Most Read

    Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    A Review of Metaverse Research and Applications
    Star X.Zhao Qiao Lili Fred Y.Ye
    Journal of Information Resources Management    2022, 12 (4): 12-23,45.   DOI: 10.13365/j.jirm.2022.04.012
    Abstract1687)      PDF(pc) (934KB)(1579)       Save
    In review of the current situation and future of research and application of metaverse, this paper focus on four aspects: theoretical concepts, key technologies, application scenarios and policy governance. The academic community has now formed three major theoretical perspectives: parallel universe view, fusion universe view and evolutionary universe view, which converge three technological development paths of replicated reality, augmented reality and transcendental reality, respectively. The digital economics in business life, industrial production, culture and education, and urban society have produced a positive weather of blossoming. In terms of governance, this paper suggests that the development of metaverse in China should be built with "autonomous and controllable" industry, "virtual-reality interaction" direction and "inclusive and prudent" attitude. Finally, this paper presents three basic metaverse indicators, namely metaverse index, metaverse duration and metaverse population, to characterize the space, time and development of metaverse respectively.
    Related Articles | Metrics | Comments0
    Criteria of Structural Equation Modeling: Comparisons and Enlightenments of CB-SEM and PLS-SEM
    Yuan Ye Shiau Wenlung Yu Yuan Wang Kanliang Li Yiran
    Journal of Information Resources Management    2023, 13 (3): 6-22.   DOI: 10.13365/j.jirm.2023.03.006
    Abstract1615)      PDF(pc) (2464KB)(776)       Save
    Structural Equation Modeling (SEM) is used to analyze the complex relationships between observed variables and latent variables. Covariance-based structural equation modeling (CB-SEM) and partial least squares structural equation modeling (PLS-SEM) are the two types of SEM. SEM has been widely used in social science such as organizational management, information systems, marketing management and other disciplines. In recent years the number of research papers using PLS-SEM method has increased. Since CB-SEM and PLS-SEM are different in algorithm and requirements, the application of unsuitable methods may lead to inaccurate results. Therefore, it is necessary to understand the differences between the two methods and report guidelines. This paper reviews the conditions and application criteria of CB-SEM and PLS-SEM, and takes the use of fintech by wealth management enterprises as an example to compare the analysis process and results of the two methods, emphasizing the importance and necessity of choosing appropriate methods. This paper provides a valuable reference for researchers to use SEM for accurate data analysis.
    Related Articles | Metrics | Comments0
    The Main Practice and Basic Experience of Foreign Government Data Asset Management
    Xia Yikun Guan Qian
    Journal of Information Resources Management    2022, 12 (6): 18-30.   DOI: 10.13365/j.jirm.2022.06.018
    Abstract1139)      PDF(pc) (840KB)(681)       Save
    In the digital era, with the rapid expansion of government data volume and the updating of technological means, especially with the continuous promotion of big data strategy, open government data strategy, artificial intelligence strategy, and digital economy strategy, the important value of data as a strategic asset has become a global consensus. Focusing on the full realization of government data value and risk balance,this paper takes the strategies, policies and practical regulations of government data assets management in representative countries as the research object, then analyzes and summarizes its common characteristics and basic experience. That is, at the macro level, it is necessary to establish a comprehensive view of data assets and promote the overall layout of data asset management; at the meso level, the process management of data assets should be strengthened based on policies and schemes; at the micro level, the comprehensive application of technology, multiple partners, capabilities, and other elements should be used.
    Related Articles | Metrics | Comments0
    Frames and Impact on Vaccine Hesitancy of COVID-19 Vaccine Information among Social Media:Content Analysis and Online Control Experiment Based on Sina Weibo
    Cui Jiayong Wang Xiling
    Journal of Information Resources Management    2022, 12 (3): 165-180.   DOI: 10.13365/j.jirm.2022.03.165
    Abstract898)      PDF(pc) (3562KB)(562)       Save
    It is important to understand how information of COVID-19 vaccine is organized among social media and how social media messages influence public vaccine hesitancy. Based on Prospect Theory and Framing Theory, this paper conducts a content analysis to analyze the organization of vaccine information in social media during the early period of COVID-19 vaccine promotion and explore the persuasion mechanism of vaccine information frames to ease vaccine hesitancy by online controlled experiment. This study found that: 1) nearly 20% of the weibo content about COVID-19 vaccine uses gain-loss frame, of which the gain frame is the majority. Individualism and collectivism values account for half respectively, and about 50% contain narrative elements; 2) the gain-loss frame and narrative elements may affect the comment intention of users; 3) the loss frame, individualism values and narrative elements in vaccine advocacy content help to alleviate one’s vaccine hesitancy, and there is an interactive effect between goal frame and justice perspective. The results revealed the mechanism of social media information on vaccination attitudes in the early stage of COVID-19 vaccination, providing enlightenment for the government and media in health promotion during the pandemic.
    Related Articles | Metrics | Comments0
    Research on the Path to Realize the Value of Data Elements
    Ma Feicheng Wu Yishu Lu Huizhi
    Journal of Information Resources Management    2023, 13 (2): 4-11.   DOI: 10.13365/j.jirm.2023.02.004
    Abstract827)      PDF(pc) (1011KB)(651)       Save
    Identifying the path to realize the value of data elements is of great significance to accelerate the deep integration of digital economy and real economy. In order to explore the mechanism and path of realizing the value of data elements, this study combs the existing ways and attributes of data elements, clarifies the mechanism of realizing the value of data elements on this basis, and constructs the value realization path including basic activities, auxiliary activities and value development based on the value chain theory. The research shows that the value realization mechanism of data elements includes subject participation mechanism, marketization realization mechanism, ownership definition and transfer mechanism. Data collection, data organization, data circulation and data utilization are the basic paths to realize the value of data elements, while the three auxiliary activities of data security protection, data technical support and data talent guarantee ensure the realization of value.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors of Government Information Public Sustainable Use Behavior under Public Health Emergency: Trigger Path and Evolution Analysis Based on QCA
    Duan Yaoqing Zhu Yongdi Cai Qibin Wang Rui
    Journal of Information Resources Management    2022, 12 (3): 89-99.   DOI: 10.13365/j.jirm.2022.03.089
    Abstract779)      PDF(pc) (869KB)(319)       Save
    This paper uses grounded theory to analyze the interview data of 27 interviewees and extracts the influencing factors of government information public continuance use behavior under public health emergency. Based on the extracted factors and COVID-19, a questionnaire is designed and sent to 170 users. Then the paper identifies the trigger path of government information public continuance use behavior under public health emergency through fuzzy set qualitative comparative analysis, summarizes its mode, and further identifies the core factors and their evolution law, so as to realize the control of emergencies and improve the government’s ability to deal with emergencies. The results show that the trigger paths are in difference in each stage of the epidemic. Personal drive, information quality and government feedback are the key factors to trigger the continuance use of public government information under public health emergency.
    Related Articles | Metrics | Comments0
    Research on the Development Status and Development Trend of Data Element Market Construction in China
    Chen Lanjie Hou Pengjuan Wang Yinuo Sun Yaoming
    Journal of Information Resources Management    2022, 12 (6): 31-43.   DOI: 10.13365/j.jirm.2022.06.031
    Abstract683)      PDF(pc) (9792KB)(202)       Save
    The construction of data element market is the key of the development of digital economy in the 14th Five Year Plan period. This paper uses case analysis, induction and deduction, content analysis and other methods to indirectly reflect the market situation of data elements based on data sorting and comparison. From the perspectives of theoretical research and practical development, and from the three dimensions of policy guidance, development practice and strategic planning, this paper combs the development status and key contents of China’ s data factor market in the future. On this basis, it reveals six major trends in the development of China’ s data element market, namely, the gradual improvement of policy system, the priority of public data governance, the obvious trend of data resource capitalization, the emphasis on data diversified governance, the attention on data security and privacy protection, and the active exploration of cross-border data transactions.
    Related Articles | Metrics | Comments0
    Building Consensus and Promoting the First-Level Discipline Construction of Information Resource Management
    Ma Feicheng
    Journal of Information Resources Management    2023, 13 (1): 4-8.   DOI: 10.13365/j.jirm.2023.01.004
    Abstract682)      PDF(pc) (599KB)(388)       Save
    The knowledge system of LIS & Archives Management have undergone a long period of development, and its first-level discipline has been renamed "information resource management". As a first-level discipline name, information resource management highlights the characteristics of the times, covers the entire process of the field of library, information and archives, and opens up space for new fields. It is a concept that keeps pace with the times and integrates domestic and foreign information practice. After the renaming of the first-level discipline, an important issue that the academic community needs to solve is how to strengthen the construction of new majors. I suggest that both postgraduate and undergraduate levels can be considered comprehensively. At the postgraduate level, majors can be set according to the original secondary disciplines, or the connotation of information resource management, or a combination of the first two methods, which can not only retain the original secondary disciplines, but also contain new majors. At the undergraduate level, the major name of library and archives can be renamed as information resource management or information management to promote the connection between the undergraduate catalog and the postgraduate catalog.
    Related Articles | Metrics | Comments0
    The Development and Operation of Data Production Factors Market
    Ma Feicheng Lu Huizhi Wu Yishu
    Journal of Information Resources Management    2022, 12 (5): 4-13.   DOI: 10.13365/j.jirm.2022.05.004
    Abstract643)      PDF(pc) (718KB)(386)       Save
    As the digital economy has become an important driving force for the economic growth of China, cultivating data production factors market is an inevitable requirement for further economic development. The development of digital economy and digital industry provides the basic conditions for the expansion of the data element market, but the data element market of China is still in the initial stage of development. In this paper, we review the concept and development status of the data element market. Based on key influencing factors such as data ownership, data classification, data security, and open sharing, we analyze the current difficulties and challenges of the development of the data element market. The operating mode and mechanism of the data element market are systematically discussed. We put forward advice on the development path of the data element market, which provides useful thinking for guiding the high-quality development of the data element market.
    Related Articles | Metrics | Comments0
    Development of Information Resource Management Theory Driven by Digital Intelligence
    Hu Changping Lyu Meijiao
    Journal of Information Resources Management    2022, 12 (4): 4-11.   DOI: 10.13365/j.jirm.2022.04.004
    Abstract636)      PDF(pc) (917KB)(364)       Save
    The theoretical research of information resource management focuses on the form of information carrier, basic structure, internal relationship, resource development and user-oriented service. From the practice of information resource management, the construction of basic theory and forward-looking exploration must be supported by corresponding technology, that is, the development of information technology and its application determine the basic theoretical framework. Starting from the relationship between the progress of digital intelligence technology and the transformation of information resource form, this paper introduces the basic theoretical framework of information management driven by data intelligence technology and summarize the development of forward-looking theory. Focusing on the theoretical construction of information resource management discipline and the development analysis based on digital intelligence empowerment, this paper shows the theoretical development in big data and intelligence, so as to provide a reference for the research and practice of cutting-edge problems.
    Related Articles | Metrics | Comments0
    Research on Construction and Analysis of Financial Emergencies Knowledge Graph with Event Logical for Emergency Management
    Liu Zhenghao Zeng Xi Zhang Zhijian
    Journal of Information Resources Management    2022, 12 (3): 137-151.   DOI: 10.13365/j.jirm.2022.03.137
    Abstract630)      PDF(pc) (13865KB)(235)       Save
    The outbreak and evolution of financial emergencies are not conducive to the stability of financial markets, and exacerbate the possibility of systemic risks. In order to timely analyze and respond to financial emergencies and improve the emergency management mechanism, it is proposed to build a knowledge graph with event logical(KGEL)of financial emergencies to reveal the evolution mechanism of emergencies and assist emergency management and decision-making. Based on the perspective of knowledge-driven event association and evolution, the study selects high-quality financial emergency text data from a large number of financial news reports and constructs a two-tier structure KGEL with 199,736 events and knowledge entities and 444,950 relationships through ontology design, event extraction and event generalization. It also analyzes the evolution logic of emergencies through cases of Baoshang Bank, to provide corresponding suggestions for the improvement scheme and countermeasures of emergency management capability based on the graph. The study results show that the KGEL of financial emergencies can deeply and comprehensively reveal the evolution logic and risk transmission law of financial emergencies, and provide scientific and effective analysis ideas for emergency management of financial emergencies.
    Related Articles | Metrics | Comments0
    Research on the Formation Mechanism of Social Media Group Polarization under Hot Events
    Peng Guochao Cheng Xiao
    Journal of Information Resources Management    2023, 13 (2): 42-52.   DOI: 10.13365/j.jirm.2023.02.042
    Abstract589)      PDF(pc) (1084KB)(353)       Save
    By exploring the mechanism of generating social media group polarization, this study aims to provide a reference for guiding and avoiding social media group polarization. Based on the social burning theory, this study uses existing literature and selected cases to refine six explanations, including interest oppeals, news narrative framework, opinion leaders, initial media, issue types, and communication forms, and uses the clear-set qualitative comparative analysis to explore the generative path of social media group polarization. The study found that news narrative framework is a necessary condition for social media group polarization, and opinion leaders are the core condition for social media group polarization, which act as "accelerators" to jointly promote the generation of group polarization; As the "ignition temperature", the issule type has a moderating effect on the generation of social media group polarization; Hot events in the form of pictures and texts are more likely to cause group polarization on social media.
    Related Articles | Metrics | Comments0
    UK National Data Security Governance: Systems, Institutions and Implications
    Zhang Tao Cui Wenbo Liu Shuo Cai Qingping Ma Haiqun
    Journal of Information Resources Management    2022, 12 (6): 44-57.   DOI: 10.13365/j.jirm.2022.06.044
    Abstract586)      PDF(pc) (4413KB)(351)       Save
    This article sorts out the UK national data security governance measures from two aspects. First, the UK national data security governance system is divided into five parts: personal data security, government data security, network data security, data ethics security and artificial intelligence data security; The second is to sort out the powers and responsibilities of the UK data security governance institutions and analyze their characteristics. After years of evolution and changes in the UK national data security governance, its institutional evolution is from the outside to the inside. Focusing on personal data security and human rights, the UK was an early adopter of regulatory sandbox governance mechanism. Many related systems are still applicable after it left the EU. In terms of institutions, governance system of "one center, one network" has been developed. Finally, four suggestions are put forward in view of the current situation of data security governance in our country, that is, to improve a data security governance institutional system of "one center and one network", to build a data ethical cooperation mechanism among multiple stakeholders, to establish a supervision sandbox mechanism to effectively prevent and control data security risks, and to improve the institutional system of data security in the cross-border circulation.
    Related Articles | Metrics | Comments0
    The Metaverse and Libraries: A Review of Frontier Research and Future Prospects
    Zhao Yawen Lai Xingxing
    Journal of Information Resources Management    2023, 13 (1): 29-40.   DOI: 10.13365/j.jirm.2023.01.029
    Abstract579)      PDF(pc) (804KB)(325)       Save
    Using the literature review method, this paper first attempts to clarify the meta-question of "what is the Metaverse" from an interdisciplinary perspective. Secondly, the existing research results of the Metaverse and the library are systematically reviewed, and it is found that preliminary research results have been achieved in the two major aspects of theoretical research and applied strategy research.However, there are some problems such as the tendency of technological pragmatism about the Metaverse, the neglect of people, and the insufficient reflection on the Metaverse and Libraries research. In this regard, it is suggested that the future research on the Metaverse and Libraries should focus on the following three aspects: in terms of research methods, we should focus on advancing in-depth theoretical research on the Metaverse and Libraries from an interdisciplinary perspective; in terms of research objects, we should focus on changes in the basic concepts of the libraries field and their relations; on the research topic, the rational reflection on the Metaverse and libraries from the dual perspectives of theory and practice should be paid attention.
    Related Articles | Metrics | Comments0
    Data and Algorithm Security Governance in the United States: Approaches, Characteristics and Enlightenments
    Ma Haiqun Cai Qingping Cui Wenbo Zhang Tao
    Journal of Information Resources Management    2023, 13 (1): 52-64.   DOI: 10.13365/j.jirm.2023.01.052
    Abstract572)      PDF(pc) (1298KB)(442)       Save
    The new technological revolution and industrial transformation will reshape the global economy.Data and algorithms become an important driver of the new technological revolution, which also gives rise to a series of security risks. The United States has long attached great importance to data and algorithm security governance, and the study of data and algorithm security governance characteristics in the United States can play an important role in establishing and improving data and algorithm security governance mechanisms and systems in China. Starting from two dimensions of federal government, state and local government governance systems and institutions, it systematically sorts out the systems and institutional powers and responsibilities related to data and algorithm security in the United States, in order to realize the governance approach of data and algorithm security in the United States, and summarize its governance characteristics from two aspects of governance system and governance institution. Finally, four recommendations are made in the light of the current situation of governance in China: to build a "sub-field, refined, multi-level" personal privacy data security regulatory system; to build a "hardlaw for coordination" data and algorithm security governance mechanism; to establish an AI ethics code with " International discourse power"; to establish a "hierarchical, multi-party governancing" collaborative governance institution.
    Related Articles | Metrics | Comments0
    Computational Analysis of Public Opinion Evolution of Short Video in Emergencies
    Chen Jinghao Wang Youfeng Nie Huizi
    Journal of Information Resources Management    2022, 12 (3): 152-164,180.   DOI: 10.13365/j.jirm.2022.03.152
    Abstract565)      PDF(pc) (11879KB)(463)       Save
    In emergencies, the public has become accustomed to using short video platforms to publish crisis short videos, track crisis situations, and express emotions. This has brought great challenges to public opinion research, especially when faced with massive and high-frequency short video public opinion data, quickly grasping its evolutionary law is very important, which can provide support for emergency decision-making. Based on this, this paper proposes a short video public opinion evolution analysis framework for emergencies. It includes functions such as short video collection, compression, life cycle division, account type statistics, video classification, emotional tendency calculation, and topic mining. By using the case data of "Zhengzhou 7.20 Heavy Rain", this paper verifies the framework and finds that it can well complete the analysis task.
    Related Articles | Metrics | Comments0
    Prediction of Microblogging Public Opinion Reversal in the Context of Hot Events
    An Lu Hui Qiuyue
    Journal of Information Resources Management    2022, 12 (3): 21-34.   DOI: 10.13365/j.jirm.2022.03.021
    Abstract524)      PDF(pc) (1506KB)(564)       Save
    The rapid broadcasting of hot events by new media makes the phenomenon of public opinion reversal occur from time to time. It is important to identify the influence factors of public opinion reversal, which can help predict the reversal of public opinion at the beginning of public events. Successful prediction of public opinion reversal can help emergency management departments predict and guide the development trend of public opinion in time. It also helps enhance the credibility of the media and maintain the healthy development of the online ecological environment. We crawled the hot microblog posts of the topics about 38 hot events on Sina Weibo from 2017 to 2020. Based on the previous research, we proposed the public opinion reversal prediction models that consisted of 30 features from four aspects of events, users, information, and dissemination. The XGBoost technique was used to calculate the importance of different features in the public opinion reversal prediction model. The Logistic Regression, Decision Tree, Random Forest, XGBoost and Gaussian Naive Bayes techniques were used to construct the public opinion reversal prediction models. The models were trained and evaluated in the experiment to find out the optimal prediction model. The experimental result showed that the information balance, the type of the user who exposes the event, and the event type had the most significant impact on the prediction performance of the public opinion reversal model. The prediction models based on the Random Forest and XGBoost techniques achieved the best performance among all the five public opinion reversal models. Suggestions were also made on the discrimination and governance of public opinion reversal from three aspects, i.e., media, the public and social media platform.
    Related Articles | Metrics | Comments0
    Human-chatbot Interaction vs. Human-human Interaction: Effects of Service Agent Perception and Two-sided Arguments in Conversational Commerce
    Li Mengxin Yi Cheng
    Journal of Information Resources Management    2023, 13 (3): 140-153.   DOI: 10.13365/j.jirm.2023.03.140
    Abstract481)      PDF(pc) (1820KB)(373)       Save
    The fact that conversational commerce has been one of the most favorable ways for companies to reach customers has generated an increasing number of use cases for chatbots. Making a comparison between human-chatbot communication and human-human communication can shed light on the behavioral rules which determine how humans interact with intelligent agents and provide design and application guidelines for chatbots. This study compares human-chatbot conversation with human-human conversation in the context of online customer service to figure out whether two-sided arguments have different effects on users’ purchase intentions and experiences. A laboratory experiment is conducted with a 2 (user’s perception of the customer service agent: chatbot vs. human) 2 (conversation design: two-sided argument vs. one-sided argument). The experiment applies Wizard of Oz method, with humans performing service tasks while giving the impression to that users they are chatting with chatbots. The results show that in human-human communication, two-sided arguments have a negative impact on users’ purchase intention for the product, while in human-chatbot communication, the effect is non-significant. When users believe they are interacting with a chatbot, the positive effects of two-sided arguments on user perceptions of source credibility and pleasure are amplified.
    Related Articles | Metrics | Comments0
    Embracing Digital Intelligence, Expanding Advantages and Innovating the Future: Discussion on "New Liberal Arts Construction of Information Resources Management Specialty"
    Li Guihua Yao Ting Yu Zeyuan Zhang Chen
    Journal of Information Resources Management    2022, 12 (4): 141-146.   DOI: 10.13365/j.jirm.2022.04.141
    Abstract473)      PDF(pc) (643KB)(217)       Save
    “Information Resources Management Forum under the Background of New Liberal Arts Construction”brings together many experts, which shows the personal experience and the latest thinking of the construction of "New Liberal Arts" of information resources management in the new era, reflects the frontier thought of experts about specialty construction and points out the direction for specialty construction of "New Liberal Arts" in the era of Digital Intelligence. This paper sorts out, summarizes and analyzes the meeting reports and communication contents of experts and scholars. It is not only related to the connotation of the construction of "New Liberal Arts", the current challenges and construction experience of information resources management specialty, but also discusses the construction path of "New Liberal Arts" in the future around the application of technology, the expansion of specialty advantages, the cultivation of talents, the cross integration of disciplines and the strengthening of exchanges and cooperation, which provides a reference path for the high quality development of information resources management specialty in Digital Intelligence Era.
    Related Articles | Metrics | Comments0
    Research on Emergency Resource Layout from the Perspective of Big Data Driving
    Yuan Yu Fan Bo
    Journal of Information Resources Management    2022, 12 (3): 35-43.   DOI: 10.13365/j.jirm.2022.03.035
    Abstract470)      PDF(pc) (2740KB)(305)       Save
    As an important driving force of the new round of technological revolution and management change, big data plays an important role in the process of emergency resource layout. This paper specifies the key contents and implementation process of big-data-driven emergency resource layout, including two kinds of emergency risk grid division based on historical data mining and real-time index calculation, emergency resource planning combining static layout based on administrative division and dynamical location based on spatial clustering, emergency resource demand calculation addressing demand of information accuracy and computing resource, and emergency resource reserve replenishment business processes and models. Big data technology has changed the management thinking and decision-making mode of emergency resource layout to meet the needs of emergency resource management in the data age.
    Related Articles | Metrics | Comments0
    EU’s Protection of the Digital Sovereignty: Concept and Actions
    Guo Feng Qin Yue
    Journal of Information Resources Management    2022, 12 (4): 70-81.   DOI: 10.13365/j.jirm.2022.04.070
    Abstract460)      PDF(pc) (4629KB)(254)       Save
    With the development of new technology and industry revolution, digital economy has become the new engine for global economy growth. Major countries attach great importance to the development of digital economy. In the era of the digital economy, the European Union, which has traditionally pursued the supremacy of human rights, is increasingly emphasizing digital sovereignty and has carried out many actions to safeguard digital sovereignty, which deserves attention and indepth study. From the perspective of information study, this article comprehensively uses modeling method, difference method, literature analysis and observation method to systematically sort out important materials related to digital sovereignty issued by the European Union and its major member states, such as strategic documents, leader speeches, policies and regulations, and evaluation reports. This article summarizes the concept of digital sovereignty proposed by the European Union, and illustrates how EU safeguard its digital sovereignty from the three dimensions, including digital platform regulation, critical infrastructure construction, and technology & industry advancement, and then explains relevant enlightenments and suggestions.
    Related Articles | Metrics | Comments0
    Understanding the COVID-19 Vaccination Intentions of the Chinese Public During Well-contained Phase: Perspectives from Media Usage and Interaction, Health and Social Norm Beliefs
    Guo Lusheng Zhou Yaoyao Zhou Jinfeng
    Journal of Information Resources Management    2022, 12 (3): 100-117.   DOI: 10.13365/j.jirm.2022.03.100
    Abstract457)      PDF(pc) (2028KB)(164)       Save
    With the successful control of COVID-19 in China, the public’s perceived risk and vaccination intention have declined, posing a challenge to quickly establish an immune barrier. This study aimed to investigate the psychological, social, and media use factors that influences the COVID-19 vaccination intentions during the well-contained phase. A nationwide survey was conducted online among Chinese adults (N=1030)from April 1, 2021 to April 20, 2021 on the public’s vaccination intentions and possible influencing factors including perceived risks, benefits, barriers, and social norms, frequency of media usage and interaction, and demographic characteristics. The data were analyzed by PLS-SEM using SmartPLS software. The results show that vaccination intentions are generally high (85.6%), but there is a drop, and 37.9% of individuals will not be vaccinated immediately. Perceived social norms are the largest direct predictor, followed by perceived benefits, perceived barriers, and perceived risks. Media usage indirectly influences vaccination intention, and the effect of formal media is greater than that of social media. Media dependence is a moderator. If there is media dependence, the effect of formal media usage is significant while the effect of social media is not. If there is no media dependence, the opposite is true. These findings reveal how media usage and interaction, health and social norm beliefs predict vaccination intentions, providing insights into infectious health crisis communication and vaccination interventions.
    Related Articles | Metrics | Comments0
    The Framework, Implementation Path, and Challenges on Information Management of Supply Chain Empowered by Blockchain from the Perspective of Complex Sociotechnical Systems
    Zou Liuxin Wu Jiang Xia Mengchen
    Journal of Information Resources Management    2023, 13 (1): 91-102.   DOI: 10.13365/j.jirm.2023.01.091
    Abstract452)      PDF(pc) (6056KB)(504)       Save
    The combination of blockchain technology and supply chain information management is a trend in the development of digital supply chains, which attracts wide attention from many fields. This paper conducts thematic evolution analysis and clustering analysis on the scientific literature of blockchain-based supply chain information management in Web of Science. It proposes a research framework and analyzes the supply chain information management empowered by digital intelligence through blockchain technology from the perspective of complex sociotechnical systems. Through knowledge sharing, information traceability, and trust establishment, blockchain technology interlaces and verifies material circulation, commercial circulation, information circulation, capital circulation, and information at all levels of the technical system. Information management empowers the security and visualization of logistics, the transparency and traceability of commercial circulation, the sharing and immutability of information circulation, and the credibility and anonymity of capital circulation. Finally, this paper analyzes the supply chain information management practices based on blockchain technology from the management challenge and the application industry, and prospects for future research directions. It explores the transformation of information management enabled by blockchain technology from the level of technical and social systems, where thinking about information management from the perspective of complex sociotechnical systems inspires the development and digital construction of supply chains.
    Related Articles | Metrics | Comments0
    Big Data-Driven Public Health Risk Surveillance: Theoretical Framework and Practical Reflection
    Wang Chao Xu Wendong  Shi Ruyi Yu Xiaodong
    Journal of Information Resources Management    2022, 12 (3): 118-136.   DOI: 10.13365/j.jirm.2022.03.118
    Abstract429)      PDF(pc) (2290KB)(155)       Save
    Big data-driven public health risk surveillance has become one of the most active research fields of public health governance. However, the existing empirical evidence shows that the practical effect of big data surveillance is still insufficient. From the perspective of interactions between big data governance and risk surveillance,this paper aims to construct a theoretical framework of big data-driven public health risk surveillance. It reviews the progress of big data application in public health risk surveillance from the aspects of data sources, participants, model algorithms, surveillance systems and global cooperation networks. Then, it summarizes the present practical dilemma from the aspects of risk attributes, technical standards, regional economic differences, and participants’ awareness and ability. In the future, academia and practitioners need to focus on public health big data from exploring theoretical paradigms, building mutual trust relationships, optimizing surveillance mechanisms, exploring evidence-based decision-making, and integrating surveillance systems, so as to jointly promote the development of the new practice mode of public health risk surveillance driven by big data. At a time when the global epidemic prevention and control situation is still severe, the theoretical framework and practical reflection provided will help the academic community to form a clearer empirical understanding of big data-driven public health risk surveillance.
    Related Articles | Metrics | Comments0
    Can Balanced Information Exposure Help People Break the Information Cocoons? The Relationship Between Information Perception and Attitude Change
    Fu Shiting Jiang Tingting Tian Huiyi
    Journal of Information Resources Management    2023, 13 (1): 41-51.   DOI: 10.13365/j.jirm.2023.01.041
    Abstract423)      PDF(pc) (5703KB)(241)       Save
    Balanced information exposure has been regarded as an effective approach to break the information cocoon. However, while people hope this new way to require information will completely break the information cocoon, they ignore that the selective perception mechanism rooted in people’s hearts can still make them be resistant to change their attitudes. Until now, there is still a lack of empirical evidence on whether balanced information exposure can really promote attitudinal change and play an effective role in breaking the information cocoon. A total of 39 participants were recruited to browse a mocked health knowledge Q&A platform and read two answers from opposite positions on a controversial topic. After finishing reading, they were asked to evaluate the perceived credibility, persuasiveness, and importance of each answer. Besides, their prior and posterior attitudes were collected through questionnaires before and after the experiment. The results reveal that balanced information exposure can alleviate and change some people’s attitudes, and avoid polarization for everyone. However, the selective perception phenomenon is found in a small number of people, which plays a key role in resisting attitudinal change and breaking the information cocoon. According to the results of this study, the effective way for balanced information exposure to alleviate polarization is to improve people’s perceived credibility and persuasiveness of the counter-attitudinal information. Besides, when trying to change the valence of attitudes, it’s necessary to not only improve people’s perceived credibility, persuasiveness, and importance of counter-attitudinal information but also decrease people’s perceived persuasiveness and importance of the pro-attitudinal information. This study provides theoretical implications and methodological guidance for future research, as well as some practical implications for breaking the information cocoons and correcting online rumors.
    Related Articles | Metrics | Comments0
    The "CNKI Event" has Alerted and Reflected on the Literature Database Industry in China
    Zeng Jianxun
    Journal of Information Resources Management    2022, 12 (6): 11-17.   DOI: 10.13365/j.jirm.2022.06.011
    Abstract410)      PDF(pc) (696KB)(207)       Save
    After Professor Zhao Dexin won the lawsuit against CNKI, the Chinese Academy of Sciences stopped using the CNKI database due to the renewal fee of 10 million yuan, which once again brought CNKI into the center of public opinion. CNKI has repeatedly fallen into the whirlpool of public opinion such as "infringement" and "high pricing", which reflects the digital governance dilemma faced by the development of literature database in China under the new situation, and needs to arouse the alarm and reflection of the literature database industry in China. According to the situation of database in China, copyright mode, exclusive license mode, pricing mechanism, version of the fee standards, product model, learning mechanism, openness, bargaining power and social attribute of domestic and foreign database, which are related to the author, journal, the literature database platform and the reader, are discussed. This paper probes into the internal causes of the difficulties in the development of the literature database industry in China and gives a deep consideration to the development path of the business model of the literature database in China.
    Related Articles | Metrics | Comments0
    A Review of Secondary Analysis in Information Management and Information Systems Research in China: Research Methods,Topics, and Theory Applications
    Chen Liping Ren Fei
    Journal of Information Resources Management    2023, 13 (3): 61-78.   DOI: 10.13365/j.jirm.2023.03.061
    Abstract406)      PDF(pc) (1792KB)(489)       Save
    This study conducts a content analysis of 282 Chinese research papers published from 2012 to 2022 that use secondary analysis in the area of information management and information systems (IM&IS), aiming to reveal the distribution and trend of research methods, topics, and theory applications. The results show that the advantages of secondary analysis in data acquisition and causality identification are increasingly prominent, as reflected in the gradual diversity of data sources, rigorous empirical analysis on causality testing, richer mechanism analyses, and the emergence of mixed-method research. Four research topic trends have been identified, including macro digital development, enterprise digital transformation, information interaction between enterprise and market, and user online behavior. However, IM&IS theory development and the application of Chinese theories require further improvement. This study is novel in that it combines bibliometric analysis with machine learning methods (LDA and DTM) to reveal a multi-dimensional overview of the secondary analysis in IM&IS in China. The findings provide evidence and guidelines for further strengthening research norms, grasping research topic trends, developing and applying theories, as well as suggestions for disciplinary development and strategic research planning.
    Related Articles | Metrics | Comments0
    Data and Algorithm Security Governance in the European Union: Characteristics and Implications
    Cui Wenbo Zhang Tao Ma Haiqun Cai Qingping
    Journal of Information Resources Management    2023, 13 (2): 30-41.   DOI: 10.13365/j.jirm.2023.02.030
    Abstract405)      PDF(pc) (4166KB)(395)       Save
    Research on the structure and characteristics of data and algorithm security governance in typical global regions will provide a reference for data and algorithm security governance in China. The paper takes data and algorithm security as the governance object to investigate EU’s realization of the governance goal on digital sovereignty and technological sovereignty. In terms of governance content, the framework of the EU data and algorithm security governance with the core of the General Data Protection Regulations (GDPR) consists of four parts: privacy and data protection, data flow security, platform algorithm security, and artificial intelligence ethics. In terms of governance subjects, with the European Data Protection Regulatory Authority and other institutions as the core, a multi-party collaborative governance subject integrating "legislation-enforcement-service" is formed. The EU data and algorithm security governance has the typical characteristics of emphasizing personal privacy data security, establishing cross-border data flow security rules, forming a collaborative security governance model for algorithm nested data, and a human-centered AI ethics and governance. Based on the characteristics of data and algorithm security governance in the European Union, three suggestions are proposed for the current situation of data and algorithm security governance in China: to improve the collaborative governance mechanism of data and algorithm security, to establish a data flow system between subjects and an evaluation mechanism for intermediary agencies, as well as a balance mechanism between AI ethical supervision and innovative development.
    Related Articles | Metrics | Comments0
    Moral Appeal or Utilitarian Appeal? Research on Information Dissemination Mechanism of Public Crisis Emergencies Based on Emotional Certainty and Cognitive Decision-making
    Liu Jiaqi Qi Jiayin Wang Hongpeng
    Journal of Information Resources Management    2022, 12 (3): 76-88.   DOI: 10.13365/j.jirm.2022.03.076
    Abstract398)      PDF(pc) (4078KB)(281)       Save
    To understand the decision-making mechanism of social media users' spontaneous dissemination of crisis information, this paper discusses the boundary conditions and decision-making paths that trigger public crisis communication behavior based on HSM dual-system cognitive processing theory. Taking the moral appeal and utilitarian appeal often involved in crisis information into consideration, this paper examines the main effects of the two distinct kinds of crisis message appealing contents using econometric models. Moreover, this work focuses on two types of negative discrete emotions (i.e., anger and anxiety) with significant differences in certainty, and investigates the multiple complex moderating effects of them. Finally, the empirical research is completed through the multi large-scale datasets collected by Sina Microblog and Twitter platform during public crisis events. The results show that, (1) both moral appeal and utilitarian appeal will promote public crisis communication behavior; (2) anger-embedded strengthens the influence of moral appeal whereas it weakens the influence of utilitarian appeal on public crisis communication; (3) on the contrary, anxiety-embedded promotes the utility of utilitarian appeal on the public’s decisions but hurt the effect of moral appeal on them. The conclusion provides important decision support and theoretical basis for China’s public crisis management.
    Related Articles | Metrics | Comments0
    Personal Information Protection in Government Information Disclosure: In the Context of Major Public Health Emergency
    Wang Fang Zheng Yuxin Zhu Hongzhi
    Journal of Information Resources Management    2022, 12 (5): 25-40.   DOI: 10.13365/j.jirm.2022.05.025
    Abstract397)      PDF(pc) (7373KB)(164)       Save
    In order to reveal the contextual factors of personal information disclosure (PID) in major emergencies, this study adopted the theory of “privacy as contextual integrity” to guide a content analysis of the Epidemiological Investigation Reports (EIR) publicized by 45 Chinese local governments during the period of COVID-19. The research findings include: (1) the public value and personal sensitivity of personal information and its correlation with the context are core basis for judging the contextual integrity in information disclosure; (2) the degree of PID is related to some contextual factors, such as the development of epidemic situation and the privacy awareness of local governments; (3) legal environment and cultural norms impact information subjects’ perception of PID risks and intention of personal information protection. (4) Information audience is a part of the context of PID. On these bases, a theoretical model of contextual factors in PID is constructed, and classification framework for PID in major public emergency is also built and expected to guide the practice of government information disclosure.
    Related Articles | Metrics | Comments0
    Trade-offs,Subject Trust and Crisis Perception: Exploring Factors Affecting Regular Usage Intention of the “Health Code”
    Xie Xinzhou Shi Lin
    Journal of Information Resources Management    2022, 12 (3): 63-75.   DOI: 10.13365/j.jirm.2022.03.063
    Abstract392)      PDF(pc) (2115KB)(352)       Save
    Regular usage of the “Health Code”, a social governance and emergency management technology spawned by COVID-19 pandemic, not only relates to the life cycle of this technical tool, but also tests the feasibility and effectiveness of such data-based innovation for social governance in the post-pandemic era. Taking the Technology Acceptance Model (TAM) as a reference, a model of intention to regularly use the “Health Code” was constructed. The empirical results showed that people’s intention to regularly use the “Health Code” was accompanied by a "benefit-risk" calculus, and the results would change with the weakening of technology effectiveness, the intervention of data owners, and the recurrence of crisis situations. The theoretical and practical implications were then provided.
    Related Articles | Metrics | Comments0
    F-index: An Improved Method of Measuring Academic Influence
    Wang Chuanyi Yu Yinwei
    Journal of Information Resources Management    2022, 12 (4): 24-32.   DOI: 10.13365/j.jirm.2022.04.024
    Abstract378)      PDF(pc) (731KB)(110)       Save
    This research presents F index as an improved method of measuring academic influence. By using scholars in Philosophy, Laws, Statistics and Probability, Mechanical Engineering, Agronomy and Crop Science, Infectious Diseases and Multidisciplinary fields as samples, the effect of F-index on the measurement of academic influence is empirically tested. The result indicates that in the field of multidisciplinary evaluation, F-index shows a better discernment than h-index, p-index and FWCI with the capability of adjusting different standards of academic influence among different fields. In the evaluation of single subject, F-index has a high consistency with h-index, p-index and FWCI but also shows a better discernment, it is a further improvement based on the existing indicators.
    Related Articles | Metrics | Comments0
    Research on Microblog Public Opinion Derived Topic Communication based on Improved SEIR Model
    Wang Xiaoli Zhang Jing Zhao Laijun Xia Zhijie
    Journal of Information Resources Management    2022, 12 (4): 95-104.   DOI: 10.13365/j.jirm.2022.04.095
    Abstract377)      PDF(pc) (5326KB)(238)       Save
    In the new media era, the dissemination of microblog public opinion derived topics is becoming more and more popular, and the research on the dissemination law of this kind of public opinion has become the focus of scholars. Based on the improved SEIR public opinion communication model, considering the transformation of immune people into new topic communicators under the attraction of new topics and the competition in the communication of different topics, this paper constructs a microblog public opinion derived topic communication model, calculates the communication threshold through differential equation for analysis, and uses Lotka-Volterra competition model to analyze the competitive evolution of different topics. Based on the real case, the model is simulated by using NetLogo and MATLAB software. The feasibility and effectiveness of microblog public opinion derived topic communication model are verified through specific cases. The results show that the situation that immunized people start to spread new topics again expands the scale and influence of public opinion, and there is competition between different topics of the same public opinion, and its competition increases the impact of public opinion communication. Finally, it provides some specific strategies and suggestions for the government to effectively deal with the communication of microblog public opinion derived topics.
    Related Articles | Metrics | Comments0
    Leaping over the “Last Mile”:Difficulties and Strategies of the Transformation from Data to Evidence in Evidence-based Decision-making
    Wen Zhiqiang Hu Feng
    Journal of Information Resources Management    2022, 12 (4): 82-94.   DOI: 10.13365/j.jirm.2022.04.082
    Abstract376)      PDF(pc) (7561KB)(89)       Save
    Evidence is the resource and tool for evidence-based decision-making, and data is the underlying source of evidence. In the transition from massive data to effective evidence, it often encounters various endogenous factors. Only by clarifying the transformation dilemma and proposing a relief strategy can we cross the "last mile" of transformation and realize the function of evidence-based decision-making to the greatest extent. This article uses the concept and steps of horizon scanning as reference, and builds a holistic research framework of scanning multi-point dilemma, describing multidimensional variables and multi-path responsing, from the perspective of skewed problem identification, dynamic problem diagnosis, and steady problem solving. It further analyzes the variable factors that cause the dilemma by scanning and portraying of the transformation dilemma.On this basis, from the four dimensions of optimizing the system and mechanism settings, broadening the evidence-supplied channels, strengthening the interaction of the main interface, and improving the empowerment of technical tools, it proposes countermeasures to alleviate the transformation dilemma.
    Related Articles | Metrics | Comments0
    An Empirical Study on the Influence of Socio-technical Factors on Short Video Addiction: The Moderating Effect of Recommendation Algorithms
    Xie Xinzhou Du Yan
    Journal of Information Resources Management    2023, 13 (1): 65-77.   DOI: 10.13365/j.jirm.2023.01.065
    Abstract373)      PDF(pc) (1232KB)(457)       Save
    Based on a socio-technical perspective, this study examined the influence of social and technological factors on short video addiction through an online questionnaire survey. The findings reveal that personalization, responsiveness, active user control, and parasocial relationships can predict short video addiction. At the same time, user’s use of algorithms moderate the relationships between various factors and addiction. It will aggravate addiction by strengthening the influence of susceptibility factors and weakening the constraint of inhibitory factors. This study emphasizes the importance of the socio-technical interaction and algorithmic context on short video addiction, which enriches theoretical models and empirical studies of short video addiction. The results provide important practical implications for improving the effectiveness of anti-addiction through the synergistic optimization of social and technological systems.
    Related Articles | Metrics | Comments0
    The Logical Framework and Network Type of Public Security and Safety Data Collaborative Governance: A Case of Food Safety in Lanzhou
    Sha Yongzhong  Lu Li
    Journal of Information Resources Management    2022, 12 (3): 7-20.   DOI: 10.13365/j.jirm.2022.03.007
    Abstract372)      PDF(pc) (6193KB)(266)       Save
    Public security and safety data collaborative governance is necessary to realizing the public security and safety governance driven by big data. According to the Activity Theory, this paper analyzes the element and collaborative framework of public security and safety data collaborative governance. Then using the example of food safety data governance in Lanzhou, the Social Network Analysis is conducted to explore its network type and structural features quantitatively. The results have shown that there are limited data subjects who occupy the core position and control data resources in the holistic network of food safety data collaborative governance in Lanzhou. Besides, the subjects of different levels and types have various roles and influences in participating in data governance activities. Organizations at the grassroots level and the public are relatively weak in their participation and influence especially. At last, bidirectional data activities and flows based on reciprocity are conducive to forming factions and synergies driven by context events. Based on these findings, this paper puts forward the enlightenment to improve the effectiveness of public security and safety data collaborative governance in China.
    Related Articles | Metrics | Comments0
    An Empirical Study on the User Churn Prediction of Paid Knowledge Live
    Xing Shaoyan Zhu Xuefang
    Journal of Information Resources Management    2022, 12 (4): 121-130.   DOI: 10.13365/j.jirm.2022.04.121
    Abstract369)      PDF(pc) (5561KB)(257)       Save
    Taking advantage of machine learning algorithm in classification prediction, this paper explores a user churn prediction model of paid knowledge live through empirical research, analyzes the prediction variables, and provides decision-making basis for user retention management. Taking Zhihu live as data source, starting from two dimensions of user value characteristics and user review characteristics, users’latest consumption time, monthly average consumption times, average consumption amount, first consumption time, rating and comment text are collected, and then prediction models are constructed based on six different machine learning algorithms, and their prediction effects are compared. Then, the contribution of variables in the prediction of user churn is compared and analyzed. According to the key variables, the types of churn users are divided, and the corresponding retention strategies are proposed. Rating and comment sentiment have significant effect on user churn prediction; XGBoost model based on ensemble learning has the best performance, followed by random forest, so the superior generalization performance of ensemble learning has been well verified. By analyzing the important factors that affect user churn prediction, four types of churn users are summarized.
    Related Articles | Metrics | Comments0
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract364)      PDF(pc) (647KB)(317)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    Redrawing the Disciplinary Blueprint in the Name of Information Resources Management
    Feng Huiling
    Journal of Information Resources Management    2022, 12 (6): 4-10.   DOI: 10.13365/j.jirm.2022.06.004
    Abstract361)      PDF(pc) (659KB)(400)       Save
    This paper reviews the historical process of the renaming of the first-class discipline of "Library, Information and Archives Management" to "Information Resources Management", expounds the main reasons for the renaming of the discipline, responds to the doubts about the renaming, and finally puts forward three important tasks for the development of Information Resources Management in the future, namely, consolidating the basic theory of Information Resources Management in the new era, studying the basic framework of Information Resources Management, and ensuring the healthy development of Library Science, Information Science and Archival Science.
    Related Articles | Metrics | Comments0
    The Effect of Online Doctor-patient Interaction on Compliance of Patients with Chronic Diseases: From the Perspective of Patient Characteristics and Satisfaction
    Wang Siqi Lu Qinyan Xu Xinxiang Qin Ziru Zhang Xiaofei
    Journal of Information Resources Management    2022, 12 (6): 70-83.   DOI: 10.13365/j.jirm.2022.06.070
    Abstract359)      PDF(pc) (1103KB)(321)       Save
    Using online health communities to manage the health conditions of patients with chronic diseases is an important approach to relieving the shortage of medical resources and improving the health outcome of such patients in the new era. However, there are inconsistent findings in the current literature about the impact of this model on patient compliance. This paper constructs a decision model on the effect of patient-doctor interaction on the compliance of patients with chronic disease based on an online health community, taking diabetic patients on a well-known online health community in China as the research object and combining the characteristics of chronic disease patients (demand levels and complications). It explores the decision-making process of people with chronic diseases from a social support theory perspective with a view to explaining the inconsistent findings in the literature. The research results show that informational support and emotional support provided by doctors in the online health community will positively affect the satisfaction of patients with chronic diseases, so as to improve their compliance through satisfaction as a mediator variable; the demand level of patients with chronic diseases has a positive moderating effect on the relationship between emotional support and satisfaction, complications have a negative moderating effect on the relationship between satisfaction and compliance. This study enriches the research on the influencing factors and conduction paths of chronic disease patients’ compliance in the online health community, and puts forward relevant practical suggestions for the online health platform to better serve chronic disease patients.
    Related Articles | Metrics | Comments0