Managing Data

Purpose of Data Mining

Contributors
Christian Bien Portrait_edited.jpg

Christian Bien

tutorial.png
Data Mining | The Checkout

The Checkout show explains the importance of data mining and how companies use consumer data in targeted marketing.

one.png
What is Data Mining?
Slide1.jpeg

Data mining is extracting patterns, trends or information from data sets. In other words, it using data you provide, to formulate patterns, trends or ideas about your behaviour. 


How Data is Collected

Have you ever noticed that when you search for something online you receive advertising that relates to that query? Almost everything you do online can be tracked and used to data analytical purposes. Some online methods of data mining include:

  • Search engine queries - recording of recent internet searches

  • Cookies

  • Social media activity - voluntary information given when creating a profile (name, email, sex, interests, friends)

  • Internet Tracking Software

  • Online purchasing history

There are also offline ways to collect information, including:

  • Credit card transactions

  • Loyalty cards - Eg Flybuys, Woolworths Rewards, Myer One

  • Information handed for surveys or competitions

two.png
How Data Mining is Used in Marketing
Slide2.jpeg

The main purpose of data mining is for marketing purposes to which this information is collected to a build a profile about a user, with personal information including their name, age, interests, sex, interests, dislikes and geographical location.


The idea is that once marketers know who you are, the better they can promote products and services based on your interests and personal attributes. Marketers use algorithms to detect and identify certain patterns in online activity to build a customer profile.


How Target Saw the Teen Pregnancy Before Dad Did

Read the full story on Forbes here


In the United States, Target sent a teenage girl personalised vouchers for baby related items, such as nappies and baby formula. The father was outraged, believing that Target was suggesting her daughter was pregnant. Target apologised but later discovered that the teenage girl was in fact, pregnant.


Target figured it out by analysing the shopping habits of the teenage girl by linking a Guest ID number to a credit card, name, email address and other personal information. The Guest ID tracked that the girl had been buying pregnancy related items and used a pregnancy prediction score, to guess when the baby was due. Based on this information, Target US sent the teenage girl personalised vouchers for baby products, with the analysis of her shopping records used to determine she was in fact pregnant and the baby was due soon.


Big data is worth a lot of money, and there are companies dedicated with collecting and selling information to third parties. Information in most cases is voluntarily handed over with the ability for companies to collect this information enclosed in their terms of use.

Topic Menu
Online Data Storage Methods
Security Techniques for Managing Data
Types of Backup Techniques
Purpose of Data Mining
Data Security Methods
User Generated Content
Hypertext Markup Language (HTML)
Concept of Web 2.0 and 3.0
Content Management Systems
World Wide Web Consortium (W3C)
Validation Techniques for Online Forms

Want your ATAR notes to empower over 77,000 students per year?

Logo-New-Large.png

Join the Team.
Empower Education.

three.png
Other Purposes/Uses for Data Mining

Sign Up for Free to Read More 

Get instant access to all content and subscribe to our weekly email list on study tips, opportunities and other free resources. 

It only takes a minute...

Slide3.jpeg

Medical/Scientific

Data mining can be used to link symptoms together to identify an illness. For example, if you have a running nose and high temperature you could be diagnosed as having a fever.

Web MD uses voluntary inputted data from its online forms to determine possible illnesses.

Security Purposes

Businesses can use data mining by analysing the activities of its employees and detecting any unusual activity. For example, suspicions would be raised if a junior employee accessed sensitive files, used only by senior employees.

In a wider context, data mining can be used to detect suspicious activity such as the National Security Hotline which relies on data sent voluntary by members of the public.

four.png
Slide4.jpeg
five.png
Slide5.jpeg
six.png
Slide6.jpeg
157-seven.png
Slide1.jpeg
156-eight.png
Slide8.jpeg