1 Introduction

In recent years, mass events, natural disasters, public health events, public security events and other emergencies occur frequently. Due to the characteristics of burstiness, variability, stage, disposition urgency, hazard severity and public nature of Emergencies, the security of public has present many distinct characteristics different from the normal. Due to the lack of early warning evaluation and dynamic changes characteristics of emergencies, all kinds of crimes affecting security of public and stability are concentrated, which resulting in public chaos and affecting the progress of the government in handling emergencies. As an important part of the whole public crisis management system, security of public risk assessment has become an important part of modern public governance. In the face of new emergencies, how to effectively evaluate the security of public environment, and to build an effective security risk coupling early warning evaluation mechanism by combined with the dynamic data information, which have attracted more and more attention of the public security police personnel and scholars (Nurse and Creese 2017; Vlasselaer et al. 2017; Schmitz and Pape 2020; MansourAlali and MehediHassan 2018; Smith and Brooks 2013).

Tong Li (2017) has attributed security risk factors to four parts: event, person, object and environment by combined with the principle and flow mechanism characteristics of emergencies. Nayu Wang (2017) puts forward the key population risk control model in dynamic public environment based on risk assessment theory, intelligence-led policing theory and process reengineering theory. Yu Liu (2018) has proposed the scenario information model by the analysis of the emergency and its situational characteristics based on the characteristics of event knowledge base, multiple scenario knowledge base, resource knowledge base and associated knowledge base. Fortune (2018)the method of neural network and expert reasoning is put forward to quantitatively analyze the risk factors affecting the security prevention system and improve the accuracy of the evaluation model. Trond (2018) has analyzed the effectiveness of security system and optimize the index weight ratio by fuzzy theory, mathematical model and expert system. Klara Svalin (2018) has given the effectiveness of risk assessment and early warning of police force use in sudden police cases from the point of view of risk prediction system construction, ‘model construction and data acquisition.

The above research analyzes the source and formation mechanism of emergency security risk from different angles, but it is often limited to a single risk factor, and the multi-source coupling risk factor is often lack of effective evaluation. However, many risk scenarios are often coupled output problems due to interreaction, and the risk scenarios have great uncertainty in the process of different types of emergencies, which involves many factors, such as the event itself, public impact, information change and government response. The failure of multi-factor interaction and early warning mechanism often leads to the further deterioration security of public. Experts in this kind of risk related fields put forward the "scenario-response" risk management model, but there is still a lack of specific governance methods and strategies.

Combined with the experience of experts in various related fields (Scheitle and Halligan 2017; Nalan Ergün and Bülbül 2019; Chainey and Monteiro 2019) and the research results (Jiaguo et al. 2019; Aleksandrovskaya et al. 2019; Qing et al. 2017) by Liu Jiaguo and others, this paper proposes a multidimensional security risk early warning degree model based on holographic modeling from the perspective of risk filtering, rating and governance. We use Bayesian theorem and model to carry out the coupling evaluation of different risk scenarios around the dimensions of "event content, influence degree, propagation law, risk scenario, diffusion range and countermeasure utility ". And combine the multi-type security risk factors caused by multi-type events into one, which is beneficial to the transformation of risk elaboration and evaluation to accurate and quantitative.

2 HHM-RFRM dynamic modeling

The severity, risk and influence range of emergencies are the most important external environmental drivers to determine the stability of public security. In the identification model analysis, the static factors affecting public order should be fully considered as the fixed index and the variable factors as the process parameters.

Through qualitative and quantitative analysis, the key influencing factors are clearly distinguished to establish the input–output relationship between emergency and security environment. The static data is effectively fused with the dynamic data, and the multiple risk scenarios are coupled and integrated. The evaluation model can be compared and analyzed by historical and scoring data. The set of dynamic change data effectively reduces the influence on randomness and nonlinear expression in the evaluation process. The historical measured data are added to the evaluation model, and the actual results are compared to correct the model and improve the accuracy. This paper analyzes the effects of various risk factors one by one combined with the HHM-RFRM risk index system, and analyzes the interaction and coupling between various risk factors, which mainly in three aspects:

2.1 Scenario recognition perspective

The concept of multidimensional risk coupling is put forward. Suppose \({C}_{i}^{e}\) means that category i emergencies consist of e risk scenarios, bi represents a risk scenario of emergency \({C}_{i}^{e}\), \({B}_{n}^{m}\) indicates that the n risk scenario consists of m risk elements, Ni represent risk elements \({B}_{n}^{m}\) risk scenarios. Definition:

$$C_{i}^{e} = B_{1} \Theta B_{2} \Theta B_{3} \Theta B_{m} { }$$
(1)

For symbols Θ, their algorithms satisfy the commutative law.

2.2 Risk qualitative assessment perspective

From the view point of the influence degree of each risk factor on the stability of public security, the qualitative analysis of the characteristics of each risk factor is helpful for decision makers to quantitatively evaluate the risk factors and the overall risk by combined the complex characteristics of the risk of public security prevention and control in emergencies. According to the relevant analysis, the ability of public security risk prevention and control is distinguished, and the characteristics of each risk factor are comprehensively evaluated to provide a reference for quantitative evaluation. This paper refers to relevant literature and lists 10 criteria for public security risk evaluation, as shown in Table 1:

Table 1 Multiple criteria for security risk assessment

2.3 Risk quantitative evaluation

Combined with Bayesian theorem and quantitative calculation is carried out from two dimensions of probability and consequence by using multi-dimensional risk measurement model, and the definition is as follows:

$$D_{{{\text{risk}}}} = C_{{{\text{risk}}}} \times P_{{{\text{risk}}}}$$
(2)

The Drisk as the risk degree of the subfactor, Crisk as the possible consequences of the risk factor, as shown in Table 2. Prisk as the occurrence probability of the risk coupling scenario.

Table 2 Indicators of risk factors

The hypothesis H and E are two random variables, the H = h is a hypothetical risk factor, and the E = e is the related risk caused by the hypothetical influencing factor. The analysis shows that P (H = h) is a single probability and P (H = hE = e) is a coupling probability without considering the related risks. The Bayesian theorem formula is:

$$\begin{gathered} P(H = h\left| {E = e} \right.) \hfill \\ = \frac{{P(H = h)P(E = e\left| {H = h} \right.)}}{P(E = e)} \hfill \\ \end{gathered}$$
(3)

Combined with Table 2, the probability of each risk coupling scenario can be calculated by using the coupling relationship between historical data, statistical analysis and risk factors, and the risk degree of the risk scenario can be calculated by combining formula (1) and (2).

3 Risk identification

3.1 Risk factor construction

It is the key of public security risk prevention and control to analyze the influence factors of emergency public security effectively. The research shows that the public security risk is easy caused by emergency. According to the literature analysis, the risk consists of three parts: risk factor, threat target and trigger mechanism. For security risk threat target such as public security and stability, it is an important basis for risk identification to effectively clarify the trigger mechanism of risk factors and its constituent elements. In view of the complexity and diversity of public security risks in the course of emergencies, this paper adopts the method of combining objective analysis with subjective judgment, the elements of public security risks are analyzed by combining historical documents, public security statistics and expert opinions.

The iterative analysis of risk data index is carried out by combined with holographic modeling and risk factor composition theory. The iterative process is mainly carried out by two groups of experts, the first group is to search for risk factors by 10 experts from the public security and security departments. Each expert has more than 10 years working experience and research foundation to the emergency occurrence and the handling influence to the public security question. This group of experts conduct a questionnaire, which is divided into two parts. The first part includes the 35 risk factors extracted from the literature and public security data. The second part sets up the open type problem, so the experts can list the emergency security risk factors according to their own experience, and then expand the risk source framework. The preliminary analysis results are obtained. The second group is to demonstrate the risk factors by 10 experts from public security colleges and government departments. The experts group review the preliminary analysis results of risk sources to test their scientific, comprehensive and operational. If the audit is approved, the HHM framework can be constructed according to the analysis results, otherwise, the above operation can be repeated on the basis of the opinions of the second group experts. Combine with the risk action and coupling mechanism, the perfect risk elements system is constructed by iterative analysis, and the security risk factors are classified according to the results of expert audit and case verification, as shown in Table 3. Reflect the source of security risk and its influence relationship.

Table 3 Public security risk HMM evaluation index

The sources of emergency security risk factors are broader, how to effectively manage and analyze is a large-scale and complex system engineering. Combined with the related expert analysis and comprehensive index, the source composition of emergency risk is divided into five aspects: people(P), emergency(E), equipment and data(H), management(M), information(I), and these five aspects are classified as static and dynamic risk of public security.

(1) Static risk is mainly the daily defense means of public security risk management, which mainly refers to the improvement of the control and management ability of the internal risk elements of the public security system in order to enhance risk resistance and response ability.

People factors (P) mainly include the police quality, psychological state, physiological state, training situation, the masses state and so on. In the course of public security operation, people is the main body of public security operation and maintenance, and human factor is an extremely active factor. Many public security problems are caused by the ways and means of handling problems for public security personnel or government personnel. For example, the police station is too busy to failure to send police to deal with the problem, which lead to and the neighborhood conflict turned into a serious violent crime in 2017, which the information comes from news reports of the year. Eventually leading to casualties and serious public impact.

Equipment factors (H) mainly include common monitoring equipment performance, monitoring equipment distribution, information transmission and detection, intelligent identification equipment, common police equipment and so on. Among them, the uneven distribution of equipment, damage and transmission obstacles will cause delays in the resolution of security problems. For example: a shop in Tianjin was stolen in 2018, because the monitoring equipment was not opened lead to the lack of effective video evidence, which delayed the time of solving the case. Eventually caused some items to be lost, which the information comes from news reports of the year.

Organizational management (M) mainly includes supervision and control of public security system, communication command, emergency management plan, government response ability, control strategy, information management and so on. Public security and government departments regulate and effectively manage public activities and personnel is an important factor to resist risks. The key to organizational management is to manage dangerous personnel and regions from the source. If the control is improper, it will cause major problems. For example, in 2019, a probation officer has fought with others in other cities in Guangzhou, Guangdong Province due to the street and police station did not carry out effective monitoring and management which resulting in the personnel out of management scope. The information comes from news reports of the year.

(2) Dynamic risk mainly refers to the control and effective handling of emergency information in the process of public personnel activities. Dynamic risk mainly includes information (I) and emergency factor (E) two factors.

Information and environment (I) mainly includes information composition and dissemination speed, public opinion response, government public opinion control, public overall environment and so on. In the process of public security governance, information and environmental factors have become an important uncertain factor. Only by accurately mastering information and environmental changes can ensure the safety and stability of public security. For example, a chemical plant in Sichuan suspected gas leakage in 2020 which the information comes from news reports, the government did not effectively predict and control, which lead to public chaos and some public security problems due to nearby residents in unknown circumstances panic evacuation. In the risk management of public security, the dangerous environment and information should be understood in advance to avoid adverse communication and influence.

Emergency factors (E) mainly include emergency type, emergency impact, emergency time, emergency place and so on. Determining the dynamic change and predicting the influence of the emergency is helpful to grasp the guidance of the whole event. Only by mastering the risk factors of the event in time and accurately can ensure the effective control event. For example, there is a fight and brawl incident in a middle school in a certain part of Shaanxi in 2019, which resulting in the expansion of the subsequent brawl incident scope due to the school and the public security department to estimate the incident insufficient. Eventually causing casualties and adverse public effects, which the information comes from news reports of the year. Therefore, we should pay attention to the composition and influence of the emergency in time and carry out effective prevention.

If only a certain risk factor can not be considered in the process of risk management to achieve the goal of effective control risk, it is extremely effective to use the HHM to analyze it in all directions and from multiple perspectives. According to the relevant contents of disaster chain theory, in order to capture and reflect its risk sources comprehensively and accurately, this paper analyzes the data index system and its relationship, and establishes a public security risk evaluation index system based on HMM framework. As shown in Table 3.

3.2 Scene identification

Table 3 shows the composition HMM elements of public security risk. In the process of risk management and analysis, it is necessary to couple the relationship between the elements of public security risk to form a HHM risk sub-model. These sub-models are composed of two or more elements, which forming risk scenarios from the perspective of different risk coupling characteristics. So as to carry out research on public security governance based on identifying public security risks by analyzing risk elements in all directions and from multiple angles. Figure 1 shows the coupling relationship between the five first-level index elements of public security. From the diagram, we can see that the five first-level index elements can influence each other, and HHM risk scenarios can be formed between two or any three combinations. Under formula (1), if the human factor-hardware equipment risk scenario is numbered as 1 in the public security risk HHM index model system, the risk scenario can be expressed as C12 = I&H. The10 two-dimensional and 15 three-dimensional risk scenarios can be listed by analogy, as shown in Tables 4 and 5.

Fig. 1
figure 1

Coupling relationship of public security riskfactors

Table 4 Two-dimensional risk scenarios of public security
Table 5 Three-dimensional risk scenarios of public security

When the specific risk scenario is encountered, it is necessary to analyze the interaction of multiple risk scenarios due to each risk factor contains multiple subfactors, so as to effectively determine the risk sources from different perspectives. For example, the interaction of information and people two factors creates a new risk perspective for two-dimensional risk scenarios I&P as shown in Fig. 2a. There are different requirements for regional police distribution, police professional ability and police stations distribution in the context of emergencies different propagation speed and scope, propagation type, involving wire fraud and information monitoring. If the two are not matched properly, it is easy to have serious consequences. Similarly, the interaction of information, people and event factors forms a three-dimensional risk perspective for a three-dimensional risk scenarios I&P&E as shown in Fig. 2b. For example, the speed of information dissemination has obvious differences for different types of emergencies, which lead to different personnel requirements have different abilities. If not effective evaluation, it will not be conducive to the effective handling emergencies. According to the method, the interaction risk of multiple subfactor can be identified one by one.

Fig. 2
figure 2

Coupling relationship of multiple subfactors. a two dimension b three dimensional

The probability or consequence of risk influence can be determined by using the geometry of the risk coupling relationship between various factors as shown in Fig. 2. Taking the probability measurement as an example by calculating the geometric area and volume to measure the risk degree under the interaction of various factors in a risk scenario. When the dimension of the risk scenario is less than or equal to 3, we can obtain:

$$P_{{{\text{risk}}}} = {\text{p}}_{{\text{x}}} {\text{p}}_{{\text{y}}} {\text{p}}_{{\text{z}}}$$
(4)

The Prisk is defined as the coupling probability risk degree under the interaction of three factors in the Cmn risk scenario, px, py, pz represents the side length of the geometry generated by the interaction in the risk coordinate system, which the posterior probability of a single risk factor. Specifically, pz = 1 when the Cmn is a two-dimensional risk scenario.

4 Risk evaluation and simulation

4.1 Risk index

With the analysis and identification of the above HHM risk evaluation indexes,11 II grade risk indexes and 43 III grade indexes were identified. In order to effectively determine the key risk factors, 43 risk factors are qualitatively analyzed, and the two criteria of possibility and consequence are filtered by double standard.

The filtering standard is determined by the analysis of past experience data and expert investigation. According to their own experience and historical data statistics, the experts analyze the inducing factors of public security problems in emergencies, and design statistical analysis questionnaires. By consulting 30 experienced security staff, the results as shown in Table 6.

Table 6 Double standard filtering risk ranking matrix

The public security risk ranking matrix gives a preliminary rating of each risk factor. The psychology state, regional police force distribution, police professional ability, department coordination ability, security prevention plans, local initial management ability, Initial police response, rescue management and quality, network information monitoring system, camera security system, public security equipment, emergency type, controllability, information public opinion guidance, Information monitoring, international and domestic situation total 16 risk factors were retained as the main risk factors after filtering out the extremely low risk, low risk and general risk. However, the other 27 risk factors are not excluded, they are filtered out only to indicate that the risk is not high relative to the 16 risk factors retained, and the public security risk analysis shall begin with the key risk factors.

4.2 Quantitative rating

According to the risk filtering criteria in Table 1, the expert group further evaluated 16 key risk factors of public security in combination with the investigation, and divided the criteria into three grades:" high (H)"," medium (M)" and "low (L)". The results are shown in Table 7.

Table 7 Multiple criteria evaluation matrix of public security risk

In view of the major public health events (Wuhan Covid-19), the frequency of various public security events and the influencing factors leading to public security events are analyzed to determine the priori probability of public security risk factors, through relevant historical data on changes in public security after various emergencies in previous years. For example: security incidents caused by network information monitoring system errors after emergencies. The prior probability is P(M24) = 0.5. According to the emergency design and rescue, the organization coordination ability, the police professional ability and the current external environment, the decision makers and experts make judgments according to the experience and the basic information they have. If the network information monitoring situation is good and the possibility of public security event is small, then the conditional probability is P(N1∣M14) = 0.1, Where N1 represents the related status of the network information monitoring system of the emergency. So P(\(\overline{M}_{14}\)) = 0.5, P(N1\(\overline{M}_{14}\)) = 0.9, the posteriori probability is calculated according to Eq. (3):

$$P(\left. {M_{14} } \right|N_{1} ) = \frac{{P(M_{14} )P(\left. {N_{1} } \right|M_{14} )}}{{P(M_{14} )P(\left. {N_{1} } \right|M_{14} ) + P(\overline{{M_{14} }} )P(\left. {N_{1} } \right|\overline{{M_{14} )}} }} = 0.1$$

Similarly, the posterior probabilities of other risk factors can be obtained accordingly, and the results are shown in Table 8.

Table 8 Public security risk factor probability

According to the calculated posterior probability, the possibility of 16 key risk factors is divided into four intervals and quantitatively rated, as shown in Table 9. Therefore, this paper filters out the nine key risk elements of public security risk after emergency, that is, police professional ability, department coordination ability, local initial management ability, rescue management and quality, network information monitoring system, camera security system, police equipment, emergency type, guidance of information public opinion. Therefore, once the emergency evolves the public security problem, we should focus on the above nine risk factors.

Table 9 Public security risk quantitative ranking matrix

4.3 Scene assessment

The interaction of the nine risk factors are analyzed by HHM framework and holographic theory based on the identification and rating of public security risk. So as to further assist managers to make public security risk management decisions in the process of emergency by evaluating the risk scenarios composed of key risk factors. A HHM sub-model of the key public security risk factors of the event is shown in Fig. 3.

Fig. 3
figure 3

The sub-model of the key public security risk factors

According to formula (2) and Table 2, the consequence value of the key risk sub-scenario is calculated. Since all risk factors here are serious and relatively serious factors, Crisk is set as 1 or 0.8. That is, the probability is used to measure the danger degree of risk scenario. According to the px, py, pz value corresponding to each risk scenario, the risk degree of each two-dimensional risk scenario containing only key risk factors can be obtained by the joint formula (2), as shown in Table 10. In general, we think that risk above 0.01 is high risk for two-dimensional risk scenarios. The three-dimensional risk scenario of public security is not discussed here because its probability is too small.

Table 10 Risk degree of key two-dimensional risk scenarios

According to the analysis of the calculation results, there are 7 risk sub-scenarios with risk over 0.01, in the key two-dimensional risk situations of the event, which reflect the risk of information factors-equipment factors and people factors-management factors in the public security risk management of this event.

It can be concluded that the risk is very large when the information factors interact with the people factors and the management risk factors. That is, information dissemination and monitoring, police professional ability, rescue ability and so on should be paid more attention to than other risk factors when public security changes after emergencies. Therefore, the security risk management after such emergencies needs to pay priority attention to the ability of information monitoring and equipment application in order to improve the police ability to deal with sudden changes in public security.

5 Conclusion

  1. 1.

    It is found that the HHM-RFRM constructed in this paper has a certain application value in the public security risk assessment of emergency, and the coupling effect of the proposed risk factors will produce a new risk source from a new perspective. The risk assessment method of HHM-RFRM public security can be improved by introducing measurement mode of multi-dimensional risk scenario.

  2. 2.

    Taking public health events (Wuhan Covid-19) as an example, using double standard filtering matrix and multiple standard evaluation matrix, combining Bayesian theorem and risk ranking matrix to quantitatively filter and rate public security risk factors. It is found that this method is helpful to analyze the interaction of risk scenarios, but the public security problems of emergencies are more complex, and decision makers need to further study a variety of risk coupling scenarios.