Web Data Mining & Business Intelligence Analysis

Hardcover (Print)
Buy New
Buy New from BN.com
$107.93
Used and New from Other Sellers
Used and New from Other Sellers
from $116.42
Usually ships in 1-2 business days
(Save 10%)
Other sellers (Hardcover)
  • All (6) from $116.42   
  • New (4) from $116.42   
  • Used (2) from $159.17   

Overview

The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations. The emergence of data mining, and the larger field of Web mining, has businesses lost within a confusing maze of mechanisms and strategies for obtaining and managing crucial intelligence.

Web Data Mining and Applications in Business Intelligence and Counter-Terrorism responds by presenting a clear and comprehensive overview of Web mining, with emphasis on CRM and, for the first time, security and counter-terrorism applications. The tools and methods of Web mining are revealed in an easy-to-understand style, emphasizing the importance of practical, hands-on experience in the creation of successful e-business solutions.

The author, a program director for Data and Applications Security at the National Science Foundations, details how both opportunities and dangers on the Web can be identified and managed. Armed with the knowledge contained in this book, businesses can collect and analyze Web-based data to help develop customer relationships, increase sales, and identify existing and potential threats. Organizations can apply these same Web mining techniques to battle the real and present danger of terrorism, demonstrating Web mining's critical role in the intelligence arsenal.

Read More Show Less

Product Details

  • ISBN-13: 9780849314605
  • Publisher: CRC Press
  • Publication date: 4/15/2003
  • Pages: 544
  • Product dimensions: 6.40 (w) x 9.60 (h) x 1.38 (d)

Table of Contents

Introduction
Trends
Supporting Technologies for Web Data Mining
Web Data Mining Concepts
Web Data Mining and Counter-Terrorism
Organization of This Book
How Do We Proceed?

PART 1 SUPPORTING TECHNOLOGIES FOR WEB DATA MINING
WORLD WIDE WEB AND E-COMMERCE
Evolution of the Web
Introduction to E-Commerce
Relationship to Web Data Mining
Summary
DATA MINING
Data Mining Technologies
Concepts and Techniques in Data Mining
Directions and Trends in Data Mining
Relationship to Web Mining
Summary
CORE DATA MINING TECHNOLOGIES
Data Management and Data Warehousing
Statistical Reasoning
Machine Learning
Visualization
Parallel Processing
Decision Support
Architectural Support for Data Mining
Relationship to Web Data Mining
Summary
WEB DATABASE MANAGEMENT
Web Databases
Semi-Structured Databases
Metadata, Ontologies, and the Web
Distributed, Heterogeneous and Legacy Databases on the Web
Data Warehousing on the Web
Architectural Aspects
Relationship to Web Data Mining
Summary
INFORMATION RETRIEVAL SYSTEMS
Text Retrieval
Image Retrieval
Video Retrieval
Audio Retrieval
Multimedia Data and Information Management
Question Answering Systems
Markup Languages
Relationship to Web Data Mining
Summary

INFORMATION MANAGEMENT TECHNOLOGIES
Collaboration and Data Management
Knowledge Management
Agents for the Web
Training and Distance Learning
Wireless Information Management and Pervasive Computing
Sensor Information Management
Quality-Of-Service Aspects
Some Directions
Relationship to Web Data Mining
Summary
THE SEMANTIC WEB
Semantic Web Concepts
RDF
Role of Ontologies
Agents and the DAML Program
Semantic Web as a Database
XML, RDF, and Interoperability
Web Services
Note on E-Commerce and Semantic Web
Web versus the Semantic Web
Data Mining and the Semantic Web
Summary

PART 2 WEB DATA MINING TECHNIQUES, TOOLS, AND TRENDS
DATA MINING AND THE WEB
Mining Data on the Web
Mining Usage Patterns
Web Structure Mining
Applications and Directions
Summary

PROCESSES AND TECHNIQUES FOR WEB DATA MINING
Process of Web Data Mining
Web Data Mining Outcomes, Approaches, and Techniques
Web Data Mining versus Data Mining
Summary
MINING THE DATABASES ON THE WEB
Concepts in Web Database Mining
Mining Semi-Structured Databases
Metadata and Web Mining
Mining Distributed, Heterogeneous, Legacy, and Federated Databases on the Web
Architectures and Web Data Mining
Summary

INFORMATION RETRIEVAL AND WEB DATA MINING
Search Engines and Web Data Mining
Multimedia Data Mining and the Web
Some Other Aspects
Summary

INFORMATION MANAGEMENT AND WEB DATA MINING
Collaborative Data Mining
Knowledge Management and Web Data Mining
Training and Web Data Mining
Agents and Web Data Mining
Wireless Computing and Web Data Mining
Sensor Web Mining
Quality of Service and Web Data Mining
Other Aspects
Summary
SEMANTIC WEB MINING
Concepts In Semantic Web Mining
XML, RDF, and Web Data Mining
Ontologies and Web Data Mining
Agents and Web Data Mining
Web Mining and the Semantic Web as a Database
Semantic Interoperability and Web Mining
Web Services and Web Mining
Web Mining versus Semantic Web Mining
A Note on E-Commerce and Semantic Web Mining
Summary

MINING USAGE PATTERNS AND STRUCTURE ON THE WEB
Web Usage Mining Outcomes and Techniques
Web Usage Mining Analysis
CRM and Business Intelligence Applications
Mining Structure on the Web
Summary

PROTOTYPES, PRODUCTS, AND STANDARDS FOR WEB DATA MINING
Prototypes and Products for Data Mining
Web Data Mining Products
Standards for Web Mining
Summary
SOME APPLICATIONS FOR WEB MINING
E-Commerce And E-Business
Business Intelligence
Customer Relationship Management
Marketing and Sales
Enterprise Resource Management
Manufacturing and Planning
Education and Training
Telecommunications
Financial
Physical Sciences, Social Sciences, and Engineering
Medicine and Biotechnology
Counter-Terrorism
Summary

PART 3 WEB DATA MINING APPLICATIONS FOR COUNTER-TERRORISM

SOME INFORMATION ON TERRORISM, SECURITY THREATS, AND PROTECTION MEASURES
Natural Disasters and Human Errors
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non Real-Time Threats versus Real-Time Threats
Aspects of Counter-Terrorism
A Note on Privacy
Summary

WEB DATA MINING FOR COUNTER-TERRORISM
Web Data Mining for Counter-Terrorism
Analyzing the Techniques
Link Analysis
Summary

MINING THE WEB DATABASES FOR COUNTER-TERRORISM
Web Database Mining
Semi-Structured Database Mining
Metadata Mining
Warehouse Mining
Distributed and Heterogeneous Database Mining
Other Aspects
Summary

INFORMATION RETRIEVAL AND WEB MINING FOR COUNTER-TERRORISM
Exploiting and Using Intelligent Search Engines
Applying Multimedia Data Mining
Other Aspects
Summary

INFORMATION MANAGEMENT AND WEB MINING FOR COUNTER-TERRORISM
Collaborative Data Mining
Knowledge Management and Web Mining
Training and Web Mining
Agents and Web Mining
Wireless Information Management and Web Mining
Sensor Information Management and Web Mining
Quality of Service and Web Mining
Some Other Aspects
Summary

SEMANTIC WEB MINING FOR COUNTER-TERRORISM
Semantic Web Mining for Counter-Terrorism
Building the Semantic Web and Web Mining for Counter-Terrorism
Summary

WEB USAGE AND STRUCTURE MINING FOR COUNTER-TERRORISM
Web Usage Mining for Counter-Terrorism
Web Structure Mining for Counter-Terrorism
Summary

NATIONAL SECURITY, PRIVACY, CIVIL LIBERTIES, AND WEB MINING
Background on the Inference Problem
Mining, Warehousing, and Inference
Inductive Logic Programming and Inference
Privacy Issues
Inference Problem and Privacy
Privacy Enhanced Data Mining
Civil Liberties versus National Security
Summary

REVISITING SECURITY THREATS WITH RESPECT TO WEB MINING
Natural Disasters, Human Errors, and Malicious Attacks
Non-Information Related Terrorism
Information Related Terrorism
Bio-Terrorism, Chemical, and Nuclear Attacks
Attacks on Critical Infrastructures
Non-Realtime Threats versus Real-Time Threats
Revisiting Privacy
Summary

E-COMMERCE, BUSINESS INTELLIGENCE, AND COUNTER-TERRORISM
Models for Counter-Terrorism
Architectures for Counter-Terrorism
Functions for Counter-Terrorism
Revisiting Business Intelligence
Summary
SUMMARY AND DIRECTIONS
Summary of This Book
Challenges and Directions for Web Data Mining
Challenges and Directions for Web Data Mining for Counter-Terrorism
Impact of the Department of Homeland Security
Where Do We Go from Here?

PART 4 APPENDICES

DATA MANAGEMENT SYSTEMS: DEVELOPMENTS AND TRENDS
Developments in Database Systems
Status, Vision, and Issues
Data Management Systems Framework
Building Information Systems from the Framework
Relationship between the Texts
Summary

DATABASE SYSTEMS AND RELATED TECHNOLOGIES
Relational and Entity-Relationship Data Models
Architectural Issues
Database Design
Database Administration
Database Management System Functions
Distributed Databases
Heterogeneous Database Integration
Federated Databases
Client-Server Databases
Migrating Legacy Databases and Applications
Data Warehousing
Object Technology
Summary

DATA AND INFORMATION SECURITY
Access Control and Other Security Concepts
Secure Systems
Secure Database Systems
Emerging Trends
Impact of the Web
Summary

REFERENCES

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)