Web data mining and applications in business intelligence and counter-terrorism
Author(s)
Bibliographic Information
Web data mining and applications in business intelligence and counter-terrorism
CRC Press, c2003
Available at 5 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.
The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.
Table of Contents
Introduction. SUPPORTING TECHNOLOGIES FOR WEB DATA MINING. The World Wide Web and E-Commerce. Data Mining. Core Data Mining Technologies. Web Database Management. Information Retrieval Systems. Information Management Technologies. The Semantic Web. WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS. Data Mining and the Web. Processes and Techniques for Web Data Mining. Mining the Databases on the Web. Information Retrieval and Web Data Mining. Information Management and Web Data Mining. Semantic Web Mining. Mining Usage Patterns and Structure on the Web. Prototypes, Products, and Standards for Web Data Mining. Some Applications for Web Mining. WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM. Some Information on Terrorism, Security Threats, and Protection Measures. Web Data Mining for Counter-Terrorism. Mining the Web Databases for Counter-Terrorism. Information Retrieval and Web Mining for Counter-Terrorism. Information Management and Web Mining for Counter-Terrorism. Semantic Web Mining for Counter-Terrorism. Web Usage and Structure Mining for Counter-Terrorism. National Security, Privacy, Civil Liberties, and Web Mining. Revisiting Security Threats with Respect to Web Mining. E-Commerce, Business Intelligence, and Counter-Terrorism. Summary and Directions. Appendices.
by "Nielsen BookData"