Analytical framework for public safety risk intertwining mechanism based on open-source intelligence

Zhankun WANG, Chencheng XU, Yang GAO, Chao TANG, Wenqing XIN, Xinzhi WANG, Chenyang WANG

Journal of Tsinghua University(Science and Technology) ›› 2026, Vol. 66 ›› Issue (1) : 151-159.

PDF(5506 KB)
PDF(5506 KB)
Journal of Tsinghua University(Science and Technology) ›› 2026, Vol. 66 ›› Issue (1) : 151-159. DOI: 10.16511/j.cnki.qhdxxb.2025.22.037

Analytical framework for public safety risk intertwining mechanism based on open-source intelligence

Author information +
History +

Abstract

Objective: In today's increasingly interconnected world, risks—whether natural, technological, economic, or social—rarely exist in isolation. Instead, they often intertwine, which increases their impacts and complicates mitigation efforts. Such complex intertwining of risks poses significant challenges to emergency decision-making and public safety management. To address this issue, this study examines the mechanisms underlying risk intertwining to establish a scientific foundation for optimizing emergency response strategies. By enhancing the understanding of how risks interwine, this study seeks to improve the risk prevention, mitigation, and resilience-building for multifaceted crises. Methods: This study adopts a research methodology that combines qualitative and quantitative analysis. Through qualitative analysis, we examine (1) intertwining characteristics, analyzing interaction patterns between different risks; (2) root causes, investigating the fundamental driving mechanism of risk intertwining; and (3) forms of manifestation, identifying observable risk intertwining patterns, such as synchronous occurrence, secondary triggering, or latent correlations. Through quantitative analysis, we calculate (1) the time span, quantifying the duration of risk intertwining to assess its persistence and long-term impacts, and (2) the coupling intensity—computing the degree of interdependence between risks to establish quantifiable indicators of intertwining strength. This integrated approach enables a comprehensive investigation of both the qualitative and quantitative dimensions of risk intertwining. Results: This study investigates the intrinsic mechanisms of risk intertwining. By deconstructing the inherent patterns of risk intertwining, this study transcends the limitations of traditional descriptive analysis and reveals fundamental mechanism governing risk intertwining phenomena. An analytical framework is developed to assess real-time public safety risk intertwining utilizing open-source information such as news reports, social media data, and government bulletins for real-time monitoring and risk correlation assessment. A public safety risk intertwining model is proposed and empirically validated through case studies and testing using real-world data, demonstrating its practical applicability in real-life scenarios. The model's effectiveness is confirmed across multiple verification dimensions. Conclusions: This study proposes an open-source intelligence-based model that analyzes the intertwining mechanisms of public safety risks by integrating risk perception, identification, and mechanism exploration capabilities to evaluate complex risk composites. This study systematically elucidates the characteristics and underlying causes of risk intertwining while establishing a comprehensive evaluation index system to assess the degree of intertwining between different risk themes. Using 23 years of open-source data from websites, such as X, as a case study, the model's effectiveness in applications related to public safety and emergency management has been empirically validated. The study finds that (1) the proposed mixed methods model effectively reveals complex intertwining mechanisms, particularly in the public safety domain, where risks are high and information is abundant; (2) the risk perception model enables the prediction and generation of multiple risk topics through the contextual analysis of vast open-source information to promptly identify emerging risks and facilitates effective preventive measures; and (3) building on traditional qualitative descriptions, the risk intertwining model achieves a mathematical representation of risk intertwining by calculating the similarity between different risk topics. The model quantitatively assesses the evolving trends of risk intertwining over time, providing auxiliary decision-making support for preventing and mitigating public safety risks.

Key words

open-source intelligence / public safety / risk intertwining / contextualized topic model (CTM) / risk similarity

Cite this article

Download Citations
Zhankun WANG , Chencheng XU , Yang GAO , et al . Analytical framework for public safety risk intertwining mechanism based on open-source intelligence[J]. Journal of Tsinghua University(Science and Technology). 2026, 66(1): 151-159 https://doi.org/10.16511/j.cnki.qhdxxb.2025.22.037

References

1
陈涛, 黄丽达, 陈杨, 等. 公共安全领域工程科技未来20年发展战略研究[J]. 中国工程科学, 2024, 26 (5): 65- 79.
CHEN T , HUANG L D , CHEN Y , et al. Research on the development strategy of engineering science and technology in the field of public safety for the next 20 years[J]. Engineering Science in China, 2024, 26 (5): 65- 79.
2
周佳美, 吕伟, 汪京辉. 基于多重网络下风险与信息耦合传播的供应链韧性分析[J]. 清华大学学报(自然科学版), 2025, 65 (6): 1050- 1059.
ZHOU J M , W , WANG J H . Impact of risk and information coupled propagation in multilayer networks on supply chain resilience[J]. Journal of Tsinghua University (Science & Technology), 2025, 65 (6): 1050- 1059.
3
杨建英, 余至诚. 开源情报在中国国家安全情报中的地位和作用分析[J]. 情报杂志, 2019, 38 (10): 21-26, 145.
YANG J Y , YU Z C . An analysis of the position and function of open source intelligence in China's national security intelligence[J]. Journal of Intelligence, 2019, 38 (10): 21-26, 145.
4
朱正威, 张莹. 发达国家公共安全管理机制比较及对我国的启示[J]. 西安交通大学学报(社会科学版), 2006, 26 (2): 46- 49.
ZHU Z W , ZHANG Y . Comparison of public security management mechanisms among main developed countries and its enlightenment to our country[J]. Journal of Xi'an Jiaotong University (Social Sciences), 2006, 26 (2): 46- 49.
5
张春艳. 大数据时代的公共安全治理[J]. 国家行政学院学报, 2014 (5): 100- 104.
ZHANG C Y . Public safety governance in the era of big data[J]. Journal of Chinese Academy of Governance, 2014 (5): 100- 104.
6
李子浩, 田向亮, 黎忠文, 等. 基于客流规律的地铁车站客流风险分析[J]. 清华大学学报(自然科学版), 2019, 59 (10): 854- 860.
LI Z H , TIAN X L , LI Z W , et al. Risk analysis of metro station passenger flow based on passenger flow patterns[J]. Journal of Tsinghua University (Science and Technology), 2019, 59 (10): 854- 860.
7
ABBASI A , KAPUCU N . Structural dynamics of organizations during the evolution of interorganizational networks in disaster response[J]. Journal of Homeland Security and Emergency Management, 2012, 9 (1): 1975.
8
BLEI D M , NG A Y , JORDAN M I . Latent Dirichlet allocation[J]. Journal of Machine Learning Research, 2003, 3, 993- 1022.
9
王昀, 胡珉, 塔娜, 等. 大语言模型及其在政务领域的应用[J]. 清华大学学报(自然科学版), 2024, 64 (4): 649- 658.
WANG Y , HU M , TA N , et al. Large language models and their application in government affairs[J]. Journal of Tsinghua University (Science and Technology), 2024, 64 (4): 649- 658.
10
LIU Y , LIU X , GAO S , et al. Social sensing: A new approach to understanding our socioeconomic environments[J]. Annals of the Association of American Geographers, 2025, 105 (3): 512- 530.
11
郑英隆, 王勇, 袁健. 互联网金融的多网交织成长与风险管理[J]. 江汉论坛, 2014 (3): 75- 80.
ZHENG Y L , WANG Y , YUAN J . Multi-network interweaving growth and risk management of Internet finance[J]. Jianghan Tribune, 2014 (3): 75- 80.
12
谢济铭, 秦雅琴, 彭博, 等. 多车道交织区车辆跟驰行为风险判别与冲突预测[J]. 交通运输系统工程与信息, 2021, 21 (3): 131- 139.
XIE J M , QIN Y Q , PENG B , et al. Risk discrimination and conflict prediction of vehicle-following behavior in multi-lane weaving sections[J]. Journal of Transportation Systems Engineering and Information Technology, 2021, 21 (3): 131- 139.
13
张广泉. 风险交织叠加防范刻不容缓: 近年我国自然灾害特点及其影响分析[J]. 中国应急管理, 2020 (7): 14- 15.
ZHANG G Q . Compounded risks and immediate prevention: The characteristics and impact of natural disasters in China in recent years[J]. China Emergency Management, 2020 (7): 14- 15.
14
安永. 车联网安全风险交织, 如何破解严峻形势?[J]. 汽车与配件, 2023 (11): 38- 43.
AN Y . How to solve the severe situation for Internet of vehicles with intertwined security risks?[J]. Auto & Parts, 2023 (11): 38- 43.
15
REN Z Y , NIE L R , DU Y S , et al. Intertwined depressive and cognitive trajectories and the risk of dementia and death in older adults: A competing risk analysis[J]. General Psychiatry, 2024, 37 (2): e101156.
16
BEHL A , NIGAM A , ZAHNG J . Guest editorial: Intertwining of information systems and knowledge risk in the uncertain business environment[J]. VINE Journal of Information and Knowledge Management Systems, 2023, 53 (5): 873- 879.
17
GONZALEZ-SICILIA D , DEREVENSKY J L , PAGANI L S . Two lifestyle risks intertwined: Parental smoking predicts child gambling behavior at age 12 years[J]. American Journal of Lifestyle Medicine, 2020, 14 (1): 89- 96.
18
王春柳, 杨永辉, 邓霏, 等. 文本相似度计算方法研究综述[J]. 情报科学, 2019, 37 (3): 158- 168.
WANG C L , YANG Y H , DENG F , et al. A review of text similarity approaches[J]. Information Science, 2019, 37 (3): 158- 168.
19
焦心怡. 基于深度学习的城市交通速度预测研究[D]. 西安: 长安大学, 2024.
JIAO X Y. Research on urban traffic speed prediction based on deep learning[D]. Xi'an: Chang'an University, 2024. (in Chinese)
20
BIANCHI F, TERRAGNI S, HOVY D. Pre-training is a hot topic: Contextualized document embeddings improve topic coherence[C]//Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing. Association for Computational Linguistics. Held Online Virtually, 2021: 759-766.
21
蓝江. 人文视野下的认知域及其国家安全战略价值[J]. 人民论坛·学术前沿, 2023 (11): 54- 64.
LAN J . Cognitive domain: A humanities perspective and its national security strategy value[J]. Acdemic Frontiers, 2023 (11): 54- 64.
22
富景筠, 钟飞腾. 对冲地缘政治风险: 跨国公司战略联盟与俄欧天然气政治[J]. 欧洲研究, 2021, 39 (2): 82- 109.
FU J Y , ZHONG F T . Strategic alliance of multinationals and Russia-Europe gas politics[J]. Chinese Journal of European Studies, 2021, 39 (2): 82- 109.

RIGHTS & PERMISSIONS

All rights reserved. Unauthorized reproduction is prohibited.
PDF(5506 KB)

Accesses

Citation

Detail

Sections
Recommended

/