IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

On Data Mining and Knowledge: Questions of Validity

On Data Mining and Knowledge: Questions of Validity
View Sample PDF
Author(s): Oliver Krone (Independent Scholar, Germany)
Copyright: 2010
Pages: 22
Source title: Data Mining in Public and Private Sectors: Organizational and Government Applications
Source Author(s)/Editor(s): Antti Syvajarvi (University of Lapland, Finland) and Jari Stenvall (Tampere University, Finland)
DOI: 10.4018/978-1-60566-906-9.ch009

Purchase

View On Data Mining and Knowledge: Questions of Validity on the publisher's website for pricing and purchasing information.

Abstract

Understanding data mining (DM) as part of Information Systems (IS) this contribution investigates the question how this subordination is reasoned in a technological and business logical perspective. For this purpose general characteristics of Enterprise Resources Planning Applications (ERP) and Management Information Systems (MIS; including here Decision Support and Expert Systems) are presented. Based on this evaluation it is examined how knowledge and DM are becoming interdependent for Knowledge Management (KM) in organizations. Knowledge is defined along the Penroseā€™an dichotomy of information and knowledge in the context of resources and services. Validity of knowledge is analyzed from a methodological (quantitative versus qualitative methods) perspective, probing what key characteristics of both method strands are, and how those fit into the discipline of Organizational Studies. Unveiling a relationship between security and information in Penrose, an alternative account of security originating in Foucault is presented. In this security and knowledge become means for standardization of live in order to allow for continuation of an abstracted, socially generated object. Combining arguments about validity of knowledge claims with that of security, DM based knowledge and security are identified as means abstracting from a human core and attempting constraining variability. Against this background researchers and users of DM based knowledge are asked for awareness of the constructed character of IS, and how much of this constructed character is contained in DM based knowledge.

Related Content

M. Govindarajan. © 2022. 23 pages.
Rajab Ssemwogerere, Wamwoyo Faruk, Nambobi Mutwalibi. © 2022. 33 pages.
Surabhi Verma, Ankit Kumar Jain. © 2022. 34 pages.
Kriti Aggarwal, Sunil K. Singh, Muskaan Chopra, Sudhakar Kumar. © 2022. 25 pages.
Praneeth Gunti, Brij B. Gupta, Elhadj Benkhelifa. © 2022. 26 pages.
Yin-Chun Fung, Lap-Kei Lee, Kwok Tai Chui, Gary Hoi-Kit Cheung, Chak-Him Tang, Sze-Man Wong. © 2022. 13 pages.
Lap-Kei Lee, Kwok Tai Chui, Jingjing Wang, Yin-Chun Fung, Zhanhui Tan. © 2022. 16 pages.
Body Bottom