Most Downloaded

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract376)      PDF(pc) (647KB)(325)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    The General Idea of Scientific Data Governance and Practical Case Verification—Taking the Astronomical Data Governance of the National(Guizhou) Hub Node of the Nationwide Integrated Computing Power Network as an Example
    Ma Xiao Guo Mingjun Yi Chengqi Dou Yue Liang Chuyi
    Journal of Information Resources Management    2023, 13 (5): 126-136.   DOI: 10.13365/j.jirm.2023.05.126
    Abstract161)      PDF(pc) (2119KB)(293)       Save
    Scientific data governance is an important way to promote scientific and technological progress and release the value of scientific data. As an important part of scientific data, astronomical data is of great significance for consolidating our country's international advantages in the field of astronomical research and achieving efficient and safe data governance. This paper adopts the theoretical deduction and case mapping as research methods. On the basis of fully learning from the mature model of data governance, based on collaborative innovation theory and public value theory, it studies “subject-object-carrier”and“problem and target oriented” in the “three bodies and two directions” analytical model of in the field of scientific data governance. Based on this model, a mapping study was carried out on the “FAST” astronomical data governance. It provides a research method from theory to practice of “guiding theory-analysis method-case mapping” for scientific data governance, and provides useful support for the exploration and formation of systematic astronomical data governance.
    Related Articles | Metrics | Comments0
    The Construction of Cultural Heritage Smart Data for the Inheritance and Activation
    Wang Xiaoguang Hou Xilong
    Journal of Information Resources Management    2023, 13 (5): 5-14,43.   DOI: 10.13365/j.jirm.2023.05.005
    Abstract252)      PDF(pc) (2842KB)(281)       Save
    Smart data is becoming a new development trend of information resource construction in the age of data and intelligence. It is an advanced form of data resources organization and more suitable for the new demands and requirements on the data and service in the new environment. Firstly, this article systematically reviews the historical evolution and development trend of smart data, and analyzes the scientific meaning and critical features of smart data. Secondly, facing the problems of cultural heritage inheritance and activation, this article explains the internal logic of smart data empowering cultural heritage activation. Finally, the article puts forward the construction measures and path of cultural heritage smart data, including the construction mechanism, smart data standards and specifications, cultural gene deconstruction, quality control system. The research of smart data not only improves the quality and efficiency of big data resources, but also contributes to the theoretical reform of information resources management and knowledge management in the empowerment of data and intelligence. The construction of cultural heritage smart data resources will effectively promote the process of cultural heritage protection, inheritance and activation.
    Related Articles | Metrics | Comments0
    Impact of Data Classified and Graded Rights Confirmation on the Realization of the Value of Data Elements
    Ma Feicheng Xiong Siyue Sun Yujiao Wang Wenhui
    Journal of Information Resources Management    2024, 14 (1): 4-12.   DOI: 10.13365/j.jirm.2024.01.004
    Abstract356)      PDF(pc) (1559KB)(275)       Save
    Data rights confirmation is essential for realizing the value of data elements and sustaining the normal operation and continuous development of data elements market. This study delves into concepts related to data rights confirmation and explores the path of how to establish a property right system to realize data rights confirmation. Furthermore, this study shows methods for the data classified and graded rights confirmation, analyzing their impact across the data value chain. Results show that in the data collection stage, the data classified and graded rights confirmation mechanism can motivate data supply, improve data quality, and stimulate market vitality. In the data organization stage, it can break down technical work, protect private data, and explore potential value. In the data circulation stage, it can regulate negative externalities, reduce transaction costs, and optimize the allocation of resources. And in the data utilization stage, it plays a key role in data compliance regulation and data value redevelopment.
    Related Articles | Metrics | Comments0
    Intelligent and Smart Service of Multi-model Cultural Heritage Resources: From Available to Evidential and Experiential
    Xia Cuijuan
    Journal of Information Resources Management    2023, 13 (5): 44-55.   DOI: 10.13365/j.jirm.2023.05.044
    Abstract254)      PDF(pc) (2030KB)(262)       Save
    The development of data and intelligence technologies is promoting the transformation from "digital GLAMs" to "smart GLAMs". In the transformation from digitalization to datafication and then to intelligence, the cultural heritage resources of GLAMs show the multi-model characteristics of multimedia, multi-format and multi-granularity. Aiming at the problem of how GLAMs provide intelligent services based on multmodel cultural heritage resources, this paper summarizes the transformation path of cultural heritage resources from digital, data to intelligent services based on case analysis and literature research. According to the low to high degree of resource intelligence, inteligent services can be summarized into three modes: available, evidential and experiential, which correspond to three different demand scenarios: resource-centered services, digital intelligence evidence-based services, and interactive experience-centered services. It is concluded that the intelligent services of multi-model cultural heritage resources are to predict in advance and automatically adapting to users' needs for different modes of cultural heritage resources in different demand scenarios.
    Related Articles | Metrics | Comments0
    Risk Response of Artificial Intelligence Production Mode from the Perspective of Holistic Approach to National Security
    Cai Chiyu Hu Yuxuan Liu Zhi
    Journal of Information Resources Management    2023, 13 (6): 43-47.   DOI: 10.13365/j.jirm.2023.06.043
    Abstract96)      PDF(pc) (1030KB)(208)       Save
    Related Articles | Metrics | Comments0
    From Epistemological Paradox to Cognitive Trap: Research on Security Issues of Generative Technology-Driven Information Ecosystem
    Bai Yun Li Baiyang Mao Jin Li Gang
    Journal of Information Resources Management    2024, 14 (1): 13-21.   DOI: 10.13365/j.jirm.2024.01.009
    Abstract148)      PDF(pc) (907KB)(206)       Save
    Generative technology-driven information system, with generative artificial intelligence as its core, supports and promotes the process of knowledge transmission and sharing, as well as cognitive flow, and diffusion in the entire information environment. However, it also poses challenges to epistemic security and cognitive security. This paper analyzes the characteristics, advantages, and risks of the generative technology-driven information ecosystem from the perspectives of epistemic and cognition environments. It explores how to fully realize the potential of generative artificial intelligence while adhering to human values and social ethics, to promote the construction of an efficient, secure, and sustainable generative technology-driven information ecosystem.
    Related Articles | Metrics | Comments0
    The Dilemma and Practical Approach of Data Factor Value Creation in Chinese Enterprises from the Collaborative Perspective
    Qian Jinlin Xia Yikun
    Journal of Information Resources Management    2023, 13 (6): 5-16.   DOI: 10.13365/j.jirm.2023.06.005
    Abstract271)      PDF(pc) (1867KB)(204)       Save
    Mining and releasing enterprise data factor value is of great significance to cultivate enterprise core competitiveness and to promote social economic growth. Based on literature research, comparative analysis and other methods, this paper comprehensively uses synergy theory and data value chain theory to analyze the connotation mechanism of data factor value creation, and then based on the coupling of data chain and value chain, this paper builds the analysis framework of the collaborative work scene within the enterprise and the collaborative co-governance scene outside the enterprise. The results suggest that: (1)Chinese enterprises lack the analytical ability of data value system, fail to set up data resource management system, and cannot achieve the collaborative development of data utilization and business scenarios; (2)It is difficult to form a value co-creation network with data sharing and exchange as the core because the data sharing channels between enterprises are not smooth, the data relationship is not harmonious, and the interest balance mechanism is not perfect; (3)The two-way data flow sharing mechanism between enterprises and the government is not perfect, and the government-enterprise data coordination supervision and cultivation system is not complete; (4)It is difficult to balance the protection of data rights and the pursuit of data interests between enterprises and individuals. Therefore, this paper puts forward the practical approach of data factor value creation in China from two perspectives: (1)improving the collaborative research ability of data factor value creation within enterprises, and (2)establishing a multi-agent collaborative and co-governing data ecology outside enterprises.
    Related Articles | Metrics | Comments0
    The Path and Empirical Study of Intelligence Support for Emergencies by Fusing Eventic Graph and Network Opinion Analysis——Taking Hazardous Chemical Accidents as an Example
    Zhang Shiying Li Yang
    Journal of Information Resources Management    2023, 13 (4): 60-71.   DOI: 10.13365/j.jirm.2023.04.060
    Abstract285)      PDF(pc) (4153KB)(162)       Save
    Existing emergency intelligence support has some deficiencies, such as static knowledge, fuzzy reasoning, and spatial homogeneity. The paper proposes a path of emergency intelligence support that integrates eventic graph and network opinion analysis, aiming to improve the situational awareness and predictive response capability of emergencies in complex situations, and support emergency intelligence paradigm innovation in the era of digital intelligence empowerment. The paper constructs a framework for emergency intelligence support from the integrated perspective of reasoning and knowledge fusion, business and network fusion, and carries out empirical research using hazardous chemical accidents as an illustration. The work includes building a database of relevant emergencies, portraying the development logic of emergencies using an eventic graph, and describing the impact of emergencies in cyberspace using online opinion analysis techniques. This provides intelligence support for emergency management and decision making for new emergencies. The intelligence support path proposed in this paper can take into account the characteristics of multi-source spatial data as well as the integration of event logic and knowledge, allowing for a more systematic "past-future" intelligence prediction of emergencies. The empirical study and validation of hazardous chemical accidents also show good knowledge presentation and intelligence reasoning.
    Related Articles | Metrics | Comments0
    An Empirical Study on the Influence Model of Social Media Users’ Disinformation Verification Behavior
    Mo Zuying  Liu Huan  Pan Daqing
    Journal of Information Resources Management    2023, 13 (4): 72-83.   DOI: 10.13365/j.jirm.2023.04.072
    Abstract303)      PDF(pc) (1561KB)(158)       Save
    This paper examines the factors and paths that affect users' information verification behavior, in order to help users avoid disinformation on the internet and achieve self-purification of cyberspace. Based on the elaboration likelihood model(ELM), this paper uses questionnaire and structural equation model to develop the influence model of social media users’ disinformation verification behavior and conducts an empirical study on the factors that affecting users’ information verification behavior. The result shows that information simulation, information topic popularity and platform trust are the key factors on users’ affective reactions, while information relevance, information topic popularity, and media richness are the key factors on users’ perception of risk. The users’ attitudes, which include emotion and cognition are the primary determinants of users’ information verification behavior. This study can provide references for the management of social media platforms and the prevention of users’ spreading disinformation.
    Related Articles | Metrics | Comments0
    Research on the Motivation of Social Media Information Deletion:Take WeChat Moments as an Example
    Yu Mengli Shen Wenhan Zheng Bowen
    Journal of Information Resources Management    2023, 13 (4): 84-95,121.   DOI: 10.13365/j.jirm.2023.04.084
    Abstract273)      PDF(pc) (2531KB)(153)       Save
    As the amount of user-generated content grows, an increasing number of users start to delete previous posts. Information deletion in social media is not only a personal information management behavior for social media users but also has an impact on the development of social platforms content resources. Based on self-awareness theory and the perspectives of defense acquisition information management, this study investigates the motivations behind the deletion behavior of WeChat users' moments. The results of Structural Equation Modeling demonstrate that information security, field environment, and content value of defensive management have a significantly positive influence on information deletion behavior, and that the level of self-disclosure plays a mediating role in the relationships between information security, information value, and social media information deletion behavior. The research contributes to a comprehensive understanding of social media users' usage paradigm and provides decision support for the utilization of social media data and economic development of platforms.
    Related Articles | Metrics | Comments0
    The Upcoming National Data Bureau will Promote High-quality Development of Digital Economy
    Ding Botao
    Journal of Information Resources Management    2023, 13 (4): 4-5,34.   DOI: 10.13365/j.jirm.2023.04.004
    Abstract252)      PDF(pc) (664KB)(150)       Save
    Related Articles | Metrics | Comments0
    The Evolution and Contemporary Perspectives on the Empowerment of Intelligence by Artificial Intelligence Technology
    Li Guangjian Pan Jiali
    Journal of Information Resources Management    2024, 14 (2): 4-20.   DOI: 10.13365/j.jirm.2024.02.004
    Abstract107)      PDF(pc) (1976KB)(144)       Save
    This paper systematically explores the evolution and application of artificial intelligence (AI) technology in intelligence work, revealing its new developments in ideology, characteristics, technical methods, and practical scenarios. Transitioning from a rule-based paradigm to the era of foundation model approaches, AI presents significant opportunities for the intelligence field’ s enhancement in intelligence processing. However, it also introduces novel challenges related to ethics, legal considerations, and privacy concerns. The paper identifies issues and challenges that should be addressed by the intelligence community in the new era of intelligence. Furthermore, the paper proposes forward-thinking strategies to address these issues and challenges, providing valuable insights for the stable development of intelligence field.
    Related Articles | Metrics | Comments0
    The Identification of the Core Factors of Highly Cited Papers
    Xu Linyu
    Journal of Information Resources Management    2023, 13 (5): 137-148.   DOI: 10.13365/j.jirm.2023.05.137
    Abstract186)      PDF(pc) (3298KB)(137)       Save
    Highly cited papers have high academic discourse and reference values. The research on the identification of the core factors of highly cited papers is very important for academic papers to obtain citations and to establish and strengthen the competitive advantage. This paper extracts, screens, and forms a set of internal and external influencing factors of academic papers through the combination of literature extraction and questionnaire. It then explores the linear and nonlinear influence of these factors on highly cited papers by means of logistic regression. Finally, this paper uses various classical classification algorithms of machine learning to test the robustness of the above results. The results show that the quality and age of references both have a significant positive linear effect on the formation of highly cited papers, and with the increase of variable values, the quadratic coefficient has a strong superposition effect. In addition, journal reputation has an approximate linear effect on the formation of highly cited papers. However, the indicators such as the author’s reputation, usage and initial citation have a significant positive linear influence on the formation of highly cited papers. With the increase of variable values, the linear effect of the quadratic coefficient gradually weakens, showing a semi-"inverted U" trend of first increasing and then leveling off. Machine learning classical classification algorithms such as decision tree, naive bayes and random forest all show good prediction results for highly cited papers, which shows that the research results of this paper are robust.
    Related Articles | Metrics | Comments0
    Data Element Governance Dilemma and Prevention Mechanisms—A Perspective of Value and Risk Integration
    Shen Xiaoliang Qian Qianwen
    Journal of Information Resources Management    2023, 13 (6): 17-28,42.   DOI: 10.13365/j.jirm.2023.06.017
    Abstract202)      PDF(pc) (3842KB)(136)       Save
    In the context of the new development pattern, data element governance demands simultaneous attention to both development and security, while unleashing the value of data elements and addressing emerging risk challenges. Nevertheless, current research has given limited consideration to the integration of data element value and risk. Based on the principle of risk-return tradeoff, this study examines the "effect exclusion" and "state symbiosis" relationship between data element value and risk. Furthermore, it draws on information ecology theory, domestic typical cases, and foreign policies and laws to investigate the dilemma and prevention mechanisms of data element governance. The study provides a comprehensive and systematic analysis of the practical dilemmas and prevention strategies faced in data element governance by considering a balance between value and risk aspects. It also offers significant directions for future research.
    Related Articles | Metrics | Comments0
    Construction of China’s Data Sovereignty Rule Pedigree:A Grounded Theory Study
    Zheng Linghan Huang Biyun Jiang Ying
    Journal of Information Resources Management    2023, 13 (5): 56-72.   DOI: 10.13365/j.jirm.2023.05.056
    Abstract172)      PDF(pc) (3944KB)(131)       Save
    Research on data sovereignty rules is helpful for different entities to understand China's data sovereignty rule system, as well as for the standardized expression of rule texts, thereby reducing the cost of data sovereignty compliance. According to the three key process areas of local storage, cross-border flow and extraterritorial jurisdiction, 46 samples related to data sovereignty were screened, 148 rule texts were extracted, and the grounded theory method was used to manually code multiple times with NVivo12 Plus. The hierarchy of data sovereignty rules is composed of objects, subjects and obligations. The objects are divided into 7 categories: data, information, equipment, key information infrastructure, security, interests and rights. The subjects include 6 categories: state, party institutions, administrative subjects, public affairs subjects, enterprise subjects and other subjects. The obligations encompass 29 categories, including security assessment, outbound security assessment, personal information impact assessment, data security protection, within-territory data storage, within-territory information storage, with-territory equipment building, entity establishment, compliance with compliance requirements, reporting obligation, listing and announcement.Overall, the data sovereignty rule system is complete, covering various types of rule fields such as legal norms, departmental norms, and standard norms; Data sovereignty exhibits a "defensive" characteristic, namely orderly flow, appropriate localization, and necessary jurisdiction.
    Related Articles | Metrics | Comments0
    Ontology-driven Design and Application of Archival Documentary Heritage Metadata:Taking Suzhou Silk Archives as Example
    Niu Li Huang Laihua Jia Junzhi Liu Yuxin
    Journal of Information Resources Management    2023, 13 (5): 15-31.   DOI: 10.13365/j.jirm.2023.05.015
    Abstract207)      PDF(pc) (6378KB)(131)       Save
    Metadata is the key to realize the organization and digital storage of archival documentary heritage, and also the guarantee of its development and utilization. Considering the definition, the hierarchical structure and the attributes of classes of ontology, this paper designs an aggregated metadata system with semantic features and content elements. Taking archival documentary heritage as the research object, we treat its metadata design as the core problem and put forward the general idea and specific steps of ontology-driven metadata design of archival documentary heritage, including resource selection and collection, construction of ontology models, from ontology to metadata, and application of metadata schemes. In addition, taking Suzhou silk archives as an example, the knowledge ontology is constructed combined with their characteristics to realize the design and application of metadata schemes, so as to confirm the validity and scientificity of ontology in guiding metadata construction.
    Related Articles | Metrics | Comments0
    The Influencing Factors of Scientific Data Reuse in the Field of Cultural Heritage
    Rao Zixin Xu Xin
    Journal of Information Resources Management    2023, 13 (5): 32-43.   DOI: 10.13365/j.jirm.2023.05.032
    Abstract131)      PDF(pc) (827KB)(129)       Save
    To provide reference for the effective use and management of data in the field of cultural heritage, this paper explores the main factors affecting the reuse of scientific data in the field of cultural heritage by taking 203 cultural heritage scientific datasets reused in DataCite as the research object. Employing non-parametric test and multiple linear regression, this paper explores the influencing factors of scientific data reuse in the field of cultural heritage from three dimensions of data attribute, data provider and data repository.After controlling the time span factors, license, type, abstracts, formats, publishers, sponsor, and quality management are the main factors positively affecting the reuse of scientific data in the field of cultural heritage, and the degree of influence increases successively.Combining with the actual situation in China, this paper puts forward the following enlightenment: establishing cultural heritage metadata standards to improve the adequacy of data description information; incorporating data reuse into funding requirements to promote data reuse of cultural heritage projects; building a scientific data publishing system for cultural heritage and improving peer review in data publishing; promoting quality management of cultural heritage data and making full use of data repositories.
    Related Articles | Metrics | Comments0
    A Fuzzy-Set Qualitative Comparative Analysis of Influencing Factors and Configurational Paths to Personal Information Protection Level of Mobile Government Services: Evidence from 30 Chinese Provinces
    Pan Yinrong Liu Xiaojuan Zhang Rongxu
    Journal of Information Resources Management    2023, 13 (5): 92-101,136.   DOI: 10.13365/j.jirm.2023.05.092
    Abstract151)      PDF(pc) (1297KB)(127)       Save
    The level of personal information protection has become an important indicator to measure the ability of mobile government services. It is crucial to explore its influencing factors and configurational paths for promoting higher quality digital government construction. With 8 conditional variables setting based on TOE framework, this paper uses fuzzy set qualitative comparative analysis method(fsQCA) to analyze the case from three aspects of technology, organization and enviroment with data from 30 provincial local governments. The result shows that technical, organizational and environmental factors all affect the personal information protection level of mobile government services, and the high-level paths can be classified into four types: competition-driven, technology-oriented, organization-empowered, and internally and externally linked. Local governments should take targeted measures in light of local conditions to better promote personal information protection.
    Related Articles | Metrics | Comments0
    The Establishment of the National Data Bureau and the Expansion of Information Resource Management Disciplines
    Ran Congjing Liu Yan
    Journal of Information Resources Management    2023, 13 (4): 6-9.   DOI: 10.13365/j.jirm.2023.04.006
    Abstract208)      PDF(pc) (669KB)(121)       Save
    Related Articles | Metrics | Comments0
    Exploring the Antecedents of Health Information Credibility at Social Media Platforms: The Moderating Role of Prior Knowledge
    Wang Xiaopan Zhang Miao Wu Yi Zhang Xiaofei
    Journal of Information Resources Management    2024, 14 (1): 55-67.   DOI: 10.13365/j.jirm.2024.01.055
    Abstract213)      PDF(pc) (4210KB)(121)       Save
    Based on the elaboration likelihood model, the current study takes fact-checking interruption as the research object, and explores the impact of two fact-checking mechanisms, source rating and content rating, on users' perceived information credibility and subsequent information participation behavior. The moderating effect of prior knowledge is also investigated. Through an online scenario-based experiment involving 202 subjects, the present study found that both source and content rating mechanisms positively affect perceived credibility. Subsequently, perceived credibility has a positive impact on reading, liking, posting supportive comments and forwarding information, but has had no significant impact on posting rebutted comments. Prior knowledge has a negative moderating effect on the relationship between content rating and perceived credibility, but has no significant moderating effect on the relationship between source rating and perceived credibility. The present study enriches the literature and theories related to the credibility of health information in social media and offers managerial insights for the development of a social media information intervention mechanism.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (5): 4-4.  
    Abstract252)      PDF(pc) (311KB)(119)       Save
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (6): 4-4.  
    Abstract97)      PDF(pc) (301KB)(111)       Save
    Related Articles | Metrics | Comments0
    Exploration and Reflection on Intelligent Mining and Service of Science & Technology Information Resources
    Luo Wei Tian Changhai Mao Bin Wu Shuyi Liu Pengnian
    Journal of Information Resources Management    2024, 14 (1): 22-28.   DOI: 10.13365/j.jirm.2024.01.022
    Abstract97)      PDF(pc) (6765KB)(108)       Save
    Related Articles | Metrics | Comments0
    An Empirical Study of the Effects of a Prebunking of Health Misinformation on Individuals’ Perceptions and Behavioral Intentions
    Li Xinyue Song Shijie Han Wenting Zhao Yuxiang Zhu Qinghua
    Journal of Information Resources Management    2024, 14 (1): 44-54.   DOI: 10.13365/j.jirm.2024.01.044
    Abstract99)      PDF(pc) (1221KB)(105)       Save
    This study aims to analyze the mechanisms of prebunking’s impact on two specific dimensions (i.e., individual perception and behavioral intention) and compare the efficacy of different prebunking strategies. The hypotheses were tested in a double-blind experimental design, wherein 182 participants were randomly assigned to a fact-based inoculation or a logic-based inoculation or a control group. Specifically, we use one-way ANOVA to test the mechanism of the effect of the pre-intervention and use multiple comparison analysis to test the effect of different interventions. The results indicate that prebunking have a significant impact on individual perceptions and behavioral intentions. In the perception dimension, prebunking substantially reduces individuals' perceived threat, perceived consensus, and perceived credibility of health misinformation. In the behavioral intention dimension, while prebunking effectively reduces individuals' sharing likelihood of health misinformation, it has little impact on their willingness to vaccinate against COVID-19. Furthermore, no significant difference was observed between the group of fact-based and logic-based inoculations. This study broadens the application scenarios and mechanisms of prebunking, offering evidence for assessing its feasibility and efficacy in the governance of health misinformation.
    Related Articles | Metrics | Comments0
    Protection Mode of Personal Financial Information in the Era of Fintech
    Zhu Ziyang Wang Weikang
    Journal of Information Resources Management    2023, 13 (5): 102-114.   DOI: 10.13365/j.jirm.2023.05.102
    Abstract172)      PDF(pc) (2422KB)(105)       Save
    Personal financial information infringement incidents such as excessive collection, illegal processing, information leakage and abuse, will not only infringe upon the legitimate rights and interests of consumers, affect the normal operation of financial institutions, but also may lead to systematic financial risks. Currently, since the traditional personal information protection mode is unable to reconcile the contradiction between "utilization" and "protection" in the era of Fintech, it has been unable to cope with many risks and challenges. This paper aims to answer three major questions pertaining to personal financial information protection in the era of fintech, which are identification of the subject and object, establishment of protection principles and improvement of protection measures. To obtain the answer, this paper adopts the logical framework of "sorting out the current situation and problems, mechanism analysis and principle establishment, proposing general design and measures", systematically analyzing the protection modes of personal financial information at home and abroad. Finally, this paper constructs a conceptual model of personal financial information protection in the era of fintech, puts forward specific protection measures based on the advanced protection experience of developed countries, and tries to provide a new way of thinking for the improvement and optimization regarding China’ s personal financial information protection mode.
    Related Articles | Metrics | Comments0
    A Hundred Years of Course, Challenge and Prospect of Library Science Education in China
    Chen Chuanfu Zhu Chuanyu Peng Minhui Wu Gang Chen Yi
    Journal of Information Resources Management    2023, 13 (4): 10-21.   DOI: 10.13365/j.jirm.2023.04.010
    Abstract261)      PDF(pc) (975KB)(98)       Save
    This paper reviews the development of Library science education in China for a hundred years. On the basis of discussing the characteristics and achievements of the four development stages of rise, stability, prosperity and specialization, and facing new liberal arts construction, this paper analyzes the challenges faced by Library science education, and suggests that the future Library science education should start from the aspects of professional ability, professional internalization, interdisciplinary and social value construction of disciplines, so as to promote innovative development and train a new generation of high-level library and information talents.
    Related Articles | Metrics | Comments0
    Spatial Formation and Information Diffusion Path of Science and Technology Innovation Field——Taking National High-Tech Zone as an Example
    Wu Yuhao Chen Jin
    Journal of Information Resources Management    2024, 14 (1): 29-32.   DOI: 10.13365/j.jirm.2024.01.029
    Abstract70)      PDF(pc) (1902KB)(92)       Save
    Related Articles | Metrics | Comments0
    Predicting Highly-value Patents and Analyzing its Determinants Based on BP Neural Network and MIV Algorithm
    Hu Zewen Zhou Xiji
    Journal of Information Resources Management    2023, 13 (6): 144-155.   DOI: 10.13365/j.jirm.2023.06.144
    Abstract122)      PDF(pc) (3920KB)(90)       Save
    This paper designed multi-dimensional evaluation indicators of patent value and recognized high-value patents as the prediction target vector to construct the training set and the test set. Then the BP neural network model was used to predict and identify potential high-value patents. At the same time, the MIV algorithm was used to analyze the contribution and influence of various dimension indicators of patent value to the result of the high-value patents prediction. The experimental results show that: (1) The prediction performance of the BP neural network model is relatively good, and the prediction accuracy rate is all over 89%. The BP neural network model that takes the recognized high-value patents through "patent family size" as the predictive target vector has the best performance, while the BP neural network model with the predictive target vector composed of the recognized high-value patents through the combination indicator of "patent family size" and "patent citation frequency" performs relatively poorly. (2) The MIV absolute value can effectively reflect the influence and contribution degree of various patent value indicators on the result of the predication model. The indicator of technical value has the most significant influence on the result of the highly-value patent prediction based on the BP neural network model. From the perspective of the MIV absolute value and the total proportion of every single indicator, the four indicators including the number of patent IPC4 classification, the speed of first citation, the number of claims, and the frequency of patent citations have a more significant influence on the results of high-value patents prediction.
    Related Articles | Metrics | Comments0
    Algorithmic Governance from the Perspective of Data Sovereignty: Challenges, Progress and Approaches
    Ma Tengfei
    Journal of Information Resources Management    2023, 13 (6): 48-61.   DOI: 10.13365/j.jirm.2023.06.048
    Abstract115)      PDF(pc) (824KB)(88)       Save
    From the perspective of data sovereignty, algorithmic governance is challenged by the interplay between "data sovereignty" and "algorithmic power", the impact of nationalization of platforms and national platforms, and the core challenges of lack of prior governance solutions and time lag. In the process of tackling the challenges, various sovereign states have developed different governance approaches, including the proactive model of the United States, which focuses on multi-party accountability and risk response, the defensive model of the European Union, which is based on data protection with an emphasis on accountability, and the systematic attempt of China, which is based on the principle of overall national security. Drawing from international governance experiences, this paper proposes a development path for algorithmic governance from the perspective of data sovereignty of China,which includes the following key aspects: Firstly, regarding the governance principles, it emphasizes the need for a balance between development and security, advocating the "people-oriented" principle as the bedrocks of algorithmic governance. Secondly, regarding the governance agents, it stresses the importance of "governance-side" reform, calling for a collaborative, multi-stakehdder approach to mitigate algorithmic risk. Thirdly, regarding the govemance subjects, it highlights the criticality of "supply-side" reform, focusing on the enhancement of governance structures for both platforms and technologies. Lastly, regarding the governance methods, it promotes the advancement of a tiered classification system, which should be adeptly integrated with scenario-specific governance.
    Related Articles | Metrics | Comments0