An introductory guide to Intelligent Agents

 
Published on 2005-01-28 by John Collins.

Introduction to Intelligent Agents

Intelligent Agents are computer programs that possess aspects of intelligence, and can act independently of their users. [1] These programs can be thought of as autonomous applications acting on the initial instructions of the user, in effect acting as an agent of the user.

The amount of intelligence in such agents may vary, but this term generally refers to the programs ability to act autonomously or to make decisions while attempting to carry out the user-assigned task. [1]

The term "Intelligent Agent" is used widely within the Information Technology (IT) industry to describe a wide-range of computer programs, many of which may have different design goals. For example, some agents are designed to undertake the entire task themselves; others work together while communicating with one another. Some agents are actually quite capable of learning and adapting to their environment, in order to carry out their tasks effectively. [2]

Intelligent Agents are designed to assist users by acting on their behalf, normally carrying out time-consuming repetitive tasks such as accumulating information. [3] For busy managers and professionals, such time-consuming work can be delegated to Intelligent Agents, which will act on their instructions and report back findings at regular intervals.

Common attributes of Intelligent Agents

While no definitive definition of what makes a computer program an Intelligent Agent currently exists, researchers have reached some consensus on the common attributes of Intelligent Agents:

Not all agents must possess every one of these attributes to be considered valid. For example, each agent is likely to have different knowledge, capabilities, reliability, resources and responsibilities that will all have a bearing on the design of the agent. [4]

What this means is that different agents may perceive the same data or event in different ways, dependent on the attributes and user agenda of the agent. As a consequence, careful consideration must be given to the business rules under which an agent will operate before it is deployed in a live environment.

Possible usage of agents in the business domain

If managers and professionals are to delegate tasks to Intelligent Agents, then what are the likely tasks to delegate? Well, the usage of Intelligent Agents is only limited by two factors:

  1. The imagination of the designers of Intelligence Agents.
  2. The capabilities of the underlining technology supporting the development of Intelligent Agents.

As with many new technologies, the initial deployments often tend to be for demonstration purposes, with non-trivial deployments evolving over time when end users start to look for solutions to real problems, and cannot find these solutions in existing technologies, therefore turn to Intelligent Agent-based solutions. It is these deployments that will yield the most important and interesting work in the area.

The main technology-enabler for the wide spread use of Intelligent Agents is already in place: the Internet. In fact, due to the increasing complexity of the World Wide Web, where everything is available but services change by the second, Intelligent Agents are becoming necessary for user to make a cohesive view out of the information overload. [3]

Amazon.com is a prime example of a business that has made extensive usage of Intelligent Agent technology. Thousands of activity and sales reports are automatically distributed to its associates each week, while digital sales clerks gently suggest to customers that people who bought a particular book also bought this other similar book by the same author. [4] The use of agents is not limited to the retail sector, however.

Applications that are highly suited for Intelligent Agent usage are [4]:

Working with only these general area headings, it is clear to see that the adaptation of Intelligent Agent technology could become widespread throughout organizations. For example, Human Resource (HR) professionals could use agents to data mine online recruitment websites for potential employees with certain pertinent skill sets, or stock brokers could use agents to monitor stock markets and news feeds to aid in risk management of funds. In short, the deployment of the technology is likely to be widespread and varied.

Limitations of Intelligent Agents

As with any technology-based solution, a number of limitations and concerns exist regarding the usage of Intelligent Agents. [5]

While some of these issues are technology related, others are side effects of the concept of Intelligent Agents itself. We cannot design an agent to be autonomous and capable of reaching its own decisions, only to decide that we now want to exert a central control over these agents, which is defeating the purpose of the concept.

Conclusion

The issue of control raises a fundamental philosophical concern with the widespread use of Intelligent Agents in business organizations: how much decision making controls are we willing to give up to an Intelligent Agent?

In order to make business decisions based on the information provided in reports from Intelligent Agents, or to allow Intelligent Agents to carry out such business decisions, the Intelligent Agent developers must convince the users of such agents of the reliability of the software. While one hundred percent reliability is unrealistic in real world applications, a measure of dependability must be established.

Business decisions are driven by all kinds of information sources, many of which are unreliable, e.g. rumor and speculation. Nonetheless, business leaders often trust such information sources. Intelligent Agents have no "hidden agenda": like any other computer program, they are simply and diligently carrying out a series of repetitive tasks, according to the users needs. As a result, human trust in Intelligent Agents is likely to increase in the years ahead.

The parallel has been made with Intelligent Agents and computer viruses, for example computer viruses act independently within computer networks just as agents do. The concern here is what would happen if an intelligent computer agent went rogue, returning false data in reports, or even worse actively causing damage on the Internet [1]

It is certainly possible, although agents from reputable developers are likely to include measures to prevent such things from happening. Less reputable developers have already shown a talent for modifying technology to meet ill aims, for example using automated web site crawling software, or spider bots, to harvest e-mail addresses from unsuspecting websites to be automatically added to spam mail lists.

Just as with any other technology that gives a business a competitive advantage, however short lived, Intelligent Agents are likely to follow a similar pattern of widespread adoption. If you know that your competitor uses them, then you are likely to want to follow suit, then before you know it everyone is using them. In-house development of highly specialized Intelligent Agents is likely to yield the most benefit where possible, as these agents can be highly suited to your needs, while the intellectual property of the agent code can be protected from competitors.

References

[1] Abbot, L & Siskovic (-), Intelligent Agents in Computer and Network Management, S, http://teachnet.edb.utexas.edu/~lynda_abbott/webpage.html, Date Accessed: January 2005.

[2] Intelligent Agents Group (IAG) (-), A Survey on Intelligent Agents in Telecommunications, http://www.cs.tcd.ie/research_groups/aig/iag/survey.html, Date Accessed: January 2005.

[3] Gilbert, D (1997), Intelligent Agents: the Right Information at the Right Time, http://www.networking.ibm.com/iag/iaghome.html, Date Accessed: January 2005.

[4] Farhoodi, F & Fingar, P (1997), Competing for the Future with Intelligent Agents, http://home1.gte.net/pfingar/agents_doc_rev4.htm, Date Accessed: January 2005.

[5] Jennings, N.R. & Wooldridge, M (-), Application of Intelligent Agents, http://agents.umbc.edu/introduction/jennings98.pdf, Date Accessed: January 2005.


Updated 2021 : note that the above post is out-of-date, given this post was originally published in 2005, but is left here for archival purposes. As most of the links in the references section are now dead, I have unlinked them.