Most Read

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • Tao Zhou, Jiayi Liu, Shengli Deng
    Abstract (915) RichHTML (907) PDF (46)

    [Purpose/Significance] As a hot application, online knowledge video dissemination effect such as dissemination broadness, recognition and participation is crucial to the platforms. Based on the heuristic-systematic model in information processing, this research examines the factors affecting knowledge video dissemination effect. [Method/Process] 12301 knowledge video data were collected at BiliBili and the corresponding fields of each factor were extracted. Data were analyzed using STATA and the moderation effect of fans number was examined. [Result/Conclusion] The results show that host features, title features, cover features, content topic, video length and tags significantly affect the video dissemination effect, and the number of fans plays a positive moderating role. Thus, the video platforms need to be concerned with these heuristic and systematic cues in order to improve the dissemination effect and achieve competitive advantage.

  • Peixin Jiang, Qinjian Yuan
    Abstract (578) RichHTML (552) PDF (36)

    [Purpose/Significance] The study aims to clarify the evolution of the Interaction Ritual Chain Theory and the current status of its application in information system research, and bridge the gap in the use of the Interaction Ritual Chain Theory in the field of domestic information system research. [Methods/Processes] This paper organized and summarized the domestic and international literature based on the theory of Interaction Ritual Chain, and concluded the achievements, limitations and future research directions worth paying attention to in the research of information system. [Results/Conclusions] Currently, the research topics of Interaction Ritual Chain Theory in information system focus on three aspects, namely, social media user behavior research, information technology service research, and knowledge sharing behavior research. In view of the limitations of the existing research, the future research could be approached from four perspectives, including differentiation of research subjects, diversification of research methodology, segmentation of user groups, and innovation of research direction, continuously enrich the Interaction Ritual Chain Theory in information system.

  • Guo Chen, Zihan Yin
    Abstract (502) RichHTML (336) PDF (20)

    [Purpose/Significance] Health informatics is in a stage of vigorous development.This paper aims to examine the current research status of health informatics in the field of information resource management both domestically and internationally with the purpose of providing reference for the further development of health informatics in the field of information resource management in our country. [Method/Process] This study collected 1 236 relevant papers on health informatics from 43 domestic and foreign information resource management journals over the past three years.The research topics were classified and coded using content analysis method.This study carefully selected a total of 228 representative papers under each topic and conducted a comprehensive review aiming to summarize the characteristics and identify similarities and differences in research between these domestic and international papers. [Result/Conclusion] The research topics of health informatics in the field of information resource management are categorized into three fundamental themes: health information needs and search behavior, research on health information technology, and health information services.There are four cross-cutting topics: public health and healthcare, health information literacy, bibliometrics in health informatics, and health information in social media.Certain differences exist between domestic and foreign studies on health information needs and behavior as well as health information technology.The further development of health informatics in our country can draw lessons from foreign experience, focus on the health information needs and services of specific target groups, and enhance the application of information technology in health informatics.

  • Zhenlu Wang, Xiaoqin Gao, Liang Chen
    Abstract (404) RichHTML (373) PDF (27)

    [Purpose/Significance] As an important driving force for the innovative development of humanities and social sciences, Interdisciplinary/Integrated Studies is an inevitable way to solve complex problems. As an important carrier of cross-research, the Interdisciplinary/Integrated Research Program in Humanities and Social Sciences of the Ministry of Education has played an active role in promoting cross-research in humanities and social sciences in recent years, and aims to provide useful insights and references for future cross-research in humanities and social sciences through the research. [Method/Process] This study systematically analyzed 4045 Interdisciplinary/Integrated research projects funded by the Ministry of Education (MOE)over the past decade(2014—2023)using a combination of quantitative and qualitative methods to explore the number of projects, types, their distribution, research topics, and trend. [Result/Conclusion] The study found that interdisciplinary research in the humanities and social sciences has grown steadily in both quantity and depth, and the research topics cover a wide range. Important research hotspots have emerged in Urban and rural social development and special group issues, environmental protection and sustainable development, regional economy and industrial transformation and upgrading, cultural heritage and innovative development, artificial intelligence and information technology application, mental health and educational innovation. It also introduces the integration of multiple disciplines, combining empirical research and theoretical exploration, focusing on real problems, and giving equal importance to innovation and practicality as the characteristics of cross-cutting research.

  • Jing Zhao, Mingyang Ni, Qian Zhang, Yaping He, Linlin Wang
    Abstract (397) RichHTML (357) PDF (49)

    [Purpose/Significance] The study aims to explore the influencing mechanism of graduate students' willingness to use AIGC consistently for academic practice, so as to provide theoretical basis and practical guidance for promoting the humanized application of AIGC in the academic field. [Method/Process] The study integrated UTAUT2 model and TTF theory, used structural equation model, the key factors of graduate students' willingness to continue to use AIGC for academic practice. [Result/Conclusion] The results show that performance expectations, individual innovativeness and effort expectations significantly affect the willingness to continue using; task characteristics and technology characteristics significantly affect task-technology matching; task-technology matching does not hold a direct effect on the willingness to continue using, but plays an indirectly significant role in it by affecting the performance expectations; and the academic code of ethics plays a positive moderating role in the path of the community's influence.This study remedies the neglect of specific subjects and the insufficient explanatory power of qualitative analysis in existing studies.

  • Weiyu Yan, Jianhua Wu, Qinjian Yuan
    Abstract (361) RichHTML (343) PDF (39)

    [Purpose/Significance] To help the academic community to deeply understand the development process of task-technology fit theory and its application status in the field of information systems, and to provide reference for the follow-up research. [Method/Process] By searching and sorting out the relevant literature on the use of task-technology fit theory in the field of information systems, the achievements, limitations and future research directions of current research were systematically summarized. [Results/Conclusion] The application research of task-technology fit theory in the field of information system mainly focuses on four aspects: users' willingness to use information technology, users' performance in using information technology, the influence of information technology on users' satisfaction, and users' willingness to use information technology continuously. There are some limitations in the research, such as "lack of research on group level", "less attention to users' cognitive and emotional state", "lack of horizontal comparison of technologies in different scenarios" and "lack of research on the feasibility of introducing new technologies". Expanding the connotation and application of task-technology fit theory, comparing the application of technology in different scenarios and exploring new application scenarios of new technologies are the research directions worthy of attention in the future.

  • Yanfeng Zhang, Min Liu
    Abstract (353) RichHTML (285) PDF (54)

    [Purpose/Significance] The study aims to explore the influencing factors and generating mechanisms of digital hoarding behavior of mobile social media users, which is helpful to enrich the theoretical paradigm of information behavior research and provide theoretical guidance and practical reference for in-depth analysis of the phenomenon. [Method/Process] Based on the I-PACE theoretical model framework, the study analyzed the model elements of mobile social media users' digital hoarding behavior from the four dimensions of"person-affect-cognition-execution"and used a qualitative method, phenomenography, to dig into the intrinsic mechanism of the behavior, and constructed the relationship model of the mechanism of mobile social media users' digital hoarding behavior. [Result/Conclusion] The results reveal that the mechanism of digital hoarding behavior of mobile social media users is consist of four sub-mechanisms: attention triggering, cognitive judgement, perceptual control, and behavioral feedback.

  • Haiqun Ma, Wenbo Cui, Tao Zhang
    Abstract (352) RichHTML (308) PDF (36)

    [Purpose/Significance] To reveal the evolution law of data security policy is of great significance for improving the data security policy system. [Method/Process] In this study, The paper selected 547 data security policy documents and used the NMF topic model to perform topic mining.And it combined with Word2Vec word vector model to visualized and analyzed the data security policies from two perspectives: topic content evolution and topic intensity evolution. [Results/Conclusion] Topics such as network security, emergency response, security protection, and personal privacy were identified, the content of the topic evolution exhibits aggregation, while the evolution domain exhibits diffusion; Besides, the overall evolution trend of core topics such as data opening and public data keeps increasing, while the proportion of core topics' policies such as personal privacy, controllable security, monitoring and early warning is unbalanced.In light of the above results and the current situation of data security governance in China, four suggestions were put forward: continue to strengthen the coordination between data openness and security; Strengthen the data security governance of the whole process; Improve the data security governance mechanism that integrates technology and policy; Balanced policy topics evolve attention allocation.

  • Chuang Hong, Zhongming Li, Jinteng Xu
    Abstract (344) RichHTML (248) PDF (24)

    [Purpose/Significance] Carrying out quantitative analysis of policy texts on health information services for the elderly is conducive to the formulation and optimization of subsequent policies, and is of great significance in promoting the development of health information services for the elderly and actively responding to population aging. [Method/Process] On the basis of a comprehensive study of the policy texts on health information services for the elderly formulated by government departments at the provincial level and above in China, a policy econometric analysis method was used to explore the use of policy tools, policy objectives, and participant subjects and their operational characteristics in the current policy system. [Result/Conclusion] The study found that there are some problems in the current health information service policy for the elderly in China, such as the imbalance of policy tool structure, the coordination of policy objectives needs to be strengthened, and the functional space of participant subjects needs to be released. Based on this, it is suggested to improve the policy supply from three aspects: optimizing the collocation of policy tools, balancing the allocation of policy objectives, and mining the value of participant subjects, so as to promote the high-quality development of health information services for the elderly in China.

  • Datian Bi, Weixin Huang, Yufei Wang, Chuanqing Wang
    Abstract (328) RichHTML (283) PDF (64)

    [Purpose/Significance] By combing the relevant literature at home and abroad in the past ten years, the paper grasps the characteristics and shortcomings of the research on user across social media information behavior, and puts forward the research direction worthy of attention, so as to provide assistance for the development and theoretical breakthrough in this field. [Method/Process] Based on the literature retrieval, the study screened the literature according to the research purpose and quality evaluation. Then, the paper conducted a content analysis to summarize and sort out the literature from the aspects of concept definition, theoretical basis and subject classification. [Result/Conclusion] The research on users across social media information behavior has such conceptual connotations as diversity of user types, heterogeneity of social media, consistency of information clues and collaboration of behavior patterns. The theoretical basis focuses on research background, information needs and information behavior, and the research topics can be classified into information behaviors of different users in different social media and information behaviors of the same user in different social media. At the same time, based on the shortcomings of existing research, future research would further expand the extension of conceptual features, build a proprietary theoretical model and dig deep into its practical value.

  • Yu Shen, Yingqun Li, Jialong Liu, Jiangfeng Liu, Ningyuan Song, Lei Pei, Jing Zhang
    Abstract (318) RichHTML (287) PDF (53)

    [Purpose/Significance] Simulation based on system dynamics can comprehensively capture the dynamics of complex social systems under the influence of policies, accurately simulate the cumulative impact of policy interventions over time, and evaluate the implementation effect of policies, which plays an extremely important role in promoting the scientific and efficient formulation and use of policy tools and improving the effectiveness of policies. [Method/Process] Taking the implementation of fertility policy as an example, based on key influencing factors such as fertility rate and environmental influencing parameters such as education and economy, this paper constructed a simulation system based on system dynamics through Vensim PLE.The model dynamically demonstrated the interactions between the population—policy—economy subsystems and designed and implemented three differentiated policy intervention scenarios, and conducted in-depth simulations to predict the paths of demographic change and the evolutionary trends under different policy orientations. [Result/Conclusion] It is found that the liberalization of fertility policies had effective in mitigating the ageing trend while promoting population growth.However, the impact of the policy is waning and structural changes and adjustments are urgently needed.

  • Yafei Li, Wenqian He, Xiaoyu Liu, Lei Pei, Ye Chen, Xing Peng
    Abstract (318) RichHTML (303) PDF (37)

    [Purpose/Significance] The digital economy policy has become an important policy tool for the government to promote economic development, and an empirical analysis of the effectiveness of China's local digital economy policy implementation can be helpful to promote the local economy to achieve high-quality development. [Method/Process] This paper examined the impact of local digital economic policies on regional economic development using the PSM-DID method with panel data from 337 prefecture-level and above cities in China from 2010 to 2021. [Result/Conclusion] Local digital economic policies significantly promote regional economic growth.However, their promotional effects exhibit a two-year time lag.The implementation of digital economic policies proves to be more effective in cities with larger population sizes or higher administrative levels.Additionally, the impact of digital economic policies on regional economies in central and western regions exceeds that in eastern regions.

  • Qian Zhang, Haiqun Ma, Xiaohong Niu
    Abstract (317) RichHTML (290) PDF (35)

    [Purpose/Significance] Data security policies play an important role in ensuring and promoting the development of data security industry.Quantitative evaluation of the current effective data security policies will provide reference for the formulation of subsequent policies. [Method/Process] Selecting the data security policies formulated by governments at all levels from 2016 to the present as the research object.Through ROSTCM6 extracted high-frequency words and drawn social network mapping, selecting 10 highly representative data security policies, regulations and other documents, the policy name codes are noted as P1, P2…P10.With reference to the evaluation indexes of PMC model related studies, constructing the quantitative evaluation index system of data security policies. [Results/Conclusion] The data security policies are generally fair, P2 is excellent grade, P1 is good grade, P3, P6 and P9 are passing grade, P4, P5, P7, P8 and P10 are poor grade, which performs well in terms of the nature of policy, policy timeliness, policy area and policy receptor, and needs to be improved in terms of the focus of the policy and the policy tools.

  • Junping Qiu, Wei Huang, Yutian Fu, Zixian Tong
    Abstract (293) RichHTML (258) PDF (35)

    [Purpose/Significance] WeChat has become the main source for people to receive information, but medical and health official accounts often publish false, poor-quality, inaccurate, confusing, and inducing health information.Whether users have online health information screening ability is the primary basis for the improvement of their health information literacy, so it is of great significance to explore the factors influencing the level of WeChat users' screening ability. [Method/Process] The study collected relevant research data through a questionnaire survey and used it as a basis to construct a univariate health information discernment Partial Least Squares Regression(PLSR)model.The importance of each influencing factor was gauged by calculating the projection importance of various influencing factor indicators. [Result/Conclusion] Research reveals that the most prominent influences on users' ability to discern health information are content updates, information readability, and government promotion.Source credibility, media promotion, information content professionalism, expert recommendations, health information attention, and social consensus have a secondary impact.Factors with a lower impact include education level, income level, and age.

  • Yu Chen, Zewen Hu, Xiji Zhou
    Abstract (292) RichHTML (246) PDF (23)

    [Purpose/Significance] As the core content of intellectual property rights, patents are an important fundamental resource for global technological, economic, and strategic competition.In recent years, the number of patents has skyrocketed, and the status of patent information as a"technology gold mine"continues to be questioned, making knowledge discovery in massive patent data increasingly valuable.The article provides a comprehensive and in-depth interpretation of international high-value patent research, which is beneficial for providing reference for researchers, enterprises, and technical personnel. [Method/Process] This paper first comprehensively used TF-IDF algorithm and LDA topic model to mine hot topics of international high-value patent research, and then used the Grounded theory to carry out bottom-up three-level coding of international high-value patent research hot topic and literature to achieve an overview of international high-value patent main research topic categories. [Result/Conclusion] International high-value patents have formed 7 thematic categories, with two main categories of topics: patent value evaluation and core patent value prediction being hot topics in international high-value patent research; Patent value evaluation includes 3 aspects: multi-dimensional evaluation indicators of patent value, patent value evaluation methods, and factors affecting patent quality; The prediction of core patent value includes research on core patent features and core patent recognition methods, mainly including machine learning methods, text mining methods, and citation network analysis.

  • Weiwei Yan, Canyu Cao
    Abstract (283) RichHTML (243) PDF (31)

    [Purpose/Significance] The study aims to understand users' preferences of knowledge exchange on different platforms can be achieved by analyzing the topics discussed across multiple platforms, and construct a user portrait labeling system, which can help platforms provide more personalized optimization strategies and improve interplatform ecological construction. [Method/Process] The study collected original blog posts and user data related to ChatGPT topics from three typical platforms: mass social platform, interest exchange platform, and vertical knowledge community.Next the BERTopic model was adopted to condense knowledge exchange topics.Then, the study extracted portrait labels from four dimensions: natural attributes, social attributes, knowledge exchange behavioral attributes, and knowledge exchange thematic attributes.To realize user profiles, present group characteristics, and compare platform differences, the study used K-means clustering to implement a user portrait labeling system. [Result/Conclusion] The study has identified 46 different topics and directions for knowledge exchange on 8 major cutting-edge science and technology subjects.These subjects include application scenarios, industry progress, future exploration, related industries, consultation and help, hot topics, experience of use, and risk supervision.Furthermore, the study has classified the users into 4 categories based on their attribute characteristics.These categories are professional contribution, comprehensive sharing, social knowledge-seeking, and topic potential.The study also finds significant differences between platforms in terms of knowledge exchange topics and user profiles.Therefore, platforms should adopt differentiated incentives to enhance platform user stickiness.

  • Lei Pei
    2025, 45(1): 4-4.
    Abstract (280) RichHTML (235) PDF (23)
  • Hailing GUO, Zhongshan LIU, Jinjin WEI
    Abstract (278) RichHTML (240) PDF (32)

    [Purpose/Signficance] Under the background that cross-border data flows boost the development of globalization, this paper explores the path of collaborative governance of China's cross-border data flows, and provides reference for improving the efficiency of collaborative governance of China's cross-border data flows. [Methods/Process] This paper introduced the SFIC collaborative governance theoretical model and modifies it for applicability.By analyzing the practical difficulties of cross-border data flow collaborative governance in China, it proposed solutions based on the modified SFIC model. [Results/Conclusions] A five-dimensional relief path framework of"Starting Conditions-institutional design-Facilitative Leadership-collaborative process-evaluation and feedback"is constructed, and a number of specific measures are put forward, such as cultivating collaborative governance culture, stimulating the enthusiasm of collaborative subjects for governance, and building a unified collaborative governance platform.It aims to promote the long-term, sustainable and healthy development of collaborative governance of China's cross-border data flow.

  • Yanqi Shen, Xiaokang Song, Qinghua Zhu
    Abstract (268) RichHTML (230) PDF (50)

    [Purpose/Significance] Online surrogate health information seeking has become an important way for information vulnerable groups to bridge the digital divide.From the perspective of substituted searchers, studying the impact of online surrogate health information seeking on health literacy of the elderly has important reference significance for further understanding the behavioral effects of surrogate seeking. [Method/Process] Based on social cognitive theory, this paper constructed the influence model of online surrogate health information seeking on health literacy of the elderly, and put forward five hypotheses.A questionnaire survey was used to collect 238 valid sample data of the elderly.SPSS and SmartPLS software were used for subsequent data analysis and hypothesis test. [Result/Conclusion] Social interaction, online surrogate health information seeking and health consciousness all positively affect the health literacy of the elderly, and the elderly's health consciousness is the most important factor affecting their health literacy.Through the moderating effect analysis, it finds that health consciousness could positively moderate the impact of online surrogate health information seeking on health literacy of the elderly, and social interaction negatively moderate the impact of online surrogate health information seeking on health literacy of the elderly.

  • Zewen Hu, Mengya Wang, Yarong Han
    Abstract (254) RichHTML (230) PDF (45)

    [Purpose/Significance] Mining and visualizing the global disruptive technology, such as the emerging and hot technical topics and their evolution differences implied in the global blockchain patent literature can provide for practitioners in the field, science and technology policy makers, management departments and science and technology research and development personnel. [Method/Process] Based on the patent literature in the global blockchain field, different time slices were divided in a timely order. LDA topic model, Word2vec word vector model, and BERT language model were comprehensively utilized to build the technical topic mining model in the blockchain field. At the same time, four-dimensional indicators, including topic popularity, topic population, topic technicality and topic novelty were constructed to identify the hot technology topics and emerging technology topics in the field of blockchain. These were then combined with the topic evolution model to carry out evolutionary analysis on the emerging hot topics. [Result/Conclusion] The research finds that the LDA2Vec-BERT topic recognition and evolution model could identify emerging and hot technical topics in the field based on the massive patent literature in the field of blockchain, and visually and clearly displays the evolution trend and characteristics of the topic of blockchain technology, and finds the development trend of blockchain technology from architecture research to application research. By comparing the model results, it can be found that the empirical results are reasonable, and the accuracy rate, recall rate and F1 value of the model are higher than other recognition models, which proves that the method has the good effect on the recognition of disruptive technology topics.

  • Qian Su, Xuemei Ji
    Abstract (245) RichHTML (210) PDF (32)

    [Purpose/Significance] Data stories are the combination of data and stories, with narrative and structural characteristics.From the perspective of narrative structure theory, the structural elements of data stories can be clarified, and then a data story model can be constructed to guide data story creation. [Method/Process] Firstly, based on the theory of narrative structure, this paper analyzed the structure of data story from four levels: story points, narrative intention, narrative logic, and visual effects.Thus, the framework of data story model was constructed.Secondly, this paper constructed the data story model from four levels: raw material layer, target layer, structural layer, and presentation layer to explain the lifecycle of data story construction.Finally, an example analysis was conducted by creating a data story on agricultural carbon emissions in Shandong Province. [Result/Conclusion] This model could guide the generation of data story and the presentation of structural elements, and has certain theoretical and practical significance for improving the readability, comprehensibility, and logicality of data.

  • Yuan Hu, Huijuan Tang, Liwei Ma, Guodong Chen
    Abstract (244) RichHTML (208) PDF (31)

    [Purpose/Signficance] The study aims to indentify and analyze the key influencing factors of users' negative emotions helps to respond more effectively to the spread of users' negative emotions in the network public opinion of public emergencies and maintain social stability and harmony. [Method/Process] Based on the affective-cognitive theory and integrating crisis schema theory, the theoretical framework of the influencing factors of users' negative emotions was constructed by combining with the existing research and the actual data.Questionnaire survey and DEMATEL method were used to analyze the influencing factors and the key degree of users' negative emotions in public emergencies, and the key influencing factors were identified. [Result/Conclusion] The study finds that the key influencing factors include nine factors: event itself, security crisis, social system, social culture and government credibility, subject empathy, interest appeal, risk perception and group identity.Based on the discovery, this paper provides feasible strategies for guiding negative emotions of users from three perspectives.

  • Wenhong Zhou, Xinyu Wang, Zhe Chen, Miao Peng
    Abstract (243) RichHTML (196) PDF (37)

    [Purpose/Significance] Investigating into practice progress of authorized public data operation, aiming to identifying optimized strategies, which contributes to theoretical and methodological system of data elements. [Method/Process] By analyzing the public information of relevant provinces and cities, the current situation of practice were sorted out from three aspects: operation positioning, action elements including action subject, data object, operation mode, operation results and policy and platform protection. [Results/Conclusion] Based on the practical analysis of all aspects of public data authorization operation, the optimization prospect was further proposed: to achieve the balance of multi-dimensional construction and accurate positioning of public data authorization operation, expand and deepen the action elements of public data authorization operation in the process of innovation and exploration, strengthen the allocation of elements of public data authorization operation guarantee, and promote the construction of a national integrated collaborative system.

  • Xinjian Wang, Guangwei Hu
    Abstract (229) RichHTML (197) PDF (22)

    [Purpose/Significance] Precision is the goal of the development of community elderly care services and an important standard for measuring the level of community elderly care services.There is a supply-demand contradiction in the current development of community elderly care services, and the level of precision needs to be improved.The rapid development of digital intelligent environments such as big data and artificial intelligence has brought historical opportunities to improve the precision of community elderly care services, and research and exploration of the influence mechanism on the precision level of community elderly care services is a prerequisite for improving the precision of services. [Method/Process] Based on the value-network model, the grounded theory research method was used to conduct coding analysis on the semi-structured survey interviews with representatives of relevant participants in community elderly care services with reference to the classic grounded theory paradigm of"context-conditions-action-results", and the influence mechanism of value-network on the community elderly care precision services in digital intelligence environment was researched. [Result/Conclusion] A"Rocket Model"of the influence mechanism is constructed to analyze the influencing factors and mechanism of value-network on the precision of community elderly care services from three levels: macro, meso and micro.Among them, "Digital Intelligence Technology Empowerment"is the key influencing factor.The study answers the question of "what is the influence mechanism of value-network on community elderly care precision services in the digital environment", and points out the direction for further exploration of specific strategies to improve the precision level of community elderly care services.

  • Yujuan He, Shengming Fan, Yue Zhang
    Abstract (228) RichHTML (178) PDF (35)

    [Purpose/Significance] With the development and popularization of information technology, a series of irrational group behavior such as cyberbullying, rumor spreading, and fanaticism has emerged on the Internet, seriously disrupting the orderly process in cyberspace and even the entire society.A systematic and in-depth exploration of online irrational group behavior at the theoretical level is beneficial for understanding and governance. [Method/Process] Firstly, the concept of online irrational group behavior was analyzed according to the view of Socio-Technical Interaction Network.Then, existing relevant studies were reviewed.Finally, the theoretical basis, research perspectives and methods, driving factors and corresponding mechanisms of online irrational group behavior were summarized and extracted, constructing a theoretical framework. [Result/Conclusion] The concept of online irrational group behavior includes three components: group irrationality, human-technology interaction, and social interaction.This study integrates existing research results and constructs a framework, which could promote future research to focus on deeper issues in more diverse ways, and help to conduct governance practices more completely and specifically.

  • Jingyuan Kong, Datian Bi, Yang Yang, Lu Wang, Xue Zhang
    Abstract (224) RichHTML (184) PDF (57)

    [Purpose/Significance] Combining the theory of super network to identify key nodes in cross-social media public opinion dissemination has practical implications for relevant departments to regulate online public opinion and ensure network information security. [Method/Process] The research selected specific online public opinion events and used the same user algorithm across social media to identify information users participating in cross-social media public opinion dissemination. Based on super network theory, various subnets in cross-social media public opinion communication were modelled, and methods such as natural language processing, topic mining and sentiment analysis were integrated to explore key nodes in the process of cross-social media public opinion communication. [Result/Conclusion] Research found that the cross-social media public opinion key node identification method proposed in this study can identify and interpret key nodes in the process of cross-social media public opinion dissemination from different perspectives, thereby better describing the dissemination process and characteristics of cross-social media public opinion, and providing new research methods and ideas for the study of cross-social media public opinion dissemination.

  • Xiwei Wang, Zhe Sun, Yibing Jiang, Yueqi Li
    Abstract (216) RichHTML (169) PDF (88)

    [Purpose/Significance] Social media has become an essential medium for the spread of online rumors due to its wide audience and rapid dissemination. In light of the harmful effects of online rumors, understanding how to effectively control their spread and timely debunk them holds significant theoretical and practical implications for governing the cyberspace ecology. [Method/Process] This study proposed a method to identify themes in online rumor debunking and to categorize users' emotional attitudes. It determined the number of topics using the Latent Dirichlet Allocation (LDA)algorithm and constructed user-level and community-level echo chamber networks based on the optimal number of topics. The study presented a model for analyzing the echo chamber effect in social media networks that debunk rumors and established the analysis formula and test parameters for this effect. Utilizing data from the"China Eastern Airlines MU5735 crash"online public opinion topic, the study analyzed the identification and emotional distribution of six online rumor debunking themes. It further examined the network structure of user comments and forwarding subnets within the echo chamber network, related to the six debunking themes. The study also calculated the homogeneity of each virtual community theme in the comment and forwarding subnets of the echo chamber effect for each debunking theme. [Result/Conclusion] The study finds that an echo chamber effect exists in the transmission process of debunking rumored information in social networks. The forwarding process exhibits stronger network homogeneity than the comment process, and users who comment show higher ambivalence than those who forward the information.

  • Xuewen Huang, Jianlin Yang
    Abstract (213) RichHTML (151) PDF (13)

    [Purpose/Significance] Highly targeted and highly free collaborator recommendation services can promote the sharing of knowledge and resources among scientific researchers, and enhance the quality and efficiency of scientific research. [Methods/Process] Based on the idea of the hybrid recommendation method, the paper designed a framework of the recommendation scheme of scientific collaborators from the perspective of scholars' motivation for scientific cooperation and gave a specific implementation process.Firstly, the paper designed several recommendation indicators based on scholars' research topics to meet the needs of collaborators pursuing similarity, topic designation, or topic complementarity.Secondly, the paper designed some recommendation indicators based on the cooperation network to meet the needs of those seeking authoritative collaborators and provided a calculation scheme.Finally, the paper synthesized those indicators based on the weights requested by scholars. [Result/Conclusions] Taking the field of information science as an example, the paper conducts an empirical study on the proposed scientific collaborator recommendation scheme.The results show that the scientific collaborator recommendation scheme combined with the research topics in the field and the relationship network of scholars can accurately identify the candidate collaborators with higher social capital intensity, and can better adapt to the personalized needs of the scientific research collaborators.

  • Xianrui Liu, Li Si
    Abstract (211) RichHTML (174) PDF (26)

    [Purpose/Significance] Improving scientific data ethics governance can help regulate the scientific data collection, sharing and use, bring into the function of data as a key resource and element in research, and optimize scientific data management services. [Method/Process] This study analyzed the scientific data ethics policy using the UK as an example based on the Grounded Theory, summized the policy framework and content, revealed the governance characteristics through matrix coding and Social Network Analysis, and put forward suggestions for the scientific data ethics governance in China. [Result/Conclusion] Results indicate that the scientific data ethics policy framework includes 3 dimensions: the environment, subject and strategy.The environment involves applicable fields, subjects, concept definitions, problem analyses, and existing policies.The subject consists of the definition of governance subjects and collaboration promotion.The strategy includes governance guidance and measures at various stages.Accordingly, this research proposes four pathwayes: forming an ethical governance system, standarizing the ethical theory, clarifying the governance rights and responsibilities of all parties and the way of collaboration, and refining the ethical governance at all stages.

  • Di Wu, Qinjian Yuan
    Abstract (208) RichHTML (177) PDF (12)

    [Purpose/Significance] It aims to help academics gain a deeper understanding of the application and progress of deterrence theory in the field of information systems, so as to provide ideas and directions for future research on the theory in related fields. [Methodology/Process] This paper systematically sorted out and reviewed the domestic and international research literature on the application of deterrence theory in the field of information systems, and summarized the progress and shortcomings made in the research. [Results/Conclusions] The results of the application of deterrence theory in the field of information system mainly focus on "the application of deterrence theory in the study of information system security", "the application of deterrence theory in the study of digital piracy" and "the application of deterrence theory in the study of online piracy". The application of deterrence theory in the study of online social media deviant behaviors"; there are problems such as "insufficient research on the agility perspective of punishment", "lack of cross-country, cross-cultural and cross-platform comparative differences", etc.; the application of deterrence theory in the study of information system security", "application of deterrence theory in the study of digital piracy" and "application of deterrence theory in the study of online social media deviant behaviors". There are problems such as "insufficient research on the perspective of punishment" and "lack of cross-cultural and cross-platform comparative research".

  • Siguleng Wuji, Xiwei Wang, Miyu Wang
    Abstract (206) RichHTML (150) PDF (13)

    [Purpose/Signficance] This study aims to explore the opportunities of digital twin technology for enterprise digital transformation and management intelligentization,and compare its differences with the old information resource management mechanism.It emphasizes the information resources orchestration in digital twins,which requires enterprises to rethink their strategies and practices of information resource management to adapt to emerging technologies and digital transformation requirements. [Method/Process] Using the theoretical framework of resource orchestration theory and DIKW chain theory, this study adopted a single case study approach.By combining the digital twin construction process in lean production of SHAC enterprise, it analyzed the motives, processes, and outcomes of information resource orchestration in lean production under digital twin technology using primary and secondary data.Additionally, through case analysis, the DIKW chain, and driving mechanisms of information resource orchestration under digital twin technology were proposed. [Result/Conclusion] The study reveals that under digital twin technology, information resource orchestration in enterprises has the following characteristics: During the resource structuring phase, resource sequencing is a unique element of resource orchestration.In the stage of resource capability, resource enrichment, resource enhancement and resource construction are all the core competencies in enterprise resource orchestration.In the stage of resource leverage, digital twin technology can help enterprises to better deploy and coordinate their resources, and provide important support for the digital transformation of enterprises and the promotion of core competitiveness.

  • Zhe Fan, Wei Zhang
    Abstract (205) RichHTML (181) PDF (25)

    [Purpose/Significance] This article presents a meta-analysis of the factors that affects user sharing behavior in knowledge-based virtual communities. The influencing factors are summarized based on role theory, providing theoretical reference for the healthy development of such communities. [Method/Process] Using the meta-analysis method, this article comprehensively analysed 40 domestic and foreign empirical research literatures related to the sharing behavior of users in knowledge-based virtual communities. Each influential factor verified in existing studies as significantly related to the sharing behavior of users was treated as an independent variable, while the sharing behavior of users was the dependent variable. [Result/Conclusion] In addition to common language and common vision, the sharing behavior of users in knowledge-based virtual communities is significantly influenced by the correlates of the three dimensions of role identity, role consensus, and role expectation. Specifically, 14 factors significantly correlated with users' sharing behaviour in knowledge-based virtual communities, with perceived satisfaction having the strongest correlation and the weakest outcome expectation.

  • Xiwei Wang, Mali Li, Yang Zhao, Zhewei Fan
    Abstract (202) RichHTML (179) PDF (55)

    [Purpose/Significance] AI technology, exemplified by AI-generated content, facilitates the emergence of new quality productive force and multi-dimensional value implications, which can better assist China's digital economy to achieve high-quality development and better promote the innovation of knowledge and intelligence services in China. Analyzing the new mechanisms, risks, and paths of AIGC-enabled knowledge and intelligence innovation services holds significant theoretical and practical importance for promoting the vigorous development of the discipline of information resource management under the major national strategy of new productive force. [Method/Process] Based on the theoretical connotation of new quality productive force, the paper analyzed the internal mechanism of AIGC-enabled knowledge and intelligence service innovation from the perspectives of labor objects, laborers, and labor materials. It identified the risks of AIGC-enabled knowledge and intelligence service innovation from the three dimensions of information source, channel, and information receptor, based on the three elements of information transmission, and proposed governance strategies. The paper also explained the practical path of AIGC-enabled knowledge and intelligence innovation services from the perspective of the composition of new productive force. [Result/Conclusion] The paper shows that under the new quality productive force strategy, AIGC forms an internal mechanism for knowledge and intelligence service innovation. This mechanism relies on data elements, uses basic models for support, and features human intelligence collaboration as its core. The paper also indicates a need for better management of data privacy and security risks, cyberspace security risks, and scientific and technological ethics security risks. This requires leveraging the collaborative advantages of industry, academia, and research. This paper proposes a practical path for promoting AIGC-enabled knowledge and intelligence service innovation. This path involves constructing a new model driven by data elements, forming a new team centered on human-intelligence collaboration, and developing reliable and trustworthy intelligent models.

  • Yanbo Chu, Ping Wang, Shushu Hu
    Abstract (201) RichHTML (169) PDF (25)

    [Purpose/Significance] Against the backdrop of frequent public health incidents, the demand for health information among the public is growing rapidly.Social media as an important way for users to obtain information, not only efficiently spreads health information, but also provides convenient conditions for the generation and dissemination of false health information.With the increasing penetration and influence of social media, users have a stronger sense of uncertainty about health information.In view of this, this article explores the mechanism of trust formation among social media health information users, in order to provide reference and inspiration for subsequent related research. [Method/Process] This paper deconstructed the elements that form user trust in social media health information, constructed a trust framework oriented towards user perception process, proposed a theoretical hypothesis model of user trust in social media health information from three aspects: user, information and environment, and then modified the structural model. [Results/Conclusion] The paper aims to clarify the process of perceived trust and psychological changes among social media health information users from a theoretical perspective.The paper also found that emotional polarity, involvement, source credibility, and conflict resolution have a significant positive impact on trust in hot reviews.Trust has a significant positive impact on adoption intention.Reference group norms have a significant positive impact on adoption intention.Trust plays a complete mediating role between emotional polarity, involvement, source credibility, and conflict resolution and willingness to adopt information in hot reviews.

  • Xi Meng
    Abstract (200) RichHTML (182) PDF (42)

    [Purpose/Significance] The study aims to explore the influencing mechanism of social media users' algorithm awareness on their self-concealment behavior, which is helpful to improve the multi-governance system of algorithm governance in China, and provide a theoretical reference for the privacy management of social media users. [Methods/Process] Based on Privacy Calculus Theory, this paper explored the influencing mechanism of algorithm awareness on social media users' self-concealment behavior, and considered the moderating effect of platform trust.By collecting questionnaires from 730 social media users, the empirical study was conducted by using structural equation model and Bootstrap method. [Results/Conclusion] The results show that algorithm awareness has significant positive effects on privacy concerns, perceived benefits, privacy risk belief and self-concealment.Perceived benefit has no significant effect on privacy risk belief.Privacy risk belief has a partial mediating effect between algorithm awareness and self-concealment.Privacy concern and privacy risk belief have a chain mediating effect between algorithm awareness and self-concealment.Platform trust negatively regulates the relationship between algorithm awareness and self-concealment.

  • Tingting Jiang, Yan Lyu, Shiting Fu
    Abstract (199) RichHTML (170) PDF (28)

    [Purpose/Significance] There is a growing concern that algorithms have led to"filter bubbles"in which people only receive content tailored to their existing inclinations, as opposed to being exposed to diverse information.And the filter bubble is reflected in the selectivity of information consumption and attitude extremity.This study aims to explore the intervention effects of different approaches of prioritization in recommender systems on filter bubbles. [Method/Process] This study recruited 38 participants to visit the mock personalized news recommender system.And they were assigned to groups with different prioritization approaches.This study observed and recorded each participant's clicking behavior and reading behavior through server logs.Additionally, the paper measured the changes in participants' attitude extremity using a scale. [Result/Conclusion] The results show that the approaches of prioritization did not affect the selectivity of users' clicking behavior, but affect the selectivity of users' browsing behavior and change of attitude extremity.Specifically, both time-based ranking and quality-based ranking significantly reduce the selectivity of users' reading behaviors when compared to preference-based ranking.And quality-based ranking also weakens the extremity of users' attitudes to a greater extent.This study not only provides a new research perspective and effective methodology for filter bubble-related research, but also provides practical insights for recommendation systems algorithm design.

  • Mingzhen Song, Runjie Xu, Pengtao Wang
    Abstract (198) RichHTML (174) PDF (33)

    [Purpose/Significance] The study aims to identify and quantitatively evaluate the information quality risk nodes of AIGC academic knowledge service, and propose risk governance strategies based on the ranking of risk values in each stage of the knowledge service process, so as to provide reference for publishing institutions to develop and provide high-quality AIGC academic knowledge service. [Method/Process] Combining the Delphi method, the study used the Work Breakdown System-Risk Breakdown System (WBS-RBS) to identify nodes that may cause information quality risks in the AIGC academic knowledge service process, then quantified and compared the risk values of each risk node using the Risk Breakdown Matrix (RBM). [Result/Conclusion] The AIGC academic knowledge service process contains a total of 79 information quality risk nodes. Among them, the start-up preparation stage has the highest risk value, which should strictly control the deviation of work to build a solid foundation for information quality. The maintenance and optimization stage has the second highest risk value, which should improve the details of work to avoid interference with information quality; The construction and implementation stage has the lowest risk value, which should make up for the omissions to eliminate the hidden dangers of information quality.

  • Ying Wang, Haiqun Ma
    Abstract (197) RichHTML (157) PDF (29)

    [Purpose/Significance] From the perspective of data elements, this paper explores several problems regarding public data security guarantee, hoping to clarify the orientation and nature of public data security guarantee, and provide useful reference for balancing public data security guarantee and public data open utilization practice. [Method/Process] Using the method of speculation and induction, based on analyzing the relationship between five important issues of data elements, the relationship between data elements and data security was clarified and the applicability of data elements as the perspective of studying public data security guarantee was demonstrated. [Result/Conclusion] Public data rights confirmation, public data valuation, improvement of public data security governance system and formation of data transaction ecosystem jointly constitute several issues of public data security guarantee from the perspective of data elements.

  • Haiyun Ma, Xiang Xue
    Abstract (196) RichHTML (164) PDF (49)

    [Purpose/Significance] The public instinctively search for information to alleviate anxiety caused by various threats.However, unconfirmed and exaggerated information disseminated on the Internet can lead to information overload, psychological resistance, and cyber-hypochondria, resulting in information avoidance behavior.Therefore, it become crucial to understand the mechanism of the shift from information-seeking to information-avoidance behavior when studying user behavior during public health emergencies. [Method/Process] The study reviewed the current status of research on users' information-seeking and information-avoidance behaviors, formulated the corresponding hypotheses, constructed the corresponding theoretical models based on the SOR theory, and empirical studies were conducted using questionnaires and structural equation modeling. [Results/Conclusion] This study utilizes the SOR model to uncover the mechanisms that drive the shift from information-seeking to information-avoidance behavior in public health emergencies.The results indicate that when users perceive a threat and seek information, they may encounter information overload, psychological resistance, and cyber-hypochondria, leading to information avoidance behavior.These insights contribute to a better understanding of user information behavior during public health emergencies and offer a practical reference for information governance.

  • Huanqing Dong, Shukun He, Gaohui Cao
    Abstract (193) RichHTML (137) PDF (43)

    [Purpose/Significance] The construction of digital health industry data governance system is the basis for promoting digital health industry data governance activities, improving the government's digital precision industry governance and improving the digital capability of enterprises. [Methods/Process] Firstly, the paper analyzed the data status of the digital health industry and the necessity of data governance, and drew on the PDCA cycle theory to put forward the data governance process.Secondly, based on the data governance specification and the five-element integration theory, the paper designed the logical framework of the data governance system for the digital health industry from the five dimensions of governance subject, governance object, governance activity, governance tool and governance target.Finally, on the basis of the logical framework, the paper constructed the technical architecture of the digital health industry data governance system based on the data center. [Result/Conclusion] The logical framework and technical framework of data governance system for digital health industry constructed in the paper can enhance the value of theoretical system research and technical practice of industrial data governance, provide reference for the data governance practice of digital health industry, promote the digital governance and sustainable development of digital health industry, and improve the data governance capabilities of governments and enterprises.