Chapter 9

The Value of Information and the Internet of Thingsa

Ira S. Moskowitz; Stephen Russell; Niranjan Suri    * Information Management and Decision Architectures Branch, Code 5580, Naval Research Laboratory, Washington, DC, United States
Battlefield Information Processing Branch, Computational Information Sciences Directorate, Army Research Laboratory, Adelphi, MD, United States

Abstract

We investigate a theory for the Value of Information (VoI) with respect to the Internet of Things (IoT) and IoT's intrinsic artificial intelligence. In an environment of ubiquitous computing and information, information's value takes on a new dimension. Moreover, when the system in which such a volume of information exists is itself intelligent, the ability to elicit value, with consideration of context, will be more complicated. Classical economic theory describes the relationship between value and volume which, though moderated by demand, is highly correlated. In an environment where information is plentiful, such as the IoT, the intrinsic intelligence in the system will be a dominant moderator of demand (e.g., self-adapting, self-operating, and self-protecting; controlling access). We examine Howard's (1966) VoI theory from this perspective and illustrate mathematically that Howard's focus on maximizing value obfuscates another important dimension, the guarantee of minimal value.

Keywords

Internet of Things; VoI theory; Artificial intelligence; Howard's model; Shannon's theory; Self-adapting

Acknowledgments

The authors acknowledge the assistance of Swmbo Heilizer. The authors also thank William F. Lawless for his careful reading of the draft version of this chapter and his helpful suggestions.

9.1 Introduction

Shannon (1948) laid the groundwork for information theory in his seminal work. However, Shannon's theory is a quantitative theory, not a qualitative theory. Shannon's theory tells you how much “stuff” you are sending through a channel, but it does not care if it is a cookie recipe or the plans for a time machine. The quality of “stuff” is irrelevant to Shannon theory. This focus on sending messages, exclusive of understanding or context, is in contrast to Value of Information (VoI) theory, which concerns what, and not necessarily how much, “stuff” we are considering. That is, Shannon is a purely quantitative theory, whereas any theory of information value must include a qualitative aspect that is equal in relevance as any quantitative measures.

This qualitative characteristic finds it way into many information-centric areas, particularly when humans or artificial intelligence (AI) is involved in a decision-making process. For example in Russell, Moskowitz, and Raglin (2017), the authors, not surprisingly, state “We note that a purely quantitative approach to information is far from satisfactory.” They then back this statement with discussions on Paul Revere, the Small Message Criteria (Moskowitz & Kang, 1994), and steganography. This is also discussed in Allwein (2004) where that research merged the work of Barwise and Seligman (1997) and Shannon's theory using channel theory tools from the logic discipline. However, these types of approaches in the literature do not offer immediate help with pragmatic concerns that exist in the Internet of Things (IoT) where information is plentiful and can also be excessive.

The nature of the IoT is one of pervasive data, continuously gathered and acted on by fully or semiautonomous devices and systems. This nature creates an interesting paradox in the context of VoI. If the IoT ushers in unimaginable volumes of information and one considers value as an economic construct, should not the “value” of information decrease? Perhaps in the average sense, for example, all information’s overall value may decrease, but certain information would still retain a value higher than most. This notion calls into question how applicable existing VoI theory would be in the context of IoT information and related decision making. Moreover, the implications of an intelligent IoT system of systems, which the IoT is, in implementation and operation, introduce another complicating factor toward a generalized theory of VoI. The intelligence in the IoT itself necessarily makes VoI determinations in its autonomous operation on behalf of human decision makers. In this manner, the IoT itself is imbued with its own AI, that manifests as self-star (self-⁎) behaviors. Self-⁎ behaviors are (Babaoglu et al., 2005) autonomic behaviors (such as self-management, self-awareness, self-protecting, etc.) that provide a device or system with an understanding of its contribution (or value) to global, greater, or external objectives/goals. The concept of the IoT's AI brings additional constraints to understanding VoI, given such a pervasive information system. Like the limitations of Shannon's information theory (Shannon, 1956), these considerations also create a fundamental issue for a solely quantitative theory of information's applicability to IoT decision making.

We attempt to address this issue by examining a VoI theory in the context of information provided by the IoT. Our thinking is grounded in the work of Ponssard (1975) and especially Howard (1966). These works discuss how VoI is part of decision analysis. We attempt to make an optimal decision, based upon expected utility/value. Howard (1966) discusses how a company decides how much to bid on a contract based upon the a priori information it has available. In this situation, the company attempts to maximize its expected profit. We note though that we disagree with how Howard obtained his “clairvoyant” results in the situation when additional information is available to the decision maker. AI plays a major role in any consideration of the VoI because techniques, such as machine learning, can distill additional information from the IoT, which can be used by a decision maker.

9.2 The Internet of Things and Artificial Intelligence

IoT is touted as the next wave in the era of computing (Gubbi, Buyya, Marusic, & Palaniswami, 2013) and has quickly been relabeled the Internet of Everything (Roy & Chowdhury, 2017). While the definition of the IoT may take many forms, there is little debate about the enormous amount of information it will make available (Barnaghi, Sheth, & Henson, 2013; Papadokostaki et al., 2017; Taherkordi, Eliassen, & Horn, 2017) for decision-related activities. Quoting from Moskowitz, Russell, and Jalaian (2018):

The Internet of Things (IoT) is the realization of interconnected and ubiquitous computing, pervasive sensing, and autonomous systems that can affect the physical world. … The “things” that exist in the IoT can be generally thought of as physical or computational objects that label, sense, communicate, process, or actuate thereby bridging the physical and virtual worlds (Oriwoh & Conrad, 2015; Pande & Padwalkar, 2014). While there is no universally accepted definition of the IoT, the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) defines the IoT as “a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things …”

In Moskowitz et al. (2018), beyond providing a definition of the IoT, the authors showed how side channels in the IoT architecture can cause information to be covertly/steganographically transmitted from one place in the IoT to another. They argue that IoT will make so much information available that new threats will emerge from hiding in (information’s) plain sight. We posit that the amount of available information in the IoT will change the supply and demand dynamic, resulting in a need for a new understanding of information's value. This relationship will likely follow an econometric view of value, where scarcity increases perceived and/or real value (Hansen & Serin, 1997; Rymaszewska, Helo, & Gunasekaran, 2017; Worchel, 1992). What makes the IoT such an interesting arena for VoI research is that even where the number of bits is the same everywhere in the IoT, the value of those bits can differ depending upon where and when you are in a certain location in the IoT. For example, if my smart refrigerator sends a message that I only have one egg left (extrapolating from Borgonovo, 2017), that information is only valuable to my cook, and it depends upon what my cook is planning on preparing before going to the market again. Since I do not cook, that information is of no value to me. However, if my alarm system sends a message to my smart phone that there is someone in my house when no one is supposed to be home, that information may be of some value to my cook, but it is extremely valuable information to me.

The IoT changes a user's normal perspective on how valuable information is obtained. We have many, many sources potentially sending information to a decision maker. This number of sources and amount of information can be both good and bad. It can be good by enabling us to reduce the uncertainty of some random variables. That is, one may be able to replace a continuous random variable with a large region of support, ideally with a Dirac delta distribution, where we would precisely know the information. That would be the ideal case and is discussed in the later sections of Howard (1966). However, in the following section we will illustrate some mathematical differences in what Howard did, and discuss our findings with regard to perfect information (clairvoyance), which are also different.

The IoT can also have negative effects; particularly when it comes to varied sources of potentially valuable decision-relevant information. Since the IoT is a huge conglomeration of processing and sensing devices, it is possible, and perhaps even likely, that contradictory information is obtained. Furthermore, the IoT will also be artificially intelligent itself (Elvy, 2017; Etzion, 2015). Machine learning algorithms are currently employed in the IoT at the local device and global usage levels (Ren & Gu, 2015). Much of the machine-learning approaches are implemented to provide the IoT with decision-making autonomy. In the next dimension of system intelligence, the IoT has already begun incorporating technologies to add increasing/improving autonomic or self-star (self-⁎) behaviors. Self-⁎ behaviors are those characteristics that form self-awareness and include self-organization, self-adaptation, and self-protection. The dependence on AI in IoT, in this context, is apparent. However, the implications for AI-enabled self-⁎ behaviors to impact information value are less clear. Nonetheless, there is ample documentation in the literature about how AI can and will be employed as a gatekeeper for information (Camerer, 2017; Conitzer, Sinnott-Armstrong, Borg, Deng, & Kramer, 2017; Naseem & Ahmed, 2017).

The overwhelming number of devices and data that they provide has already necessitated a need for machine learning (Witten, Frank, Hall, & Pal, 2016). The IoT easily interconnects devices and the information between them and with other objects and humans, facilitating the ability to transfer data to them without human-to-computer or human-to-human interaction. Reasoning capabilities stemming from machine learning and also from exploiting other (potentially centralized) resources brings beneficial effects in terms of system efficiency and dependability and adaptive physical and behavioral human-system interactions and collaborations for users (Vermesan et al., 2017). Moreover, the machine learning and intelligence in the IoT provides systems with user, ambient, and social awareness, and enables a wide range of innovative applications (Guo et al., 2013). Beyond the volumes of information the IoT provides, the collective intelligence it manifest represents a new form of information-driven value (de Castro Neto & Santo, 2012).

The elicitation of value through the use of machine learning is not a new phenomenon (Dean, 2014). However, the IoT is transformative because it combines embedded machine learning, and thus collective intelligence, with an exponential ubiquity of devices, vast amounts and variety of data, and an ability to provide virtual interfaces to physical objects that can act on the real world. In this manner, advances in machine learning and AI will complement the technological capability of IoT and significantly impact of many facets of the traditional value chain (Kaplan, 1984). Contrast modern organizations’ exploitation of the intelligent IoT with the historical perspective of 1997 research (Plant & Murrell, 1997) that casts AI as:

The ultimate enabler of [organizational] agility through technology is the artificial intelligent component. AI demands greater organizational internal understanding of technology and thus is only applicable to mature organizations that have internally streamlined processes and a high degree of connectivity.

This view of the future from 1997 speaks to the sophistication of most modern organizations and the impact that more timely and accurate information sharing has on increasing interest in the VoI. Moreover, in narrow domains specific AI techniques that target the predictability of information insights necessary for profit generation, for example, the supply-chain, have proven quantitative measures of value and its relationship to the insights delivered (Lumsden & Mirzabeiki, 2008).

It is interesting to consider how AI itself will have to make VoI determinations relative to tasked goals and objectives. This is because the AI will be responsible for ensuring the automation of a variety of tasks and execution of services. Particularly in a collectively intelligent IoT setting, AI necessarily must make decisions that adapt local behaviors to accommodate global missions and dynamics. From this perspective, the decisions that both humans and AI make utilizing IoT information and processes must do so by focusing on the information itself rather than on technology, as the real carrier of value (Glazer, 1993). Glazer's research both (1) reiterates our earlier point that information itself is difficult and contextual to define in a value context, and (2) offers a transactional basis for VoI that involves decision making in a consumer-supplier process:

A completely satisfactory definition of what constitutes information is problematic. The idea of information is context-dependent and multidimensional. Analogous to the level at which modern physics describes the entire universe in terms of the equivalence between matter and energy is the level at which communications theory provides a procedure for specifying anything (including matter and energy) in terms of its formal information content. The formal or quantitative definition and measure of information is that which reduces uncertainty or changes an individual's degree of belief about the world. However, except for the utility of this construct in purely engineering contexts, it has not provided the foundation for a practical information-measurement system in most general applications.

Glazer's work uses a case study to illustrate the relationship between information value and transactions and thus does little toward as theoretic approach to quantifying VoI. Further, while Glazer illustrates processes that may be automated by AI, his treatment does little to support the detailed decision-making process. Within a complex intelligent system such as the IoT, local AI as a decision maker will have to make microdecisions that enable scalability, given the decentralized nature of the IoT network (Ge, Yang, & Han, 2017). This raises the question, how can value be determined quantitatively in an application agnostic or generalizable sense? It is through this merged lens of IoT and AI that we examine a theory of VoI. To provide grounding and leverage the literature that examines value from a transactional basis, we start with the work of Howard.

9.3 Reworking Howard's Initial Example

Howard's work (Howard, 1966) takes a business approach to defining information value. In this section we borrow freely from Howard. We do not quote phrases for the sake of readability. We do not make any claims to this work and just we rework Howard’s; the only novel thing in this section is our choice of notation and exposition.

We begin with Howard's very practical problem of how much a company should bid to win a contract. If the bid is too high, it loses the contract. If the bid is too low, it gets the contract, but loses money on the deal. Therefore the company attempts to place the bid that will get it the contract while maximizing its profit. The information that the company uses to decide its bid is therefore of extreme importance and this range of information is considered to make up the sample space in question.

We assign a random variable Csi18_e to be the cost of performing on the contract. Unfortunately, this cost is a probabilistic guess. We let the random variable Lsi19_e be the random variable representing the lowest bid of the competitors. The company's bid is given by the random variable Bsi20_e. The company's profit is the random variable Vsi21_e.

If b > l, the company loses the contract, and it is profit is 0. If b < l the company wins the contract and performs the work at a cost of c. Therefore the profit is v = bc. Hence, similarly to Eq. (9.3) (Howard, 1966), the company gets the contract in case of a tie (b = l). In terms of the random variables:

V=BC,ifBL0,ifB>L

si22_e  (9.1)

In Fig. 9.1 we see the plot of Eq. (9.1) when c = 3, l = 8. There is no upper bound on what b may be, but v is always 0 for large enough b. Let us consider the density functions following Howard (1966) but with a modified1 notation of Ross (2002). We have:

f(v|b)=R2f(v|b,c,l)f(c,l|b)dcdl

si23_e  (9.2)

Eq. (9.2) only makes sense when 0 ≤ b. The company never places a negative amount bid, so any event involving b < 0 has zero probability. Thus the conditional probability is not defined in that range.

Fig. 9.1
Fig. 9.1 Profit V=vsi1_e, for c = 3, l = 8, B=bsi2_e.

We are interested in the expected value of profit conditioned on the bid. That is, we wish to determine E(V|b)si3_e:

E(V|b)=vf(v|b)dv=R3vf(v|b,c,l)f(c,l|b)dcdldv=R2f(c,l|b)vf(v|b,c,l)dvdcdl=R2E(V|b,c,l)f(c,l|b)dcdl

si25_e  (9.3)

Now, Howard makes two assumptions (Eqs. 9.6, 9.7) Howard (1966) to simplify the problem.

Assumption 9.1

The joint distribution of cost and lowest bid Csi18_e, Lsi19_e is independent of our company's bid Bsi20_e. That is:

f(c,l|b)=f(c,l)

si29_e

Assumption 9.2

The company's cost Csi18_e is independent of the lowest bid Lsi19_e. That is:

f(c,l)=f(c)f(l)

si32_e

We realize that one could certainly argue the reality of these assumptions in all cases. Using Assumptions 9.1 and 9.2 we now have that:

E(V|b)=R2E(V|b,c,l)f(c)f(l)dcdl

si33_e  (9.4)

From Eq. (9.1) we see that once we set the values of Bsi20_e, Csi18_e, Lsi19_e at b, c, l, respectively, the density function of Vsi21_e becomes deterministic. That is:

Theorem 9.1

f(v|b,c,l)=δ(v(bc)),ifblδ(v),ifb>l

si38_e

and therefore:

E(V|b,c,l)=bc,ifbl0,ifb>l

si39_e

The following theorem follows from Eq. (9.4).

Theorem 9.2

Using Assumptions 9.1 and 9.2, we have:

E(V|b)=R2E(V|b,c,l)f(c)f(l)dcdl(as above)=(bc)bf(l)dlf(c)dc

si40_e  (9.5)

=P(L>b)(bc)f(c)dc

si41_e  (9.6)

=bE(C)P(L>b)

si42_e  (9.7)

The above corresponds to Eq. (9.10) (Howard, 1966). After our above assumptions, to obtain E(V|b)si3_e, we only need the distribution of Lsi19_e and E(C)si45_e. Howard (1966) models Csi18_e as a uniform distribution on [0, 1], which implies E(C)=12si47_e.

Next we relax what Howard did, and model the distribution of Csi18_e such that E(C)=12si47_e. We also follow Howard and model Lsi19_e as a uniform distribution on [0, 2].

We say that the base Howard example is L=U[0,2]si7_e and E(C)=12si47_e.

The above gives us P(L>b)=12(2b)si53_e, b ≤ 2 (0 for b > 2). Of course, we do not consider b < 0 as discussed earlier. And so, we arrive at:

E(V|b)=12(2b)b12,0b2

si54_e  (9.8)

We see that E(V|b)=12b252b+1si55_e is a simple quadratic and that ddbE(V|b)=b+54si56_e, so E(V|b)si3_e obtains a maximum of 9/32 when b = 5/4 (Fig. 9.2).

Fig. 9.2
Fig. 9.2 E(V|b)si3_e.

We define:

VbmaxbE(V|b)

si58_e

From this definition, we see that when E(C)=0.5si59_e and L=U[0,1]si60_e:

Vb=9/32

si5_e

We are in agreement with everything that Howard has done to this point. What we do not agree with is how he used the concept of clairvoyance for additional information that may be learned. We note that the concept of clairvoyance is also discussed in (Borgonovo, 2017, Chapter 11). We return to this later in the chapter.

9.4 Value Discussion

We see from the above that the expected value of a random variable is very important to a decision maker; the information that is used has value. This notion of value is important in the IoT because it can/will be the source of information, moderated by AI that provides it, modifies it, or protects it. From this perspective, the IoT may provide all of the information, too much information, or a limited amount of the information. We see in the above example, that we do not need the entire cost, given Howard's assumptions, only the mean of the cost. Therefore, it need not require many bits of valuable information. Extending Howard's notion at this point, what is the information we have and what is its value?

  1. 1. Eq. (9.1): Modeling equation
  2. 2. Eq. (9.2): Standard probability theory
  3. 3. Assumption 9.1: Independence of the company's bid
  4. 4. Assumption 9.2: Cost and lowest bid independence
  5. 5. Behavior of Csi18_e
  6. 6. Behavior of Lsi19_e

Let us just concentrate on the last two items for now. What we have actually used to this point is only the mean of Csi18_e, and for simplicity, we set:

μE(C)

si65_e

The distribution of Lsi19_e is given by its density function fL(l). Modifying this information changes the quantity we care about, that is:

What is the “value” of the information in items 5 and 6 of the previous list in how it affects Vbsi4_e? Does the shape of the graph change, does the maximum behavior change, etc.?

We return to Eq. (9.4) to see the impact of changes in the information for items 5 and 6. First, let us change the distribution of Lsi19_e so that it is uniformly distributed on [0, L], L > 0, instead of [0, 2].

We see that P(L>b)=1L(Lb)si69_e, bL (0 for b > L). We see that, in general, for and arbitrary positive μ we have:

E(V|b)=1L(Lb)(bμ),0bL

si70_e  (9.9)

=1Lb2[L+μ]b+Lμ

si71_e  (9.10)

Simple calculus shows that the value bo that maximizes E(V|b)si3_e is either the critical point bc=L+μ2si73_e, if bcL, or the boundary point L if μ > L. Thus,

Vb=(Lμ)24L,withbo=L+μ2,if0μ<L0,withbo=L,ifμL

si74_e  (9.11)

We see that the only interesting case is when 0 < μ < L, which makes logical sense. We call this case the nontrivial region and denote the function defined on that region as V〉〉si75_e (Fig. 9.3).

Fig. 9.3
Fig. 9.3 Surface plot of nontrivial values, for L ∈ [0, 2], μ ∈ [0, 2], of Vbsi4_e, with point (L = 2, μ = 0.5, Vb=9/32si5_e) highlighted.

Note that we also have:

VbL=141μL2>0,if0μ<L0,ifμL

si76_e  (9.12)

and

Vμ=12μL1<0

si77_e  (9.13)

In the nontrivial region, increasing L increases Vbsi4_e, and decreasing μ decreases Vbsi4_e.

Let us pause and think about VoI. Is there any additional value in learning more about Csi18_e other than its mean? No! This realization is an important understanding.

Also, if we are at a point in the nontrivial region, what is more important to learn with respect to Vsi81_e, a change in L or a change in E(C)si45_e? That is, if we have to prioritize the information that is sent to a decision maker and we can only send one “fact” at a time, which one would we send first, information about a change in L or E(C)si45_e? Consider the total differential:

dV=VLdL+Vμdμ

si84_e  (9.14)

=141μL2dL121μLdμ

si85_e  (9.15)

Then, using 1 − x2 = (1 − x)(1 + x), we see that:

VL<Vμ<2VL

si86_e  (9.16)

In the infinitesimal sense, the value of E(C)si45_e is more important than the value of L, but not by much. Therefore, if we have to prioritize information sent to a decision maker, it should be E(C)si45_e, then L.

Of course, all of the above is based upon the fact that we know the optimal bo=L+μ2si89_e, which we learned from our above assumptions and calculations (Fig. 9.4).

Fig. 9.4
Fig. 9.4 Surface plot of bo in the nontrivial region for L ∈ [0, 2], μ ∈ [0, 2].

9.4.1 Generalization

Let us summarize the above as a generality.

  1. 1. We are given distributions on Lsi19_e and Csi18_e.
  2. 2. 

    V=BC,ifB<L0,ifB>L

    si92_e

  3. 3. Lsi19_e and Csi18_e are independent of the company's bid Bsi20_e.
  4. 4. The company's cost Csi18_e is independent of the lowest bid Lsi19_e.

Given this summary:

E(V|b)=bE(C)P(L>b)and now, in generalVbmaxbE(V|b)

si98_e

Assuming that ddbE(C)=ddbf(l)=0si99_e (which is not a far stretch from the statistical independence we have assumed for the underlying random variables), we have ddbE(V|b)=P(L>b)bE(C)fL(b)si100_e, where the term fL(b)si101_e is the density function f(l) of Lsi19_e evaluated at l = b. The optimal bo in the nontrivial region solves the integral equation:

b=E(C)+P(L>b)fL(b)=E(C)+1fL(b)bfL(l)dland in the nontrivial regionVb=P(L>bo)2fL(bo)

si103_e

9.5 Clairvoyance About Csi104_e

Let us go back to Eq. (9.4), but now let us assume that the company knows the cost Csi18_e. In this case the company will never bid less than the cost or it will lose money! Note that our results in this section differ from Howard's results on clairvoyance.

Assumption 9.3

The company has knowledge of the cost.

We must modify Theorem 9.1 so that:

E(V|b,c,l)=bc,ifcbl0,otherwise

si106_e  (9.17)

We have that:

E(V|b)=R2E(V|b,c,l)f(c)f(l)dcdl(as above)=b(bc)bf(l)dlf(c)dc

si107_e  (9.18)

=P(L>b)b(bc)f(c)dc

si108_e  (9.19)

=bP(Cb)bcf(c)dcP(L>b)

si109_e  (9.20)

We will go through an example similar to what we did before. Previously, we followed Howard and modeled Csi18_e so that E(C)=1/2si13_e and L=U[0,2]si7_e. Note that, as before, the distribution of Csi18_e did not matter, only its mean. We see from the above that this is no longer true. Let us try some examples.

Example 9.1

[L=U[0,2]si7_e and P(C=1/2)=1si8_e] So we have that f(c) = δ(c − 1/2), and Eq. (9.20) becomes (Fig. 9.5):

Fig. 9.5
Fig. 9.5 E(V|b)0si6_e when the company knows the cost, L=U[0,2]si7_e and P(C=1/2)=1si8_e.

E(V|b)=b1/2P(L>b),if1/2<b20,otherwise

si116_e  (9.21)

Eq. (9.21) simplifies to:

E(V|b)=b1/22b2,if1/2<b20,otherwise

si117_e  (9.22)

In Example 9.1, E(V|b)si3_e has a maximum value of 18/32, when b = 5/4.

Example 9.2

[L=U[0,2]si7_e and C=U[0,1]si11_e] Eq. (9.20) now becomes:

E(V|b)=bb0100bc11dc2b2,if0b1bP(C1)1cdc2b2,if1<b20,otherwise

si121_e  (9.23)

Eq. (9.23) simplifies to:

E(V|b)=b24(2b),b[0,1]bE(C)2b2=12(2b)b12,b(1,2]0,otherwise

si122_e  (9.24)

We note with interest that E(V|b)si3_e is a (once) differentiable function on [0, 2] (Fig. 9.6).

Fig. 9.6
Fig. 9.6 E(V|b)0si6_e when the company knows the cost, L=U[0,2]si7_e and C=U[0,1]si11_e.

In Example 9.2, E(V|b)si3_e has a maximum value of 9/32 when b = 5/4, which is the same as Howard's base example.

We see that when the company knows the cost Csi18_e, the distribution and not just the mean, it affects the behavior of E(V|b)si3_e. We also see that knowledge of Csi18_e guarantees that E(V|b)0si6_e. That is, the company never loses money.

9.6 Clairvoyance About Lsi129_e

Now we are in the situation where the company knows the competitor's lowest bid, which is represented by Lsi19_e. As before we assume that if the company's bid b ties with the competition's lowest bid l that the company wins the contract. If we know l we bid l; this bid is placed to win the contract and maximize profit. Note, if one finds this result disturbing, we can always make the bid b a tiny amount less than l. Nonetheless, we therefore see that Bsi20_e and Lsi19_e must be the same. The company will always win the bidding, but it may lose money depending on the value of c. Therefore,

E(V|b)=E(V|l)

si133_e  (9.25)

Modifying Eq. (9.1), now differently than Eq. (9.17), we have:

E(V|b,c,l)=lc,lsupport ofL0,otherwise

si134_e  (9.26)

We have that (Csi18_e and Lsi19_e still independent):

E(V|l)=RE(V|c,l)f(c)dc

si137_e  (9.27)

=R(lc)f(c)dc

si138_e  (9.28)

=lRf(c)dcRcf(c)dc

si139_e  (9.29)

=lE(C)

si140_e  (9.30)

when l ∈ support of Lsi19_e.

Example 9.3

[L=U[0,L]si142_e and E(C)=1/2si13_e] Below we show a plot of E(V|l)=l0.5si144_e against l for L=U[0,2]si7_e and E(C)=1/2si13_e (Fig. 9.7).

Fig. 9.7
Fig. 9.7 E(V|b)si3_e such that E(C)=1/2si13_e, and the company knows the lowest bid, distributed as L=U[0,2]si7_e.

For Example 9.3, Vb=1.5si147_e, achieved when b = 2.

Note that E(V|b)si3_e is a linear function of b = l and that it can be negative, zero (once), or positive depending on the support of Lsi19_e. Furthermore, the maximum of E(V|b)si3_e is achieved when b is the largest value of l in the support of Lsi19_e. Heuristically, another way of saying this is that the maximum is achieved for the largest value of l such that P(L ∈ (ldx, l))≠0.

Unlike with the clairvoyant knowledge of Csi18_e, with knowledge of Lsi19_e, E(V|b)si3_e may be negative, but the profit may be much larger. Knowledge of Csi18_e gives the company nonnegative profit, whereas knowledge of Lsi19_e gives it a larger potential profit. This result is in-line with the results Howard obtained.

9.7 Clairvoyance About Csi104_e and Lsi129_e

After we combine both pieces of information, the bid b will never be less than c, and it will always match l, meaning that we must modify Eq. (9.1) again, now different from Eq. (9.25) because Lsi19_e is more restricted, resulting in:

E(V|b,c,l)=lc,ifcl,andlsupport ofL0,otherwise

si160_e  (9.31)

So we have an assumption of independence between Csi18_e and Lsi19_e:

E(V|l)=RE(V|c,l)f(c)dc

si137_e  (9.32)

=l(lc)f(c)dc

si164_e  (9.33)

=lP(C<l)lcf(c)dc

si165_e  (9.34)

when l ∈ support of Lsi19_e.

Example 9.4

[L=U[0,2]si7_e and C=U[0,1]si11_e]

E(V|b)=l0ldc0lcdcif0l<1l01dc01cdc,if1l2,0,otherwise

si169_e  (9.35)

The results:

E(V|b)=l22,if0l<1l.5,if1l2,0,otherwise

si170_e  (9.36)

Below we plot E(V|b)=E(V|l)si171_e against b for L=U[0,2]si7_e and C=U[0,1]si11_e (Fig. 9.8).

Fig. 9.8
Fig. 9.8 E(V|b)si3_e for when C=U[0,1]si11_e and the company knows the lowest bid has distribution L=U[0,2]si7_e.

For Example 9.4, Vb=1.5si147_e, achieved when b = 2. Note that the behavior of Examples 9.3 and 9.4 is identical for b > 1. The difference is that if the company know Csi18_e, it may never place a bid that will lose money.

9.8 Discussion

What does Howard's model teach us from a business perspective? How companies capture value remains largely the same, a function of competitive position and competitive advantage. Companies that control the flow of information in the value creation process enjoy competitive positions that are likelier to afford better opportunities to capture value from other participants in their ecosystem. In other words, they know where to play. Companies that differentiate the way in which they control the flow of information from other companies with similar positions enjoy a competitive advantage. In other words, they know how to win.

This leads to the conclusion that information creates value only when it is used to modify future action in beneficial ways. Ideally, this modified action gives rise to new information, allowing the learning process to continue. Information, then, creates value not in a linear value chain of process steps but, rather, in a never-ending value loop. Whether information is viewed discretely or from a continuous variable perspective the question remains: what is the probability that new value can be derived?

From a systems standpoint, as well as a system-augmented human decision-making perspective, machine learning and AI is implied in the never-ending value-loop. This notion is consistent with and supported by the decision science literature, which generally views decision making as an ongoing process (Simon, 1960). If value, derived from plentiful IoT information is created in a nonlinear loop (Baker, Song, & Jones, 2017), then information's relationship to the decision is inseparable. Further, given an abundance of supply-side information, VoI would decrease proportionally to its decision relevance. This is logical, because if everyone has perfect information in a bidding situation, VoI would correlate highly with its perceived potential for modification (Sánchez-Fernández & Iniesta-Bonillo, 2007). The decision-transactional basis of Howard's on theoretical VoI and thereby our own extension, may introduce contextual bias in this sense, so we provide some discussion here on the nature of sensed information and VoI from the sensor network literature.

Bisdikian, Kaplan, and Srivastava (2013) have conducted a significant amount of research in quality of information (QoI), VoI, and the relationship between them. Their findings are relevant here because their work helps define the differences between quantitative and qualitative characteristics of information. Moreover, they provide these definitions from the perspective of sensor networks making the application to IoT direct, if on a somewhat smaller scale. The work of Bisdikian et al. is a departure from the information theoretic perspective taken in our work and instead provide a descriptive characterization of QoI and VoI. Their definition casts VoI as a function of QoI, where QoI is use-independent facts about information (e.g., percentage of error, age, resolution) and VoI is use-dependent qualitative judgments (e.g., trustworthiness, completeness, readability). Figs. 9.9 and 9.10 show the semantic taxonomy from Bisdikian et al., where it is evident that our treatment of VoI is consistent with the qualitative judgment.

Fig. 9.9
Fig. 9.9 Quality of Information attribute taxonomy. (Adapted from Bisdikian, C., Kaplan, L. M., & Srivastava, M. B. (2013). On the quality and value of information in sensor networks. ACM Transactions on Sensor Networks (TOSN), 9(4), 48.)
Fig. 9.10
Fig. 9.10 Volume of Information attribute taxonomy. (Adapted from Bisdikian, C., Kaplan, L. M., & Srivastava, M. B. (2013). On the quality and value of information in sensor networks. ACM Transactions on Sensor Networks (TOSN), 9(4), 48.)

The semantic descriptions of QoI and VoI suggest that AI's use of the IoT would concentrate primarily on QoI because VoI characteristics are essentially human characteristics that are difficult to capture computationally in open-domain problems. However, QoI characteristics may provide a basis for deriving a probabilistic VoI to be used in transactional (nonclairvoyant) estimates. Further, it may be feasible to learn over QoI values to bound a purely computational VoI. Future research, building on our work, may warrant additional consideration about how machine-learned QoI could translate to a functional VoI.

9.9 Conclusion

IoT will provide a rich environment, supplying VOIs for nearly every aspect of humans’ activities and environments. The IoT will gain ever increasing amounts of AI that will only provide greater degrees of autonomic capabilities and self-star behaviors. This AI-enriched IoT environment will change the fundamental notions of information value for decision making by producing huge quantities of information that are managed by AI functionality. Like Shannon's information theories, our understanding of VoI theory will implicitly go beyond just a quantitative concept to include qualitative notions. However, there is surprisingly little literature that examines VoI in the context of the IoT. In this chapter, we have extended Howard's (1966) VoI theory to examine a generalization of that notion toward a guarantee of a minimal value.

We presented a rework of Howard's theoretical problem and solution identifying some limitations in his treatment of a random variable, relative to VoI. Howard's idea of clairvoyance, or insight into future information (and its value) treats the value of the random variable deterministically rather than probabilistically. By giving the random variable a probabilistic context, such as would be the case of the information provided by AI-enabled IoT, the theoretical handling of clairvoyance changes. We see, as did Howard, that knowledge about Lsi19_e is more important than knowledge about Csi18_e when it comes to maximizing E(V|b)si3_e. But we have shown that a knowledge of Csi18_e in a bid guarantees that a bidder will never have a negative expected profit. Therefore, the VoI depends on what one is trying to do, or the contextual objective. This qualitative consideration must be kept in mind for future research on VoI. Existing work from the sensor network domain, specifically on QoI, and VoI may provide quantitative measures that can form a probabilistic derivative VoI.

We explained the relevance of our approach in this chapter's section on IoT and AI. We have taken the opportunity to adjust Howard's seminal theory to provide an extended foundation for the VoI theory in the IoT. One must keep in mind that AI techniques, such as machine learning and artificial reasoning, when employed in the IoT for self-star system behaviors, will require additional consideration for managing information provided to a human or machine decision maker. While we continued with Howard's “market” context in this chapter for its explainability and theoretic continuity, our future work will examine the implications of our theoretical VoI guarantee, described herein, in an IoT-specific experimental simulation or empirical study, that incorporates semantic notions of QoI.

References

Allwein G. A qualitative framework for Shannon information theories. In: In: Proceedings of the 2004 workshop on new security paradigms; 2004:23–31 ACM.

Babaoglu O., Jelasity M., Montresor A., Fetzer C., Leonardi S., van Moorsel A., van Steen M. The self-star vision. In: In Self-star properties in complex information systems. 2005:397.

Baker J., Song J., Jones D.R. Closing the loop: Empirical evidence for a positive feedback model of IT business value creation. The Journal of Strategic Information Systems. 2017;26(2):142–160.

Barnaghi P., Sheth A., Henson C. From data to actionable knowledge: Big Data challenges in the web of things [Guest Editors’ Introduction]. IEEE Intelligent Systems. 2013;28(6):6–11.

Barwise J., Seligman J. Cambridge: Cambridge University Press; . Information flow: The logic of distributed systems. 1997;Vol. 44.

Bisdikian C., Kaplan L.M., Srivastava M.B. On the quality and value of information in sensor networks. ACM Transactions on Sensor Networks (TOSN). 2013;9(4):48.

Borgonovo E. Global sensitivity analysis with value of information. In: Sensitivity analysis. New York: Springer; 2017:201–210.

Camerer C.F. Artificial intelligence and behavioral economics. In Economics of artificial intelligence. Chicago: University of Chicago Press; 2017.

Conitzer V., Sinnott-Armstrong W., Borg J.S., Deng Y., Kramer M. Moral decision making frameworks for artificial intelligence. In: In AAAI. 2017:4831–4835.

de Castro Neto M., Santo A.E. Emerging collective intelligence business models. MCIS Proceedings. 2012;14.

Dean J. Big data, data mining, and machine learning: Value creation for business leaders and practitioners. New York: John Wiley & Sons; 2014.

Elvy S.-A. The artificially intelligent internet of things and Article 2 of the Uniform Commercial Code. Forthcoming, Research Handbook on the Law of Artificial Intelligence. Edward Elgar Press, NYLS Legal Studies; 2017. Research Paper No. 3046558. Available at: https://doi.org/10.2139/ssrn.3046558.

Etzion O. When artificial intelligence meets the internet of things. In: In: Proceedings of the 9th ACM international conference on distributed event-based systems (p.246); Oslo, Norway: ACM; 2015:246.

Ge X., Yang F., Han Q.-L. Distributed networked control systems: A brief overview. Information Sciences. 2017;380:117–131.

Glazer R. Measuring the value of information: The information-intensive organization. IBM Systems Journal. 1993;32(1):99–110.

Gubbi J., Buyya R., Marusic S., Palaniswami M. Internet of things (IoT): A vision, architectural elements, and future directions. Future generation computer systems. 2013;29(7):1645–1660.

Guo B., Zhang D., Yu Z., Liang Y., Wang Z., Zhou X. From the internet of things to embedded intelligence. World Wide Web. 2013;16(4):399–420.

Hansen P.A., Serin G. Will low technology products disappear?: The hidden innovation processes in low technology industries. Technological Forecasting and Social Change. 1997;55(2):179–191.

Howard R.A. Information value theory. IEEE Transactions on Systems Science and Cybernetics. 1966;2(1):22–26.

Kaplan J. The industrialization of artificial intelligence_ From by-line to bottom line. AI Magazine. 1984;5(2):51.

Lumsden K., Mirzabeiki V. Determining the value of information for different partners in the supply chain. International Journal of Physical Distribution & Logistics Management. 2008;38(9):659–673.

Moskowitz I.S., Kang M.H. Covert channels-here to stay? In Computer assurance, 1994. COMPASS’94 safety, reliability, fault tolerance, concurrency and real time, security. In: Proceedings of the ninth annual conference on (pp. 235–243); IEEE; 1994.

Moskowitz I.S., Russell S., Jalaian B. Steganographic Internet of Things: Graph topology timing channels. Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence. New Orleans: AAAI Publications, LA; 2018.

Naseem S., Ahmed K. Information protection in cognitive science. International Journal of Computer Science and Network Security (IJCSNS). 2017;17(3):1.

Oriwoh E., Conrad M. ‘Things’ in the Internet of Things: Towards a definition. International Journal of Internet of Things. 2015;4(1):1–5.

Pande P., Padwalkar A.R. Internet of things—A future of internet: A survey. International Journal. 2014;2(2):832–839.

Papadokostaki K., Mastorakis G., Panagiotakis S., Mavromoustakis C.X., Dobre C., Batalla J.M. Handling Big Data in the era of internet of things (IoT). In: Advances in mobile cloud computing and Big Data in the 5G Era. New York: Springer; 2017:3–22.

Plant R., Murrell S. The agile organisation: Technology and innovation. In: In AAAI-97 workshop on using AI in electronic commerce. 1997:26–32.

Ponssard J.-P. A value theory for experiments defined extensive form. Management Science. 1975;22(4):449–454.

Ren F., Gu Y. Using artificial intelligence in the Internet of Things. ZTE Communications. 2015;1.

Ross S.M. A first course in probability. 6th ed. Upper Saddle River: Prentice Hall; 2002.

Roy S., Chowdhury C. Integration of Internet of everything (IoE) with cloud. In: Beyond the internet of things. New York: Springer; 2017:199–222.

Russell S., Moskowitz I.S., Raglin A. Human information interaction, artificial intelligence, and errors. In: Autonomy and artificial intelligence_ A threat or savior?. Cham: Springer; 2017:71–101. doi:10.1007/978-3-319-59719-5_4.

Rymaszewska A., Helo P., Gunasekaran A. IoT powered servitization of manufacturing: An exploratory case study. International Journal of Production Economics. 2017;192:92–105.

Sánchez-Fernández R., Iniesta-Bonillo M.A. The concept of perceived value: A systematic review of the research. Marketing Theory. 2007;7(4):427–451.

Shannon C.E. A mathematical theory of communication. Bell Systems Technical Journal. 1948;27(379–423):623–656.

Shannon C.E. The bandwagon. IRE Transactions on Information Theory. 1956;2(1):3.

Simon H.A. The new science of management decision. Prentice-Hall; 1960.

Taherkordi A., Eliassen F., Horn G. From IoT Big Data to IoT big services. In: In: Proceedings of the symposium on applied computing; ACM; 2017:485–491.

Vermesan O., Bröring A., Tragos E., Serrano M., Bacciu D., Chessa S., et al. Internet of robotic things: Converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT platforms. In: Vermesan O., Bacquet J., eds. Cognitive hyperconnected digital transformation: Internet of things intelligence evolution. River Publishers; 2017:97–155.

Witten I.H., Frank E., Hall M.A., Pal C.J. Data mining: Practical machine learning tools and techniques. Morgan Kaufmann; 2016.

Worchel S. Beyond a commodity theory analysis of censorship: When abundance and personalism enhance scarcity effects. Basic and Applied Social Psychology. 1992;13(1):79–92.


a This is an invited, revised, and expanded version of a paper of the titled “Valuable Information and the Internet of Things” by the first two authors that was presented at the 2018 AAAI Spring Symposium on the Internet of Everything.

1 For typographical simplicity, we do not include the subindex of the density function when the context is clear. That is, for example, we write f(x) instead of fX(x); however, the complete notation is taken as being understood.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.46.58