Hostname: page-component-586b7cd67f-l7hp2 Total loading time: 0 Render date: 2024-11-29T09:16:08.847Z Has data issue: false hasContentIssue false

Sensitivity analysis: an aid for belief-network quantification

Published online by Cambridge University Press:  17 January 2001

VEERLE M. H. COUPÉ
Affiliation:
Center for Clinical Decision Sciences, Department of Public Health, Erasmus University Rotterdam, PO Box 1738, 3000 DR Rotterdam, The Netherlands. E-mail: [email protected]
LINDA C. VAN DER GAAG
Affiliation:
Department of Computer Science, Utrecht University, PO Box 80.089, 3508 TB Utrecht, The Netherlands. E-mail: [email protected]
J. DIK F. HABBEMA
Affiliation:
Center for Clinical Decision Sciences, Department of Public Health, Erasmus University Rotterdam, PO Box 1738, 3000 DR Rotterdam, The Netherlands. E-mail: [email protected]

Abstract

When building a Bayesian belief network, usually a large number of probabilities have to be assessed by experts in the domain of application. Experience shows that experts are often reluctant to assess all probabilities required, feeling that they are unable to give assessments with a high level of accuracy. We argue that the elicitation of probabilities from experts can be supported to a large extent by iteratively performing sensitivity analyses of the belief network in the making, starting with rough, initial assessments. Since it gives insight into which probabilities require a high level of accuracy and which do not, performing a sensitivity analysis allows for focusing further elicitation efforts. We propose an elicitation procedure in which, alternately, sensitivity analyses are performed and probability assessments refined, until satisfactory behaviour of the belief network is obtained, until the costs of further elicitation outweigh the benefits of higher accuracy or until higher accuracy can no longer be attained due to lack of knowledge.

Type
Review Article
Copyright
© 2000 Cambridge University Press

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

The investigations were (partly) supported by the Netherlands Computer Science Research Foundation with financial support from the Netherlands Organization for Scientific Research (NWO).