Systematic Political Science

 
 

Beginning Data Mining for Mathematical Theology, Epistemology, Psychology, Sociology and Eschatology in Information Operations:
Disinformation, Syndromic Surveillance, and the Bless/Curse Paradigms

by
Dallas F. Bell, Jr.

1. Beginning Data Mining

Data is stored information with the capability of being processed.  It may be in the form of numbers, pictures, text and audio/visual material.  Math data can be gained from polls, psychometric instruments and implicit association tests already taken.  Semantic data can be converted into math data.  An analysis should be made of what units of observation are available to process.

There will never be a perfect algorithm to mine the data and explain or exploit every relevant bit of available information.  A binary flat file is an effective tool to initially organize data into columns of variables, y, and rows of instances, x.  Multiple flat files can then be joined into one comprehensive file for analysis and predictions.  The Excel spreadsheet is often used for this purpose.  Subsequent historical data may provide insights and predict new data.

Historic data can be used to learn by building models.  The life of those models is based on the past and their effectiveness is usually for a short period of time.  The performance of models can be monitored and tested.  The findings are confirmed or not confirmed through that validation process.  Data mining classification can be binary in that this will or will not likely occur.  If there are high levels of variables the size may need to be reduced.  Reduction is obtained by merging, combining groups and even the deletion of material.  Planning data mining requires a proper allowance of time for the project.  That project will need to be supported and developed on an ongoing basis.

2. Mathematical Anthropocentric Sciences

Systematic political science uses the META formulae to encompass the data of all its primary subsets:  theology, epistemology, psychology, sociology, and eschatology.  Data from each of those areas can be mined and compiled separately using the same META format of x, y, and z planes.  The y axis would be data specific for each category.

2.1 Mathematical Theology

Mathematical theology is an approach of assigning numeric value to possible theological beliefs.  T1 is a belief in the infinite God of the first cause in creation.  T2 is a belief in an unbalanced finite god.  T3 is also a belief in a finite god(s) but at the lowest levels.  The y coordinate would be used to map this data.

2.2 Mathematical Epistemology

Math values are assigned to having goals of compliance with or noncompliance with natural laws of freewill (NLF) in mathematical epistemology.  Entries are made from the data on the y axis.  (See the Attachment of this paper concerning the bless/curse paradigms.) 

2.3 Mathematical Psychology

Psychometrics and past behavior can be used to model mathematical psychology.  Observations are mapped of the pursuit and achievement of the five common levels of human needs:  survival, economic security, love and affection, status and self-esteem, and self-actualization.  Decisions made under certainty of outcome, uncertainty of outcome, and risk of loss can be statistically analyzed.

2.4 Mathematical Sociology

The P1, P2, and P3 population demographics of the four societal institutions of family, church, business, and government are each mapped.  They are part of either a First World system's five societal levels or a Second World's two societal levels or a Third World system's single societal level.

2.5 Mathematical Eschatology

Mathematical eschatology maps the possible human beliefs concerning the future.  Math values are assigned to the faiths in the eternal concepts of hell, heaven, and annihilation as well as the immediate future of mankind.

3. Information Operations

The Joint Publication 3-13 describes Information Operation (IO) as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOPS), military deception (MILDEC), and operations security (OPSEC).  They work in concert with specified supporting and related capabilities to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting one's own capabilities.  Because of the intense coordination and prevention of conflicting efforts required for IO, this is often referred to as an integration strategy.

Data mining should consider the information to be mined as suspect.  The mining process should produce data without giving away one's own advantage to an enemy.  Proverbs chapter 29 and verse 12 says a fool utters all that is in his heart.  In Isaiah chapter 39 King Hezekiah freely gave away his nation's secrets to his enemies which they used to eventually dominate his kingdom.  A disinformation campaign is usually a wise precaution.

Disinformation operations involve the intentional dissemination of information to produce deception.  The more types of sensory input and the greater their amounts increase the neuro identification of that information as reality regardless as to whether it is true or is not true. For example, movies made in Hollywood intentionally show few negative consequences for behavior that is in violation of NLF nor do they show positive consequences for the compliance of NLF.  That illusion of relativism routinely causes surprise when those behaviors are imitated with real results that contradict the movies false portrayal of cause and effect.

Business models are used to sell products and in this case the product is an idea.  The following effects should be kept in mind.

Context Effects--a choice may be based on the context of a situation that can be altered.

Constructed Process--choices are often made on the spot and can be manipulated.

Framing--the idea is framed to an advantage.

Heuristic Screening--when under pressure to choose among many possibilities people can be corralled.

Lens Model--people see the world through the lens of perceptions that can be influenced.

Memory Schema--positive images can be tied to the idea.

Mental Accounting--people remember gains and losses differently.

Self-perception--the self-image of people affects their choice.

Due to the prominence of mass communication today the illusion of a one-on-one interaction with the audience is created by the communicator.  The audience is given a false belief of intimacy and is likely to trust the host.  That parasocial relationship is routinely manipulated by politicians and entertainment personalities for money and position.  This one-sided relation may become frustrating to the audience when the reality of their lack of control is realized.  Syndromic surveillance is a term that may be applied to health crisis protocol alerts for bioterrorism.  It is applied here for the use of semantical and behavioral surveillance of data to signal a sufficient probability to warrant an appropriate response.  Such a response should be validated by red-teaming whenever possible.

4. Conclusion

Data mining can be used to enhance the analysis and prediction of both individual and nation-state behavior in systematic political science.  The subsets of theology, epistemology, psychology, sociology and eschatology have mathematical values that can be specifically modeled. Those models make up parts of information operations.  However, it can be shown by blessed and cursed behavior that there are deviations in the relationships between the outcomes that are compliant with or not compliant with NLF.  Therefore, models will always be in a state of flux and analysts should strive to insure there is as little garbage being inputted so there will be less garbage coming out.  Those knowledgeable and disciplined efforts are a mainstay of successful operations.

ATTACHMENT

The Bless/Curse Paradigms

A perfect relation between compliance with NLF and a positive outcome nor noncompliance with NLF and a negative outcome is always the case.  It can be observed that compliance with NLF is rewarded beyond mere expectations of compliance and noncompliance is not as punished by circumstances as expected.  This is called being blessed.  It can also be observed that compliance with NLF is not as rewarded as expected and noncompliance with NLF is more harshly punished than expected.  This is called being cursed.  Though man can hope to bless or hope to curse they have no power over NLF.  Only the God of the first cause of NLF could have the power or authority to bless or curse.  Man can, of course, be an instrument of blessing or be a curse to other people.

The Bible provides the examples of Abraham and his descendants being blessed by Divine grace, and Ham and his descendents being cursed by Divine justice.  This pattern or paradigm may be seen in the data collated that would seem to have one outcome but instead has another outcome.  This does not mean that there are not negative consequences to violating NLF or not positive consequences to complying with NLF.  There may just be a supernatural component to the totality of those outcomes.  Galatians chapter 3 says by grace God delivered man from the curse of the justice of the law by redeeming mankind through Jesus' atonement.  It explains that through faith in Jesus the law is still obeyed but the law is no longer the sole schoolmaster to teach about God. Such believers are to be rewarded with blessings from the present through eternity.

---------------------------------ALL RIGHTS RESERVED © 2007 Dallas F. Bell, Jr.--------------------------------