Next Article in Journal
Factors Affecting the Adoption of Digital Technology by Farmers in China: A Systematic Literature Review
Previous Article in Journal
Implications of Climate Change on Wind Energy Potential
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Essay

Identifying Critical Success Factors of an Emergency Information Response System Based on the Similar-DEMATEL Method

School of economics and management, Nanjing Institute of Technology, Nanjing 211167, China
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(20), 14823; https://doi.org/10.3390/su152014823
Submission received: 10 August 2023 / Revised: 9 October 2023 / Accepted: 11 October 2023 / Published: 12 October 2023
(This article belongs to the Section Sustainable Management)

Abstract

:
An emergency information response system (EIRS) is a system that utilizes various intelligence technologies to effectively handle various emergencies and provide decision support for decision-makers. As critical success factors (CSFs) in EIRS play a vital role in emergency management, it is necessary to study the CSFs of EIRS. Most previous studies applied the Decision Experiment and Decision-Making Trial and Evaluation Laboratory (DEMATEL) method with complete evaluation information to identify CSFs. Due to the complexity of the decision-making environment when identifying CSFs of EIRS, decision-makers sometimes cannot provide complete evaluation information during the decision-making process. To fill this gap, this paper provided a Similar-DEMATEL method to impute the missing values and identify CSFs of EIRS, which may avoid the dilemma of decision distortion and make decision-making results more accurate. It is found that the factors of Information mining capability, Equipment support capability, Monitoring and early warning capability, and Organization participation capability are the CSFs in EIRS. Our proposed method differs from previous research, such as the mean imputation method, to impute the missing values. We compared the differences between the proposed method and the mean imputation method and gave the advantages of the proposed method. Our method focuses more on uncertain decision-making environments, which is conducive to improving the efficiency of EIRS in emergency management, and therefore it is more widely adopted.

1. Introduction

The COVID-19 epidemic is a major international public emergency. Although the epidemic has passed away in China, its harm to the economy and society far exceeded people’s expectations. The emergency information response system (EIRS) is a system that can quickly and efficiently collect and analyze information by using various intelligence technologies, helping organizations make quick and effective responses to emergencies, which played a vital role in the control of emergencies in China. For example, it can accurately monitor the track of affected people in China through big data technology. From the content contained in EIRS, it can be seen that in urban construction and sustainable development, EIRS also played an important role in quickly restoring the original functions of the city when the city faced various disasters.
Many scholars have conducted research on EIRS, and their views are as follows: Excellent EIRS can achieve a series of goals in emergency management by exploring the essence of emergency management [1]. Therefore, when facing emergency problems, the government needs to have a highly unified information system and a high degree of organizational flexibility. Therefore, in order to better promote the development of EIRS, many countries have conducted in-depth research on key technologies such as information integration mechanisms and information security of emergency platforms [2,3,4,5], improving their financial support capabilities, including personnel costs, equipment costs, management costs, equipment consumption, and maintenance costs, thereby greatly improving their security capabilities when facing emergency problems [6]. The widespread use of devices such as mobile phones and robots has made it easier to collect more and more accurate emergency information [7,8]. The full application of IT applications has also improved the ability to mine information [9], further unleashed organizational flexibility [10,11], and optimized the government’s emergency management decision-making ability.
Prior research laid the foundation for improving the capability of EIRS. However, EIRS sometimes cannot produce a desirable efficiency, as decision-makers may not be able to effectively utilize EIRS in certain situations, such as excessive information mining or misuse of information security [4,12,13]. Thus, a scientific way is needed to identify critical success factors (CSFs) and to clarify the relationships among factors. Decision-makers should pay more attention to the CSFs. Less attention should be paid to those non-CSFs to avoid negative effects on emergency management.
Previous studies used methods such as unstructured interviews [7] and questionnaires [14] to explore the potential and important factors, which did not adequately identify the CSFs of EIRS because of decision-makers’ (DMs) incomplete knowledge structure and different educational backgrounds. Therefore, it is critical to apply an appropriate decision-making method to identify the CSFs of EIRS. The Decision Experiment and Decision-Making Trial and Evaluation Laboratory (DEMATEL) method has been used to identify CSFs in many studies [15]. Like several methods to enhance the efficiency of emergency management [16,17,18,19,20], the DEMATEL method needs experts to evaluate the interrelation among factors. However, DMs may provide hybrid evaluation values, and the evaluation values may contain some missing values. Unfortunately, scholars have not conducted in-depth research on this kind of DEMATEL method in these situations.
To address these limitations, a novel Similar-DEMATEL method with hybrid assessment scales of crisp value and interval value was proposed to identify CSFs of EIRS in the decision environments containing missing values.
The main contributions of this study are as follows:
(1)
A total of 10 factors of EIRS, which are utilized to explore the causal relationships between factors, are summarized from existing literature.
(2)
A matrix with missing values for DEMATEL was constructed and compensates for missing values through similarity degree.
(3)
CSFs of EIRS were identified by the novel method. Four factors were identified as CSFs, and six factors were identified as non-CSFs. Based on the results, suggestions were proposed in the discussion that would enhance the efficiency of governmental emergency management.
The remainder of this paper is organized as follows: Section 2 reviews the previous related work. Section 3 introduces the preliminaries, including factors of EIRS and symbol descriptions. Section 4 presents the proposed Similar-DEMATEL method. Section 5 illustrates the result of decision-making. Section 6 provides decision-making suggestions. The conclusions are provided in the concluding section (Section 7).

2. Literature Review

There are two main types of literature related to this article: one is fuzzy DEMATEL, and the other is missing values.

2.1. Hybrid DEMATEL

In the typical multi-criteria decision-making (MCDM) method, the DMs preferences were measured using single assessments such as crisp values or fuzzy membership degrees. However, single assessments such as crisp values or interval values sometimes cannot express human thinking [21,22]. The DMs preferences sometimes need to be measured using two or more kinds of assessment scales owing to complex human judgment under uncertain circumstances [23]. For instance, Guo et al. (2012) developed an attitudinal-based method in which the attribute expressed in different assessments in hybrid MCDM [24]. Büyüközkan and Tüfekçi (2021) proposed a new hybrid evaluation model for the blockchain based on multiple assessments in a fuzzy environment [25]. Liu et al. (2021) provided a new group of decision-making methods incorporating regret theory with the assessment of real numbers, interval numbers, and linguistic Z-numbers, which are used to evaluate cloud service [26].
In the 1970s, Fontela and Gabus (1974) proposed the DEMATEL method, which could uncover CSFs by exploring the relationship among factors [15]. The DEMATEL method has been widely used in knowledge management, emergency decision-making, and other fields [27,28,29]. In recent years, the extended application of DEMATEL has become increasingly widespread. One extension of DEMATEL is to apply DEMATEL to other methods to propose a hybrid MADM framework. Tadić (2014) integrated DEMATEL, ANP, and VIKOR for selecting the CL concept, which is successfully performed in this paper for the City of Belgrade [30]. Du (2013) developed the Kano-DEMATEL-TOPSIS method and applied it to logistics service supply chain (LSSC) management. The hybrid method can better solve the problem of benefit distribution, which comprises segmented task evaluation and individual risk compensation in LSSC [31]. Like many other typical MCDM methods, the typical DEMATEL needs DMs to provide assessments against criteria using a single assessment scale. Thus, the other extension of DEMATEL is to modify the assessment scale. One way to modify the assessment scale is to expand it into a diverse set of language terms such as Pythagorean, triangular fuzzy numbers, intuitionistic fuzzy numbers, etc. [32,33,34,35]. The other way to modify the assessment scale is to expand the scope of assessment scales. For example, in the literature [36], the scope of assessment scales can be any natural number.
Although DEMATEL is widely used, the application of this effective structural modeling tool to evaluate EIRS needs to be explored [37]. Considering a single assessment scale cannot express human thinking, it needs two or more kinds of assessment scales for the DEMATEL method to identify the CSFs of EIRS. However, the DEMATEL method using hybrid evaluation assessments is still in its early stages. Jin et al. (2020) put forward a hybrid DEMATEL method with the assessment of a real number, an interval number, and a triangular fuzzy number to identify the CSFs of emergency supply support capacity [38]. Jin and Zhang (2023) provided an IFS-IVIFS-DEMATEL method with the assessment of IFS and IVIFS to identify the CSFs [39]. These studies using hybrid evaluation assessments have played a good role in identifying CSFs. Therefore, a Hybrid DEMATEL with two kinds of assessment scales will be applied to identify the CSFs of EIRS.

2.2. Missing Values Imputation

The evaluation information may contain some missing values due to DMs incomplete knowledge structure and different educational backgrounds. In general, the simplest way to solve this problem is to delete the evaluation information and datasets with missing values. However, if the missing values are very important for DMs, deleting the evaluation information and dataset may result in an incomplete reflection of the real problem, which could distort the DMs thoughts [40]. The imputation method is then utilized to obtain the missing values [41]. The imputation method generally contains two groups: the statistical imputation method and the machine learning-based imputation method [42].
The simplest statistical imputation method is mean and mode imputation [43,44]. For mean imputation, the missing value is filled in by the average value of all the observed data [45,46]. For the mode method, the missing value is filled in by the frequent value of the attribute [47]. The machine learning method is another typical imputation method, which includes K nearest neighbor imputation (KNN), class center-based missing values imputation (CCMVI), fuzzy c-mean clustering method, et al. The KNN method is a typical machine learning method in which the missing values are imputed by the values calculated from the nearest observed data of k [48]. The CCMVI method means that the missing values are imputed by the values of distance based on measuring the class center of each class [43]. The fuzzy c-mean clustering method means that the missing values are imputed by the values using the selected shorter interval based on the cluster membership value [44]. In recent years, new machine learning methods have been proposed by a growing number of scholars and have been applied in increasing fields [41]. For example, Ramezani et al. (2018) proposed a hybrid classifier method named logistic adaptive network-based fuzzy inference system (LANFIS). It is a combination of logistic regression and an adaptive network-based fuzzy inference system, which is also applied in diagnosing diabetic diseases [41]. Wang et al. (2019) proposed a method of processing missing values based on the combination of denoising autoencoders (DAE) and generative adversarial networks (GAN), aiming at noise interference in industrial scenes [49]. Ali et al. (2022) proposed a method of fuzzy k-top matching value (FKTM) for missing value imputation that was compared with multivariate imputation by chained equations (MICE) utilizing a support vector machine [50]. Nevertheless, there are few studies about the missing values of assessment for the DEMATEL method.

3. Preliminaries

To better lay the foundation for identifying the CSFs of EIRS, we must obtain the influencing factors of EIRS and further provide some symbols.

3.1. Factors of EIRS

In order to identify the CSFs of EIRS, it is reasonable to extract some factors from prior literature. According to the situation of EIRS in China, some factors, such as safe management [6] and forecasting techniques [51], are integrated. The other factors are selected, such as the information fund support capability [6] and the information coordination capability [11]. After this, the opinions of specialists are sought using a questionnaire survey. Then, factors of EIRS are obtained. Table 1 lists the factors in EIRS.

3.2. Symbols Description

Human assessments for interrelationship comparisons among factors are generally given by crisp values. However, assessments with preferences are often vague and difficult to estimate with crisp values owing to the complex surroundings. In this study, the interrelationship comparisons among factors are given in crisp values or interval values.
Let H = ( H 1 , H 2 , , H n ) be a set of factors of EIRS, suppose that E = ( E 1 , E 2 , , E K ) is a set of experts. c i j k indicates that it is the assessment of H i against H j by the k th expert. s i j k indicates that the k th expert expresses his/her preferences for interrelationship comparison by a crisp number, 1 k K . [ x i j k l , x i j k u ] indicates the k th expert expresses his/her preferences for interrelationship comparison by interval numbers. q i j k indicates that the k th expert has not expressed his/her preferences for interrelationship comparisons, and it is a missing value. Therefore, the k th expert constructs a hybrid initial direct correlation matrix (HIDCM). that is, C k = [ c i j k ] n × n = [ x i j k l , x i j k u ] [ s i j k ] [ q i j k ] .

4. The Proposed Method

Abdullah (2022) argued that the accuracy and stability of data predictions can be effectively improved by using historical scenarios in similar situations [60]. In this paper, we suppose that under similar situations, the experts who hold the same idea have an identical pairwise comparison of two factors. Based on this point, the following decision-making process is presented:
Step 1:  K experts from different fields were invited to evaluate interrelationship comparisons among factors. Each expert ( E k , k = 1 , 2 , , K ) constructs a HIDCM.
Let S D k i be a vector of assessments of comparison for H i against H j for expert E k in HIDCM. That is to say, S D k i = [ c i 1 k , c i 2 k , , c i n k ] , k = 1 , 2 , , K , i = 1 , 2 , , n , c i j k is an evaluation value of HIDCM by E k . We called S D k i a KHCV (correlation vector of expert E k for factor H i ). For instance, the correlation vector of E 1 for H 1 is S D 11 = [ c 11 1 , c 12 1 , , c 1 n 1 ] . Thus, K vectors about KHCV were formed for H i by all experts. Let S D p m be KHCV with missing values for H m by E P . We called S D p m a MVV. Assume that a HIDCM for E P has t c p MVV.
For H i , we constructed a matrix C C i = [ S D 1 i , S D 2 i , , S D K i ] T , where T is transposition of the matrix. We called C C i a HVM (virtual matrix of H i ). For example, the HVM of a factor H 1 is C C 1 = [ S D 11 , S D 21 , , S D K 1 ] T = [ [ c 11 1 , c 12 1 , , c 1 n 1 ] , [ c 11 2 , c 12 2 , , c 1 n 2 ] , , [ c 11 K , c 12 K , , c 1 n K ] ] T . Therefore, there are n HVMs in our decision-making situation. Assume that HVM of H i contains S i MVV. Obviously, the sum of the MVV of HIDCM by all experts equals the sum of the MVV of all HVMs, that is to say, i = 1 n S i = k = 1 K t c k .
Step 2: Convert the crisp values to interval values and remove the MVV. The crisp values in HIDCM ( C k , k = 1 , 2 , , K ) are converted into interval values according to the literature [61].
The formula is,
y i j k l = s i j k ,   y i j k u = s i j k ,   i = 1 n ,   j = 1 n
Thus, the hybrid initial direct correlation matrix (HIDCM) becomes a new matrix C k = [ c i j k ] n × n = [ x i j k l , x i j k u ] [ y i j k l , y i j k u ] [ q i j k ] . Therefore, C C i of H i is composed of interval numbers in addition to MVV.
Then, we delete the S D p m from C C i of H i . The remaining HVM of H i is C C S i = [ c c s k j i ] ( K - S i ) × n = [ c c s k j i l , c c s k j i u ] ( K - S i ) × n ,   i = 1 , 2 , , n .
Step 3: Introduce the similarity degree of literature [60,62], the similarity degree of H i for expert E k against expert E r is,
s i m i k r = 1 n j = 1 n c c s k j i l c c s r j i l + c c s k j i u c c s r j i u ( c c s k j i l ) 2 + ( c c s k j i u ) 2 ( c c s r j i l ) 2 + ( c c s r j i u ) 2 ,   k = 1 , 2 , , K S i ,   r = 1 , 2 , , K S i
Since the interrelation comparison of chosen factors on themselves is 0, namely, c c s k j i l = c s k j i u = c c s r j i l = c c s r j i u = 0 .
Step 4: The comprehensive similarity degree of H i for expert E k is,
s i m i k = ( r = 1 K S i s i m i k r ) / ( K S i )
Similarly, the comprehensive similarity degree of H i for expert E q is,
s i m i q = ( q = 1 K S i s i m i q r ) / ( K S i )
Therefore, comprehensive similarity sequences s i m i 1 , s i m i 2 , , s i m i k , , s i m i q , s i m i K S i of factors H i are constructed.
Step 5: Similarly, comprehensive similarity sequences of other factors are constructed. Because the remaining HVM of H i is constructed by the KHCV of the remaining experts, of H i . Thus, the corresponding position of the comprehensive similarity sequence of H i is supplemented with 0. In this way, the synthesis matrix ( CZ = [ cz i k ] n × K ) is constructed, where, i indicates the factors, i = 1 , 2 , , n , k indicate the experts, k = 1 , 2 , , K .
Step 6: Calculate the average preference value of each expert.
y s k = i = 1 n s i m i k / ( K t c k )
Step 7: To calculate the expert proximity value, the formula is y s k - y s p . If the expert proximity value between E k and E p has the smallest deviation in all values, we thought the two experts had the same idea in this situation. Then, the missing values of E p are imputed by an assessment of E k in the same position. The formula is [ q i j P ] = [ y s i j k l , y s i j k u ] n × n .
Step 8: Therefore, a new direct incidence matrix C k = [ c i j k ] n × n is constructed.
C k = [ c i j k ] n × n = [ x i j k l , x i j k u ] n × n [ y i j k l , y i j k u ] n × n [ y s i j k l , y s i j k u ] n × n = [ c i j k l , c i j k u ] n × n
Step 9: Weight the new direct incidence matrix according to the number of experts.
N Q = [ n q i j ] n × n = [ n q i j l , n q i j u ] n × n = [ ( k = 1 K c i j k l ) / K , ( k = 1 K c i j k u ) / K ] n × n
Normalize the weighted direct incidence matrix, that is,
G ˜ = [ g i j l , g i j u ] n × n = [ n q i j l , n q i j u ] / max 1 j n i = 1 n [ ( n q i j l ) 2 + ( n q i j u ) 2 ]
Step 10: Calculate the comprehensive impact incidence matrix T ˜ , where “ I “ is the unit matrix.
T ˜ = lim l ( G ˜ + G ˜ 2 + + G ˜ l ) = G ˜ ( I G ˜ ) 1
Obtain a degree of influential impact R ˜ and a degree of influenced impact D ˜ .
R ˜ = i = 1 n T ˜ = i = 1 n [ t i j L , t i j U ] = [ i = 1 n t i j L , i = 1 n t i j U ] = [ R L , R U ]
D ˜ = j = 1 n T ˜ = j = 1 n [ t i j L , t i j U ] = [ j = 1 n t i j L , j = 1 n t i j U ] = [ D L , D U ]
Step 11: Obtain a probability matrix of R ˜ . we use the ranking method of interval numbers proposed by [63]. The formula is,
R i j = max 0 , l ( Q i ) + l ( Q j ) max ( 0 , R j U R i L ) l ( Q i ) + l ( Q j )
where
l ( Q i ) = R i + R i ,   l ( Q j ) = R j + R j ,
The formula for the probability matrix of D ˜ is,
D i j = max 0 , l ( Q i ) + l ( Q j ) max ( 0 , D j U D i L ) l ( Q i ) + l ( Q j )
where
l ( Q i ) = D i + D i ,   l ( Q j ) = D j + D j ,
Calculate the crisp values of the degree of influence. The formula is,
R i = k = 1 n R i k , i = 1 , 2 , n
Calculate the crisp values of the degree of influence. The formula is,
D i = k = 1 n D i k , i = 1 , 2 , n
Step 12: Calculate the central degree. The formula is,
P i = R i + D i
Calculate the causal degree. The formula is,
H i = R i D i
Factors can be divided into two categories by causal degree. A factor greater than or equal to zero is considered the cause factor. A factor less than zero is regarded as the effect factor. The cause factor can influence other factors and is usually considered a CSF when its central degree does not rank too low, while the effect factor is passive; therefore, it is not easily considered a CSF.
The decision flowchart is as follows (Figure 1).

5. The Result of Decision-Making

Firstly, 11 experts in related fields (i.e., information, emergency management) were invited to conduct a questionnaire survey on the influential factors of EIRS. Secondly, in order to meet the expectations of experts to a greater extent, experts were allowed to give crisp values or interval values to evaluate the interrelationship among factors. Dytczak&Ginda (2013) considered that the assessment scale can be N scales (N is a natural number) [36]. The assessment from 0 to 9 (“None”, “Very weak”, “Relatively weak”, “Somewhat weak”, “Slightly weak”, “Moderate”, “Slightly strong”, “Somewhat strong”, “Relatively strong” and “Very strong”) in this evaluation is applied to describe the interrelationship. In addition, the interrelationship comparisons among factors by interval values are in [0, 9]. Thirdly, if an expert cannot give an assessment of the interrelationship comparisons among certain factors, he/she may not give the evaluation value. We asked each expert not to exceed two missing values during the evaluation process.

5.1. Step of Decision-Making

Step 1: Consider the limited space; the hybrid initial direct correlation matrix of Expert 1 is shown in Table 2.
For convenience, we only listed the virtual matrix of factor F 1 , as shown in Table 3.
Step 2: It can be seen that the HVM of factor F1 by experts 2, 5, 8, and 11 has missing values from Table 3. We deleted these MVVs. Then, we converted the crisp values into interval values and obtained the interval virtual matrix of factor F1. They are shown in Table 4.
Step 3: Calculate the comprehensive similarity degree of F1, as shown in Table 5.
Step 4: Obtain the comprehensive similarity sequences of each expert for F1, as shown in Table 6.
Step 5: Similarity: we obtain the comprehensive similarity sequences of every expert for F2, F3, F4, F5, F6, F7, F8, F9, and F10. We supplemented with 0 in the corresponding vacant position. The synthesis matrix is shown in Table 7.
Step 6: Calculate the mean preference value of each expert, as shown in Table 8.
Step 7: Obtain the expert proximity value, as shown in Table 9.
The difference between the proximity values of Expert 1 and Expert 6 is 0.0027. It shows that Expert 1 and Expert 6 have the most consistent ideas among all experts. Therefore, we apply the assessment of Expert 6 to fill in the missing values of Expert 1 in the corresponding position of HIDCM. That means that Expert 1 obtained the assessment of the interrelation of F2 against F5 and F6 of 2 and 5, respectively.
The hybrid initial direct correlation matrix built by Expert 4, Expert 7, and Expert 9 has no missing values. The missing values of HIDCM by other experts are imputed in a similar way, as shown in Table 10.
Step 8: Convert the assessments into interval numbers. Therefore, the new direct incidence matrix for Expert 1 is shown in Table 11 as an example.
Step 9: The weighted new direct incidence matrix is obtained, as shown in Table 12.
Step 10: Calculate the interval values of the degree of influential impact and the degree of influenced impact. The interval values of degree of influential impact are: F1 = [2.58, 3.23], F2 = [2.69, 3.3], F3 = [2.81, 3.24], F4 = [2.56, 3.02], F5 = [2.95, 3.41], F6 = [3.04, 3.55], F7 = [3.34, 3.87], F8 = [3.73, 4.39], F9 = [3.14, 3.68], and F10 = [4.02, 4.57]. The interval values of degree of influenced impact are: F1 = [3, 3.6], F2 = [3.13, 3.64], F3 = [3.06, 3.65], F4 = [2.89, 3.35], F5 = [3.32, 3.87], F6 = [3, 3.45], F7 = [3.17, 3.7], F8 = [3.09, 3.68], F9 = [2.87, 3.37], and F10 = [3.33, 3.96].
Step 11: Calculate the crisp values of the degree of influential impact and the degree of influenced impact. The crisp values of degree of influential impact are: F1 = 2.408; F2 = 2.9345; F3 = 3.0622; F4 = 1.5197; F5 = 4.2246; F6 = 5.1215; F7 = 7.0233; F8 = 8.6855; F9 = 5.8247; and F10 = 9.196. The crisp values of degree of influenced impact are: F1 = 4.5506, F2 = 5.3188, F3 = 5.0379, F4 = 2.7107, F5 = 7.2401, F6 = 3.7541, F7 = 5.7815, F8 = 5.3045, F9 = 2.7652, and F10 = 7.5365.
Step 12: Obtain the central degree and the causal degree. The central degrees are: F1 = 6.9586, F2 = 8.2533, F3 = 8.1001, F4 = 4.2304, F5 = 11.4647, F6 = 8.8756, F7 = 12.8048, F8 = 13.99, F9 = 58.5899, and F10 = 16.7325. The causal degrees are: F1 = −2.1426, F2 = −2.3844, F3 = −1.9757, F4 = −1.191, F5 = −3.0155, F6 = 1.3674, F7 = 1.2417, F8 = 3.3811, F9 = 3.0595, and F10 = 1.6594.
The type of central degree is F 10 > F 8 > F 7 > F 5 > F 6 > F 9 > F 2 > F 3 > F 1 > F 4 . The sort of causal degree is F 8 > F 9 > F 10 > F 6 > F 7 > F 4 > F 3 > F 1 > F 2 > F 5 . Cause factors are F 6 , F 7 , F 8 , F 9 , F 10 . Effect factors are F 1 , F 2 , F 3 , F 4 , F 5 . They are shown in Figure 2.

5.2. Comparison with the Results of the Mean Input Method

In this paper, the mean imputation method is used to make a comparison with the proposed method. The missing values of one expert are filled by the weighted average value of the initial direct correlation matrix given by other experts, as shown in Table 13.
Then, we calculated the degree of influential impact, the degree of influenced impact, the central degree, and the causal degree. The degrees of influential impact are: F1 = 2.4931, F2 = 2.9429, F3 = 3.0609, F4 = 1.5132, F5 = 4.2934, F6 = 5.0366, F7 = 7.0086, F8 = 8.679, F9 = 5.7785, and F10 = 9.1937. The degrees of influenced impact are: F1 = 4.5392, F2 = 5.2179, F3 = 4.9998, F4 = 2.8411, F5 = 7.2063, F6 = 3.7821, F7 = 5.8592, F8 = 5.2864, F9 = 2.8004, and F10 = 7.4675.
The central degrees are: F1 = 7.0323, F2 = 8.1609, F3 = 8.0607, F4 = 4.3544, F5 = 11.4997, F6 = 8.8187, F7 = 12.8679, F8 = 13.9655, F9 = 58.5789, and F10 = 16.6612. The causal degrees are: F1 = −2.0462, F2 = −2.275, F3 = −1.9389, F4 = −1.3279, F5 = −2.9129, F6 = 1.2545, F7 = 1.1494, F8 = 3.3926, F9 = 2.9781, and F10 = 1.7262.
It can be seen that the type of central degree and causal degree have not changed as per our proposed method. The sort of central degree is F 10 > F 8 > F 7 > F 5 > F 6 > F 9 > F 2 > F 3 > F 1 > F 4 , and the sort of causal degree is F 8 > F 9 > F 10 > F 6 > F 7 > F 4 > F 3 > F 1 > F 2 > F 5 . Cause factors are F 6 , F 7 , F 8 , F 9 , F 10 and effect factors are F 1 , F 2 , F 3 , F 4 , F 5 .
We carefully observe the difference between our proposed method and the mean imputation method. The maximum value of the central degree using the proposed method is 16.7325, the minimum value is 4.2304, and the difference is 12.5021. The maximum value of the central degree using the mean imputation method is 16.6612, the minimum value is 4.3544, and the difference is 12.3068. The maximum value of causal degree using the proposed method is 3.3811, the minimum value is −3.0155, and the difference is 6.3966. The maximum value of causal degree using the mean imputation method is 3.3926, the minimum value is −2.9129, and the difference is 6.3055. It can be easily observed that the difference between the central degree and the causal degree in our proposed method is larger than the mean imputation method.
In addition, we take the HIDCM of Expert 1 as an example to observe the characteristics of the imputation, as shown in Table 14 and Table 15. Table 14 lists the new hybrid initial direct incidence matrix by the proposed method, and Table 15 lists the new hybrid initial direct incidence matrix by the mean imputation method.
It can be seen that the assessment of F2 against F5 is [2.2, 2.3]. The imputation values of this method are integers or interval integers, while the values of the mean imputation method are decimals. It is different from the traditional DEMATEL assessment scale, in which the boundaries of crisp values or interval values are all integers.

6. Discussion

First of all, the causal degree of Information mining capability (F6), Equipment support capability (F7), Monitoring and early warning capability (F8), Information security capability (F9), and Organization participation capability (F10) are positive, which indicates that these factors will affect other factors. Secondly, the ranking of the central degree of Information security capability (F9) is low in all factors, which indicates that this factor is of low importance. Therefore, the CSFs of EIRS are F6, F7, F8, and F10. Therefore we propose the following suggestions:

6.1. Monitoring and Early Warning Capability

DMs should focus on information monitoring and early warning. ① Establish an early warning mechanism. DMs should establish the early-warning situation of where and what kind of emergency and report to who and which organizations. In this way, the high-level organization reasonably establishes the early-warning trigger threshold, which is, what kind of early-warning trigger threshold can be issued by which organizations. ② Improving the assessment, reward, and punishment systems It stimulates the enthusiasm and initiative of personnel in early warning work, effectively improves the response to all kinds of emergencies, and provides more accurate and intuitive information for scientific decision-making and scheduling.

6.2. Organization Participation Capability

The timely response of EIRS needs the cooperation of relevant organizations in different fields. Therefore, it is necessary to build a strong organizational structure to gather various organizations. In the process of strengthening organizational participation, DMs should pay attention to the following three points. ① Promote the profession of the organization. By fully integrating the knowledge of various fields into the EIRS, we can better respond to emergencies. Therefore, the organization should be jointly constructed by health, meteorological, public security, and other organizations, etc. ② Enhance the cooperation of the organizations. Different emergency scenarios, such as snow disasters, rainstorms, and epidemic situations, require the active participation of different organizations. It would improve the cooperation abilities of various organizations by collecting and actively combining information. ③ Foster the relevance of the daily work of various organizations. In their daily work, the high-level organization should pay attention to the correlation of organizations in various organizations, such as establishing relatively safe online communication channels, including QQ groups. This is helpful to maintain the relevance of cooperative organizations and to ensure more cooperation when emergencies arise.

6.3. Information Mining Capability

The accuracy of information mining affects the timely response to information. Therefore, we should conduct in-depth mining of information capability, which can effectively prevent risks and ensure the timeliness and accuracy of information responses. Therefore, a new generation of information technology analysis approaches (i.e., big data, artificial intelligence, and blockchain) are used to conduct in-depth mining of intelligence information and predict the changing trend of emergencies. In this way, DMs can better improve the effectiveness of EIRS and control the whole process of emergencies.

6.4. Equipment Support Capability

DMs should attach importance to the support capability of information equipment. ① Increase hardware investment. The storage and sharing of intelligence and the integration and mining of heterogeneous data depend on the input of hardware. If the input of hardware equipment is reasonable, DMs could better monitor and early-warn emergencies. ② Promote the fine management of equipment. DMs should standardize and improve the operation, maintenance, repair, and maintenance workflow of information equipment and establish a reasonable account system. Only in this way can the management and operation of information equipment be effectively improved. ③ Strengthen this study and assessment of information equipment users. DMs should fully improve the learning efficiency of equipment users, enable them to flexibly master new products and technologies of relevant information equipment, and improve the management and assessment mechanisms of equipment users.

7. Conclusions

EIRS plays a vital role in emergency management, especially its CSFs. Scholars identify the CSFs of EIRS through various methods. Due to the complex decision environment and the incomplete knowledge structure of experts, there are some missing values in the interrelationship comparisons among factors. In addition, we allow the expert to give two assessments: crisp value and interval value. Therefore, a Similar-DEMATEL method based on the same idea of an expert is proposed to fill in the missing evaluation value and identify the CSFs of EIRS.
In this paper, we found that the CSFs of EIRS are Organization participation, Monitoring and early warning ability, Information mining ability, and Equipment support ability. We would attach importance to these CSFs to improve the efficiency of EIRS. It provides a foundation for risk assessment and scientific decision-making and brings possibilities for building sustainable cities.
The Similar-DEMATEL method is different from the mean imputation method for imputing the missing values. It has a better chance of focusing more on the uncertain decision-making circumstances. It offers a scientific and effective decision-making method for identifying the CSFs of EIRS to deal with emergencies. This method can also be used to identify CSFs in more complex and uncertain environments, such as knowledge management, fault identification, and other fields.
However, the limitation of this study is to identify CSFS through expert preferences. Future research can also specify the relationship between CSFs through methods such as structural equation models or interpretive structural models.

Author Contributions

W.J.: Conceptualization, Methodology, Software, Validation, Visualization, Writing—original draft. Y.Z.: Writing—review and editing; Supervision. All authors have read and agreed to the published version of the manuscript.

Funding

Social Science Fund of Jiangsu Province (22GLB003), Jiangsu Provincial Department of Education Fund of Philosophy and Social Science (2022SJZD014), Open Fund Project of Industrial Economy and Innovation Management Institute of Nanjing Institute of Engineering (JGKB202102, JGKA202202), and Humanities and Social Sciences Foundation of the Ministry of Education (21YJCZH226).

Data Availability Statement

Data collected or analyzed during this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare that they have no known competing financial interest or personal relationship that could have appeared to influence the work reported in this paper.

References

  1. Mikalef, P.; Gupta, M. Artificial intelligence capability: Conceptualization, measurement calibration, and empirical study on its impact on organizational creativity and firm performance. Inf. Manag. 2021, 58, 103434. [Google Scholar] [CrossRef]
  2. Yuan, H.; Huang, L.; Chen, T.; Chen, Y.; Zhang, H.; Chen, X.; Deng, Q.; He, Z.; Wang, J.; Wang, Y. Key technologies of the emergency platform in China. J. Saf. Sci. Resil. 2022, 3, 404–415. [Google Scholar] [CrossRef]
  3. Li, J.; Li, Q.; Liu, C.; Ullah Khan, S.; Ghani, N. Community-based collaborative information system for emergency management. Comput. Oper. Res. 2014, 42, 116–124. [Google Scholar] [CrossRef]
  4. Seba, A.; Nouali-Taboudjemat, N.; Badache, N.; Seba, H. A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J. Netw. Comput. Appl. 2019, 126, 150–161. [Google Scholar] [CrossRef]
  5. Sakellari, G.; Loukas, G. A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing. Simul. Model. Pract. Theory 2013, 39, 92–103. [Google Scholar] [CrossRef]
  6. Chen, M.; Wang, K.; Dong, X.; Li, H. Emergency rescue capability evaluation on urban fire stations in China. Process Saf. Environ. Prot. 2020, 135, 59–69. [Google Scholar] [CrossRef]
  7. Asadzadeh, A.; Pakkhoo, S.; Saeidabad, M.M.; Khezri, H.; Ferdousi, R. Information technology in emergency management of COVID-19 outbreak. Inform. Med. Unlocked 2020, 21, 100475. [Google Scholar] [CrossRef]
  8. Nutt, P.C. Intelligence gathering for decision making. Omega 2007, 35, 604–622. [Google Scholar] [CrossRef]
  9. Wu, W.-Z.; Niu, D.; Li, J.; Li, T.-J. Rule acquisition in generalized multi-scale information systems with multi-scale decisions. Int. J. Approx. Reason. 2023, 154, 56–71. [Google Scholar] [CrossRef]
  10. Varajao, J.; Lourenco, J.C.; Gomes, J. Models and methods for information systems project success evaluation—A review and directions for research. Heliyon 2022, 8, e11977. [Google Scholar] [CrossRef] [PubMed]
  11. Banerjee, P. Resources, capability and coordination: Strategic management of information in Indian information sector firms. Int. J. Inf. Manag. 2003, 23, 303–311. [Google Scholar] [CrossRef]
  12. Deb, R.; Roy, S. A comprehensive survey of vulnerability and information security in SDN. Comput. Netw. 2022, 206, 108802. [Google Scholar] [CrossRef]
  13. Genga, L.; Zannone, N.; Squicciarini, A. Discovering reliable evidence of data misuse by exploiting rule redundancy. Comput. Secur. 2019, 87, 101577. [Google Scholar] [CrossRef]
  14. Chen, Y. The Empirical Analysis Model on Critical Success Factors for Emergency Management Engineering Information System. Syst. Eng. Procedia 2012, 5, 234–239. [Google Scholar] [CrossRef]
  15. Fontela, E.; Gabus, A. DEMATEL: Progress achieved. Futures 1974, 6, 361–363. [Google Scholar] [CrossRef]
  16. He, Y.; Liu, N. Methodology of emergency medical logistics for public health emergencies. Transp. Res. E Logist. Transp. Rev. 2015, 79, 178–200. [Google Scholar] [CrossRef]
  17. Zhou, X.; Shi, Y.; Deng, X.; Deng, Y. D-DEMATEL: A new method to identify critical success factors in emergency management. Saf. Sci. 2017, 91, 93–104. [Google Scholar] [CrossRef]
  18. Liu, Y.; Wang, Y.; Xu, M.; Xu, G. Emergency Alternative Evaluation Using Extended Trapezoidal Intuitionistic Fuzzy Thermodynamic Approach with Prospect Theory. Int. J. Fuzzy Syst. 2019, 21, 1801–1817. [Google Scholar] [CrossRef]
  19. Hu, X.; Naim, K.; Jia, S.; Zhengwei, Z. Disaster policy and emergency management reforms in China: From Wenchuan earthquake to Jiuzhaigou earthquake. Int. J. Disaster Risk Reduct. 2021, 52, 101964. [Google Scholar] [CrossRef]
  20. Han, J.; Wu, Q.; Zhang, L.; Lei, C. How can the urban emergency capability gap be measured? Construction of a standardized indicator system in China. Int. J. Disaster Risk Reduct. 2022, 80, 103236. [Google Scholar] [CrossRef]
  21. Zadeh, L.A. Fuzzy sets. Inf. Control. 1965, 8, 338–353. [Google Scholar] [CrossRef]
  22. Abdullah, L.; Zulkifli, N.; Liao, H.; Herrera-Viedma, E.; Al-Barakati, A. An interval-valued intuitionistic fuzzy DEMATEL method combined with Choquet integral for sustainable solid waste management. Eng. Appl. Artif. Intell. 2019, 82, 207–215. [Google Scholar] [CrossRef]
  23. Huang, Z.; Yang, C.; Zhou, X.; Gui, W. An improved TOPSIS-based multi-criteria decision-making approach for evaluating the working condition of the aluminum reduction cell. Eng. Appl. Artif. Intell. 2023, 117, 105599. [Google Scholar] [CrossRef]
  24. Guo, K.; Li, W. An attitudinal-based method for constructing intuitionistic fuzzy information in hybrid MADM under uncertainty. Inf. Sci. 2012, 208, 28–38. [Google Scholar] [CrossRef]
  25. Büyüközkan, G.; Tüfekçi, G. A decision-making framework for evaluating appropriate business blockchain platforms using multiple preference formats and VIKOR. Inf. Sci. 2021, 571, 337–357. [Google Scholar] [CrossRef]
  26. Liu, Z.; Wang, D.; Wang, W.; Liu, P. An integrated group decision-making framework for selecting cloud service providers based on regret theory and EVAMIX with hybrid information. Int. J. Intell. Syst. 2021, 37, 3480–3513. [Google Scholar] [CrossRef]
  27. Baykasoğlu, A.; Kaplanoğlu, V.; Durmuşoğlu, Z.D.U.; Şahin, C. Integrating fuzzy DEMATEL and fuzzy hierarchical TOPSIS methods for truck selection. Expert Syst. Appl. 2013, 40, 899–907. [Google Scholar] [CrossRef]
  28. Farooque, M.; Jain, V.; Zhang, A.; Li, Z. Fuzzy DEMATEL analysis of barriers to Blockchain-based life cycle assessment in China. Comput. Ind. Eng. 2020, 147, 106684. [Google Scholar] [CrossRef]
  29. Giri, B.C.; Molla, M.U.; Biswas, P. Pythagorean fuzzy DEMATEL method for supplier selection in sustainable supply chain management. Expert Syst. Appl. 2022, 193, 116396. [Google Scholar] [CrossRef]
  30. Tadić, S.; Zečević, S.; Krstić, M. A novel hybrid MCDM model based on fuzzy DEMATEL, fuzzy ANP and fuzzy VIKOR for city logistics concept selection. Expert Syst. Appl. 2014, 41, 8112–8128. [Google Scholar] [CrossRef]
  31. Du, S. Hybrid Kano-DEMATEL-TOPSIS model based benefit distribution of multiple logistics service providers considering consumer service evaluation of segmented task. Expert Syst. Appl. 2023, 213, 119292. [Google Scholar] [CrossRef]
  32. Wu, H.-H.; Chang, S.-Y. A case study of using DEMATEL method to identify critical factors in green supply chain management. Appl. Math. Comput. 2015, 256, 394–403. [Google Scholar] [CrossRef]
  33. Yang, J.L.; Tzeng, G.-H. An integrated MCDM technique combined with DEMATEL for a novel cluster-weighted with ANP method. Expert Syst. Appl. 2011, 38, 1417–1424. [Google Scholar] [CrossRef]
  34. Quiñones, R.S.; Caladcad, J.A.A.; Himang, C.M.; Quiñones, H.G.; Castro, C.J.; Caballes, S.A.A.; Abellana, D.P.M.; Jabilles, E.M.Y.; Ocampo, L.A. Using Delphi and fuzzy DEMATEL for analyzing the intertwined relationships of the barriers of university technology transfer: Evidence from a developing economy. Int. J. Innov. Stud. 2020, 4, 85–104. [Google Scholar] [CrossRef]
  35. Zheng, Q.; Shen, S.-L.; Zhou, A.; Lyu, H.-M. Inundation risk assessment based on G-DEMATEL-AHP and its application to Zhengzhou flooding disaster. Sustain. Cities Soc. 2022, 86, 104138. [Google Scholar] [CrossRef]
  36. Dytczak, M.; Ginda, G. Is explicit processing of fuzzy direct influence evaluations in DEMATEL indispensable? Expert Syst. Appl. 2013, 40, 5027–5032. [Google Scholar] [CrossRef]
  37. Zhang, Z.; Zhang, Z.; Dai, S.; Zhang, Y.; Chen, X. A large group hesitant 2-tuple linguistic decision-making trial and evaluation laboratory (DEMATEL) method to evaluate performance indicators. Inf. Sci. 2023, 647, 119408. [Google Scholar] [CrossRef]
  38. Jin, W.; Huang, C.; Qiu, D.; Xu, H. The Study on Identification of Key Factors of Emergency Material Support Capability Based on Hybrid Decision-making Method. Oper. Res. Manag. Sci. 2020, 29, 78–83. [Google Scholar]
  39. Jin, W.; Zhang, Y. An IFS-IVIFS-DEMATEL Method to Identify Critical Success Factors of Cross-Department Coordination of Emergency Management. Sustainability 2023, 15, 8620. [Google Scholar] [CrossRef]
  40. Kwak, D.-S.; Kim, K.-J. A data mining approach considering missing values for the optimization of semiconductor-manufacturing processes. Expert Syst. Appl. 2012, 39, 2590–2596. [Google Scholar] [CrossRef]
  41. Ramezani, R.; Maadi, M.; Khatami, S.M. A novel hybrid intelligent system with missing value imputation for diabetes diagnosis. Alex. Eng. J. 2018, 57, 1883–1891. [Google Scholar] [CrossRef]
  42. Beyad, Y.; Maeder, M. Multivariate linear regression with missing values. Anal. Chim. Acta 2013, 796, 38–41. [Google Scholar] [CrossRef] [PubMed]
  43. Tsai, C.-F.; Li, M.-L.; Lin, W.-C. A class center based approach for missing value imputation. Knowl.-Based Syst. 2018, 151, 124–135. [Google Scholar] [CrossRef]
  44. Khan, H.; Wang, X.; Liu, H. Missing value imputation through shorter interval selection driven by Fuzzy C-Means clustering. Comput. Electr. Eng. 2021, 93, 107230. [Google Scholar] [CrossRef]
  45. Tian, J.; Yu, B.; Yu, D.; Ma, S. Missing data analyses: A hybrid multiple imputation algorithm using Gray System Theory and entropy based on clustering. Appl. Intell. 2013, 40, 376–388. [Google Scholar] [CrossRef]
  46. Silva-Ramírez, E.-L.; Pino-Mejías, R.; López-Coello, M. Single imputation with multilayer perceptron and multiple imputation combining multilayer perceptron and k-nearest neighbours for monotone patterns. Appl. Soft Comput. 2015, 29, 65–74. [Google Scholar] [CrossRef]
  47. Dinh, D.-T.; Huynh, V.-N.; Sriboonchitta, S. Clustering mixed numerical and categorical data with missing values. Inf. Sci. 2021, 571, 418–442. [Google Scholar] [CrossRef]
  48. Ding, Y.; Ross, A. A comparison of imputation methods for handling missing scores in biometric fusion. Pattern Recognit. 2012, 45, 919–933. [Google Scholar] [CrossRef]
  49. Wang, H.; Yuan, Z.; Chen, Y.; Shen, B.; Wu, A. An industrial missing values processing method based on generating model. Comput. Netw. 2019, 158, 61–68. [Google Scholar] [CrossRef]
  50. Ali, A.; Abu-Elkheir, M.; Atwan, A.; Elmogy, M. Missing values imputation using Fuzzy K-Top Matching Value. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 426–437. [Google Scholar] [CrossRef]
  51. Abreu, P.; Santos, D.; Barbosa-Povoa, A. Data-driven forecasting for operational planning of emergency medical services. Socio-Econ. Plan. Sci. 2023, 86, 101492. [Google Scholar] [CrossRef]
  52. Xie, X.-Y.; Ling, C.-D.; Liu, W.; Wei, J. Inter-team coordination, information elaboration, and performance in teams: The moderating effect of knowledge integration capability. J. Bus. Res. 2022, 149, 149–160. [Google Scholar] [CrossRef]
  53. Acharya, C.; Ojha, D.; Gokhale, R.; Patel, P.C. Managing information for innovation using knowledge integration capability: The role of boundary spanning objects. Int. J. Inf. Manag. 2022, 62, 102438. [Google Scholar] [CrossRef]
  54. Zhou, X.; Wang, L.; Qin, J.; Chai, J.; Gómez Muñoz, C.Q. Emergency rescue planning under probabilistic linguistic information: An integrated FTA-ANP method. Int. J. Disaster Risk Reduct. 2019, 37, 101170. [Google Scholar] [CrossRef]
  55. Siemiatkowski, M.S.; Deja, M. Planning optimised multi-tasking operations under the capability for parallel machining. J. Manuf. Syst. 2021, 61, 632–645. [Google Scholar] [CrossRef]
  56. Andreassen, N.; Borch, O.J.; Sydnes, A.K. Information sharing and emergency response coordination. Saf. Sci. 2020, 130, 104895. [Google Scholar] [CrossRef]
  57. Tsegmed, U.; Rendoo, D.; Tsegmed, O. The importance of improvement of radiation emergency medical preparedness and response system in Mongolia. Environ. Adv. 2022, 9, 100307. [Google Scholar] [CrossRef]
  58. Provan, K.G.; Lemaire, R.H. Core Concepts and Key Ideas for Understanding Public Sector Organizational Networks: Using Research to Inform Scholarship and Practice. Public Adm. Rev. 2012, 72, 638–648. [Google Scholar] [CrossRef]
  59. Carrington, M.A.; Ranse, J.; Hammad, K. The impact of disasters on emergency department resources: Review against the Sendai framework for disaster risk reduction 2015-2030. Australas. Emerg. Care 2021, 24, 55–60. [Google Scholar] [CrossRef]
  60. Almuhaimeed, A.; Alhomidi, M.A.; Alenezi, M.N.; Alamoud, E.; Alqahtani, S. A modern semantic similarity method using multiple resources for enhancing influenza detection. Expert Syst. Appl. 2022, 193, 116466. [Google Scholar] [CrossRef]
  61. Zhu, F.; Chen, H. A Review of Research on Interval Multiple Attribute Decision Making. Fuzzy Syst. Math. 2013, 27, 149–158. [Google Scholar]
  62. Garg, H.; Ali, Z.; Mahmood, T.; Ali, M.R. TOPSIS-method based on generalized dice similarity measures with hamy mean operators and its application to decision-making process. Alex. Eng. J. 2023, 65, 383–397. [Google Scholar] [CrossRef]
  63. Xu, Z. Uncertain Multi-Attribute Decision-Making Method and Its Application; Tsinghua University Press: Beijing, China, 2004. [Google Scholar]
Figure 1. Decision flowchart.
Figure 1. Decision flowchart.
Sustainability 15 14823 g001
Figure 2. Central degree and causal degree.
Figure 2. Central degree and causal degree.
Sustainability 15 14823 g002
Table 1. Factors of EIRS.
Table 1. Factors of EIRS.
FactorsDescription
F1, Information Collection CapabilityIt uses a relevant approach to collect massive amounts of information scattered to ensure the comprehensiveness, accuracy, and timeliness of the information source [8].
F2, Information Integrating CapabilityIt integrates the collected information into the EIRS, which can subsequently provide services for information mining and decision-making coordination [52,53].
F3, Information Plan CapabilityThe scenarios, types, and levels of various emergencies are different. An effective Information Plan Capability can have basic support capabilities for different business plans [51,54,55].
F4, Information Coordination CapabilityIt establishes the decision-making and coordination mechanism of EIRS, which can effectively respond to emergencies and reduce the harm caused by emergencies [11].
F5, Fund Support CapabilityTalents and technologies in emergencies need sufficient financial support to maximize their effectiveness. Investing funds in EIRS can effectively reduce the harm and loss caused by emergencies [6].
F6, Information Mining CapabilityEIRS needs to comprehensively use a series of information technologies to mine and utilize various information resources to promote the improvement of emergency information response capability [23,56].
F7, Equipment Support CapabilityIt refers to the capability to develop, share, integrate, and mine heterogeneous data using appropriate equipment [2,57].
F8, Monitoring and Early Warning CapabilityEIRS needs to monitor trend data of epidemic situation and development in real time and predict the change trend serving for event decision-making [2,51].
F9, Information Security CapabilityIt refers to the generation, transmission, and storage of EIRS information to ensure the reliability and security of data [4].
F10, Organizational Participation CapabilityIt refers to the ability of relevant departments to coordinate their participation in EIRS [58,59].
Table 2. Hybrid initial direct correlation matrix for Expert 1.
Table 2. Hybrid initial direct correlation matrix for Expert 1.
F1F2F3F4F5F6F7F8F9F10
F1053263333[3, 5]
F2[2, 5]0[1, 3]316[2, 4]37
F3340657[2, 5]9[2, 5]4
F42[2, 4]6033[6, 9]42[2, 3]
F53[3, 6]3[1, 3]064545
F6253[3, 6]04663
F7[3, 7]2[6, 9]65[8, 9]022[3, 6]
F8634673[2, 3]058
F956[1, 4][3, 5]324[6, 9]05
F106[3, 4]354956[3, 6]0
Note: ■ indicates the missing values.
Table 3. Virtual matrix of factor F1.
Table 3. Virtual matrix of factor F1.
F1F2F3F4F5F6F7F8F9F10
F1 of Expert 1053263333[3, 5]
F1 of Expert 2054263[3, 5]22
F1 of Expert 305[2, 3]26443[3, 5]3
F1 of Expert 40[6, 8]2[1, 3][6, 9]3[1, 4]42[2, 4]
F1 of Expert 5053245[3, 5]2[3, 5]
F1 of Expert 6052153[1, 4]142
F1 of Expert 70541532[3, 6]42
F1 of Expert 8053745233
F1 of Expert 904[2, 4]3633322
F1 of Expert 100[5, 6][3, 4]36[2, 4]43[2, 3][1, 5]
F1 of Expert 11055634[3, 5]33
Note: ■ indicates the missing values.
Table 4. Remaining HVM of factor F1.
Table 4. Remaining HVM of factor F1.
F1F2F3F4F5F6F7F8F9F10
F1 of Expert 1[0, 0][5, 5][3, 3][2, 2][6, 6][3, 3][3, 3][3, 3][3, 3][3, 5]
F1 of Expert 3[0, 0][5, 5][2, 3][2, 2][6, 6][4, 4][4, 4][3, 3][3, 5][3, 3]
F1 of Expert 4[0, 0][6, 8][2, 2][1, 3][6, 9][3, 3][1, 4][4, 4][2, 2][2, 4]
F1 of Expert 6[0, 0][5, 5][2, 2][1, 1][5, 5][3, 3][1, 4][1, 1][4, 4][2, 2]
F1 of Expert 7[0, 0][5, 5][4, 4][1, 1][5, 5][3, 3][2, 2][3, 6][4, 4][2, 2]
F1 of Expert 9[0, 0][4, 4][2, 4][3, 3][6, 6][3, 3][3, 3][3, 3][2, 2][2, 2]
F1 of Expert 10[0, 0][5, 6][3, 4][3, 3][6, 6][2, 4][4, 4][3, 3][2, 3][1, 5]
Table 5. Comprehensive similarity degree of F1.
Table 5. Comprehensive similarity degree of F1.
Factor F1Expert 1Expert 3Expert 4Expert 6Expert 7Expert 9Expert 10
Expert 108.84098.80398.03948.39948.64439.1002
Expert 38.840908.50358.10438.30938.69728.8412
Expert 48.80398.503509.12148.32438.54939.075
Expert 68.03948.10439.121408.26797.85667.7947
Expert 78.39948.30938.32438.267908.17978.2076
Expert 98.64438.69728.54937.85668.179708.9672
Expert 109.10028.84129.0757.79478.20768.96720
Table 6. Comprehensive similarity sequences of each expert for F1.
Table 6. Comprehensive similarity sequences of each expert for F1.
Expert 1Expert 3Expert 4Expert 6Expert 7Expert 9Expert 10
F17.4047.3287.48257.02637.09837.27067.4265
Table 7. Synthesis matrix.
Table 7. Synthesis matrix.
Expert 1Expert 2Expert 3Expert 4Expert 5Expert 6Expert 7Expert 8Expert 9Expert 10Expert 11
F17.40407.3287.482507.02637.098307.27067.42650
F208.14558.14458.14458.13258.21368.1418.17277.98248.14028.1945
F38.02518.08458.02747.9798.05148.00628.05148.01688.030807.961
F47.89578.03997.97847.82617.84528.10118.18778.10117.92368.09758.0362
F57.96197.88527.91057.98037.784708.08267.97927.9407.89697.897
F607.91287.96197.90898.00057.92867.95727.98098.03228.0497.9465
F78.06128.06927.78457.99518.05318.04948.03548.02328.06927.79027.9955
F87.82657.671907.76057.62227.81057.684507.84097.57487.7213
F98.14397.98927.92427.76487.94668.02788.00247.80478.02788.03188.111
F108.06838.10988.02958.09158.11858.12218.09888.10847.92358.07578.0911
Table 8. The average preference value of each expert.
Table 8. The average preference value of each expert.
Expert 1Expert 2Expert 3Expert 4Expert 5Expert 6Expert 7Expert 8Expert 9Expert 10Expert 11
preference mean value8.92338.88128.80798.82478.86458.86768.86368.86698.82248.858.9124
Table 9. Expert proximity value.
Table 9. Expert proximity value.
Expert 1Expert 2Expert 3Expert 4Expert 5Expert 6Expert 7Expert 8Expert 9Expert 10Expert 11
Expert 1 0.06650.02460.030.02720.00270.01060.10.01920.02530.0716
Expert 2 0.0910.09650.03930.06920.05580.03360.08570.09170.0051
Expert 3 0.00540.05180.02190.03520.12460.00530.00070.0961
Expert 4 0.05720.02730.04060.13010.01080.00470.1016
Expert 5 0.02990.01660.07290.04640.05250.0444
Expert 6 0.01330.10280.01650.02260.0743
Expert7 0.08940.02980.03590.061
Expert 8 0.11930.12530.0285
Expert 9 0.0060.0908
Expert 10 0.0968
Expert 11
Table 10. Imputed values of experts.
Table 10. Imputed values of experts.
ExpertMissing Value PositionExpert with Same IdeaImputed Values
Expert 1F2/F5 and F6/F2Expert 62 and 5
Expert 2F1/F8Expert 114
Expert 3F8/F3Expert 10[4, 5]
Expert 5F1/F6Expert 73
Expert 6F5/F7Expert 13
Expert 8F1/F4 and F8/F3Expert 111 and 4
Expert 10F3/F9Expert 33
Expert 11F1/F4Expert 2[2, 3]
Table 11. New direct incidence matrix of Expert 1.
Table 11. New direct incidence matrix of Expert 1.
F1F2F3F4F5F6F7F8F9F10
F1[0, 0][5, 5][3, 3][2, 2][6, 6][3, 3][3, 3][3, 3][3, 3][3, 5]
F2[2, 5][0, 0][1, 3][3, 3][2, 2][1, 1][6, 6][2, 4][3, 3][7, 7]
F3[3, 3][4, 4][0, 0][6, 6][5, 5][7, 7][2, 5][9, 9][2, 5][4, 4]
F4[2, 2][2, 4][6, 6][0, 0][3, 3][3, 3][6, 9][4, 4][2, 2][2, 3]
F5[3, 3][3, 6][3, 3][1, 3][0, 0][6, 6][4, 4][5, 5][4, 4][5, 5]
F6[2, 2][4, 4][5, 5][3, 3][3, 6][0, 0][4, 4][6, 6][6, 6][3, 3]
F7[3, 7][2, 2][6, 9][6, 6][5, 5][8, 9][0, 0][2, 2][2, 2][3, 6]
F8[6, 6][3, 3][4, 4][6, 6][7, 7][3, 3][2, 3][0, 0][5, 5][8, 8]
F9[5, 5][6, 6][1, 4][3, 5][3, 3][2, 2][4, 4][6, 9][0, 0][5, 5]
F10[6, 6][3, 4][3, 3][5, 5][4, 4][9, 9][5, 5][6, 6][3, 6][0, 0]
Table 12. Weighted new direct incidence matrix.
Table 12. Weighted new direct incidence matrix.
F1F2F3F4F5F6F7F8F9F10
F1[0, 0][5, 5.27][3, 3.36][1.73, 2][5.73, 6][3.09, 3.27][3.27, 3.82][2.82, 3.45][2.73, 3][2.36, 3.27]
F2[3.73, 4.09][0, 0][2.64, 3.27][2.91, 3.09][2.18, 2.27][1, 1.18][5.73, 5.91][1.91, 3.27][3, 3.18][6.82, 7]
F3[2.91, 3.18][4.09, 4.09][0, 0][5.82, 6][5, 5][3.27, 3.36][2.82, 3.18][3, 3][1.91, 2.36][3.82, 3.82]
F4[2, 2][1.91, 2.18][5.82, 5.82][0, 0][5.18, 5.27][1.18, 1.36][7.55, 7.91][2, 2][2, 2][1.73, 2.73]
F5[2.73, 3.18][6.55, 6.91][3, 3][1.09, 1.55][0, 0][3.27, 3.27][3.91, 3.91][4, 4.18][4.09, 4.09][4.73, 4.82]
F6[2.09, 2.09][4.09, 4.09][4.82, 4.82][3.09, 3.09][2.73, 3.18][0, 0][4, 4][5.64, 5.91][5.73, 6.18][2.64, 3.18]
F7[4.82, 5.27][2.09, 2.09][7.45, 8][5.91, 5.91][4.45, 5.09][7.73, 7.82][0, 0][2, 2][2, 2][3.27, 3.55]
F8[5.45, 6.27][3.18, 3.82][3.73, 4.36][5.09, 5.36][7, 7.18][3.09, 3.27][1.91, 2.09][0, 0][5.64, 5.91][8.09, 8]
F9[4.73, 5.09][4.91, 5.09][1.91, 2.45][3.27, 3.45][2.27, 2.27][2.82, 2.82][2.45, 3][7.91, 8.18][0, 0][5.09, 5.09]
F10[5.91, 6.09][4.18, 4.27][3, 3.09][4.27, 4.27][4, 4.18][8.64, 8.91][5, 5][6.45, 6.45][5.73, 6][0, 0]
Table 13. Imputed values of other experts.
Table 13. Imputed values of other experts.
ExpertMissing Value PositionExpert with Same IdeaImputed Values
Expert 1F2/F5 and F6/F2Expert 6[2.2, 2.3] and 4
Expert 2F1/F8Expert 11[2.8, 3.5]
Expert 3F8/F3Expert 10[3.67, 4.33]
Expert 5F1/F6Expert 7[3.1, 3.3]
Expert 6F5/F7Expert 14
Expert 8F1/F4 and F8/F3Expert 11[1.89, 2.11] and [3.67, 4.33]
Expert 10F3/F9Expert 3[1.9, 2.4]
Expert 11F1/F4Expert 2[1.89, 2.11]
Table 14. The new hybrid initial direct incidence matrix by the proposed method.
Table 14. The new hybrid initial direct incidence matrix by the proposed method.
F1F2F3F4F5F6F7F8F9F10
F1053263333[3, 5]
F2[2, 5]0[1, 3]3216[2, 4]37
F3340657[2, 5]9[2, 5]4
F42[2, 4]6033[6, 9]42[2, 3]
F53[3, 6]3[1, 3]064545
F62553[3, 6]04663
F7[3, 7]2[6, 9]65[8, 9]022[3, 6]
F8634673[2, 3]058
F956[1, 4][3, 5]324[6, 9]05
F106[3, 4]354956[3, 6]0
Note: Italic bold means missing values supplement.
Table 15. The new hybrid initial direct incidence matrix by mean imputation.
Table 15. The new hybrid initial direct incidence matrix by mean imputation.
F1F2F3F4F5F6F7F8F9F10
F1053263333[3, 5]
F2[2, 5]0[1, 3]3[2.2, 2.3]16[2, 4]37
F3340657[2, 5]9[2, 5]4
F42[2, 4]6033[6, 9]42[2, 3]
F53[3, 6]3[1, 3]064545
F62453[3, 6]04663
F7[3, 7]2[6, 9]65[8, 9]022[3, 6]
F8634673[2, 3]058
F956[1, 4][3, 5]324[6, 9]05
F106[3, 4]354956[3, 6]0
Note: Italic bold means missing values supplement.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jin, W.; Zhang, Y. Identifying Critical Success Factors of an Emergency Information Response System Based on the Similar-DEMATEL Method. Sustainability 2023, 15, 14823. https://doi.org/10.3390/su152014823

AMA Style

Jin W, Zhang Y. Identifying Critical Success Factors of an Emergency Information Response System Based on the Similar-DEMATEL Method. Sustainability. 2023; 15(20):14823. https://doi.org/10.3390/su152014823

Chicago/Turabian Style

Jin, Weijian, and Yajing Zhang. 2023. "Identifying Critical Success Factors of an Emergency Information Response System Based on the Similar-DEMATEL Method" Sustainability 15, no. 20: 14823. https://doi.org/10.3390/su152014823

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop