<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Higher Order Uncertainty and Evidential Ontologies</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Justin Brody Department of Mathematics and Computer Science Franklin and Marshall College Lancaster</institution>
          ,
          <addr-line>PA 17604</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-The uncertainties implicit in intelligence gathering are not only about the state of the world, but also about the ways in which varying contexts should affect the degree to which a proposition is believed. We call this latter form of uncertainty higher order uncertainty, and argue that the introduction of a logical operator to K. Laskey's MEBN specification can allow for learning about such uncertainty to occur.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], Laskey et. al proposed the creation of ontologies
of evidence as a way of facilitating intelligence gathering.
Their proposal envisioned such ontologies as represented by
Bayesian belief networks. In particular, the proposal of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
and the similar proposal in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] envisioned a network in which
various assertions about the world were assigned degrees of
belief. The relationships between such beliefs and pertinent
facts were encoded in the structure of the network, and the
impact of new facts on the degrees of belief were updated via
Bayesian learning. While a great deal of the relational structure
pertinent to reasoning in a specific scenario can be captured
in the structure of a pure Bayesian network, an extra level of
expressivity will be represented by an implementation done in
MEBN [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], Laskey’s fusion of Bayesian networks with
firstorder logic. The introduction of logical formalism allows an
ontology to represent and learn more general structure than
would otherwise be allowed. Laskey has shown that for any
logical consequence of a MEBN theory, the associated learning
algorithm will derive that consequence in the limit.
      </p>
      <p>It is worth noting that the expressivity of first-order logic
is likely to be crucial when working with human intelligence
sources. While a source may make quantifier-free assertions
(such as “bin Laden is Kandahar”), he or she is also likely
to make assertions whose content necessarily uses quantifiers.
For example, a highly credible source might make the
following assertions:
1) “bin Laden is somewhere in Afghanistan”
2) “the only luxury cars used by al-Qaeda are in Kandahar,</p>
      <p>Parachinar, or Islamabad”
3) “bin Laden was recently seen in an al-Qaeda owned
luxury car”
To conclude from this information that bin Laden is (probably)
in Kandahar requires the deductive power of first-order logic.</p>
      <p>
        One feature which will not automatically be present in
such a scheme is the ability to robustly code and learn the
ways in which contextual factors affect the manner in which
evidence determines the appropriate confidence for a particular
assertion. For example, the credibility of a particular source is
not likely to be a static property of that source, but rather
a parameter which changes based on circumstances ( for
example, if a source is the subject of physical or financial
distress ). While the proposal in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] allows for a complex
network of reasoning to support the determination of any
one particular credibility distribution, and further allows for a
source’s credibility to be indexed by the context in which the
assertion is made, it does not allow for a general mechanism
which would decrease any source’s credibility if that source
is under duress. Rather, it relies on the knowledge engineer
to make a determination of how credibility should be affected
by duress. Furthermore, it does not allow the network to learn
about the complex ways in which several factors such as
age, constitution, family status, etc. might influence the effect
of duress on credibility. The immense complexity of human
psychology makes such a determination highly non-trivial, and
equally as wanting of computational assistance as many of the
assertions such networks are designed for. 1
      </p>
      <p>I will argue in this paper that extending MEBN to allow for
a new operator will mitigate some of these problems. While
passing to a full-blown higher order implementation is fraught
with difficulties (lack of deductive completeness, for example),
an implementation in which a single operator is introduced can
add the requisite expressivity while preserving fundamental
meta-logical properties.</p>
    </sec>
    <sec id="sec-2">
      <title>II. HIGHER ORDER UNCERTAINTY</title>
      <p>
        Let us consider a situation in which the human source X
makes assertions 1-3 above. We would want to represent his
assertions, but we would also want to include information
about the credibility of his assertions, as discussed in [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In particular, we would want to have an assessment of X’s
credibility in making his assertion, which would include
information about his deceptiveness, competence and opportunity
to judge the situation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. These are all factors which would
be subject to varying contextual conditions, rather than being
static properties of X. As such, they seem to be best coded
either as joint properties of the source and the assertion, or
else single properties of the assertion (the latter being a form
1One question that is immediately raised in this context is that of
determining what the most important factors in determining a source’s credibility are.
While this is an important question, its answer is best determined by experts
in the appropriate fields (e.g. psychology for human sources, or engineering
for mechanical ones)
of short-hand for the former, since (tokens of) assertions are
associated with unique sources).
      </p>
      <p>As a particular case, let us suppose that X makes his
assertions while under some form of duress. It is clear that
the duress should have some effect on the credibility of X ’s
assertion, but it is not clear what precisely that effect should
be (in fact there are cases in which duress would conceivably
increase the credibility of an assertion, while one would expect
the credibility to decrease under most circumstances). It will
apparently depend on a number of factors, including the nature
of the duress, various facts about X , and the nature of the
statement being made. In fact, it doesn’t take very long to
realize that the number of factors and potential ways they
can interact quickly defies any easy analysis. This complexity
creates a new form of uncertainty. Noting that this is about
the network structure rather than about what the network
represents, we term this uncertainty higher order.</p>
      <p>
        One might certainly treat each assertion individually, and [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
suggests the possibility of having a complex network behind
the credibility distribution of any source’s assertion of any
particular statement. However this misses an opportunity to
discover general truths about the structure of the higher order
uncertainty, and a universal mechanism for coding hypotheses
about that structure would be beneficial.
      </p>
      <p>One obvious way of implementing this would be to allow
complex parameter based statements to be made about a
source’s assertion. For example, a partial rule for determining
the effect of duress on the credibility of an assertion of a by
X might encode the following:
• If the assertion is inconsequential, then the credibility is
unaltered
• Otherwise, monetary duress combined with a belief by X
that he will be paid for his information should result in
the credibility of the assertion being decreased by some
parameter α
• A consequential assertion made while under physical
duress should result in a decrease by the parameter β
if X is deemed insufficiently competent to judge a.
Formally, this might be written as:
∀a∀X
Source(X ) ∧ Asserts(X, a) ∧ UnderDuress(X )
→
Consequential(a) &lt; χ) → ∆(Cred( a)) = 0
(Consequential(a) ≥ χ)∧
(DuressType(X ) = Monetary)∧
(Believes(X, “WillBePaidFor(X, Asserts(X, a)”)) &gt; ξ)
(∆(Cred( a)) = −α)
→
(Consequential(a) ≥ χ)∧
(DuressType(X ) = Physical)∧
(CompetenceToJudge(X, a) &lt; θ)
→ (∆(Cred( a)) = −β)
In this coding, χ, ξ and θ represent threshold parameters which
determine whether or not a variable is strong enough to have an
impact. The function ∆ represents the change in the credibility
of a given assertion, and α, β are parameters as described
above. One advantage of coding with parameters is that they
are subject to machine learning rather than being completely
determined by the judgement of a knowledge engineer.</p>
      <p>
        It is notable that many of these predicates (for example
Asserts(X, a) and Believes(X, b)) take propositions as
parameters. As such they do not necessarily lie within the scope
of first order logic. 2 One is left with the question of how
to represent such statements in an ontology of evidence. A
natural solution is provided by the work of Neuhaus and
Andersen in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In their paper on speech acts and
ontologies, these authors have suggested encoding speech acts by
introducing an AssertiveSpeechAct predicate along with a
PropositionalContent operator; the role of the latter is to
refer to the content of a given speech act. Introducing such
an operator into MEBN would allow for universal statements
about assertions; the semantics could be defined in such a way
that any instantiation of a speech act would come attached
with a default network structure, which would be modified as
learning (for example of the parameters α, β) occurred.
      </p>
    </sec>
    <sec id="sec-3">
      <title>III. NESTING SPEECH ACTS</title>
      <p>Another scenario which is worth considering is one in
which a source makes an assertion about another assertion.
For example, X might say that Y told him that bin Laden was
in Kandahar. An implementation of the AssertiveSpeechAct
mechanism described above would allow such structured
assertions to be represented quite naturally.</p>
      <p>Such nested speech acts are likely to occur, and any
ontology of evidence must be prepared to deal with them. As a
simple example, one would be inclined to give less credence
to an assertion heard third-hand than the same assertion given
first-hand.</p>
    </sec>
    <sec id="sec-4">
      <title>IV. CERTAIN KNOWLEDGE</title>
      <p>A final benefit of this proposal is possibly of greater
theoretical than practical value. Following the example of
the axiomatic method in mathematics, one can argue that
the findings in any knowledge base should be certain and
uncontroversial (this is analogous to the fact that the axioms of
a mathematical theory are normally taken to be self-evident.)
Any knowledge which is controversial should be generated
rather than assumed.</p>
      <p>By allowing speech acts to be encapsulated within higher
order structures, we are able to do away with some of the
ambiguity that might otherwise be inherent in working with
ontology of evidence. For example, rather than assigning a
credibility score to a particular act or actor, we can merely
record which facts pertain to credibility, and have the actual
score calculated by the network. In particular, in the previously
described example there would no controversy in recording
that Y asserted that bin Laden is in Kandahar and that Y was
under physical duress at the time of the assertion. To assign a
2There are first order theories in which propositions can be meaningfully
thought of as parameters for predicates, a natural example being Robinson’s Q
(via Go¨del coding). This is an exceptional theory however, and many theories
exist in which no such coding is possible.
credibility of 0.67, on the other hand, is very much a matter
of judgement and open to question. A scheme which records
the former rather than the latter may have an arbitrariness in
our choice of network structure and parameters, but at least the
latter are subject to being updated. Further, the arbitrariness of
structure and parameters arguably corresponds to the arbitrary
choice of a non-logical language and way of expressing a set
of first order axioms (in that they represent representational
rather than semantic choices).</p>
    </sec>
    <sec id="sec-5">
      <title>V. FUTURE WORK</title>
      <p>While the value of the expressivity contemplated is clear,
there are still many questions that need to be answered.
Amongst these, the question of what the added computational
cost would be seems to be foremost. While the case of
modal logic offers reasonable hope that this proposal might
be implemented in a way which preserves soundness and
completeness of the logical formalism, one would like to know
that the added complexity isn’t practically prohibitive.</p>
      <p>A related question that would be interesting to explore
is that of what level of quantifier complexity is actually
necessary. It is noteworthy that the immediate examples of
“higher order” statements that come to mind seem to be
universal (with respect to “higher order” predicates). A bound
on the required quantifier complexity could significantly ease
the computational cost of an implementation.</p>
    </sec>
    <sec id="sec-6">
      <title>VI. ACKNOWLEDGEMENTS</title>
      <p>I am very grateful to Fabian Neuhaus for introducing me
to the subject of ontologies and discussing various ideas with
me. In particular, I have had several very helpful exchanges
with him that have greatly clarified the goals and presentation
of this paper.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Laskey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Schum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Costa</surname>
          </string-name>
          , and T. Janssen, “
          <article-title>Ontology of Evidence,” ONTOLOGY FOR THE INTELLIGENCE COMMUNITY</article-title>
          , p.
          <fpage>20</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
            <surname>Laskey</surname>
          </string-name>
          , “
          <article-title>MEBN: A logic for open-world probabilistic reasoning,” The Volnegau School of Information Technology and Engineering</article-title>
          . George Mason University, Fairfax,
          <string-name>
            <surname>VA</surname>
          </string-name>
          , USA. Available at http://ite. gmu. edu/k˜laskey/index. html.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Wright</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Laskey</surname>
          </string-name>
          , “
          <article-title>Credibility models for multi-source fusion</article-title>
          ,” in Information Fusion,
          <year>2006</year>
          9th International Conference on,
          <year>2006</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Neuhaus</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Andersen</surname>
          </string-name>
          , “
          <article-title>The Bigger Picture: Speech Acts in Interaction with Ontology-based Information Systems</article-title>
          .”
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>