Decision theory and bayesian inference

Assignment Help Basic Computer Science
Reference no: EM13922141

Decision Theory and Bayesian Inference

An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().

Extensive evaluation using a benchmark corpus consisting exclusively of spam messages yields the following performance statistics for the spam filter:

  • 96% of the spam messages are blocked in the High-Security-Mode.
  • 90% of the spam messages are blocked in the Low-Security-Mode.

Extensive evaluation using a benchmark corpus consisting exclusively of non-spam (legitimate) messages yields the following performance statistics for the spam filter:

  • 10% of the non-spam messages are blocked in the High-Security-Mode
  • 4% of the non-spam messages are blocked in the Low-Security-Mode

The organization estimates that 80% of the messages that it receives are spam messages.

(a) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the High-Security-Mode is actually a spam message. Estimate .

(b) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the High-Security-Mode is actually not a spam message. Estimate .

(c) Let  denote the conditional probability that a message that is not blocked by the spam filter operating in the Low-Security-Mode is actually a spam message. Estimate .

(d) Let  denote the conditional probability that a message that is blocked by the spam filter operating in the Low-Security-Mode is actually not a spam message. Estimate .

(e) If the cost of not blocking a spam message is $1 and the cost of blocking a non-spam message is $10, should the organization operate the spam filter in the High-Security-Mode? Why?

(f) Recall that the cost of not blocking a spam message is $1. At least how high should the cost of blocking a non-spam message be for a risk-neutral rational decision maker to prefer operating the spam filter in the Low-Security-Mode?

(g) Let  be the amortized cost per message of operating the spam filter. Write a short memo the CIO of the organization explaining at most how high  could be for the organization to use the spam filter with the specified performance?

Reference no: EM13922141

Questions Cloud

Target debt-equity ratio-what is the cost of equity : Frye, Inc., has a target debt-equity ratio of 1.60. Its WACC is 9.9 percent, and the tax rate is 38 percent. If the company's cost of equity is 16 percent, what is its pretax cost of debt? If instead you know that the aftertax cost of debt is 6.6 per..
Discuss key points of the recent dodd-frank legislation : Find the current beta for an S & P 500 company and discuss why you believe the firm has such a Beta, and discuss the ovweall riskiness of the firm from a stockholders viewpoint.
Complex numbers need to have explicitly stated values : How many nickels does a coin counter manufacturer need to weigh so that she can be 98% confident that her sample mean is within 25 milligrams of the true average weight of a nickel?
How would you respond to such an given argument : It has been argued that mutual insurance companies are dinosaurs-they are large, slow, bureaucratic, and inefficient. How would you respond to such an argument?
Decision theory and bayesian inference : An organization uses a spam filtering software to block email messages that may potentially be spam messages. The spam filter can be set to one of two security modes: High-Security-Mode () or Low-Security-Mode ().
Discuss general power of appointment for property decedent : Explain and discuss general power of appointment for property of a decedent, including the tax implications of appointing someone. Give some examples.
How will bobs optimal consumption choice change : How will Bob's optimal consumption choice change if the government imposes a $10/unit tax on the material welfare good?
Performance and diversity of employees in factory : Analyze different group and team concepts that could be implemented in order to improve the performance and diversity of employees in the factory.
Problem regarding the conflict management approaches : Write a 700- to 1,050-word paper that identifies the conflict management approaches used in your agency or place of work. How does this match or contradict your personal conflict management preference or style? Format your paper consistent with A..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write queries to retrieve data for tsql

Write SQL statements that will retrieve the following data from a database, using Subqueries and Joins. Using the Northwind database, write a SQL SELECT statement that will retrieve the data for the following questions:

  How do you write a program that prompts a professor

ow do you write a program that prompts a professor to imput grades for five different courses for ten students

  Explaining concept of internet-first printing presses-mass

A number of historians explain concept of the internet as parallel to concept of first printing presses - mass communication.

  How would broadway book shop go about developing

How would Broadway Book Shop go about developing its information systems and Justify your choice of your selected approach to systems development.

  Several problems in accessing sales data effectively

U.S. Sports Fanatics has several problems in accessing sales data effectively and in a timely fashion because of its very basic paper-based process, causing it to lose out to its competition.

  How is hardware different from software

what is a Web application? What are some features of a Web 2.0 site and how is hardware different from software?

  Difference between operational and strategic data sets

difference between operational and strategic data sets

  Network connectivity and protocols

Network Connectivity and Protocols-

  Flowchart a program by using ms viso

Flowchart a program by MS Viso, using conventions presented in the text, that will prompt user to input a name and the number of credit hours taken towards their degree.

  Write a function called circlearea

Write a function called circleArea.

  Describe ease of finding information on internet

Explain main elements of assignment in the substantive way. Describe the ease of finding information on the Internet.

  The techniques in discovering the requirements

What are some of the techniques in discovering the requirements (fact finding) for a system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd