Most Downloaded

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract445)      PDF(pc) (647KB)(369)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    Impact of Data Classified and Graded Rights Confirmation on the Realization of the Value of Data Elements
    Ma Feicheng Xiong Siyue Sun Yujiao Wang Wenhui
    Journal of Information Resources Management    2024, 14 (1): 4-12.   DOI: 10.13365/j.jirm.2024.01.004
    Abstract452)      PDF(pc) (1559KB)(346)       Save
    Data rights confirmation is essential for realizing the value of data elements and sustaining the normal operation and continuous development of data elements market. This study delves into concepts related to data rights confirmation and explores the path of how to establish a property right system to realize data rights confirmation. Furthermore, this study shows methods for the data classified and graded rights confirmation, analyzing their impact across the data value chain. Results show that in the data collection stage, the data classified and graded rights confirmation mechanism can motivate data supply, improve data quality, and stimulate market vitality. In the data organization stage, it can break down technical work, protect private data, and explore potential value. In the data circulation stage, it can regulate negative externalities, reduce transaction costs, and optimize the allocation of resources. And in the data utilization stage, it plays a key role in data compliance regulation and data value redevelopment.
    Related Articles | Metrics | Comments0
    The Construction of Cultural Heritage Smart Data for the Inheritance and Activation
    Wang Xiaoguang Hou Xilong
    Journal of Information Resources Management    2023, 13 (5): 5-14,43.   DOI: 10.13365/j.jirm.2023.05.005
    Abstract292)      PDF(pc) (2842KB)(341)       Save
    Smart data is becoming a new development trend of information resource construction in the age of data and intelligence. It is an advanced form of data resources organization and more suitable for the new demands and requirements on the data and service in the new environment. Firstly, this article systematically reviews the historical evolution and development trend of smart data, and analyzes the scientific meaning and critical features of smart data. Secondly, facing the problems of cultural heritage inheritance and activation, this article explains the internal logic of smart data empowering cultural heritage activation. Finally, the article puts forward the construction measures and path of cultural heritage smart data, including the construction mechanism, smart data standards and specifications, cultural gene deconstruction, quality control system. The research of smart data not only improves the quality and efficiency of big data resources, but also contributes to the theoretical reform of information resources management and knowledge management in the empowerment of data and intelligence. The construction of cultural heritage smart data resources will effectively promote the process of cultural heritage protection, inheritance and activation.
    Related Articles | Metrics | Comments0
    Intelligent and Smart Service of Multi-model Cultural Heritage Resources: From Available to Evidential and Experiential
    Xia Cuijuan
    Journal of Information Resources Management    2023, 13 (5): 44-55.   DOI: 10.13365/j.jirm.2023.05.044
    Abstract308)      PDF(pc) (2030KB)(327)       Save
    The development of data and intelligence technologies is promoting the transformation from "digital GLAMs" to "smart GLAMs". In the transformation from digitalization to datafication and then to intelligence, the cultural heritage resources of GLAMs show the multi-model characteristics of multimedia, multi-format and multi-granularity. Aiming at the problem of how GLAMs provide intelligent services based on multmodel cultural heritage resources, this paper summarizes the transformation path of cultural heritage resources from digital, data to intelligent services based on case analysis and literature research. According to the low to high degree of resource intelligence, inteligent services can be summarized into three modes: available, evidential and experiential, which correspond to three different demand scenarios: resource-centered services, digital intelligence evidence-based services, and interactive experience-centered services. It is concluded that the intelligent services of multi-model cultural heritage resources are to predict in advance and automatically adapting to users' needs for different modes of cultural heritage resources in different demand scenarios.
    Related Articles | Metrics | Comments0
    The General Idea of Scientific Data Governance and Practical Case Verification—Taking the Astronomical Data Governance of the National(Guizhou) Hub Node of the Nationwide Integrated Computing Power Network as an Example
    Ma Xiao Guo Mingjun Yi Chengqi Dou Yue Liang Chuyi
    Journal of Information Resources Management    2023, 13 (5): 126-136.   DOI: 10.13365/j.jirm.2023.05.126
    Abstract195)      PDF(pc) (2119KB)(325)       Save
    Scientific data governance is an important way to promote scientific and technological progress and release the value of scientific data. As an important part of scientific data, astronomical data is of great significance for consolidating our country's international advantages in the field of astronomical research and achieving efficient and safe data governance. This paper adopts the theoretical deduction and case mapping as research methods. On the basis of fully learning from the mature model of data governance, based on collaborative innovation theory and public value theory, it studies “subject-object-carrier”and“problem and target oriented” in the “three bodies and two directions” analytical model of in the field of scientific data governance. Based on this model, a mapping study was carried out on the “FAST” astronomical data governance. It provides a research method from theory to practice of “guiding theory-analysis method-case mapping” for scientific data governance, and provides useful support for the exploration and formation of systematic astronomical data governance.
    Related Articles | Metrics | Comments0
    The Evolution and Contemporary Perspectives on the Empowerment of Intelligence by Artificial Intelligence Technology
    Li Guangjian Pan Jiali
    Journal of Information Resources Management    2024, 14 (2): 4-20.   DOI: 10.13365/j.jirm.2024.02.004
    Abstract291)      PDF(pc) (1976KB)(290)       Save
    This paper systematically explores the evolution and application of artificial intelligence (AI) technology in intelligence work, revealing its new developments in ideology, characteristics, technical methods, and practical scenarios. Transitioning from a rule-based paradigm to the era of foundation model approaches, AI presents significant opportunities for the intelligence field’ s enhancement in intelligence processing. However, it also introduces novel challenges related to ethics, legal considerations, and privacy concerns. The paper identifies issues and challenges that should be addressed by the intelligence community in the new era of intelligence. Furthermore, the paper proposes forward-thinking strategies to address these issues and challenges, providing valuable insights for the stable development of intelligence field.
    Related Articles | Metrics | Comments0
    Risk Response of Artificial Intelligence Production Mode from the Perspective of Holistic Approach to National Security
    Cai Chiyu Hu Yuxuan Liu Zhi
    Journal of Information Resources Management    2023, 13 (6): 43-47.   DOI: 10.13365/j.jirm.2023.06.043
    Abstract125)      PDF(pc) (1030KB)(252)       Save
    Related Articles | Metrics | Comments0
    The Dilemma and Practical Approach of Data Factor Value Creation in Chinese Enterprises from the Collaborative Perspective
    Qian Jinlin Xia Yikun
    Journal of Information Resources Management    2023, 13 (6): 5-16.   DOI: 10.13365/j.jirm.2023.06.005
    Abstract340)      PDF(pc) (1867KB)(245)       Save
    Mining and releasing enterprise data factor value is of great significance to cultivate enterprise core competitiveness and to promote social economic growth. Based on literature research, comparative analysis and other methods, this paper comprehensively uses synergy theory and data value chain theory to analyze the connotation mechanism of data factor value creation, and then based on the coupling of data chain and value chain, this paper builds the analysis framework of the collaborative work scene within the enterprise and the collaborative co-governance scene outside the enterprise. The results suggest that: (1)Chinese enterprises lack the analytical ability of data value system, fail to set up data resource management system, and cannot achieve the collaborative development of data utilization and business scenarios; (2)It is difficult to form a value co-creation network with data sharing and exchange as the core because the data sharing channels between enterprises are not smooth, the data relationship is not harmonious, and the interest balance mechanism is not perfect; (3)The two-way data flow sharing mechanism between enterprises and the government is not perfect, and the government-enterprise data coordination supervision and cultivation system is not complete; (4)It is difficult to balance the protection of data rights and the pursuit of data interests between enterprises and individuals. Therefore, this paper puts forward the practical approach of data factor value creation in China from two perspectives: (1)improving the collaborative research ability of data factor value creation within enterprises, and (2)establishing a multi-agent collaborative and co-governing data ecology outside enterprises.
    Related Articles | Metrics | Comments0
    From Epistemological Paradox to Cognitive Trap: Research on Security Issues of Generative Technology-Driven Information Ecosystem
    Bai Yun Li Baiyang Mao Jin Li Gang
    Journal of Information Resources Management    2024, 14 (1): 13-21.   DOI: 10.13365/j.jirm.2024.01.009
    Abstract188)      PDF(pc) (907KB)(234)       Save
    Generative technology-driven information system, with generative artificial intelligence as its core, supports and promotes the process of knowledge transmission and sharing, as well as cognitive flow, and diffusion in the entire information environment. However, it also poses challenges to epistemic security and cognitive security. This paper analyzes the characteristics, advantages, and risks of the generative technology-driven information ecosystem from the perspectives of epistemic and cognition environments. It explores how to fully realize the potential of generative artificial intelligence while adhering to human values and social ethics, to promote the construction of an efficient, secure, and sustainable generative technology-driven information ecosystem.
    Related Articles | Metrics | Comments0
    Value Creation of Data Elements: Review and Research Prospects
    Zhao Caijing
    Journal of Information Resources Management    2024, 14 (2): 41-53.   DOI: 10.13365/j.jirm.2024.02.041
    Abstract425)      PDF(pc) (985KB)(219)       Save
    Data has become a key production factor in China’s economic and societal development, with the circulation and value realization of data elements progressively becoming a crucial means for the high-quality development of the digital economy. This paper reviews the literatures and practices concerning the value creation of data elements, examining aspects such as the connotation, mechanisms, driving factors, obstacles and development paths. Based on this, this paper identifies gaps in the existing literatures on the value creation of data elements, advocating for a future research agenda that emphasizes interdisciplinary integration. It also proposes to explore future research directions and methodologies from perspectives including the conceptualization and measurement of data element value, determinants, and mechanisms of influence.
    Related Articles | Metrics | Comments0
    Research on the Model of Public Data Entering the Data Element Market
    Fan Jiajia
    Journal of Information Resources Management    2024, 14 (2): 68-81.   DOI: 10.13365/j.jirm.2024.02.068
    Abstract89)      PDF(pc) (1208KB)(186)       Save
    Public data is an important component of the data marketplace, yet its modes of entry and participation categories have received limited attention in the current literature. This paper investigates the modes of public data participation in the data element market, both domestically and internationally, through sorting and comparative analysis. We identified two main categories and five modes for public data to enter the data element market, including: 1) the primary market (authorized operation) + secondary market (trading in the data exchange) mode, 2) the public data development and utilization + trading outside the data exchange mode, 3) the construction of a public data circulation market mode based on data platforms, 4) the trading mode using data brokers and data intermediaries, and 5) the participation in the data market mode through (public) data trusts. Building upon this categorization, the paper proposes an ideal mode for public data entry into the data element market, outlined in three phases: data acquisition, data product production, and data product trading. This paper offers insights for strategic selection regarding the entry of public data into the data element market in China.
    Related Articles | Metrics | Comments0
    Institute of Information Science, Shanghai Academy of Social Sciences, Shanghai, 200235
    Zhang Zhun
    Journal of Information Resources Management    2024, 14 (2): 54-67.   DOI: 10.13365/j.jirm.2024.02.054
    Abstract172)      PDF(pc) (1104KB)(180)       Save
    The guideline, which includes twenty key measures to build basic systems for data released in December 2022 (referred to as the "Twenty Data Measures"), proposes a structural separation system for data property rights, with "incentivizing data circulation" as its core focus. The rational allocation of the right to hold data resources affects the initial distribution of data benefits, serving as the foundation for achieving the strategic goal of "common use and shared benefits" of data. Under the traditional exclusive property rights mindset, the allocation patterns of the right to hold data resources may exacerbate conflicts of interest among data co-producers. This article suggests allocating the right to hold data resources among data co-producers in a "1+N" model, which means "prior hold data right for a specific data producer + access rights for N other data producers". With the support of tools such as technical governance and transparency governance, it explores a new, fair, and efficient data property rights system that aligns with the developing laws of the data economy.
    Related Articles | Metrics | Comments0
    Exploring the Antecedents of Health Information Credibility at Social Media Platforms: The Moderating Role of Prior Knowledge
    Wang Xiaopan Zhang Miao Wu Yi Zhang Xiaofei
    Journal of Information Resources Management    2024, 14 (1): 55-67.   DOI: 10.13365/j.jirm.2024.01.055
    Abstract290)      PDF(pc) (4210KB)(180)       Save
    Based on the elaboration likelihood model, the current study takes fact-checking interruption as the research object, and explores the impact of two fact-checking mechanisms, source rating and content rating, on users' perceived information credibility and subsequent information participation behavior. The moderating effect of prior knowledge is also investigated. Through an online scenario-based experiment involving 202 subjects, the present study found that both source and content rating mechanisms positively affect perceived credibility. Subsequently, perceived credibility has a positive impact on reading, liking, posting supportive comments and forwarding information, but has had no significant impact on posting rebutted comments. Prior knowledge has a negative moderating effect on the relationship between content rating and perceived credibility, but has no significant moderating effect on the relationship between source rating and perceived credibility. The present study enriches the literature and theories related to the credibility of health information in social media and offers managerial insights for the development of a social media information intervention mechanism.
    Related Articles | Metrics | Comments0
    The Identification of the Core Factors of Highly Cited Papers
    Xu Linyu
    Journal of Information Resources Management    2023, 13 (5): 137-148.   DOI: 10.13365/j.jirm.2023.05.137
    Abstract212)      PDF(pc) (3298KB)(174)       Save
    Highly cited papers have high academic discourse and reference values. The research on the identification of the core factors of highly cited papers is very important for academic papers to obtain citations and to establish and strengthen the competitive advantage. This paper extracts, screens, and forms a set of internal and external influencing factors of academic papers through the combination of literature extraction and questionnaire. It then explores the linear and nonlinear influence of these factors on highly cited papers by means of logistic regression. Finally, this paper uses various classical classification algorithms of machine learning to test the robustness of the above results. The results show that the quality and age of references both have a significant positive linear effect on the formation of highly cited papers, and with the increase of variable values, the quadratic coefficient has a strong superposition effect. In addition, journal reputation has an approximate linear effect on the formation of highly cited papers. However, the indicators such as the author’s reputation, usage and initial citation have a significant positive linear influence on the formation of highly cited papers. With the increase of variable values, the linear effect of the quadratic coefficient gradually weakens, showing a semi-"inverted U" trend of first increasing and then leveling off. Machine learning classical classification algorithms such as decision tree, naive bayes and random forest all show good prediction results for highly cited papers, which shows that the research results of this paper are robust.
    Related Articles | Metrics | Comments0
    The Influencing Factors of Scientific Data Reuse in the Field of Cultural Heritage
    Rao Zixin Xu Xin
    Journal of Information Resources Management    2023, 13 (5): 32-43.   DOI: 10.13365/j.jirm.2023.05.032
    Abstract164)      PDF(pc) (827KB)(165)       Save
    To provide reference for the effective use and management of data in the field of cultural heritage, this paper explores the main factors affecting the reuse of scientific data in the field of cultural heritage by taking 203 cultural heritage scientific datasets reused in DataCite as the research object. Employing non-parametric test and multiple linear regression, this paper explores the influencing factors of scientific data reuse in the field of cultural heritage from three dimensions of data attribute, data provider and data repository.After controlling the time span factors, license, type, abstracts, formats, publishers, sponsor, and quality management are the main factors positively affecting the reuse of scientific data in the field of cultural heritage, and the degree of influence increases successively.Combining with the actual situation in China, this paper puts forward the following enlightenment: establishing cultural heritage metadata standards to improve the adequacy of data description information; incorporating data reuse into funding requirements to promote data reuse of cultural heritage projects; building a scientific data publishing system for cultural heritage and improving peer review in data publishing; promoting quality management of cultural heritage data and making full use of data repositories.
    Related Articles | Metrics | Comments0
    Data Element Governance Dilemma and Prevention Mechanisms—A Perspective of Value and Risk Integration
    Shen Xiaoliang Qian Qianwen
    Journal of Information Resources Management    2023, 13 (6): 17-28,42.   DOI: 10.13365/j.jirm.2023.06.017
    Abstract228)      PDF(pc) (3842KB)(157)       Save
    In the context of the new development pattern, data element governance demands simultaneous attention to both development and security, while unleashing the value of data elements and addressing emerging risk challenges. Nevertheless, current research has given limited consideration to the integration of data element value and risk. Based on the principle of risk-return tradeoff, this study examines the "effect exclusion" and "state symbiosis" relationship between data element value and risk. Furthermore, it draws on information ecology theory, domestic typical cases, and foreign policies and laws to investigate the dilemma and prevention mechanisms of data element governance. The study provides a comprehensive and systematic analysis of the practical dilemmas and prevention strategies faced in data element governance by considering a balance between value and risk aspects. It also offers significant directions for future research.
    Related Articles | Metrics | Comments0
    The Developing Directions of Information Resources Management Discipline in the Era of Artificial General Intelligence
    Yan Hui
    Journal of Information Resources Management    2024, 14 (2): 21-28,53.   DOI: 10.13365/j.jirm.2024.02.021
    Abstract143)      PDF(pc) (765KB)(147)       Save
    This paper reviews the seventy-year developing history of Artificial Intelligence and Artificial General Intelligence(AGI), reflects on the fifty-year history of information resources management, analyzes the profound and multifaceted impacts of AGI on the knowledge system, education system, and career system of information resources management, and proposes three suggestions for the developing direction of information resources management discipline in the AGI era.
    Related Articles | Metrics | Comments0
    Construction of China’s Data Sovereignty Rule Pedigree:A Grounded Theory Study
    Zheng Linghan Huang Biyun Jiang Ying
    Journal of Information Resources Management    2023, 13 (5): 56-72.   DOI: 10.13365/j.jirm.2023.05.056
    Abstract191)      PDF(pc) (3944KB)(147)       Save
    Research on data sovereignty rules is helpful for different entities to understand China's data sovereignty rule system, as well as for the standardized expression of rule texts, thereby reducing the cost of data sovereignty compliance. According to the three key process areas of local storage, cross-border flow and extraterritorial jurisdiction, 46 samples related to data sovereignty were screened, 148 rule texts were extracted, and the grounded theory method was used to manually code multiple times with NVivo12 Plus. The hierarchy of data sovereignty rules is composed of objects, subjects and obligations. The objects are divided into 7 categories: data, information, equipment, key information infrastructure, security, interests and rights. The subjects include 6 categories: state, party institutions, administrative subjects, public affairs subjects, enterprise subjects and other subjects. The obligations encompass 29 categories, including security assessment, outbound security assessment, personal information impact assessment, data security protection, within-territory data storage, within-territory information storage, with-territory equipment building, entity establishment, compliance with compliance requirements, reporting obligation, listing and announcement.Overall, the data sovereignty rule system is complete, covering various types of rule fields such as legal norms, departmental norms, and standard norms; Data sovereignty exhibits a "defensive" characteristic, namely orderly flow, appropriate localization, and necessary jurisdiction.
    Related Articles | Metrics | Comments0
    A Fuzzy-Set Qualitative Comparative Analysis of Influencing Factors and Configurational Paths to Personal Information Protection Level of Mobile Government Services: Evidence from 30 Chinese Provinces
    Pan Yinrong Liu Xiaojuan Zhang Rongxu
    Journal of Information Resources Management    2023, 13 (5): 92-101,136.   DOI: 10.13365/j.jirm.2023.05.092
    Abstract183)      PDF(pc) (1297KB)(144)       Save
    The level of personal information protection has become an important indicator to measure the ability of mobile government services. It is crucial to explore its influencing factors and configurational paths for promoting higher quality digital government construction. With 8 conditional variables setting based on TOE framework, this paper uses fuzzy set qualitative comparative analysis method(fsQCA) to analyze the case from three aspects of technology, organization and enviroment with data from 30 provincial local governments. The result shows that technical, organizational and environmental factors all affect the personal information protection level of mobile government services, and the high-level paths can be classified into four types: competition-driven, technology-oriented, organization-empowered, and internally and externally linked. Local governments should take targeted measures in light of local conditions to better promote personal information protection.
    Related Articles | Metrics | Comments0
    Ontology-driven Design and Application of Archival Documentary Heritage Metadata:Taking Suzhou Silk Archives as Example
    Niu Li Huang Laihua Jia Junzhi Liu Yuxin
    Journal of Information Resources Management    2023, 13 (5): 15-31.   DOI: 10.13365/j.jirm.2023.05.015
    Abstract237)      PDF(pc) (6378KB)(141)       Save
    Metadata is the key to realize the organization and digital storage of archival documentary heritage, and also the guarantee of its development and utilization. Considering the definition, the hierarchical structure and the attributes of classes of ontology, this paper designs an aggregated metadata system with semantic features and content elements. Taking archival documentary heritage as the research object, we treat its metadata design as the core problem and put forward the general idea and specific steps of ontology-driven metadata design of archival documentary heritage, including resource selection and collection, construction of ontology models, from ontology to metadata, and application of metadata schemes. In addition, taking Suzhou silk archives as an example, the knowledge ontology is constructed combined with their characteristics to realize the design and application of metadata schemes, so as to confirm the validity and scientificity of ontology in guiding metadata construction.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (6): 4-4.  
    Abstract112)      PDF(pc) (301KB)(138)       Save
    Related Articles | Metrics | Comments0
    An Empirical Study of the Effects of a Prebunking of Health Misinformation on Individuals’ Perceptions and Behavioral Intentions
    Li Xinyue Song Shijie Han Wenting Zhao Yuxiang Zhu Qinghua
    Journal of Information Resources Management    2024, 14 (1): 44-54.   DOI: 10.13365/j.jirm.2024.01.044
    Abstract136)      PDF(pc) (1221KB)(136)       Save
    This study aims to analyze the mechanisms of prebunking’s impact on two specific dimensions (i.e., individual perception and behavioral intention) and compare the efficacy of different prebunking strategies. The hypotheses were tested in a double-blind experimental design, wherein 182 participants were randomly assigned to a fact-based inoculation or a logic-based inoculation or a control group. Specifically, we use one-way ANOVA to test the mechanism of the effect of the pre-intervention and use multiple comparison analysis to test the effect of different interventions. The results indicate that prebunking have a significant impact on individual perceptions and behavioral intentions. In the perception dimension, prebunking substantially reduces individuals' perceived threat, perceived consensus, and perceived credibility of health misinformation. In the behavioral intention dimension, while prebunking effectively reduces individuals' sharing likelihood of health misinformation, it has little impact on their willingness to vaccinate against COVID-19. Furthermore, no significant difference was observed between the group of fact-based and logic-based inoculations. This study broadens the application scenarios and mechanisms of prebunking, offering evidence for assessing its feasibility and efficacy in the governance of health misinformation.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (5): 4-4.  
    Abstract298)      PDF(pc) (311KB)(136)       Save
    Related Articles | Metrics | Comments0
    Exploration and Reflection on Intelligent Mining and Service of Science & Technology Information Resources
    Luo Wei Tian Changhai Mao Bin Wu Shuyi Liu Pengnian
    Journal of Information Resources Management    2024, 14 (1): 22-28.   DOI: 10.13365/j.jirm.2024.01.022
    Abstract130)      PDF(pc) (6765KB)(133)       Save
    Related Articles | Metrics | Comments0
    Model, Current Situation and Countermeasures of Data Element Market Governance in China
    Ding Botao
    Journal of Information Resources Management    2024, 14 (2): 29-40.   DOI: 10.13365/j.jirm.2024.02.029
    Abstract109)      PDF(pc) (884KB)(125)       Save
    It is necessary to establish a scientific and efficient market governance mechanism to foster the high-quality development of the data element market. This paper examines the governance mechanisms of the data element market, proposing three governance models: market-oriented governance, vertical governance, and relational governance. It also compares their characteristics to analyze the current situation and challenges of market governance mechanisms. This paper emphasizes that China needs to adopt multiple governance models simultaneously, establishing a governance structure that primarily focuses on market-oriented governance, supplemented by vertical governance, and complemented by relational governance as a key addition. Furthermore, this paper offers specific countermeasures and suggestions for the further improvement of these three governance models.
    Related Articles | Metrics | Comments0
    Protection Mode of Personal Financial Information in the Era of Fintech
    Zhu Ziyang Wang Weikang
    Journal of Information Resources Management    2023, 13 (5): 102-114.   DOI: 10.13365/j.jirm.2023.05.102
    Abstract205)      PDF(pc) (2422KB)(118)       Save
    Personal financial information infringement incidents such as excessive collection, illegal processing, information leakage and abuse, will not only infringe upon the legitimate rights and interests of consumers, affect the normal operation of financial institutions, but also may lead to systematic financial risks. Currently, since the traditional personal information protection mode is unable to reconcile the contradiction between "utilization" and "protection" in the era of Fintech, it has been unable to cope with many risks and challenges. This paper aims to answer three major questions pertaining to personal financial information protection in the era of fintech, which are identification of the subject and object, establishment of protection principles and improvement of protection measures. To obtain the answer, this paper adopts the logical framework of "sorting out the current situation and problems, mechanism analysis and principle establishment, proposing general design and measures", systematically analyzing the protection modes of personal financial information at home and abroad. Finally, this paper constructs a conceptual model of personal financial information protection in the era of fintech, puts forward specific protection measures based on the advanced protection experience of developed countries, and tries to provide a new way of thinking for the improvement and optimization regarding China’ s personal financial information protection mode.
    Related Articles | Metrics | Comments0
    Spatial Formation and Information Diffusion Path of Science and Technology Innovation Field——Taking National High-Tech Zone as an Example
    Wu Yuhao Chen Jin
    Journal of Information Resources Management    2024, 14 (1): 29-32.   DOI: 10.13365/j.jirm.2024.01.029
    Abstract97)      PDF(pc) (1902KB)(112)       Save
    Related Articles | Metrics | Comments0
    Predicting Highly-value Patents and Analyzing its Determinants Based on BP Neural Network and MIV Algorithm
    Hu Zewen Zhou Xiji
    Journal of Information Resources Management    2023, 13 (6): 144-155.   DOI: 10.13365/j.jirm.2023.06.144
    Abstract158)      PDF(pc) (3920KB)(109)       Save
    This paper designed multi-dimensional evaluation indicators of patent value and recognized high-value patents as the prediction target vector to construct the training set and the test set. Then the BP neural network model was used to predict and identify potential high-value patents. At the same time, the MIV algorithm was used to analyze the contribution and influence of various dimension indicators of patent value to the result of the high-value patents prediction. The experimental results show that: (1) The prediction performance of the BP neural network model is relatively good, and the prediction accuracy rate is all over 89%. The BP neural network model that takes the recognized high-value patents through "patent family size" as the predictive target vector has the best performance, while the BP neural network model with the predictive target vector composed of the recognized high-value patents through the combination indicator of "patent family size" and "patent citation frequency" performs relatively poorly. (2) The MIV absolute value can effectively reflect the influence and contribution degree of various patent value indicators on the result of the predication model. The indicator of technical value has the most significant influence on the result of the highly-value patent prediction based on the BP neural network model. From the perspective of the MIV absolute value and the total proportion of every single indicator, the four indicators including the number of patent IPC4 classification, the speed of first citation, the number of claims, and the frequency of patent citations have a more significant influence on the results of high-value patents prediction.
    Related Articles | Metrics | Comments0
    Algorithmic Governance from the Perspective of Data Sovereignty: Challenges, Progress and Approaches
    Ma Tengfei
    Journal of Information Resources Management    2023, 13 (6): 48-61.   DOI: 10.13365/j.jirm.2023.06.048
    Abstract157)      PDF(pc) (824KB)(105)       Save
    From the perspective of data sovereignty, algorithmic governance is challenged by the interplay between "data sovereignty" and "algorithmic power", the impact of nationalization of platforms and national platforms, and the core challenges of lack of prior governance solutions and time lag. In the process of tackling the challenges, various sovereign states have developed different governance approaches, including the proactive model of the United States, which focuses on multi-party accountability and risk response, the defensive model of the European Union, which is based on data protection with an emphasis on accountability, and the systematic attempt of China, which is based on the principle of overall national security. Drawing from international governance experiences, this paper proposes a development path for algorithmic governance from the perspective of data sovereignty of China,which includes the following key aspects: Firstly, regarding the governance principles, it emphasizes the need for a balance between development and security, advocating the "people-oriented" principle as the bedrocks of algorithmic governance. Secondly, regarding the governance agents, it stresses the importance of "governance-side" reform, calling for a collaborative, multi-stakehdder approach to mitigate algorithmic risk. Thirdly, regarding the govemance subjects, it highlights the criticality of "supply-side" reform, focusing on the enhancement of governance structures for both platforms and technologies. Lastly, regarding the governance methods, it promotes the advancement of a tiered classification system, which should be adeptly integrated with scenario-specific governance.
    Related Articles | Metrics | Comments0
    Effects of Negative Emotions on User Intermittent Discontinuance Behavior of Social Networking Services: Empirical Evidence from a Mixed Study
    Gan Chunmei Xiao Chen Chen Shuyi Lin Jingjing Qiu Zhiyan
    Journal of Information Resources Management    2023, 13 (6): 125-132.   DOI: 10.13365/j.jirm.2023.06.125
    Abstract159)      PDF(pc) (1357KB)(99)       Save
    Taking WeChat as the research sample, this study explores the negative emotions emerging in the social networking services (SNS) use and their configurations effects on SNS intermittent discontinuance behavior through a mixed study. Employing interviews and content analysis, the qualitative research of Study 1 found that, a variety of negative emotions, such as fatigue, anxiety, envy, frustration, disappointment, depression, worry and anger, are generated from SNS intermittent discontinuance behavior. And these emotions play separate or interactive roles. Furthermore, using 300 online questionnaires and fuzzy set qualitative comparative analysis (fsQCA), the empirical research of Study 2 revealed that, three configurations of conditions lead to SNS intermittent discontinuance behavior, i.e., users with envy, users with fatigue, and users with both envy and fatigue. They exert different levels of configuration effects on generating SNS intermittent discontinuance behavior. This study further enriches studies on negative emotions and social media user behavior, and confirms the complexity of emotions during social media use. In addition, this study provides theoretical references for service providers to retain users and for users to use SNS rationally.
    Related Articles | Metrics | Comments0