University of Brescia
                  Dipartimento di Elettronica per l'Automazione
      Knowledge Engineering and Human-Computer Interaction Research Group



    An Argumentation-based
  Approach to Modelling Decision
  Support Contexts with What-If
           Capabilities
Pietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni Guida


                         AAAI 2009 Fall Symposium Series
                      The Uses of Computational Argumentation
                           Arlington, November, 5, 2009

                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
“Good advice”
   The advice should be presented in a form which can
    be readily understood by decision makers
   There should be ready access to both information and
    reasoning underpinning the advice
   If decision support involves details which are
    unusual to the decision maker, it is of primary
    importance that s/he can discuss these details with
    his advisor

                                                              Girle et al., 2003
Slide 2          © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Transparency about the advice


                       Practical reasoning
                       about “what to do”


            Knowledge                                        Computation of
          representation                                       outcomes



Slide 3            © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Knowledge representation
        ➢Computation of outcomes
    ➢   Conclusions and future works




        © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Argument (and attack) schemes
   Use of argument scheme to represent the knowledge
   Structure which contains the information in favour of
    a given conclusion

   Introduction of a possible modelling of conflicts by
    “attack scheme”
   Structure which contains the information in favour of
    a given conflict


                 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
The main concepts
   Circumstance: a state of the world
   Fact: a particular circumstance assumed to be true
   Goal: a state of the world we want to achieve
   Action: support for the achievement of a goal
   Preference: “[…] a greater liking for one alternative
    over another or others […]”
   Value: “Worth or worthiness […] in respect of rank
    or personal qualities”
   Must Value: a value that we commit to promote
                 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (1)
   Treatment for a patient threatened by blood clotting
   Goal: obtaining a low platelet adhesion
   The available knowledge base concerning
    treatments:
     Administer Aspirin (value of Safety)
     Administer Chlopidogrel (value of Safety)
     Do nothing (value of Cost)




Slide 7           © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
Practical Args (from Atkinson et al.)




                    PAS: A2
  Circumstances: given patient's situation
  Action: we should administer aspirin
  Goal: reducing blood clotting
  Value: Safety
  Sign: +
Slide 8                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
The Attacks among PAS




                                                                            PAtS1: α
                                                                    Source: A1
                                                                    Target: A2
                                                                    Conditions:
                                                                    A1.action and A2.action
                                                                    are incompatible




Slide 9   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
The Values

                                                                         VAS: V1
                                                                     Value: Cost




Slide 10   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
The Defences from the Values



         VDeS1: β
Source: V2
Target: α
Conditions:
α.target.value = V2.value,
α.source.value ≠ V2.value


             PAtS1: α
               …



Slide 11                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
The Defences from the Values
                                     VDeS2: γ
                         Source: V1
                         Target: β
                         Conditions:
                         β.source ≠ V1,
                         β.target.source.value ≠ V1.value


         VDeS1: β
Source: V2
Target: α
Conditions:
α.target.value = V2.value,
α.source.value ≠ V2.value


             PAtS1: α
               …



Slide 12                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (1)
The Defences from the Values
       VDefence: γ                   VDeS2: γ
      Defending: A1      Source: V1
      Defended: V1       Target: β
                         Conditions:
                         β.source ≠ V1,
 VDefence: β
                         β.target.source.value ≠ V1.value
Defending: A2
Defended: V2
         VDeS1: β
Source: V2
Target: α
Conditions:
α.target.value = V2.value,
α.source.value ≠ V2.value


             PAtS1: α
               …



Slide 13                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (2)
   From patient's file we learn that he has a history of
    gastritis
   Then we should not administer Aspirin without a
    proton pump inhibitor
   In fact, it gives rise to risk of ulceration
   And it will demote the value of Safety
   As far as we know, no proton pump inhibitor is
    available


Slide 14          © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (2)
 A PAS with negative sign...




                   PAS: A4
Circumstances: proton pump unavailable
Action: we should not administer aspirin
Goal: risk of ulceration
Value: Safety
Sign: -
Slide 15                   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (2)
...and the relative attacks




           PAtS2: δ
   Source: A4
   Target: A2
   Conditions:
   A4.action = ¬ A2.action




Slide 16                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (2)
 ...and the relative attacks
                VAAtS: ε
Source: A4
Target: β
Conditions: A4.circumstance =
β.defended.circumstance, A4.action =
¬ β.defended.action, A4.goal =
β.defended.goal, A4.value =
β.defended.value, A4.sign = -,
β.defended.sign = +

           PAtS2: δ
   Source: A4
   Target: A2
   Conditions:
   A4.action = ¬ A2.action




Slide 17                     © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (3)
   Suppose now that the assumption that no proton
    pump inhibitor is available reveals to be false
   Suppose also that between aspirin and chlopidogrel a
    doctor prefers to administer aspirin because it is in
    stock and immediately available




Slide 18         © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (3)
A Fact


        FAS: A5
 Circumstances: a
 proton pump is
 available




Slide 19            © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (3)
An “undercut”




                FAtS: ζ
     Source: A5
     Target: A4
     Conditions: A5.circumstances=
     ¬ A4.circumstances
Slide 20                  © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (3)
A preference


                                                                        PRAS: P1
                                                                     Preferred: A2
                                                                     Notpreferred: A3




Slide 21   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (3)
The greater liking
           PAtS: η
             ...




                                                               FAtS: θ
                                              Source: P1
                                              Target: η
                                              Conditions: P1.preferred =
                                              η.target, P1.notpreferred = η.source
Slide 22             © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Example (4)
   Determine the ultimate decision outcome
   Achieve the goal of reducing blood clotting
   It promotes the value of Safety
   We must promote the value of Safety




Slide 23         © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (4)
The Must Value
                                                                       MAS: MV2
                                                                     Value: Safety




Slide 24   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Formal counterpart (4)
What-If Scenario
                         MAtS2: κ
    Source: MV2
    Target: γ
    Conditions: MV2.value = γ.target.source.value,
    MV2.value ≠ γ.source.value




              VDeS2: γ
                ...




Slide 25                   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Small Summary
Argument Scheme Taxonomy
   Practical Argument Scheme
   Factual Argument Scheme
   Value Argument Scheme
   Preference Argument Scheme
   Must Argument Scheme




Slide 26       © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
In the example




Slide 27   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Small Summary
Attack Scheme Taxonomy (1)
   PAtS1: incompatible actions
   PAtS2: “rebuttal”
   VAtS : incompatible values
   VDefence (VDeS[1-2]): a value protects both the
    arguments which promote it and the attacks sourced
    from that arguments
   VAAtS: if a practical argument P suggests not to
    perform an action A since it demotes a value V, if P
    will be considered acceptable, then V cannot defend
    the argument whose action is A
Slide 28         © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
In the example (1)




Slide 29   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Small Summary
Attack Scheme Taxonomy (2)
   FAtS: “undercut”
   PRAtS: someone told us that an attack cannot be
    considered since an external preference
   MAtS1: an instance of Must Argument Scheme has
    to protect the related Value argument against the
    incompatible values
   MAtS2: an instance of Must Argument Scheme has
    to protect the instances of VDefence which start from
    the related Value argument

Slide 30         © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
In the example (2)




Slide 31   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
➢   Knowledge representation
Computation of outcomes
    ➢   Conclusions and future works




        © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Argumentation Framework for
Decision Support Problem




Slide 33   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Argumentation Framework with
Recoursive Attacks (AFRA)




Slide 34   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
From AFDSP to AFRA




Slide 35   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
AFRA: Defeat relation




Slide 36   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
AFRA: Admissibility




Slide 37   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
AFRA: Preferred Extension




Slide 38   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Recalling the example...




Slide 39   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
...and the preferred extension




Slide 40   © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
➢   Knowledge representation
 ➢   Computation of outcomes

Conclusions and
 future works



 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Conclusions
   Preliminary investigation about formalisation of
    decision support problems
   Three main contributions:
     The role of attack schemes
     Attacks to attacks in practice
     Support to “What-if” reasoning




Slide 42          © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Future works
   Knowledge representation:
     Enhancing attacks schemes
     Ontological status of attacks
     Multiple What-if Situations
   Computation of outcomes
     Further investigation on the theoretical bases of AFRA
     Argumentation semantics in this context




Slide 43           © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
Open questions
   The notion of attack scheme: soundness and
    usefulness
   Attack schemes and critical questions
   What-if only w.r.t. Values




Slide 44        © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>

Cerutti--AAAI Fall Symposia 2009

  • 1.
    University of Brescia Dipartimento di Elettronica per l'Automazione Knowledge Engineering and Human-Computer Interaction Research Group An Argumentation-based Approach to Modelling Decision Support Contexts with What-If Capabilities Pietro Baroni, Federico Cerutti, Massimiliano Giacomin and Giovanni Guida AAAI 2009 Fall Symposium Series The Uses of Computational Argumentation Arlington, November, 5, 2009 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 2.
    “Good advice”  The advice should be presented in a form which can be readily understood by decision makers  There should be ready access to both information and reasoning underpinning the advice  If decision support involves details which are unusual to the decision maker, it is of primary importance that s/he can discuss these details with his advisor Girle et al., 2003 Slide 2 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 3.
    Transparency about theadvice Practical reasoning about “what to do” Knowledge Computation of representation outcomes Slide 3 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 4.
    Knowledge representation ➢Computation of outcomes ➢ Conclusions and future works © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 5.
    Argument (and attack)schemes  Use of argument scheme to represent the knowledge  Structure which contains the information in favour of a given conclusion  Introduction of a possible modelling of conflicts by “attack scheme”  Structure which contains the information in favour of a given conflict © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 6.
    The main concepts  Circumstance: a state of the world  Fact: a particular circumstance assumed to be true  Goal: a state of the world we want to achieve  Action: support for the achievement of a goal  Preference: “[…] a greater liking for one alternative over another or others […]”  Value: “Worth or worthiness […] in respect of rank or personal qualities”  Must Value: a value that we commit to promote © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 7.
    Example (1)  Treatment for a patient threatened by blood clotting  Goal: obtaining a low platelet adhesion  The available knowledge base concerning treatments:  Administer Aspirin (value of Safety)  Administer Chlopidogrel (value of Safety)  Do nothing (value of Cost) Slide 7 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 8.
    Formal counterpart (1) PracticalArgs (from Atkinson et al.) PAS: A2 Circumstances: given patient's situation Action: we should administer aspirin Goal: reducing blood clotting Value: Safety Sign: + Slide 8 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 9.
    Formal counterpart (1) TheAttacks among PAS PAtS1: α Source: A1 Target: A2 Conditions: A1.action and A2.action are incompatible Slide 9 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 10.
    Formal counterpart (1) TheValues VAS: V1 Value: Cost Slide 10 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 11.
    Formal counterpart (1) TheDefences from the Values VDeS1: β Source: V2 Target: α Conditions: α.target.value = V2.value, α.source.value ≠ V2.value PAtS1: α … Slide 11 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 12.
    Formal counterpart (1) TheDefences from the Values VDeS2: γ Source: V1 Target: β Conditions: β.source ≠ V1, β.target.source.value ≠ V1.value VDeS1: β Source: V2 Target: α Conditions: α.target.value = V2.value, α.source.value ≠ V2.value PAtS1: α … Slide 12 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 13.
    Formal counterpart (1) TheDefences from the Values VDefence: γ VDeS2: γ Defending: A1 Source: V1 Defended: V1 Target: β Conditions: β.source ≠ V1, VDefence: β β.target.source.value ≠ V1.value Defending: A2 Defended: V2 VDeS1: β Source: V2 Target: α Conditions: α.target.value = V2.value, α.source.value ≠ V2.value PAtS1: α … Slide 13 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 14.
    Example (2)  From patient's file we learn that he has a history of gastritis  Then we should not administer Aspirin without a proton pump inhibitor  In fact, it gives rise to risk of ulceration  And it will demote the value of Safety  As far as we know, no proton pump inhibitor is available Slide 14 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 15.
    Formal counterpart (2) A PAS with negative sign... PAS: A4 Circumstances: proton pump unavailable Action: we should not administer aspirin Goal: risk of ulceration Value: Safety Sign: - Slide 15 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 16.
    Formal counterpart (2) ...andthe relative attacks PAtS2: δ Source: A4 Target: A2 Conditions: A4.action = ¬ A2.action Slide 16 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 17.
    Formal counterpart (2) ...and the relative attacks VAAtS: ε Source: A4 Target: β Conditions: A4.circumstance = β.defended.circumstance, A4.action = ¬ β.defended.action, A4.goal = β.defended.goal, A4.value = β.defended.value, A4.sign = -, β.defended.sign = + PAtS2: δ Source: A4 Target: A2 Conditions: A4.action = ¬ A2.action Slide 17 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 18.
    Example (3)  Suppose now that the assumption that no proton pump inhibitor is available reveals to be false  Suppose also that between aspirin and chlopidogrel a doctor prefers to administer aspirin because it is in stock and immediately available Slide 18 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 19.
    Formal counterpart (3) AFact FAS: A5 Circumstances: a proton pump is available Slide 19 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 20.
    Formal counterpart (3) An“undercut” FAtS: ζ Source: A5 Target: A4 Conditions: A5.circumstances= ¬ A4.circumstances Slide 20 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 21.
    Formal counterpart (3) Apreference PRAS: P1 Preferred: A2 Notpreferred: A3 Slide 21 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 22.
    Formal counterpart (3) Thegreater liking PAtS: η ... FAtS: θ Source: P1 Target: η Conditions: P1.preferred = η.target, P1.notpreferred = η.source Slide 22 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 23.
    Example (4)  Determine the ultimate decision outcome  Achieve the goal of reducing blood clotting  It promotes the value of Safety  We must promote the value of Safety Slide 23 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 24.
    Formal counterpart (4) TheMust Value MAS: MV2 Value: Safety Slide 24 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 25.
    Formal counterpart (4) What-IfScenario MAtS2: κ Source: MV2 Target: γ Conditions: MV2.value = γ.target.source.value, MV2.value ≠ γ.source.value VDeS2: γ ... Slide 25 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 26.
    Small Summary Argument SchemeTaxonomy  Practical Argument Scheme  Factual Argument Scheme  Value Argument Scheme  Preference Argument Scheme  Must Argument Scheme Slide 26 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 27.
    In the example Slide27 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 28.
    Small Summary Attack SchemeTaxonomy (1)  PAtS1: incompatible actions  PAtS2: “rebuttal”  VAtS : incompatible values  VDefence (VDeS[1-2]): a value protects both the arguments which promote it and the attacks sourced from that arguments  VAAtS: if a practical argument P suggests not to perform an action A since it demotes a value V, if P will be considered acceptable, then V cannot defend the argument whose action is A Slide 28 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 29.
    In the example(1) Slide 29 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 30.
    Small Summary Attack SchemeTaxonomy (2)  FAtS: “undercut”  PRAtS: someone told us that an attack cannot be considered since an external preference  MAtS1: an instance of Must Argument Scheme has to protect the related Value argument against the incompatible values  MAtS2: an instance of Must Argument Scheme has to protect the instances of VDefence which start from the related Value argument Slide 30 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 31.
    In the example(2) Slide 31 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 32.
    Knowledge representation Computation of outcomes ➢ Conclusions and future works © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 33.
    Argumentation Framework for DecisionSupport Problem Slide 33 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 34.
    Argumentation Framework with RecoursiveAttacks (AFRA) Slide 34 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 35.
    From AFDSP toAFRA Slide 35 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 36.
    AFRA: Defeat relation Slide36 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 37.
    AFRA: Admissibility Slide 37 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 38.
    AFRA: Preferred Extension Slide38 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 39.
    Recalling the example... Slide39 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 40.
    ...and the preferredextension Slide 40 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 41.
    Knowledge representation ➢ Computation of outcomes Conclusions and future works © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 42.
    Conclusions  Preliminary investigation about formalisation of decision support problems  Three main contributions:  The role of attack schemes  Attacks to attacks in practice  Support to “What-if” reasoning Slide 42 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 43.
    Future works  Knowledge representation:  Enhancing attacks schemes  Ontological status of attacks  Multiple What-if Situations  Computation of outcomes  Further investigation on the theoretical bases of AFRA  Argumentation semantics in this context Slide 43 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>
  • 44.
    Open questions  The notion of attack scheme: soundness and usefulness  Attack schemes and critical questions  What-if only w.r.t. Values Slide 44 © 2009 Federico Cerutti <federico.cerutti@ing.unibs.it>