Most Read

    Published in last 1 year |  In last 2 years |  In last 3 years |  All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Review of Corpus Research in China
    Huang Shuiqing Wang Dongbo
    Journal of Information Resources Management    2021, 11 (3): 4-17.   DOI: 10.13365/j.jirm.2021.03.004
    Abstract3217)      PDF(pc) (1624KB)(1907)       Save
    With the in-depth development of big data and artificial intelligence technology, corpus research has received more and more attention. From the collection of language materials for linguistic research to the in-depth annotation knowledge resources supporting knowledge mining and discovery, the depth and breadth of the corpus related research have also been fully explored. This article takes the domestic journal literature as the object. First, we analyze the publishing trend of domestic corpus research, the author's cooperation and the research hotspots of different eras from a quantitative perspective. Secondly, we discuss the processes and methods of the construction and annotation of domestic corpus from a qualitative perspective. We explain the application status of corpus including the fields of language teaching, information retrieval, etc. Finally, we comprehensively discuss various representative corpus in China, and summarize the construction and development characteristics.
    Related Articles | Metrics | Comments0
    Research Progress in the Application of Flow Theory Abroad
    Jiang Tingting,  Chen Peilong Xu Yanrun
    Journal of Information Resources Management    2021, 11 (5): 4-16.   DOI: 10.13365/j.jirm.2021.05.004
    Abstract2438)      PDF(pc) (1703KB)(2541)       Save
    Flow refers to the holistic sensation that people feel when they act with total involvement. Related research of flow mainly focuses on the fields of education, computer and business administration, and has not been widely used in information behavior research. This study conducted a systematic review on 78 empirical studies that applied the flow theory. According to the research framework, those empirical studies were divided into three categories: the antecedents that affect the flow experience, the flow consequences triggered by the flow experience, and the mediating effects of flow experience between the antecedents and consequences. Combined with Person-Artifact-Task (PAT) model, this study summarized the related studies and elaborated on the practical enlightenment that flow can bring to real life, actively considered possible breakthroughs in flow measurement methods, and provided a clear and systematic approach to the application of flow theory to information behavior research.
    Related Articles | Metrics | Comments0
    Users’ Information Behavior from the Perspective of Metaverse:Framework and Prospect
    Wu Jiang Cao Zhe Chen Pei He Chaocheng Ke Dan
    Journal of Information Resources Management    2022, 12 (1): 4-20.   DOI: 10.13365/j.jirm.2022.01.004
    Abstract1843)      PDF(pc) (3218KB)(2047)       Save
    The metaverse is a digital society of the ternary world, in which people participate in the integration of virtuality and reality with a digital identity. From the perspective of the metaverse, the virtual and reality have been deeply integrated. Accordingly, information has a richer production and representation form, and users have new demands and experiences. It is noted that there exist both similarities and differences in users’ information behaviors between the metaverse and traditional environments. Specifically, from the perspective of the metaverse, the research on users’ information behaviors can be based on the existing theories and combined with the characteristics of the new environment. It can be carried out from the three dimensions of the user, information, and technology to achieve more effective information resource management and user behavior understanding, so as to promote the application promotion and risk management of the metaverse.
    Related Articles | Metrics | Comments0
    A Review of Metaverse Research and Applications
    Star X.Zhao Qiao Lili Fred Y.Ye
    Journal of Information Resources Management    2022, 12 (4): 12-23,45.   DOI: 10.13365/j.jirm.2022.04.012
    Abstract1686)      PDF(pc) (934KB)(1579)       Save
    In review of the current situation and future of research and application of metaverse, this paper focus on four aspects: theoretical concepts, key technologies, application scenarios and policy governance. The academic community has now formed three major theoretical perspectives: parallel universe view, fusion universe view and evolutionary universe view, which converge three technological development paths of replicated reality, augmented reality and transcendental reality, respectively. The digital economics in business life, industrial production, culture and education, and urban society have produced a positive weather of blossoming. In terms of governance, this paper suggests that the development of metaverse in China should be built with "autonomous and controllable" industry, "virtual-reality interaction" direction and "inclusive and prudent" attitude. Finally, this paper presents three basic metaverse indicators, namely metaverse index, metaverse duration and metaverse population, to characterize the space, time and development of metaverse respectively.
    Related Articles | Metrics | Comments0
    Criteria of Structural Equation Modeling: Comparisons and Enlightenments of CB-SEM and PLS-SEM
    Yuan Ye Shiau Wenlung Yu Yuan Wang Kanliang Li Yiran
    Journal of Information Resources Management    2023, 13 (3): 6-22.   DOI: 10.13365/j.jirm.2023.03.006
    Abstract1615)      PDF(pc) (2464KB)(776)       Save
    Structural Equation Modeling (SEM) is used to analyze the complex relationships between observed variables and latent variables. Covariance-based structural equation modeling (CB-SEM) and partial least squares structural equation modeling (PLS-SEM) are the two types of SEM. SEM has been widely used in social science such as organizational management, information systems, marketing management and other disciplines. In recent years the number of research papers using PLS-SEM method has increased. Since CB-SEM and PLS-SEM are different in algorithm and requirements, the application of unsuitable methods may lead to inaccurate results. Therefore, it is necessary to understand the differences between the two methods and report guidelines. This paper reviews the conditions and application criteria of CB-SEM and PLS-SEM, and takes the use of fintech by wealth management enterprises as an example to compare the analysis process and results of the two methods, emphasizing the importance and necessity of choosing appropriate methods. This paper provides a valuable reference for researchers to use SEM for accurate data analysis.
    Related Articles | Metrics | Comments0
    Recognizing Clinical Named Entity from Chinese Electronic Medical Record Texts Based on Semi-Supervised Deep Learning
    Jing Shenqi Zhao Youlin
    Journal of Information Resources Management    2021, 11 (6): 105-115.   DOI: 10.13365/j.jirm.2021.06.105
    Abstract1536)      PDF(pc) (3032KB)(1149)       Save
    The electronic medical record document records the entire process of patient diagnosis and treatment in detail. Medical knowledge is the most abundant in the electronic medical record. Therefore, it is of great value to explore the potential knowledge structure of the electronic medical record document. The primary task for knowledge mining of unstructured electronic medical records is named entity recognition. The existing named entity recognition methods in the medical field face the problems of low quality and insufficient annotation data. At the same time, the existing methods only consider the sequence characteristics of the text, and ignore the dependence between words and characters in the text, which limits the effect of named entity recognition. This paper proposes a medical named entity recognition method based on semisupervised deep learning, which combining the semiautomatic entity annotation method of Chinese encyclopedia with expert authority and the BERT-GCN-CRF framework to perform medical named entity recognition and extraction on electronic medical record text. Taking the real electronic medical record text as the experimental object, the accuracy, recall, and F1 value obtained by this model are significantly improved, and the comprehensive average of P, R and F1 are 84.6%, 84.0% and 84.2%, respectively. At the same time, the workload of manual labeling is significantly reduced. The new method is of great significance to the unstructured text mining of electronic medical records.
    Related Articles | Metrics | Comments0
    Evaluation of Telemedicine Policies Based on PMC Index Model
    Zhai Yunkai Guo Liuyan Zhao Dongxiang Lu Wei
    Journal of Information Resources Management    2022, 12 (2): 112-122,137.   DOI: 10.13365/j.jirm.2022.02.112
    Abstract1312)      PDF(pc) (5028KB)(358)       Save
    The evaluation of the telemedicine policy text can provide theoretical support and decision-making basis for the scientific formulation, effective implementation, adjustment and optimization of telemedicine policies. First, the telemedicine-related policy texts were collected and preprocessed, the high-frequency words were extracted through text mining, the keywords co-occurrence network was generated, and a PMC index model consisting of 10 first-level indicators and 48 second-level indicators was constructed. Then, seven representative telemedicine policies in China were selected as samples for further analysis, by calculating the PMC index and drawing the PMC surface diagram to analyze the pros, cons and optimize path of various policies, and the policy comparison analysis is carried out by radar chart. It is find that the overall design of policy samples are relatively reasonable and can effectively promote the development of telemedicine. Finally, a series of recommendations for telemedicine policies were put forward: ①In the process of telemedicine policy formulation, the predictability should be increased and the corresponding supervision mechanism should be introduced; ②setting multi-stage goals in long-term planning and accelerating the formulation of a dedicated telemedicine policy technology roadmap; ③enriching incentives and restraints means and refining the incentive measures taken; ④the government should strengthen policy priorities, clarify policy objectives, broaden policy scope, enrich policy content, and improve the incremental effect of the policy on the development of telemedicine.
    Related Articles | Metrics | Comments0
    Exploration on the Development Trend of Information Science in the Era of Data Intelligence Empowerment
    Lu Wei Yang Jinqing
    Journal of Information Resources Management    2022, 12 (2): 4-12.   DOI: 10.13365/j.jirm.2022.02.004
    Abstract1269)      PDF(pc) (4891KB)(985)       Save
    In the age of digital intelligence, the comprehensive intervention of big data, artificial intelligence and other new technologies has ushered in new opportunities for the development of information discipline. This paper first reveals the disciplinary characteristics of information science based on a review of the origins of the discipline, then analyzes the evolutionary path of information science research driven by data, and finally explores the development trend of information science by taking different periods of the disciplinary evolutionary path as a guide. The study found that information science started from scientific and technological information work, formed in the construction of information resources, grew in information management and services, developed in the expansion of information services, and has been constantly pioneering and innovating. The development of information science cannot be separated from the technology empowerment, especially the empowerment of big data + artificial intelligence and other information technology. This kind of empowerment will bring new growth points for the future development of information science.
    Related Articles | Metrics | Comments0
    Review on the Influencing Factors of Social Media Users’ Information Avoidance Behavior
    Dai Bao Yang Zeguo
    Journal of Information Resources Management    2022, 12 (2): 13-24.   DOI: 10.13365/j.jirm.2022.02.013
    Abstract1176)      PDF(pc) (2651KB)(1452)       Save
    This paper aims to uncover the influencing factors of social media users’ information avoidance behavior to provide convenience to scholars for future research, and it also provides theoretical guidance to relevant organizations for their practices of decreasing individuals’ information avoidance so as to improve the effectiveness of information communication. In order to find the main causes of social media users’ information avoidance behavior, the existing literature about ad avoidance, news avoidance, and other types of information avoidance were analyzed by using the systematical review approach. The results showed that social media users’ information avoidance was mainly impacted by the information-related factors (e.g., information quality, amount, and expression form), the user-related factors (e.g., cognition, affection, interests, attitudes, and behaviors), and situation factors (e.g., the characteristics of social media, and social influence of other users).
    Related Articles | Metrics | Comments0
    The Main Practice and Basic Experience of Foreign Government Data Asset Management
    Xia Yikun Guan Qian
    Journal of Information Resources Management    2022, 12 (6): 18-30.   DOI: 10.13365/j.jirm.2022.06.018
    Abstract1139)      PDF(pc) (840KB)(680)       Save
    In the digital era, with the rapid expansion of government data volume and the updating of technological means, especially with the continuous promotion of big data strategy, open government data strategy, artificial intelligence strategy, and digital economy strategy, the important value of data as a strategic asset has become a global consensus. Focusing on the full realization of government data value and risk balance,this paper takes the strategies, policies and practical regulations of government data assets management in representative countries as the research object, then analyzes and summarizes its common characteristics and basic experience. That is, at the macro level, it is necessary to establish a comprehensive view of data assets and promote the overall layout of data asset management; at the meso level, the process management of data assets should be strengthened based on policies and schemes; at the micro level, the comprehensive application of technology, multiple partners, capabilities, and other elements should be used.
    Related Articles | Metrics | Comments0
    Value Co-Creation Theory and Its Application and Prospect in the Field of Information System Research
    Zhou Yusheng Yuan Qinjian
    Journal of Information Resources Management    2021, 11 (6): 17-26.   DOI: 10.13365/j.jirm.2021.06.017
    Abstract998)      PDF(pc) (1205KB)(537)       Save
    To clarify the origin and development of value co-creation theory and its application progress in the field of information systems to provide insights for scholars who need to apply value co-creation theory in the field of information systems, this paper reviews and summarizes the application of value co-creation theory in the field of information systems, and summarizes the current research achievements, existing problems, and future research directions. The application of value co-creation theory in information system research mainly includes five aspects: information system design, information technology service innovation, consumers’ online participation in enterprise value co-creation, online information/knowledge sharing behavior, and online word-of-mouth and consumer purchase intention. In the meantime, there were still some undefined problems in the existing research, including “lack of research on the effect of cultural factors on value co-creation” and “lack of support from behavioral data”. Moreover, the future direction should pay more attention to the effect of cultural differences on value co-creation, consumers’ actual value co-creation behavior, and user value co-creation in different types of social platforms.
    Related Articles | Metrics | Comments0
    The Impact of Open Source Intelligence on National Intelligence Work System Innovation: A Systematic Literature Review
    Zhang Bin
    Journal of Information Resources Management    2021, 11 (4): 60-69.   DOI: 10.13365/j.jirm.2021.04.060
    Abstract980)      PDF(pc) (1984KB)(871)       Save
    Having an analysis on the impact of open source intelligence on the national intelligence work system, will simultaneously contribute to the abundance of the overall national security concept. The paper uses the method of systematic literature review, and analyzes the current content from four aspects: the characteristics of open source intelligence, open source intelligence technology,the current application field and the bottleneck restricting open source intelligence research, to construct a theoretical relationship diagram of the four national intelligence work system. Then it summarizes how the national intelligence work system should be improved to adapt to the development of open source intelligence better.Open source intelligence, which is mainly used in the fields of major epidemic prevention and control, think tanks, and national defense technology transfer, has the characteristics of open source and open analysis methods. However, there are still some deficiencies existing in personnel training and technology. The national intelligence work system should attach great importance to the top-level design and formulate rational criteria for the analysis method of dividing open source intelligence sources. To improve the flexibility and validity of the overall system, each department should combine its own characteristics to develop a system suitable for open source intelligence to play its own role, as a necessary supplement to the overall system. A "horizontal" and "vertical" talent training mechanism need to be established, and the connotation of the national intelligence work system need to be expanded. Above all, cross-field and compound talents with both intelligence analysis capabilities and information technology capabilities also need to be cultivated.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors of Privacy Fatigue of Mobile Social Media Users:Analysis based on Grounded Theory and Interpretative Structural Model
    Tian Xinluan Han Yuxin Zhang Xiaojuan,
    Journal of Information Resources Management    2021, 11 (5): 103-113.   DOI: 10.13365/j.jirm.2021.05.103
    Abstract965)      PDF(pc) (1942KB)(500)       Save
    Privacy fatigue has become a characteristic of the times that cannot be ignored by modern mobile social media users. This study constructs the influencing factor model of privacy fatigue from empirical data and further combs the relationship between factors to reveal the generation mechanism of user privacy fatigue. By adopting the grounded theory research method, this study collects data through in-depth interviews with 18 social media users, combs and summarizes the influencing factors of privacy fatigue through the stages of principal axis coding, selective coding, and theoretical saturation test, and uses the interpretative structural model method to analyze the internal relationship between various factors. The results show that perceived cost is the direct factor affecting user privacy fatigue, self-efficacy and perceived trust are the root factors, and perceived control and self-cognitive bias play a vital role in the formation of user privacy fatigue. On the basis of summarizing the influencing factors of social media users' privacy fatigue, this paper further combs the relationship between the factors, which not only provides a theoretical reference for understanding the influencing mechanism of users’privacy fatigue but also provides a new research perspective for the prediction of users’privacy behavior in the future.
    Related Articles | Metrics | Comments0
    Research on Cognition and Judgment of Short Video Credibility
    Liu Pingping Chen Ye Cheng Xi
    Journal of Information Resources Management    2021, 11 (6): 85-94.   DOI: 10.13365/j.jirm.2021.06.085
    Abstract936)      PDF(pc) (1458KB)(419)       Save
    Given the uneven quality of short videos in China and the insufficient judgment ability of short video credibility of some netizens, it is of great significance to investigate the cognition and judgment of short video credibility, to improve the judgment ability of short video credibility of users. This study takes college students as the survey object,combines the methods of literature research, depth interview, and questionnaire survey to explore the influencing factors of short video credibility judgment of users, as well as the importance and correlation of each influencing factor. The results show that the influencing factors of short video credibility judgment of users include four dimensions: source credibility, content credibility, media credibility, and external verification,and it is found that there is no significant correlation between the four dimensions. The research will provide theoretical support for the research on new media credibility, and provide method reference for users to judge the credibility of short videos.
    Related Articles | Metrics | Comments0
    Frames and Impact on Vaccine Hesitancy of COVID-19 Vaccine Information among Social Media:Content Analysis and Online Control Experiment Based on Sina Weibo
    Cui Jiayong Wang Xiling
    Journal of Information Resources Management    2022, 12 (3): 165-180.   DOI: 10.13365/j.jirm.2022.03.165
    Abstract898)      PDF(pc) (3562KB)(562)       Save
    It is important to understand how information of COVID-19 vaccine is organized among social media and how social media messages influence public vaccine hesitancy. Based on Prospect Theory and Framing Theory, this paper conducts a content analysis to analyze the organization of vaccine information in social media during the early period of COVID-19 vaccine promotion and explore the persuasion mechanism of vaccine information frames to ease vaccine hesitancy by online controlled experiment. This study found that: 1) nearly 20% of the weibo content about COVID-19 vaccine uses gain-loss frame, of which the gain frame is the majority. Individualism and collectivism values account for half respectively, and about 50% contain narrative elements; 2) the gain-loss frame and narrative elements may affect the comment intention of users; 3) the loss frame, individualism values and narrative elements in vaccine advocacy content help to alleviate one’s vaccine hesitancy, and there is an interactive effect between goal frame and justice perspective. The results revealed the mechanism of social media information on vaccination attitudes in the early stage of COVID-19 vaccination, providing enlightenment for the government and media in health promotion during the pandemic.
    Related Articles | Metrics | Comments0
    Research on the Construction of Risk Assessment and Decision-making Model of Major Public Health Emergency
    Liu Bing Xiao Gaofei Chao Shiyu
    Journal of Information Resources Management    2021, 11 (5): 17-26.   DOI: 10.13365/j.jirm.2021.05.017
    Abstract843)      PDF(pc) (1460KB)(641)       Save
    In order to establish a risk assessment and decision-making mechanism that adapts to the characteristics of different stages of the development and evolution of major public health emergencies, and play the collaborative and cooperative role of the participants and the decision support and driving role of information and knowledge, this paper constructs a dynamic and flexible risk assessment and decision-making model of major public health emergencies, which consists of four independent core levels : life cycle, risk assessment and decision-making, participants, information and knowledge, and the restricting factors and constraint conditions are the moderator variables. It provides a scientific and verifiable theoretical framework for the study of emergency management of major public health emergencies, and guides the risk assessment and decision-making practice under major public health emergencies.
    Related Articles | Metrics | Comments0
    A Review for Information Behavior Research During the Time Period of the 13th Five-Year Plan in China
    Li Yuelin Zhang Jianwei Wang Shanshan Zhang Xiaotong Zhang Tairui Li Anyi
    Journal of Information Resources Management    2022, 12 (1): 21-33,45.   DOI: 10.13365/j.jirm.2022.01.021
    Abstract829)      PDF(pc) (3218KB)(747)       Save
    The study conducts a content analysis of 497 research papers on information behavior published during the time period of the 13th Five-Year Plan in China, aiming to reveal the features of the research and problem existed. The results indicate that the research is concerned with various user groups and has extended to different information use environments and involved more information types. Health information behavior has been a hot topic in the area; case studies are becoming a new approach to information behavior research; an interdisciplinary research approach has been an obvious feature of information behavior research. In addition, the study identifies the shortcomings and problems, including lack of examination of the problems emerging from the development of the society from the macro level, lack of foresighted and predictive research to support the development of new technologies, lack of theoretical basis and theoretical innovation, and lack of understanding of various research methods and their limitations. The paper is concluded by a discussion how to conduct information behavior research during the time period of the 14th Five-Year Plan and the future.
    Related Articles | Metrics | Comments0
    Research on the Path to Realize the Value of Data Elements
    Ma Feicheng Wu Yishu Lu Huizhi
    Journal of Information Resources Management    2023, 13 (2): 4-11.   DOI: 10.13365/j.jirm.2023.02.004
    Abstract827)      PDF(pc) (1011KB)(650)       Save
    Identifying the path to realize the value of data elements is of great significance to accelerate the deep integration of digital economy and real economy. In order to explore the mechanism and path of realizing the value of data elements, this study combs the existing ways and attributes of data elements, clarifies the mechanism of realizing the value of data elements on this basis, and constructs the value realization path including basic activities, auxiliary activities and value development based on the value chain theory. The research shows that the value realization mechanism of data elements includes subject participation mechanism, marketization realization mechanism, ownership definition and transfer mechanism. Data collection, data organization, data circulation and data utilization are the basic paths to realize the value of data elements, while the three auxiliary activities of data security protection, data technical support and data talent guarantee ensure the realization of value.
    Related Articles | Metrics | Comments0
    Innovative Design and Practice of Red Cultural Information Resources Digitization from the Perspective of Cultural and Tourism Integration
    Tie Zhong Xia CuiJuan Huang Wei
    Journal of Information Resources Management    2021, 11 (4): 33-39.   DOI: 10.13365/j.jirm.2021.04.033
    Abstract792)      PDF(pc) (6620KB)(274)       Save
    With the continuous advancement of urbanization and digital transformation in China, the urban memory of buildings, spaces and places in cities is gradually becoming blurred.The digital preservation, reproduction and design of urban memory are particularly important.Shanghai is the birthplace of Chinese red culture.In addition to the tangible historical buildings in Shanghai, the information resources of red culture associated with them are particularly huge, which can serve as the fourth dimension of a three-dimensional space composed of buildings, spaces and places.The purpose of this study is to realize the "four-dimension" of "urban memory" and contribute to the integration of culture and tourism. Through data fusion across organizations, knowledge fusion beyond cultural memory carriers and the data innovation design and practice of the red cultural information resources in the cultural and tourism integration practice of "Shanghai Memory— Red Tourism", the paper combines the red cultural information resources with the city heritage organically. The digital knowledge innovation in the design of data fusion, accommodation, visualization, and augmented reality technology helps to solve the data isomerism of red culture information resources. It is conducive to interactive and experiential narrative expression, showing the scene, plot, time and space characteristics of urban memory.It will also promote the retention of the urban memory, enhances the sense of red cultural identity and social cohesion.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors of Government Information Public Sustainable Use Behavior under Public Health Emergency: Trigger Path and Evolution Analysis Based on QCA
    Duan Yaoqing Zhu Yongdi Cai Qibin Wang Rui
    Journal of Information Resources Management    2022, 12 (3): 89-99.   DOI: 10.13365/j.jirm.2022.03.089
    Abstract778)      PDF(pc) (869KB)(319)       Save
    This paper uses grounded theory to analyze the interview data of 27 interviewees and extracts the influencing factors of government information public continuance use behavior under public health emergency. Based on the extracted factors and COVID-19, a questionnaire is designed and sent to 170 users. Then the paper identifies the trigger path of government information public continuance use behavior under public health emergency through fuzzy set qualitative comparative analysis, summarizes its mode, and further identifies the core factors and their evolution law, so as to realize the control of emergencies and improve the government’s ability to deal with emergencies. The results show that the trigger paths are in difference in each stage of the epidemic. Personal drive, information quality and government feedback are the key factors to trigger the continuance use of public government information under public health emergency.
    Related Articles | Metrics | Comments0
    Comparison of Data Monopoly Governance Models between Europe and America and its Application to China
    Ran Congjing Liu Xianrui He Mengting
    Journal of Information Resources Management    2021, 11 (3): 19-29.   DOI: 10.13365/j.jirm.2021.03.019
    Abstract772)      PDF(pc) (4166KB)(402)       Save
    Data monopoly threatens national data sovereignty, digital economy development and individual data rights, and it is significant to construct a scientific and reasonable data monopoly governance model. In this paper, we have obtained the relevant theories, European and American regulations, organizations and enforcement cases through online and literature research, and summarized the respective antitrust analysis models of them. Based on the analysis models and their application characteristics, this paper analyzes the prudent regulation model of the United States, which focuses on the process of behavior, and the tight control model of the European Union, which focuses on the review of the effects of the purpose, further analyzes and draws on their advantages, disadvantages and experiences, and proposes countermeasures for the construction of data monopoly governance model in line with China's actual situation. This will help China maintain data sovereignty and security, protect data rights and interests, and achieve healthy development of digital economy.
    Related Articles | Metrics | Comments0
    From DIKW to DiKS
    Wan Li Han Yaming
    Journal of Information Resources Management    2021, 11 (3): 59-66.   DOI: 10.13365/j.jirm.2020.03.059
    Abstract769)      PDF(pc) (898KB)(631)       Save
    In such an information era, with the confusion and controversy of information, data, intelligence, and knowledge, the DIKW pyramid model has been popular for a long time. However, due to the different disciplines, DIKW is not a universal package theory. This article discusses the shortcomings and deficiencies of the DIKW model under the framework of the three elements of nature theory,and replaces I (information) and W (wisom) in the model with i (intelligence) and S ( science), the DiKS information wheel model is proposed and analyzed, then the following conclusions are drawn: ①There is only one carrier of information, that is matter; ②Information includes all the concept of description of objective things,like facts, data, intelligence, knowledge, intelligence and science,etc.; ③The introduction of scientific concepts in DiKS has a certain guiding effect on the future research of knowledge management, library and information science, and information science.
    Related Articles | Metrics | Comments0
    China’s Digital Inclusion Policy Analysis and Countermeasure Research: Based on the Perspective of Policy Tools
    Zeng Gang Deng Shengli
    Journal of Information Resources Management    2021, 11 (5): 73-83.   DOI: 10.13365/j.jirm.2021.05.073
    Abstract767)      PDF(pc) (3439KB)(308)       Save
    ith the rapid development of information technology, the construction of digital infrastructure continues to advance, which brings more convenience to people, but also brings the problem of "digital divide". In order to promote the digital equality of information vulnerable groups, the government has promulgated a number of policies and regulations. In this paper, 103 selected policy documents related to digital inclusion are used as research samples, and policy tools are used as research theory and basis to code, count and analyze the content of the research samples. The results show that China's digital inclusion related policies have some shortcomings, such as policy operability to be enhanced, overuse of environmental policy tools, structural imbalance between supply-demand policy tools, and poor foresight of digital inclusion policies. Based on these findings, the paper puts forward some suggestions, such as improving policy implementation rules, optimizing the structure of policy tools, and establishing a collaborative governance policy system, to provide reference for future policy-making.
    Related Articles | Metrics | Comments0
    Construction and Reflection of Revolution (Red) Document Service Platform for the Inheriting and Spreading of Red Culture
    Liu Qianqian Xia Cuijuan Zhu Wuxin
    Journal of Information Resources Management    2021, 11 (4): 17-24.   DOI: 10.13365/j.jirm.2021.04.017
    Abstract748)      PDF(pc) (2400KB)(459)       Save
    With the dividends brought by modern information technology, the purpose of this study is to explore digital humanities methods and technologies to build a red document service platform in the context of red culture inheritance, to realize the integration of red documents of multiple resource types and the fusion of multi-source heterogeneous red culture data, and to transform the traditional document search services into knowledge services. By investigating and comparing several red document projects in China, we have completed the practice of the first phase of the Revolution(Red) Document Service Platform project by relying on the red document resources in the collection and applying Linked Data technology, GIS technology and visualization technology. We propose a framework path and method for the construction of multiple types and heterogeneous resource service platforms in the field of red documents, and help peers to cooperate and share resources in the field of red culture inheritance, as well as the promotion of red culture.
    Related Articles | Metrics | Comments0
    Gender Differences in Academic Performance and Impact: An Analysis of the NSFC Project Principal Investigator
    Zhang Lin Du Huiying Shang Yuanyuan Huang Ying
    Journal of Information Resources Management    2021, 11 (3): 110-120.   DOI: 10.13365/j.jirm.2021.03.110
    Abstract744)      PDF(pc) (5066KB)(256)       Save
    Analyzing the gender differences in the academic performance of the scientific funding’s project principle investigators is of great importance for extending relevant research perspectives and future formulation of policy on researchers’ evaluation. Taking the principle investigators in Management Science granted by the National Natural Science Foundation of China (NSFC) in 2017 as research objects, we investigate the gender differences in research productivity and impact with the data of funded publications and resume information of principal investigators. The results indicate that: 1) from the perspective of papers' characteristics: the number of coauthors and the degree of internationalization of female principal investigators are significantly higher than those of males. The male principal investigators’ outputs have more diversified funding from other sources, while the publications of females are mostly funded by their own funding. 2) From the perspective of the papers’ impact, the academic impact of male project leaders is higher than those of females, and the number of Mendeley audiences is also larger than their female colleagues’. However, it is notable that female project leaders attract more social media attention. This study provides a relatively comprehensive comparative analysis of the academic performance between female and male project principal investigators, which might provide a better understanding of the characteristics between researchers of different genders for policymakers and further help them formulate targeted policies to promote the S&T innovation and social development.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors and Associated Path of Mobile Social Media Fatigue Based on ISM-MICMAC
    Wan Zhen Zou Kai Zhang Yanfeng Liu Yali
    Journal of Information Resources Management    2022, 12 (1): 46-55.   DOI: 10.13365/j.jirm.2022.01.046
    Abstract742)      PDF(pc) (1777KB)(521)       Save
    By analyzing the influencing factors of mobile social media fatigue, it can provide management decision-making reference for related enterprises and service operators to face and prevent mobile social media fatigue crisis. From information ecosystem theory, combined with extracted elements in four aspects of information human factors, information factors, information environment factors and technical factors based on the interpretive structure model (ISM) and cross-impact matrix multiplication applied to classification (MICMAC), the influence factors of the social media fatigue are proposed, and the corresponding mechanism model is constructed, and then the corresponding management strategy is put forward. The results show that soulmate difficulty,social anxiety,fear of missing out and compulsive use, as independent group factors, have the deepest influence on users’ social media fatigue. At the same time, the survey results also show that once the factors of low attention change, the factors of emotional exhaustion, low interest and low sense of accomplishment will change correspondingly, and further affect the users’social media fatigue behavior in varying degrees.
    Related Articles | Metrics | Comments0
    Research on the Governance Model of International Personal Data Cross-border Flow and China’s Reference
    Ran Congjing Liu Ruiqi He Mengting
    Journal of Information Resources Management    2021, 11 (3): 30-39.   DOI: 10.13365/j.jirm.2021.03.030
    Abstract718)      PDF(pc) (777KB)(457)       Save
    In recent years, with the rapid development of the Internet and global trade, large-scale personal data are frequently flowing between countries, and the cross-border flow of personal data has put citizens' privacy, commercial secrets and national security at risk. The protection of cross-border flow of personal data has gradually gained attention from various countries. By analyzing and sorting out the laws and policies related to the cross-border protection of personal data in the EU, the US and Russia, this paper summarizes their protection models and characteristics, and at the same time compares them with China's model to consider the optimization of China's protection model for cross-border flow of personal data and its response in cross-border trade. It finds that the EU, the US and Russia have each developed different models of protection for cross-border flows of personal data that are people-centred, interest-driven and sovereignty-restricted in practice, with different core demands, construction paradigms and implementation means under different models. Based on the current situation of the cross-border flow of personal data in China, the paper proposes a combination of comprehensive and specific legislation and regulation, parallel central regulatory review and local and industry-assisted governance, improvement of the whole chain of "ex-ante-medium-post" regulation means and strengthening international dialogue.
    Related Articles | Metrics | Comments0
    Policy Impact of Social Science Research: The Theory Models and Evaluation Practice
    Li Mengru Jin Xuehui Sun Ruodan Meng Xiao
    Journal of Information Resources Management    2022, 12 (1): 91-100.   DOI: 10.13365/j.jirm.2022.01.091
    Abstract704)      PDF(pc) (3372KB)(371)       Save
    Using documentary research to summarize and abstract basic theory models and the main ideas, a three-level classification system for these models was established, four typical evaluation frameworks of policy impact were introduced, and the advantages and disadvantages of different evaluation frameworks were pointed one by one with their general characteristics and shortcomings summarized. Then we analyzed the corresponding relation between basic theory models and different evaluation frameworks, and put forward some ideas and suggestions about its development trend.
    Related Articles | Metrics | Comments0
    Quantitative Analysis of Chinese Network Security Text from the Perspective of Policy Tools
    Zhang Chenfang Xia Zhijie Wang Yiming
    Journal of Information Resources Management    2021, 11 (3): 99-109.   DOI: 10.13365/j.jirm.2021.03.099
    Abstract702)      PDF(pc) (1353KB)(330)       Save
    Under the background of building new infrastructure and smart city, there is no doubt that enough concern must be paid to the problem of network security. Studying the texts of China's network security policy is very necessary for recognizing the current situation of China's network security policy and promoting the construction of network security protection management system. Taking 25 national cyber security policy texts from 2015 to 2020 as samples, this paper constructs a two-dimension analysis framework of policy tools and crisis life cycle, and the texts were analyzed by quantitative method of policy content. Studies have found that China's network security policy is related to network security practice, the usage of supply-oriented policy tools is as high as 61.22%, while the internal structure of environment-oriented policy tools is obvious imbalance, with high usage of laws and regulations, but none of financial tax policy; and the use of demand-oriented policy tools is low. It is also found that policy tools focus more on the pre-crisis stage, but involve less on crisis response and post-crisis reconstruction assessment. It requires clearly understanding the relationship between cyber security policy and practical development. According to the development of cyber security, we should coordinate the application of supply-oriented, environment-oriented, and demand-oriented policy tools, attach more importance to the coordination of policy tools at all stages of the crisis life cycle, and reasonably supplement the absent policy tools to ensure China's cyber security.
    Related Articles | Metrics | Comments0
    Research on the Development Status and Development Trend of Data Element Market Construction in China
    Chen Lanjie Hou Pengjuan Wang Yinuo Sun Yaoming
    Journal of Information Resources Management    2022, 12 (6): 31-43.   DOI: 10.13365/j.jirm.2022.06.031
    Abstract683)      PDF(pc) (9792KB)(201)       Save
    The construction of data element market is the key of the development of digital economy in the 14th Five Year Plan period. This paper uses case analysis, induction and deduction, content analysis and other methods to indirectly reflect the market situation of data elements based on data sorting and comparison. From the perspectives of theoretical research and practical development, and from the three dimensions of policy guidance, development practice and strategic planning, this paper combs the development status and key contents of China’ s data factor market in the future. On this basis, it reveals six major trends in the development of China’ s data element market, namely, the gradual improvement of policy system, the priority of public data governance, the obvious trend of data resource capitalization, the emphasis on data diversified governance, the attention on data security and privacy protection, and the active exploration of cross-border data transactions.
    Related Articles | Metrics | Comments0
    Building Consensus and Promoting the First-Level Discipline Construction of Information Resource Management
    Ma Feicheng
    Journal of Information Resources Management    2023, 13 (1): 4-8.   DOI: 10.13365/j.jirm.2023.01.004
    Abstract682)      PDF(pc) (599KB)(388)       Save
    The knowledge system of LIS & Archives Management have undergone a long period of development, and its first-level discipline has been renamed "information resource management". As a first-level discipline name, information resource management highlights the characteristics of the times, covers the entire process of the field of library, information and archives, and opens up space for new fields. It is a concept that keeps pace with the times and integrates domestic and foreign information practice. After the renaming of the first-level discipline, an important issue that the academic community needs to solve is how to strengthen the construction of new majors. I suggest that both postgraduate and undergraduate levels can be considered comprehensively. At the postgraduate level, majors can be set according to the original secondary disciplines, or the connotation of information resource management, or a combination of the first two methods, which can not only retain the original secondary disciplines, but also contain new majors. At the undergraduate level, the major name of library and archives can be renamed as information resource management or information management to promote the connection between the undergraduate catalog and the postgraduate catalog.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2021, 11 (6): 4-9.   DOI: 10.13365/j.jirm.2021.06.004
    Abstract680)      PDF(pc) (585KB)(613)       Save
    Related Articles | Metrics | Comments0
    A Blockchain-Based Early Warning System for Infectious Diseases: Risk Measurement Combined with Complex Network
    Yan Jiaqi Song Jinbei Da Jingwei Wang Zhongmin
    Journal of Information Resources Management    2021, 11 (4): 90-99.   DOI: 10.13365/j.jirm.2021.04.090
    Abstract670)      PDF(pc) (5746KB)(322)       Save
    The outbreak of COVID-19 warned the importance of building effective early warning mechanisms for new major infectious diseases. In the existing early warning system of infectious diseases in China, it is difficult to balance the timeliness and certainty when reporting infectious diseases. Based on the hospital data, this paper analyzes the cases, medical resources, pathological features and their relationship, proposes an infectious disease risk measurement algorithm based on complex network modeling, and constructs an infectious disease risk early warning and data sharing system based on blockchain technology. The proposed system realizes the safe storage and sharing of data through the blockchain technology, conducts distributed global model training through federal learning, and combines smart contracts and doctor's experience to realize timely and accurate early warning of infectious disease risk. The nodes in blockchain can automatically report the early warning after reaching the distributed consensus, further improving the early warning and reporting process.
    Related Articles | Metrics | Comments0
    Research on the Influencing Factors of Information Avoidance Behavior of College Students as Social Media Users in Public Health Emergencies
    Wen Xinyue Cheng Huiping
    Journal of Information Resources Management    2022, 12 (2): 25-38.   DOI: 10.13365/j.jirm.2022.02.025
    Abstract661)      PDF(pc) (1249KB)(486)       Save
    To explore the influencing factors and mechanism of social media users’ information avoidance behavior in public health emergency, is great for providing reference path for better meeting users’ information needs and optimizing social media information environment. Taking the epidemic situation of COVID-19 as an example, college students with rich experience in using social media were selected as the research samples, and the data were obtained through in-depth interviews. Using the qualitative research method of grounded theory, this paper extracts concepts and categories, and constructs the influencing factors model of social media users’ information avoidance behavior under public health emergencies. In public health emergency, information overload and environmental factors indirectly affect social media users’ information avoidance behavior by stimulating users’ emotion, cognitive structure and risk perception; cognitive structure and risk perception directly affect social media users’ information avoidance behavior, and also stimulate users’ emotion; high wake-up emotion and low wake-up emotion in emotional factors can lead to different types of information avoidance behavior of social media users. Strong-ties social media and weak-ties social media have moderating effect in the impact of information overload on users’ emotion, cognitive structure and risk perception.
    Related Articles | Metrics | Comments0
    Review of Privacy Behaviors Research on Social Networks of Minors Abroad
    Deng Shengli  Wang Ziye
    Journal of Information Resources Management    2021, 11 (4): 112-120.   DOI: 10.13365/j.jirm.2021.04.112
    Abstract660)      PDF(pc) (2088KB)(280)       Save
    Through content analysis, this paper makes a systematic and comprehensive overview of the existing research on privacy behaviors of minors on social networks in foreign countries from three aspects, privacy concern, privacy disclosure and privacy protection. Then it summarizes the influencing factors such as demography variables, internal factors and external influence. Finally, a research framework is constructed and the future research is prospected.
    Related Articles | Metrics | Comments0
    An Exploratory Study on WeChat Users’ Discontinuance Behavior from the Perspective of Grounded Theory
    Gan Chunmei Lin Jingjing Xiao Chen
    Journal of Information Resources Management    2021, 11 (5): 96-102.   DOI: 10.13365/j.jirm.2021.05.096
    Abstract652)      PDF(pc) (850KB)(218)       Save
    The increasing penetration of social media has resulted in user discontinuance. Taking WeChat as an example, this study explored the antecedents and outcomes of WeChat discontinuance. Based on grounded theory, interview data from 39 WeChat users in China were collected and further analyzed via Nvivo 11. Through open coding, axial coding, selective coding and theoretical saturation testing, this study obtained the relationship among different factors and WeChat discontinuance, and therefore developed a theoretical model of antecedents and outcomes of WeChat discontinuance. Results showed that, stimulus factors(such as upward social comparison and conflict) had significant effects on organic factors(such as negative emotional experience), which further influenced WeChat discontinuance. Also, the outcomes of WeChat discontinuance included social change, behavioral change and emotional change.
    Related Articles | Metrics | Comments0
    The Development and Operation of Data Production Factors Market
    Ma Feicheng Lu Huizhi Wu Yishu
    Journal of Information Resources Management    2022, 12 (5): 4-13.   DOI: 10.13365/j.jirm.2022.05.004
    Abstract643)      PDF(pc) (718KB)(386)       Save
    As the digital economy has become an important driving force for the economic growth of China, cultivating data production factors market is an inevitable requirement for further economic development. The development of digital economy and digital industry provides the basic conditions for the expansion of the data element market, but the data element market of China is still in the initial stage of development. In this paper, we review the concept and development status of the data element market. Based on key influencing factors such as data ownership, data classification, data security, and open sharing, we analyze the current difficulties and challenges of the development of the data element market. The operating mode and mechanism of the data element market are systematically discussed. We put forward advice on the development path of the data element market, which provides useful thinking for guiding the high-quality development of the data element market.
    Related Articles | Metrics | Comments0
    Research on the Identification Method of Cutting-edge Patented Technology in the Industrial Field: Taking the Field of Artificial Intelligence as an Example
    Liu Jialong Ding Shengchun
    Journal of Information Resources Management    2021, 11 (6): 95-104.   DOI: 10.13365/j.jirm.2021.06.095
    Abstract637)      PDF(pc) (2502KB)(316)       Save
    This article proposes a method for identifying frontier patent technologies in order to discover cutting-edge patented technologies in the industry. According to the characteristics of cutting-edge patented technology with high attention, high centrality, high development potential, high scientific relevance and high technical relevance to design calculation methods for each feature, a frontier patent technology identification index system is constructed. The calculated results are respectively normalized calculated or by the gray relational analysis method, and the frontier value is calculated based on the entropy weight method. The field of artificial intelligence is taken as an example to conduct empirical research.According to the calculation results of the cutting-edge value, the patented technologies in the top 10 of the cutting-edge value from 2014 to 2019 which appear twice or more are defined as cuttingedge patented technologies. The number of applications is divided into three categories. The first category is patented technologies that have a relatively low number of applications but have a good scientific and technological foundation and a high degree of attention, the second category is developed patented technologies to lead the industry with a rapid increase in applications in recent years ,the third category is those more mature but still-developing patented technologies. It proves that the method proposed in this article is effective, and it has certain reference value for discovering cutting-edge patented technology in the industrial field in advance.
    Related Articles | Metrics | Comments0
    Development of Information Resource Management Theory Driven by Digital Intelligence
    Hu Changping Lyu Meijiao
    Journal of Information Resources Management    2022, 12 (4): 4-11.   DOI: 10.13365/j.jirm.2022.04.004
    Abstract635)      PDF(pc) (917KB)(364)       Save
    The theoretical research of information resource management focuses on the form of information carrier, basic structure, internal relationship, resource development and user-oriented service. From the practice of information resource management, the construction of basic theory and forward-looking exploration must be supported by corresponding technology, that is, the development of information technology and its application determine the basic theoretical framework. Starting from the relationship between the progress of digital intelligence technology and the transformation of information resource form, this paper introduces the basic theoretical framework of information management driven by data intelligence technology and summarize the development of forward-looking theory. Focusing on the theoretical construction of information resource management discipline and the development analysis based on digital intelligence empowerment, this paper shows the theoretical development in big data and intelligence, so as to provide a reference for the research and practice of cutting-edge problems.
    Related Articles | Metrics | Comments0
    Analysis of the Characteristics and Related Factors of International Media China-related Reports on Public Health Emergencies:Based on COVID-19 Data
    Chen Jinghao Xie Xiankun Chen Meihe
    Journal of Information Resources Management    2022, 12 (2): 76-87.   DOI: 10.13365/j.jirm.2022.02.076
    Abstract632)      PDF(pc) (4315KB)(321)       Save
     It is of great significance to analyze the characteristics of China-related reports of international online media during the pandemic of COVID-19 in China, which will help the government accurately study and judge the international public opinion environment, respond effectively, and maintain the image of the country.This paper uses statistical analysis, sentiment classification, and topic models to perform trend analysis, source analysis and content analysis on the text of the GDELT COVID-19 database. Correlation analysis is used to explore factors related to the number of China-related reports in various countries, and hierarchical clustering clusters countries with similar report characteristics. The study found that international media reports on China are mainly dominated by Western countries led by the United States, and the reports are significantly unbalanced; Negative China-related reports are mainly exported by the United Kingdom and the United States; The greater the proportion of import and exports to China in its total import and exports, the more concerned it is about China’s covid-19 epidemic; The countries with higher medical standards, their China-related COVID-19 epidemic reports account for the proportion of all reports in the country, which is lower than the average level. This paper systematically explains the characteristics of China-related reports by international media in current public health emergencies, and provides some references for the government to effectively respond to international public opinion.
    Related Articles | Metrics | Comments0