COMPUTER BASED PRESCRIPTIVE DECISION SUPPORT Ari Riabacke

Total Page:16

File Type:pdf, Size:1020Kb

COMPUTER BASED PRESCRIPTIVE DECISION SUPPORT Ari Riabacke COMPUTER BASED PRESCRIPTIVE DECISION SUPPORT Ari Riabacke Department of Information technology and Media Fibre Science and Communication Network Mid Sweden University R–02–33 ISSN 1650-5387-2002:10 September 2002 Licentiate Thesis Department of Information technology and Media Mid Sweden University R-02-33 ISSN 1650-5387 2002:10 © 2002 Ari Riabacke Printed in Sweden 2002, Tryckeriet, Mid Sweden University I am based on a true story. To my wife Malin, our children Mi and Philippa and to Isak the proud big brother. Abstract The overall aim of this thesis is to study in what type of decision situations (involving risk and uncertainty) managers encounter problems and pitfalls, and to propose formalised methods for handling such situations. Traditionally, at least from an academic perspective, utility theory and the principle of maximising the expected utility has had a great influence on decision-making in such contexts. Even though this principle is often useful when evaluating a decision situation, it is not necessarily, despite what has often been claimed, the definition of rationality. And other approaches are definitely worth considering. The thesis has three main components. It develops a compilation of normative, descriptive and prescriptive theories within the area of risk taking and decision-making. Thereafter follows an empirical study examining some aspects of how managers define risk, how they handle risk, how they make risky decisions and how the organisational context affects the decision- making processes. This part contains an analysis of how managers make their choices from different risky prospects. Taking this into account, the third part brings attention to some of the problematic features of evaluation through utility theory and tries to constructively relax the demand for precise data in situations where only imprecise data are available. i ii Acknowledgements I would like to express my gratitude to: Prof. Love Ekenberg for believing in me, for always supporting me in my academic work, and for valuable guidance in the academic jungle as well as in life in general, i.e. for being an excellent supervisor. Nils Hagen at SCA who has helped me to get in contact with people important for this study. FSCN for considerable financial support. Dr. Marek Makowski, The Institute for Supplied Systems Analysis (IIASA), for patient supervision during Young Scientists Summer Program (YSSP). All fellow YSSPers for an unforgettable summer (2001) in Laxenburg. FORMAS for a generous grant which made that period possible. Dr. Johan Thorbiörnson for many fruitful discussions concerning scientific as well as existential matters. Fiona Wait and Katarina Riabacke, Institute of Information technology and Media (ITM), Mid Sweden University, for proof reading the manuscript. And finally my dear wife Malin for continuously proof reading draft versions of the manuscript and for being a wonderful mother, wife and life partner☺ Philippa and Isak for successfully helping me to divert my thoughts and for helping me focus on the really important things in life. iii iv Contents 1. Introduction..................................................................................................................... 1 2. Risk modelling................................................................................................................. 5 2.1. Definition of Risk ................................................................................................................. 5 2.2 Normative theory .................................................................................................................. 6 2.2.1 Normative rules for choice subject to risk...................................................................................... 6 2.2.2 Mathematical aggregation .............................................................................................................. 9 2.2.3 Aggregating preference judgements ............................................................................................. 11 2.2.4 Criticism against the normative theories ...................................................................................... 14 2.2.4.1 The expected value theory..................................................................................................... 14 2.2.4.2 The expected utility theory .................................................................................................... 15 2.2.4.3 Allais’ paradox ...................................................................................................................... 17 2.2.4.4 Irrelevant contextual effects .................................................................................................. 19 2.3 Descriptive theory............................................................................................................... 22 2.3.1 Descriptive approach to risky choice............................................................................................ 23 2.3.2 Prospect theory - an alternative to the expected utility theory as a descriptive model ................. 27 2.4 Prescriptive theory.............................................................................................................. 32 2.4.1 An example of prescriptive theory in which all three theories are used ....................................... 34 2.5 The decision-making context ............................................................................................. 39 2.5.1 Organisational structure................................................................................................................ 39 2.5.2 Mechanistic and organic organisational structure......................................................................... 40 2.5.3 Organisational culture................................................................................................................... 41 2.5.4 Autocratic and democratic culture, and levels of culture.............................................................. 42 2.6 Discussion ............................................................................................................................ 45 2.6.1 Normative, descriptive and prescriptive theories..........................................................................45 2.6.2 The structure and the culture ........................................................................................................ 47 3. How do managers make risky decisions? .................................................................... 50 3.1 Background ......................................................................................................................... 50 3.2 Attitudes towards risk ........................................................................................................ 52 3.2.1 What is risk?................................................................................................................................. 52 3.2.2 Risky situations ............................................................................................................................ 53 3.2.3 Risk and return – are they related? ............................................................................................... 54 3.2.4 Risk and uncertainty – are they related?....................................................................................... 55 3.3 Dealing with risk ................................................................................................................. 56 3.3.1 Can risk be managed?................................................................................................................... 57 3.3.2 Is it possible to identify risk-prone and risk-averse persons? ....................................................... 58 3.3.3 What do the managers think of themselves - are they risk prone or risk averse? ......................... 60 3.3.4 Do the managers use any computer-based decision aids when working with risk estimations and/or decision problems?.................................................................................................. 60 3.4 The decision-making context ............................................................................................. 61 3.4.1 The organisational structure and the decision-making culture ..................................................... 61 3.5 An analysis of how the managers choose risky prospects ............................................... 65 3.5.1 Certainty effect ............................................................................................................................. 65 3.5.2 The reflection effect...................................................................................................................... 68 3.5.3 The isolation effect ....................................................................................................................... 71 3.6 Discussion ............................................................................................................................ 73 4. Computerised risk modelling........................................................................................ 77 4.1 What problem areas have been identified? ...................................................................................... 77 v 4.2 Modelling risky prospects ..............................................................................................................
Recommended publications
  • IFIP Advances in Information and Communication Technology 364
    IFIP Advances in Information and Communication Technology 364 Editor-in-Chief A. Joe Turner, Seneca, SC, USA Editorial Board Foundations of Computer Science Mike Hinchey, Lero, Limerick, Ireland Software: Theory and Practice Bertrand Meyer, ETH Zurich, Switzerland Education Arthur Tatnall, Victoria University, Melbourne, Australia Information Technology Applications Ronald Waxman, EDA Standards Consulting, Beachwood, OH, USA Communication Systems Guy Leduc, Université de Liège, Belgium System Modeling and Optimization Jacques Henry, Université de Bordeaux, France Information Systems Jan Pries-Heje, Roskilde University, Denmark Relationship between Computers and Society Jackie Phahlamohlaka, CSIR, Pretoria, South Africa Computer Systems Technology Paolo Prinetto, Politecnico di Torino, Italy Security and Privacy Protection in Information Processing Systems Kai Rannenberg, Goethe University Frankfurt, Germany Artificial Intelligence Tharam Dillon, Curtin University, Bentley, Australia Human-Computer Interaction Annelise Mark Pejtersen, Center of Cognitive Systems Engineering, Denmark Entertainment Computing Ryohei Nakatsu, National University of Singapore IFIP – The International Federation for Information Processing IFIP was founded in 1960 under the auspices of UNESCO, following the First World Computer Congress held in Paris the previous year. An umbrella organi- zation for societies working in information processing, IFIP’s aim is two-fold: to support information processing within ist member countries and to encourage technology transfer to developing nations. As ist mission statement clearly states, IFIP’s mission is to be the leading, truly international, apolitical organization which encourages and assists in the development, ex- ploitation and application of information technology for the benefit of all people. IFIP is a non-profitmaking organization, run almost solely by 2500 volunteers. It operates through a number of technical committees, which organize events and publications.
    [Show full text]
  • Structured and Knowledge Based System Design
    MODERN THEORY OF INFORMATION - STRUCTURED AND KNOWLEDGE BASED SYSTEM DESIGN SAID KRAYEM ZLÍN 2016 ABSTRACT This keynote will address the challenges in the digital engineering field with a specific focus on analyzing security and harnessing the gaps that exist and the progress that needs to be made in the coming decade. The state–based Event-B formal method relies on the concept of correct step-by-step development ensured by discharging corresponding proof obligations. The CommonKADS methodology is a collection of structured methods for building knowledge-based systems. A key component of CommonKADS is the library of generic inference models which can by applied to tasks of specified types. These generic models can either be used as frameworks for knowledge acquisition or to verify the completness of models developed by an analysis of the domain. Key words: System, Knowledge Representation, Expert System Design, Knowledge-based Systems, Knowledge Engineering, Formal Methods, events, action, machine and context ACKNOWLEDGEMENT The most important person I would like to thank is my room-mate Susan. Having Susan as a room-mate gives you the freedom to pursue your individual interest. Furthermore, she gives you the feeling that you can do something useful. CONTENTS INTRODUCTION ............................................................................................................... 8 1 SYSTEM DEFINITION .............................................................................................. 9 1.1 SYSTEM ENGINEERING .........................................................................................
    [Show full text]
  • Time Series Data Analysis Using Probabilistic and Neural Network
    Time series data analysis using probabilistic and neural network Chiu-Che Tseng1 1Department of Computer Science and Information Systems Texas A&M University – Commerce, TX 75429, U.S.A. Abstract We explored several ways to reduce the complexity of the investment decision deliberation that might cause the investors to lose money under urgent Artificial intelligence decision support system is situations, and, at the same time, to provide the always a popular topic in providing the human user highest quality investment recommendations possible. with an optimized decision recommendation when For portfolio management, Strong [16], Reilly operating under uncertainty in complex environments. and Norton [13] and Jones [9] brought several The particular focus of our discussion is to compare traditional portfolio management strategies. And different methods of artificial intelligence decision Sycara, et al. [17] focused on using distributed agents support systems in the investment domain – the goal to manage investment portfolios. Their system of investment decision-making is to select an optimal deployed a group of agents with different portfolio that satisfies the investor’s objective, or, in functionality and coordinated them under case-based other words, to maximize the investment returns situations. They modeled the user, task and situation under the constraints given by investors. In this study as different cases, so their system activated the we applied several artificial intelligence systems like distributed agents for information gathering, filtering Influence Diagram (a special type of Bayesian and processing based on the given case. Their network) and Neural Network to get experimental approach mainly focused on portfolio monitoring comparison analysis to facilitate users to intelligently issues and has no mechanism to deal with uncertainty.
    [Show full text]
  • Probability Elicitation in Influence Diagram Modeling by Using Interval Probability
    International Journal of Intelligence Science, 2012, 2, 89-95 http://dx.doi.org/10.4236/ijis.2012.24012 Published Online October 2012 (http://www.SciRP.org/journal/ijis) Probability Elicitation in Influence Diagram Modeling by Using Interval Probability Xiaoxuan Hu1,2, He Luo1,2, Chao Fu1,2 1School of Management, Hefei University of Technology, Hefei, China 2Key Laboratory of Process Optimization and Intelligent Decision-Making, Ministry of Education, Hefei, China Email: [email protected] Received May 29, 2012; revised July 31, 2012; accepted August 10, 2012 ABSTRACT In decision modeling with influence diagrams, the most challenging task is probability elicitation from domain experts. It is usually very difficult for experts to directly assign precise probabilities to chance nodes. In this paper, we propose an approach to elicit probability effectively by using the concept of interval probability (IP). During the elicitation process, a group of experts assign intervals to probabilities instead of assigning exact values. Then the intervals are combined and converted into the point valued probabilities. The detailed steps of the elicitation process are given and illustrated by constructing the influence diagram for employee recruitment decision for a China’s IT Company. The proposed approach provides a convenient and comfortable way for experts to assess probabilities. It is useful in influ- ence diagrams modeling as well as in other subjective probability elicitation situations. Keywords: Influence Diagram; Probability Elicitation; Interval Probability; Decision-Making 1. Introduction To deal with the imprecision and inconsistence of sub- jective probabilities, quite a few methods are developed An influence diagram (ID) [1] is a directed acyclic graph to guide experts correctly giving probabilities, such as for modeling and solving decision problems under un- using visual tools like probability scale [8], probability certainty.
    [Show full text]
  • Applications of Decision and Utility Theory in Multi-Agent Systems
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering, Department CSE Technical reports of 9-13-2004 Applications of Decision and Utility Theory in Multi-Agent Systems Xin Li University of Nebraska, [email protected] Leen-Kiat Soh University of Nebraska, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/csetechreports Part of the Computer Sciences Commons Li, Xin and Soh, Leen-Kiat, "Applications of Decision and Utility Theory in Multi-Agent Systems" (2004). CSE Technical reports. 85. https://digitalcommons.unl.edu/csetechreports/85 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Technical reports by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. University of Nebraska–Lincoln, Computer Science and Engineering Technical Report TR-UNL-CSE-2004-0014 Issued 9/13/2004 Applications of Decision and Utility Theory in Multi-Agent Systems Xin Li, Leen-Kiat Soh Department of Computer Science and Engineering University of Nebraska–Lincoln {xinli, lksoh}@cse.unl.edu September 2004 Abstract This report reviews the applications of decision-related theories (decision theory, utility theory, probability theory, and game theory) in various aspects of multi-agent systems. In recent years, multi-agent systems (MASs) have become a highly active research area as multi-agent systems have a wide range of applications. However, most of real-world environments are very complex and of uncertainty. An agent’s knowledge about the world is rather incomplete and uncertain.
    [Show full text]