Abstract
National security risk assessment is an indispensable key component of the national security system, serving as a foundation for national security decision-making, crisis prevention, and protection of national interests. While national security encompasses a broad spectrum of risks, including political, military, economic, technological, and social dimensions, this study focuses specifically on political security risk assessment as a case study within the broader framework of national security. Currently, there is no consensus on standardized requirements, processes, and methods for assessing national security risks. This study aims to develop a comprehensive national security risk assessment model, and the assessment path is explored from three dimensions: risk control processes, relationships among assessment factors, and the assessment model itself. To validate the model’s feasibility, we conduct an empirical study focusing specifically on China’s political security as one critical domain within the broader national security landscape. Using a game theory combination weighting method, risk indicator weights were determined, and political security risk assessment was calculated through the simulated annealing optimized projection pursuit evaluation method. The results indicate that China’s political security risk has generally declined, dropping from 76.39 in 2001 to 24.99 in 2022, with projections suggesting a continued decline to 11.00 by 2032. Among the five predictive models compared, the BP neural network model achieved the highest determination coefficient (R2 = 0.9967), demonstrating superior predictive performance. The proposed model provides a methodological framework that can be applied not only to political security but also adapted to other domains of national security, offering theoretical guidance and methodological support for comprehensive national security risk evaluation.
Similar content being viewed by others
Introduction
The world today is facing unprecedented changes in a century, and the complexity and challenges of national security are increasing (Wang et al., 2022). Since China proposed the holistic approach to national security in 2014, national security has expanded to include 20 areas, including political, military, territorial, economic, financial, cultural, social, technological, cyber, food, ecological, resource, nuclear, overseas interests, biological, space, deep sea, polar, artificial intelligence, and data security (Hou and Peng, 2023; Koren and Bukari, 2024; Niu et al., 2024; Perez et al., 2024; Schmidt, 2022; Wang et al., 2024a, 2024b). Within this comprehensive national security framework, political security holds a foundational position. In an era of increasing geopolitical complexity and security challenges, political security has emerged as a critical foundation of national security, as it directly affects the stability of state institutions, governance legitimacy, and national sovereignty (Nyman, 2023; Xu et al., 2024). Political security—encompassing the safety of a nation’s sovereignty, political system, political rights, political order, and ideology—is central to a nation’s survival and development. Threats to political security can undermine the nation’s foundation and trigger chain reactions across other security domains (Schilling et al., 2021). The stability of a nation’s political system directly influences its ability to address challenges in other security areas, making political security a critical component of the overall national security landscape.
In the field of national security research, establishing and improving risk assessment mechanisms are key elements in ensuring national security (Mennen and Van Tuyll, 2015). From a systems engineering perspective, security risk assessment, as a foundational task, not only needs to identify security requirements, assess design plans, and identify potential vulnerabilities but also address challenges arising from the increasing complexity and automation of technical systems (Angermeier et al., 2022; Landoll, 2021; Liu et al., 2012). National security risks are a complex and multidimensional issue, with globalization causing the nature and sources of national security risks to constantly evolve (Mara et al., 2022). Although significant theoretical advancements have been made in national security risk assessment, there is still a lack of consensus both domestically and internationally on standardized requirements, processes, and methods. Furthermore, existing national security risk assessment methods, while providing a scientific basis in theory, still face practical challenges, including a focus on specific areas (e.g., information security), integration of multidimensional risk factors, false alarm risks, and achieving method transparency (Blagden, 2018; Kuzminykh et al., 2021; Lidén, 2023; Vlek, 2013). They have not provided a comprehensive approach to understanding and responding to the ever-changing nature of national security risks. Especially in current risk assessment analysis, although probability assessments can quantify risks, there is still controversy in low-tolerance areas, making effective risk assessment increasingly important in complex decision-making processes (Heyerdahl, 2021).
To address this gap, this study constructs an integrated and standardized national security risk assessment model, with a particular focus on China’s political security as a case study. Building upon existing risk assessment theories, the proposed model systematically incorporates three key dimensions: the risk control process, the relationship among evaluation factors, and the assessment model itself. The model integrates elements such as risk control processes, evaluation indicators, and situation awareness, providing a holistic approach for analyzing, evaluating, and forecasting national security risks, offering practical solutions to enhance national security resilience. While our model is designed to be applicable across all security domains in national security, for the purposes of empirical validation, we have chosen to focus specifically on China’s political security as a case study. This selection allows us to demonstrate the model’s practical application in a domain that has significant implications for overall national security. The insights gained from this political security case study can inform the application of the model to other security domains within the comprehensive national security framework.
We summarize our core contributions: (i) Theoretically, it improves the mechanism and method of national security risk assessment, providing a structured and comprehensive framework that meets the demands of modern security challenges. (ii) Practically, through an empirical analysis of China’s political security, the feasibility of the model is verified, offering actionable insights for policymakers. While this study focuses specifically on political security as a case study, the proposed model provides a methodological framework that can be adapted to other domains of national security, offering theoretical guidance and methodological support for comprehensive national security risk evaluation. By bridging theoretical gaps and addressing practical challenges, this study provides a novel framework for understanding and assessing political security risks. Furthermore, through this research, we aim to promote the understanding and implementation of national security risk assessments, foster high-quality development, and enhance the country’s resilience in an increasingly complex global environment.
Literature review
Related concepts of national security risk assessment
National security risk assessment is an integration of the definitions and connotations of related concepts such as “security,” “national security,” “risk,” and “national security risk.” Security refers to the absence or minimal presence of threats objectively and the absence or minimal sense of fear subjectively. It is the primary prerequisite for human survival and the basic guarantee for national development. The National Security Law of the People’s Republic of China clearly states: National security refers to a state where the national regime, sovereignty, unity, and territorial integrity, the well-being of the people, sustainable economic and social development, and other significant national interests are relatively free from danger and threats from both within and outside, as well as the capability to ensure a continuous state of security. The concept of national security is rich in content. It not only refers to the state of security but also includes the capability of the nation to maintain such a state of security. The International Organization for Standardization (ISO) in its Risk Management Guidelines (ISO 31000:2018) mentions that risk is the effect of uncertainty on objectives, and it is a comprehensive measure of the likelihood and consequence of loss (Rezvani et al., 2022).
By integrating the definitions of national security and risk, and referring to the ISO standard Risk Management—Risk Assessment Techniques (ISO/IEC 31010:2019) (Berov et al., 2024), national security risk can be defined as various internal and external factors (security threats) that pose a threat to the country’s vital interests (assets), as well as inherent security vulnerabilities (weaknesses) within the nation itself. Under certain conditions, these factors may endanger the country’s survival and development, necessitating the implementation of corresponding security measures for mitigation and control. In essence, national security risk is a comprehensive risk composed of four interrelated dimensions: significant national interests, national security threats, national security vulnerabilities, and national security measures. Significant national interests represent the core values and strategic resources that require protection. National security threats manifest as various internal and external challenges that could jeopardize national security. National security vulnerabilities refer to inherent security weaknesses and deficiencies within the national system. National security measures encompass various protective, monitoring, and response strategies implemented to prevent and address risks. These four dimensions are interconnected and interact dynamically, collectively determining the nature, severity, and evolution of national security risks. National security risk assessment is based on these four dimensions, aiming to identify risk sources, analyze influencing factors, and develop effective control strategies to safeguard national security and promote stable development. Accordingly, the national security risk assessment model studied in this paper is a comprehensive framework designed to identify, analyze, and evaluate various security risks faced by the nation. This model integrates key risk assessment elements—including national interests, threats, vulnerabilities, and protective measures—into a systematic framework. By incorporating risk control processes, assessment indicators, and situational awareness, the model provides a holistic approach for analyzing, evaluating, and forecasting national security risks.
Current research on national security risk assessment
Since the founding of the People’s Republic of China, the historical evolution of China’s national security concept has primarily gone through four stages: focusing on military security, comprehensive security, a new type of security concept centered on mutual trust, mutual benefit, equality, and cooperation, and the holistic approach to national security (Ji, 2016). The holistic approach to national security proposed by the 18th National Congress of the Communist Party of China is the basic policy and guiding principle for national security work in the new era, providing a fundamental basis and action plan for our national security work in the new era. Accordingly, with the needs of the international situation and domestic development, China’s national security departments and institutions have been continuously established: such as the Ministry of State Security established in 1983, the National Bureau of Secrets specifically set up by the State Council in 1988, the Central National Security Commission and the National Counter-terrorism Leadership Group established in 2013, the Central Cyberspace Security and Informatization Leading Group established in 2014, and the Emergency Management Department established in 2018. Among these, the Central National Security Commission has improved the national security system and national security strategy, becoming the highest decision-making body for national security work in China. At the same time, in order to better promote national security risk assessment and maintain national security, China has also issued a series of laws, regulations, and national strategic guidelines: the “National Security Law of the People’s Republic of China” passed by the 15th Meeting of the Standing Committee of the Twelfth National People’s Congress in July 2015, which clarifies national security tasks in 11 areas such as politics, territorial, military, cultural, and technological, and specifically provides for national security risk prevention, assessment, and early warning systems in Chapter IV “National Security System”. In addition to this, there are legal provisions related to national security such as the “Anti-Secession Law” (2005), the “Food Security Law” (2009), the “Counter Espionage Law” (2014), the “Counter Terrorism Law” (2015), the “Cybersecurity Law” (2016), the “National Intelligence Law” (2017), the “Nuclear Security Law” (2017), the “Cryptographic Law” (2019), the “Biosecurity Law” (2020), the “Regulations on the Work of Counter Espionage Security” (2021), and the “Foreign Relations Law” (2023). In terms of national strategic guidelines, since the founding of the People’s Republic of China, the term “national security strategy” was not mentioned until January 2015, under the guidance of the holistic approach to national security, the Political Bureau of the CPC Central Committee adopted the “National Security Strategy Outline,” which is the first comprehensive national security strategy since the founding of the People’s Republic of China and is an urgent need to effectively maintain national security, indicating that China has begun to address the relationship between national security and national development from the perspective of national grand strategy(Goldstein, 2020; Hu, 2016; Liu, 2016; Özdemir and Karagül, 2024). Subsequently, the “Opinions on Strengthening National Security Work” passed in December 2016, the “National Security Strategy (2021–2025)” reviewed in November 2021, and the “Opinions on Accelerating the Construction of a National Security Risk Monitoring and Early Warning System” reviewed at the first meeting of the 20th Central National Security Commission on May 30, 2023, all aim to more accurately grasp the historical position and the situation and tasks facing China’s national security, and to recognize the importance of strengthening national security work.
The United States has been committed to further improving its national security risk assessment system to better respond to complex security environments and evolving security threats and challenges. National security risk assessment is an important foundation for the formulation and implementation of U.S. national security policy, such as the “National Security Strategy Report” issued by the U.S. government annually, the “Global Threat Assessment” report published by the U.S (Ihemeson, 2024; Newmann and Christiansen, 2023). The National Intelligence Council, each year, and the “National Cybersecurity Strategy” issued by the U.S. Office of the National Cyber Director. Following the September 11, 2001, terrorist attacks, the U.S. government began to focus on major emergencies such as terrorism and natural disasters, establishing the Department of Homeland Security and releasing the Homeland Security Alert System (in 2002), the National Terrorism Advisory System (in 2011), and the NTAS Bulletin (in 2015) to assess and warn of the risks of terrorism. EU institutions and government departments of other countries also actively carry out national security risk assessment research. The European Commission has released the “EU Internal Security Strategy” and the “EU External Security Strategy” to assess and analyze the security situation within and around the EU. The UK established the National Security Council, the highest national security decision-making and strategic planning body, in 2010, and has developed detailed national security strategy reports. Germany also formulated and released its first “National Security Strategy” on June 14, 2023, mainly addressing all internal and external threats to German security in areas such as defense and military, cyberattacks, critical infrastructure attacks, flood disasters, and climate change. South Korea’s 2023 edition of the “National Security Strategy,” released on June 8, 2023, lists North Korea’s nuclear threat and weapons of mass destruction as the biggest current challenges to South Korean national security. Israel’s “Technical Intelligence Agency,” an important department of the Military Intelligence Directorate, and the Australian Government’s Australian Security Intelligence Organization aim to protect national security and interests, prevent and combat various security threats and risks (AlDaajeh et al., 2022; Eichensehr and Hwang, 2023; Kamp, 2023; Kim, 2023; Levi and Agmon, 2021).
Related risk assessment standards
The existing risk assessment research frameworks are relatively rich and mature, with corresponding international and national standards established for various fields (Kretschmer et al., 2022; Wand et al., 2021). Internationally, the more commonly used risk assessment standards include the ISO risk management family of standards, which consists of four formal standards: “Risk Management—Vocabulary” (ISO Guide 73:2009), “Risk Management—Guidelines” (ISO 31000:2018), “Risk Management—Risk Assessment Techniques” (ISO/IEC 31010:2019), and “Risk Management—Guidance on the Implementation of ISO 31000” (ISO/TR 31004:2013), providing a unified and comprehensive solution for conducting risk management work. Additionally, to reduce the risk of information security vulnerabilities, the ISO has also released “Information Technology—Security Techniques—Information Security Risk Management” (ISO/IEC 27005:2018) for risk assessment in the information security field (Breda and Kiss, 2020). In China, since the establishment of the National Risk Management Standardization Technical Committee (SAC/TC310) in 2007, national standards on risk management and risk assessment techniques have been developed, including “Risk Management—Vocabulary” (GB/T 23694-2024), “Risk Management—Guidelines” (GB/T 24353-2022), and “Risk Management—Risk Assessment Techniques” (GB/T 27921-2023). For information security risk assessment, standards such as “Information Security Technology—Information Security Risk Assessment Methods” (GB/T 20984-2022), “Information Security Technology—Information Security Risk Management Implementation Guide” (GB/T 24364-2023), and “Information Security Technology—Information Security Risk Assessment Implementation Guide” (GB/T 31509-2015) have been established. Moreover, corresponding national standards have also been developed for public security, food security, ecological security, biosecurity, and fire risk assessment, among other fields (Chen et al., 2021; Diana et al., 2020; Schleifer and Sun, 2020; Zeng et al., 2022).
In summary, current research on national security and its risk assessment has made some progress, but there is a need for continuous exploration and improvement. There is no consensus on the requirements, processes, and methods for assessing national security risks, either domestically or internationally, and there are no unified international or national standards. Therefore, there is an urgent need to carry out national security risk assessment work, to standardize the mechanisms and methods for national security risk assessment. This study aims to propose ideas, work processes, and assessment content for national security risk assessment, and to conduct empirical research using national political security as a case study, providing theoretical guidance and methodological support for the practice of national security risk assessment.
Research path of national security risk assessment
National security risk control process
National security risk assessment is a comprehensive process that includes the definition, analysis, evaluation, and control of national security risks. It measures the vulnerabilities, threat levels, and response measures of national security by analyzing and evaluating the security vulnerabilities, threats, and factors affecting a nation’s survival, development, and interests. The national security risk control process should be centered on the national overall security objectives, from formulating national security strategies, to determining national security risk assessment methods, implementing national security risk assessments, identifying national security needs, and selecting national security risk control measures, ultimately verifying the effectiveness of national security measures. By following a cycle of six stages, national security departments can systematically identify and assess potential national security risks to achieve the goal of ensuring national security (Bolbot et al., 2023; Landoll, 2021). By referring to common risk control processes internationally, the entire control process for national security risks can be outlined as shown in Fig. 1.
As can be seen from Fig. 1, the national security risk control process includes the following six stages: (i) Formulating national security strategies: As the first stage of the national security risk control process, this is a crucial step in ensuring national security. National security departments need to conduct a comprehensive assessment of the national security risks, clarify the national overall security objectives and strategic direction based on relevant laws, regulations, national security tasks, and missions, and formulate corresponding national security strategies. (ii) Determining national security risk assessment methods: National security departments need to select appropriate national security risk assessment methods based on the stage and scale of national security system construction, to identify threats, vulnerabilities, and potential risks facing national security, and evaluate the applicability of the risk assessment methods. (iii) Implementing national security risk assessment: National security departments need to use the national security risk assessment methods determined in the previous stage to analyze and identify threats, vulnerabilities, and potential risks that may affect national security, and conduct national security risk assessments based on the risk assessment elements. (iv) Identifying national security needs: National security departments need to combine relevant laws, regulations, national security tasks, missions, and risk assessment results with the national overall security objectives to determine the key national security needs and priority areas, and provide a national security risk needs report. (v) Choosing national security risk control measures: National security departments need to consider the costs, effects, and feasibility of national security risk control measures from the aspects of national security needs, technical limitations, and resource limitations, and choose appropriate risk control measures to mitigate or eliminate identified national security risks, resulting in an effective national security risk management plan. (vi) Verifying the effectiveness of national security measures: National security departments need to monitor, analyze, and evaluate the implementation effects of national security needs and measures to verify whether the selected national security risk control measures have been effectively implemented and whether they have effectively reduced national security risks, to ensure the effectiveness and sustainability of national security measures.
Relationships of national security risk assessment elements
According to the national standard for information security risk assessment, the basic elements of risk assessment are assets, threats, vulnerabilities, and security measures (Ganin et al., 2020; Landoll, 2021). These elements are fundamental and crucial for risk assessment because they can comprehensively and accurately reflect the formation mechanism, influencing factors, and control methods of security risks. In the context of national security risk assessment, as defined in the National Security Law, the ultimate goal of national security is to safeguard significant national interests and ensure that the nation can survive and develop amid various threats and vulnerabilities. Therefore, “assets” correspond to the significant national interests that the nation seeks to protect, “threats” represent the internal and external threats to national security, “vulnerabilities” are the security flaws within the nation, and “security measures” are the various means and measures taken to maintain significant national interests. Figure 2 illustrates the relationships among these elements in national security risk assessment.
In Fig. 2, the elliptical sections represent the four basic elements of national security risk assessment: significant national interests, national security threats, national security vulnerabilities, and national security measures. The arrows indicate the relationships among the basic elements. (i) Significant national interests are the object, starting point, and ultimate goal of national security risk assessment. Only by clearly defining the significant national interests that need protection can the scope and objectives of the risk assessment be determined, as well as the value and importance of these interests. (ii) National security threats are the motivation and core of national security risk assessment. Only by identifying threats that may harm significant national interests can the sources, motivations, capabilities, likelihoods, and severity of the threats, as well as the impacts they cause, be analyzed. (iii) National security vulnerabilities are the conditions and key to national security risk assessment. Only by identifying vulnerabilities or defects in significant national interests when defending against threats can the risk levels, resilience, and improvement measures of these interests be assessed. (iv) National security measures are the means and results of national security risk assessment. Only by taking effective technical, management, or legal measures to protect significant national interests can the threats to national security and the vulnerabilities be reduced, thus lowering the level of national security risks.
Construction of a national security risk assessment model
In conducting research on national security risk assessment, it is important to note that the risk assessment process is not a sequential completion of assessment indicators but a comprehensive processing of all indicators simultaneously based on their importance. Therefore, the selection of assessment indicators, the determination of indicator weights, and the appropriate assessment model are critical in constructing the national security risk assessment model. When researching and applying risk assessment models, it is essential to always maintain the feasibility and scientificity of these three aspects. At the same time, based on the above three aspects, national security risk situation awareness can be achieved to predict and provide early warning for future national security risks, providing important reference information for decision-makers and better safeguarding national security.
Construction of assessment indicator system
The holistic approach to national security in China covers 20 areas of security, including politics, military, territory, economy, finance, culture, society, technology, cyberspace, food, ecology, resources, nuclear, overseas interests, biology, space, deep sea, polar regions, artificial intelligence, and data. When constructing the national security risk assessment indicator system, it is necessary to focus on the 20 security fields and start from four aspects: national security threats, national security vulnerabilities, significant national interests, and national security measures. By following principles such as comprehensiveness, scientificity, systematicness, standardization, and operability, the indicators for each field’s security risks can be selected to establish a comprehensive and scientific national security risk assessment indicator system. Due to the characteristics of multi-source, heterogeneous, large-scale, and dynamic changes in the data related to national security risks, it is necessary to obtain the original data of indicators from various official websites, statistical bureaus, and statistical yearbooks, as well as extract potential events, behaviors, trends affecting national security from text, images, videos, and other multi-source, heterogeneous data. After removing redundancy, organizing, and processing related elements through technical means, quantitative indicators can be formed into a national security risk situation data information database. Furthermore, as society continues to develop, science and technology advance rapidly, and the global political landscape changes rapidly, China’s internal and external environment and risk challenges are also changing. The connotation of the holistic approach to national security will also continue to expand, requiring continuous dynamic adjustments to adapt to the changing security threats and challenges, thus better ensuring national security. Therefore, the national security risk assessment indicator system will also need to be adjusted in line with the changes in the connotation of the holistic approach to national security.
Construction of the assessment model
Before conducting a risk assessment, it is necessary to determine the weights of the assessment indicators. Currently, the methods for determining the weights of risk assessment indicators are mainly divided into subjective weighting methods and objective weighting methods. When applied, subjective weighting methods such as the Delphi method and analytic hierarchy process are often used, or objective weighting methods such as the entropy weighting (EW) method and CRITIC method are used. Even when combining subjective and objective weighting methods, the integration of weights is often done simply through addition or multiplication, and the subjective factors in the subjective and objective weighting coefficients remain significant. Therefore, this study can use game theory or moment estimation theory to integrate the subjective and objective weighting methods and obtain a comprehensive weight, thereby avoiding the excessive subjectivity or objectivity of single weighting methods and improving the scientificity and rationality of the weighting of assessment indicators. In the study of risk assessment models, researchers at home and abroad have commonly used methods such as the analytic hierarchy process, fuzzy comprehensive evaluation, EW method, TOPSIS method, principal component analysis, grey relational analysis, and projection pursuit method (Xu et al., 2024). Therefore, this study can combine intelligent optimization algorithms, such as the simulated annealing algorithm, with the projection pursuit method to improve the assessment effect of the model and achieve the assessment of national security risks.
Construction of the situation awareness model
The concept of situation awareness was first proposed by Endsley in 1988 and has since been applied to national competitive intelligence, military warfare, cybersecurity, major emergencies, and government crisis decision-making in national security scenarios (Endsley, 2021; Yang et al., 2023). Applying the concept of situation awareness to national security risk assessment, national security risk situation awareness refers to the analysis and assessment of the current state of national security risks by understanding and obtaining all environmental elements that may lead to changes in the national security risk situation. It also includes predicting the future trends of the national security risk situation. Specifically, national security risk situation awareness includes three sub-models: national security risk situation element acquisition, national security risk situation assessment, and national security risk situation prediction. (i) The sub-model for acquiring national security risk situation elements is the foundational work for achieving national security risk assessment. Its main function is to identify and obtain relevant situation elements from various data sources. The national security risk assessment indicator system constructed in the previous section can form a national security risk situation data information database. Situation assessment is the core of situation awareness, so the sub-model for national security risk situation assessment is the key and core part of the national security risk assessment situation awareness model. Its main function is to integrate and analyze the situation elements identified by the sub-model for acquiring national security risk situation elements. The determination of indicator weights and the construction of assessment models in the previous section are two important steps in the sub-model for national security risk situation assessment. (ii) By mining, analyzing, and modeling the national security risk data information database, the sub-model for national security risk situation assessment can discover patterns and trends, analyze and judge the likelihood, severity, and coping ability of national security risks, and form a deep understanding and assessment of the national security risk situation. This provides important support for the subsequent sub-model for national security risk situation prediction. (iii) Situation prediction is the highest-level requirement of situation awareness. Therefore, the sub-model for national security risk situation prediction is an important part of the national security risk assessment situation awareness model. National security risk situation prediction is based on a full understanding of the national security environment information and activity patterns, combined with the situation elements obtained in the previous stage and the situation assessment model constructed. It predicts and provides early warning for the future national security risk situation. The sub-model for national security risk situation prediction is an important part of the national security risk assessment situation awareness model. National security risk situation prediction can use mathematical models such as linear regression, grey prediction, time series prediction, and neural network prediction. By analyzing and researching the national security risk data information database, it can predict and provide early warning for the national security risk situation that may occur in the future, providing important reference information for decision-makers. It can also take proactive measures to reduce national security risks and protect national interests, thus better maintaining national security.
Methodology
Game theory combination weighting model
Considering the subjective irrelevance of national political security risks, the inherent relationship of the indicators to be assessed, and the weight gradient over time, this study first uses the analytical hierarchy process (AHP) to calculate the subjective weights of the political security risk indicators. Then, the EW method is employed to calculate the objective weights. Finally, the game theory combination weighting (GTCW) model is utilized to integrate the subjective and objective weights to obtain a comprehensive weight. This approach avoids the excessive subjectivity or objectivity of single weighting methods, thereby improving the scientificity and rationality of the indicator weight assignment.
Analytical hierarchy process
The AHP is a method for subjectively and statistically analyzing the hierarchical nature (Cranmer et al., 2021). It divides the important decision factors into three layers: the goal layer, the criteria layer, and the scheme layer. It determines the benefits and drawbacks of the decision-making scheme based on the experienced judgment of decision-makers. This is the foundation for qualitative and quantitative analysis. The specific procedure is as follows: (i) Build a hierarchy model. (ii) Construct a judgment matrix A. (iii) Hierarchical ranking and testing for consistency. (iv) Hierarchical general ranking and consistency testing.
Entropy weighting method
Information entropy is a measure of information uncertainty. The EW method is a weighting method that generates the indicator weight coefficient based on the effect of each indicator’s relative change degree on the overall system (Xu, 2023). The specific procedure is as follows: (i) Construct a decision matrix X. (ii) Indicator standardization: homogeneity of diverse indicators. (iii) Calculate the characteristic proportion of i evaluation object under indicator j. (iv) Determine the entropy value of indication j. (v) Calculate the coefficient of variation in indicator j. (vi) Determine the weight coefficient of indication j.
Game theory combination weighting model
GTCW model is widely used in system evaluation. To seek the optimal solution for the overall interests of the target system, game theory assumes that each plan is a rational decision outcome, and the final result is achieved collectively by all decision-makers (Zhao, 2024). Let \({{\bf{w}}}_{i}(i=1,2)\) be the weight vectors obtained from the ORA method and the EW method, respectively. An arbitrary linear combination of the two weight vectors is denoted as \({\bf{w}}={\sum }_{i=1}^{2}{\alpha }_{i}{{\bf{w}}}_{i}^{{\rm{T}}}({\alpha }_{i} > 0)\), where \({\alpha }_{i}\) is the linear combination coefficient of the weight vectors. By optimizing \({\alpha }_{i}\), we minimize the deviation between w and \({{\bf{w}}}_{i}\), as follows:
According to the differential properties of matrices, the optimal first-order derivative of the equation is derived as:
From Eq. (2), the optimal weight coefficient \(({\alpha }_{1},{\alpha }_{2})\) are obtained, and after normalization, the optimal distribution ratio coefficient of the weight is \(({\alpha }_{1}^{\ast },{\alpha }_{2}^{\ast })\). Through Eq. (3), the optimal combined weight can be calculated.
Simulated annealing optimization projection pursuit evaluation model
Projection pursuit evaluation method is an effective statistical method for handling multi-factor complex problems. The main idea is to project high-dimensional data into a lower-dimensional space according to a certain combination, and by determining the optimal projection value, the evaluation value becomes more meaningful. This paper combines the simulated annealing algorithm with the projection pursuit evaluation method to establish a simulated annealing optimization projection pursuit evaluation (SAO-PPE) model (Xu, 2025), with the main steps as follows: (i) Standardize the indicator data. (ii) Construct the linear projection of the evaluation object in the low-dimensional space. (iii) Construct the indicator function of the projection. (iv) Optimize the projection direction using the SA algorithm. (v) Calculate the comprehensive evaluation value. The objective function of the SAO-PPE model is
where \({S}_{Z}\) is the sample standard deviation of the projection eigenvalues, with a larger value indicating a more uniform distribution of the sample data. \({D}_{Z}\) is the local density of the projection eigenvalues. The value of the local density window radius R depends on the structure of the sample data. \({r}_{ij}\) is the distance between the projection eigenvalues. \(I(R-{r}_{ij})\) is the unit step function.
The specific optimization process of the SA algorithm is as follows: (i) Calculate \({S}_{Z}\) and \({D}_{Z}\) according to Eq. (5) to serve as the optimal initial point of the model. (ii) Calculate the objective function value according to Eq. (4). (iii) Set the initial temperature \({T}_{0}=100\) and the number of iterations \(L=100\). (iv) Generate new points near \({S}_{Z}\) and \({D}_{Z}\) randomly, calculate their objective function values and the increments \(\Delta\). (v) If \(\Delta < 0\), accept the current point as the optimal point, otherwise, with a probability of \(P={e}^{(-\Delta /{T}_{0})}\), select a new point as the optimal point.
Security risk situation prediction model
This paper employs five prediction models, including regression prediction (RP), grey prediction, triple exponential smoothing (TES), time series prediction, and neural network prediction. By conducting a comparative analysis of the effectiveness of these five models, the model with the best performance is ultimately selected to predict the development situation of political security risks in China.
Regression prediction model
RP is a statistical technique that estimates the future values of a dependent variable based on its historical relationship with one or more independent variables. By analyzing past data, a regression model is formulated, which can then be used to forecast outcomes under new conditions. Commonly applied in various fields, such as economics, finance, and social sciences, it helps in understanding the impact of predictors on the response variable, facilitating data-driven decision-making. The strength of the prediction depends on the model’s fit, the relevance of the independent variables, and the assumption that the historical pattern will continue.
Grey prediction model
The grey prediction model is a forecasting method based on grey system theory, suitable for data prediction with small samples and uncertain information. By generating and processing partial known information, it establishes a differential equation model to predict the future behavior of the system. Grey prediction models are particularly useful for short-term forecasting of time series data in fields like economics, environment, and technology (Wang et al., 2024a, 2024b). The core of this model is transforming the original data with strong randomness into generated data with strong regularity through the processes of accumulated generating operation and inverse accumulated generating operation, thereby improving the accuracy of predictions.
Triple exponential smoothing method
TES, also known as the Holt–Winters method, considers the trend and seasonal factors of past observations through a weighted average for prediction. This method builds upon simple and double exponential smoothing by incorporating the handling of seasonal components, making it suitable for data with significant seasonal fluctuations. TES consists of three smoothing equations: one for the level component, one for the trend component, and another for the seasonal component. The method adjusts smoothing parameters to balance the weights of historical data, aiming to reduce forecasting errors.
Time series prediction model
Time series prediction models are statistical models used to analyze and predict data points arranged in chronological order. These models assume that future values can be predicted by the patterns of past values, typically considering time-dependent features such as trends, seasonality, and cyclical patterns (Pereira da Veiga et al., 2024). Common models include Autoregressive, Moving Average, Autoregressive Moving Average, and Seasonal ARIMA. Time series prediction has wide applications in financial market analysis, weather forecasting, sales forecasting, and more, helping to uncover the underlying patterns in data and support decision-making.
Neural network prediction model
Neural network prediction models are forecasting techniques based on artificial intelligence that mimic the working principle of the human brain’s neurons to process and analyze data (Jiang et al., 2024). These models are constructed with multiple layers of nodes (or neurons), where each node performs simple computational tasks and processes input signals through weights and activation functions. Neural networks can learn complex patterns and relationships from data, making them suitable for various nonlinear forecasting problems. By learning from training datasets, neural networks adjust internal parameters to minimize prediction errors. They excel in fields such as financial market forecasting, speech recognition, and image processing.
Empirical study: political security risk assessment in China
National security is a complex, multi-layered, multi-domain, and multi-type grand system. Existing research indicates that political security serves as the foundation and core of national security (D’Amato et al., 2022; Wæver, 2011). The security of a nation’s sovereignty, political system, rights, order, and ideology is central to its survival and development. Threats to political security can undermine the nation’s foundation and trigger a chain reaction across other security domains. As the cornerstone of maintaining national interests and overall security, ensuring political security is of paramount importance. Therefore, this study takes national political security in China as an example to conduct an empirical analysis of the constructed national security risk assessment model, verifying its feasibility and effectiveness. It should be noted that the national security risk assessment model proposed in this study is designed to be applicable across all security domains within the comprehensive national security framework. However, to demonstrate its practical application and validate its effectiveness, we focus on China’s political security as a case study. The methodology outlined above illustrates how the model can be applied to political security risk assessment, but the same methodological framework can be adapted to other security domains by adjusting the specific indicators while maintaining the same structural approach.
Indicator construction
Political security encompasses the objective state of a country’s sovereignty, political system, political rights, political order, and ideology not being threatened, infringed upon, or destroyed. It is related to the overall security of a country. Through extensive literature research, based on existing research on national political security risk assessment, this paper starts from four aspects: political security threats, political security vulnerabilities, political security interests, and political security measures (Abdullah et al., 2020; Hagmann and Cavelty, 2012; Henisz et al., 2010; Kośmider, 2021; Wolford and Ritter, 2016). Adhering to principles such as systematicness, scientificity, and operability, the national political security risk assessment indicator system is constructed and listed in Table 1.
Data source
Based on the principles of scientificity, rationality, and accessibility, this study selects the period from 2001 to 2022 as the research time frame. The primary data sources include the World Governance Indicators (http://info.worldbank.org/governance/wgi/#home), the International Country Risk Guide (https://epub.prsgroup.com/products/international-country-risk-guide-icrg), the Geopolitical Risk Index (GRI, https://www.matteoiacoviello.com/gpr.htm), the Positive Peace Index (PPI, https://www.visionofhumanity.org/maps/positive-peace-index/#/), the Corruption Perceptions Index (CPI, https://countryeconomy.com/government/corruption-perceptions-index), the Global Terrorism Index (GTI, https://www.visionofhumanity.org/maps/global-terrorism-index/#/), the Fragile States Index (https://fragilestatesindex.org/), the Edelman Trust Barometer (https://www.edelman.com/trust/archive), the Trading Economics (https://tradingeconomics.com/country-list/rating), and the Database of Political Institutions (https://datacatalog.worldbank.org/search/dataset/0039819). For missing data in some years, methods such as cubic linear interpolation and linear extrapolation are employed to supplement the data. Additionally, the range normalization method is used to eliminate the impact of dimensionality for each indicator, converting the values into the range of 0–1.
Optimal weighting results
This paper employs the GTCW model to integrate the weights obtained from the AHP method and the EW method, resulting in the comprehensive weights, which are shown in Fig. 3.
Figure 3a–d displays the radar charts of the secondary indicator weights for political security threats, political security vulnerabilities, political security interests, and political security measures, respectively. The weight ranking of China’s primary political security risk indicators is as follows: political security interests (0.3303), political security vulnerabilities (0.2655), political security threats (0.2279), and political security measures (0.1763). Among the 22 secondary indicators, the weight of political stability (I14, 0.1016) is the highest, indicating that political stability has the greatest impact on China’s political security risk. The higher a country’s political stability, the more secure its sovereignty, government, system, and ideology are, meaning its economic development, social order, and citizens’ living and working environment are relatively stable, which in turn lowers the political security risk. Therefore, political stability is the cornerstone of ensuring national political security. A country with high political stability can effectively safeguard its dignity and core national interests, maintain political unity and social order, resist external interference and subversion, prevent internal unrest and division, and promote the healthy and orderly development of its economy and society.
Assessment results of China’s political security risk
This study applied the SAO-PPE model to assess China’s political security risks from 2001 to 2022, with the results shown in Fig. 4.
As depicted in Fig. 4, the political security risk assessment index for China from 2001 to 2022, along with the risks associated with political security threats, vulnerabilities, interests, and measures, all show certain fluctuations but generally demonstrate a decreasing trend year by year. Specifically, China’s political security risk decreased from 76.39 in 2001 to 24.99 in 2022. (i) Regarding political security threat risks, although China faces challenges such as the U.S. containment and suppression and the increasing complexity of regional hotspot issues, leading to cyclical fluctuations in China’s GRI and a slow overall upward trend, in recent years, China has made significant progress in participating in international affairs, conducting counter-terrorism and anti-separatism efforts, advancing the Belt and Road Initiative, and maintaining multilateralism. Consequently, the GTI, the degree of friendly relations with neighboring countries, external conflicts, and foreign interventions have all decreased year by year, reducing political security threat risks. (ii) In terms of political security vulnerability risks, China’s CPI has risen from 35 points in 2001 to 45 points in 2022, indicating some success in the anti-corruption efforts. Improvements in information quality, reductions in indices such as group grievance, gender inequality, public sector theft, and the fragile state index all reflect the increased stability of the Chinese government and its enhanced governance capabilities, which have lowered political security vulnerability risks. (iii) Concerning political security interest risks, China has increased government transparency and integrity through measures such as strengthening the anti-corruption campaign and improving people’s well-being. Public trust in the government has risen from 63 points in 2001 to 89 points in 2022. Additionally, government efficiency and the rule of law have shown a consistent upward trend, while government stability, citizen participation, and the global peace index have remained relatively stable, leading to fluctuating but overall declining political security interest risks. (iv) As for political security measures risks, China’s government credit rating, regulatory quality, and corruption control from 2001 to 2022 show fluctuations with a steady upward trend. This demonstrates the improvement of government credibility, the enhancement of regulatory frameworks, and the increased intensity of the anti-corruption campaign in recent years. Moreover, the positive peace index (PPI) has steadily declined, indicating that China’s political stability has been maintained and is increasingly resilient to internal and external shocks, thereby reducing political security measures risks.
Prediction results of China’s political security risk situation
This paper employs five prediction models to forecast the development situation of China’s political security risks. Based on Fig. 4, which shows the yearly trend of China’s political security risks, a linear function prediction is chosen for the RP model; the grey prediction selects the first-order differential equation GM(1,1) model; the weighted coefficients in the TES method are set to 0.5, 0.5, and 0.3, respectively; the time series model chooses the ARIMA(4,1,3) model for prediction; and the neural network prediction selects the BP neural network (BPNN) model with a network structure of 1-4-1. Simultaneously, this paper compares and evaluates the predictive performance of these five models through metrics such as Mean Square Error (MSE), Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Mean Absolute Percentage Error (MAPE), Symmetric Mean Absolute Percentage Error (SMAPE), Sum of Squared Errors (SSE), and Coefficient of Determination (R2). Among these, except for R2 where values closer to 1 indicate better prediction performance, lower values for the remaining six metrics suggest better prediction effects. The model results are shown in Table 2 and Fig. 5.
As shown in Table 2, by comparing the values of six evaluation metrics across different models, it is evident that among the five prediction models, the BPNN model significantly outperforms the other four models in all six evaluation metrics, with an R2 value reaching 0.9967, indicating the best predictive performance. Therefore, this study selects the BP neural network to forecast China’s political security risk trends for the next 10 years, with the forecast values for 2023–2032 shown in Fig. 5. The figure reveals that over the next decade, China’s political security risk level will continue the trend of fluctuations and a year-on-year decrease observed in the previous period, with the downward trend slowing down. By 2032, the political security risk is expected to drop to 11.00. These results demonstrate that the BP neural network prediction model aligns with the actual situation and can be applied in predicting national political security risks, as well as extended to national security risk assessment studies under the holistic approach to national security.
Conclusion
The world today is facing a major transformation that has not been seen in a century. In response to the complex and severe national security situation, and to accelerate the modernization of the national security system and capabilities, there is an urgent need to explore more forward-looking, standardized, and systematic research on national security risk assessment. National security risk assessment plays a crucial role in national security decision-making, crisis prevention and resolution, and the protection of national interests across multiple security domains.
This paper delves into the research path of national security risk assessment from three aspects: the national security risk control process, the relationship between assessment elements, and the assessment model. While our model is designed to be applicable across all security domains, we have demonstrated its application through a case study of political security in China, which serves as a foundational element of the broader national security framework. The empirical analysis of China’s political security validates the model’s feasibility and effectiveness, showing that China’s political security risk decreased from 76.39 in 2001 to 24.99 in 2022, with projections suggesting a continued decline to 11.00 by 2032. This case study demonstrates how the model can be applied to specific security domains while maintaining its broader applicability to the comprehensive national security framework. The national security risk assessment model proposed in this study can be extended beyond political security to other domains such as military, economic, technological, social, and environmental security. By adjusting the specific indicators while maintaining the same methodological framework, the model provides a versatile tool for comprehensive national security risk assessment. This flexibility is particularly valuable given the interconnected nature of different security domains and the need for an integrated approach to national security.
Data availability
Data will be made available on request.
References
Abdullah, Wang QS, Awan MA, Ashraf J (2020) The impact of political risk and institutions on food security. Curr Res Nutr Food Sci 8(3):924–941. https://doi.org/10.12944/CRNFSJ.8.3.21
AlDaajeh S, Saleous H, Alrabaee S, Barka E, Breitinger F, Choo KKR (2022) The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput Secur 119:102754. https://doi.org/10.1016/j.cose.2022.102754
Angermeier D, Wester H, Beilke K, Hansch G, Eichler J (2022) Security risk assessments: modeling and risk level propagation. ACM Trans Cyber Phys Syst 7:1–25. https://doi.org/10.1145/3569458
Berov B, Frantzova A, Ivanov P, Dobrev N, Krastanov M, Nankin R (2024) Risk assessment of landslides: Low probability scenario for the town of Kavarna, northern Black Sea coast of Bulgaria. J Bulg Geogr Soc 50:129–148. https://doi.org/10.3897/jbgs.e116695
Blagden D (2018) The flawed promise of National Security Risk Assessment: nine lessons from the British approach. Intell Natl Secur 33:716–736. https://doi.org/10.1080/02684527.2018.1449366
Bolbot V, Theotokatos G, Wennersberg LA, Faivre J, Vassalos D, Boulougouris E, Van Coillie A (2023) A novel risk assessment process: application to an autonomous inland waterways ship. Proc Inst Mech Eng Part O J Risk Reliab 237(2):436–458. https://doi.org/10.1177/1748006X2110518
Breda G, Kiss M (2020) Overview of information security standards in the field of special protected industry 4.0 areas & industrial security. Procedia Manuf 46:580–590. https://doi.org/10.1016/j.promfg.2020.03.084
Chen Y, Zheng W, Li W, Huang Y (2021) Large group activity security risk assessment and risk early warning based on random forest algorithm. Pattern Recognit Lett 144:1–5. https://doi.org/10.1016/j.patrec.2021.01.008
Cranmer EE, Urquhart C, Dieck MC, Jung T (2021) Developing augmented reality business models for SMEs in tourism. Inf Manag 58:103551. https://doi.org/10.1016/j.im.2021.103551
D’Amato S, Dian M, Russo A (2022) Reaching for allies? The dialectics and overlaps between international relations and area studies in the study of politics, security and conflicts. Ital Political Sci Rev 52(2):153–171. https://doi.org/10.1017/ipo.2022.13
Diana A, Lorenzi V, Penasa M, Magni E, Alborali GL, Bertocchi L, De Marchi M (2020) Effect of welfare standards and biosecurity practices on antimicrobial use in beef cattle. Sci Rep 10(1):20939. https://doi.org/10.1038/s41598-020-77838-w
Eichensehr KE, Hwang C (2023) National security creep in corporate transactions. Columbia Law Rev 123(2):549–614. https://www.jstor.org/stable/27204378
Endsley MR (2021) Situation awareness—handbook of human factors and ergonomics. 434–455. https://doi.org/10.1002/9781119636113.ch17
Ganin AA, Quach P, Panwar M, Collier ZA, Keisler JM, Marchese D, Linkov I (2020) Multicriteria decision framework for cybersecurity risk assessment and management. Risk Anal 40(1):183–199. https://doi.org/10.1111/risa.12891
Goldstein A (2020) China’s grand strategy under Xi Jinping: reassurance, reform, and resistance. Int Secur 45(1):164–201. https://doi.org/10.1162/isec_a_00383
Hagmann J, Cavelty MD (2012) National risk registers: security scientism and the propagation of permanent insecurity. Secur Dialogue 43(1):79–96. https://doi.org/10.1177/0967010611430436
Henisz WJ, Mansfield ED, Von Glinow MA (2010) Conflict, security, and political risk: international business in challenging times. J Int Bus Stud 41(5):759–764. https://doi.org/10.1057/jibs.2010.11
Heyerdahl A (2021) Risk assessment without the risk? A controversy about security and risk in Norway. J Risk Res 25:252–267. https://doi.org/10.1080/13669877.2021.1936610
Hou Z, Peng Q (2023) The national security law for Hong Kong: a corpus-driven comparative study of media representations between China’s and Anglo-American English-language press. Humanit Soc Sci Commun 10:207. https://doi.org/10.1057/s41599-023-01699-7
Hu W (2016) Xi Jinping’s ‘Big Power Diplomacy’ and China’s Central National Security Commission (CNSC). J Contemp China 25(98):163–177. https://doi.org/10.1080/10670564.2015.1075716
Ihemeson OC (2024) An assessment of UN Policies on fossil emission and climate change: implications on the National Security of US, 2010-2023. J Integr Ecosyst Environ 2(5):8–23. https://doi.org/10.5281/zenodo.13162524
Ji Y (2016) China’s National Security Commission: theory, evolution and operations. J Contemp China 25(98):178–196. https://doi.org/10.1080/10670564.2015.1075717
Jiang C, Huang Z, Pedapati T, Chen PY, Sun Y, Gao J (2024) Network properties determine neural network performance. Nat Commun 15:5718. https://doi.org/10.1038/s41467-024-48069-8
Kamp KH (2023) The Zeitenwende at Work: Germany’s National Security Strategy. Survival 65(3):73–80. https://doi.org/10.1080/00396338.2023.2218698
Kim MH (2023) Hedging between the United States and China? South Korea’s ideology-driven behavior and its implications for national security. Int Relat Asia Pac 23(1):129–158. https://doi.org/10.1093/irap/lcab020
Koren O, Bukari KN (2024) (Re)Emerging disease and conflict risk in Africa, 1997–2019. Nat Hum Behav 8:1506–1513. https://doi.org/10.1038/s41562-024-01929-1
Kośmider T (2021) Determinants of the process of creating national security. J Secur Sustain Issues 11(1):287. https://doi.org/10.47459/jssi.2021.11.25
Kretschmer A, Kajau H, Margolis E, Tutrone R, Grimm T, Trottmann M, Noerholm M (2022) Validation of a CE-IVD, urine exosomal RNA expression assay for risk assessment of prostate cancer prior to biopsy. Sci Rep 12(1):4777. https://doi.org/10.1038/s41598-022-08608-z
Kuzminykh I, Ghita B, Sokolov V, Bakhshi T (2021) Information Security Risk Assessment. Encyclopedia 1:602–617. https://doi.org/10.3390/ENCYCLOPEDIA1030050
Landoll D (2021) The security risk assessment handbook: a complete guide for performing security risk assessments. CRC Press. https://doi.org/10.1201/9781003090441
Levi Y, Agmon S (2021) Beyond culture and economy: Israel’s security-driven populism. Contemp Politics 27(3):292–315. https://doi.org/10.1080/13569775.2020.1864163
Lidén K (2023) A better foundation for national security? The ethics of national risk assessments in the Nordic region. Coop Confl 58:3–22. https://doi.org/10.1177/00108367211068877
Liu C, Tan CK, Fang YS, Lok TS (2012) The security risk assessment methodology. Procedia Eng 43:600–609. https://doi.org/10.1016/j.proeng.2012.08.106
Liu F (2016) China’s security strategy towards East Asia. Chin J Int Politics 9(2):151–179. https://doi.org/10.1093/cjip/pow003
Mara D, Nate S, Stavytskyy A, Kharlamova G (2022) The Place Of Energy Security In the National Security Framework: an assessment approach. Energies 15(2):658. https://doi.org/10.3390/en15020658
Mennen M, Van Tuyll M (2015) Dealing with future risks in the Netherlands: the National Security Strategy and the National Risk Assessment. J Risk Res 18:860–876. https://doi.org/10.1080/13669877.2014.923028
Newmann WW, Christiansen WT (2023) Simulating the US National Security Interagency Process: solid foundations and a method of assessment. J Political Sci Educ 19(2):331–348. https://doi.org/10.1080/15512169.2022.2135517
Niu K, Li M, Lenzen M, Wiedmann T, Han X, Jin S, Malik A, Gu B (2024) Impacts of global trade on cropland soil-phosphorus depletion and food security. Nat Sustain 1–13. https://doi.org/10.1038/s41893-024-01385-9
Nyman J (2023) Towards a global security studies: what can looking at China tell us about the concept of security? Eur J Int Relat 29(3):673–697. https://doi.org/10.1177/1354066123117699
Özdemir G, Karagül S (2024) National security and the tools of cyber power: a review on the areas of state Hegemonia. Yönet Bilim Derg 22(53):852–875. https://doi.org/10.35408/comuybd.1360459
Pereira da Veiga C, Pereira da Veiga CR, Girotto FM, Marconatto DAB, Su Z (2024) Implementation of the ARIMA model for prediction of economic variables: evidence from the health sector in Brazil. Humanit Soc Sci Commun 11:1068. https://doi.org/10.1057/s41599-024-03023-3
Perez N, Singh V, Ringler C, Xie H, Zhu T, Sutanudjaja EH, Villholth KG (2024) Ending groundwater overdraft without affecting food security. Nat Sustain 7:1007–1017. https://doi.org/10.1038/s41893-024-01376-w
Rezvani SM, de Almeida NM, Falcao MJ, Duarte M (2022) Enhancing urban resilience evaluation systems through automated rational and consistent decision-making simulations. Sustain Cities Soc 78:103612. https://doi.org/10.1016/j.scs.2021.103612
Schilling J, Schilling-Vacaflor A, Flemmer R, Froese R (2021) A political ecology perspective on resource extraction and human security in Kenya, Bolivia and Peru. Extr Ind Soc 8(4):100826. https://doi.org/10.1016/j.exis.2020.10.009
Schleifer P, Sun Y (2020) Reviewing the impact of sustainability certification on food security in developing countries. Glob Food Secur 24:100337. https://doi.org/10.1016/j.gfs.2019.100337
Schmidt E (2022) AI, great power competition & national security. Daedalus 151(2):288–298. https://doi.org/10.1162/daed_a_01916
Vlek C (2013) How solid is the Dutch (and the British) National Risk Assessment? Overview and decision-theoretic evaluation. Risk Anal 33:948–971. https://doi.org/10.1111/risa.12052
Wand H, Lambert SA, Tamburro C, Iacocca MA, O’Sullivan JW, Sillari C, Wojcik GL (2021) Improving reporting standards for polygenic scores in risk prediction studies. Nature 591(7849):211–219. https://doi.org/10.1038/s41586-021-03243-6
Wang Q, Ren F, Li R (2024a) Geopolitics and energy security: a comprehensive exploration of evolution, collaborations, and future directions. Humanit Soc Sci Commun 11:1071. https://doi.org/10.1057/s41599-024-03507-2
Wang S, Xiao X, Ding Q (2024b) A novel fractional system grey prediction model with dynamic delay effect for evaluating the state of health of lithium battery. Energy 290:130057. https://doi.org/10.1016/j.energy.2023.130057
Wang W, Jia J, Liu Y, Wang P (2022) The International Pattern and World Order Under the “Profound Changes Unseen in Centuries”. In: profound changes unseen in centuries: an overview of China, Springer Nature Singapore, Singapore. https://doi.org/10.1007/978-981-16-7419-8_3
Wæver O (2011) Politics, security, theory. Secur Dialogue 42(4-5):465–480. https://doi.org/10.1177/0967010611418718
Wolford S, Ritter EH (2016) National leaders, political security, and the formation of military coalitions. Int Stud Q 60(3):540–551. https://doi.org/10.1093/isq/sqv023
Xu ZH (2025) Coupling coordination development and driving factors of new energy vehicles and ecological environment in China. Wuhan Univ J Nat Sci 30:79–90. https://doi.org/10.1051/wujns/2025301079
Xu ZH (2023) Machine learning-based quantitative structure-activity relationship and ADMET prediction models for erα activity of anti-breast cancer drug candidates. Wuhan Univ J Nat Sci 28:257–270. https://doi.org/10.1051/wujns/2023283257
Xu ZH, Lin Y, Cai HY, Zhang W, Shi J, Situ LY (2024) Risk assessment and categorization of terrorist attacks based on the Global Terrorism Database from 1970 to 2020. Humanit Soc Sci Commun 11:1103. https://doi.org/10.1057/s41599-024-03597-y
Yang J, Liang N, Pitts BJ, Prakah-Asante KO, Curry R, Blommer M, Yu D (2023) Multimodal sensing and computational intelligence for situation awareness classification in autonomous driving. IEEE Trans Hum Mach Syst 53(2):270–281. https://doi.org/10.1109/THMS.2023.3234429
Zeng P, Wei X, Duan Z (2022) Coupling and coordination analysis in urban agglomerations of China: urbanization and ecological security perspectives. J Clean Prod 365:132730. https://doi.org/10.1016/j.jclepro.2022.132730
Zhao TT (2024) Research on the path of high-quality development of the construction industry driven by new quality productivity. J Civ Eng Urban Plan 6(3):43–49. https://doi.org/10.23977/jceup.2024.060306
Acknowledgements
This work is supported by National Social Science Found of China (Nos. 21BTQ012 and 22BTQ065), Nanjing University China Mobile Joint Research Institute Project (No. 2024200249), Jiangsu Province Social Science Fund Project (No. 22TQB002), Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. KYCX24_0102), and China Scholarship Council Program (No. 202406190114). In addition, the authors want to express gratitude to the editors for the editing assistance and thank the reviewers for their valuable comments and suggestions on this paper.
Author information
Authors and Affiliations
Contributions
ZHX wrote the main manuscript text. ZHX and JS designed and performed research and experiments; ZHX research and experiments; ZHX analyzed the data and results. All authors reviewed the manuscript. ZHX and JS revised the manuscript. All authors critically reviewed the manuscript and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Ethical approval
Ethical approval was not required as the study did not involve human participants.
Informed consent
This article does not contain any studies with human participants performed by any of the authors.
Additional information
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.
About this article
Cite this article
Xu, Z., Shi, J. Research on the national security risk assessment model: a case study of political security in China. Humanit Soc Sci Commun 12, 906 (2025). https://doi.org/10.1057/s41599-025-05278-w
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1057/s41599-025-05278-w







