1,502
Views
6
CrossRef citations to date
0
Altmetric

References

  • Abedin, M.; Ng, V.; and Khan, L. Cause identification from aviation safety incident reports via weakly supervised semantic lexicon construction. Journal of Artificial Intelligence Research, 38 (2010), 569–631.
  • Albright, R. Taming Text with the SVD. SAS Institute Inc., 2004. Available at ftp://ftp.dataflux.com/techsup/download/EMiner/TamingTextwiththeSVD.pdf (accessed on September 5, 2017)
  • Andrzejczak, C.; Karwowski, W.; and Mikusinski, P. Application of diffusion maps to identify human factors of self-reported anomalies in aviation. Work: A Journal of Prevention, Assessment and Rehabilitation, 41 (2012), 188–197.
  • Aviation Information Analysis and Sharing (ASIAS). Weather-Related Aviation Accident Study, 2010. Available at. www.asias.faa.gov/i/2003-2007weatherrelatedaviationaccidentstudy.pdf (accessed on September 5, 2017).
  • Aviation Safety Reporting System (ASRS), 2017. Available at https://ntrs.nasa.gov/ (accessed on September 5, 2017)
  • Barrientos, F.; Castle, J.; McIntosh, D.; and Srivastava, A. Preliminary Evaluation of an Aviation Safety Thesaurus’ Utility for Enhancing Automated Processing of Incident Reports. 2007. Available at https://ntrs.nasa.gov/search.jsp?R=20070025054 (accessed 11/06/2017).
  • Baskerville, R.; Lyytinen, K.; Sambamurthy, V.; and Straub, D. A response to the design-oriented information systems research memorandum. European Journal of Information Systems, 20, 1 (2011), 11–15.
  • Bifet, A., and Frank, E. Sentiment knowledge discovery in twitter streaming data. In International Conference on Discovery Science. Berlin, Heidelberg, Germany: Springer, 2010, pp. 1–15.
  • Bifet, A.; Holmes, G.; Kirkby, R.; and Pfahringer, B. Moa: Massive online analysis. Journal of Machine Learning Research, 11 (May 2010), 1601–1604.
  • Bifet, A.; de Francisci Morales, G.; Read, J.; Holmes, G.; and Pfahringer, B. Efficient online evaluation of big data stream classifiers. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Sydney, Australia: ACM, 2015, pp. 59–68.
  • Branford, K. Seeing the big picture of mishaps. Aviation Psychology and Applied Human Factors, 1, 1 (2011), 31–37.
  • Chakraborty, G.; Pagolu, M.; and Garla, S. Text mining and analysis: practical methods, examples, and case studies using SAS. Cary, NC: SAS Institute, 2014.
  • Cohen, J. A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 1 (1960), 37–46.
  • Domingos, P., and Pazzani, M. On the optimality of the simple Bayesian classifier under zero-one loss. Machine Learning, 29, 2–3 (1997), 103–130.
  • Domingos, P., and Hulten, G. Mining high-speed data streams. In Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Boston, MA: ACM, 2000, pp. 71–80.
  • Emars. Major Accident Reporting System. 2017.
  • Evangelopoulos, N.; Zhang, X.; and Prybutok, V.R. Latent semantic analysis: Five methodological recommendations. European Journal of Information Systems, 21, 1 (2012), 70–86.
  • Evangelopoulos, N. Thematic orientation of the ISJ within a semantic space of IS research. Information Systems Journal, 26, 1 (2016), 39–46.
  • Ghiassi, M.; Zimbra, D.; and Lee, S. Targeted Twitter sentiment analysis for brands using supervised feature engineering and the dynamic architecture for artificial neural networks. Journal of Management Information Systems, 33, 4 (2016), 1034–1058.
  • Goode, N.; Read, G.J.; van Mulken, M.R.; Clacy, A.; and Salmon, P.M. Designing system reforms: Using a systems approach to translate incident analyses into prevention strategies. Frontiers in Psychology, 7 (2016). doi:10.3389/fpsyg.2016.01974
  • Gregor, S., and Hevner, A.R. Positioning and presenting design science research for maximum impact. MIS Quarterly, 37, 2 (2013), 337–355.
  • Haley, D.T.; Thomas, P.; De Roeck, A.; and Petre, M. Tuning an LSA-based assessment system for short answers in the domain of computer science: The elusive optimum dimension. In Proceedings of the 1st International Conference on Latent Semantic Analysis in Technology Enhanced Learning . Heerlen, The Netherlands: Open University of the Netherlands, 2007, pp. 22–23.
  • Hevner, A.R.; March, S.T.; Park, J.; and Ram, S. Design science in information systems research. Management Information Systems Quarterly, 28, 1 (2004), 75–106.
  • Hoeffding, W. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58, 301 (1963), 13–30.
  • Hradecky, S. Ryanair B738 at Alicante on Jan 6th 2011, landed without clearance Incidents and News in Aviation. Aviation Herald, March 11, 2013. Available at http://avherald.com/h?article=437de80e&opt=0 (accessed on September 5, 2017)
  • John, G.H., and Langley, P. Estimating continuous distributions in Bayesian classifiers. In Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence. San Francisco, CA: Morgan Kaufmann, 1995, pp. 338–345.
  • Kantardzic, M. Data Mining: Concepts, Models, Methods, and Algorithms. Hoboken, NJ: Wiley, 2011.
  • Kulkarni, S.S.; Apte, U.M.; and Evangelopoulos, N.E. The use of latent semantic analysis in operations management research. Decision Sciences, 45, 5 (2014), 971–994.
  • Landauer, T.K.; McNamara, D.S.; Dennis, S.; and Kintsch, W. Handbook of Latent Semantic Analysis. Hove, UK: Psychology Press, 2013.
  • Leveson, N. A new accident model for engineering safer systems. Safety Science, 42, 4 (2004), 237–270.
  • Li, W.; Chen, H.; and Nunamaker Jr., J.F. Identifying and profiling key sellers in cyber carding community: AZSecure text mining system. Journal of Management Information Systems, 33, 4 (2016), 1059–1086.
  • Love, J., and Hirschheim, R. Reflections on Information Systems Journal’s thematic composition. Information Systems Journal, 26, 1 (2016), 21–38.
  • Martin, D.I., and Berry, M.W. Mathematical foundations behind latent semantic analysis. In T. K. Landauer, D. S. McNamara, S. Dennis, and W. Kintsch (eds.), Handbook of Latent Semantic Analysis, Hove, UK: Psychology Press, 2007, pp. 35–56.
  • National Aeronautics and Space Administration (NASA). ASRS Program Briefing, 2015. Available at http://asrs.arc.nasa.gov/docs/ASRS_ProgamBriefing2015.pdf (accessed on September 5, 2017)
  • Nguyen, H.-L.; Woon, Y.-K.; and Ng, W.-K. A survey on data stream clustering and classification. Knowledge and Information Systems, 45, 3 (2015), 535–569.
  • Nielsen, K.J.; Carstensen, O.; and Rasmussen, K. The prevention of occupational injuries in two industrial plants using an incident reporting scheme. Journal of Safety Research, 37, 5 (2006), 479–486.
  • NTSB. NTSB Identification: DCA13FA131, 2013. Available at https://www.ntsb.gov/_layouts/ntsb.aviation/brief.aspx?ev_id=20130723X13256 (accessed on September 5, 2017)
  • Oza, N.; Castle, J.P.; and Stutz, J. Classification of aeronautics system health and safety documents. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 39, 6 (2009), 670–680.
  • Peffers, K.; Tuunanen, T.; Rothenberger, M.A.; and Chatterjee, S. A design science research methodology for information systems research. Journal of Management Information Systems, 24, 3 (2007), 45–77.
  • Péladeau, N., and Stovall, C. Application of Provalis Research Corp.’s statistical content analysis text mining to airline safety reports. Flight Safety Foundation Web site, 2005. Available at www.flightsafety. org/gain/Provalis_text_mining_report. pdf. (accessed on September 5, 2017)
  • Posse, C.; Matzke, B.; Anderson, C.; Brothers, A.; Matzke, M.; and Ferryman, T. Extracting information from narratives: An application to aviation safety reports. In IEEE 2005 Aerospace Conference. Big Sky, MT: IEEE, 2005, pp. 3678–3690.
  • Rasmussen, J. Risk management in a dynamic society: A modelling problem. Safety Science, 27, 2 (1997), 183–213.
  • Read, J.; Bifet, A.; Holmes, G.; and Pfahringer, B. Scalable and efficient multi-label classification for evolving data streams. Machine Learning, 88, 1–2 (2012), 243–272.
  • Sebastiani, F. Machine learning in automated text categorization. ACM Computing Surveys (CSUR), 34, 1 (2002), 1–47.
  • Shi, D.; Guan, J.; and Zurada, J. Cost-sensitive learning for imbalanced bad debt datasets in healthcare industry. In 2015 Asia-Pacific Conference on Computer Aided System Engineering (APCASE). Quito, Ecuador: IEEE, 2015, pp. 30–35.
  • Sidorova, A.; Evangelopoulos, N.; Valacich, J.S.; and Ramakrishnan, T. Uncovering the intellectual core of the information systems discipline. MIS Quarterly, 32, 3 (2008), 467–482.
  • Straub, D., and Ang, S. Editor’s comments: Rigor and relevance in IS research: Redefining the debate and a call for future research. MIS Quarterly, 35, 1 (2011), iii–xi.
  • Trawinski, B. Evolutionary fuzzy system ensemble approach to model real estate market based on data stream exploration. Journal of Universal Computer Science, 19, 4 (2013), 539–562.
  • Wang, Q. A hybrid sampling SVM approach to imbalanced data classification. Abstract and Applied Analysis, 2014 (2014). Article ID 972786 doi: http://dx.doi.org/10.1155/2014/972786
  • Weiss, G.M.; McCarthy, K.; and Zabar, B. Cost-sensitive learning vs. sampling: Which is best for handling unbalanced classes with unequal error costs? In Proceedings of the 2007 International Conference on Data Mining, Las Vegas, NV: DMIN, 2007, pp. 35–41.
  • Witten, I.H., and Frank, E. Data Mining: Practical Machine Learning Tools and Techniques. San Francisco, CA: Morgan Kaufmann, 2005.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.