Analysis of Data Mining

ITKM Analysis of Data Mining The article Data Mining by Christopher Clifton analyzed how different types of data mining techniques have been applied in crime detection and different outcomes. Moreover, the analysis proposed how the different data mining techniques can be used in detection of different form of frauds. The analysis gave the advantages and disadvantages of using data mining in different operation. The major advantage was that data mining enables analysis of large quantities of data. This is important since such data cannot be analyzed manually since the data is often complex for humans to understand.
However, data mining techniques have been used for deceitful purposes such as inappropriate disclosure of private information. The article analyzed different data mining techniques. Predictive modeling is one such technique used in estimation of particular target attribute. Descriptive modeling was another technique, which entails dividing data into groups. The other techniques described include pattern mining used in identification of rules relating to different data pattern and anomaly detection, which entails determining the unusual instances that, may arise when using the different data-mining model. ) What is the title and what was the objective of the study/analysis) The title of the article was data mining. The article focused on skills in knowledge discovery can be used in analysis of large volumes of data sets. According to the article, data mining was invented about one and a half decades ago due to the advances in artificial intelligence. Discovery of expert system, genetic algorithms, neural networks, and machine leaning led to develop ways to adapt these schemes and use them for data mining purposes.
Related article: What Business Can Learn From Text Mining

The objective of the article was to give a history of data mining, the different types of data mining and the application of data mining in different fields such as business, scientific research, as well as by security agents in detection of crimes and terrorist activities (Clifton Web). Regarding the history of data mining, the article stated that data mining was first implemented in credit card fraud detection. The 2) What data mining algorithm was used (i. e. cluster analysis, decision tree, neural network, other) and describe the algorithm?
The analysis used both decision tree algorithm and clustering algorithm. By using decision tree algorithm, the information regarding data mining techniques was grouped by making use of predefined knowledge. The analysis entails description of different crime detection techniques. Moreover, the most appropriate technique for detection of different types of crimes was suggested based on the profitability of using any single technique. Using clustering technique, the data was divided into different groups to obtain certain patterns. Such pattern included classification to data mining techniques based on their uses.
This was used to develop ways in which the different techniques can be applied in business (Clifton Web). 3) What was the outcome of the analysis, and how did it benefit the business, if there was a benefit? The analysis identified the various data mining techniques, their applications, strengths and weaknesses. The analysis was important to the business world. For example, the analysis on use of data mining in detection of credit card fraud identified the challenges involved on the process. This was crucial since it gave insights on how different techniques can be developed to make data mining more effective in credit card fraud detection.
Another reason why the analysis was important to the business world was that it analyzed the different data mining approaches such as predictive modeling, descriptive modeling, pattern mining, and anomaly detection. The analysis explained how the different techniques work. Moreover, the analysis was crucial since it provided insights on how different techniques can be used in detection of fraud crime in different types of business transaction. Moreover, it highlighted the shortcoming on the different techniques. This is crucial since it provided intuitions on areas that can be improved to make the techniques more effective (Clifton Web).
An additional reason why the analysis was important is that it pinpointed the issues that arise when using data mining techniques in fraud detection. One such issue is privacy concern. This was crucial since it gave insights on how the business world can continue using data mining techniques to combat crime without risking loss of reputation. Moreover, the companies can use data mining for fraud detection crimes while making less error such as those of biasness (Clifton Web). Conclusion Data mining has undergone modification with technological advancement. Data mining play a great role in enabling detection of problems such as frauds.
This is because it enables analysis of large and complex quantities of data. In the article about data mining, Clifton used both decision tree and cluster analysis to assess the different types of data mining. By using decision tree, the author group data mining based on the techniques used. By using clustering, the data was grouped to obtain certain patterns. The analysis was important to business world since it provided insights on how the different data mining techniques work. Works Cited Clifton, Christopher. “data mining . ” Encyclopedia Bratanicca (n. d. ): 1-3. Web. .


Personal Data Protection

Personal data (2012, Online) means “data relating to a living individual who is or can be identified either from the data or from the data in conjunction with other information that is in, or is likely to come into, the possession of the data controller”. The Data Protection Act 1988 – 2003 guarantee individuals right to protection their personal data and explain duties of Data Controllers. This act apply to organizations that uphold information on individuals which can contain telephone number, address, account details, nationality, religion, physical or mental health and/or other sensitive information.
The Data Protection Commissioner has approved a personal data security breach Code of Practice to help organisations to react appropriately when they become aware of breaches of security personal information they maintain. The Data Controllers are required to: • collect and process information fairly • keep them only in one or more specified and legal purposes • use information for the purposes for which their were collected • keep them safe and secure keep them accurate, complete and up-to-date • not stored them longer than is necessary Every person may obtain a copy of their entire personal data by written request to any organization or individual who holds personal information, unless the Government instructs the Data Controller to withhold the information, data subject also has a right to correct any inaccurate information or, in some cases, such information can be completely removed.
The Code of Practice does not apply to providers of publicly available electronic communications networks or services. Providers of publicly available electronic communications networks or services are required to have a security policy, ensure that personal data can only be used by authorised personnel for specified purposes and protect personal data against unlawful use or access.