Cover image for Information Evaluation.
Information Evaluation.
Title:
Information Evaluation.
Author:
Capet, Philippe.
ISBN:
9781118898994
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (338 pages)
Contents:
Cover -- Title Page -- Contents -- Foreword -- Introduction -- Chapter 1. Information: Philosophical Analysis and Strategic Applications -- 1.1. Introduction -- 1.2. State of the art in philosophy -- 1.2.1. History -- 1.2.2. Information at the crossroads between epistemology and philosophy of language -- 1.3. Information warfare -- 1.3.1. The role of falsehood and of intentions -- 1.3.2. Deception, simulation and dissimulation -- 1.3.3. Addressees of information or the art of communicating -- 1.3.4. Information warfare as a play on beliefs -- 1.3.5. Disinformation and associated notions -- 1.4. Conclusion. Comprehending information in order to evaluate it -- 1.5. Bibliography -- Chapter 2. Epistemic Trust -- 2.1. Introduction -- 2.2. What is social epistemology? -- 2.3. History of the discipline -- 2.4. Social epistemology and externalism -- 2.5. Realism and constructivism in social epistemology -- 2.6. Believing other people -- 2.7. Reductionism and antireductionism -- 2.8. Trust and communication -- 2.9. Conclusion -- 2.10. Bibliography -- Chapter 3. The Fundamentals of Intelligence -- 3.1. Introduction -- 3.2. Information evaluation in the language of intelligence -- 3.2.1. A context which is not clearly defined, open to multiple interpretations -- 3.2.2. An informational model historically based on the evaluation of information and of sources -- 3.3. Attempt to formalize generic models appropriate for the new issues facing the intelligence services -- 3.3.1. Functional analysis as a support for definition -- 3.3.2. Paradigm shifts -- 3.3.3. Attempt at a rigorous definition of intelligence -- 3.4. Conclusion -- 3.5. Bibliography -- Chapter 4. Information Evaluation in the Military Domain: Doc -- 4.1. Introduction -- 4.2. Presentation of the existing situation.

4.2.1. Information evaluation in the intelligence cycle -- 4.2.2. Reliability and credibility of information -- 4.3. Illustrative scenario with multi-sourced information -- 4.4. From an inaccurate definition to an attractive but unusable concept -- 4.4.1. Estimation of reliability -- 4.4.2. Estimation of credibility -- 4.4.3. Combining dimensions - what is the comparability of the ratings? -- 4.4.4. Raw data, enriched intelligence - can information evaluation qualify everything? -- 4.5. A few suggested refinements to information evaluation techniques -- 4.6. Conclusion and future prospects -- 4.7. Bibliography -- Chapter 5. Multidimensional Approach to Reliability Evaluation of Information Sources -- 5.1. Introduction -- 5.2. Multi-criteria aggregation by the Choquet integral: application to the evaluation of the reliability of sources -- 5.2.1. Multi-criteria decision support -- 5.2.2. Multi-Attribute Utility Theory -- 5.2.3. Concepts of measurement and construction of utility functions -- 5.2.4. Aggregation function A: limitations of the weighted sum -- 5.2.5. The Choquet integral -- 5.2.6. Determination of the aggregation function A -- 5.2.7. Multi-level preference models -- 5.2.8. Estimation of a degree of reliability via the multi-criteria approach -- 5.3. Reliability of sources on Twitter -- 5.3.1. Twitter -- 5.3.2. Reliability of sources on Twitter: state of the art -- 5.4. Multi-criteria model for the reliability of Twitter accounts -- 5.5. Conclusion -- 5.6. Bibliography -- Chapter 6. Uncertainty of an Event and its Markers in Natural Language Processing -- 6.1. Introduction -- 6.2. State of the art -- 6.2.1. Detection of named entities -- 6.2.2. Detection of events -- 6.2.3. Detection of uncertainty -- 6.3. Model for representing the uncertainty of an event -- 6.3.1. Named entity model -- 6.3.2. Event model.

6.3.3. Uncertainty model -- 6.4. Linguistic resources -- 6.4.1. Technological context -- 6.4.2. Development and test corpora -- 6.4.3. Linguistic resources for named entity recognition -- 6.4.4. Linguistic resources for event extraction -- 6.4.5. Linguistic resources for uncertainty extraction -- 6.5. Realization -- 6.6. Conclusions and perspectives -- 6.7. Bibliography -- Chapter 7. Quantitative Information Evaluation: Modeling and Experimental Evaluation -- 7.1. Introduction -- 7.2. Formal framework used: possibility theory -- 7.2.1. Reasons for using possibility theory -- 7.2.2. Recap of possibility theory -- 7.2.3. Aggregation operators for possibility distributions -- 7.2.4. Application to information evaluation -- 7.3. Proposed architecture -- 7.3.1. General principle -- 7.3.2. Inputs to the process of information evaluation -- 7.3.3. Evaluation of individual elements -- 7.3.4. Fusion of individual ratings -- 7.4. Experimental study -- 7.4.1. Realistic generation of the uncertainty of a source -- 7.4.2. Description of the experiments -- 7.4.3. Measures of quality -- 7.4.4. Results -- 7.5. Conclusions -- 7.6. Bibliography -- Chapter 8. When Reported Information Is Second Hand -- 8.1. Introduction -- 8.2. Domains involved and related works -- 8.2.1. Document mining on the Web -- 8.2.2. Military intelligence -- 8.2.3. Analysis of press reports -- 8.2.4. Modal logic, validity and completeness of information sources -- 8.2.5. Modal logic and modeling of lying -- 8.3. A logical model to decide whether reported information is credible -- 8.3.1. Logical formalism -- 8.3.2. One level of imbrication -- 8.3.3. Two levels of imbrication -- 8.3.4. Conclusion about the logical model.

8.4. Taking account of uncertainty. A model for estimating the degree of credibility of a reported piece of information -- 8.4.1. The numerical model -- 8.4.2. One level of imbrication -- 8.4.3. Two levels of imbrication -- 8.4.4. Conclusion about the numerical model -- 8.5. Use of the logical model to generate hypotheses about the information sources -- 8.5.1. Motivation -- 8.5.2. An algorithm to generate responses -- 8.5.3. Illustration -- 8.5.4. Conclusion about the generation of hypotheses -- 8.6. Conclusion -- 8.7. Supplements -- 8.7.1. Main notions of logic -- 8.7.2. Main notions from the Theory of Evidence -- 8.8. Bibliography -- Chapter 9. An Architecture for the Evolution of Trust: Definition and Impact of the Necessary Dimensions of Opinion Making -- 9.1. Introduction -- 9.2. A perspective on trust -- 9.3. Dimensions of information evaluation -- 9.4. General evaluation of the source: reliability -- 9.4.1. Evaluation of reliability in the original scenario -- 9.5. Contextual evaluation of the source: competence -- 9.5.1. Evaluation of competence in the original scenario -- 9.6. General content evaluation: plausibility -- 9.6.1. Evaluation of plausibility in the original scenario -- 9.7. Contextual content evaluation: credibility -- 9.7.1. Evaluation of credibility in the original scenario -- 9.8. Global expression of trust -- 9.9. Architecture of information evaluation: characteristics -- 9.9.1. Order of integration of the dimensions -- 9.9.2. Sequentiality of the information evaluation chain -- 9.10. Architecture of information evaluation: a description -- 9.10.1. Reminders about the evaluation of the dimensions -- 9.10.2. Reliability of the source -- 9.10.3. Competence and plausibility -- 9.10.4. Credibility.

9.11. Personalization of information evaluation: modeling levels of gullibility -- 9.11.1. Reliability of the source -- 9.11.2. Competence and plausibility -- 9.11.3. Credibility -- 9.11.4. Discussion -- 9.12. Conclusion -- 9.13. Bibliography -- List of Authors -- Index.
Abstract:
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetrically detrimental, not only to the proper perception of this information but also to its use. Beyond these two extremes, each person generally adopts an intermediate position when faced with the reception of information, depending on its provenance and credibility. We still need to understand and explain how these judgements are conceived, in what context and to what end. Spanning the approaches offered by philosophy, military intelligence, algorithmics and information science, this book presents the concepts of information and the confidence placed in it, the methods that militaries, the first to be aware of the need, have or should have adopted, tools to help them, and the prospects that they have opened up. Beyond the military context, the book reveals ways to evaluate information for the good of other fields such as economic intelligence, and, more globally, the informational monitoring by governments and businesses. Contents 1. Information: Philosophical Analysis and Strategic Applications, Mouhamadou El Hady Ba and Philippe Capet. 2. Epistemic Trust, Gloria Origgi. 3. The Fundamentals of Intelligence, Philippe Lemercier. 4. Information Evaluation in the Military Domain: Doctrines, Practices and Shortcomings, Philippe Capet and Adrien Revault d'Allonnes. 5. Multidimensional Approach to Reliability Evaluation of Information Sources, Frédéric Pichon, Christophe Labreuche, Bertrand Duqueroie and Thomas Delavallade. 6. Uncertainty of an Event and its

Markers in Natural Language Processing, Mouhamadou El Hady Ba, Stéphanie Brizard, Tanneguy Dulong and Bénédicte Goujon. 7. Quantitative Information Evaluation: Modeling and Experimental Evaluation, Marie-Jeanne Lesot, Frédéric Pichon and Thomas Delavallade. 8. When Reported Information Is Second Hand, Laurence Cholvy. 9. An Architecture for the Evolution of Trust: Definition and Impact of the Necessary Dimensions of Opinion Making, Adrien Revault d'Allonnes. About the Authors Philippe Capet is a project manager and research engineer at Ektimo, working mainly on information management and control in military contexts. Thomas Delavallade is an advanced studies engineer at Thales Communications & Security, working on social media mining in the context of crisis management, cybersecurity and the fight against cybercrime.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: