Professional Documents
Culture Documents
Mining Offensive Behavrioul Rules
Mining Offensive Behavrioul Rules
Mining Offensive Behavrioul Rules
a r t i c l e
i n f o
Article history:
Received 23 October 2011
Received in revised form 2 March 2012
Accepted 29 April 2012
Available online 10 May 2012
Keywords:
Data mining
Actionable knowledge discovery
Actionable behavioral rule
a b s t r a c t
Many applications can benet from constructing models to predict the behavior of an entity. However, such
models do not provide the user with explicit knowledge that can be directly used to inuence (restrain or
encourage) behavior for the user's interest. Undoubtedly, the user often exactly needs such knowledge.
This type of knowledge is called actionable knowledge. Actionability is a very important criterion measuring
the interestingness of mined patterns. In this paper, to mine such knowledge, we take a rst step toward
formally dening a new class of data mining problem, named actionable behavioral rule mining. Our denition
explicitly states the problem as a search problem in a framework of support and expected utility. We also
propose two algorithms for mining such rules. Our experiment shows the validity of our approach, as well
as the practical value of our dened problem.
2012 Elsevier B.V. All rights reserved.
1. Introduction
The behavior of an entity, be it an individual, group, organization,
or country, is often greatly inuenced by various environmental (e.g.,
social, political, cultural, and economical) factors [24]. Knowledge of
such inuence discovered through data mining has been shown to
be extremely valuable for the user (e.g., a corporation or government)
in many application domains, from homeland security to public policy,
to business intelligence, to name a few.
Past related studies (e.g., [25,22,5,10,11]) have mainly focused on
model building and interpretation. In particular, most of these studies
aim at constructing predictive models, which provide predictions like
group g will have behavior b if condition c holds. While such predictions may be very valuable for the user in getting ready for the predicted
behavior of the entity in concern, they do not directly and explicitly
suggest specic actions to take to inuence (restrain or encourage)
the behavior for the user's interest. The user, however, often exactly
needs such knowledge.
Consider an example in security informatics. In a hypothetical
scenario, assume that recently, Hezbollah has launched frequent violent
terrorist attacks, and consequently, the Lebanese government is facing
mounting domestic and international pressures. The Lebanese government certainly wants to change this situation by taking some effective
actions to restrain terroristic behaviors of Hezbollah. As such, reliable
propositions or predictions in the form of rules, such as the following,
will be of signicant value and interest.
Corresponding author.
E-mail addresses: peng.su.casia@gmail.com (P. Su), wenji.mao@ia.ac.cn (W. Mao),
zeng@email.arizona.edu (D. Zeng), hzhao@uwm.edu (H. Zhao).
0167-9236/$ see front matter 2012 Elsevier B.V. All rights reserved.
doi:10.1016/j.dss.2012.04.013
143
Table 1
Function in behavioral information system I.
o*
o1
o2
o3
o4
o5
o6
o7
o8
o9
o10
ORSTPOLSUP
ORGCULTGR
DEMORGVIOLENCE
TRANSVIOLENCE
e1
e2
b1
b2
1
1
1
1
1
0
0
0
0
0
0
1
1
0
0
0
1
1
1
0
0
0
2
2
2
1
1
1
2
2
0
0
1
2
2
1
2
2
1
1
1
0
1
0
144
ep C
where util(t) and util(ep. e) denote the utilities of action t and effect ep. e,
respectively. We call an actionable behavioral rule r an interesting
actionable behavioral rule with regard to a user-specied threshold
minutil, if util(r) minutil.
Example. Assume that the utilities of (e1, 1, 0), (e2, 1, 0), (b1, 2,0),
(b1, 2, 1), (b2, 2, 0), and (b2, 2, 1) are 1, 2, 5, 2, 3, and 1, respectively.
The expected utility of ({(e1, 1, 0)}, {((b1, 2, 0), 1/3), ((b1, 2, 1), 1/3),
((b1,2, 2),1/3),((b2,2, 0),1/3),((b2,2, 1),2/3),((b2,2, 2), 0)}) is u((e1,1,
0))+u((b1,2, 0))1/3+u((b1,2, 1))1/3+u((b2,2, 0))1/3+u((b2,2,
1))2/3=3.
The actionable behavioral rule ({(e1,1,0)},{((b1,2, 0),2/9), ((b1,2, 1),
1/3),((b1, 2, 2), 4/9),((b2,2, 0),2/9),((b2, 2, 1), 7/9), ((b2,2, 2), 0)}) suggests the following. If ORSTPOLSUP is changed from level 1 to 0, the
DOMORGVIOLENCE of Hezbollah will change from level 2 to 0 with a
probability of 2/9, or to 1 with a probability of 1/3, or remain unchanged
with a probability of 4/9, and TRANSVIOLTARG of Hezbollah will change
from level 2 to 0 with a probability of 2/9, or to 1 with a probability of 7/9,
or remain unchanged with a probability of 0.
Now we have formally dened actionable behavioral rules. The
problem of mining actionable behavioral rules is to mine all reliable
and interesting actionable behavioral rules from a behavioral information system. The threshold minsup is used to assure that the rules are
not found by chance. The threshold minutil is used to assure that the
rules are sufciently beneciary to warrant deliberation by the user.
3. Mining algorithms
We have developed two algorithms, named MABR-1 and MABR-2
(for Mining Actionable Behavioral Rules). In this section, we describe
the algorithms in detail.
3.1. The MABR-1 algorithm
Table 2 outlines the algorithm MABR-1, which consists of three
phases, candidate actionable behavioral rule generation, rule pruning
and interesting actionable behavioral rule generation.
3.1.1. Candidate rule generation
In this phase, rstly, all frequent action sets are generated. Then,
actionable behavioral rules with frequent action sets are generated.
The generation of frequent action sets is similar to the procedure of
generating frequent item sets in the Apriori algorithm for association
rule mining [1]. The key idea lies in the downward-closed property
of the support of an action set. That is, if an action set has a support
above minsup, all of its subsets (i.e., general action sets) have supports
above minsup. This property is used to effectively reduce the number
of potential frequent action sets that need to be checked.
Starting from frequent 1-action sets (by calling function Select in
Line 1), the algorithm iteratively nds frequent 2-action sets, 3-action
sets, and so forth, until there is no frequent k-action sets (Lines 36).
During each iteration, the set of frequent k-action sets is used to generate a set of potential frequent (k + 1)-action sets (by calling function
Generate in Line 4), which is then checked by computing the supports
based on the dataset (by calling function Select in Line 5). With each
frequent action set, a candidate actionable behavioral rule is generated
(by calling function CR_Construct in Line 9). The outcome of phase 1 is
the set of candidate actionable behavioral rules.
3.1.2. Rule pruning
In the previous phase, all action combinations are considered in
turn as a rule's condition. Therefore, the candidate rules may share
actions in their conditions, and for this reason there could be several
rules with same standard actions, and different non-standard actions,
consequences and expected utilities. Thus to deal with this problem,
the candidate rules generated are pruned in this phase based on the
following denitions.
Denition 6. Let I = (O, o*, A, D, ) be a behavioral information system.
We say that actionable behavioral rule r is a general rule with regard to
another actionable behavioral rule r' and r ' is a specic rule with regard
to r, if r. S is a proper subset of r'. S and r '. S \ r. S contains non-standard
actions only. We call r R a most specic rule in the actionable behavioral
rule set R if for any specic rule r' with regard to r, r' R.
Example. ({(e1, 1, 0)}, {((b1, 2, 0), 1/3), ((b1, 2, 1), 1/3), ((b1, 2, 2), 1/3),
((b2, 2, 0), 1/3), ((b2, 2, 1), 2/3), ((b2, 2, 2), 0)}) is a general rule with
regard to ({(e1, 1, 0), (e2, 1, 1)},{((b1, 2, 0), 0), ((b1, 2, 1), 1/3), ((b1, 2, 2),
2/3), ((b2, 2, 0), 0), ((b2, 2, 1), 1), ((b2, 2, 2), 0)}).
Denition 7. Let I = (O, o*, A, D, ) be a behavioral information system.
A binary equivalence relation ~ on an actionable behavioral rule set R is
dened as follows. For any cr1, cr2 R, cr1 ~ cr2, if for any standard action
a cr1. S, a cr2. S, and for any standard action b cr2. S, b cr1. S. A
consolidated rule with regard to a largest equivalence class L of ~ on R
is dened as an actionable behavioral rule r where r. S = {a cr
Lcr. S|a is a standard action} and for any ep r. C, ep. p = f q:p
crL
supcr:S= supl:S, where fq cr. C and fq. e = ep. e.
lL
Example. ({(e1, 1, 0)}, {((b1, 2, 0), 1/3), ((b1, 2, 1), 1/3), ((b1, 2, 2), 1/3),
((b2, 2, 0), 1/3), ((b2, 2, 1), 2/3), ((b2, 2, 2), 0)}) is equivalent to ({(e1, 1,
0), (e2, 1, 1)}, {((b1, 2, 0), 0), ((b1, 2, 1), 1/3), ((b1, 2, 2), 2/3), ((b2, 2, 0), 0),
((b2, 2, 1), 1), ((b2, 2, 2), 0)}), but is not equivalent to ({(e1, 1, 0), (e2,1,0)},
{((b1, 2, 0), 2/3), ((b1, 2, 1), 1/3), ((b1, 2, 2), 0), ((b2, 2, 0), 2/3), ((b2, 2,
1), 1/3), ((b2, 2, 2), 0)}).({(e1, 1, 0)}, {((b1, 2, 0), 2/9), ((b1, 2, 1), 1/3),
((b1, 2, 2), 4/9), ((b2, 2, 0), 2/9), ((b2, 2, 1), 7/9), ((b2, 2, 2), 0)}) is a
consolidated actionable behavioral rule pertinent to the only largest
equivalence class of ~ on
9
8
b1 ; 2; 0; 1=3; b1 ; 2; 1; 1=3; b1 ; 2; 2; 1=3;
>
>
>
;>
=
< fe1 ; 1; 0g;
b2 ; 2; 0; 1=3; b2 ; 2; 1; 2=3; b2 ; 2; 2; 0 :
>
e
>
;
1;
0
;
b
;
2;
0
;
0
;
b
;
2;
1
;
1=3
;
b
;
2;
2
;
2=3
;
1
1
1
1
>
>
;
:
;
e2 ; 1; 1
b2 ; 2; 0; 0; b2 ; 2; 1; 1; b2 ; 2; 2; 0
145
Table 2
The MABR-1 algorithm.
{(e1, 1, 0), (e2, 1, 1)}, {(e1, 1, 0), (e2, 1, 0)}} is generated. Fourth, the
set of the most specic frequent action sets {{(e1, 1, 1), (e2, 1, 0)},
{(e1, 1, 0), (e2, 1, 1)}, {(e1, 1, 0), (e2, 1, 0)}} is generated. Fifth, the set
of the candidate actionable behavioral rules
9
8
e1 ; 1; 1;
b1 ; 2; 0; 0; b1 ; 2; 1; 2=3; b1 ; 2; 2; 1=3;
>
>
>
;
;>
>
>
>
e ; 1; 0 b2 ; 2; 0; 0; b2 ; 2; 1; 1=3; b2 ; 2; 2; 2=3 >
>
>
>
>
< 2
=
e1 ; 1; 0;
b1 ; 2; 0; 0; b1 ; 2; 1; 1=3; b1 ; 2; 2; 2=3;
;
;
e ; 1; 1 b2 ; 2; 0; 0; b2 ; 2; 1; 1; b2 ; 2; 2; 0 >
>
>
>
> 2
>
>
>
>
>
e1 ; 1; 0;
b1 ; 2; 0; 2=3; b1 ; 2; 1; 1=3; b1 ; 2; 2; 0;
>
>
:
;
;
e2 ; 1; 0
b2 ; 2; 0; 2=3; b2 ; 2; 1; 1=3; b2 ; 2; 2; 0
146
;
2;
0
;
0
;
b
;
2;
1
;
1
;
b
;
2;
2
;
0
2
2
2
10
>
>
e1 ; 1; 0;
b1 ; 2; 0; 2=3; b1 ; 2; 1; 1=3; b1 ; 2; 2; 0;
>
>
;
:
;
;
e2 ; 1; 0
b2 ; 2; 0; 2=3; b2 ; 2; 1; 1=3; b2 ; 2; 2; 0
3
information system. The steps for rule pruning and interesting rules
generation (Lines 1521) are identical to those in MABR-1. The recursive
procedure Insert (Lines 2332) inserts the sorted frequent 1-action sets
supported by an observation into the FA-tree. The recursive procedure
Construct (Lines 3343) constructs all frequent k-action sets (k >1).
The size (number of nodes) of an FA-tree is bounded by jLoj
oO
4. Experimental study
We have fully implemented our proposed approach to actionable
behavioral rule mining. In this section, we empirically validate our
approach, show an interesting example of the mined rules, and compare the running times of MABR-1 and MABR-2.
147
Table 3
The MABR-2 algorithm.
148
(a)
(b)
(c)
(d)
(e)
Fig. 1. Illustration of running MABR-II. (a) FA-tree T, conditional subtrees and conditional FA-trees of: (b) T.header [4], (c) T.header [3], (d) T.header [2], (e) T.header [1].
there exists an effectprobability ((a, (o*, a), v), |{o O|(o, a) = v}|/|O|)
C. Note that the expected utility of r is computed using Eq. (1).
4.3. Evaluation criterion
Let au be the actual utility when an action set S are taken actually.
Let eu be the expected utility of the consolidate actionable behavioral
rule with S as its antecedent our approach generates or the rule the
baseline approach generates with S. Certainly, we want the absolute
difference between eu and au to be as small as possible. Thus, we
use the mean absolute error (MAE), a standard measure for assessing
the closeness between predictions and eventual outcomes, as the
criterion for evaluating the performance of our approach and the
baseline approach. The MAE is given by
n
1X
jeui aui j;
n i1
have been recorded in the MAROB dataset. Thus, the actual utility of
the actions can be computed according to the observations for this
year and the previous year. If for this year, our approach can give
the consolidated actionable behavioral rule cr with the same actions
as the actual ones taken by the government, then the absolute difference between the actual utility and the expected utility of cr or the
rule the baseline approach generates with the actual actions should
be considered. Note that the input parameter O includes all the observations for years from 1982 to 2004 except for this year.
4.4. Experimental results
Table 4 shows the experimental results on the three sub MAROB
datasets with 31 actual action sets that are antecedent of some
consolidated actionable behavioral rules. Note that there is no other
actual action set that is antecedent of any consolidated rule. The
table entries present the actual utilities, the absolute errors of the
baseline approach and the MABR algorithms, with minsup set to 5.
For the absolute errors, the means and standard deviations are
presented.
Note that although the utilities of actionable behavioral rulesinduced actions and effects were assigned by the experts in a subjective
fashion, what is actually compared in our experiment is the absolute
difference between the actual utility and the expected utility of the
action set induced by a rule. For the same action set, different methods
Action
set
Actual
utility
Absolute error
Baseline
MABRs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Mean
SD
0.006
0.246
0.194
0.072
0.008
0.012
0.000
0.003
0.004
0.064
0.004
0.016
0.006
0.003
0.154
0.017
0.016
0.004
0.086
0.011
0.011
0.006
0.077
0.084
0.077
0.071
0.004
0.120
0.011
0.010
0.117
0.091
0.184
0.298
0.056
0.107
0.103
0.115
0.112
0.111
0.179
0.111
0.099
0.109
0.112
0.269
0.098
0.099
0.111
0.175
0.015
0.015
0.015
0.062
0.175
0.062
0.062
0.098
0.213
0.027
0.027
0.142
0.092
0.118
0.085
0.123
0.119
0.064
0.080
0.071
0.057
0.093
0.118
0.000
0.041
0.000
0.053
0.000
0.147
0.041
0.093
0.041
0.012
0.012
0.012
0.015
0.024
0.003
0.032
0.024
0.089
0.089
0.062
0.047
0.024
0.054
0.069
b1 ; 2; 0; 0:3; b1 ; 2; 1; 0; b1 ; 2; 2; 0:7;
b1 ; 2; 3; 0; b1 ; 2; 4; 0; b1 ; 2; 5; 0;
b2 ; 2; 0; 0:1; b2 ; 2; 1; 0; b2 ; 2; 2; 0:6;
b2 ; 2; 3; 0:2; b2 ; 2; 4; 0:1; b2 ; 2; 5; 0;
b3 ; 5; 0; 0:6; b3 ; 5; 1; 0; b3 ; 5; 2; 0;
b3 ; 5; 3; 0; b3 ; 5; 4; 0; b3 ; 5; 5; 0:4
91
1
>
>
>
>
C
C
>
=C
C
C
C
C; 0:12C:
>
C
C
>A
>
A
>
>
;
Table 4
Comparison of the results by different approaches.
00
149
MABR-1
MABR-2
80
60
40
20
0
8
10
12
14
16
18
20
minsup
Fig. 2. Running time with minsup.
22
24
150
Table 5
Comparison of our approach and previous approaches.
Our approach
Traditional classication
Observations of an entity
Multiple
Multiple
No
Yes
Yes
[( )] [( , p)]
Change the behavior of an entity
Observations of an entity
Single
Multiple
Yes
Yes
No
[] ()
None
Acknowledgments
151
Table A1 (continued)
Behavior attributes
Appendix A
Table A1: Selected attributes in the MAROB datasets.
Behavior attributes
Name
DOMORGVIOLENCE
Code
b1
Meaning To what degree the organization uses violence domestically as a
strategy?
Value
Label
0
Organization is not using violence as a strategy
1
Organization is using violence as occasional strategy but is not
specically targeting persons (coded if organization targets
infrastructure and/or gives warnings before attacks)
2
Organization is using violence regularly as a strategy but is targeting
security personnel (including state security personnel and non-state
armed militias) and not government non-security personnel or civilians
3
Organization is using violence regularly as a strategy but is targeting
security personnel(including state security personnel and non-state
armed militias) and/or government non-security personnel, but not
civilians
4
Organization is occasionally targeting civilians but most of its violent
acts target security personnel or government non-security personnel
5
Organization is targeting civilians regularly
Name
TRANSVIOLTARG
Code
b2
Meaning To what degree the organization uses violence to target transnational
entities as a strategy?
Value
Label
0
Organization is not using transnational violence as a strategy
1
Organization is using transnational violence as occasional strategy but is
not specically targeting persons (coded if organization targets
infrastructure and/or gives warnings before attacks)
2
Organization is using transnational violence regularly as a strategy but
is targeting security personnel (including state security personnel and
non-state armed militias) and not government non-security personnel
or civilians
3
Organization is using transnational violence regularly as a strategy but
is targeting security personnel (including state security personnel and
non-state armed militias) and/or government non-security personnel,
but not civilians
4
Organization is using transnational violence occasionally targeting
civilians but most of its violent acts target security personnel or
government non-security personnel
5
Organization is using transnational violence to target civilians regularly
Name
TRANSVIOLOC
Code
b3
Meaning To what degree the organization uses violence transnationally outside
the boundaries of the state in which the group lives?
Value
Label
0
Organization is not using transnational violence as a strategy
1
Organization is using transnational violence as occasional strategy but is
not specically targeting persons (coded if organization targets
infrastructure and/or gives warnings before attacks)
2
Organization is using transnational violence regularly as a strategy but
is targeting security personnel (including state security personnel and
non-state armed militias) and not government non-security personnel
or civilians
Value
Label
3
Organization is using transnational violence regularly as a strategy but
is targeting security personnel (including state security personnel and
non-state armed militias) and/or government non-security personnel,
but not civilians
4
Organization is using transnational violence occasionally targeting
civilians but most of its violent acts target security personnel or
government non-security personnel
Environment attributes
Name
ORSTPOLSUP
Code
e1
Meaning Did foreign state provide political support?
Value
Label
0
No
1
Yes
Name
DIAFINSUP
Code
e2
Meaning Did diaspora provide non-military nancial support?
Value
Label
0
No
1
Yes
Name
ORGCULTGR
Code
e3
Meaning Code the dominant cultural grievance of the organization.
Value
Label
0
No expressed cultural grievances
1
Cultural grievances focused on elimination of discrimination
2
Cultural grievances focused on creating or strengthening economic
remedial policies (i.e., establishing or increasing state funding for
cultural protection and/or promotion)
References
[1] R. Agrawal, R. Srikant, Fast algorithms for mining association rules, Proceeding of
the Twentieth International Conference on VLDB, 1994, pp. 487499.
[2] M.-L. Antonie, O.R. Zaane, An associative classier based on positive and negative
rules, Proceedings of the Ninth ACM SIGMOD Workshop on Research Issues in
Data Mining and Knowledge Discovery, 2004, pp. 6469.
[3] E. Baralis, S. Chiusano, P. Garza, On support thresholds in associative classication, Proceedings of the 2004 ACM Symposium on Applied Computing, 2004,
pp. 553558.
[4] E. Baralis, P. Garza, A lazy approach to pruning classication rules, Proceedings of
the Second IEEE International Conference on Data Mining (ICDM'02), 2002,
pp. 3542.
[5] J. Bond, V. Petroff, S. O'Brien, D. Bond, Forecasting turmoil in Indonesia: an application of hidden Markov models, Proceedings of the International Studies Association Annual Convention, 2004, pp. 1127.
[6] L. Cao, Y. Zhao, H. Zhang, D. Luo, C. Zhang, E.K. Park, Flexible frameworks for actionable knowledge discovery, IEEE Transactions on Knowledge and Data Engineering 22 (9) (2010) 12991312.
[7] J. Han, J. Pei, Y. Yin, R. Mao, Mining frequent patterns without candidate generation: a frequent-pattern tree approach, Data Mining and Knowledge Discovery
8 (1) (2004) 5387.
[8] Z. He, X. Xu, S. Deng, R. Ma, Mining action rules from scratch, Expert Systems with
Applications 29 (3) (2005) 691699.
[9] H. Kaur, Actionable rules: issues and new directions, Proceedings of World Academy of Science, Engineering and Technology, 2005, pp. 6164.
[10] S. Khuller, M. Martinez, D. Nau, A. Sliva, G. Simari, V. Subrahmanian, Computing
most probable worlds of action probabilistic logic programs: scalable estimation
for 1030,000 worlds, Annals of Mathematics and Articial Intelligence 51 (2)
(2007) 295331.
[11] E. Kim, W. Kim, Y. Lee, Combination of multiple classiers for the customer's purchase behavior prediction, Decision Support Systems 34 (2003) 167175.
[12] W. Li, J. Han, J. Pei, CMAR: accurate and efcient classication based on multiple
class-association rules, Proceedings of the First IEEE International Conference
on Data Mining (ICDM'01), 2001, pp. 369376.
[13] C. Ling, T. Chen, Q. Yang, J. Chen, Mining optimal actions for intelligent CRM, Proceedings of the Second IEEE International Conference on Data Mining (ICDM'02),
2002, pp. 767770.
[14] B. Liu, W. Hsu, S. Chen, Using general impressions to analyze discovered classication rules, Proceedings of the Third International Conference on Knowledge
Discovery and Data Mining (KDD'97), 1997, pp. 3136.
[15] B. Liu, W. Hsu, Y. Ma, Integrating classication and association rule mining, Proceedings of the Fourth International Conference on Knowledge Discovery and
Data Mining (KDD'98), 1998, pp. 8086.
[16] Z. Pawlak, Information systems theoretical foundations, Information Systems 6
(3) (1981) 205218.
[17] Z. Ras, A. Dardzinska, Action rules discovery without pre-existing classication
rules, Proceedings of RSCTC 2008 Conference, 2008, pp. 181190.
[18] Z. Ras, A. Dardzinska, L.-S. Tsay, H. Wasyluk, Association action rules, Proceedings
of IEEE/ICDM Workshop on Mining Complex Data (MCD'08), 2008, pp. 283290.
[19] Z. Ras, A. Tzacheva, In search for action rules of the lowest cost, in: B. DuninKeplicz, A. Jankowski, A. Skowron, M. Szczuka (Eds.), Monitoring, Security, and
Rescue Techniques in Multiagent Systems, Springer-Verlag, 2005, pp. 261272.
152
[20] Z. Ras, A. Tzacheva, L. Tsay, O. Gurdal, Mining for interesting action rules, Proceedings of IEEE/WIC/ACM International Conference on Intelligent Agent Technology
(IAT'2005), 2005, pp. 187193.
[21] Z. Ras, A. Wieczorkowska, Action-rules: how to increase prot of a company, in:
D. Zighed, J. Komorowski, J. Zytkow (Eds.), Principles of Data Mining and Knowledge Discovery, Springer-Verlag, 2000, pp. 75116.
[22] P. Schrodt, Forecasting conict in the Balkans using hidden Markov models, in: T.
Robert (Ed.), Programming for Peace, Springer-Verlag, 2006, pp. 161184.
[23] A. Silberschatz, A. Tuzhilin, What makes patterns interesting in knowledge discovery systems, IEEE Transactions on Knowledge and Data Engineering 8 (6)
(1996) 970974.
[24] V. Subrahmanian, Computer science: cultural modeling in real time, Science 317
(5844) (2007) 15091510.
[25] V. Subrahmanian, M. Albanese, M. Martinez, D. Nau, D. Reforgiato, G. Simari, A.
Sliva, O. Udrea, J. Wilkenfeld, CARA: a cultural-reasoning architecture, IEEE Intelligent Systems 22 (2) (2007) 1216.
[26] A. Tzacheva, Z. Ras, Action rule mining, International Journal of Intelligent Systems 20 (7) (2005) 719736.
[27] A. Tzacheva, L.-S. Tsay, Tree-based construction of low-cost action rules,
Fundamenta Informaticae 86 (1,2) (2008) 213225.
[28] K. Wang, S. Zhou, Y. He, Growing decision trees on support-less association rules,
Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, 2000, pp. 265269.
[29] Q. Yang, H. Cheng, Mining case bases for action recommendation, Proceedings of
the Second IEEE International Conference on Data Mining (ICDM'02), 2002,
pp. 522529.
[30] Q. Yang, J. Yin, C. Ling, T. Chen, Post processing decision trees to extract actionable
knowledge, Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03), 2003, pp. 685688.
Peng Su received his Ph.D. degree in Computer Application Technology from the Chinese Academy of Sciences
in 2011. He is a lecturer in the School of Management Engineering at Shandong Jianzhu University. Dr. Su is a
member of IFAC Technical Committees on Economic and
Business Systems (TC9.1). His research interests mainly
focus on data mining and social computing.
Daniel Zeng received his Ph.D. degree in Industrial Administration from the Carnegie Mellon University in
1998. He is an associate professor and the director of the
Intelligent Systems and Decisions Laboratory in the Department of Management Information Systems at the University of Arizona's Eller College of Management. He is
also an afliated professor at the Institute of Automation,
Chinese Academy of Sciences. Prof. Zeng is a member of
IEEE. His research interests include software agents and
multi-agent systems, intelligence and security informatics,
social computing and recommender systems.
Huimin Zhao received the B.E. and M.E. degrees in automation from Tsinghua University, Beijing, China, in 1990
and 1993, respectively, and the Ph.D. degree in management information systems from the University of Arizona,
Tucson, Arizona, USA in 2002. He is an Associate Professor
of management information systems in the Sheldon B.
Lubar School of Business at the University of Wisconsin
Milwaukee. His current research interests include data
mining and recommendation systems. He is a member of
the IEEE, the Association for Information Systems (AIS),
and the Information Resources Management Association
(IRMA).