LEADER 03639nam 22005775 450 001 9910155525703321 005 20200705052241.0 010 $a981-10-3340-4 024 7 $a10.1007/978-981-10-3340-7 035 $a(CKB)4340000000027203 035 $a(DE-He213)978-981-10-3340-7 035 $a(MiAaPQ)EBC4768843 035 $a(PPN)222231785 035 $a(EXLCZ)994340000000027203 100 $a20161210d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDescriptive Data Mining /$fby David L. Olson 205 $a1st ed. 2017. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2017. 215 $a1 online resource (XI, 116 p. 63 illus., 60 illus. in color.) 225 1 $aComputational Risk Management,$x2191-1436 311 $a981-10-3339-0 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aChapter 1 Knowledge Management -- Chapter 2: Data Visualization -- Chapter 3 Market Basket Analysis -- Chapter 4 Recency Frequency and Monetary Model -- Chapter 5 Association Rules -- Chapter 6 Cluster Analysis -- Chapter 7 Link Analysis -- Chapter 7 Link Analysis -- Chapter 8 Descriptive Data Mining -- References -- Index. 330 $aThis book offers an overview of knowledge management. It starts with an introduction to the subject, placing descriptive models in the context of the overall field as well as within the more specific field of data mining analysis. Chapter 2 covers data visualization, including directions for accessing R open source software (described through Rattle). Both R and Rattle are free to students. Chapter 3 then describes market basket analysis, comparing it with more advanced models, and addresses the concept of lift. Subsequently, Chapter 4 describes smarketing RFM models and compares it with more advanced predictive models. Next, Chapter 5 describes association rules, including the APriori algorithm and provides software support from R. Chapter 6 covers cluster analysis, including software support from R (Rattle), KNIME, and WEKA, all of which are open source. Chapter 7 goes on to describe link analysis, social network metrics, and open source NodeXL software, and demonstrates link analysis application using PolyAnalyst output. Chapter 8 concludes the monograph. Using business-related data to demonstrate models, this descriptive book explains how methods work with some citations, but without detailed references. The data sets and software selected are widely available and can easily be accessed. 410 0$aComputational Risk Management,$x2191-1436 606 $aBig data 606 $aData mining 606 $aRisk management 606 $aBig Data/Analytics$3https://scigraph.springernature.com/ontologies/product-market-codes/522070 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aRisk Management$3https://scigraph.springernature.com/ontologies/product-market-codes/612040 615 0$aBig data. 615 0$aData mining. 615 0$aRisk management. 615 14$aBig Data/Analytics. 615 24$aData Mining and Knowledge Discovery. 615 24$aRisk Management. 676 $a006.312 700 $aOlson$b David L$4aut$4http://id.loc.gov/vocabulary/relators/aut$0164565 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910155525703321 996 $aDescriptive Data Mining$92127141 997 $aUNINA