Decision theory and bayesian inference

Assignment Help Basic Computer Science
Reference no: EM13922141

Decision Theory and Bayesian Inference

An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().

Extensive evaluation using a benchmark corpus consisting exclusively of spam messages yields the following performance statistics for the spam filter:

  • 96% of the spam messages are blocked in the High-Security-Mode.
  • 90% of the spam messages are blocked in the Low-Security-Mode.

Extensive evaluation using a benchmark corpus consisting exclusively of non-spam (legitimate) messages yields the following performance statistics for the spam filter:

  • 10% of the non-spam messages are blocked in the High-Security-Mode
  • 4% of the non-spam messages are blocked in the Low-Security-Mode

The organization estimates that 80% of the messages that it receives are spam messages.

(a) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the High-Security-Mode is actually a spam message. Estimate .

(b) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the High-Security-Mode is actually not a spam message. Estimate .

(c) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the Low-Security-Mode is actually a spam message. Estimate .

(d) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the Low-Security-Mode is actually not a spam message. Estimate .

(e) If the cost of not blocking a spam message is $1 and the cost of blocking a non-spam message is $10, should the organization operate the spam filter in the High-Security-Mode? Why?

(f) Recall that the cost of not blocking a spam message is $1. At least how high should the cost of blocking a non-spam message be for a risk-neutral rational decision maker to prefer operating the spam filter in the Low-Security-Mode?

(g) Let  be the amortized cost per message of operating the spam filter. Write a short memo the CIO of the organization explaining at most how high  could be for the organization to use the spam filter with the specified performance?

Reference no: EM13922141

Questions Cloud

Target debt-equity ratio-what is the cost of equity : Frye, Inc., has a target debt-equity ratio of 1.60. Its WACC is 9.9 percent, and the tax rate is 38 percent. If the company's cost of equity is 16 percent, what is its pretax cost of debt? If instead you know that the aftertax cost of debt is 6.6 per..
Discuss key points of the recent dodd-frank legislation : Find the current beta for an S & P 500 company and discuss why you believe the firm has such a Beta, and discuss the ovweall riskiness of the firm from a stockholders viewpoint.
Complex numbers need to have explicitly stated values : How many nickels does a coin counter manufacturer need to weigh so that she can be 98% confident that her sample mean is within 25 milligrams of the true average weight of a nickel?
How would you respond to such an given argument : It has been argued that mutual insurance companies are dinosaurs-they are large, slow, bureaucratic, and inefficient. How would you respond to such an argument?
Decision theory and bayesian inference : An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().
Discuss general power of appointment for property decedent : Explain and discuss general power of appointment for property of a decedent, including the tax implications of appointing someone. Give some examples.
How will bobs optimal consumption choice change : How will Bob's optimal consumption choice change if the government imposes a $10/unit tax on the material welfare good?
Performance and diversity of employees in factory : Analyze different group and team concepts that could be implemented in order to improve the performance and diversity of employees in the factory.
Problem regarding the conflict management approaches : Write a 700- to 1,050-word paper that identifies the conflict management approaches used in your agency or place of work. How does this match or contradict your personal conflict management preference or style? Format your paper consistent with A..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which of the following is wrong

Which of the following is wrong? A. LDX #$5000 B. LDX #2550 C. LDX #$10000 D. LDX #$00 Explain Why!

  The concept of protecting personal information

This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use..

  Growth in global business activity affects

Growth in global business activity affects how employees and associates from different organizations and within the same organization network with each other. Use the internet to research how you might successfully network with peers in other countri..

  Common network for all onboard systems

What benefits are derived from the using a common network for all onboard systems. Comment on the security concern.

  Prepare business income statement for the period

With growing importance of computerised accounting systems, which inventory system (perpetual or periodic) has become more popular?  Explain why

  Demonstrate effective communication

Demonstrate effective communication by composing writing that communicates ideas, meaning and/or argument in a format that broadly follows conventions in the information systems field.

  Write subroutine in marie assembly that multiplies two value

Write a subtoutine in MARIE assembly that multiplies two values where the arguments for this subroutine are two pointers (each pointer pointing to a value). The routube, multiply (a,b), performs *a x *b where a's value is the address storing the valu..

  Currently use expert systems

Select two (2) companies that currently use expert systems. Then, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your..

  Develop the logic for a program

The exact number of household records has not yet been determined, but you know that Marengo has fewer than 300 households. Develop the logic for a program that allows a user to enter each household size and dtermine the mean and median household ..

  Discuss how a cyber warrior can use a social networking

Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

  Achieving greater maturity that addresses funding priorities

Explains a set of recommendations for achieving greater maturity that addresses funding priorities. Explain a set of recommendations for achieving greater maturity that addresses key management capabilities.

  Discuss the advantages of using procedures

Discuss the advantages of using procedures. Discuss how 80x86 procedures can be called from high-level programs or high-level procedures.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd