Skip to main content

Activity Mining: Challenges and Prospects

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4093))

Abstract

Activity data accumulated in real life, e.g. in terrorist activities and fraudulent customer contacts, presents special structural and semantic complexities. However, it may lead to or be associated with significant business impacts. For instance, a series of terrorist activities may trigger a disaster to the society, large amounts of fraudulent activities in social security program may result in huge government customer debt. Mining such data challenges the existing KDD research in aspects such as unbalanced data distribution and impact-targeted pattern mining. This paper investigates the characteristics and challenges of activity data, and the methodologies and tasks of activity mining. Activity mining aims to discover impact-targeted activity patterns in huge volumes of unbalanced activity transactions. Activity patterns identified can prevent disastrous events or improve business decision making and processes. We illustrate issues and prospects in mining governmental customer contacts.

This work is sponsored by Australian Research Council Discovery Grant (DP0667060), China Overseas Outstanding Talent Research Program of Chinese Academy of Sciences (06S3011S01), and UTS ECRG and Chancellor grants.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, L., Zhang, C.: Domain-driven data mining: a practical methodology. Int. J. of Data Warehousing and Mining (2006)

    Google Scholar 

  2. Centrelink. Integrated activity management developer guide (1999)

    Google Scholar 

  3. Centrelink. Centrelink annual report (2004-2005)

    Google Scholar 

  4. Guralnik, V., Srivastava, J.: Event Detection from Time Series Data. In: KDD 1999, pp. 33–42 (1999)

    Google Scholar 

  5. Hammori, M., Herbst, J., Kleiner, N.: Interactive workflow mining—requirements, concepts and implementation. Data & Knowledge Engineering 56, 41–63 (2006)

    Article  Google Scholar 

  6. Han, J., Pei, J., Yan, X.: Sequential Pattern Mining by Pattern-Growth: Principles and Extensions. In: Recent Advances in Data Mining and Granular Computing, Springer, Heidelberg (2005)

    Google Scholar 

  7. Mena, J.: Investigative Data Mining for Security and Criminal Detection, 1st edn. Butterworth-Heinemann (2003)

    Google Scholar 

  8. National Research Council, Making the Nation Safer: The Role of Science and Technology in Countering Terrorism, Nat’l Academy Press (2002)

    Google Scholar 

  9. Pazzani, M.: A Computational Theory of Learning Causal Relationships. Cognitive Science 15, 401–424 (1991)

    Article  Google Scholar 

  10. Potts, W.: Survival Data Mining: Modeling Customer Event Histories (2006)

    Google Scholar 

  11. Silberschatz, A., Tuzhilin, A.: What makes patterns interesting in knowledge discovery systems. IEEE TKDE 8(6), 970–974 (1996)

    Google Scholar 

  12. Skop, M.: Survival analysis and event history analysis. © Michal Škop (2005)

    Google Scholar 

  13. Van der Aalst, W.M.P., Weijters, A.J.M.M.: Process mining: a research agenda. Computers in Industry 53, 231–244 (2004)

    Article  Google Scholar 

  14. Williams, G., et al.: Temporal Event Mining of Linked Medical Claims Data. In: Whang, K.-Y., Jeon, J., Shim, K., Srivastava, J. (eds.) PAKDD 2003. LNCS (LNAI), vol. 2637, Springer, Heidelberg (2003)

    Google Scholar 

  15. Zhang, J., Bloedorn, E., Rosen, L., Venese, D.: Learning rules from highly unbalanced data sets. In: 2004 ICDM Proceedings, pp. 571–574 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cao, L. (2006). Activity Mining: Challenges and Prospects. In: Li, X., Zaïane, O.R., Li, Z. (eds) Advanced Data Mining and Applications. ADMA 2006. Lecture Notes in Computer Science(), vol 4093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11811305_65

Download citation

  • DOI: https://doi.org/10.1007/11811305_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37025-3

  • Online ISBN: 978-3-540-37026-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics