Most Read

    Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract435)      PDF(pc) (647KB)(364)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    Impact of Data Classified and Graded Rights Confirmation on the Realization of the Value of Data Elements
    Ma Feicheng Xiong Siyue Sun Yujiao Wang Wenhui
    Journal of Information Resources Management    2024, 14 (1): 4-12.   DOI: 10.13365/j.jirm.2024.01.004
    Abstract429)      PDF(pc) (1559KB)(330)       Save
    Data rights confirmation is essential for realizing the value of data elements and sustaining the normal operation and continuous development of data elements market. This study delves into concepts related to data rights confirmation and explores the path of how to establish a property right system to realize data rights confirmation. Furthermore, this study shows methods for the data classified and graded rights confirmation, analyzing their impact across the data value chain. Results show that in the data collection stage, the data classified and graded rights confirmation mechanism can motivate data supply, improve data quality, and stimulate market vitality. In the data organization stage, it can break down technical work, protect private data, and explore potential value. In the data circulation stage, it can regulate negative externalities, reduce transaction costs, and optimize the allocation of resources. And in the data utilization stage, it plays a key role in data compliance regulation and data value redevelopment.
    Related Articles | Metrics | Comments0
    The Dilemma and Practical Approach of Data Factor Value Creation in Chinese Enterprises from the Collaborative Perspective
    Qian Jinlin Xia Yikun
    Journal of Information Resources Management    2023, 13 (6): 5-16.   DOI: 10.13365/j.jirm.2023.06.005
    Abstract327)      PDF(pc) (1867KB)(235)       Save
    Mining and releasing enterprise data factor value is of great significance to cultivate enterprise core competitiveness and to promote social economic growth. Based on literature research, comparative analysis and other methods, this paper comprehensively uses synergy theory and data value chain theory to analyze the connotation mechanism of data factor value creation, and then based on the coupling of data chain and value chain, this paper builds the analysis framework of the collaborative work scene within the enterprise and the collaborative co-governance scene outside the enterprise. The results suggest that: (1)Chinese enterprises lack the analytical ability of data value system, fail to set up data resource management system, and cannot achieve the collaborative development of data utilization and business scenarios; (2)It is difficult to form a value co-creation network with data sharing and exchange as the core because the data sharing channels between enterprises are not smooth, the data relationship is not harmonious, and the interest balance mechanism is not perfect; (3)The two-way data flow sharing mechanism between enterprises and the government is not perfect, and the government-enterprise data coordination supervision and cultivation system is not complete; (4)It is difficult to balance the protection of data rights and the pursuit of data interests between enterprises and individuals. Therefore, this paper puts forward the practical approach of data factor value creation in China from two perspectives: (1)improving the collaborative research ability of data factor value creation within enterprises, and (2)establishing a multi-agent collaborative and co-governing data ecology outside enterprises.
    Related Articles | Metrics | Comments0
    Two Modes and Ecological System Construction of Data Element Market Circulation in China
    Zhang Huiping Zhao Qin Ma Taiping Zhang Yaoyao Zhang Jingran
    Journal of Information Resources Management    2023, 13 (6): 29-42.   DOI: 10.13365/j.jirm.2023.06.029
    Abstract310)      PDF(pc) (2368KB)(88)       Save
    Market circulation of data elements is a key link to activate the economic and social value of all kinds of data and build a data resource system, which directly affects the effectiveness of the construction of digital China. Government data authorization operation and data trading platform are two main modes of market circulation of data elements. In this study, eight market-based circulation platforms with data elements were selected to carry out comparative analysis from six dimensions, including the composition of working capital, platform participants, platform data sources, product and service types, data rights confirmation paths and technical solution applications. Based on the analysis results and the information ecology theory, this findings show that the data element market ecosystem is composed of data products and services, data subject, data platform and data environment. The ecosystem needs the support of the cooperation mechanism of data community, the linkage mechanism of the two modes and the interaction mechanism between inner and outer circles. This study has significant implications for future development: It is necessary to enrich and innovate application scenarios to drive the integrated development of data elements, establish income distribution mechanism to crack the conflicts of interest among data subjects, and promote the safe and reliable market circulation of digital technology, so as to promote the construction of market circulation ecosystem of data elements.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (5): 4-4.  
    Abstract295)      PDF(pc) (311KB)(134)       Save
    Related Articles | Metrics | Comments0
    Intelligent and Smart Service of Multi-model Cultural Heritage Resources: From Available to Evidential and Experiential
    Xia Cuijuan
    Journal of Information Resources Management    2023, 13 (5): 44-55.   DOI: 10.13365/j.jirm.2023.05.044
    Abstract293)      PDF(pc) (2030KB)(316)       Save
    The development of data and intelligence technologies is promoting the transformation from "digital GLAMs" to "smart GLAMs". In the transformation from digitalization to datafication and then to intelligence, the cultural heritage resources of GLAMs show the multi-model characteristics of multimedia, multi-format and multi-granularity. Aiming at the problem of how GLAMs provide intelligent services based on multmodel cultural heritage resources, this paper summarizes the transformation path of cultural heritage resources from digital, data to intelligent services based on case analysis and literature research. According to the low to high degree of resource intelligence, inteligent services can be summarized into three modes: available, evidential and experiential, which correspond to three different demand scenarios: resource-centered services, digital intelligence evidence-based services, and interactive experience-centered services. It is concluded that the intelligent services of multi-model cultural heritage resources are to predict in advance and automatically adapting to users' needs for different modes of cultural heritage resources in different demand scenarios.
    Related Articles | Metrics | Comments0
    Value Creation of Data Elements: Review and Research Prospects
    Zhao Caijing
    Journal of Information Resources Management    2024, 14 (2): 41-53.   DOI: 10.13365/j.jirm.2024.02.041
    Abstract289)      PDF(pc) (985KB)(168)       Save
    Data has become a key production factor in China’s economic and societal development, with the circulation and value realization of data elements progressively becoming a crucial means for the high-quality development of the digital economy. This paper reviews the literatures and practices concerning the value creation of data elements, examining aspects such as the connotation, mechanisms, driving factors, obstacles and development paths. Based on this, this paper identifies gaps in the existing literatures on the value creation of data elements, advocating for a future research agenda that emphasizes interdisciplinary integration. It also proposes to explore future research directions and methodologies from perspectives including the conceptualization and measurement of data element value, determinants, and mechanisms of influence.
    Related Articles | Metrics | Comments0
    The Construction of Cultural Heritage Smart Data for the Inheritance and Activation
    Wang Xiaoguang Hou Xilong
    Journal of Information Resources Management    2023, 13 (5): 5-14,43.   DOI: 10.13365/j.jirm.2023.05.005
    Abstract282)      PDF(pc) (2842KB)(332)       Save
    Smart data is becoming a new development trend of information resource construction in the age of data and intelligence. It is an advanced form of data resources organization and more suitable for the new demands and requirements on the data and service in the new environment. Firstly, this article systematically reviews the historical evolution and development trend of smart data, and analyzes the scientific meaning and critical features of smart data. Secondly, facing the problems of cultural heritage inheritance and activation, this article explains the internal logic of smart data empowering cultural heritage activation. Finally, the article puts forward the construction measures and path of cultural heritage smart data, including the construction mechanism, smart data standards and specifications, cultural gene deconstruction, quality control system. The research of smart data not only improves the quality and efficiency of big data resources, but also contributes to the theoretical reform of information resources management and knowledge management in the empowerment of data and intelligence. The construction of cultural heritage smart data resources will effectively promote the process of cultural heritage protection, inheritance and activation.
    Related Articles | Metrics | Comments0
    Exploring the Antecedents of Health Information Credibility at Social Media Platforms: The Moderating Role of Prior Knowledge
    Wang Xiaopan Zhang Miao Wu Yi Zhang Xiaofei
    Journal of Information Resources Management    2024, 14 (1): 55-67.   DOI: 10.13365/j.jirm.2024.01.055
    Abstract275)      PDF(pc) (4210KB)(167)       Save
    Based on the elaboration likelihood model, the current study takes fact-checking interruption as the research object, and explores the impact of two fact-checking mechanisms, source rating and content rating, on users' perceived information credibility and subsequent information participation behavior. The moderating effect of prior knowledge is also investigated. Through an online scenario-based experiment involving 202 subjects, the present study found that both source and content rating mechanisms positively affect perceived credibility. Subsequently, perceived credibility has a positive impact on reading, liking, posting supportive comments and forwarding information, but has had no significant impact on posting rebutted comments. Prior knowledge has a negative moderating effect on the relationship between content rating and perceived credibility, but has no significant moderating effect on the relationship between source rating and perceived credibility. The present study enriches the literature and theories related to the credibility of health information in social media and offers managerial insights for the development of a social media information intervention mechanism.
    Related Articles | Metrics | Comments0
    The Evolution and Contemporary Perspectives on the Empowerment of Intelligence by Artificial Intelligence Technology
    Li Guangjian Pan Jiali
    Journal of Information Resources Management    2024, 14 (2): 4-20.   DOI: 10.13365/j.jirm.2024.02.004
    Abstract267)      PDF(pc) (1976KB)(271)       Save
    This paper systematically explores the evolution and application of artificial intelligence (AI) technology in intelligence work, revealing its new developments in ideology, characteristics, technical methods, and practical scenarios. Transitioning from a rule-based paradigm to the era of foundation model approaches, AI presents significant opportunities for the intelligence field’ s enhancement in intelligence processing. However, it also introduces novel challenges related to ethics, legal considerations, and privacy concerns. The paper identifies issues and challenges that should be addressed by the intelligence community in the new era of intelligence. Furthermore, the paper proposes forward-thinking strategies to address these issues and challenges, providing valuable insights for the stable development of intelligence field.
    Related Articles | Metrics | Comments0
    Ontology-driven Design and Application of Archival Documentary Heritage Metadata:Taking Suzhou Silk Archives as Example
    Niu Li Huang Laihua Jia Junzhi Liu Yuxin
    Journal of Information Resources Management    2023, 13 (5): 15-31.   DOI: 10.13365/j.jirm.2023.05.015
    Abstract233)      PDF(pc) (6378KB)(140)       Save
    Metadata is the key to realize the organization and digital storage of archival documentary heritage, and also the guarantee of its development and utilization. Considering the definition, the hierarchical structure and the attributes of classes of ontology, this paper designs an aggregated metadata system with semantic features and content elements. Taking archival documentary heritage as the research object, we treat its metadata design as the core problem and put forward the general idea and specific steps of ontology-driven metadata design of archival documentary heritage, including resource selection and collection, construction of ontology models, from ontology to metadata, and application of metadata schemes. In addition, taking Suzhou silk archives as an example, the knowledge ontology is constructed combined with their characteristics to realize the design and application of metadata schemes, so as to confirm the validity and scientificity of ontology in guiding metadata construction.
    Related Articles | Metrics | Comments0
    Data Element Governance Dilemma and Prevention Mechanisms—A Perspective of Value and Risk Integration
    Shen Xiaoliang Qian Qianwen
    Journal of Information Resources Management    2023, 13 (6): 17-28,42.   DOI: 10.13365/j.jirm.2023.06.017
    Abstract224)      PDF(pc) (3842KB)(155)       Save
    In the context of the new development pattern, data element governance demands simultaneous attention to both development and security, while unleashing the value of data elements and addressing emerging risk challenges. Nevertheless, current research has given limited consideration to the integration of data element value and risk. Based on the principle of risk-return tradeoff, this study examines the "effect exclusion" and "state symbiosis" relationship between data element value and risk. Furthermore, it draws on information ecology theory, domestic typical cases, and foreign policies and laws to investigate the dilemma and prevention mechanisms of data element governance. The study provides a comprehensive and systematic analysis of the practical dilemmas and prevention strategies faced in data element governance by considering a balance between value and risk aspects. It also offers significant directions for future research.
    Related Articles | Metrics | Comments0
    The Identification of the Core Factors of Highly Cited Papers
    Xu Linyu
    Journal of Information Resources Management    2023, 13 (5): 137-148.   DOI: 10.13365/j.jirm.2023.05.137
    Abstract207)      PDF(pc) (3298KB)(169)       Save
    Highly cited papers have high academic discourse and reference values. The research on the identification of the core factors of highly cited papers is very important for academic papers to obtain citations and to establish and strengthen the competitive advantage. This paper extracts, screens, and forms a set of internal and external influencing factors of academic papers through the combination of literature extraction and questionnaire. It then explores the linear and nonlinear influence of these factors on highly cited papers by means of logistic regression. Finally, this paper uses various classical classification algorithms of machine learning to test the robustness of the above results. The results show that the quality and age of references both have a significant positive linear effect on the formation of highly cited papers, and with the increase of variable values, the quadratic coefficient has a strong superposition effect. In addition, journal reputation has an approximate linear effect on the formation of highly cited papers. However, the indicators such as the author’s reputation, usage and initial citation have a significant positive linear influence on the formation of highly cited papers. With the increase of variable values, the linear effect of the quadratic coefficient gradually weakens, showing a semi-"inverted U" trend of first increasing and then leveling off. Machine learning classical classification algorithms such as decision tree, naive bayes and random forest all show good prediction results for highly cited papers, which shows that the research results of this paper are robust.
    Related Articles | Metrics | Comments0
    Protection Mode of Personal Financial Information in the Era of Fintech
    Zhu Ziyang Wang Weikang
    Journal of Information Resources Management    2023, 13 (5): 102-114.   DOI: 10.13365/j.jirm.2023.05.102
    Abstract196)      PDF(pc) (2422KB)(115)       Save
    Personal financial information infringement incidents such as excessive collection, illegal processing, information leakage and abuse, will not only infringe upon the legitimate rights and interests of consumers, affect the normal operation of financial institutions, but also may lead to systematic financial risks. Currently, since the traditional personal information protection mode is unable to reconcile the contradiction between "utilization" and "protection" in the era of Fintech, it has been unable to cope with many risks and challenges. This paper aims to answer three major questions pertaining to personal financial information protection in the era of fintech, which are identification of the subject and object, establishment of protection principles and improvement of protection measures. To obtain the answer, this paper adopts the logical framework of "sorting out the current situation and problems, mechanism analysis and principle establishment, proposing general design and measures", systematically analyzing the protection modes of personal financial information at home and abroad. Finally, this paper constructs a conceptual model of personal financial information protection in the era of fintech, puts forward specific protection measures based on the advanced protection experience of developed countries, and tries to provide a new way of thinking for the improvement and optimization regarding China’ s personal financial information protection mode.
    Related Articles | Metrics | Comments0
    Construction of China’s Data Sovereignty Rule Pedigree:A Grounded Theory Study
    Zheng Linghan Huang Biyun Jiang Ying
    Journal of Information Resources Management    2023, 13 (5): 56-72.   DOI: 10.13365/j.jirm.2023.05.056
    Abstract190)      PDF(pc) (3944KB)(145)       Save
    Research on data sovereignty rules is helpful for different entities to understand China's data sovereignty rule system, as well as for the standardized expression of rule texts, thereby reducing the cost of data sovereignty compliance. According to the three key process areas of local storage, cross-border flow and extraterritorial jurisdiction, 46 samples related to data sovereignty were screened, 148 rule texts were extracted, and the grounded theory method was used to manually code multiple times with NVivo12 Plus. The hierarchy of data sovereignty rules is composed of objects, subjects and obligations. The objects are divided into 7 categories: data, information, equipment, key information infrastructure, security, interests and rights. The subjects include 6 categories: state, party institutions, administrative subjects, public affairs subjects, enterprise subjects and other subjects. The obligations encompass 29 categories, including security assessment, outbound security assessment, personal information impact assessment, data security protection, within-territory data storage, within-territory information storage, with-territory equipment building, entity establishment, compliance with compliance requirements, reporting obligation, listing and announcement.Overall, the data sovereignty rule system is complete, covering various types of rule fields such as legal norms, departmental norms, and standard norms; Data sovereignty exhibits a "defensive" characteristic, namely orderly flow, appropriate localization, and necessary jurisdiction.
    Related Articles | Metrics | Comments0
    From Epistemological Paradox to Cognitive Trap: Research on Security Issues of Generative Technology-Driven Information Ecosystem
    Bai Yun Li Baiyang Mao Jin Li Gang
    Journal of Information Resources Management    2024, 14 (1): 13-21.   DOI: 10.13365/j.jirm.2024.01.009
    Abstract183)      PDF(pc) (907KB)(228)       Save
    Generative technology-driven information system, with generative artificial intelligence as its core, supports and promotes the process of knowledge transmission and sharing, as well as cognitive flow, and diffusion in the entire information environment. However, it also poses challenges to epistemic security and cognitive security. This paper analyzes the characteristics, advantages, and risks of the generative technology-driven information ecosystem from the perspectives of epistemic and cognition environments. It explores how to fully realize the potential of generative artificial intelligence while adhering to human values and social ethics, to promote the construction of an efficient, secure, and sustainable generative technology-driven information ecosystem.
    Related Articles | Metrics | Comments0
    A Fuzzy-Set Qualitative Comparative Analysis of Influencing Factors and Configurational Paths to Personal Information Protection Level of Mobile Government Services: Evidence from 30 Chinese Provinces
    Pan Yinrong Liu Xiaojuan Zhang Rongxu
    Journal of Information Resources Management    2023, 13 (5): 92-101,136.   DOI: 10.13365/j.jirm.2023.05.092
    Abstract179)      PDF(pc) (1297KB)(141)       Save
    The level of personal information protection has become an important indicator to measure the ability of mobile government services. It is crucial to explore its influencing factors and configurational paths for promoting higher quality digital government construction. With 8 conditional variables setting based on TOE framework, this paper uses fuzzy set qualitative comparative analysis method(fsQCA) to analyze the case from three aspects of technology, organization and enviroment with data from 30 provincial local governments. The result shows that technical, organizational and environmental factors all affect the personal information protection level of mobile government services, and the high-level paths can be classified into four types: competition-driven, technology-oriented, organization-empowered, and internally and externally linked. Local governments should take targeted measures in light of local conditions to better promote personal information protection.
    Related Articles | Metrics | Comments0
    The General Idea of Scientific Data Governance and Practical Case Verification—Taking the Astronomical Data Governance of the National(Guizhou) Hub Node of the Nationwide Integrated Computing Power Network as an Example
    Ma Xiao Guo Mingjun Yi Chengqi Dou Yue Liang Chuyi
    Journal of Information Resources Management    2023, 13 (5): 126-136.   DOI: 10.13365/j.jirm.2023.05.126
    Abstract176)      PDF(pc) (2119KB)(314)       Save
    Scientific data governance is an important way to promote scientific and technological progress and release the value of scientific data. As an important part of scientific data, astronomical data is of great significance for consolidating our country's international advantages in the field of astronomical research and achieving efficient and safe data governance. This paper adopts the theoretical deduction and case mapping as research methods. On the basis of fully learning from the mature model of data governance, based on collaborative innovation theory and public value theory, it studies “subject-object-carrier”and“problem and target oriented” in the “three bodies and two directions” analytical model of in the field of scientific data governance. Based on this model, a mapping study was carried out on the “FAST” astronomical data governance. It provides a research method from theory to practice of “guiding theory-analysis method-case mapping” for scientific data governance, and provides useful support for the exploration and formation of systematic astronomical data governance.
    Related Articles | Metrics | Comments0
    From Browsing to Answering: A Configurational Analysis of Traffic Conversion in Q&A Community from the Perspective of Attention Distribution
    Qiu Shuyi Ma Ling
    Journal of Information Resources Management    2024, 14 (1): 84-97.   DOI: 10.13365/j.jirm.2024.01.084
    Abstract175)      PDF(pc) (1049KB)(61)       Save
    Traffic conversion from question browsing to answering is of great significance to Q&A community. It is regarded as a multi-factor concurrent process of the synergy of information clues within the Q&A interface. Employing fuzzy-set qualitative comparative analysis, this study examines 2,085 questions from Zhihu to explore how traffic conversion in the Q&A community can be facilitated, with supplementary insights from regression analysis. The findings reveal that the configuration path of high traffic conversion rate includes readable question type of "low competition-high social concern" and "low competition-strong social influence". Conversely, the configuration path for non-high traffic conversion rates is causal asymmetry. Furthermore, the configuration paths of high traffic conversion are different for questions with different degrees of knowledge structure. These findings elucidate the user attention distribution in Q&A communities during the transition from browsers to answerers and reveal the mechanisms of traffic conversion, which helps to facilitate traffic conversion of knowledge sharing platform and optimize the Q&A interface design.
    Related Articles | Metrics | Comments0
    Research on the Match between Chinese Research Data Open Sharing Policy Supply and User Demand
    Fan Hao Zheng Xiaochuan Reziya Aihaiti
    Journal of Information Resources Management    2023, 13 (6): 156-165.   DOI: 10.13365/j.jirm.2023.06.156
    Abstract168)      PDF(pc) (1597KB)(87)       Save
    Understanding the supply-demand matching of policy on openness and sharing of scientific research data is significant important for the optimization and adjustment of policies. On the basis of clarifying the supply and demand entities and their functional relationships, we constructed a matching indicator system consisting of 5 first level dimensions and 17 second level dimensions; The content analysis method is used to code 61 policy texts to obtain the matching order value of the supply side; The questionnaire survey method is used to conduct an empirical survey on user needs to obtain the matching order value of the demand side; Finally, the supply and demand matching is analyzed from two aspects of content matching and environment matching. At present, the overall supply and demand matching of China's open sharing policy for scientific research data is good, but the matching degree of data availability, hierarchical classification, infrastructure construction, platform service capacity, and evaluation mechanism is relatively low. Among them, the demand for data availability and platform service capacity is large but the supply is insufficient. The hierarchical classification, platform infrastructure construction, and evaluation mechanism all show a feature of oversupply, reflecting the imbalance between supply and demand, such as policy weaknesses and oversupply caused by insufficient understanding or weak motivation of research subjects.
    Related Articles | Metrics | Comments0
    The Application of Social Demand Data in "Scenario-response" Emergency Decision-making
    Li Guihua Zhang Qiudong Lin Siyan
    Journal of Information Resources Management    2023, 13 (5): 79-91.   DOI: 10.13365/j.jirm.2023.05.079
    Abstract159)      PDF(pc) (6304KB)(70)       Save
    As a source of social perception information in real time, social demand data plays an important role in emergency decision-making. Based on previous studies, an analytical framework composed of a data layer, a method layer, and a business layer is presented. Using the COVID-19 response practice in Chengdu in early 2020 as an example, the data value and value realization modes of social demand data in the application process of "scenario-response" emergency decision-making are investigated. It is found that social demand data is useful for crisis warning, decision support, and information communication in emergency decision-making. In order to to realize its data values, social demand data traverses the whole process of the "scenario-response" emergency decision-making through traction, activation and boosting. The application of social demand data promotes information fusion and utilization for emergency decision making, thereby improving the efficiency of emergency decision making.
    Related Articles | Metrics | Comments0
    The Influencing Factors of Scientific Data Reuse in the Field of Cultural Heritage
    Rao Zixin Xu Xin
    Journal of Information Resources Management    2023, 13 (5): 32-43.   DOI: 10.13365/j.jirm.2023.05.032
    Abstract156)      PDF(pc) (827KB)(160)       Save
    To provide reference for the effective use and management of data in the field of cultural heritage, this paper explores the main factors affecting the reuse of scientific data in the field of cultural heritage by taking 203 cultural heritage scientific datasets reused in DataCite as the research object. Employing non-parametric test and multiple linear regression, this paper explores the influencing factors of scientific data reuse in the field of cultural heritage from three dimensions of data attribute, data provider and data repository.After controlling the time span factors, license, type, abstracts, formats, publishers, sponsor, and quality management are the main factors positively affecting the reuse of scientific data in the field of cultural heritage, and the degree of influence increases successively.Combining with the actual situation in China, this paper puts forward the following enlightenment: establishing cultural heritage metadata standards to improve the adequacy of data description information; incorporating data reuse into funding requirements to promote data reuse of cultural heritage projects; building a scientific data publishing system for cultural heritage and improving peer review in data publishing; promoting quality management of cultural heritage data and making full use of data repositories.
    Related Articles | Metrics | Comments0
    Algorithmic Governance from the Perspective of Data Sovereignty: Challenges, Progress and Approaches
    Ma Tengfei
    Journal of Information Resources Management    2023, 13 (6): 48-61.   DOI: 10.13365/j.jirm.2023.06.048
    Abstract154)      PDF(pc) (824KB)(103)       Save
    From the perspective of data sovereignty, algorithmic governance is challenged by the interplay between "data sovereignty" and "algorithmic power", the impact of nationalization of platforms and national platforms, and the core challenges of lack of prior governance solutions and time lag. In the process of tackling the challenges, various sovereign states have developed different governance approaches, including the proactive model of the United States, which focuses on multi-party accountability and risk response, the defensive model of the European Union, which is based on data protection with an emphasis on accountability, and the systematic attempt of China, which is based on the principle of overall national security. Drawing from international governance experiences, this paper proposes a development path for algorithmic governance from the perspective of data sovereignty of China,which includes the following key aspects: Firstly, regarding the governance principles, it emphasizes the need for a balance between development and security, advocating the "people-oriented" principle as the bedrocks of algorithmic governance. Secondly, regarding the governance agents, it stresses the importance of "governance-side" reform, calling for a collaborative, multi-stakehdder approach to mitigate algorithmic risk. Thirdly, regarding the govemance subjects, it highlights the criticality of "supply-side" reform, focusing on the enhancement of governance structures for both platforms and technologies. Lastly, regarding the governance methods, it promotes the advancement of a tiered classification system, which should be adeptly integrated with scenario-specific governance.
    Related Articles | Metrics | Comments0
    Predicting Highly-value Patents and Analyzing its Determinants Based on BP Neural Network and MIV Algorithm
    Hu Zewen Zhou Xiji
    Journal of Information Resources Management    2023, 13 (6): 144-155.   DOI: 10.13365/j.jirm.2023.06.144
    Abstract152)      PDF(pc) (3920KB)(106)       Save
    This paper designed multi-dimensional evaluation indicators of patent value and recognized high-value patents as the prediction target vector to construct the training set and the test set. Then the BP neural network model was used to predict and identify potential high-value patents. At the same time, the MIV algorithm was used to analyze the contribution and influence of various dimension indicators of patent value to the result of the high-value patents prediction. The experimental results show that: (1) The prediction performance of the BP neural network model is relatively good, and the prediction accuracy rate is all over 89%. The BP neural network model that takes the recognized high-value patents through "patent family size" as the predictive target vector has the best performance, while the BP neural network model with the predictive target vector composed of the recognized high-value patents through the combination indicator of "patent family size" and "patent citation frequency" performs relatively poorly. (2) The MIV absolute value can effectively reflect the influence and contribution degree of various patent value indicators on the result of the predication model. The indicator of technical value has the most significant influence on the result of the highly-value patent prediction based on the BP neural network model. From the perspective of the MIV absolute value and the total proportion of every single indicator, the four indicators including the number of patent IPC4 classification, the speed of first citation, the number of claims, and the frequency of patent citations have a more significant influence on the results of high-value patents prediction.
    Related Articles | Metrics | Comments0
    Effects of Negative Emotions on User Intermittent Discontinuance Behavior of Social Networking Services: Empirical Evidence from a Mixed Study
    Gan Chunmei Xiao Chen Chen Shuyi Lin Jingjing Qiu Zhiyan
    Journal of Information Resources Management    2023, 13 (6): 125-132.   DOI: 10.13365/j.jirm.2023.06.125
    Abstract149)      PDF(pc) (1357KB)(97)       Save
    Taking WeChat as the research sample, this study explores the negative emotions emerging in the social networking services (SNS) use and their configurations effects on SNS intermittent discontinuance behavior through a mixed study. Employing interviews and content analysis, the qualitative research of Study 1 found that, a variety of negative emotions, such as fatigue, anxiety, envy, frustration, disappointment, depression, worry and anger, are generated from SNS intermittent discontinuance behavior. And these emotions play separate or interactive roles. Furthermore, using 300 online questionnaires and fuzzy set qualitative comparative analysis (fsQCA), the empirical research of Study 2 revealed that, three configurations of conditions lead to SNS intermittent discontinuance behavior, i.e., users with envy, users with fatigue, and users with both envy and fatigue. They exert different levels of configuration effects on generating SNS intermittent discontinuance behavior. This study further enriches studies on negative emotions and social media user behavior, and confirms the complexity of emotions during social media use. In addition, this study provides theoretical references for service providers to retain users and for users to use SNS rationally.
    Related Articles | Metrics | Comments0
    The Developing Directions of Information Resources Management Discipline in the Era of Artificial General Intelligence
    Yan Hui
    Journal of Information Resources Management    2024, 14 (2): 21-28,53.   DOI: 10.13365/j.jirm.2024.02.021
    Abstract140)      PDF(pc) (765KB)(139)       Save
    This paper reviews the seventy-year developing history of Artificial Intelligence and Artificial General Intelligence(AGI), reflects on the fifty-year history of information resources management, analyzes the profound and multifaceted impacts of AGI on the knowledge system, education system, and career system of information resources management, and proposes three suggestions for the developing direction of information resources management discipline in the AGI era.
    Related Articles | Metrics | Comments0
    Identifying the Influencial Factors of Knowledge Capture and Learning Performance in Learning-Related Search: A Perspective of SAL
    Liu Wei Chen Jinbo
    Journal of Information Resources Management    2023, 13 (6): 133-143,155.   DOI: 10.13365/j.jirm.2023.06.133
    Abstract134)      PDF(pc) (2312KB)(81)       Save
    In this study, knowledge capture, immediate learning performance and continuous learning performance are used as indicators of learning effect at different phases. The relationship between search and learning is studied via questionnaire, mind map and video data collected from participants based on three health-related information tasks at various cognitive levels. It is found that: ①Health information literacy significantly improves knowledge capture, but prior knowledge has a negative moderating effect; ②Task complexity has a strong negative effect on immediate learning performance, and prior knowledge has a masking effect; ③Task complexity and knowledge capture have a significant negative effect on the continuous learning performance. The relationship between health information literacy and continuous learning performance are changed by the knowledge capture which is a full mediation variable. This study finds that learning-related search has a distinct impact in different phases of the learning chain, which is helpful to further understand information utilization and learning process.
    Related Articles | Metrics | Comments0
    Operation Evolution and Balanced Regulation of Archival Data Governance Ecology
    Jin Bo Yang Peng
    Journal of Information Resources Management    2023, 13 (6): 62-71.   DOI: 10.13365/j.jirm.2023.06.062
    Abstract132)      PDF(pc) (1313KB)(77)       Save
    Under the dual background of deepening the modernization of national governance and the wave of big data, archival data governance has become the theoretical frontier and practical hotspot of the archival field. Guided by the concept of ecological civilization, this paper explores and analyzes the connotation attributes and knowledge system of archival data governance ecology from the ecological perspective, so as to innovate and enrich the archival data governance theory, promote the cross-penetration of archival science, ecosystem and governance theory, and open up new growth points of the discipline. On the basis of summarizing the research status and development trend of archival data governance, this paper interprets and analyzes the definition characteristics of archival data governance ecology, and reveals the structural elements, evolution mechanism and operational obstacles of archival data governance ecology. Focusing on the healthy and harmonious development of archival data governance ecology, we explore and build a multi-dimensional, three-dimensional and systematic balanced regulation path, promote the coordinated operation, orderly evolution and energy level leap of archival data governance ecology, and promote the modernization of archival data governance.
    Related Articles | Metrics | Comments0
    An Empirical Study of the Effects of a Prebunking of Health Misinformation on Individuals’ Perceptions and Behavioral Intentions
    Li Xinyue Song Shijie Han Wenting Zhao Yuxiang Zhu Qinghua
    Journal of Information Resources Management    2024, 14 (1): 44-54.   DOI: 10.13365/j.jirm.2024.01.044
    Abstract128)      PDF(pc) (1221KB)(125)       Save
    This study aims to analyze the mechanisms of prebunking’s impact on two specific dimensions (i.e., individual perception and behavioral intention) and compare the efficacy of different prebunking strategies. The hypotheses were tested in a double-blind experimental design, wherein 182 participants were randomly assigned to a fact-based inoculation or a logic-based inoculation or a control group. Specifically, we use one-way ANOVA to test the mechanism of the effect of the pre-intervention and use multiple comparison analysis to test the effect of different interventions. The results indicate that prebunking have a significant impact on individual perceptions and behavioral intentions. In the perception dimension, prebunking substantially reduces individuals' perceived threat, perceived consensus, and perceived credibility of health misinformation. In the behavioral intention dimension, while prebunking effectively reduces individuals' sharing likelihood of health misinformation, it has little impact on their willingness to vaccinate against COVID-19. Furthermore, no significant difference was observed between the group of fact-based and logic-based inoculations. This study broadens the application scenarios and mechanisms of prebunking, offering evidence for assessing its feasibility and efficacy in the governance of health misinformation.
    Related Articles | Metrics | Comments0
    The Speech Acts Classification of Social Media Users in the Context of Public Emergencies
    Sun Ran An Lu
    Journal of Information Resources Management    2023, 13 (6): 99-109,124.   DOI: 10.13365/j.jirm.2023.06.099
    Abstract127)      PDF(pc) (9065KB)(66)       Save
    Automatic classification of speech acts can help to understand the intentions and behaviors of social media users' discourse and effectively uncover public opinion. Based on the Speech Act Theory, we provide a detailed classification of social media users' intentions expressed in tweets. We manually annotate four thousand vaccine-related tweets and extract user features, temporal features, text vector features, topic features, sentiment features, etc. Then, machine learning methods such as logistic regression, random forest, XGBoost, and a combination of BERT and neural network models are used to construct speech act classification models in the context of public emergencies. The SHAP interpretation method is used to rank the importance of features. Finally, we use the Kruskal-Wallis test to evaluate the differences in sentiment and the impact of various speech acts. The accuracy of speech act classification based on the XGBoost model reaches 0.792, which is better than baseline models. Text vector features have the highest importance in speech act classification. There is no significant difference in the number of retweets among different tweet speech acts, while there are significant differences in the number of likes and sentiment features.
    Related Articles | Metrics | Comments0
    Cross-chain Collaborative Mode for Medical-nursing Care Information by Polkadot Cross-chain Technology
    Hu Mo Zheng Yanning Zhou Ningren
    Journal of Information Resources Management    2023, 13 (5): 115-125,148.   DOI: 10.13365/j.jirm.2023.05.115
    Abstract127)      PDF(pc) (4840KB)(76)       Save
    This study aims to investigate the problem of poor coordination of medical-nursing care information for the elderly between medical institutions and pension institutions, which makes it difficult to provide higher quality smart medical-nursing care integration services. It is expected to provide new ideas and models for the elderly medical-nursing care information to realize cross-chain collaboration between medical institutions and pension institutions. First, based on the characteristics of different types of blockchain, the current study proposed the elderly’s medical health information alliance chain and the elderly’s pension care information alliance chain within the medical association, providing a content module for the subsequent construction of the cross-chain collaboration model of smart medical-nursing care information. Secondly, by analyzing the advantages and disadvantages of the current mainstream cross-chain technology in blockchain, this study focused on the Polkadot cross-chain technology, which is suitable for realizing the cross-chain collaboration of smart medical-nursing care information and can provide the optimal link for the subsequent construction of the cross-chain collaboration model of smart medical-nursing care information. Finally, based on the principles of human-centered, systemic and developmental view, this study adopted a component-based and modular design concept to build a cross-chain collaboration model of smart medical-nursing care information based on Polkadot blockchain technology, and analyzed its advantages and challenges. Based on the Polkadot cross-chain technology, the cross-chain collaboration model of smart medical-nursing care information can promote the cross-chain collaboration of the elderly’s medical health information and the elderly’s pension care information on the premise of protecting the privacy and security of the elderly.
    Related Articles | Metrics | Comments0
    Exploration and Reflection on Intelligent Mining and Service of Science & Technology Information Resources
    Luo Wei Tian Changhai Mao Bin Wu Shuyi Liu Pengnian
    Journal of Information Resources Management    2024, 14 (1): 22-28.   DOI: 10.13365/j.jirm.2024.01.022
    Abstract126)      PDF(pc) (6765KB)(128)       Save
    Related Articles | Metrics | Comments0
    Migration Map Across the Millennium:Deep Mining and Visualization Development of Migration Data in Genealogical Literature
    Liu Qianqian Xia Cuijuan Shan Shuyang
    Journal of Information Resources Management    2024, 14 (2): 95-103,161.   DOI: 10.13365/j.jirm.2024.02.095
    Abstract122)      PDF(pc) (3970KB)(83)       Save
    This study utilizes the synoptic catalog from Chinese Genealogy Knowledge Service Platform and applies technologies such as ontology and associated data, GIS and visualization to extract and exploit knowledge of migration information contained in genealogical literature, and designs and develops an interactive visual presentation project with migration spatio-temporal data for narrative, and delivers the service in multiple terminals and scenes, thereby enhancing the utility of genealogical literatures and pioneering innovative knowledge service models for genealogy. This study mines, organizes and visualizes large-scale data to provide new ideas for the promotion and utilization of the unique resources of library collections. It also offers new methods for the presentation and dissemination of humanities knowledge, and broadens the scope of digital humunities services to encompass the general public.
    Related Articles | Metrics | Comments0
    Risk Response of Artificial Intelligence Production Mode from the Perspective of Holistic Approach to National Security
    Cai Chiyu Hu Yuxuan Liu Zhi
    Journal of Information Resources Management    2023, 13 (6): 43-47.   DOI: 10.13365/j.jirm.2023.06.043
    Abstract122)      PDF(pc) (1030KB)(244)       Save
    Related Articles | Metrics | Comments0
    The Governance Boundary of the Enterprise Data Compliance Officer and Its Regulatory System
    Qi Pengyun
    Journal of Information Resources Management    2023, 13 (6): 85-98.   DOI: 10.13365/j.jirm.2023.06.085
    Abstract120)      PDF(pc) (789KB)(65)       Save
    Data compliance officers play a central role in enterprise data governance, and many countries have explored relative legislations and practice. Through literature analysis and comparative analysis, this paper reflects on the current compliance dilemma in enterprise data governance, and proposes that data compliance officers are strategic senior managers with independent status, whose personnel selection must meet professional qualification standards. Their functions cover six aspects, including data cognition, data consulting and data processing and so on. In terms of enterprise data governance responsibilities, it is necessary to clarify the personal legal responsibility boundary of data compliance officers. Therefore, this paper clarifys the governance boundaries of data compliance officers in China with reference to the international experience such as the special attention standard, the specific intention (tacit consent) standard and the two intermediate responsibility standards. In order to realize the effective construction of enterprise data compliance governance, the enterprise data governance system centered on data compliance officers should cover the core content of data compliance officers in at least four aspects: data risk management, data compliance communication, data processing supervision and responsibility incentives.
    Related Articles | Metrics | Comments0
    Application and Reflection of Full-text Bibliometric in the Era of Large Models ——A Review of the 2023 Academic Salon on Full-text Bibliometric Analysis
    Zhou Haichen Zhang Chengzhi Hu Zhigang Xu Shuo Mao Jin Chen Liang
    Journal of Information Resources Management    2024, 14 (2): 162-168,封2.   DOI: 10.13365/j.jirm.2024.02.162
    Abstract114)      PDF(pc) (797KB)(84)       Save
    On September 14-16, 2023, the Sixth Chengdu Conference on Scientometrics & Evaluation was held, hosted by the National Science Library (Chengdu), Chinese Academy of Sciences and organized by the Sci-tech innovation Evaluation Research Center (SERC). The Fourth Academic Salon on Full-text Bibliometric analysis, initiated by Zhang Chengzhi and others, was an important event of the Chengdu Conference, receiving more than eighty experts and scholars' enthusiastic participation and in-depth communication. By combing and summarizing the speeches and discussions of the guests of the salon, this article summarizes the main contents of the salon into the aspects of large language model and full-text bibliometric analysis, the application scenario of full-text bibliometric analysis and so on, in order to reveal the research status and development trend of full-text bibliometric analysis.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (6): 4-4.  
    Abstract110)      PDF(pc) (301KB)(133)       Save
    Related Articles | Metrics | Comments0
    Seeking and Sharing: Identification and Characteristics of Information Appeals for COVID-19 Vaccine Expressed in Online Community
    Ke Qing Ji Lu Jia Tina Du
    Journal of Information Resources Management    2023, 13 (6): 110-124.   DOI: 10.13365/j.jirm.2023.06.110
    Abstract109)      PDF(pc) (3505KB)(84)       Save
    The online community is an effective channel for users to express their appeals. This paper collected the COVID-19 vaccine posts from Baidu Tieba and constructed an information appeal classification framework based on the user’s motivation to participate in the online community. Combining the framework with the BERT and the LDA model, this paper identified the users’ appeal types and appeal topics and analyzed the features of information appeals in online community from the aspects of information supply & demand and dissemination. The results show that users express their informational and psychological appeals mainly by seeking and sharing factual information, and these two types of appeal have commonalities and differences in the topic content. However, from the perspective of supply and demand, there are more serious quantitative and cognitive contradictions. Moreover, the appeal types and appeal topics have impacts on the information dissemination. The classification framework of user information appeal proposed in this study is helpful for in-depth mining of the value of online community information resources, and the results provide some references for establishing an effective information supply and demand mechanism and public opinion control strategy.
    Related Articles | Metrics | Comments0
    Definition Standard of Property Rights of Government Data
    Lu Rongjie Zhou Youyong
    Journal of Information Resources Management    2023, 13 (6): 72-84,47.   DOI: 10.13365/j.jirm.2023.06.072
    Abstract104)      PDF(pc) (855KB)(49)       Save
    The definition standard of property rights of government data is the premise of government information resources management, and also the driving force for the high-quality development of digital government and the construction of data basic systems. This study systematically reviews the current research on the definitions of government data and the models for defining property rights of government data. Moreover, based on the unique attributes of government data such as the complexity, the dependence, and the diversification, this study proposes a three-dimensional standard for defining property rights of government data, which includes the interests measures, the type analysis, the participatory approval of the public.
    Related Articles | Metrics | Comments0
    Model, Current Situation and Countermeasures of Data Element Market Governance in China
    Ding Botao
    Journal of Information Resources Management    2024, 14 (2): 29-40.   DOI: 10.13365/j.jirm.2024.02.029
    Abstract101)      PDF(pc) (884KB)(114)       Save
    It is necessary to establish a scientific and efficient market governance mechanism to foster the high-quality development of the data element market. This paper examines the governance mechanisms of the data element market, proposing three governance models: market-oriented governance, vertical governance, and relational governance. It also compares their characteristics to analyze the current situation and challenges of market governance mechanisms. This paper emphasizes that China needs to adopt multiple governance models simultaneously, establishing a governance structure that primarily focuses on market-oriented governance, supplemented by vertical governance, and complemented by relational governance as a key addition. Furthermore, this paper offers specific countermeasures and suggestions for the further improvement of these three governance models.
    Related Articles | Metrics | Comments0