Most Downloaded

    Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Published in last 1 year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Criteria of Structural Equation Modeling: Comparisons and Enlightenments of CB-SEM and PLS-SEM
    Yuan Ye Shiau Wenlung Yu Yuan Wang Kanliang Li Yiran
    Journal of Information Resources Management    2023, 13 (3): 6-22.   DOI: 10.13365/j.jirm.2023.03.006
    Abstract1615)      PDF(pc) (2464KB)(776)       Save
    Structural Equation Modeling (SEM) is used to analyze the complex relationships between observed variables and latent variables. Covariance-based structural equation modeling (CB-SEM) and partial least squares structural equation modeling (PLS-SEM) are the two types of SEM. SEM has been widely used in social science such as organizational management, information systems, marketing management and other disciplines. In recent years the number of research papers using PLS-SEM method has increased. Since CB-SEM and PLS-SEM are different in algorithm and requirements, the application of unsuitable methods may lead to inaccurate results. Therefore, it is necessary to understand the differences between the two methods and report guidelines. This paper reviews the conditions and application criteria of CB-SEM and PLS-SEM, and takes the use of fintech by wealth management enterprises as an example to compare the analysis process and results of the two methods, emphasizing the importance and necessity of choosing appropriate methods. This paper provides a valuable reference for researchers to use SEM for accurate data analysis.
    Related Articles | Metrics | Comments0
    A Review of Secondary Analysis in Information Management and Information Systems Research in China: Research Methods,Topics, and Theory Applications
    Chen Liping Ren Fei
    Journal of Information Resources Management    2023, 13 (3): 61-78.   DOI: 10.13365/j.jirm.2023.03.061
    Abstract406)      PDF(pc) (1792KB)(489)       Save
    This study conducts a content analysis of 282 Chinese research papers published from 2012 to 2022 that use secondary analysis in the area of information management and information systems (IM&IS), aiming to reveal the distribution and trend of research methods, topics, and theory applications. The results show that the advantages of secondary analysis in data acquisition and causality identification are increasingly prominent, as reflected in the gradual diversity of data sources, rigorous empirical analysis on causality testing, richer mechanism analyses, and the emergence of mixed-method research. Four research topic trends have been identified, including macro digital development, enterprise digital transformation, information interaction between enterprise and market, and user online behavior. However, IM&IS theory development and the application of Chinese theories require further improvement. This study is novel in that it combines bibliometric analysis with machine learning methods (LDA and DTM) to reveal a multi-dimensional overview of the secondary analysis in IM&IS in China. The findings provide evidence and guidelines for further strengthening research norms, grasping research topic trends, developing and applying theories, as well as suggestions for disciplinary development and strategic research planning.
    Related Articles | Metrics | Comments0
    Human-chatbot Interaction vs. Human-human Interaction: Effects of Service Agent Perception and Two-sided Arguments in Conversational Commerce
    Li Mengxin Yi Cheng
    Journal of Information Resources Management    2023, 13 (3): 140-153.   DOI: 10.13365/j.jirm.2023.03.140
    Abstract481)      PDF(pc) (1820KB)(373)       Save
    The fact that conversational commerce has been one of the most favorable ways for companies to reach customers has generated an increasing number of use cases for chatbots. Making a comparison between human-chatbot communication and human-human communication can shed light on the behavioral rules which determine how humans interact with intelligent agents and provide design and application guidelines for chatbots. This study compares human-chatbot conversation with human-human conversation in the context of online customer service to figure out whether two-sided arguments have different effects on users’ purchase intentions and experiences. A laboratory experiment is conducted with a 2 (user’s perception of the customer service agent: chatbot vs. human) 2 (conversation design: two-sided argument vs. one-sided argument). The experiment applies Wizard of Oz method, with humans performing service tasks while giving the impression to that users they are chatting with chatbots. The results show that in human-human communication, two-sided arguments have a negative impact on users’ purchase intention for the product, while in human-chatbot communication, the effect is non-significant. When users believe they are interacting with a chatbot, the positive effects of two-sided arguments on user perceptions of source credibility and pleasure are amplified.
    Related Articles | Metrics | Comments0
    Best Deals for Livestreaming Fans:A Negotiation Model under the Anchor’ s Reputation Concern
    Yang Siyi Dou Yifan
    Journal of Information Resources Management    2023, 13 (3): 100-111.   DOI: 10.13365/j.jirm.2023.03.100
    Abstract349)      PDF(pc) (4766KB)(365)       Save
    In live-streaming e-commerce shows, the reputation of anchor plays a central role because it simultaneously affects the brand-side price negotiation and the anchor-side long-run profitability. This paper examines the effect of the anchors’ reputation on price negotiation with Nash bargaining model in light of the conflict between brands’ myopic focus on one-off profits and anchors’ focus on long-term reputation. Our analytical and numerical results suggest that the negotiated price is non-monotonically affected by the reputation concern. An anchor with a greater reputation concern may receive a smaller discount. Besides, the brand, the anchor, and consumers all benefit when the anchor has a moderate concern for his or her reputation.
    Related Articles | Metrics | Comments0
    Impacts of Platforms’ Privacy Assurance Mechanisms on Consumers’ Privacy Disclosure
    Shao Xiuyan Cao Cong Wang Ping
    Journal of Information Resources Management    2023, 13 (3): 23-38.   DOI: 10.13365/j.jirm.2023.03.023
    Abstract329)      PDF(pc) (2915KB)(357)       Save
    Protecting consumers’ privacy, eliminating their privacy concerns, and encouraging their self-disclosure are essential for online shopping platforms to promote personalized products and services, and maintain core competitiveness. In order to clarify the mechanism of privacy assurance mechanisms, this study integrated the elaboration likelihood model and herding theory, collected 231 samples through an online survey, and analyzed the data using SmartPLS. The results show that both trust belief and herd mentality significantly affect consumers’ privacy disclosure behavior, while trust belief has a greater effect. Both direct and indirect privacy assurance mechanisms establish consumers’ trust on platforms, however, direct privacy assurance mechanism is more effective of establishing consumers’ trust. The reputation of the platform affects consumers’ herd mentality. Consumers with higher analysis ability are more inclined to form trust belief based on platforms’ direct privacy assurance mechanism, whereas consumers with lower analysis ability rely more on peripheral cues to form trust beliefs and herd mentality. This study complements and improves the extant research, and provides useful guidelines for online shopping platforms and consumers on better privacy protection.
    Related Articles | Metrics | Comments0
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract364)      PDF(pc) (647KB)(317)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    Online Brand Community Users’ Interaction Behavior Transformation Mechanism for Value Co-creation:Based on Grounded Theory
    Le Chengyi Zhu Xinya
    Journal of Information Resources Management    2023, 13 (3): 124-139.   DOI: 10.13365/j.jirm.2023.03.124
    Abstract263)      PDF(pc) (2271KB)(304)       Save
    Companies use online brand communities to facilitate user interaction behaviors as a major path to value co-creation. Through in-depth interviews with 19 active community members, data were collected and programmatically coded using a grounded theory approach to construct a theoretical model of the transformation process and drivers of user interaction behavior. According to the extent of user participation in value co-creation in the community, user interaction behavior can be classified as human-machine interaction, human-human interaction and human-enterprise interaction. The transition from human-machine interaction to human-human interaction is mainly influenced by information quality, social experience and self-realization, while the transition from human-human interaction to human-enterprise interaction is mainly influenced by community incentive, social enhancement and symbiotic co-creation. And the driving factors of users’ behavioral transitions can be categorized into visceral layer, behavioral layer and reflective layer, with information quality and community incentives in the visceral layer playing a greater role in the early stages of each behavioral transition, while self-realization and symbiotic co-creation in the reflective layer having the most effective and longest driving role. The results provide a theoretical reference for an indepth understanding of the transformation mechanism of user interaction behaviors in online brand communities, as well as suggestions for enterprises to target the promotion of user interaction behaviors and value co-creation at different stages.
    Related Articles | Metrics | Comments0
    The General Idea of Scientific Data Governance and Practical Case Verification—Taking the Astronomical Data Governance of the National(Guizhou) Hub Node of the Nationwide Integrated Computing Power Network as an Example
    Ma Xiao Guo Mingjun Yi Chengqi Dou Yue Liang Chuyi
    Journal of Information Resources Management    2023, 13 (5): 126-136.   DOI: 10.13365/j.jirm.2023.05.126
    Abstract150)      PDF(pc) (2119KB)(278)       Save
    Scientific data governance is an important way to promote scientific and technological progress and release the value of scientific data. As an important part of scientific data, astronomical data is of great significance for consolidating our country's international advantages in the field of astronomical research and achieving efficient and safe data governance. This paper adopts the theoretical deduction and case mapping as research methods. On the basis of fully learning from the mature model of data governance, based on collaborative innovation theory and public value theory, it studies “subject-object-carrier”and“problem and target oriented” in the “three bodies and two directions” analytical model of in the field of scientific data governance. Based on this model, a mapping study was carried out on the “FAST” astronomical data governance. It provides a research method from theory to practice of “guiding theory-analysis method-case mapping” for scientific data governance, and provides useful support for the exploration and formation of systematic astronomical data governance.
    Related Articles | Metrics | Comments0
    The Construction of Cultural Heritage Smart Data for the Inheritance and Activation
    Wang Xiaoguang Hou Xilong
    Journal of Information Resources Management    2023, 13 (5): 5-14,43.   DOI: 10.13365/j.jirm.2023.05.005
    Abstract237)      PDF(pc) (2842KB)(270)       Save
    Smart data is becoming a new development trend of information resource construction in the age of data and intelligence. It is an advanced form of data resources organization and more suitable for the new demands and requirements on the data and service in the new environment. Firstly, this article systematically reviews the historical evolution and development trend of smart data, and analyzes the scientific meaning and critical features of smart data. Secondly, facing the problems of cultural heritage inheritance and activation, this article explains the internal logic of smart data empowering cultural heritage activation. Finally, the article puts forward the construction measures and path of cultural heritage smart data, including the construction mechanism, smart data standards and specifications, cultural gene deconstruction, quality control system. The research of smart data not only improves the quality and efficiency of big data resources, but also contributes to the theoretical reform of information resources management and knowledge management in the empowerment of data and intelligence. The construction of cultural heritage smart data resources will effectively promote the process of cultural heritage protection, inheritance and activation.
    Related Articles | Metrics | Comments0
    Impact of Data Classified and Graded Rights Confirmation on the Realization of the Value of Data Elements
    Ma Feicheng Xiong Siyue Sun Yujiao Wang Wenhui
    Journal of Information Resources Management    2024, 14 (1): 4-12.   DOI: 10.13365/j.jirm.2024.01.004
    Abstract336)      PDF(pc) (1559KB)(248)       Save
    Data rights confirmation is essential for realizing the value of data elements and sustaining the normal operation and continuous development of data elements market. This study delves into concepts related to data rights confirmation and explores the path of how to establish a property right system to realize data rights confirmation. Furthermore, this study shows methods for the data classified and graded rights confirmation, analyzing their impact across the data value chain. Results show that in the data collection stage, the data classified and graded rights confirmation mechanism can motivate data supply, improve data quality, and stimulate market vitality. In the data organization stage, it can break down technical work, protect private data, and explore potential value. In the data circulation stage, it can regulate negative externalities, reduce transaction costs, and optimize the allocation of resources. And in the data utilization stage, it plays a key role in data compliance regulation and data value redevelopment.
    Related Articles | Metrics | Comments0
    Intelligent and Smart Service of Multi-model Cultural Heritage Resources: From Available to Evidential and Experiential
    Xia Cuijuan
    Journal of Information Resources Management    2023, 13 (5): 44-55.   DOI: 10.13365/j.jirm.2023.05.044
    Abstract242)      PDF(pc) (2030KB)(239)       Save
    The development of data and intelligence technologies is promoting the transformation from "digital GLAMs" to "smart GLAMs". In the transformation from digitalization to datafication and then to intelligence, the cultural heritage resources of GLAMs show the multi-model characteristics of multimedia, multi-format and multi-granularity. Aiming at the problem of how GLAMs provide intelligent services based on multmodel cultural heritage resources, this paper summarizes the transformation path of cultural heritage resources from digital, data to intelligent services based on case analysis and literature research. According to the low to high degree of resource intelligence, inteligent services can be summarized into three modes: available, evidential and experiential, which correspond to three different demand scenarios: resource-centered services, digital intelligence evidence-based services, and interactive experience-centered services. It is concluded that the intelligent services of multi-model cultural heritage resources are to predict in advance and automatically adapting to users' needs for different modes of cultural heritage resources in different demand scenarios.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (3): 4-5.   DOI: 10.13365/j.jirm.2023.03.004
    Abstract246)      PDF(pc) (673KB)(232)       Save
    Related Articles | Metrics | Comments0
    Risk Response of Artificial Intelligence Production Mode from the Perspective of Holistic Approach to National Security
    Cai Chiyu Hu Yuxuan Liu Zhi
    Journal of Information Resources Management    2023, 13 (6): 43-47.   DOI: 10.13365/j.jirm.2023.06.043
    Abstract88)      PDF(pc) (1030KB)(201)       Save
    Related Articles | Metrics | Comments0
    From Epistemological Paradox to Cognitive Trap: Research on Security Issues of Generative Technology-Driven Information Ecosystem
    Bai Yun Li Baiyang Mao Jin Li Gang
    Journal of Information Resources Management    2024, 14 (1): 13-21.   DOI: 10.13365/j.jirm.2024.01.009
    Abstract138)      PDF(pc) (907KB)(198)       Save
    Generative technology-driven information system, with generative artificial intelligence as its core, supports and promotes the process of knowledge transmission and sharing, as well as cognitive flow, and diffusion in the entire information environment. However, it also poses challenges to epistemic security and cognitive security. This paper analyzes the characteristics, advantages, and risks of the generative technology-driven information ecosystem from the perspectives of epistemic and cognition environments. It explores how to fully realize the potential of generative artificial intelligence while adhering to human values and social ethics, to promote the construction of an efficient, secure, and sustainable generative technology-driven information ecosystem.
    Related Articles | Metrics | Comments0
    The Dilemma and Practical Approach of Data Factor Value Creation in Chinese Enterprises from the Collaborative Perspective
    Qian Jinlin Xia Yikun
    Journal of Information Resources Management    2023, 13 (6): 5-16.   DOI: 10.13365/j.jirm.2023.06.005
    Abstract264)      PDF(pc) (1867KB)(197)       Save
    Mining and releasing enterprise data factor value is of great significance to cultivate enterprise core competitiveness and to promote social economic growth. Based on literature research, comparative analysis and other methods, this paper comprehensively uses synergy theory and data value chain theory to analyze the connotation mechanism of data factor value creation, and then based on the coupling of data chain and value chain, this paper builds the analysis framework of the collaborative work scene within the enterprise and the collaborative co-governance scene outside the enterprise. The results suggest that: (1)Chinese enterprises lack the analytical ability of data value system, fail to set up data resource management system, and cannot achieve the collaborative development of data utilization and business scenarios; (2)It is difficult to form a value co-creation network with data sharing and exchange as the core because the data sharing channels between enterprises are not smooth, the data relationship is not harmonious, and the interest balance mechanism is not perfect; (3)The two-way data flow sharing mechanism between enterprises and the government is not perfect, and the government-enterprise data coordination supervision and cultivation system is not complete; (4)It is difficult to balance the protection of data rights and the pursuit of data interests between enterprises and individuals. Therefore, this paper puts forward the practical approach of data factor value creation in China from two perspectives: (1)improving the collaborative research ability of data factor value creation within enterprises, and (2)establishing a multi-agent collaborative and co-governing data ecology outside enterprises.
    Related Articles | Metrics | Comments0
    The Path and Empirical Study of Intelligence Support for Emergencies by Fusing Eventic Graph and Network Opinion Analysis——Taking Hazardous Chemical Accidents as an Example
    Zhang Shiying Li Yang
    Journal of Information Resources Management    2023, 13 (4): 60-71.   DOI: 10.13365/j.jirm.2023.04.060
    Abstract276)      PDF(pc) (4153KB)(155)       Save
    Existing emergency intelligence support has some deficiencies, such as static knowledge, fuzzy reasoning, and spatial homogeneity. The paper proposes a path of emergency intelligence support that integrates eventic graph and network opinion analysis, aiming to improve the situational awareness and predictive response capability of emergencies in complex situations, and support emergency intelligence paradigm innovation in the era of digital intelligence empowerment. The paper constructs a framework for emergency intelligence support from the integrated perspective of reasoning and knowledge fusion, business and network fusion, and carries out empirical research using hazardous chemical accidents as an illustration. The work includes building a database of relevant emergencies, portraying the development logic of emergencies using an eventic graph, and describing the impact of emergencies in cyberspace using online opinion analysis techniques. This provides intelligence support for emergency management and decision making for new emergencies. The intelligence support path proposed in this paper can take into account the characteristics of multi-source spatial data as well as the integration of event logic and knowledge, allowing for a more systematic "past-future" intelligence prediction of emergencies. The empirical study and validation of hazardous chemical accidents also show good knowledge presentation and intelligence reasoning.
    Related Articles | Metrics | Comments0
    The Academic Dialogue Journey in Case Study Research: Insights from the Information Systems Field
    Li Liang Wang Mingxu
    Journal of Information Resources Management    2023, 13 (3): 112-123.   DOI: 10.13365/j.jirm.2023.03.112
    Abstract205)      PDF(pc) (2125KB)(152)       Save
    In recent years, the case study method has been attached great importance and widely used in the domestic management academia. However, the development of domestic case studies was hindered by a number of typical problems that led to weak theoretical contributions. In order to address these problems, this paper argues that the researcher should carry on in-depth dialogues with literature, theory, phenomenon, methodology and self in conducting case study research. We analyze exemplary case studies from leading journals in the field of information systems and refine the aforementioned five aspects into nine specific academic dialogues. The “best practices” highlighted in these exemplary case studies provide researchers with rich and referential examples. Finally, we make some suggestions on how to improve the quality of domestic case studies.
    Related Articles | Metrics | Comments0
    The Upcoming National Data Bureau will Promote High-quality Development of Digital Economy
    Ding Botao
    Journal of Information Resources Management    2023, 13 (4): 4-5,34.   DOI: 10.13365/j.jirm.2023.04.004
    Abstract242)      PDF(pc) (664KB)(146)       Save
    Related Articles | Metrics | Comments0
    An Empirical Study on the Influence Model of Social Media Users’ Disinformation Verification Behavior
    Mo Zuying  Liu Huan  Pan Daqing
    Journal of Information Resources Management    2023, 13 (4): 72-83.   DOI: 10.13365/j.jirm.2023.04.072
    Abstract281)      PDF(pc) (1561KB)(143)       Save
    This paper examines the factors and paths that affect users' information verification behavior, in order to help users avoid disinformation on the internet and achieve self-purification of cyberspace. Based on the elaboration likelihood model(ELM), this paper uses questionnaire and structural equation model to develop the influence model of social media users’ disinformation verification behavior and conducts an empirical study on the factors that affecting users’ information verification behavior. The result shows that information simulation, information topic popularity and platform trust are the key factors on users’ affective reactions, while information relevance, information topic popularity, and media richness are the key factors on users’ perception of risk. The users’ attitudes, which include emotion and cognition are the primary determinants of users’ information verification behavior. This study can provide references for the management of social media platforms and the prevention of users’ spreading disinformation.
    Related Articles | Metrics | Comments0
    Research on the Motivation of Social Media Information Deletion:Take WeChat Moments as an Example
    Yu Mengli Shen Wenhan Zheng Bowen
    Journal of Information Resources Management    2023, 13 (4): 84-95,121.   DOI: 10.13365/j.jirm.2023.04.084
    Abstract261)      PDF(pc) (2531KB)(141)       Save
    As the amount of user-generated content grows, an increasing number of users start to delete previous posts. Information deletion in social media is not only a personal information management behavior for social media users but also has an impact on the development of social platforms content resources. Based on self-awareness theory and the perspectives of defense acquisition information management, this study investigates the motivations behind the deletion behavior of WeChat users' moments. The results of Structural Equation Modeling demonstrate that information security, field environment, and content value of defensive management have a significantly positive influence on information deletion behavior, and that the level of self-disclosure plays a mediating role in the relationships between information security, information value, and social media information deletion behavior. The research contributes to a comprehensive understanding of social media users' usage paradigm and provides decision support for the utilization of social media data and economic development of platforms.
    Related Articles | Metrics | Comments0
    Analysis on Design Science Guidelines: An Example of “Big Data-Small Data” Problem
    Zhang Minghua He Fang Zhang Jin
    Journal of Information Resources Management    2023, 13 (3): 154-168.   DOI: 10.13365/j.jirm.2023.03.154
    Abstract206)      PDF(pc) (4188KB)(139)       Save
    Design science is a typical research paradigm within the field of information management and information systems. In recent years, the proportion of design science in information management research has gradually increased. Taking the “Big data-Small data” problem in design science as an example which aims to improve the efficiency of data factor usage, this paper proposes a novel problem of “Big data-Small data” in social networks. Following the design science paradigm, this paper also proposes a framework to solve the problem, i.e., AIRep, an author influence-based representative information extraction framework, and then demonstrates the effectiveness of the extraction results with the data from an internal social networks platform in a Chinese enterprise. Finally, it analyses and discusses the seven guidelines of the design science paradigm based on the “Big data-Small data” research in social networks.
    Related Articles | Metrics | Comments0
    Data Element Governance Dilemma and Prevention Mechanisms—A Perspective of Value and Risk Integration
    Shen Xiaoliang Qian Qianwen
    Journal of Information Resources Management    2023, 13 (6): 17-28,42.   DOI: 10.13365/j.jirm.2023.06.017
    Abstract198)      PDF(pc) (3842KB)(132)       Save
    In the context of the new development pattern, data element governance demands simultaneous attention to both development and security, while unleashing the value of data elements and addressing emerging risk challenges. Nevertheless, current research has given limited consideration to the integration of data element value and risk. Based on the principle of risk-return tradeoff, this study examines the "effect exclusion" and "state symbiosis" relationship between data element value and risk. Furthermore, it draws on information ecology theory, domestic typical cases, and foreign policies and laws to investigate the dilemma and prevention mechanisms of data element governance. The study provides a comprehensive and systematic analysis of the practical dilemmas and prevention strategies faced in data element governance by considering a balance between value and risk aspects. It also offers significant directions for future research.
    Related Articles | Metrics | Comments0
    Dynamic Effects of Emotions on Information Sharing Behavior in the EID Event Contexts:The Moderating Role of Personality Traits
    Xu Liwei Han Mingxing Qiu Jiangnan
    Journal of Information Resources Management    2023, 13 (3): 79-99.   DOI: 10.13365/j.jirm.2023.03.079
    Abstract263)      PDF(pc) (11582KB)(127)       Save
    This paper focuses on typical cases of major public health emergencies, integrates emotion feedback theory, Person-situation Interaction hypothesis, and a four-stage life-cycle model of crisis management to construct a conceptual model, and uses a vector autoregressive model and impulse response function to analyze the dynamic mechanisms of personality traits of netizens on emotions and information sharing behavior in different life-cycles of EID online public opinion. Experimental results show that personality traits dynamically moderate the relationship between emotions and information sharing behavior. During buildup, breakout, and abatement stages, high neuroticism has a positive and short-term moderating effect on the relationship between fear and information sharing behavior. During breakout and abatement stages, high extroversion has a positive and short-term moderating effect on the relationship between fear and information sharing behavior. In each of the four stages, openness and agreeableness have different moderating effects, which would amplify information sharing behavior to varying degrees.
    Related Articles | Metrics | Comments0
    Construction of China’s Data Sovereignty Rule Pedigree:A Grounded Theory Study
    Zheng Linghan Huang Biyun Jiang Ying
    Journal of Information Resources Management    2023, 13 (5): 56-72.   DOI: 10.13365/j.jirm.2023.05.056
    Abstract160)      PDF(pc) (3944KB)(127)       Save
    Research on data sovereignty rules is helpful for different entities to understand China's data sovereignty rule system, as well as for the standardized expression of rule texts, thereby reducing the cost of data sovereignty compliance. According to the three key process areas of local storage, cross-border flow and extraterritorial jurisdiction, 46 samples related to data sovereignty were screened, 148 rule texts were extracted, and the grounded theory method was used to manually code multiple times with NVivo12 Plus. The hierarchy of data sovereignty rules is composed of objects, subjects and obligations. The objects are divided into 7 categories: data, information, equipment, key information infrastructure, security, interests and rights. The subjects include 6 categories: state, party institutions, administrative subjects, public affairs subjects, enterprise subjects and other subjects. The obligations encompass 29 categories, including security assessment, outbound security assessment, personal information impact assessment, data security protection, within-territory data storage, within-territory information storage, with-territory equipment building, entity establishment, compliance with compliance requirements, reporting obligation, listing and announcement.Overall, the data sovereignty rule system is complete, covering various types of rule fields such as legal norms, departmental norms, and standard norms; Data sovereignty exhibits a "defensive" characteristic, namely orderly flow, appropriate localization, and necessary jurisdiction.
    Related Articles | Metrics | Comments0
    Ontology-driven Design and Application of Archival Documentary Heritage Metadata:Taking Suzhou Silk Archives as Example
    Niu Li Huang Laihua Jia Junzhi Liu Yuxin
    Journal of Information Resources Management    2023, 13 (5): 15-31.   DOI: 10.13365/j.jirm.2023.05.015
    Abstract197)      PDF(pc) (6378KB)(126)       Save
    Metadata is the key to realize the organization and digital storage of archival documentary heritage, and also the guarantee of its development and utilization. Considering the definition, the hierarchical structure and the attributes of classes of ontology, this paper designs an aggregated metadata system with semantic features and content elements. Taking archival documentary heritage as the research object, we treat its metadata design as the core problem and put forward the general idea and specific steps of ontology-driven metadata design of archival documentary heritage, including resource selection and collection, construction of ontology models, from ontology to metadata, and application of metadata schemes. In addition, taking Suzhou silk archives as an example, the knowledge ontology is constructed combined with their characteristics to realize the design and application of metadata schemes, so as to confirm the validity and scientificity of ontology in guiding metadata construction.
    Related Articles | Metrics | Comments0
    A Fuzzy-Set Qualitative Comparative Analysis of Influencing Factors and Configurational Paths to Personal Information Protection Level of Mobile Government Services: Evidence from 30 Chinese Provinces
    Pan Yinrong Liu Xiaojuan Zhang Rongxu
    Journal of Information Resources Management    2023, 13 (5): 92-101,136.   DOI: 10.13365/j.jirm.2023.05.092
    Abstract139)      PDF(pc) (1297KB)(122)       Save
    The level of personal information protection has become an important indicator to measure the ability of mobile government services. It is crucial to explore its influencing factors and configurational paths for promoting higher quality digital government construction. With 8 conditional variables setting based on TOE framework, this paper uses fuzzy set qualitative comparative analysis method(fsQCA) to analyze the case from three aspects of technology, organization and enviroment with data from 30 provincial local governments. The result shows that technical, organizational and environmental factors all affect the personal information protection level of mobile government services, and the high-level paths can be classified into four types: competition-driven, technology-oriented, organization-empowered, and internally and externally linked. Local governments should take targeted measures in light of local conditions to better promote personal information protection.
    Related Articles | Metrics | Comments0
    The Influencing Factors of Scientific Data Reuse in the Field of Cultural Heritage
    Rao Zixin Xu Xin
    Journal of Information Resources Management    2023, 13 (5): 32-43.   DOI: 10.13365/j.jirm.2023.05.032
    Abstract124)      PDF(pc) (827KB)(120)       Save
    To provide reference for the effective use and management of data in the field of cultural heritage, this paper explores the main factors affecting the reuse of scientific data in the field of cultural heritage by taking 203 cultural heritage scientific datasets reused in DataCite as the research object. Employing non-parametric test and multiple linear regression, this paper explores the influencing factors of scientific data reuse in the field of cultural heritage from three dimensions of data attribute, data provider and data repository.After controlling the time span factors, license, type, abstracts, formats, publishers, sponsor, and quality management are the main factors positively affecting the reuse of scientific data in the field of cultural heritage, and the degree of influence increases successively.Combining with the actual situation in China, this paper puts forward the following enlightenment: establishing cultural heritage metadata standards to improve the adequacy of data description information; incorporating data reuse into funding requirements to promote data reuse of cultural heritage projects; building a scientific data publishing system for cultural heritage and improving peer review in data publishing; promoting quality management of cultural heritage data and making full use of data repositories.
    Related Articles | Metrics | Comments0
    The Effect of the Anti-monopoly of Platform Economy on Community Group-buying Users’ Discontinuance Intention: A Perspective of Perceived Price and Disconfirmation
    Liu Qihua Peng Sijie Xu Liyang Zhou Jingyi
    Journal of Information Resources Management    2023, 13 (3): 39-60.   DOI: 10.13365/j.jirm.2023.03.039
    Abstract296)      PDF(pc) (6938KB)(118)       Save
    Against the backdrop of the anti-monopoly of platform economy, community group-buying platforms are no longer able to dump goods at low prices or provide high subsidies to attract users. Will online users continue to use community group-buying? From the perspective of perceived price and disconfirmation, this study constructs a theoretical model of users’ community group-buying discontinuance intention influenced by the anti-monopoly of platform economy and uses PLS-SEM to analyze data from 542 valid users. It is found that, as a result of the anti-monopoly effect of platform economy, an increase in perceived price leads to product quality disconfirmation and service quality disconfirmation, thus increasing dissatisfaction, which positively affects discontinuance intention. In addition, for users with high price sensitivity, the increase in perceived price leads to greater product quality disconfirmation, but not to greater service quality disconfirmation. This study enriches and expands the research on online users’ discontinuance intention, expectation-disconfirmation theory, and platform governance, which provides useful suggestions for platform merchants, managers, and regulators.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2023, 13 (5): 4-4.  
    Abstract241)      PDF(pc) (311KB)(114)       Save
    Related Articles | Metrics | Comments0
    The Identification of the Core Factors of Highly Cited Papers
    Xu Linyu
    Journal of Information Resources Management    2023, 13 (5): 137-148.   DOI: 10.13365/j.jirm.2023.05.137
    Abstract180)      PDF(pc) (3298KB)(113)       Save
    Highly cited papers have high academic discourse and reference values. The research on the identification of the core factors of highly cited papers is very important for academic papers to obtain citations and to establish and strengthen the competitive advantage. This paper extracts, screens, and forms a set of internal and external influencing factors of academic papers through the combination of literature extraction and questionnaire. It then explores the linear and nonlinear influence of these factors on highly cited papers by means of logistic regression. Finally, this paper uses various classical classification algorithms of machine learning to test the robustness of the above results. The results show that the quality and age of references both have a significant positive linear effect on the formation of highly cited papers, and with the increase of variable values, the quadratic coefficient has a strong superposition effect. In addition, journal reputation has an approximate linear effect on the formation of highly cited papers. However, the indicators such as the author’s reputation, usage and initial citation have a significant positive linear influence on the formation of highly cited papers. With the increase of variable values, the linear effect of the quadratic coefficient gradually weakens, showing a semi-"inverted U" trend of first increasing and then leveling off. Machine learning classical classification algorithms such as decision tree, naive bayes and random forest all show good prediction results for highly cited papers, which shows that the research results of this paper are robust.
    Related Articles | Metrics | Comments0