首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
21世纪,组织在多变的环境中能否生存,能否实现可持续发展,很大程度上取决于其应变能力。面对各种各样的危机与不利因素,组织应有一套动态平衡机制——危机防范机制,以适应各种突变。然而,建立危机防范机制的思路是什么、采用什么方法、如何建立等问题应该成为组织关注的重点。此前,国内外专家学者的研究大多集中在对经济预警的方法和理论探讨、公共危机预警管理探讨、经济预警系统的框架构建等方面,而从质量管理工具的视角探讨组织建立危机防范机制的路径方面的研究还不多见。本文主要致力于该方面的探讨,为组织建立危机防范机制提供一种可供选择的方法和途径。  相似文献   

2.
This paper presents a vision for a Disaster City Digital Twin paradigm that can: (i) enable interdisciplinary convergence in the field of crisis informatics and information and communication technology (ICT) in disaster management; (ii) integrate artificial intelligence (AI) algorithms and approaches to improve situation assessment, decision making, and coordination among various stakeholders; and (iii) enable increased visibility into network dynamics of complex disaster management and humanitarian actions. The number of humanitarian relief actions is growing due to the increased frequency of natural and man-made crises. Various streams of research across different disciplines have focused on ICT and AI solutions for enhancing disaster management processes. However, most of the existing research is fragmented without a common vision towards a converging paradigm. Recognizing this, this paper presents the Disaster City Digital Twin as a unifying paradigm. The four main components of the proposed Digital Twin paradigm include: multi-data sensing for data collection, data integration and analytics, multi-actor game-theoretic decision making, and dynamic network analysis. For each component, the current state of the art related to AI methods and approaches are examined and gaps are identified.  相似文献   

3.
People increasingly use Social Media (SM) platforms such as Twitter and Facebook during disasters and emergencies to post situational updates including reports of injured or dead people, infrastructure damage, requests of urgent needs, and the like. Information on SM comes in many forms, such as textual messages, images, and videos. Several studies have shown the utility of SM information for disaster response and management, which encouraged humanitarian organizations to start incorporating SM data sources into their workflows. However, several challenges prevent these organizations from using SM data for response efforts. These challenges include near-real-time information processing, information overload, information extraction, summarization, and verification of both textual and visual content. We highlight various applications and opportunities of SM multimodal data, latest advancements, current challenges, and future directions for the crisis informatics and other related research fields.  相似文献   

4.
行政危机管理--来自可能性的挑战   总被引:1,自引:0,他引:1  
高鹏程 《中国软科学》2004,(11):152-155
危机是预示灾难性后果而必须做出抉择的局势。行政危机管理是指行政机构对危机的管理。危机发展可以分为潜伏期、爆发扩展期和后果展现期三个阶段,行政机构应采取不同策略应对。危机管理促使行政机构优化组织建设、信息沟通并促进制度化建设。以制度化和扩展性为标准可以区分出学习型和遗忘型两种行政机构。  相似文献   

5.
Abstract

Numerous organizations work to provide humanitarian aid to undocumented migrants along the US-Mexico border—from running shelters in Mexico to placing water on migratory trails. Resistance to information-sharing between organizations (and to the public), especially through technologically mediated means, is common. However, some organizers and volunteers work across organizational boundaries and share information informally. Information secrecy is often justified by concerns that law enforcement authorities or anti-immigration activists might gain access to information, allowing them to harm, detain or remove migrants, or interfere with humanitarian work. The choices made about the collection and (non)disclosure of information are manifestations of what we call “liminal” information practices: such behaviors are unique to humanitarian volunteers working in the gray, ethical area between law enforcement and humanitarian values and action, and they are guided by the information politics at play within this context.  相似文献   

6.
Conversational Recommendation Systems (CRSs) have recently started to leverage pretrained language models (LM) such as BERT for their ability to semantically interpret a wide range of preference statement variations. However, pretrained LMs are prone to intrinsic biases in their training data, which may be exacerbated by biases embedded in domain-specific language data (e.g., user reviews) used to fine-tune LMs for CRSs. We study a simple LM-driven recommendation backbone (termed LMRec) of a CRS to investigate how unintended bias — i.e., bias due to language variations such as name references or indirect indicators of sexual orientation or location that should not affect recommendations — manifests in substantially shifted price and category distributions of restaurant recommendations. For example, offhand mention of names associated with the black community substantially lowers the price distribution of recommended restaurants, while offhand mentions of common male-associated names lead to an increase in recommended alcohol-serving establishments. While these results raise red flags regarding a range of previously undocumented unintended biases that can occur in LM-driven CRSs, there is fortunately a silver lining: we show that train side masking and test side neutralization of non-preferential entities nullifies the observed biases without significantly impacting recommendation performance.  相似文献   

7.
The impact of crisis events can be devastating in a multitude of ways, many of which are unpredictable due to the suddenness in which they occur. The evolution of social media (for example Twitter) has given directly affected individuals or those with valuable information a platform to effectively share their stories to the masses. As a result, these platforms have become vast repositories of helpful information for emergency organizations. However, different crisis events often contain event-specific keywords, which results in the difficult extraction of useful information with a single model. In this paper, we put forward TASR, which stands for Topic-Agnostic Stylometric Representations, a novice deep learning architecture that uses stylometric and adversarial learning to remove topical bias to better manage the unknown surrounding unseen events. As an alternative to domain adaptive approaches requiring data from the unseen event, it reduces the work for those responding to the onset of a crisis. Overall, we conduct a comprehensive study of the situational properties of TASR, the benefits of its architecture including its topic-agnostic and explainable properties, and how it improves upon comparable models in past research. From two experiments, on average, TASR is able to outperform state-of-the-art methods such as transfer learning and domain adoption by 11% in AUC. The ablation study illustrates how different architecture choices of TASR impact the results and that TASR has been optimized for this task. Finally, we conduct a case study to show that explainable results from our model can be used to help guide human analysts through crisis information extraction.  相似文献   

8.
Warning: This paper contains examples of offensive language, including insulting or objectifying expressions.Various existing studies have analyzed what social biases are inherited by NLP models. These biases may directly or indirectly harm people, therefore previous studies have focused only on human attributes. However, until recently no research on social biases in NLP regarding nonhumans existed. In this paper,1 we analyze biases to nonhuman animals, i.e. speciesist bias, inherent in English Masked Language Models such as BERT. We analyzed speciesist bias against 46 animal names using template-based and corpus-extracted sentences containing speciesist (or non-speciesist) language. We found that pre-trained masked language models tend to associate harmful words with nonhuman animals and have a bias toward using speciesist language for some nonhuman animal names. Our code for reproducing the experiments will be made available on GitHub.2  相似文献   

9.
The topic of effective crisis prevention and response is attracting significant interests from corporations and governments. It is evident that the nature within any crisis is unpredictable, erratic and difficult to prevent. Organizations are therefore preparing for unexpected events by outlining their crisis response strategies. The fact that crises may not repeat themselves and a given crisis solution might not be directly applicable to another crisis represents radical shifts in routines. As such, an organization may have to improvise when putting together a set of resources and capabilities for a response. This case study complements existing crisis management research that emphasizes both prevention and response by focusing on how an organization may adapt and deploy resources and capabilities accordingly. To meet the objective, the research draws upon an in-depth case study of Singapore's response tothe Asian Tsunami disaster in 2004. Our findings offer a useful contribution to organizations’ knowledge of mobilizing resources and capabilities during dynamic crisis situations. The case concludes with several research and practical implications.  相似文献   

10.
Data-driven innovation (DDI) gains its prominence due to its potential to transform innovation in the age of AI. Digital giants Amazon, Alibaba, Google, Apple, and Facebook, enjoy sustainable competitive advantages from DDI. However, little is known about algorithmic biases that may present in the DDI process, and result in unjust, unfair, or prejudicial data product developments. Thus, this guest editorial aims to explore the sources of algorithmic biases across the DDI process using a systematic literature review, thematic analysis and a case study on the Robo-Debt scheme in Australia. The findings show that there are three major sources of algorithmic bias: data bias, method bias and societal bias. Theoretically, the findings of our study illuminate the role of the dynamic managerial capability to address various biases. Practically, we provide guidelines on addressing algorithmic biases focusing on data, method and managerial capabilities.  相似文献   

11.
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber defenses. As a result, organizations continue to experience incidents and suffer losses. The responsibility to respond to cybersecurity incidents lies with the incident response (IR) function. We argue that (1) organizations must develop ‘agility’ in their IR process to respond swiftly and efficiently to sophisticated and potent cyber threats, and (2) Real-time analytics (RTA) gives organizations a unique opportunity to drive their IR process in an agile manner by detecting cybersecurity incidents quickly and responding to them proactively. To better understand how organizations can use RTA to enable IR agility, we analyzed in-depth data from twenty expert interviews using a contingent resource-based view. The results informed a framework explaining how organizations enable agile characteristics (swiftness, flexibility, and innovation) in the IR process using the key features of the RTA capability (complex event processing, decision automation, and on-demand and continuous data analysis) to detect and respond to cybersecurity incidents as-they-occur which, in turn, improves their overall enterprise cybersecurity performance.  相似文献   

12.
企业危机管理、组织学习和知识管理的战略整合   总被引:6,自引:0,他引:6  
在动态环境下,企业的经营容易出现各种各样的危机,如何成功地应对危机成为每个企业的必修课。介绍了企业危机管理的动态发展模型,分析后认为,组织学习和知识的供给是成功的重要因素。提出为了确保正确的思维方式和学习效果的落实,应该采用三环学习的模式,建立了在三环学习模式下的知识管理执行过程和战略,以保证企业危机管理的知识供给。  相似文献   

13.
Improving how knowledge is leveraged in organizations for improved business performance is today considered as a major organizational change. Knowledge management (KM) projects are stigmatized as demanding, fuzzy and complex, with questionable outcomes—more than 70% of them do not deliver what they promised. A case of Samsung Electronics mobile branch we present shows how KM projects can be more successful if they are treated as business process-oriented organizational change projects. Both organizations and academia can stand on the shoulders of giants as previous experience and research in that area is rich. Adding the KM flavor to such organizational change is the goal of this case study; the learning outcomes include a six-step KM solution design method, a justification for the business process level of analysis and managerial action, and the need for modest and just-do-it approach when introducing KM-related organizational interventions.  相似文献   

14.
Social media is widely used for sharing disaster-related information following natural disasters. Drawing on negativity bias theory, integrated crisis mapping model, and arousal theory, this study characterized the emotional responses of the public and tested the way emotional factors and influential users (with high numbers of followers and activeness) affect the number of reposts. Results indicated that after unpredictable earthquakes, the public showed negative responses, and negativity bias theory manifested especially when the posts came from influential users. During a typhoon or earthquake, the number of reposts grew as the number of anger-related words in posts increased. Anxiety- and typhoon-related posts from users with high numbers of followers negatively affected the number of reposts, whereas sadness-related posts had contrasting effects. These findings can help emergency managers formulate proper emotional response strategies after various natural calamities and help researchers test the abovementioned theories or models using real-word data from social media.  相似文献   

15.
浅析现代图书馆的危机管理   总被引:1,自引:0,他引:1  
胡庆连 《现代情报》2009,29(6):122-123,98
现代图书馆面临着水灾、火灾、种族冲突、治安管理等方面的危机,倘不认真应对,势必影响社会发展。应对此种种危机,有关部门需要以改革创新为龙头,树立危机意识,加强预测功能,及时沟通信息,完善后勤保障,把危机消除在萌芽之中。  相似文献   

16.
方正  杨洋  李蔚 《软科学》2011,25(11):73-77
通过实验研究,得出了最优应对策略。结果表明:(1)产品伤害危机类型对最优应对策略存在调节作用,在可辩解型中最优的是辩解策略,在不可辩解型中最优的是和解策略;(2)危机类型和企业声誉对应对策略具有调节作用。最后本文指出了研究局限。  相似文献   

17.
Online information intermediaries such as Facebook and Google are slowly replacing traditional media channels thereby partly becoming the gatekeepers of our society. To deal with the growing amount of information on the social web and the burden it brings on the average user, these gatekeepers recently started to introduce personalization features, algorithms that filter information per individual. In this paper we show that these online services that filter information are not merely algorithms. Humans not only affect the design of the algorithms, but they also can manually influence the filtering process even when the algorithm is operational. We further analyze filtering processes in detail, show how personalization connects to other filtering techniques, and show that both human and technical biases are present in today’s emergent gatekeepers. We use the existing literature on gatekeeping and search engine bias and provide a model of algorithmic gatekeeping.  相似文献   

18.
Information resources are becoming increasingly important to individuals and organizations, and ensuring their security is a major concern. While research in information security has adopted primarily a quantitative method to determine how and how much to invest in security, most decision makers rely on non-quantitative methods for this purpose, thereby introducing a considerable amount of as yet unexplained subjective judgment to the problem. We use a behavioral decision making approach to investigate factors causing possible inefficiencies of security spending decisions. Decision makers in our experiment performed a series of economic games featuring the key characteristics of a typical security problem. We found several biases in investment decisions. For budgeting their investment between major classes of security measures, decision makers demonstrated a strong bias toward investing in preventive measures rather than in detection and response measures, even though the task was designed to yield the same return on investment for both classes of measures. We term this phenomenon the “Prevention Bias.” Decision makers also reacted to security threats when the risk was so small that no investment was economically justified. For higher levels of risk that warranted some security investment, decision makers showed a strong tendency to overinvest. Theoretical and practical implications of the findings are discussed.  相似文献   

19.
《Research Policy》2022,51(1):104393
In this paper we draw a parallel between the insights developed within the framework of the current COVID-19 health crisis and the views and insights developed with respect to the long term environmental crisis, the implications for science, technology and innovation (STI) policy, Christopher Freeman analyzed already in the early 90′s. With at the time of writing, the COVID-19 pandemic entering in many countries a third wave with a very differentiated implementation path of vaccination across rich and poor countries, drawing such a parallel remains of course a relatively speculative exercise. Nevertheless, based on the available evidence of the first wave of the pandemic, we feel confident that some lessons from the current health crisis and its parallels with the long-term environmental crisis can be drawn. The COVID-19 pandemic has also been described as a “syndemic”: a term popular in medical anthropology which marries the concept of ‘synergy’ with ‘epidemic’ and provides conceptually an interesting background for these posthumous Freeman reflections on crises. The COVID-19 crisis affects citizens in very different and disproportionate ways. It results not only in rising structural inequalities among social groups and classes, but also among generations. In the paper, we focus on the growing inequality within two particular groups: youngsters and the impact of COVID-19 on learning and the organization of education; and as mirror picture, the elderly many of whom witnessed despite strict confinement in long-term care facilities, high mortality following the COVID-19 outbreak. From a Freeman perspective, these inequality consequences of the current COVID-19 health crisis call for new social STI policies: for a new “corona version” of inclusion versus exclusion.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号