<p><b>Theories and practices to assess critical information in a complex adaptive system</b><b><br /><br /></b>Organized for readers to follow along easily,<i>The Fitness of Information: Quantitative Assessments of Critical Evidence</i> provides a structured outline of the key challenges in assessing crucial information in a complex adaptive system. Illustrating a variety of computational and explanatory challenges, the book demonstrates principles and practical implications of exploring and assessing the fitness of information in an extensible framework of adaptive landscapes.<br /><br /> The books first three chapters introduce fundamental principles and practical examples in connection to the nature of aesthetics, mental models, and the subjectivity of evidence. In particular, the underlying question is how these issues can be addressed quantitatively, not only computationally but also explanatorily. The next chapter illustrates how one can reduce the level of complexity in understanding the structure and dynamics of scientific knowledge through the design and use of the CiteSpace system for visualizing and analyzing emerging trends in scientific literature. The following two chapters explain the concepts of structural variation and the fitness of information in a framework that builds on the idea of fitness landscape originally introduced to study population evolution. The final chapter presents a dual-map overlay technique and demonstrates how it supports a variety of analytic tasks for a new type of portfolio analysis.<br /><br /><i>The Fitness of Information: Quantitative Assessments of Critical Evidence</i> also features:<br /><br /></p><ul><li>In-depth case studies and examples that characterize far-reaching concepts, illustrate underlying principles, and demonstrate profound challenges and complexities at various levels of analytic reasoning</li><li>Wide-ranging topics that underline the common theme, from the subjectivity of evidence in criminal trials to detecting early signs of critical transitions and mechanisms behind radical patents</li><li>An extensible and unifying framework for visual analytics by transforming analytic reasoning tasks to the assessment of critical evidence</li></ul><i><br /> The Fitness of Information: Quantitative Assessments of Critical Evidence</i> is a suitable reference for researchers, analysts, and practitioners who are interested in analyzing evidence and making decisions with incomplete, uncertain, and even conflicting information. The book is also an excellent textbook for upper-undergraduate and graduate-level courses on visual analytics, information visualization, and business analytics and decision support systems.<br />
CHAOMEI CHEN, PhD, is a Professor of Informatics in the College of Computing and Informatics at Drexel University. He is the creator of the widely used software CiteSpace, and author of several other books. Dr. Chens research expertise includes information visualization, visual analytics, quantitative studies of scientific literature, and theories of scientific discoveries.
Preface ix1. Attention and Aesthetics 11.1. Attention, 11.1.1. What Is It That Attracts Our Attention? 21.1.2. Negative Information Attracts More Attention, 21.1.3. The Myths of Prehistoric Civilization, 51.2. Gestalt Principles, 61.2.1. Closure and Completeness, 61.2.2. Continuity and Smoothness, 81.2.3. Missing the Obvious, 91.3. Aesthetics, 111.3.1. The Golden Ratio, 111.3.2. Simplicity, 121.3.3. Regularity, 141.3.4. Beauty, 151.4. The Index of the Interesting, 171.4.1. Belief Updates, 181.4.2. Proteus Phenomenon, 181.4.3. Surprises, 191.4.4. Connecting the Dots, 231.5. Summary, 24Bibliography, 252. Mental Models 272.1. Mental Models, 272.1.1. Pitfalls, 292.1.2. Communicating with Aliens, 312.1.3. Boundary Objects, 322.1.4. Wrong Models, 332.1.5. Competing Hypotheses, 412.2. Creativity, 472.2.1. Divergent Thinking, 492.2.2. Blind Variation and Selective Retention, 512.2.3. Binding Free-Floating Elements of Knowledge, 522.2.4. Janusian Thinking, 542.2.5. TRIZ, 572.2.6. Reasoning by Analogy, 592.2.7. Structural Holes, Brokerage, and Boundary Spanning, 592.3. Foresights, 612.3.1. Information Foraging, 612.3.2. Identifying Priorities, 632.3.3. Hindsight on Foresight, 652.4. Summary, 66Bibliography, 673. Subjectivity of Evidence 713.1. The Value of Information, 713.2. Causes Célèbre, 743.2.1. The Sacco and Vanzetti Case, 743.2.2. The O.J. Simpson Case, 793.2.3. Ward Edwardss Defense of Bayesian Thinking, 863.3. The Da Vinci Code, 873.3.1. Positive and Negative Reviews, 883.3.2. Decision Trees, 903.4. Supreme Court Opinions, 933.5. Apple versus Samsung, 1003.6. Summary, 101Bibliography, 1014. Visualizing the Growth of Knowledge 1034.1. Progressive Knowledge Domain Visualization, 1054.1.1. The Structure of a Knowledge Domain, 1064.1.2. Research Fronts and Intellectual Bases, 1084.1.3. Strategies of Scientific Discoveries, 1114.2. CiteSpace, 1164.2.1. Design Rationale, 1174.2.2. Basic Procedure, 1194.2.3. Advanced Cocitation Analysis, 1224.2.4. Toward a Tightly Connected Community, 1284.3. Examples, 1324.3.1. Terrorism Research, 1324.3.2. Mass Extinctions, 1364.3.3. Developing Expertise in Analytics and Topic Areas, 1404.3.4. U.S. Supreme Court Landmark Cases, 1424.4. Summary, 143Bibliography, 1435. Fitness Landscapes 1475.1. Cognitive Maps, 1475.1.1. The Legibility of Cognitive Maps, 1475.1.2. Spatial Knowledge, 1485.2. Fitness Landscapes, 1495.2.1. Wrights Adaptive Landscapes, 1505.2.2. Fishers Geometric Model of Adaptation, 1535.2.3. The Holey Landscape, 1555.2.4. Kauffmans NK Model, 1565.2.5. Local Search and Adaptation, 1575.2.6. Criticisms, 1585.3. Applications of Fitness Landscapes, 1595.3.1. StructureActivity Relationship Landscapes, 1595.3.2. Landscapes Beyond Evolutionary Biology, 1615.4. Summary, 169Bibliography, 1706. Structural Variation 1736.1. Complex Adaptive Systems, 1736.1.1. Early Signs of Critical Transitions, 1736.1.2. Early Signs of Great Ideas, 1756.1.3. The Structural Variation Theory, 1766.2. Radical Patents, 1816.2.1. Patentability, 1816.2.2. NK Models of Recombinant Patents, 1826.2.3. Recombinant Search for High-Impact Radical Ideas, 1846.2.4. Radical Inventions, 1886.2.5. Genetically Evolved Patentable Ideas, 1896.3. Bridging the Gaps, 1926.3.1. The Principle of Boundary Spanning, 1926.3.2. Baseline Networks, 1936.3.3. Structural Variation Metrics, 1956.3.4. Statistical Models, 1986.4. Applications, 1996.4.1. Small-World Networks, 2006.4.2. Complex Network Analysis (19962004), 2016.4.3. National Cancer Institutes Patent Portfolio, 2036.4.4. A Follow-Up Study, 2116.5. Summary, 212Bibliography, 2127. Gap Analytics 2177.1. Portfolio Analysis and Risk Assessment, 2187.1.1. Portfolios of Grant Proposals, 2197.2. Interactive Overlays, 2257.2.1. Single-Map Overlays, 2257.2.2. Dual-Map Overlays, 2267.3. Examples of Dual-Map Overlays, 2317.3.1. Portfolios of a Single Source, 2317.3.2. Portfolios of Organizations, 2347.3.3. Portfolios of Subject Matters, 2397.3.4. Patterns in Trajectories, 2437.4. Summary, 2467.5. Conclusion, 247Bibliography, 250Index 253
„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.