Visualization better and complimentary than Big Data – ISCRAM2012

Posted on May 10, 2012  /  0 Comments

David Ebert, the second keynote speaker at the ISCRAM2012, in his talk says – “Recently, big data analytics has become the buzz in international news and corporate campaigns as the technology to change the future. However, while necessary in our modern data deluge of over one zetabyte of digital data, the common big data analytics approach tends to utilize only computational power and algorithms to turn data into information and then knowledge and provide an answer to the responder or decision maker using the system. In contrast, visual analytics capitalizes on the best and complimentary abilities of both components of the human-computer decision-making process through iterative, interactive visual interfaces to leverage and supplement the cognitive capabilities of the human user.”

In our Real-Time Biosurveillance work, this is exactly what we did; thus, take the over 100s of records coming from each clinical facility every day, then present them to Epidemiologists using temporal and spatial data visualization methods offered by the T-Cube Web Interface. Additionally, provide them with tools to drill into and apply statistical analyses methods to look for unusual patterns in the large data set. However, my talk at ISCRAM2012 was not on the health work but on the voice-based emergency communication to offer easy to use and affordable technologies for enhancing Community Emergency Response Team members with information exchange.

David emphasized that ontologies and data dictionaries can improve data quality; moreover, machine learning systems improve the ROC and AMOC. Economic theory bounded risk based decision strategy are far more effective than people’s perceptions. Chains of reasoning are a powerful way to and tools that can support such reasoning are what is needed in aid of decision support. Data visualization provides that power. Moreover, visualization is a great way to protect privacy with guided levels of aggregation and access control to avoid ramifications.

Comments are closed.