[Purpose/Significance] The study aims to explore the influencing factors and generating mechanisms of digital hoarding behavior of mobile social media users, which is helpful to enrich the theoretical paradigm of information behavior research and provide theoretical guidance and practical reference for in-depth analysis of the phenomenon. [Method/Process] Based on the I-PACE theoretical model framework, the study analyzed the model elements of mobile social media users' digital hoarding behavior from the four dimensions of"person-affect-cognition-execution"and used a qualitative method, phenomenography, to dig into the intrinsic mechanism of the behavior, and constructed the relationship model of the mechanism of mobile social media users' digital hoarding behavior. [Result/Conclusion] The results reveal that the mechanism of digital hoarding behavior of mobile social media users is consist of four sub-mechanisms: attention triggering, cognitive judgement, perceptual control, and behavioral feedback.
[Purpose/Significance] Data stories are the combination of data and stories, with narrative and structural characteristics.From the perspective of narrative structure theory, the structural elements of data stories can be clarified, and then a data story model can be constructed to guide data story creation. [Method/Process] Firstly, based on the theory of narrative structure, this paper analyzed the structure of data story from four levels: story points, narrative intention, narrative logic, and visual effects.Thus, the framework of data story model was constructed.Secondly, this paper constructed the data story model from four levels: raw material layer, target layer, structural layer, and presentation layer to explain the lifecycle of data story construction.Finally, an example analysis was conducted by creating a data story on agricultural carbon emissions in Shandong Province. [Result/Conclusion] This model could guide the generation of data story and the presentation of structural elements, and has certain theoretical and practical significance for improving the readability, comprehensibility, and logicality of data.
[Purpose/Significance] There is a growing concern that algorithms have led to"filter bubbles"in which people only receive content tailored to their existing inclinations, as opposed to being exposed to diverse information.And the filter bubble is reflected in the selectivity of information consumption and attitude extremity.This study aims to explore the intervention effects of different approaches of prioritization in recommender systems on filter bubbles. [Method/Process] This study recruited 38 participants to visit the mock personalized news recommender system.And they were assigned to groups with different prioritization approaches.This study observed and recorded each participant's clicking behavior and reading behavior through server logs.Additionally, the paper measured the changes in participants' attitude extremity using a scale. [Result/Conclusion] The results show that the approaches of prioritization did not affect the selectivity of users' clicking behavior, but affect the selectivity of users' browsing behavior and change of attitude extremity.Specifically, both time-based ranking and quality-based ranking significantly reduce the selectivity of users' reading behaviors when compared to preference-based ranking.And quality-based ranking also weakens the extremity of users' attitudes to a greater extent.This study not only provides a new research perspective and effective methodology for filter bubble-related research, but also provides practical insights for recommendation systems algorithm design.
[Purpose/Significance] The study aims to explore the influencing mechanism of graduate students' willingness to use AIGC consistently for academic practice, so as to provide theoretical basis and practical guidance for promoting the humanized application of AIGC in the academic field. [Method/Process] The study integrated UTAUT2 model and TTF theory, used structural equation model, the key factors of graduate students' willingness to continue to use AIGC for academic practice. [Result/Conclusion] The results show that performance expectations, individual innovativeness and effort expectations significantly affect the willingness to continue using; task characteristics and technology characteristics significantly affect task-technology matching; task-technology matching does not hold a direct effect on the willingness to continue using, but plays an indirectly significant role in it by affecting the performance expectations; and the academic code of ethics plays a positive moderating role in the path of the community's influence.This study remedies the neglect of specific subjects and the insufficient explanatory power of qualitative analysis in existing studies.
[Purpose/Significance] The study aims to understand users' preferences of knowledge exchange on different platforms can be achieved by analyzing the topics discussed across multiple platforms, and construct a user portrait labeling system, which can help platforms provide more personalized optimization strategies and improve interplatform ecological construction. [Method/Process] The study collected original blog posts and user data related to ChatGPT topics from three typical platforms: mass social platform, interest exchange platform, and vertical knowledge community.Next the BERTopic model was adopted to condense knowledge exchange topics.Then, the study extracted portrait labels from four dimensions: natural attributes, social attributes, knowledge exchange behavioral attributes, and knowledge exchange thematic attributes.To realize user profiles, present group characteristics, and compare platform differences, the study used K-means clustering to implement a user portrait labeling system. [Result/Conclusion] The study has identified 46 different topics and directions for knowledge exchange on 8 major cutting-edge science and technology subjects.These subjects include application scenarios, industry progress, future exploration, related industries, consultation and help, hot topics, experience of use, and risk supervision.Furthermore, the study has classified the users into 4 categories based on their attribute characteristics.These categories are professional contribution, comprehensive sharing, social knowledge-seeking, and topic potential.The study also finds significant differences between platforms in terms of knowledge exchange topics and user profiles.Therefore, platforms should adopt differentiated incentives to enhance platform user stickiness.
[Purpose/Signficance] This study aims to explore the opportunities of digital twin technology for enterprise digital transformation and management intelligentization,and compare its differences with the old information resource management mechanism.It emphasizes the information resources orchestration in digital twins,which requires enterprises to rethink their strategies and practices of information resource management to adapt to emerging technologies and digital transformation requirements. [Method/Process] Using the theoretical framework of resource orchestration theory and DIKW chain theory, this study adopted a single case study approach.By combining the digital twin construction process in lean production of SHAC enterprise, it analyzed the motives, processes, and outcomes of information resource orchestration in lean production under digital twin technology using primary and secondary data.Additionally, through case analysis, the DIKW chain, and driving mechanisms of information resource orchestration under digital twin technology were proposed. [Result/Conclusion] The study reveals that under digital twin technology, information resource orchestration in enterprises has the following characteristics: During the resource structuring phase, resource sequencing is a unique element of resource orchestration.In the stage of resource capability, resource enrichment, resource enhancement and resource construction are all the core competencies in enterprise resource orchestration.In the stage of resource leverage, digital twin technology can help enterprises to better deploy and coordinate their resources, and provide important support for the digital transformation of enterprises and the promotion of core competitiveness.
[Purpose/Signficance] Efficiency evaluation is beneficial for understanding the status of platform openness efficiency.Combining the SBM, Malmquist, and Tobit models to form a comprehensive evaluation framework not only assesses current efficiency but also analyzes trends in efficiency changes and influencing factors.This provides a new methodological reference for the efficiency evaluation of government data open portals. [Method/Process] Using the"input-output"panel data of government data open portals in 10 provinces and cities in China from 2019 to 2022, the direction-free SBM model was utilized for its flexibility and comprehensiveness in platform efficiency evaluation without the need to preset the direction of the production possibility frontier.The Malmquist index was employed for its ability to measure efficiency changes in time-series data, aiding in identifying trends in platform efficiency evolution.The Tobit model, suitable for analyzing censored data, helped identify the mechanisms behind various influencing factors of efficiency. [Result/Conclusion] The efficiency level of provincial and municipal government data open portals generally shows an upward 17.1%.Shenzhen and Guangdong have shown particularly notable performances.Through optimizing processes, improving service quality, enhancing user experience, and upgrading operational models, the overall efficiency has been significantly enhanced, providing referential experiences for other portals to promote open efficiency and effectiveness.The total factor productivity(M index)of the platform has an average growth rate of 17.1%, indicating technological progress, but the average value of technical efficiency has decreased, pointing to waste or inefficiency issues.The average growth rate of scale efficiency is 14.5%, but pure technical efficiency has declined, indicating that portals need to focus more on improving pure technical efficiency.Government data open portals are positively influenced by the comprehensive level of platform data, data platform construction level, organizational readiness, fiscal support level, and public external demand.The diversity, quality, and availability of data, as well as the functional design and user experience of the platform, are key factors in enhancing efficiency.The level of government attention, financial support, and public demand directly affect the comprehensive efficiency level of the platform.
[Purpose/Signficance] Government data open platform is an important window of the government to open data to the public.The purpose of this paper is to objectively evaluate and analyse the influence of government data open platforms in each province, so as to provide reference for the construction of government data open platforms in China. [Method/Process] Based on the link analysis method and with the social network analysis method as a continuation and supplementation, the total number of web pages, the total number of links, the number of internal links and other link data of the governmental data open platform were obtained through the Google search engine and Ucinet 6.0, and at the same time, an analysis framework was constructed from the four dimensions of the platform scale, the characteristics of the number of links of the platform, the characteristics of the platform's influence, and the influence of the social network, so as to conduct a study on the linking situation of China's provincial governmental data open platform linking situation was studied. [Findings/Conclusion] The overall influence of provincial open data platforms needs to be improved.There are factional divisions and a"core—edge"structure among the platforms, with some regional differences.
[Purpose/Signficance] The study aims to indentify and analyze the key influencing factors of users' negative emotions helps to respond more effectively to the spread of users' negative emotions in the network public opinion of public emergencies and maintain social stability and harmony. [Method/Process] Based on the affective-cognitive theory and integrating crisis schema theory, the theoretical framework of the influencing factors of users' negative emotions was constructed by combining with the existing research and the actual data.Questionnaire survey and DEMATEL method were used to analyze the influencing factors and the key degree of users' negative emotions in public emergencies, and the key influencing factors were identified. [Result/Conclusion] The study finds that the key influencing factors include nine factors: event itself, security crisis, social system, social culture and government credibility, subject empathy, interest appeal, risk perception and group identity.Based on the discovery, this paper provides feasible strategies for guiding negative emotions of users from three perspectives.
[Purpose/Signficance] There are differences in the diffusion of public opinion information between different emergencies and network platforms.This paper constructs a mathematical model to study the dissemination and diffusion mechanism of public opinion information, measures the differences in public opinion information diffusion, and provides theoretical support for precise governance of emergency network public opinion. [Method/Process] This paper focused on the general characteristics of public opinion information diffusion, considered the impact of different emergencies and network platforms on public opinion information diffusion, proposed the concept of public opinion information diffusion index, constructed a power-mapping based on measurement model for the difference in public opinion information diffusion on the network of emergencies, and studied the influence of parameters on public opinion information diffusion through numerical simulation.The validity and rationality of the model were verified by using the network public opinion cases data triggered by emergencies, and the effectiveness of the model for information diffusion prediction was verified by using multiple other cases. [Result/Conclusion] The difference of network public opinion information diffusion in emergencies could be measured by the public opinion information diffusion index.The overall law of public opinion information diffusion is consistent.The influence of public opinion information diffusion index on public opinion information diffusion is not only reflected in the time dimension, but also reflected in the public opinion information volume dimension.
[Purpose/Significance] The issue of gender differences is common among researchers, and studying the gender differences in the career growth trajectory of researchers is of great significance for formulating talent cultivation and growth policies. [Method/Process] This study focused on the general project leader of the National Social Science Foundation for Library, Information and Literature Science from 2018 to 2022. The resume information of 379 researchers was encoded and processed, and survival analysis was used to study gender differences and influencing factors in the career growth trajectory of researchers. [Result/Conclusion] Research has found that the proportion of senior professional titles among researchers in the field of library, information, and archives management who receive support from general national social science projects is higher in males than in females, with no significant difference in other areas. Kaplan Meier analysis shows that there are significant gender differences in the career growth process of researchers, with male researchers generally growing faster than female researchers. The Cox analysis results indicate that age has a reducing effect on the survival risk of both males and females at all stages, which can delay the growth of researchers; The experience of institutional mobility will increase the survival risk of male researchers in the secondary high stage and accelerate their promotion speed of professional titles; The experience of studying abroad and visiting universities can increase the survival risk of female researchers in the high stage, thereby accelerating their growth in that stage. The research findings provide some insights for improving gender differences among researchers.
[Purpose/Significance] The evaluation and prediction of scientific output of fund projects can help optimize the effectiveness of fund support and improve the quality of scientific research. It has certain theoretical and practical guidance significance for the optimization of layout direction and resource allocation of scientific research management departments. [Method/Process] Firstly, based on the LDA model, identified the research topics contained in the fund and its supporting papers; Then, five indicators were proposed: the amount of topic funding, the duration of topic funding, the popularity of topics, the quality of topics, and the influence of topics. A comprehensive evaluation model for science output topics supported by the fund was designed; On this basis, a scientific output topic prediction model was proposed based on deep learning algorithms; Finally, the paper took the data of the papers funded by the Department of Social and Economic Sciences of the National Science Foundation and its output as an example. [Result/Conclusion] Through empirical research, it was found that the high-quality scientific output topics of the Department of Social and Economic Affairs of the National Science Foundation of the United States mainly include policy and environment, scientific research development and practice, and health and social development, verifying the feasibility and effectiveness of the method. [Innovation/Limitations] This study has certain theoretical and practical guidance significance for optimizing the effectiveness of fund funding, improving the quality of scientific research, optimizing the layout direction of scientific research management departments, and optimizing resource allocation.
[Purpose/Significance] To help the academic community to deeply understand the development process of task-technology fit theory and its application status in the field of information systems, and to provide reference for the follow-up research. [Method/Process] By searching and sorting out the relevant literature on the use of task-technology fit theory in the field of information systems, the achievements, limitations and future research directions of current research were systematically summarized. [Results/Conclusion] The application research of task-technology fit theory in the field of information system mainly focuses on four aspects: users' willingness to use information technology, users' performance in using information technology, the influence of information technology on users' satisfaction, and users' willingness to use information technology continuously. There are some limitations in the research, such as "lack of research on group level", "less attention to users' cognitive and emotional state", "lack of horizontal comparison of technologies in different scenarios" and "lack of research on the feasibility of introducing new technologies". Expanding the connotation and application of task-technology fit theory, comparing the application of technology in different scenarios and exploring new application scenarios of new technologies are the research directions worthy of attention in the future.
[Purpose/Significance] It aims to help academics gain a deeper understanding of the application and progress of deterrence theory in the field of information systems, so as to provide ideas and directions for future research on the theory in related fields. [Methodology/Process] This paper systematically sorted out and reviewed the domestic and international research literature on the application of deterrence theory in the field of information systems, and summarized the progress and shortcomings made in the research. [Results/Conclusions] The results of the application of deterrence theory in the field of information system mainly focus on "the application of deterrence theory in the study of information system security", "the application of deterrence theory in the study of digital piracy" and "the application of deterrence theory in the study of online piracy". The application of deterrence theory in the study of online social media deviant behaviors"; there are problems such as "insufficient research on the agility perspective of punishment", "lack of cross-country, cross-cultural and cross-platform comparative differences", etc.; the application of deterrence theory in the study of information system security", "application of deterrence theory in the study of digital piracy" and "application of deterrence theory in the study of online social media deviant behaviors". There are problems such as "insufficient research on the perspective of punishment" and "lack of cross-cultural and cross-platform comparative research".
[Purpose/Significance] The study aims to make the academic community deeply understand the application and development of construal level theory in the field of information system, and provide guidance for the follow-up related research and application. [Method/Process] By reviewing both domestic and international studies in the field of information systems research based on Construal Level Theory, the study categorized the research topics into three main areas: consumers' online purchase intention, causes of user privacy paradox in social network, and information system design and adoption. This paper systematically sorted out the achievements and limitations of the current research, and looked forward to the future direction worthy of attention. [Result/Conclusion] The existing research mainly has some shortcomings, such as the research dimension needs to be expanded, the theoretical application needs to be deepened, and the research object needs to be enriched. Future research can make progress in these aspects.
[Purpose/Significance] The study aims to clarify the evolution of the Interaction Ritual Chain Theory and the current status of its application in information system research, and bridge the gap in the use of the Interaction Ritual Chain Theory in the field of domestic information system research. [Methods/Processes] This paper organized and summarized the domestic and international literature based on the theory of Interaction Ritual Chain, and concluded the achievements, limitations and future research directions worth paying attention to in the research of information system. [Results/Conclusions] Currently, the research topics of Interaction Ritual Chain Theory in information system focus on three aspects, namely, social media user behavior research, information technology service research, and knowledge sharing behavior research. In view of the limitations of the existing research, the future research could be approached from four perspectives, including differentiation of research subjects, diversification of research methodology, segmentation of user groups, and innovation of research direction, continuously enrich the Interaction Ritual Chain Theory in information system.