Preview

What Can Businesses Learn from Text Mining

Better Essays
Open Document
Open Document
2160 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Can Businesses Learn from Text Mining
Case StudyWhat Can Businesses Learn From Text Mining?Text mining is the discovery of patterns and relationships from large sets of unstructured data – the kind of data we generate in e-mails, phone conversations, blog postings, online customer surveys, and tweets. The mobile digital platform has amplified the explosion in digital information, with hundreds of millions of people calling, texting, searching, “apping” (using applications), buying goods and writing billions of e-mails on the go.Consumers today are more than just consumers: they have more ways to collaborate, share information, and influence the opinions of their friends and peers; and the data that they create in doing so have significant value to businesses. Unlike structured data, which are generated from events such as completing a purchase transaction, unstructured data have no distinct form. Nevertheless, managers believe such data may offer unique insights into customer behaviour and attitudes that were much more difficult to determine years ago.For example, in 2007 JetBlue (the American Airline) experienced unprecedented levels of customer discontent in the wake of a February ice storm that resulted in widespread flight cancellations and planes stranded on Kennedy Airport runways. The airline received 15,000 emails per day from customers during the storm and immediately afterwards, up from its usual daily volume of 400. The volume was so much larger than usual that JetBlue had no simple way to read everything that its customers were saying.Fortunately, the company had recently contracted with Attensity, a leading vendor of text analytics software, and was able to use the software to analyze all of the e-mail it had received within two days. According to JetBlue research analyst Bryan Jeppsen, Attensity Analyze for Voice of the Customer (VoC) enabled JetBlue to rapidly extract customer sentiments, preferences, and requests it couldn’t find any other way. This tool uses a proprietary technology to


Bibliography: Online Sources Daily Mail Online (2010) Big Brother society is bigger than ever: New technology is ‘undermining privacy by stealth’ Available at: http://www.dailymail.co.uk/news/article-1328445/Big-Brother-society-bigger-New-technology-undermining-privacy-stealth.html#ixzz1s9qMFfIg (Accessed 10/04/2012) JISC (2012) The Value and Benefit of Text Mining to UK Further and Higher Education. Digital Infrastructure Available at: http://bit.ly/jisc-textm (Accessed 10/04/2012) Nucleus Research (2007) SPSS Text Mining. Available at: http://www.spss.ch/eupload/File/PDF/Guidebook%20--%20SPSS%20Text%20Mining.pdf (Accessed 10/04/2012) World Academy of Science, Engineering and Technology (2005) Powerful Tool to Expand Business Intelligence: Text Mining. Available at: http://www.waset.org/journals/waset/v8/v8-21.pdf (Accessed 10/04/2012)

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3 Study Essay

    • 3921 Words
    • 16 Pages

    1. How can text mining be used in a crisis situation? Text mining makes it easy for the end user to take the knowledge discovered by the analytics tools and embed it in a concise and useful form in an intelligence product. MITRE would allow the user to select various text mining tools and, with a few mouse clicks, assemble them to create a complex filter that fulfills whatever knowledge discovery function is currently needed. An analyst might use text mining to discover important nuggest of information in a large collection of news sources.…

    • 3921 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In George Orwell's novel 1984, the society was brainwashed and controlled by their government. They were stripped of their rights by "Big Brother". The government says they’re at war, but the citizens never hear of the enemy battles or see them on television. The government makes them watch certain programs, and always has them under surveillance. It is as if the people of this generation cannot do anything without the government having planned it already or them watching what the citizens are doing. The government invades the privacy of the people. Our government recently used the Patriot Act as a way to invade the privacy of many people.…

    • 789 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Our technology is driving society to a world in which Big Brother is watching. There has been many technological advances made over time that can be used by the government to have power over the population. Many people are unaware of this situation they have been placed in the instant that they make a phone call, log into a computer or send an email.…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The article “Visible Man” written by Peter Singer discusses the issues that are involved with the topic of privacy. Many people feel that they are comfortable with the actions they are taking but they do not realize the information they are putting out into the real world. Singer explains how government officials use cell phone providers to gain insight on certain individuals. The idea that is stressed in this article is that too much privacy is never good, especially with government officials because the confidential information that gets leaked informs society on what it going on behind the scenes. The more information one can gather about a topic, the more informed they will be; furthermore, being well educated on a topic will allow one…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The author of this article is Daniel J. Solove. He discusses the different perspectives and opinions of various people of the government’s control of viewing personal information. The article demonstrates this through examples of what people say, book references, and the opinion of the article himself. In the article, “The Nothing to Hide Argument”, Daniel J. Solove argues that the information- gathering programs the government uses to track and record information from people are problematic.(739) This still remains the case even if the information gathered from these programs was information people did not mind being uncovered. (739).…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Indivdual Assignment

    • 358 Words
    • 2 Pages

    “Does the massive use of Big Brother surveillance technologies make you feel safer because it can protect you from crime, or less safe because of possible violations of your civil liberties? Will you be more careful now using communication technologies, knowing that anything you type or send electronically could be reconstructed and used to judge your lawfulness or your character?”…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Isds Ch 5

    • 3328 Words
    • 14 Pages

    3) Text mining is important to competitive advantage because knowledge is power, and knowledge is derived from text data sources.…

    • 3328 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    1984

    • 714 Words
    • 3 Pages

    I completely agree that our technology today is bringing us closer to the world of Big Brother. I agree because even though we are not forced necessarily to mask emotions and hinder temptations, most of us (U.S.) lead lives which in reality are lead by the technology at our disposal. I would not be surprised if the government taps into our many devices such as computers, phones, and even private surveillance cameras to monitor our every breath and move. This greatly worries me, it makes me want to get out of this country and find refuge in a technology free paradise.…

    • 714 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Jared Day Mr. Ruffolo Perspectives 12 20 October 2014 Surveillance It is safe to say that people live in an age where it is possible to say that one is alone and privacy doesn’t exist. People are always being watched, tracked, listened to, and investigated. In the book 1984 one of the main topics would be that “BIG BROTHER IS WATCHING YOU” ( 2). Wherever they go, they feel as if they are being watched.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Privacy is Utterly Dead Peter Singer is the Ira W. DeCamp Professor at Princeton University and the University of Melbourne that studies Bioethics, Philosophy and Public Ethics. His essay “Visible Man: Ethics in a World without Secrets” focuses on transparency and personal privacy. One can see after reading this essay, Singer is in favor of openness, but he also notes that the government misuses these technologies by having sousveillance and surveillance cameras. A person needs to understand how privacy, surveillance and sousveillance is defined to understand why he was in favor of openness.…

    • 1306 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The concept of living in a surveillance society with no fear as long as individuals have nothing to hide sounds ideal; but even if people are not guilty of committing a crime, there are a number of reasons why loss of privacy should concern them. A significant concern is that the…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Better Essays

    The Fourth Crusade

    • 1286 Words
    • 6 Pages

    The Crusades in the middle ages helped define religious and political life during this era. Life in the middle ages revolved around what was happening with the Pope and his anticipations for the next Crusade. The focuses of the crusades were ideally to unite the churches to bring back Christian leadership and control in the Holy Land, that is, Jerusalem. One of the most impacting crusades is known as the fourth Crusade when Innocent III was pope. The fourth crusade became terribly diverted from its original plans and became one of the most tragic and barbaric of all the crusades.…

    • 1286 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    [2] Larissa T. Moss, S. A. (2003). Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications. Addison Wesley.…

    • 2794 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Business Intelligence

    • 1635 Words
    • 7 Pages

    Data mining and OLAP are the most common Business Intelligence technologies. The term Business Intelligence refers to computer based methods to identify and extract useful information from business data. Online Analytical Processing commonly known as OLAP provides summary data and generates rich calculations. OLAP is a class of systems that provide answers to multidimensional queries. OLAP is typically used in business reporting for sales, marketing and various such domains. OLAP enables the users to view the data interactively from multiple perspectives.…

    • 1635 Words
    • 7 Pages
    Powerful Essays