Beginning
Data Mining for Mathematical Theology, Epistemology, Psychology, Sociology
and Eschatology in Information Operations:
Disinformation,
Syndromic Surveillance, and the Bless/Curse Paradigms
by
Dallas F. Bell, Jr.
1. Beginning Data Mining
Data is stored information
with the capability of being processed. It may be in the form
of numbers, pictures, text and audio/visual material. Math data
can be gained from polls, psychometric instruments and implicit association
tests already taken. Semantic data can be converted into math
data. An analysis should be made of what units of observation
are available to process.
There will never be a perfect
algorithm to mine the data and explain or exploit every relevant bit
of available information. A binary flat file is an effective tool
to initially organize data into columns of variables, y, and
rows of instances, x. Multiple flat files can then be joined
into one comprehensive file for analysis and predictions. The
Excel spreadsheet is often used for this purpose. Subsequent historical
data may provide insights and predict new data.
Historic data can be used to
learn by building models. The life of those models is based on
the past and their effectiveness is usually for a short period of time.
The performance of models can be monitored and tested. The findings
are confirmed or not confirmed through that validation process.
Data mining classification can be binary in that this will or will not
likely occur. If there are high levels of variables the size may
need to be reduced. Reduction is obtained by merging, combining
groups and even the deletion of material. Planning data mining
requires a proper allowance of time for the project. That project
will need to be supported and developed on an ongoing basis.
2. Mathematical
Anthropocentric Sciences
Systematic political science
uses the META formulae to encompass the data of all its primary subsets:
theology, epistemology, psychology, sociology, and eschatology.
Data from each of those areas can be mined and compiled separately using
the same META format of x, y, and z planes.
The y axis would be data specific for each category.
2.1 Mathematical Theology
Mathematical theology is an
approach of assigning numeric value to possible theological beliefs.
T1 is a belief in the infinite God of the first cause in creation.
T2 is a belief in an unbalanced finite god. T3 is also a belief
in a finite god(s) but at the lowest levels. The y
coordinate would be used to map this data.
2.2 Mathematical
Epistemology
Math values are assigned to
having goals of compliance with or noncompliance with natural laws of
freewill (NLF) in mathematical epistemology. Entries are made
from the data on the y axis. (See the Attachment of this
paper concerning the bless/curse paradigms.)
2.3 Mathematical
Psychology
Psychometrics and past behavior
can be used to model mathematical psychology. Observations are
mapped of the pursuit and achievement of the five common levels of human
needs: survival, economic security, love and affection, status
and self-esteem, and self-actualization. Decisions made under
certainty of outcome, uncertainty of outcome, and risk of loss can be statistically analyzed.
2.4 Mathematical
Sociology
The P1, P2, and P3 population
demographics of the four societal institutions of family, church, business,
and government are each mapped. They are part of either a First
World system's five societal levels or a Second World's two societal
levels or a Third World system's single societal level.
2.5 Mathematical
Eschatology
Mathematical eschatology maps
the possible human beliefs concerning the future. Math values
are assigned to the faiths in the eternal concepts of hell, heaven,
and annihilation as well as the immediate future of mankind.
3. Information Operations
The Joint Publication
3-13 describes
Information Operation (IO) as the integrated employment of electronic
warfare (EW), computer network operations (CNO), psychological operations
(PSYOPS), military deception (MILDEC), and operations security (OPSEC).
They work in concert with specified supporting and related capabilities
to influence, disrupt, corrupt, or usurp adversarial human and automated
decision making while protecting one's own capabilities. Because
of the intense coordination and prevention of conflicting efforts required
for IO, this is often referred to as an integration strategy.
Data mining should consider
the information to be mined as suspect. The mining process should
produce data without giving away one's own advantage to an enemy.
Proverbs chapter 29 and verse 12 says a fool utters all that is in his
heart. In Isaiah chapter 39 King Hezekiah freely gave away his
nation's secrets to his enemies which they used to eventually dominate
his kingdom. A disinformation campaign is usually a wise precaution.
Disinformation operations involve
the intentional dissemination of information to produce deception.
The more types of sensory input and the greater their amounts increase
the neuro identification of that information as reality regardless as
to whether it is true or is not true. For example, movies made in Hollywood
intentionally show few negative consequences for behavior that is in
violation of NLF nor do they show positive consequences for the compliance
of NLF. That illusion of relativism routinely causes surprise
when those behaviors are imitated with real results that contradict
the movies false portrayal of cause and effect.
Business models are used to
sell products and in this case the product is an idea. The following
effects should be kept in mind.
Context Effects--a choice
may be based on the context of a situation that can be altered.
Constructed Process--choices
are often made on the spot and can be manipulated.
Framing--the idea is framed
to an advantage.
Heuristic Screening--when
under pressure to choose among many possibilities people can be corralled.
Lens Model--people see the
world through the lens of perceptions that can be influenced.
Memory Schema--positive images
can be tied to the idea.
Mental Accounting--people
remember gains and losses differently.
Self-perception--the self-image
of people affects their choice.
Due to the prominence of mass
communication today the illusion of a one-on-one interaction with the
audience is created by the communicator. The audience is given
a false belief of intimacy and is likely to trust the host. That
parasocial relationship is routinely manipulated by politicians and
entertainment personalities for money and position. This one-sided
relation may become frustrating to the audience when the reality of
their lack of control is realized. Syndromic surveillance is a
term that may be applied to health crisis protocol alerts for bioterrorism. It is applied here for the
use of semantical and behavioral surveillance of data to signal a sufficient
probability to warrant an appropriate response. Such a response
should be validated by red-teaming whenever possible.
4. Conclusion
Data mining can be used to
enhance the analysis and prediction of both individual and nation-state
behavior in systematic political science. The subsets of theology,
epistemology, psychology, sociology and eschatology have mathematical
values that can be specifically modeled. Those models make up parts
of information operations. However, it can be shown by blessed
and cursed behavior that there are deviations in the relationships between
the outcomes that are compliant with or not compliant with NLF.
Therefore, models will always be in a state of flux and analysts should
strive to insure there is as little garbage being inputted so there
will be less garbage coming out. Those knowledgeable and disciplined
efforts are a mainstay of successful operations.
ATTACHMENT
The Bless/Curse Paradigms
A perfect relation between
compliance with NLF and a positive outcome nor noncompliance with NLF
and a negative outcome is always the case. It can be observed
that compliance with NLF is rewarded beyond mere expectations of compliance
and noncompliance is not as punished by circumstances as expected.
This is called being blessed. It can also be observed
that compliance with NLF is not as rewarded as expected and noncompliance
with NLF is more harshly punished than expected. This is called
being cursed. Though man can hope to bless or hope to curse they
have no power over NLF. Only the God of the first cause of NLF
could have the power or authority to bless or curse. Man can,
of course, be an instrument of blessing or be a curse to other people.
The Bible provides the examples
of Abraham and his descendants being blessed by Divine grace, and Ham
and his descendents being cursed by Divine justice. This pattern
or paradigm may be seen in the data collated that would seem to have
one outcome but instead has another outcome. This does not mean
that there are not negative consequences to violating NLF or not positive
consequences to complying with NLF. There may just be a supernatural
component to the totality of those outcomes. Galatians chapter
3 says by grace God delivered man from the curse of the justice of the
law by redeeming mankind through Jesus' atonement. It explains
that through faith in Jesus the law is still obeyed but the law is no
longer the sole schoolmaster to teach about God. Such believers are
to be rewarded with blessings from the present through eternity.
---------------------------------ALL
RIGHTS RESERVED © 2007 Dallas F. Bell, Jr.--------------------------------