Practical Text Mining and Statistical Analysis for Non-Structured Text Data Applications 2012
DOI: 10.1016/b978-0-12-386979-1.03001-2
|View full text |Cite
|
Sign up to set email alerts
|

Dedication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The study used two data analysis methods. The first was text mining algorithms and the second was data mining algorithms that carried out a cluster analysis (Elder et al, 2012). The text mining algorithms counted the personality traits that the women surveyed listed as goals of their parents (Szymańska, 2017b) and created new binary variables that represented each personality trait that the women mentioned.…”
Section: Data Analysis Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The study used two data analysis methods. The first was text mining algorithms and the second was data mining algorithms that carried out a cluster analysis (Elder et al, 2012). The text mining algorithms counted the personality traits that the women surveyed listed as goals of their parents (Szymańska, 2017b) and created new binary variables that represented each personality trait that the women mentioned.…”
Section: Data Analysis Methodsmentioning
confidence: 99%
“…They extracted clusters of individuals who were similar in terms of their level of need satisfaction, their experience of parental mistakes, and the personality traits that their parents wanted to develop in them, as well as the personality traits they actually had. This method made it possible to determine the significance of differences between the clusters, to determine how strong the effect size was, and, using a standardized mean, to show how strong each variable was within a group (whether scores were low, medium or high) (Elder et al, 2012).…”
Section: Data Analysis Methodsmentioning
confidence: 99%
“…In any textual analysis, different preprocessing steps are necessary to handle data effectively (Elder et al, 2012). First, to ensure a consistent analysis of similar words (e.g., Fear vs. fear), cases were harmonized by transforming all the letters to lower case.…”
Section: Implementation Of a Text-mining Analysismentioning
confidence: 99%
“…Yet it is precisely this simplicity that renders the decision-tree method amenable to computational processes. In practice, the event tree is one form of a decision-tree method that constructs a set of coded steps and procedures that can be automated within an algorithm (Elder et al, 2012). A numeric conditional probability is assigned at each node, with the multiplication of the first layer of probability (Personnel Action to Stop Attack is not successful, P1 = 0.1) by the second layer (Security Equipment to Stop Attack Fails, P2 = 0.3), resulting in an a posteriori probability of a successful attack of 3%.…”
Section: ‘There Is All Kind Of Use For It As Part Of a Calculus’: Mathematical Grammars Of Securitymentioning
confidence: 99%
“…Reflecting for a moment on how mathematical devices are being used by the UK and European policing and counter-terror authorities to mine and analyse so-called open-source data such as Facebook text or Twitter feeds, there is currently some debate over the intrinsic quality of unstructured data that could be considered to be terrorism-related data. 10 The growth of consumer ‘sentiment analysis’ to ‘take the pulse’ of a ‘specific target group’ through its members’ web discussions is now increasingly mirrored by what is called ‘meaning extraction’ for counter-terrorism (Elder et al, 2012: 57). As I showed in the ACM example of web-based analytics, the linking of unstructured open-source data to existing structured data in work file attributes is thought to enhance the capacity of the analyst to predict some possible emergent threat.…”
Section: ‘There Is All Kind Of Use For It As Part Of a Calculus’: Mathematical Grammars Of Securitymentioning
confidence: 99%