Credibility Models

Abstract

We present a general hierarchical Bayesian model where Intelligence Sources make Reports about events or states in the world, which we call Hypotheses. The underlying multi-entity Bayes net for even a simple scenario has hundreds of nodes. We hide the details via Wigmore diagrams and a Google Maps GUI. Our application domain is Intelligence data fusion in asymmetrical warfare (terrorism). Some Hypotheses - like whether a village is a threat – may be abstract or un-observable. For these, we define Indicators – more observable Hypotheses whose value has some bearing on the target Hypothesis. The hierarchy can be arbitrarily deep, and Reports can provide evidence at any level. Furthermore, all Sources have credibility models. Traditional Sources are physical sensors with well-known error models. Non-traditional Sources include humans, websites, news, etc. For these Sources, our credibility models include Hypotheses about unknown factors like objectivity, competence, accuracy, reliability, and veracity. Every Report by a Source provides evidence about those factors. So, for example, successful ad hominem attacks against one Source can undermine his assurances that a village is safe, and lead us to believe it is hostile after all.

Cite

Text

Twardy et al. "Credibility Models." Conference on Uncertainty in Artificial Intelligence, 2007.

Markdown

[Twardy et al. "Credibility Models." Conference on Uncertainty in Artificial Intelligence, 2007.](https://mlanthology.org/uai/2007/twardy2007uai-credibility/)

BibTeX

@inproceedings{twardy2007uai-credibility,
  title     = {{Credibility Models}},
  author    = {Twardy, Charles and Wright, Ed and Canon, Stephen and Takikawa, Masami},
  booktitle = {Conference on Uncertainty in Artificial Intelligence},
  year      = {2007},
  url       = {https://mlanthology.org/uai/2007/twardy2007uai-credibility/}
}