Web Data Mining and Applications in Business Intelligence and Counter-Terrorism

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a co...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Thuraisingham, Bhavani
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1391
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1391
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions. The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.
format Book
author Thuraisingham, Bhavani
spellingShingle Thuraisingham, Bhavani
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
author_facet Thuraisingham, Bhavani
author_sort Thuraisingham, Bhavani
title Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
title_short Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
title_full Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
title_fullStr Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
title_full_unstemmed Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
title_sort web data mining and applications in business intelligence and counter-terrorism
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1391
_version_ 1757661957367791616
spelling oai:scholar.dlu.edu.vn:DLU123456789-13912009-12-01T08:39:16Z Web Data Mining and Applications in Business Intelligence and Counter-Terrorism Thuraisingham, Bhavani The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence. Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions. The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal. Introduction Trends Supporting Technologies for Web Data Mining Web Data Mining Concepts Web Data Mining and Counter-Terrorism Organization of This Book How Do We Proceed? PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MINING WORLD WIDE WEB AND E-COMMERCE Evolution of the Web Introduction to E-Commerce Relationship to Web Data Mining Summary DATA MINING Data Mining Technologies Concepts and Techniques in Data Mining Directions and Trends in Data Mining Relationship to Web Mining Summary CORE DATA MINING TECHNOLOGIES Data Management and Data Warehousing Statistical Reasoning Machine Learning Visualization Parallel Processing Decision Support Architectural Support for Data Mining Relationship to Web Data Mining Summary WEB DATABASE MANAGEMENT Web Databases Semi-Structured Databases Metadata, Ontologies, and the Web Distributed, Heterogeneous and Legacy Databases on the Web Data Warehousing on the Web Architectural Aspects Relationship to Web Data Mining Summary INFORMATION RETRIEVAL SYSTEMS Text Retrieval Image Retrieval Video Retrieval Audio Retrieval Multimedia Data and Information Management Question Answering Systems Markup Languages Relationship to Web Data Mining Summary INFORMATION MANAGEMENT TECHNOLOGIES Collaboration and Data Management Knowledge Management Agents for the Web Training and Distance Learning Wireless Information Management and Pervasive Computing Sensor Information Management Quality-Of-Service Aspects Some Directions Relationship to Web Data Mining Summary THE SEMANTIC WEB Semantic Web Concepts RDF Role of Ontologies Agents and the DAML Program Semantic Web as a Database XML, RDF, and Interoperability Web Services Note on E-Commerce and Semantic Web Web versus the Semantic Web Data Mining and the Semantic Web Summary PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS DATA MINING AND THE WEB Mining Data on the Web Mining Usage Patterns Web Structure Mining Applications and Directions Summary PROCESSES AND TECHNIQUES FOR WEB DATA MINING Process of Web Data Mining Web Data Mining Outcomes, Approaches, and Techniques Web Data Mining versus Data Mining Summary MINING THE DATABASES ON THE WEB Concepts in Web Database Mining Mining Semi-Structured Databases Metadata and Web Mining Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web Architectures and Web Data Mining Summary INFORMATION RETRIEVAL AND WEB DATA MINING Search Engines and Web Data Mining Multimedia Data Mining and the Web Some Other Aspects Summary INFORMATION MANAGEMENT AND WEB DATA MINING Collaborative Data Mining Knowledge Management and Web Data Mining Training and Web Data Mining Agents and Web Data Mining Wireless Computing and Web Data Mining Sensor Web Mining Quality of Service and Web Data Mining Other Aspects Summary SEMANTIC WEB MINING Concepts In Semantic Web Mining XML, RDF, and Web Data Mining Ontologies and Web Data Mining Agents and Web Data Mining Web Mining and the Semantic Web as a Database Semantic Interoperability and Web Mining Web Services and Web Mining Web Mining versus Semantic Web Mining A Note on E-Commerce and Semantic Web Mining Summary MINING USAGE PATTERNS AND STRUCTURE ON THE WEB Web Usage Mining Outcomes and Techniques Web Usage Mining Analysis CRM and Business Intelligence Applications Mining Structure on the Web Summary PROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MINING Prototypes and Products for Data Mining Web Data Mining Products Standards for Web Mining Summary SOME APPLICATIONS FOR WEB MINING E-Commerce And E-Business Business Intelligence Customer Relationship Management Marketing and Sales Enterprise Resource Management Manufacturing and Planning Education and Training Telecommunications Financial Physical Sciences, Social Sciences, and Engineering Medicine and Biotechnology Counter-Terrorism Summary PART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM SOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURES Natural Disasters and Human Errors Non-Information Related Terrorism Information Related Terrorism Bio-Terrorism, Chemical, and Nuclear Attacks Attacks on Critical Infrastructures Non Real-Time Threats versus Real-Time Threats Aspects of Counter-Terrorism A Note on Privacy Summary WEB DATA MINING FOR COUNTER-TERRORISM Web Data Mining for Counter-Terrorism Analyzing the Techniques Link Analysis Summary MINING THE WEB DATABASES FOR COUNTER-TERRORISM Web Database Mining Semi-Structured Database Mining Metadata Mining Warehouse Mining Distributed and Heterogeneous Database Mining Other Aspects Summary INFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISM Exploiting and Using Intelligent Search Engines Applying Multimedia Data Mining Other Aspects Summary INFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISM Collaborative Data Mining Knowledge Management and Web Mining Training and Web Mining Agents and Web Mining Wireless Information Management and Web Mining Sensor Information Management and Web Mining Quality of Service and Web Mining Some Other Aspects Summary SEMANTIC WEB MINING FOR COUNTER-TERRORISM Semantic Web Mining for Counter-Terrorism Building the Semantic Web and Web Mining for Counter-Terrorism Summary WEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISM Web Usage Mining for Counter-Terrorism Web Structure Mining for Counter-Terrorism Summary NATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MINING Background on the Inference Problem Mining, Warehousing, and Inference Inductive Logic Programming and Inference Privacy Issues Inference Problem and Privacy Privacy Enhanced Data Mining Civil Liberties versus National Security Summary REVISITING SECURITY THREATS WITH RESPECT TO WEB MINING Natural Disasters, Human Errors, and Malicious Attacks Non-Information Related Terrorism Information Related Terrorism Bio-Terrorism, Chemical, and Nuclear Attacks Attacks on Critical Infrastructures Non-Realtime Threats versus Real-Time Threats Revisiting Privacy Summary E-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISM Models for Counter-Terrorism Architectures for Counter-Terrorism Functions for Counter-Terrorism Revisiting Business Intelligence Summary SUMMARY AND DIRECTIONS Summary of This Book Challenges and Directions for Web Data Mining Challenges and Directions for Web Data Mining for Counter-Terrorism Impact of the Department of Homeland Security Where Do We Go from Here? PART 4 APPENDICES DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS Developments in Database Systems Status, Vision, and Issues Data Management Systems Framework Building Information Systems from the Framework Relationship between the Texts Summary DATABASE SYSTEMS AND RELATED TECHNOLOGIES Relational and Entity-Relationship Data Models Architectural Issues Database Design Database Administration Database Management System Functions Distributed Databases Heterogeneous Database Integration Federated Databases Client-Server Databases Migrating Legacy Databases and Applications Data Warehousing Object Technology Summary DATA AND INFORMATION SECURITY Access Control and Other Security Concepts Secure Systems Secure Database Systems Emerging Trends Impact of the Web Summary REFERENCES 2009-12-01T08:39:16Z 2009-12-01T08:39:16Z 2003 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1391 en application/rar CRC Press