Data mining methodological weaknesses and suggested fixes

John Maindonald*

*Corresponding author for this work

    Research output: Contribution to journalConference articlepeer-review

    2 Citations (Scopus)

    Abstract

    Predictive accuracy claims should give explicit descriptions of the steps followed, with access to the code used. This allows referees and readers to check for common traps, and to repeat the same steps on other data. Feature selection and/or model selection and/or tuning must be independent of the test data. For use of cross-validation, such steps must be repeated at each fold. Even then, such accuracy assessments have the limitation that the target population, to which results will be applied, is commonly different from the source population. Commonly, it is shifted forward in time, and it may differ in other respects also. A consequence of source/target differences is that highly sophisticated modeling may be pointless or even counter-productive. At best, model effects in the target population may be broadly similar. Investigation of the pattern of changes over time is required. Such studies are unusual in the data mining literature, in part because relevant data have not been available. Several recent investigations are noted that shed interesting light on the comparison between observational and experimental studies, with particular relevance when there is an interest in giving parameter estimates a causal interpretation. Data mining activity would benefit from wider co-operation in the development and deployment of computing tools, and from better integration of those tools into the publication process.

    Original languageEnglish
    Pages (from-to)9-16
    Number of pages8
    JournalConferences in Research and Practice in Information Technology Series
    Volume61
    Publication statusPublished - 2006
    Event5th Australasian Data Mining Conference, AusDM 2006 - Sydney, NSW, Australia
    Duration: 29 Nov 200630 Nov 2006

    Fingerprint

    Dive into the research topics of 'Data mining methodological weaknesses and suggested fixes'. Together they form a unique fingerprint.

    Cite this