Most Read

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • Zhe Cao, Shunshun Shi, Lin Zhang, Ying Huang
    Abstract (583) RichHTML (555) PDF (12)

    [Purpose/Significance] This study investigates the interdisciplinary patterns of outstanding scientists from the perspective of academic careers, aims to provide certain insights for individual interdisciplinary pattern selection and the development of disciplinary integration. [Method/Process] Taking the winners of Derek de Solla Price Memorial Medal, the highest award in the field of scientometrics as examples, this study examined their interdisciplinary patterns from two dimensions-publication of papers and sources of knowledge. It delineated their academic careers into four stages-incipient, growth, deepening and maturation-to analyze the evolutionary features of their interdisciplinary patterns. [Result/Conclusion] This study identifies four types of scientists with distinct interdisciplinary patterns-amphibious scientists, indigenous scientists, immigrant scientists and resident scientists. Scientists from these categories exhibit differentiated interdisciplinary performance across various stages of their academic careers. They have made outstanding contributions to the development of scientometrics at different periods.

  • Xinjian Wang, Guangwei Hu
    Abstract (550) RichHTML (509) PDF (26)

    [Purpose/Significance] Precision is the goal of the development of community elderly care services and an important standard for measuring the level of community elderly care services.There is a supply-demand contradiction in the current development of community elderly care services, and the level of precision needs to be improved.The rapid development of digital intelligent environments such as big data and artificial intelligence has brought historical opportunities to improve the precision of community elderly care services, and research and exploration of the influence mechanism on the precision level of community elderly care services is a prerequisite for improving the precision of services. [Method/Process] Based on the value-network model, the grounded theory research method was used to conduct coding analysis on the semi-structured survey interviews with representatives of relevant participants in community elderly care services with reference to the classic grounded theory paradigm of"context-conditions-action-results", and the influence mechanism of value-network on the community elderly care precision services in digital intelligence environment was researched. [Result/Conclusion] A"Rocket Model"of the influence mechanism is constructed to analyze the influencing factors and mechanism of value-network on the precision of community elderly care services from three levels: macro, meso and micro.Among them, "Digital Intelligence Technology Empowerment"is the key influencing factor.The study answers the question of "what is the influence mechanism of value-network on community elderly care precision services in the digital environment", and points out the direction for further exploration of specific strategies to improve the precision level of community elderly care services.

  • Lingshi Ran, Qifeng Li, Yixue Xia, Yuexin Lan
    Abstract (511) RichHTML (479) PDF (23)

    [Purpose/Significance] This study aims to analyze the formation mechanisms of information cocoons and explore pathways to break through them, providing users with scientific strategies for overcoming these barriers. [Method/Process] The paper began with the fundamental scenarios of information acquisition and incrementally introduced influencing factors, constructing an integrated model of "formation-evolution-breakthrough" for information cocoons. Simulations were conducted on three scenarios that users might encounter: information acquisition rate, cocoon-breaking choices, and attitudes towards breakthroughs, yielding simulation conclusions with guiding value for breaking through information cocoons and providing mathematical support for users to formulate scientific strategies. [Result/Conclusion] The research finds that moderately slowing down the rate of information acquisition helps users break through information cocoons. Actively embracing external interventions is beneficial for broadening users' channels of information perception, thereby assisting them in overcoming information cocoons; cognitive factors are key to achieving breakthroughs, and users should actively enhance their cognitive levels. Personalized recommendation algorithms have a dual impact on information cocoons, potentially exacerbating the polarization of information. Therefore, users should adopt a proactive stance, using recommendation algorithms as tools to verify their cognitive reflections, which in turn can aid them in breaking through information cocoons.

  • Zhenlu Wang, Xiaoqin Gao, Liang Chen
    Abstract (463) RichHTML (432) PDF (31)

    [Purpose/Significance] As an important driving force for the innovative development of humanities and social sciences, Interdisciplinary/Integrated Studies is an inevitable way to solve complex problems. As an important carrier of cross-research, the Interdisciplinary/Integrated Research Program in Humanities and Social Sciences of the Ministry of Education has played an active role in promoting cross-research in humanities and social sciences in recent years, and aims to provide useful insights and references for future cross-research in humanities and social sciences through the research. [Method/Process] This study systematically analyzed 4045 Interdisciplinary/Integrated research projects funded by the Ministry of Education (MOE)over the past decade(2014—2023)using a combination of quantitative and qualitative methods to explore the number of projects, types, their distribution, research topics, and trend. [Result/Conclusion] The study found that interdisciplinary research in the humanities and social sciences has grown steadily in both quantity and depth, and the research topics cover a wide range. Important research hotspots have emerged in Urban and rural social development and special group issues, environmental protection and sustainable development, regional economy and industrial transformation and upgrading, cultural heritage and innovative development, artificial intelligence and information technology application, mental health and educational innovation. It also introduces the integration of multiple disciplines, combining empirical research and theoretical exploration, focusing on real problems, and giving equal importance to innovation and practicality as the characteristics of cross-cutting research.

  • Yafei Li, Wenqian He, Xiaoyu Liu, Lei Pei, Ye Chen, Xing Peng
    Abstract (402) RichHTML (382) PDF (40)

    [Purpose/Significance] The digital economy policy has become an important policy tool for the government to promote economic development, and an empirical analysis of the effectiveness of China's local digital economy policy implementation can be helpful to promote the local economy to achieve high-quality development. [Method/Process] This paper examined the impact of local digital economic policies on regional economic development using the PSM-DID method with panel data from 337 prefecture-level and above cities in China from 2010 to 2021. [Result/Conclusion] Local digital economic policies significantly promote regional economic growth.However, their promotional effects exhibit a two-year time lag.The implementation of digital economic policies proves to be more effective in cities with larger population sizes or higher administrative levels.Additionally, the impact of digital economic policies on regional economies in central and western regions exceeds that in eastern regions.

  • Yu Shen, Yingqun Li, Jialong Liu, Jiangfeng Liu, Ningyuan Song, Lei Pei, Jing Zhang
    Abstract (368) RichHTML (332) PDF (59)

    [Purpose/Significance] Simulation based on system dynamics can comprehensively capture the dynamics of complex social systems under the influence of policies, accurately simulate the cumulative impact of policy interventions over time, and evaluate the implementation effect of policies, which plays an extremely important role in promoting the scientific and efficient formulation and use of policy tools and improving the effectiveness of policies. [Method/Process] Taking the implementation of fertility policy as an example, based on key influencing factors such as fertility rate and environmental influencing parameters such as education and economy, this paper constructed a simulation system based on system dynamics through Vensim PLE.The model dynamically demonstrated the interactions between the population—policy—economy subsystems and designed and implemented three differentiated policy intervention scenarios, and conducted in-depth simulations to predict the paths of demographic change and the evolutionary trends under different policy orientations. [Result/Conclusion] It is found that the liberalization of fertility policies had effective in mitigating the ageing trend while promoting population growth.However, the impact of the policy is waning and structural changes and adjustments are urgently needed.

  • Xianrui Liu, Li Si
    Abstract (325) RichHTML (288) PDF (30)

    [Purpose/Significance] Improving scientific data ethics governance can help regulate the scientific data collection, sharing and use, bring into the function of data as a key resource and element in research, and optimize scientific data management services. [Method/Process] This study analyzed the scientific data ethics policy using the UK as an example based on the Grounded Theory, summized the policy framework and content, revealed the governance characteristics through matrix coding and Social Network Analysis, and put forward suggestions for the scientific data ethics governance in China. [Result/Conclusion] Results indicate that the scientific data ethics policy framework includes 3 dimensions: the environment, subject and strategy.The environment involves applicable fields, subjects, concept definitions, problem analyses, and existing policies.The subject consists of the definition of governance subjects and collaboration promotion.The strategy includes governance guidance and measures at various stages.Accordingly, this research proposes four pathwayes: forming an ethical governance system, standarizing the ethical theory, clarifying the governance rights and responsibilities of all parties and the way of collaboration, and refining the ethical governance at all stages.

  • Lei Pei
    2025, 45(1): 4-4.
    Abstract (313) RichHTML (266) PDF (29)
  • Yanqi Shen, Xiaokang Song, Qinghua Zhu
    Abstract (285) RichHTML (244) PDF (52)

    [Purpose/Significance] Online surrogate health information seeking has become an important way for information vulnerable groups to bridge the digital divide.From the perspective of substituted searchers, studying the impact of online surrogate health information seeking on health literacy of the elderly has important reference significance for further understanding the behavioral effects of surrogate seeking. [Method/Process] Based on social cognitive theory, this paper constructed the influence model of online surrogate health information seeking on health literacy of the elderly, and put forward five hypotheses.A questionnaire survey was used to collect 238 valid sample data of the elderly.SPSS and SmartPLS software were used for subsequent data analysis and hypothesis test. [Result/Conclusion] Social interaction, online surrogate health information seeking and health consciousness all positively affect the health literacy of the elderly, and the elderly's health consciousness is the most important factor affecting their health literacy.Through the moderating effect analysis, it finds that health consciousness could positively moderate the impact of online surrogate health information seeking on health literacy of the elderly, and social interaction negatively moderate the impact of online surrogate health information seeking on health literacy of the elderly.

  • Hou Zhu, Yawen Tan, Wentao Wei
    Abstract (284) RichHTML (266) PDF (45)

    [Purpose/Significance] To address the issues of insufficient datasets and difficulty in cross-domain transfer in Chinese aspect-based sentiment analysis (ABSA), the paper explores the application and performance of Chinese large language models in ABSA tasks. [Method/Process] The paper utilized the ChatGLM model, employing prompt engineering and fine-tuning techniques of LoRa and P-Tuning, to conduct ABSA tasks on the Chinese open aspect-level sentiment analysis dataset, ASAP. [Result/Conclusion] Compared with baseline models, ChatGLM based on few-shot prompts has performance close to that of full-sample deep learning models, while models combined with LoRa and P-Tuning achieve the best results and show good classification ability in the actual ASAP dataset.The paper verifies the effectiveness and feasibility of aspect-based sentiment analysis of Chinese large language models in the Chinese context and provides new solutions and references for the field of Chinese ABSA.

  • Yujuan He, Shengming Fan, Yue Zhang
    Abstract (250) RichHTML (192) PDF (38)

    [Purpose/Significance] With the development and popularization of information technology, a series of irrational group behavior such as cyberbullying, rumor spreading, and fanaticism has emerged on the Internet, seriously disrupting the orderly process in cyberspace and even the entire society.A systematic and in-depth exploration of online irrational group behavior at the theoretical level is beneficial for understanding and governance. [Method/Process] Firstly, the concept of online irrational group behavior was analyzed according to the view of Socio-Technical Interaction Network.Then, existing relevant studies were reviewed.Finally, the theoretical basis, research perspectives and methods, driving factors and corresponding mechanisms of online irrational group behavior were summarized and extracted, constructing a theoretical framework. [Result/Conclusion] The concept of online irrational group behavior includes three components: group irrationality, human-technology interaction, and social interaction.This study integrates existing research results and constructs a framework, which could promote future research to focus on deeper issues in more diverse ways, and help to conduct governance practices more completely and specifically.

  • Yanbo Chu, Ping Wang, Shushu Hu
    Abstract (228) RichHTML (193) PDF (28)

    [Purpose/Significance] Against the backdrop of frequent public health incidents, the demand for health information among the public is growing rapidly.Social media as an important way for users to obtain information, not only efficiently spreads health information, but also provides convenient conditions for the generation and dissemination of false health information.With the increasing penetration and influence of social media, users have a stronger sense of uncertainty about health information.In view of this, this article explores the mechanism of trust formation among social media health information users, in order to provide reference and inspiration for subsequent related research. [Method/Process] This paper deconstructed the elements that form user trust in social media health information, constructed a trust framework oriented towards user perception process, proposed a theoretical hypothesis model of user trust in social media health information from three aspects: user, information and environment, and then modified the structural model. [Results/Conclusion] The paper aims to clarify the process of perceived trust and psychological changes among social media health information users from a theoretical perspective.The paper also found that emotional polarity, involvement, source credibility, and conflict resolution have a significant positive impact on trust in hot reviews.Trust has a significant positive impact on adoption intention.Reference group norms have a significant positive impact on adoption intention.Trust plays a complete mediating role between emotional polarity, involvement, source credibility, and conflict resolution and willingness to adopt information in hot reviews.

  • Xiwei Wang, Zhe Sun, Yibing Jiang, Yueqi Li
    Abstract (227) RichHTML (173) PDF (91)

    [Purpose/Significance] Social media has become an essential medium for the spread of online rumors due to its wide audience and rapid dissemination. In light of the harmful effects of online rumors, understanding how to effectively control their spread and timely debunk them holds significant theoretical and practical implications for governing the cyberspace ecology. [Method/Process] This study proposed a method to identify themes in online rumor debunking and to categorize users' emotional attitudes. It determined the number of topics using the Latent Dirichlet Allocation (LDA)algorithm and constructed user-level and community-level echo chamber networks based on the optimal number of topics. The study presented a model for analyzing the echo chamber effect in social media networks that debunk rumors and established the analysis formula and test parameters for this effect. Utilizing data from the"China Eastern Airlines MU5735 crash"online public opinion topic, the study analyzed the identification and emotional distribution of six online rumor debunking themes. It further examined the network structure of user comments and forwarding subnets within the echo chamber network, related to the six debunking themes. The study also calculated the homogeneity of each virtual community theme in the comment and forwarding subnets of the echo chamber effect for each debunking theme. [Result/Conclusion] The study finds that an echo chamber effect exists in the transmission process of debunking rumored information in social networks. The forwarding process exhibits stronger network homogeneity than the comment process, and users who comment show higher ambivalence than those who forward the information.

  • Xi Meng
    Abstract (210) RichHTML (186) PDF (43)

    [Purpose/Significance] The study aims to explore the influencing mechanism of social media users' algorithm awareness on their self-concealment behavior, which is helpful to improve the multi-governance system of algorithm governance in China, and provide a theoretical reference for the privacy management of social media users. [Methods/Process] Based on Privacy Calculus Theory, this paper explored the influencing mechanism of algorithm awareness on social media users' self-concealment behavior, and considered the moderating effect of platform trust.By collecting questionnaires from 730 social media users, the empirical study was conducted by using structural equation model and Bootstrap method. [Results/Conclusion] The results show that algorithm awareness has significant positive effects on privacy concerns, perceived benefits, privacy risk belief and self-concealment.Perceived benefit has no significant effect on privacy risk belief.Privacy risk belief has a partial mediating effect between algorithm awareness and self-concealment.Privacy concern and privacy risk belief have a chain mediating effect between algorithm awareness and self-concealment.Platform trust negatively regulates the relationship between algorithm awareness and self-concealment.

  • Xiwei Wang, Mali Li, Yang Zhao, Zhewei Fan
    Abstract (210) RichHTML (181) PDF (58)

    [Purpose/Significance] AI technology, exemplified by AI-generated content, facilitates the emergence of new quality productive force and multi-dimensional value implications, which can better assist China's digital economy to achieve high-quality development and better promote the innovation of knowledge and intelligence services in China. Analyzing the new mechanisms, risks, and paths of AIGC-enabled knowledge and intelligence innovation services holds significant theoretical and practical importance for promoting the vigorous development of the discipline of information resource management under the major national strategy of new productive force. [Method/Process] Based on the theoretical connotation of new quality productive force, the paper analyzed the internal mechanism of AIGC-enabled knowledge and intelligence service innovation from the perspectives of labor objects, laborers, and labor materials. It identified the risks of AIGC-enabled knowledge and intelligence service innovation from the three dimensions of information source, channel, and information receptor, based on the three elements of information transmission, and proposed governance strategies. The paper also explained the practical path of AIGC-enabled knowledge and intelligence innovation services from the perspective of the composition of new productive force. [Result/Conclusion] The paper shows that under the new quality productive force strategy, AIGC forms an internal mechanism for knowledge and intelligence service innovation. This mechanism relies on data elements, uses basic models for support, and features human intelligence collaboration as its core. The paper also indicates a need for better management of data privacy and security risks, cyberspace security risks, and scientific and technological ethics security risks. This requires leveraging the collaborative advantages of industry, academia, and research. This paper proposes a practical path for promoting AIGC-enabled knowledge and intelligence service innovation. This path involves constructing a new model driven by data elements, forming a new team centered on human-intelligence collaboration, and developing reliable and trustworthy intelligent models.

  • Bin Zhang, Houmin Zu, Jiao Wu
    Abstract (210) RichHTML (173) PDF (15)

    [Purpose/Significance] Current mainstream recommendation algorithms based on knowledge graph mainly focus on mining and utilizing item-side knowledge, paying less attention to user-side auxiliary information, leading to issues such as sparse user data and insufficient mining depth. [Method/Process] Addressing the structural and feature differences between user-side and item-side auxiliary information, the study proposed a dual-graph attention recommendation model that integrated social relationships and knowledge graphs. Firstly, the user social network graph and item knowledge graph were separately fused with the user-item interaction graph to obtain the user social relationship collaborative graph and item collaborative graph. Secondly, the study used a dual-graph attention network to process these two knowledge graphs separately, extracting different user and item feature vectors. Then, through the attention mechanism, the extracted user and item feature vectors were merged. Finally, the interaction probability of users and items was calculated using inner product operation for recommendation. [Result/Conclusion] The study conductes experiments on the Last-FM and Douban datasets, demonstrating that the model outperforms other baseline models on various datasets.

  • Ningjing Liu, Yi Sun, Yin Liu, Feng Zhou
    Abstract (206) RichHTML (139) PDF (31)

    [Purpose/Significance] Oral historical resources have important historical and spiritual value, with heterogeneous resource characteristics across multiple fields such as libraries, archives, museums, and science and technology museums.The historical events of celebrities separated from oral historical resources, as well as their new"bottom-up"approach to studying history, have received widespread attention in the fields of history, archives, and information.The organization and application of event knowledge is the key and difficult issue in knowledge processing, and from the perspective of digital humanities, the knowledge-based transformation of celebrity historical events is an important foundation for knowledge reorganization, value mining, and narrative performance of celebrity special collection resources. [Method/Process] On the basis of previous research, the article summarized and analyzed the connotation, characteristics, and application requirements of celebrity historical events, constructed a semantic model of celebrity historical events, and instantiated the semantic model using the scientist Li Zhengdao and the founder CUSPEA event as an example. [Result/Conclusion] Based on the semantic model, the graph database could form more flexible, fine-grained, scalable, and related entity relationships and knowledge, achieving the application requirements of semantic level queries, thematic aggregation, narrative display, and visual presentation of celebrity characteristic resources for different types of users.

  • Cuicui Feng, Ming Yi, Fuchuan Mo
    Abstract (195) RichHTML (172) PDF (44)

    [Purpose/Significance] Users' compliance willingness is of great significance for the effectiveness of online health information services and treatment effects.Understanding the key factors and configurational paths of users' compliance willingness is helpful to provide reference for users' self-management practices and the construction and management of online health communities (OHCs). [Method/Process] Based on Elaboration Likelihood Model (ELM)and Technology Acceptance Model (TAM), the model was constructed from dimensions of online health information's characteristics and users' characteristics.This paper conducted a scenario-based experiment.Then, the partial least square-structural equation model (PLS-SEM)was used to analyze the influencing mechanism of various factors on user compliance intention, and the fuzzy set qualitative comparative analysis (fsQCA)was employed to explore the generation path of users' compliance willingness. [Result/Conclusion] Results indicate that argument quality and source credibility have a significantly and positively impact on information usefulness and information ease of use, and positively affect user compliance willingness through the mediating effect of information usefulness and information ease of use.Meanwhile, demander participation and provider competition played a moderating role, and there was a contingency effect of the information type in the process.Moreover, 3 and 5 configurational paths could be utilized to increase high users' compliance willingness of emerging treatment protocols and mature treatment protocols, respectively.The combined approach of PLS-SEM and fsQCA offers a novel methodology for investigating the underlying mechanism that influences the users' compliance willingness of online health information.Moreover, it provides a focused direction and valuable insights for enhancing user compliance.

  • Junping Qiu, Jingda Ding
    2024, 44(11): 3-3.
    Abstract (193) RichHTML (166) PDF (37)
  • Yanfeng Zhang, Wanchen Yang, Yulan Liu
    Abstract (189) RichHTML (145) PDF (47)

    [Purpose/Significance] With the popularization of mobile social media, users' excessive dependence on mobile devices and mobile social media applications has negatively affected social life and personal health, and the issue of digital addiction has become increasingly prominent.Therefore, by elucidating the role relationship and the degree of influence among the factors influencing the digital detoxification behavior of mobile social media users, it helps users to cultivate good digital detoxification behavioral habits and ensures a healthy balance between their normal life and the time they spend on using their digital devices, and at the same time, it also provides theoretical and applied guidance for the study of digital detoxification behavior. [Method/Process] The study used a combination of meta-ethnography and rough set methods to analyze and identify 15 influencing factors.And through the Grey-DEMATEL (Decision Making Trial and Evaluation Laboratory)method, the study elucidated the role relationships and degrees of influence of each index on digital detoxification. [Result/Conclusion] The study finds that perceived cost, perceived harm, outcome expectancy, pain avoidance, self-control, positive thinking ability, time perception, and social influence are the key influencing factors.And based on the results of the analysis, the study put forward suggestions to cultivate digital detoxification behavioral habits of mobile social media users, which would also provide a reference for the management decision of the platform providers and related communities.

  • Tong Zhu, Haiqun Ma
    Abstract (185) RichHTML (161) PDF (21)

    [Purpose/Significance] Based on the five-layer model of user experience, the paper analyzes the influencing factors of the public data open platform of user experience, in order to help the platform improve its construction and realize the upgrade of user experience. [Methods/Processes] Based on the five-layer model of user experience, the paper analyzed the factors, designed hypotheses and constructed models, collected information by using questionnaires, and tested paths, verified hypotheses, analyzed the necessity of the data by using the SEM model and the NCA method. [Result/Conclusions] Among the five-layer of user experience, content requirements, interaction design, interface design and visual performance all have sufficiently significant influence on user experience; in terms of necessity, they are slightly different, and according to the bottleneck level analysis, the degree of necessity is from high to low, which is the content requirements, visual performance, interface design and user requirements, respectively.

  • Xiaoxu Yue, Lili Zhang, Junping Qiu, Jingda Ding
    Abstract (184) RichHTML (144) PDF (41)

    [Purpose/Significance] Promoting the transformation of data elements into new quality productive forces has become an important issue for policy makers and practitioners, therefore it being of practical significance to analyze the rationality and scientificity of data elements policies. [Method/Process] Using the policy documents quantitative analysis method, this paper analyzed how policies promote the transformation of data elements into new productive forces.This paper used the following analytical framework: policy subject, policy tool, policy target, and the logic of the data element value chain: collection, storage, governance, transaction and application. [Results/Conclusions] This paper finds that: (1)The central policy entities are relatively scattered, and the local governments with developed digital economy have a significant driving role.(2)Supply side policy tools and environmental side policy tools are the main policy tools, with digital innovation, data application, data transaction, and data governance as the main policy targets.(3)There are some differences in the layout and combination of policy tools and policy targets between central and local governments.(4)To improve policy efficiency, the policy system can be optimized, such as the combination of policy subjects, policy targets, and policy tools, as well as the combination of universal and special policy tools.

  • Tao Zhang, Hangong Wang, Tongtong Yu, Haiqun Ma
    Abstract (181) RichHTML (137) PDF (52)

    [Purpose/Significance] As China's data element market transitions from a disorderly and spontaneous exploration stage to an orderly and standardized formal exploration stage, data security issues have become particularly prominent and have risen to the national strategic level.Exploring the synergy between China's data security policies and scientific research can provide important reference and guidance for promoting scientific research on data security and improving China's data security policies. [Method/Process] This article took 546 policies and 2446 research papers in the field of data security in China as samples, combined with the NMF topic model and Word2vec model, to identify the topics of policy texts and research papers, and explored the evolution and collaborative between China's data security policies and research topics through similarity calculation methods. [Results/Conclusion] China's data security policies and research topics exhibit a synergistic and evolving relationship, and there is a clear trend of collaborative research driven policies in data elements and cross-border data flow topics.

  • Jinhua Wu, Shaoxiong Fu, Xiaohong Ju
    Abstract (179) RichHTML (139) PDF (29)

    [Purpose/Significance] Infant and toddler online health information is becoming an important support for infant and toddler parenting, this paper explores the behavioral pathways of infant and toddler online health information adoption of the new generation parents, and provides an informational perspective and theoretical framework for the understanding and analysis of Chinese parenting practice. [Method/Process] A semi-structured interview method was used to collect the behavioral practice experiences of 32 new generation parents on infant and toddler online health information. Based on the grounded theory, eight main categories of context, motivation, information, subject, family, society, usefulness perception and response were sorted out, and then a theoretical model of the behavioral path of relevant online health information adoption was constructed. [Result/Conclusion] It is found that under different circumstances, parents acquire, identify and adopt relevant infants and toddlers' online health information based on different motivations, so as to further strengthen their parenting views and practice. In this process, family and society, as an external system, influence the behavior and practice of the new generation parents.

  • Yue Zhang, Guanqi Jiang, Luhan Li
    Abstract (174) RichHTML (150) PDF (49)

    [Purpose/Significance] This paper focuses on investigating the causes and mechanisms behind users' intention to avoid artificial intelligence-generated content (AIGC)information, aiming to provide theoretical guidance for user information behavior, optimization of AIGC technology, and iteration of AIGC products. [Method/Process] Drawing upon the C-A-C framework, this study constructed a theory model to examine the influence of controllable degree of information, transparency of information, and AI anxiety on information avoidance.The study collected sample data through virtual experimental design, and analyzed data using partial least square structural equation modeling (PLS-SEM). [Result/Conclusion] The findings reveal significant differences in users' avoidance intention towards AIGC information based on its transparency and controllability.Additionally, AI anxiety exhibits a positive relationship with information avoidance behavior.Notably, it is important to acknowledge that AI identity threat positively moderates the relationship between AIGC information uncertainty and AI anxiety.

  • Shunli Guo, Xuening Zhang, Xinning Su
    Abstract (172) RichHTML (145) PDF (25)

    [Purpose/Significance] The study aims to analyze the complicated relationship among the factors influencing the adoption intention of AIGC users under the scientific research scenario, and analyzes whether there is a single factor that has a necessary effect on the adoption intention of users, it provides theoretical and practical reference for the popularization and application of AIGC in scientific research scenarios. [Method/Process] The necessary condition analysis and fuzzy set qualitative comparative analysis were used to analyze 522 questionnaire data to explore the necessity of single factor and the adequacy of configuration path. [Result/Conclusion] The study finds that there is no single factor that has a necessary effect on the adoption intention of AIGC users, there are 11 high adoption intention paths and 4 low adoption intention paths in the influencing factors configuration paths.Among them, perceived quality, perceived usefulness, perceived ease of use, perceived task technology matching, perceived trust, social influence, and user expectation all play an important role in the configuration path as the core condition or edge condition.

  • Xianming Yu, Jian You, Meng Meng, Lu Liu
    Abstract (172) RichHTML (138) PDF (44)

    [Purpose/Significance] The sutdy aims to systematically examine and analyze the current situation, hotspots and frontiers of research on conflicting health information abroad, so as to fully grasp the development of this field and provide useful reference and support for future research directions. [Method/Process] Research literature on conflicting health information was retrieved from two foreign language databases, Web of Science and Elsevier ScienceDirect, and the VOSviewer visualization tool was used to analyze the publication trend, research hotspots and frontiers of the literature, and the analysis results were explained in detail. [Result/Conclusion] Research on conflicting health information abroad is in a stage of rapid development.Research hotspots include: causes and sources of conflicting health information, the impact of conflicting health information on public health cognition and behavior, public health decision-making under conflicting health information and conflicting health information coping and governance.In addition, research fronts cover conflicting health information from the perspective of uncertainty, the carryover effect of conflicting health information, and interdisciplinary theoretical research on conflicting health information.

  • Honghui Miao, Qingshuang Quan, Xin Shu
    Abstract (171) RichHTML (142) PDF (29)

    [Purpose/Significance] The revitalization of Northeast China in the new era depends on the strong support of scientific and technological talents, and the policies for these talents are essential institutional guarantees for promoting scientific and technological innovation and talent development.This study aims to accurately grasp the framework structure and dynamic characteristics of regional sci-tech talent policies through systematic quantitative analysis, providing decision-making references for deepening the supply-side reform of policies. [Method/Process] Taking the sci-tech talent policy texts of Heilongjiang, Jilin, and Liaoning provinces as research objects, this study employed the BERTopic model to conduct topic identification, keyword extraction, similarity calculation, etc.On this basis, it carried out longitudinal and horizontal comparisons of policy themes among the three provinces and conducted a comparative analysis with the policies of developed provinces such as Guangdong, Jiangsu, Zhejiang, and Shandong. [Result/Conclusion] The sci-tech talent policies of the three Northeast provinces have formed a system with talent introduction, cultivation, utilization, evaluation, incentives, and services as the main lines.However, compared with developed provinces, there are still deficiencies in policy supply, demand traction, and targeting.Based on this, the study proposes that the three Northeast provinces should enhance the systematicity, precision, and timeliness of talent policies based on regional realities, focus on key issues such as policy supply, demand traction, and regional characteristics, and continue to make efforts in the integration, optimization, and innovative development of talent policies.The reform of talent policies in the new era should lead and guarantee the comprehensive revitalization and high-quality development of Northeast China.

  • Yiming Zhao, Dandi Huang
    Abstract (166) RichHTML (153) PDF (14)

    [Purpose/Significance] Trusted data spaces provide critical support for data circulation and utilization.This paper aims to explore the construction principles and development paths of trusted data spaces that align with China's national conditions, providing development momentum for national integrated data element market. [Method/Process] This paper reviewed the research status and practical progress of data spaces through a literature review and case examples.It analyzed, from multiple dimensions, the methods and approaches for addressing challenges in data circulation and utilization through trusted data spaces.Based on these analyses, it systematically discussed construction principles and development paths of trusted data spaces. [Result/Conclusion] This paper proposes BASIC construction principles of trusted data spaces, including balance, accountability, safe, interoperability and controllable, and explores the development paths of trusted data spaces in China from the perspectives of strategic layout, technologies, standards and regulations, innovation ecosystem, operation and supervision, and international exchanges.

  • Tao Zhou, Chunlei Zhang, Shengli Deng
    Abstract (162) RichHTML (152) PDF (36)

    [Purpose/Significance] As a passive behavior, users' intermittent discontinuance may make it difficult for generative AI to retain users and achieve a competitive advantage.Thus, it is necessary to examine the formation mechanism of user intermittent discontinuance and find the significant factors. [Method/Process] From a C-A-C perspective, this research examined the enablers and inhibitors of generative AI users' intermittent discontinuance.Enablers include privacy concern, information hallucination and cognitive dissonance, while inhibitors include intelligence, anthropomorphism, personalization and emotional commitment.SEM and fsQCA were adopted to conduct data analysis. [Results/Conclusions] Privacy concern and information hallucination affect cognitive dissonance, which further leads to intermittent discontinuation.Intelligence, anthropomorphism, and personalization affect emotional commitment, which prevents intermittent discontinuance.The results imply that generative AI needs to mitigate users' privacy concern and reduce information hallucination in order to lower cognitive dissonance.On the other hand, generative AI needs to enhance the intelligence, anthropomorphism, and personalization in order to increase users' emotional commitment and prevent their intermittent discontinuance.

  • Rujing Yao, Fang Wang
    Abstract (160) RichHTML (132) PDF (36)

    [Purpose/Significance] Theory is an essential component in the construction and development of the discipline of information science. Organization and Analysis of theories not only help understand the origins and developmental trajectories of the discipline but also predict the development of emerging technologies. Efficient and accurate identification of theoretical entities plays a crucial role in deepening theoretical research. [Method/Process] This paper proposed an information science theory extraction algorithm that collaborates between large and small language models, including modules for enhanced word embedding vectors, sample difficulty assessment, and a theoretical identification model. Initially, the paper used large language models to pre-identify theoretical entities. These pre-identified entities, combined with the original word embeddings, formed the enhanced word embeddings. The training process of domain-specific small models was optimized through these enhanced word embedding vectors. Additionally, the paper used large language models to assess the difficulty of samples and adjusts training strategies accordingly to improve model performance. The proposed algorithm fully integrated the large language models' powerful semantic understanding capabilities and the professionalism of domain-specific small models. [Result/Conclusion] Experiments conducted on a dataset for the extraction of theoretical entities in information science show that the algorithm proposed in this paper effectively improves the performance of theoretical entity extraction, achieving the best results in the metrics of precision, recall, and F1 score.

  • Limei Zhao
    Abstract (158) RichHTML (129) PDF (29)

    [Purpose/Significance] The construction of the ethical order of scientific data sharing aims to strengthen the legitimacy and rationality of the sharing participants' behavior and normalize the sharing process and subjects' relationships.Scientific data sharing is a new type of data empowerment field, leading to the enhancement of the risk and uncertainty of scientific data sharing.Therefore, the construction of the ethical order of scientific data sharing is urgent in order to avoid the ethical disorder of scientific data sharing and data reuse. [Method/Process] On the basis of interpreting the connotation and attributes of the ethical order of scientific data sharing, the actual basis and the necessary requirements for the construction of the ethical order of scientific data sharing were demonstrated, and the construction approach of the ethical order of scientific data sharing was systematically discussed. [Result/Conclusion] The construction of the ethical order of scientific data sharing needs to follow the basic value criteria of idea fairness, process fairness and result justice, guarantee the effectiveness with institutional contract, ensure the enforceability with incentive mechanism, and realize the controllability with the logic of mutually beneficial symbiosis governance on the platform.

  • Haiqun Ma, Zhenliang Man
    Abstract (157) RichHTML (130) PDF (17)

    [Purpose/Significance] Public data authorization operation is an important means to promote data transaction circulation and explore data value.From the perspective of policy tools, entering into public data authorization operation policies can help explore the attention allocation of existing policies and provide reference for the future introduction of public data authorization operation policies or documents by the country or other provinces and cities. [Method/Process] Public data authorization operation is an important means to promote data transaction circulation and explore data value.From the perspective of policy tools, entering into public data authorization operation policies can help explore the attention allocation of existing policies and provide reference for the future introduction of public data authorization operation policies or documents by the country or other provinces and cities. [Result/Conclusion] Currently, the operation of public data authorization is still in the exploratory stage, both in theory and practice.After analyzing policy samples, it was found that there are imbalances in the proportion of supply oriented policy tools, abuse of environmental policy tools, and urgent need to expand demand oriented policy tools in the use of policy tools.It is still necessary to coordinate the proportion of supply oriented policy tools Strengthen the balance of environmental policy tools and expand and improve demand based policy tools to optimize the policy system of public data authorization and operation in China.

  • Weisi Li, Xiaofen Wen, Guilong Li, Tianhuan Peng, Manhua Tang
    Abstract (153) RichHTML (100) PDF (28)

    [Purpose/Significance] This paper tries to construct a knowledge graph of technology talents, achieve intelligent analysis and identification of high potential technology talents, and provide decision-making support for technology talent evaluation, talent gradient training, etc. [Method/Process] Starting from the characteristics of young scientific and technological talents, this article integrated multi-source heterogeneous scientific and technological big data to design and form a technological architecture for the knowledge graph of scientific and technological talents.A knowledge graph technology architecture for young scientific and technological talents based on three-layer scientific and technological data governance were constructed from dimensions such as growth experience, scientific research environment, innovation ability, and technological field, forming a data resource pool and portrait system for young talents in Hunan. [Result/Conclusion] This study constructs the knowledge map of young scientific and technological talents in Hunan province, which covers more than 20000 scientific and technological talents entities and 400000 relational data of Hunan Scientific and technological talents management system, and effectively supports the decision-making of young scientific and technological talents management in Hunan province.

  • Bing Wang, Yawen Li, Zhiyong Shi
    Abstract (151) RichHTML (133) PDF (40)

    [Purpose/Significance] In today's age of data & intelligence, data & intelligence technology is the key driving force of the Construction of Safety & Security Intelligence Capability(CSSIC), so it is significant to study CSSIC empowered by data & intelligence. [Method/Process] Based on analyzing the transformation of safety & security intelligence capability in the age of data & intelligence, this paper revealed the mechanism of CSSIC empowered by data & intelligence and put forward the path of CSSIC empowered by data & intelligence. [Result/Conclusion] Through CSSIC empowered by data & intelligence, it can realize the platform capability integration, flat organizational structure distribution, forward-looking global analysis, and systematic collaborative operation of safety & security intelligence capability.CSSIC empowered by data & intelligence should be oriented towards the whole process of safety & security intelligence demand determination, safety & security intelligence acquisition, safety & security intelligence analysis, safety & security intelligence application and feedback.

  • Side Liu, Dongsheng Li
    Abstract (149) RichHTML (116) PDF (28)

    [Purpose/Significance] Intelligent services have become an important direction for the transformation and development of university libraries. Natural language processing technologies empower the intellectualization of university library services, reconstructing service models and processes, and helping improve the overall service levels of university libraries. Named entity recognition is an important task in natural language processing, its impacts and significance on the intellectualization of library services can effectively identify entities such as people, locations, organizations, resource utilization, service features, and cultural promotion in library information, providing support for knowledge organization, information retrieval, etc. [Method/Process] This study analyzed the application prospects of named entity recognition technology in the intelligent service systems of university libraries. By constructing a high-quality library and information science corpus, it provided high-quality training data to meet the specific entity recognition needs within the field, enhancing accuracy and adaptability, and laying the foundation for optimizing library intelligent service systems. An ALBERT-BiLSTM-CRF model based on deep learning was adopted to verify the effects of named entity recognition tasks. Case studies on service recommendations and knowledge graphs in university libraries were performed and compared with existing mainstream large language models at home and abroad. [Result/Conclusion] The results show that the proposed method effectively improves the performance of named entity recognition in the university library information field, which is conducive to the promotion and application of intellectualized library services, while also reducing resource waste and training costs. In addition, this paper explores the possibility of LibraryGPT, a large language model serving the library field, in order to provide references and inspiration for the promotion and development of smart services in university libraries in the future.

  • Yiming Zhao, Qiaozhi Zheng, Xiaoliang Shen
    Abstract (148) RichHTML (127) PDF (24)

    [Purpose/Significance] Applying virtual digital humans for teaching in educational environments can lead to more efficient online learning for users.This study aims to investigate the impact of virtual digital human characteristics on the effectiveness of users' online learning, providing insights for the design of online instructional videos and the optimization of teaching strategies to enhance learner efficiency. [Method/Process] Based on the theory of parasocial interaction, the study designed instructional video materials featuring virtual digital humans with VTube Studio software, which explored the situation of virtual teachers teaching in online learning environments.Users were recruited to watch the instructional video, and their subjective perceptions were measured. [Result/Conclusion] The features of attractiveness and anthropomorphism of virtual digital humans have a positive impact on online learning performance through a chain-mediated effect of users' attitudes and learning satisfaction with the virtual humans.Additionally, a masking effect exists between the anthropomorphism and learning performance mediation pathway.Parasocial interaction has a positive impact on learning satisfaction, but affects learning performance negatively.

  • Yunlong Yu, Bing Bai, Shiji Chen, Junping Qiu, Jingda Ding
    Abstract (146) RichHTML (116) PDF (40)

    [Purpose/Significance] Revealing the characteristics and structure of New Quality Productivity (NQP), deeply understand the essential meaning of NQP. [Method/Process] First, the paper summarized the core connotations of NQP from the important speeches of President Xi Jinping.Second, extracted keywords from the full texts of papers related to NQP using the large language model ERNIE-bot 4.0.Subsequently, a stochastic block model was applied to explore the structural equivalence of NQP keyword co-occurrence network.Third, displayed connotations of NQP and their structure with knowledge graph technology.Finally, discussed the hierarchical structure of the core connotations of NQP. [Result/Conclusion] Studies on NQP closely revolve around the core connotations of Xi Jinping NQP theory.The full-text keyword co-occurrence network shows a core-periphery structure, with keywords in the center representing the core connotations of NQP.Technology innovation and high-quality development occupy the core position of co-word network, forming the primary connotations of NQP and being the core content of academic research.Keywords such as digital technology, data elements, strategic emerging industries, future industries, talent cultivation, and green development are in the secondary core positions in the co-word network. Results of the word frequency and combination relationship networks further suggest that digital technology and data elements are crucial connotations of NQP and focal points of related studies.Strategic emerging industries and future industries represent major connotations of NQP and are key research topics.Talent resources and green development are important extensions of NQP core connotations and are significant topics in studies.Additionally, the scope of NQP studies is extensive covering areas such as governance systems and open-door policies, which are top-level design requirements for NQP high-quality development.

  • Jiazheng Zhuang, Yuting Lin, Yijin Chen
    Abstract (146) RichHTML (123) PDF (25)

    [Purpose/Significance] Based on the characteristics of information itself and individual, this study explores the influencing factors of the adoption intention of individual health rumor refuting information, and clarifies the influencing path of each influencing factor, so as to provide theoretical basis and enlightening suggestions for improving the rumor refuting effect of health rumor refuting information. [Method/Process] Based on the extended Information Adoption Model and Aristotle's rhetoric theory, this study constructed a model of influencing factors of health rumor refuting information adoption intention, and further verified the moderating effects of individual cognitive conflict and knowledge self-confidence on different influence paths. [Result/Conclusion] The results show that logos and ethos have a significant positive effect on information usefulness.Pathos, ethos and logos had a bias effect.Pathos, ethos and logos have a negative synergistic effect on information usefulness.On the conscious path, cognitive conflict positively moderates the effect of ethos and pathos on information usefulness, and knowledge self-confidence negatively moderates the effect of logos on information usefulness.In the unconscious path, knowledge self-confidence positively moderates the influence of information usefulness on information adoption intention and negatively moderates the influence of herding factors on information adoption.

  • Jieru Jiang, He Lin
    Abstract (146) RichHTML (134) PDF (18)

    [Purpose/Significance] The generative artificial intelligence technology has triggered the copyright infringement risk during the generative AI data training stage, and infringement litigation cases around the world have emerged. It is of great significance to propose regulatory and compliance measures to deal with the copyright infringement risk of generative AI data training in China, to balance the interests of AI industry and traditional content creation industry, and promote the sustainable development of GenAI technology. [Method/Process] Through the method of literature, comparison and empirical analysis, this paper revealed the regulatory systems of developed countries (areas). On the basis of comparing and learning from the regulatory experience of developed countries, this paper gave the countermeasures in combination with our national conditions. [Result/Conclusion] The study found that China is at the rapid stage of generative AI development. Chinese government should introduce adaptable administrative regulatory principles. Meanwhile, China should incorporate a flexible "fair use" system that is applicable for GenAI data training into the current copyright legal system. At the same time, the industry can also develop a Creative Commons License scheme applicable to GenAI data training as a cost saving compliance measure.