Using text mining to create actionable knowledge: Application to network failure incident reports

Joseph Williamson, Kevin Dooley, Steven Corman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Leading in the innovation economy [1] requires an ability to create, comprehend, and utilize dynamic and distributed knowledge assets. This must be accomplished in a reliable, timely, and cost effective manner. Text mining technology has great potential to enhance knowledge management systems because it provides an objective analysis (reliable) of existing knowledge assets (cost effective) in a rapid manner (timely). We show, through a case study involving the analysis of computer network failure incident reports that deep analytics can be used to create actionable knowledge concerning the technical system, and entity extraction can be used to highlight the underlying social architecture of the system. Centering resonance analysis is employed to create a data model of each incident report, and hierarchical clustering, factor analysis, time series analysis, and social network analysis are used to generate insights into the management, execution, and control of the computer network system and its underlying social system.

Original languageEnglish (US)
Title of host publicationLecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
EditorsD. Karagiannis, U. Reimer
Pages71-81
Number of pages11
Volume3336
StatePublished - 2004
Externally publishedYes
Event5th International Conference PAKM 2004: Practical Aspects of Knowledge Management - Vienna, Austria
Duration: Dec 2 2004Dec 3 2004

Other

Other5th International Conference PAKM 2004: Practical Aspects of Knowledge Management
CountryAustria
CityVienna
Period12/2/0412/3/04

ASJC Scopus subject areas

  • Hardware and Architecture

Fingerprint Dive into the research topics of 'Using text mining to create actionable knowledge: Application to network failure incident reports'. Together they form a unique fingerprint.

Cite this