[Purpose/Significance] From the perspective of data elements, this paper explores several problems regarding public data security guarantee, hoping to clarify the orientation and nature of public data security guarantee, and provide useful reference for balancing public data security guarantee and public data open utilization practice. [Method/Process] Using the method of speculation and induction, based on analyzing the relationship between five important issues of data elements, the relationship between data elements and data security was clarified and the applicability of data elements as the perspective of studying public data security guarantee was demonstrated. [Result/Conclusion] Public data rights confirmation, public data valuation, improvement of public data security governance system and formation of data transaction ecosystem jointly constitute several issues of public data security guarantee from the perspective of data elements.
[Purpose/Significance] Data security policies play an important role in ensuring and promoting the development of data security industry.Quantitative evaluation of the current effective data security policies will provide reference for the formulation of subsequent policies. [Method/Process] Selecting the data security policies formulated by governments at all levels from 2016 to the present as the research object.Through ROSTCM6 extracted high-frequency words and drawn social network mapping, selecting 10 highly representative data security policies, regulations and other documents, the policy name codes are noted as P1, P2…P10.With reference to the evaluation indexes of PMC model related studies, constructing the quantitative evaluation index system of data security policies. [Results/Conclusion] The data security policies are generally fair, P2 is excellent grade, P1 is good grade, P3, P6 and P9 are passing grade, P4, P5, P7, P8 and P10 are poor grade, which performs well in terms of the nature of policy, policy timeliness, policy area and policy receptor, and needs to be improved in terms of the focus of the policy and the policy tools.
[Purpose/Significance] To reveal the evolution law of data security policy is of great significance for improving the data security policy system. [Method/Process] In this study, The paper selected 547 data security policy documents and used the NMF topic model to perform topic mining.And it combined with Word2Vec word vector model to visualized and analyzed the data security policies from two perspectives: topic content evolution and topic intensity evolution. [Results/Conclusion] Topics such as network security, emergency response, security protection, and personal privacy were identified, the content of the topic evolution exhibits aggregation, while the evolution domain exhibits diffusion; Besides, the overall evolution trend of core topics such as data opening and public data keeps increasing, while the proportion of core topics' policies such as personal privacy, controllable security, monitoring and early warning is unbalanced.In light of the above results and the current situation of data security governance in China, four suggestions were put forward: continue to strengthen the coordination between data openness and security; Strengthen the data security governance of the whole process; Improve the data security governance mechanism that integrates technology and policy; Balanced policy topics evolve attention allocation.
[Purpose/Significance] Data cross-border flow has promoted the development of the digital economy and international exchange and cooperation.Exploring synergy issues in data cross-border flow security management is conducive to maintaining data security and national security, and promoting the construction of data utilization systems and capabilities. [Method/Process] Using Nvivo software, this paper analyzed the problems and causes of security management synergy of data cross-border flow in China.Based on synergy theory and Hall's three-dimensional model, constructed a three-dimensional model of security management synergy of data cross-border flow. [Results/Conclusion] Build a synergy mechanism for security management of data cross-border flow consisting of three sub mechanisms: organizational synergy mechanism, legal synergy mechanism, and resource synergy mechanism.Propose measures to ensure the operation of the synergy mechanism for data cross-border flow security management from three aspects: knowledge sharing, technological strength, and cultural environment, so as to achieve the synergistic effect of data cross-border flow security management.
[Purpose/Significance] WeChat has become the main source for people to receive information, but medical and health official accounts often publish false, poor-quality, inaccurate, confusing, and inducing health information.Whether users have online health information screening ability is the primary basis for the improvement of their health information literacy, so it is of great significance to explore the factors influencing the level of WeChat users' screening ability. [Method/Process] The study collected relevant research data through a questionnaire survey and used it as a basis to construct a univariate health information discernment Partial Least Squares Regression(PLSR)model.The importance of each influencing factor was gauged by calculating the projection importance of various influencing factor indicators. [Result/Conclusion] Research reveals that the most prominent influences on users' ability to discern health information are content updates, information readability, and government promotion.Source credibility, media promotion, information content professionalism, expert recommendations, health information attention, and social consensus have a secondary impact.Factors with a lower impact include education level, income level, and age.
[Purpose/Significance] As a hot application, online knowledge video dissemination effect such as dissemination broadness, recognition and participation is crucial to the platforms. Based on the heuristic-systematic model in information processing, this research examines the factors affecting knowledge video dissemination effect. [Method/Process] 12301 knowledge video data were collected at BiliBili and the corresponding fields of each factor were extracted. Data were analyzed using STATA and the moderation effect of fans number was examined. [Result/Conclusion] The results show that host features, title features, cover features, content topic, video length and tags significantly affect the video dissemination effect, and the number of fans plays a positive moderating role. Thus, the video platforms need to be concerned with these heuristic and systematic cues in order to improve the dissemination effect and achieve competitive advantage.
[Purpose/Significance] This article presents a meta-analysis of the factors that affects user sharing behavior in knowledge-based virtual communities. The influencing factors are summarized based on role theory, providing theoretical reference for the healthy development of such communities. [Method/Process] Using the meta-analysis method, this article comprehensively analysed 40 domestic and foreign empirical research literatures related to the sharing behavior of users in knowledge-based virtual communities. Each influential factor verified in existing studies as significantly related to the sharing behavior of users was treated as an independent variable, while the sharing behavior of users was the dependent variable. [Result/Conclusion] In addition to common language and common vision, the sharing behavior of users in knowledge-based virtual communities is significantly influenced by the correlates of the three dimensions of role identity, role consensus, and role expectation. Specifically, 14 factors significantly correlated with users' sharing behaviour in knowledge-based virtual communities, with perceived satisfaction having the strongest correlation and the weakest outcome expectation.
[Purpose/Significance] Intellectual property intelligence is of great practical significance to leading enterprises in consolidating their leading advantages and exploring innovation paths. [Method/Process] By examining the objectives and requirements of intellectual property intelligence work in leading enterprises, this study focused on the four key stages of the IP chain workflow-functional layer, management layer, intelligence layer, and decision-making layer. The more efficient and comprehensive approach to extracting, analyzing, transmitting, and servicing intellectual property intelligence work in leading enterprises had been developed. [Result/Conclusion] This paper clarifies the communication path of intellectual property information chain of leading enterprises and the supporting content of intellectual property information at each node, constructs the framework of intellectual property information work mode of leading enterprises, and proves theoretical reference for leading enterprises to promote innovation through intellectual property information work.
[Purpose/Significance] The study aims to identify and quantitatively evaluate the information quality risk nodes of AIGC academic knowledge service, and propose risk governance strategies based on the ranking of risk values in each stage of the knowledge service process, so as to provide reference for publishing institutions to develop and provide high-quality AIGC academic knowledge service. [Method/Process] Combining the Delphi method, the study used the Work Breakdown System-Risk Breakdown System (WBS-RBS) to identify nodes that may cause information quality risks in the AIGC academic knowledge service process, then quantified and compared the risk values of each risk node using the Risk Breakdown Matrix (RBM). [Result/Conclusion] The AIGC academic knowledge service process contains a total of 79 information quality risk nodes. Among them, the start-up preparation stage has the highest risk value, which should strictly control the deviation of work to build a solid foundation for information quality. The maintenance and optimization stage has the second highest risk value, which should improve the details of work to avoid interference with information quality; The construction and implementation stage has the lowest risk value, which should make up for the omissions to eliminate the hidden dangers of information quality.
[Purpose/Significance] Carrying out quantitative analysis of policy texts on health information services for the elderly is conducive to the formulation and optimization of subsequent policies, and is of great significance in promoting the development of health information services for the elderly and actively responding to population aging. [Method/Process] On the basis of a comprehensive study of the policy texts on health information services for the elderly formulated by government departments at the provincial level and above in China, a policy econometric analysis method was used to explore the use of policy tools, policy objectives, and participant subjects and their operational characteristics in the current policy system. [Result/Conclusion] The study found that there are some problems in the current health information service policy for the elderly in China, such as the imbalance of policy tool structure, the coordination of policy objectives needs to be strengthened, and the functional space of participant subjects needs to be released. Based on this, it is suggested to improve the policy supply from three aspects: optimizing the collocation of policy tools, balancing the allocation of policy objectives, and mining the value of participant subjects, so as to promote the high-quality development of health information services for the elderly in China.
[Purpose/Significance] Citation motivation carries the purpose and emotional bias of scholars' citation of literature.Through an evolutionary analysis of scholars' citation motivations, it becomes possible to trace scholars' varying degrees of attention and changing trends towards different topics during their formative academic years.This offers a profound insight into the scholars' reflections, choices, and transformations throughout their developmental stages in academia. [Method/Process] This study focused on scholars in their academic growth phase.Initially, core scholars were identified based on Price's Law, and those in the academic growth phase were filtered using the Zpc index.Subsequently, the structural components of the paper were mapped to scientific citation motivations, employing manual annotation for citation motivation classification.Furthermore, the BTM topic model was employed to identify cited topics and compare their similarities and differences.Finally, on this basis, a temporal comparative analysis was conducted to trace the evolutionary paths and processes of cited topics. [Result/Conclusion] Combining topic modeling with citation motivations, this study explores the topics underlying the diverse citation motivations of scholars over their academic careers.By identifying evolutionary trajectories based on evolutionary strength, the research contributes to a better understanding of the academic interests and evolution of research directions among scholars over the long term.
[Purpose/Significance] Highly targeted and highly free collaborator recommendation services can promote the sharing of knowledge and resources among scientific researchers, and enhance the quality and efficiency of scientific research. [Methods/Process] Based on the idea of the hybrid recommendation method, the paper designed a framework of the recommendation scheme of scientific collaborators from the perspective of scholars' motivation for scientific cooperation and gave a specific implementation process.Firstly, the paper designed several recommendation indicators based on scholars' research topics to meet the needs of collaborators pursuing similarity, topic designation, or topic complementarity.Secondly, the paper designed some recommendation indicators based on the cooperation network to meet the needs of those seeking authoritative collaborators and provided a calculation scheme.Finally, the paper synthesized those indicators based on the weights requested by scholars. [Result/Conclusions] Taking the field of information science as an example, the paper conducts an empirical study on the proposed scientific collaborator recommendation scheme.The results show that the scientific collaborator recommendation scheme combined with the research topics in the field and the relationship network of scholars can accurately identify the candidate collaborators with higher social capital intensity, and can better adapt to the personalized needs of the scientific research collaborators.
[Purpose/Significance] Health informatics is in a stage of vigorous development.This paper aims to examine the current research status of health informatics in the field of information resource management both domestically and internationally with the purpose of providing reference for the further development of health informatics in the field of information resource management in our country. [Method/Process] This study collected 1 236 relevant papers on health informatics from 43 domestic and foreign information resource management journals over the past three years.The research topics were classified and coded using content analysis method.This study carefully selected a total of 228 representative papers under each topic and conducted a comprehensive review aiming to summarize the characteristics and identify similarities and differences in research between these domestic and international papers. [Result/Conclusion] The research topics of health informatics in the field of information resource management are categorized into three fundamental themes: health information needs and search behavior, research on health information technology, and health information services.There are four cross-cutting topics: public health and healthcare, health information literacy, bibliometrics in health informatics, and health information in social media.Certain differences exist between domestic and foreign studies on health information needs and behavior as well as health information technology.The further development of health informatics in our country can draw lessons from foreign experience, focus on the health information needs and services of specific target groups, and enhance the application of information technology in health informatics.
[Purpose/Significance] As the core content of intellectual property rights, patents are an important fundamental resource for global technological, economic, and strategic competition.In recent years, the number of patents has skyrocketed, and the status of patent information as a"technology gold mine"continues to be questioned, making knowledge discovery in massive patent data increasingly valuable.The article provides a comprehensive and in-depth interpretation of international high-value patent research, which is beneficial for providing reference for researchers, enterprises, and technical personnel. [Method/Process] This paper first comprehensively used TF-IDF algorithm and LDA topic model to mine hot topics of international high-value patent research, and then used the Grounded theory to carry out bottom-up three-level coding of international high-value patent research hot topic and literature to achieve an overview of international high-value patent main research topic categories. [Result/Conclusion] International high-value patents have formed 7 thematic categories, with two main categories of topics: patent value evaluation and core patent value prediction being hot topics in international high-value patent research; Patent value evaluation includes 3 aspects: multi-dimensional evaluation indicators of patent value, patent value evaluation methods, and factors affecting patent quality; The prediction of core patent value includes research on core patent features and core patent recognition methods, mainly including machine learning methods, text mining methods, and citation network analysis.
From December 1 to 3, 2023, the first Northwest University Information Resource Management Discipline Construction Alliance work conference and 2023 Academic Annual Meeting was successfully held in Xi'an, Shanxi Province, attended by more than 200 scholars and researchers in the field of information resource management.With the theme of"Regional Strategic Support and regional Collaborative Development of the discipline of Information Resource Management", this conference set up keynote reports, high-end dialogues, sub-forum reports and other links to discuss the regional cooperation development and service innovation practice of the discipline, and seek common high-quality development of the discipline of information resource management.