Insight and Security Informatics: An Information Economics Perspective

0
0
1917 days ago, 726 views
PowerPoint PPT Presentation
Plan. Difficulties to Intelligence and Security InformaticsAnalyzing the motivating forces and believability of data: Insights from data economicsSignaling and its applications in ISISignal-sticking and its applications in ISIComplexities one of a kind to ISIProviding significant insight: bits of knowledge from new improvements in learning administration.

Presentation Transcript

Slide 1

´╗┐Insight and Security Informatics: An Information Economics Perspective Lihui Lin, Xianjun Geng, Andrew B. Whinston School of Management, Boston University Center for Research in Electronic Commerce, University of Texas June 3, Tucson

Slide 2

Agenda Challenges to Intelligence and Security Informatics Analyzing the motivating forces and validity of data: Insights from data financial matters Signaling and its applications in ISI Signal-sticking and its applications in ISI Complexities interesting to ISI Providing noteworthy knowledge: bits of knowledge from new advancements in learning administration

Slide 3

Challenges to Intelligence and Security Informatics The test lies in the sheer data over-burden, as well as in the convolutions in the data. Three capacities that a knowledge and security data framework ought to have: Process immeasurable volume of data; Process and examine data from various sources with particular motivating forces and validity ; Provide significant insight, i.e. propose preemptive activities in view of the investigation of data .

Slide 4

Challenges to Intelligence and Security Informatics The need to concentrate the motivators and validity of various data sources is one of a kind to insight and security informatics (ISI). Characteristic sciences: impetuses normally not an issue ; Knowledge Management: learning imparting between gatherings to splendidly or to a great extent adjusted premiums (e.g. inside an association); Economics, Finance, Accounting speculations concerning hilter kilter data: parties with mostly adjusted premiums; ISI: assorted data sources with unmistakable motivations

Slide 5

Information Economics: Overview Information financial aspects, which contemplates impetuses and advertise balance in circumstances with lopsided data, has been a productive piece of monetary hypothesis for over two decades. Akerlof (1970): The market for lemons Spence (1973): Signaling in labor markets Rothschild and Stiglitz (1976): Screening in protection markets. Green and Stokey (1980), Crawford and Sobel (1982): summed up sender-collector display

Slide 6

Signaling Games and Implications to ISI Labor advertise (Spence 1973) Workers have private data about their actual capacity. They all have the motivating force to exaggerate their capacity. Training level fills in as a "flag" to the business about the genuine capacity of the laborer. Either isolating or pooling balance may happen. Story of gazelles (Bergstrom 2002): Grazing on the savannah, a gazelle spots a catlike frame traveling through the tall grass fifty meters away. It lifts its head, tuning in, sniffing the breeze, and afterward all of a sudden, discharged like a jack-in-the-container, it springs straight up into the air, six feet high. It lands, just to more than once jump set up over and over. Different individuals from the crowd see, and rapidly start to impersonate its show.

Slide 7

Signal Games and Implications to ISI Deception: In correspondences, there are straightforward and untrustworthy senders of data and just they know their identity. The deceptive sort tries to emulate the practices of the legit sort to persuade the data recipient that they are coming clean. Two conceivable outcomes: Separating: its absolutely impossible that the unscrupulous can impersonate the practices of the legit. Pooling: the practices of the legit can be splendidly imitated by the exploitative and the beneficiary can't recognize them. How to accomplish the isolating outcome? Plan a flagging instrument.

Slide 8

Signal-sticking Games and Implications to ISI Signal-sticking models in back: No one knows the genuine capacity of a chief, including the director himself. The director endeavors to enhance the execution of the organization. Profession concern display Inefficient administrative conduct show Whatever the exertion is, the stockholders are not tricked and will accurately make sense of the genuine capacity or the genuine execution of the organization. The "endeavors" made by the director are stuck signs.

Slide 9

Signal-sticking Games and Implications to ISI Signal-sticking case in ISI setting: No sender knows precisely how profitable his/her data is. In any case, everybody tries to stress the significance of his/her data, utilizing different signs/prompts. The beneficiary rebates the significance of all data. Result: Signals are stuck and no data is imparted successfully.

Slide 10

Information financial aspects models: One specific model, flag or flag sticking, is utilized to manage one issue. Senders of data may have distinctive attributes, yet are homogeneous in their impetuses and data structure. Knowledge and Security Informatics: Must decide the right model to utilize: flagging or flag sticking; flags or clamor. Senders of data vary in qualities, as well as heterogeneous in their motivating forces and data structure, which implies one kind of model can't completely portray the issue. ISI: Unprecedented Complexities

Slide 11

ISI: Unprecedented Complexities Effective correspondence Standard Signaling ? Has private data ? Sender's data structure Standard Signal-sticking ? No private data Fully adjusted to recipient Between completely adjusted and completely restricting Completely clashing Sender's interests

Slide 12

Task of ISI As a foundation in knowledge and security informatics, a hypothesis ought to be produced, which consolidates the heterogeneity of the senders and gives arrangements that permit the beneficiary to observe between senders of various nature and additionally the data itself.

Slide 13

Challenges to Intelligence and Security Informatics Three capacities that an insight and security data framework ought to have: Process unlimited volume of data; Process and break down data from different sources with particular motivating forces and believability; Provide significant knowledge, i.e. propose preemptive activities in light of accessible data . ISI must have the capacity to recommend preemptive activities absolutely in view of the investigation of data.

Slide 14

Knowledge Value (imperceptible) Knowledge Usefulness Knowledge Adoption Signals Knowledge Quality (inconspicuous) Distorted Message Noise Knowledge Usefulness Adoption Distortion (by the sender) Related Theories Geng, Lin and Whinston (2003): a sender-recipient structure for learning exchange

Slide 15

Concluding Remarks Intelligence and Security Informatics goes up against interesting issues and a data financial aspects point of view is helpful in tending to these issues. Issues in ISI are more mind boggling than any issue that data financial matters has ever considered.

Slide 16

Questions?

SPONSORS