情报科学 ›› 2024, Vol. 42 ›› Issue (5): 159-168.

• 博士论坛 • 上一篇    下一篇

GPT牵引负面舆情态势恶化的威胁确证与化解策略研究

  

  • 出版日期:2024-05-05 发布日期:2024-07-26

  • Online:2024-05-05 Published:2024-07-26

摘要:

【目的/意义】对 GPT类技术牵引负面舆情态势恶化引起充分重视,深入考据现象之下的威胁确证与化解
问题,有利于增强忧患意识、建立健全舆情安全感知神经末梢。【方法/过程】通过关系数据模型+情境感知推理+模
拟退火算法完成舆情正负属性判断,利用萤火虫算法嵌套AT树模型分析恶化态势,构建GPT技术牵引作用测度、
威胁建模及分类、威胁确证及应对方法,使之实现通用性威胁识别与监测。【结果/结论】实证分析表明,GPT类技术
确实能在负面舆情态势恶化中起到一定作用,危害程度从低到高的威胁依次为意识形态攻击、歪曲认知共鸣、涟漪
效应催化、负面价值引导与恶性意见领袖。进一步,结合实证结果及中国古代情报学术语“伐谋”之辐射范围提供
了4条面向威胁化解的现实策略。【创新/局限】创新在于,提出一项GPT技术带来的可预见威胁,并围绕化解策略展
开讨论。局限在于,未过多探讨威胁生成动机,也未针对涉舆用户开展深入分析,期待今后提供更全面地研究。

Abstract:

【Purpose/significance】To fully pay attention to the deterioration of negative public opinion caused by GPT technology, and
to conduct in-depth research on the threat confirmation and resolution of problems under the phenomenon, it is beneficial to enhance
awareness of crisis and establish a sound perception of public opinion safety nerve endings
.
【Method/process】The positive and nega⁃
tive attributes of public opinion are determined through a relational data model, situational awareness reasoning, and simulated anneal⁃
ing algorithm. The firefly algorithm is used to nest an AT tree model to analyze the deteriorating situation, and GPT technology traction
measurement, threat modeling and classification, threat confirmation, and response methods are constructed to achieve universal threat
identification and monitoring.【Result/conclusion】Empirical analysis shows that GPT technology can indeed play a certain role in the
deterioration of negative public opinion situations, with threats ranging in severity from ideological attacks, distorted cognitive reso⁃
nance, ripple effect catalysis, negative value guidance, and malicious opinion leaders. Furthermore, based on empirical results and the
radiation scope of the ancient Chinese intelligence academic term "attack strategy", four practical strategies for threat resolution are
provided.【Innovation/limitation】Innovation lies in proposing a foreseeable threat posed by GPT technology and discussing strategies
for resolving it. The limitation is that there has not been much discussion on the motivation for threat generation, nor has in-depth
analysis been conducted on users involved in public opinion. We look forward to providing more comprehensive research in the future.