM and Business Intelligence Applications
Mining Structure on the Web
Summary

PROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MINING
Prototypes and Products for Data Mining
Web Data Mining Products
Standards for Web Mining
Summary
SOME APPLICATIONS FOR WEB MINING
E-Commerce And E-Business
Business Intelligence
Customer Relationship Management
Marketing and Sales
Enterprise Resource Management
Manufacturing and Planning
Education and Training
Telecommunications
Financial
Physical Sciences, Social Sciences, and Engineering
Medicine and Biotechnology
Counter-Terrorism
Summary

PART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM

SOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURES
Natural Disasters and Human Errors
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non Real-Time Threats versus Real-Time Threats
Aspects of Counter-Terrorism
A Note on Privacy
Summary

WEB DATA MINING FOR COUNTER-TERRORISM
Web Data Mining for Counter-Terrorism
Analyzing the Techniques
Link Analysis
Summary

MINING THE WEB DATABASES FOR COUNTER-TERRORISM
Web Database Mining
Semi-Structured Database Mining
Metadata Mining
Warehouse Mining
Distributed and Heterogeneous Database Mining
Other Aspects
Summary

INFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISM
Exploiting and Using Intelligent Search Engines
Applying Multimedia Data Mining
Other Aspects
Summary

INFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISM
Collaborative Data Mining
Knowledge Management and Web Mining
Training and Web Mining
Agents and Web Mining
Wireless Information Management and Web Mining
Sensor Information Management and Web Mining
Quality of Service and Web Mining
Some Other Aspects
Summary

SEMANTIC WEB MINING FOR COUNTER-TERRORISM
Semantic Web Mining for Counter-Terrorism
Building the Semantic Web and Web Mining for Counter-Terrorism
Summary

WEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISM
Web Usage Mining for Counter-Terrorism
Web Structure Mining for Counter-Terrorism
Summary

NATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MINING
Background on the Inference Problem
Mining, Warehousing, and Inference
Inductive Logic Programming and Inference
Privacy Issues
Inference Problem and Privacy
Privacy Enhanced Data Mining
Civil Liberties versus National Security
Summary

REVISITING SECURITY THREATS WITH RESPECT TO WEB MINING
Natural Disasters, Human Errors, and Malicious Attacks
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non-Realtime Threats versus Real-Time Threats
Revisiting Privacy
Summary

E-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISM
Models for Counter-Terrorism
Architectures for Counter-Terrorism
Functions for Counter-Terrorism
Revisiting Business Intelligence
Summary
SUMMARY AND DIRECTIONS
Summary of This Book
Challenges and Directions for Web Data Mining
Challenges and Directions for Web Data Mining for Counter-Terrorism
Impact of the Department of Homeland Security
Where Do We Go from Here?

PART 4 APPENDICES

DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS
Developments in Database Systems
Status, Vision, and Issues
Data Management Systems Framework
Building Information Systems from the Framework
Relationship between the Texts
Summary

DATABASE SYSTEMS AND RELATED TECHNOLOGIES
Relational and Entity-Relationship Data Models
Architectural Issues
Database Design
Database Administration
Database Management System Functions
Distributed Databases
Heterogeneous Database Integration
Federated Databases
Client-Server Databases
Migrating Legacy Databases and Applications
Data Warehousing
Object Technology
Summary

DATA AND INFORMATION SECURITY
Access Control and Other Security Concepts
Secure Systems
Secure Database Systems
Emerging Trends
Impact of the Web
Summary

REFERENCES



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.