Results for 'Security in Data Mining'

1000+ found
Order:
  1.  7
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  94
    Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  24
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  14
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  10
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7.  8
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  8
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power system (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  32
    Comparing assessments of the decision-making competencies of psychiatric inpatients as provided by physicians, nurses, relatives and an assessment tool.Rahime Er & Mine Sehiralti - 2014 - Journal of Medical Ethics 40 (7):453-457.
    Objective To compare assessments of the decision-making competencies of psychiatric inpatients as provided by physicians, nurses, relatives and an assessment tool.Methods This study was carried out at the psychiatry clinic of Kocaeli University Hospital from June 2007 to February 2008. The decision-making competence of the 83 patients who participated in the study was assessed by physicians, nurses, relatives and MacCAT-T.Results Of the 83 patients, the relatives of 73.8% of them, including the parents of 47.7%, were interviewed during the study. A (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  11.  18
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  27
    Ethical practice in sharing and mining medical data.Kevin Watson & Dinah M. Payne - 2021 - Journal of Information, Communication and Ethics in Society 19 (1):1-19.
    Purpose The purpose of this paper is to review current practice in sharing and mining medical data revealing benefits, costs and ethical issues. Based on stakeholder perspectives and values, the authors create an ethical code to regulate the sharing and mining of medical information. Design/methodology/approach The framework is based on a review of academic, practitioner and legal research. Findings Owing to the inability of current safeguards to protect consumers from risks related to the disclosure of medical information, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  7
    A Transactional Or A Relational Contract? The Student Consumer, Social Participation And Alumni Donations In Higher Education.Manuel Souto-Otero, Michael Donnelly & Mine Kanol - 2024 - British Journal of Educational Studies 72 (1):85-107.
    The relationship between students and higher education is seen to have become increasingly transactional. We approach the study of the student–HE relationship in a novel way, by focusing on students’ behaviour post-university, rather than on student narratives. Conceptually, the article builds on multidimensional views of student engagement and the differentiation between psychological transactional contracts – where students who achieve better academic results are more likely to donate – and relational contracts – where students donate more following engagement in social experiences. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  29
    Politics of prediction: Security and the time/space of governmentality in the age of big data.Tobias Blanke & Claudia Aradau - 2017 - European Journal of Social Theory 20 (3):373-391.
    From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of (in)security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   9 citations  
  15.  40
    Using sensitive personal data may be necessary for avoiding discrimination in data-driven decision models.Indrė Žliobaitė & Bart Custers - 2016 - Artificial Intelligence and Law 24 (2):183-201.
    Increasing numbers of decisions about everyday life are made using algorithms. By algorithms we mean predictive models captured from historical data using data mining. Such models often decide prices we pay, select ads we see and news we read online, match job descriptions and candidate CVs, decide who gets a loan, who goes through an extra airport security check, or who gets released on parole. Yet growing evidence suggests that decision making by algorithms may discriminate people, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  16.  1
    Visual Mining Method of Japanese Movie Resources Based on Association Rules.Qin Wang - 2023 - European Journal for Philosophy of Religion 15 (4):419-435.
    One of the crucial fields of study that is getting more attention is association rule mining. It is crucial to databases' knowledge discovery (KDD). KDD and association rule mining have a very broad use. It has evolved at a rapid rate over the past fifteen years. Association Rule Mining is a novel technology, although it is still in the discovery and development stages. Video is an illustration of interactive media data since it contains text, pictures, meta- (...), visual, sound, and different kinds of data. It is frequently used for a variety of important likely reasons, such as security and reconnaissance, amusement, healthcare, educational endeavours, and sports. One of the main issues for the local data-mining research community is video data mining, which aims to find and comprehend fascinating examples from the large volume of video data. Video data mining is still in its infancy when compared to mining other sorts of data. It is pivotal to grasp and naturally mine the information from video databases considering the continually extending computerized libraries and video databases. Differentiating association rules between components in a significant video library is critical in the field of video data mining. As per continuous imaginative work, association rule mining is being utilized rapidly in various tasks, including perception, social affairs, broadcast news, sports, records, films, clinical data, as well as on the web and individual media assortments. This exploration tries to give a far-reaching method to association rule extraction from video databases. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  7
    Data Protection and Sample Management in Biobanking - A legal dichotomy.Dolores Ibarreta, Daniele Paci & Tobias Schulte in den Bäumen - 2010 - Genomics, Society and Policy 6 (1):1-14.
    Biobanking in Europe has made major steps towards harmonization and shared standards for the collection and processing of data and samples stored in biobanks. Still, biobanks and researchers face substantial legal difficulties in the field of data protection and sample management. Data protection law was harmonized almost 15 years ago while rights in samples fall under the competence of the Member States of the EU. Despite the Data Protection Directive the field of data protection shows (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  13
    Data Protection and Sample Management in Biobanking - A legal dichotomy.Tobias Schulte In Den BÄumen, Daniele Paci & Dolores Ibarreta - 2010 - Genomics, Society and Policy 6 (1):33-46.
    Biobanking in Europe has made major steps towards harmonization and shared standards for the collection and processing of data and samples stored in biobanks. Still, biobanks and researchers face substantial legal difficulties in the field of data protection and sample management. Data protection law was harmonized almost 15 years ago while rights in samples fall under the competence of the Member States of the EU. Despite the Data Protection Directive the field of data protection shows (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  24
    Technique without theory or theory from technique? An examination of practical, philosophical, and foundational issues in data mining.A. R. Korukonda - 2007 - AI and Society 21 (3):347-355.
    In this paper, it is argued that although data mining (DM) is being touted as a solution to many business problems and is basking in the glory of electronic business environments of today, as practiced currently, it reflects a preoccupation with short-run commercial applications and a neglect of the underlying theoretical issues. Although an argument can be made that theoretical precedence is not a necessary prerequisite for practical application or for commercial success, it can also be argued that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  12
    Data mining applications in university information management system development.Ashima Kukkar, Amit Sharma, Juntao Fan & Minshun Zhang - 2022 - Journal of Intelligent Systems 31 (1):207-220.
    Nowadays, the modern management is promoted to resolve the issue of unreliable information transmission and to provide work efficiency. The basic aim of the modern management is to be more effective in the role of the school to train talents and serve the society. This article focuses on the application of data mining (DM) in the development of information management system (IMS) in universities and colleges. DM provides powerful approaches for a variety of educational areas. Due to the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. Ethical issues in web data mining.Lita van Wel & Lambèr Royakkers - 2004 - Ethics and Information Technology 6 (2):129-140.
    Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private (...)
    Direct download (12 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  23.  11
    Developing an Instrument for Assessing Self-Efficacy in Data Mining and Analysis.Yu-Min Wang, Chei-Chang Chiou, Wen-Chang Wang & Chun-Jung Chen - 2021 - Frontiers in Psychology 11.
    With the continuous progress and penetration of automated data collection technology, enterprises and organizations are facing the problem of information overload. The demand for expertise in data mining and analysis is increasing. Self-efficacy is a pivotal construct that is significantly related to willingness and ability to perform a particular task. Thus, the objective of this study is to develop an instrument for assessing self-efficacy in data mining and analysis. An initial measurement list was developed based (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  18
    The Good, the Bad, and the Ugly: Applying Rawlsian Ethics in Data Mining Marketing.Stephen Cory Robinson - 2015 - Journal of Media Ethics 30 (1):19-30.
    Using a Rawlsian approach to analyze the ethical implications of data mining within three major codes of ethics used by American marketing firms, the author argues that marketers should re-conceptualize their business conduct, as defined in their individual codes of ethics, to incorporate a Rawlsian concern for society's least advantaged members. Rawls's concept of primary goods provides the framework for the argument that anonymity, a component of privacy, is vital for consumers whose autonomy is affected by data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  4
    Using Data Mining Approach for Student Satisfaction With Teaching Quality in High Vocation Education.Bailin Chen, Yi Liu & Jinqiu Zheng - 2022 - Frontiers in Psychology 12.
    High vocation education is an important foundation for China to cultivate high teaching quality and technical and skilled talents. In the new era, the acceleration of the development of modern vocational education is put in a more prominent position. It is proposed that we should adhere to moral education, closely combine this with the needs of technological change and industrial upgrading, constantly improve the quality of high vocational education teaching, and cultivate more technical and skilled talents with both political integrity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  15
    Data Mining in the Mixed Methods: Application to the Study of the Psychological Profiles of Athletes.José L. Pastrana, Rafael E. Reigal, Verónica Morales-Sánchez, Juan P. Morillo-Baro, Rocío Juárez-Ruiz de Mier, José Alves & Antonio Hernández-Mendo - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  36
    Using data-mining to identify and study patterns in lexical innovation on the web.Daphné Kerremans, Jelena Prokić, Quirin Würschinger & Hans-Jörg Schmid - 2018 - Pragmatics and Cognition 25 (1):174-200.
    This paper presents the NeoCrawler – a tailor-made webcrawler, which identifies and retrieves neologisms from the Internet and systematically monitors the use of detected neologisms on the web by means of weekly searches. It enables researchers to use the web as a corpus in order to investigate the dynamics of lexical innovation on a large-scale and systematic basis. The NeoCrawler represents an innovative web-mining tool which opens up new opportunities for linguists to tackle a number of unresolved and under-researched (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola (eds.), Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I argue (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  18
    Data Mining Techniques in Analyzing Process Data: A Didactic.Xin Qiao & Hong Jiao - 2018 - Frontiers in Psychology 9.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  7
    Data Mining Approach Improving Decision-Making Competency along the Business Digital Transformation Journey: A Case Study – Home Appliances after Sales Service.Hyrmet Mydyti - 2021 - Seeu Review 16 (1):45-65.
    Data mining, as an essential part of artificial intelligence, is a powerful digital technology, which makes businesses predict future trends and alleviate the process of decision-making and enhancing customer experience along their digital transformation journey. This research provides a practical implication – a case study - to provide guidance on analyzing information and predicting repairs in home appliances after sales services business. The main benefit of this practical comparative study of various classification algorithms, by using the Weka tool, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  23
    From radioactivity to data mining: Günther Anders in the Anthropocene.Christopher John Müller - 2019 - Thesis Eleven 153 (1):9-23.
    This essay traces the complex constellation of ideas that informs Anders's turn to the generalizing expression ‘the human’ in his postwar work. It mobilizes the properties of radioactive material and digital data, which are both curiously imperceptible to our senses, to discuss Anders’s insistence on the universalizing pronoun `we' and assess its significance in the contemporary world. To do so, it aligns Anders's work with current debates about the Anthropocene and critiques of the use of the term ‘the human’ (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  10
    Educational Data Mining Techniques for Student Performance Prediction: Method Review and Comparison Analysis.Yupei Zhang, Yue Yun, Rui An, Jiaqi Cui, Huan Dai & Xuequn Shang - 2021 - Frontiers in Psychology 12.
    Student performance prediction aims to evaluate the grade that a student will reach before enrolling in a course or taking an exam. This prediction problem is a kernel task toward personalized education and has attracted increasing attention in the field of artificial intelligence and educational data mining. This paper provides a systematic review of the SPP study from the perspective of machine learning and data mining. This review partitions SPP into five stages, i.e., data collection, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  32
    Unlocking data: Where is the key?María C. Sánchez & Antonio Sarría‐Santamera - 2019 - Bioethics 33 (3):367-376.
    Health‐related data uses and data sharing have been in the spotlight for a while. Since the beginning of the big data era, massive data mining and its inherent possibilities have only increased the debate about what the limits are. Data governance is a relevant aspect addressed in ethics guidelines. In this context, the European project BRIDGE Health (BRidging Information and Data Generation for Evidence‐based Health policy and research) strove to achieve a comprehensive, integrated (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  86
    Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  37.  4
    Intelligent Data Mining of Computer-Aided Extension Residential Building Design Based on Algorithm Library.Gao Zhihui & Zou Guangtian - 2021 - Complexity 2021:1-9.
    In recent years, with the development of construction industry, more scientific, systematic, fast, and intelligent calculation methods are needed to coordinate urban development and fierce market competition, and mathematical algorithm library plays an important role in artificial intelligence. Therefore, the author uses computer mathematical algorithm and extension theory to study and analyze the residential building design and intelligent data mining. It is found that the research of the computer-aided expression method of extension building planning is mainly the expression (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  13
    Advances in Processing, Mining, and Learning Complex Data: From Foundations to Real-World Applications.Jia Wu, Shirui Pan, Chuan Zhou, Gang Li, Wu He & Chengqi Zhang - 2018 - Complexity 2018:1-3.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  16
    Privacy concerns in educational data mining and learning analytics.Isak Potgieter - 2020 - International Review of Information Ethics 28.
    Education at all levels is increasingly augmented and enhanced by data mining and analytics, catalysed by the growing prevalence of automated distance learning. With an unprecedented capacity to scale both horizontally and vertically, data mining and analytics are set to be a transformative part of the future of education. We reflect on the assumptions behind data mining and the potential consequences of learning analytics, with reference to an issue brief prepared for the U.S. Department (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  9
    Application of data mining technology in college mental health education.Xiaocong Sun - 2022 - Frontiers in Psychology 13.
    In order to improve education and teaching methods and meet the “heart” needs of college students in the era of big data, this paper analyzes the application of data mining technology in college mental health education, and introduces database technology and decision tree algorithm to support college mental health work. This process verifies the feasibility of this kind of system with the help of an example. Using the test standards outlined in this document, 1.5 previous test tasks (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Data Mining, Retrieval and Management-An Interactive Hybrid System for Identifying and Filtering Unsolicited E-mail.M. Dolores del Castillo & J. Ignacio Serrano - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 779-788.
     
    Export citation  
     
    Bookmark  
  42. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Jake Chen & Stefano Lonardi (eds.), Biological Data Mining. Boca Raton: Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  16
    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment.Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu & Na Chen - 2021 - Complexity 2021:1-12.
    This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  32
    Temporal data mining for educational applications.Carole R. Beal & Paul R. Cohen - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou (eds.), Pricai 2008: Trends in Artificial Intelligence. Springer. pp. 66--77.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Data Mining, Retrieval and Management-Using Rough Set to Find the Factors That Negate the Typical Dependency of a Decision Attribute on Some Condition Attributes.Honghai Feng, Hao Xu, Baoyan Liu, Bingru Yang, Zhuye Gao & Yueli Li - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 713-720.
  46.  6
    Using Selected Data-Mining Methods in the Analysis of Data Concerning the Attitudes of Students towards the Issue of Vaccination.Anna Justyna Milewska, Karolina Milewska & Marcin Milewski - 2021 - Studies in Logic, Grammar and Rhetoric 66 (3):549-559.
    Preventive vaccination is one of the greatest successes of modern medicine. The SARS-CoV-2 epidemic, during which vaccination is the main method of prevention against death and severe disease, gave rise to a resurgence of anti-vaccine movements. The aim of this study was to analyse the attitudes of students towards vaccination and the COVID-19 pandemic. The statistical analysis was performed with the use of the following data-mining methods: correspondence analysis and basket analysis. The obtained results show that students of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  6
    An Exploration of Factors Linked to Academic Performance in PISA 2018 Through Data Mining Techniques.Adriana Gamazo & Fernando Martínez-Abad - 2020 - Frontiers in Psychology 11.
    International large-scale assessments, such as PISA, provide structured and static data. However, due to its extensive databases, several researchers place it as a reference in Big Data in Education. With the goal of exploring which factors at country, school and student level have a higher relevance in predicting student performance, this paper proposes an Educational Data Mining approach to detect and analyze factors linked to academic performance. To this end, we conducted a secondary data analysis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  15
    Text and Data Mining in Directive 2019/790/EU Enhancing Web-Harvesting and Web-Archiving in Libraries and Archives.Μaria Bottis, Marinos Papadopoulos, Christos Zampakolas & Paraskevi Ganatsiou - 2019 - Open Journal of Philosophy 9 (3):369-395.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  11
    Prescription Data Mining and the Protection of Patients' Interests.David Orentlicher - 2010 - Journal of Law, Medicine and Ethics 38 (1):74-84.
    Pharmaceutical companies have long relied on direct marketing of their drugs to physicians through one-on-one meetings with sales representatives. This practice of “detailing” is substantial in its costs and its number of participants. Every year, pharmaceutical companies spend billions of dollars on millions of visits to physicians by tens of thousands of sales representatives.Critics have argued that drug detailing results in sub-optimal prescribing decisions by physicians, compromising patient health and driving up spending on medical care. In this view, physicians often (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
1 — 50 / 1000