Vulnerability Models Allowing for Incomplete Information and Imprecision Application to Eldercare

Personalized, multi-dimensional assessments of the risk of the condition of a person (or object) deteriorating, called vulnerability assessments, are critical in outcome-based care management. However, lack of time for information gathering, often coupled with urgency to take action, pose specific challenges for individual vulnerability assessment in the field compared with assessment in a clinical or laboratory setting. We describe an approach to develop vulnerability assessment models for use “in the wild” - as distinct from use in clinical/laboratory settings - borrowing a term from the visual emotion recognition terminology. Key elements of the proposed modelling framework for vulnerability assessment are that it (i) accommodates incomplete information about the person (ii) continuously adjusts as background information evolves (iii) can serve as a guide to prioritize information gathering (iv) can function with imprecision in the input parameters. Specifically, we integrate a Markov Chain model describing the evolution of the person into, and out of, vulnerable states together with a Bayesian network that serves to customize the dynamic model. We describe the extension of the framework to situations arising through the presence of imprecision in the model parameters. The examples that we present were developed and validated as practical tools for the analysis of the vulnerabilities of elderly persons in the context of a consulting engagement in China. The techniques presented are general however, and generalizations are discussed in the conclusion section.

By: Lea A. Deleris, Pol Mac Aonghusa, Robert Shorten

Published in: RC25671 in 2018

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc25671.pdf

Questions about this service can be mailed to reports@us.ibm.com .