A framework for analysing decisions under risk

被引:45
作者
Danielson, M
Ekenberg, L
机构
[1] Royal Inst Technol, Dept Comp & Syst Sci, DECIDE Res Grp, S-16440 Kista, Sweden
[2] Univ Stockholm, S-16440 Kista, Sweden
关键词
decision analysis; decision theory; utility theory; uncertain reasoning;
D O I
10.1016/S0377-2217(97)00022-2
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
The main objective is to present a framework for analysing decisions under risk. The nature of much information available to decision makers is vague and imprecise, be it information for human managers in organisations or for process in a distributed computer environment. Some approaches address the problem of uncertainty, but many of them concentrate more on representation and less on evaluation. The emphasis in this paper is on evaluation and even though the representation used is that of probability theory, other well-established formalisms can be used. The approach allows the decision maker to be as deliberately imprecise as he feels is natural and provides him with the means for expressing varying degrees of imprecision in the input sentences. The framework we present is intended to be tolerant and to provide means for evaluating decision situations using several decision rules beside the conventional maximisation of the expected utility. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:474 / 484
页数:11
相关论文
共 37 条
  • [1] ALLAIS M, 1953, EXPECTED UTILITY HYP
  • [2] [Anonymous], 1984, PRINCIPLES APPL DECI
  • [3] [Anonymous], 1950, STAT DECISION FUNCTI
  • [4] [Anonymous], 1980, ANAL HIERARCHY PROCE
  • [5] BOMAN M, 1994, P COOPERATING KNOWLE, P161
  • [6] BOMAS M, 1995, P DIMAS 1995
  • [7] CHEN SJ, 1992, EC MATH SYSTEMS, P375
  • [8] Choquet G., 1954, Annales de l'institut Fourier, V5, P131, DOI DOI 10.5802/AIF.53
  • [9] UPPER AND LOWER PROBABILITIES INDUCED BY A MULTIVALUED MAPPING
    DEMPSTER, AP
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1967, 38 (02): : 325 - &
  • [10] A cost model for managing information security hazards
    Ekenberg, L
    Oberoi, S
    Orci, I
    [J]. COMPUTERS & SECURITY, 1995, 14 (08) : 707 - 717