Timely Decision Analysis Enabled by Efficient Social Media Modeling

Many decision problems are set in changing environments. For example, determining the optimal investment in cyber maintenance depends on whether there is evidence of an unusual vulnerability, such as “Heartbleed,” that is causing an especially high rate of incidents. This gives rise to the need for timely information to update decision models so that optimal policies can be generated for each decision period. Social media provide a streaming source of relevant information, but that information needs to be efficiently transformed into numbers to enable the needed updates. This article explores the use of social media as an observation source for timely decision making. To efficiently generate the observations for Bayesian updates, we propose a novel computational method to fit an existing clustering model. The proposed method is called k-means latent Dirichlet allocation (KLDA). We illustrate the method using a cybersecurity problem. Many organizations ignore “medium” vulnerabilities identified during peri...

[1]  Mark Steyvers,et al.  Finding scientific topics , 2004, Proceedings of the National Academy of Sciences of the United States of America.

[2]  Oleg A. Prokopyev,et al.  Sequential Shortest Path Interdiction with Incomplete Information , 2016, Decis. Anal..

[3]  V. Sinthu Janita Prakash,et al.  An empirical study on text analytics in big data , 2015 .

[4]  Atreyi Kankanhalli,et al.  Revisiting Media Choice: A Behavioral Decision-Making Perspective , 2012, Int. J. e Collab..

[5]  Theodore T. Allen Introduction to Discrete Event Simulation and Agent-based Modeling: Voting Systems, Health Care, Military, and Manufacturing , 2011 .

[6]  Uwe Aickelin,et al.  Modelling cyber-security experts' decision making processes using aggregation operators , 2016, Comput. Secur..

[7]  Theodore T. Allen,et al.  A directed topic model applied to call center improvement , 2016 .

[8]  Xiaoping Sun Textual Document Clustering Using Topic Models , 2014, 2014 10th International Conference on Semantics, Knowledge and Grids.

[9]  Theodore T. Allen,et al.  Data-Driven Cyber-Vulnerability Maintenance Policies , 2014 .

[10]  Edward J. Sondik,et al.  The Optimal Control of Partially Observable Markov Processes over a Finite Horizon , 1973, Oper. Res..

[11]  Xing Gao,et al.  Information Security Investment When Hackers Disseminate Knowledge , 2013, Decis. Anal..

[12]  Bernardo K. Pagnoncelli,et al.  Risk aversion in multistage stochastic programming: A modeling and algorithmic perspective , 2016, Eur. J. Oper. Res..

[13]  Yannis Charalabidis,et al.  Participative Public Policy Making Through Multiple Social Media Platforms Utilization , 2012, Int. J. Electron. Gov. Res..

[14]  Yongzhi Cao,et al.  Reducing Interval-Valued Decision Trees to Conventional Ones: Comments on Decision Trees with Single and Multiple Interval-Valued Objectives , 2014, Decis. Anal..

[15]  Gregory S. Parnell,et al.  Air Force Cyberspace Investment Analysis , 2015, Decis. Anal..

[16]  Siyang Wang,et al.  Predicting Best Responder in Community Question Answering Using Topic Model Method , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[17]  M. F. Porter,et al.  An algorithm for suffix stripping , 1997 .

[18]  Theodore T. Allen,et al.  Using focus group data to set new product prices , 2004 .

[19]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[20]  Marie-Elisabeth Paté-Cornell Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations , 2012, Decis. Anal..