Advertisement

From Cognitive Science to Data Mining: The First Intelligence Amplifier

  • Tom Khabaza Email author
Chapter
Part of the Cognitive Systems Monographs book series (COSMOS, volume 22)

Abstract

This chapter gives an account of the nine Laws of Data Mining, and proposes two hypotheses about data mining and cognition. The nine Laws describe key properties of the data mining process, and their explanations explore the reasons behind these properties. The first hypothesis is that data mining is a kind of intelligence amplifier, because the data mining process enables the data miner to see things which they could not see unaided, as stated in the sixth law of data mining. The second hypothesis is that machine learning algorithms have a special value to data mining because they represent knowledge in a way which is cognitively plausible, and this makes them more suitable for intelligence amplification.

Keywords

Data Mining Data Preparation Business Objective Data Mining Algorithm Business Goal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

I would like to thank Chris Thornton and David Watkins, who inspired the initial concepts behind this work, Chris Thornton again for his help in formulating NFL-DM, and also all those who have contributed to the LinkedIn discussion group ‘9 Laws of Data Mining’, which has provided invaluable food for thought.

References

  1. Adderley R, Musgrove PB (1999) Data mining at the West Midlands Police: a study of bogus official burglaries. BCS special group expert systems. Springer, LondonGoogle Scholar
  2. Asaro PM (2008) From mechanisms of adaptation to intelligence amplifiers: the philosophy of W. Ross Ashby. In: Husbands P, Holland O, Wheeler M (eds) The mechanical mind in history. MIT Press, CambridgeGoogle Scholar
  3. Ashby WR (1956) An introduction to cybernetics. Chapman and Hall, LondonGoogle Scholar
  4. Berry MJA, Linoff G (1997) Data mining techniques: for marketing, sales and customer support. Wiley, New YorkGoogle Scholar
  5. Chang C-J, Shyue S-W (2009) A study on the application of data mining to disadvantaged social classes in Taiwan’s population census. Expert Syst Appl (Elsevier) 36:510–518Google Scholar
  6. Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C (1999) CRISP-DM 1.0: step-by-step data mining guide. http://www.crisp-dm.org
  7. du Boulay JBH, Khabaza T, Elsom-Cook M, Taylor J (1986) Poplog and the learner: an artificial intelligence environment used in education. In: Directory of computer training. Badegmore part Enterprises for Hoskyns EducationGoogle Scholar
  8. Engelbart DC (1962) Augmenting human intellect: a conceptual framework. Summary report AFOSR-3233. Stanford Research Institute, Menlo Park, CAGoogle Scholar
  9. Fitzsimons M, Khabaza T, Shearer C (1993) The application of rule induction and neural networks for television audience prediction. In: Proceedings of ESOMAR/EMAC/AFM symposium on information based decision making in marketing, Paris, November 1993, pp 69–82Google Scholar
  10. Helberg C (2002) Data mining with confidence, 2nd edn. SPSS, ChicagoGoogle Scholar
  11. Khabaza T, Shearer C (1995) Data mining with clementine. In: Proceedings of the IEE colloquium on knowledge discovery in databases, Digest No 1995/021(B), London, Feb 1995Google Scholar
  12. Khabaza T (2002) Hard hats for data miners: myths and pitfalls of data mining. Data mining. WIT Press. Reprinted as DM review special report 2007Google Scholar
  13. Khabaza T (2010) Nine laws of data mining. www.khabaza.com/9laws (also published as a discussion group on LinkedIn and on Twitter)
  14. Licklider JCR (1960) Man–computer symbiosis. IRE Trans Human Fact Electron HFE 1:4–11CrossRefGoogle Scholar
  15. McCue C (2006) Data mining and predictive analysis: intelligence gathering and crime analysis. Butterworth-Heinemann, BurlingtonGoogle Scholar
  16. Piatetsky-Shapiro G, Khabaza T, Ramaswamy S (2003) Capturing best practice for microarray gene expression analysis. In: Proceedings of the SIGKDD 2003, August 2003, WashingtonGoogle Scholar
  17. Sarma KS (2006) Predictive modeling with SAS enterprise miner. SAS Institute Inc, Cary, NCGoogle Scholar
  18. Shearer C, Khabaza T (1995) Data mining by data owners: presenting advanced technology to non-technologists through the clementine system. In: Intelligent data analysis ’95. Baden-baden, GermanyGoogle Scholar
  19. Siegel E (2013) Predictive analytics. Wiley, New JerseyGoogle Scholar
  20. Silipo R, Mazanetz MP (2012) The KNIME cookbook. KNIME Press, ZurichGoogle Scholar
  21. Van J (2003) SPSS tools unravel secrets of disease. Chicago Tribune (2003) Retrieved from: http://articles.chicagotribune.com/2003-01-11/business/0301110153_1_spss-software-clementine-software-tool
  22. Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann Elsevier, San FranciscoGoogle Scholar
  23. Wolpert D (1996) The lack of a priori distinctions between learning algorithms. Neural Comput 8:1341–1390CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.xxxxxxxxx

Personalised recommendations