Most Downloaded

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    In last 2 years
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Criteria of Structural Equation Modeling: Comparisons and Enlightenments of CB-SEM and PLS-SEM
    Yuan Ye Shiau Wenlung Yu Yuan Wang Kanliang Li Yiran
    Journal of Information Resources Management    2023, 13 (3): 6-22.   DOI: 10.13365/j.jirm.2023.03.006
    Abstract2025)      PDF(pc) (2464KB)(1174)       Save
    Structural Equation Modeling (SEM) is used to analyze the complex relationships between observed variables and latent variables. Covariance-based structural equation modeling (CB-SEM) and partial least squares structural equation modeling (PLS-SEM) are the two types of SEM. SEM has been widely used in social science such as organizational management, information systems, marketing management and other disciplines. In recent years the number of research papers using PLS-SEM method has increased. Since CB-SEM and PLS-SEM are different in algorithm and requirements, the application of unsuitable methods may lead to inaccurate results. Therefore, it is necessary to understand the differences between the two methods and report guidelines. This paper reviews the conditions and application criteria of CB-SEM and PLS-SEM, and takes the use of fintech by wealth management enterprises as an example to compare the analysis process and results of the two methods, emphasizing the importance and necessity of choosing appropriate methods. This paper provides a valuable reference for researchers to use SEM for accurate data analysis.
    Related Articles | Metrics | Comments0
    The Main Practice and Basic Experience of Foreign Government Data Asset Management
    Xia Yikun Guan Qian
    Journal of Information Resources Management    2022, 12 (6): 18-30.   DOI: 10.13365/j.jirm.2022.06.018
    Abstract1567)      PDF(pc) (840KB)(913)       Save
    In the digital era, with the rapid expansion of government data volume and the updating of technological means, especially with the continuous promotion of big data strategy, open government data strategy, artificial intelligence strategy, and digital economy strategy, the important value of data as a strategic asset has become a global consensus. Focusing on the full realization of government data value and risk balance,this paper takes the strategies, policies and practical regulations of government data assets management in representative countries as the research object, then analyzes and summarizes its common characteristics and basic experience. That is, at the macro level, it is necessary to establish a comprehensive view of data assets and promote the overall layout of data asset management; at the meso level, the process management of data assets should be strengthened based on policies and schemes; at the micro level, the comprehensive application of technology, multiple partners, capabilities, and other elements should be used.
    Related Articles | Metrics | Comments0
    Research on the Path to Realize the Value of Data Elements
    Ma Feicheng Wu Yishu Lu Huizhi
    Journal of Information Resources Management    2023, 13 (2): 4-11.   DOI: 10.13365/j.jirm.2023.02.004
    Abstract958)      PDF(pc) (1011KB)(824)       Save
    Identifying the path to realize the value of data elements is of great significance to accelerate the deep integration of digital economy and real economy. In order to explore the mechanism and path of realizing the value of data elements, this study combs the existing ways and attributes of data elements, clarifies the mechanism of realizing the value of data elements on this basis, and constructs the value realization path including basic activities, auxiliary activities and value development based on the value chain theory. The research shows that the value realization mechanism of data elements includes subject participation mechanism, marketization realization mechanism, ownership definition and transfer mechanism. Data collection, data organization, data circulation and data utilization are the basic paths to realize the value of data elements, while the three auxiliary activities of data security protection, data technical support and data talent guarantee ensure the realization of value.
    Related Articles | Metrics | Comments0
    A Review of Secondary Analysis in Information Management and Information Systems Research in China: Research Methods,Topics, and Theory Applications
    Chen Liping Ren Fei
    Journal of Information Resources Management    2023, 13 (3): 61-78.   DOI: 10.13365/j.jirm.2023.03.061
    Abstract477)      PDF(pc) (1792KB)(582)       Save
    This study conducts a content analysis of 282 Chinese research papers published from 2012 to 2022 that use secondary analysis in the area of information management and information systems (IM&IS), aiming to reveal the distribution and trend of research methods, topics, and theory applications. The results show that the advantages of secondary analysis in data acquisition and causality identification are increasingly prominent, as reflected in the gradual diversity of data sources, rigorous empirical analysis on causality testing, richer mechanism analyses, and the emergence of mixed-method research. Four research topic trends have been identified, including macro digital development, enterprise digital transformation, information interaction between enterprise and market, and user online behavior. However, IM&IS theory development and the application of Chinese theories require further improvement. This study is novel in that it combines bibliometric analysis with machine learning methods (LDA and DTM) to reveal a multi-dimensional overview of the secondary analysis in IM&IS in China. The findings provide evidence and guidelines for further strengthening research norms, grasping research topic trends, developing and applying theories, as well as suggestions for disciplinary development and strategic research planning.
    Related Articles | Metrics | Comments0
    The Framework, Implementation Path, and Challenges on Information Management of Supply Chain Empowered by Blockchain from the Perspective of Complex Sociotechnical Systems
    Zou Liuxin Wu Jiang Xia Mengchen
    Journal of Information Resources Management    2023, 13 (1): 91-102.   DOI: 10.13365/j.jirm.2023.01.091
    Abstract517)      PDF(pc) (6056KB)(567)       Save
    The combination of blockchain technology and supply chain information management is a trend in the development of digital supply chains, which attracts wide attention from many fields. This paper conducts thematic evolution analysis and clustering analysis on the scientific literature of blockchain-based supply chain information management in Web of Science. It proposes a research framework and analyzes the supply chain information management empowered by digital intelligence through blockchain technology from the perspective of complex sociotechnical systems. Through knowledge sharing, information traceability, and trust establishment, blockchain technology interlaces and verifies material circulation, commercial circulation, information circulation, capital circulation, and information at all levels of the technical system. Information management empowers the security and visualization of logistics, the transparency and traceability of commercial circulation, the sharing and immutability of information circulation, and the credibility and anonymity of capital circulation. Finally, this paper analyzes the supply chain information management practices based on blockchain technology from the management challenge and the application industry, and prospects for future research directions. It explores the transformation of information management enabled by blockchain technology from the level of technical and social systems, where thinking about information management from the perspective of complex sociotechnical systems inspires the development and digital construction of supply chains.
    Related Articles | Metrics | Comments0
    An Empirical Study on the Influence of Socio-technical Factors on Short Video Addiction: The Moderating Effect of Recommendation Algorithms
    Xie Xinzhou Du Yan
    Journal of Information Resources Management    2023, 13 (1): 65-77.   DOI: 10.13365/j.jirm.2023.01.065
    Abstract434)      PDF(pc) (1232KB)(558)       Save
    Based on a socio-technical perspective, this study examined the influence of social and technological factors on short video addiction through an online questionnaire survey. The findings reveal that personalization, responsiveness, active user control, and parasocial relationships can predict short video addiction. At the same time, user’s use of algorithms moderate the relationships between various factors and addiction. It will aggravate addiction by strengthening the influence of susceptibility factors and weakening the constraint of inhibitory factors. This study emphasizes the importance of the socio-technical interaction and algorithmic context on short video addiction, which enriches theoretical models and empirical studies of short video addiction. The results provide important practical implications for improving the effectiveness of anti-addiction through the synergistic optimization of social and technological systems.
    Related Articles | Metrics | Comments0
    The Development and Operation of Data Production Factors Market
    Ma Feicheng Lu Huizhi Wu Yishu
    Journal of Information Resources Management    2022, 12 (5): 4-13.   DOI: 10.13365/j.jirm.2022.05.004
    Abstract708)      PDF(pc) (718KB)(534)       Save
    As the digital economy has become an important driving force for the economic growth of China, cultivating data production factors market is an inevitable requirement for further economic development. The development of digital economy and digital industry provides the basic conditions for the expansion of the data element market, but the data element market of China is still in the initial stage of development. In this paper, we review the concept and development status of the data element market. Based on key influencing factors such as data ownership, data classification, data security, and open sharing, we analyze the current difficulties and challenges of the development of the data element market. The operating mode and mechanism of the data element market are systematically discussed. We put forward advice on the development path of the data element market, which provides useful thinking for guiding the high-quality development of the data element market.
    Related Articles | Metrics | Comments0
    Data and Algorithm Security Governance in the United States: Approaches, Characteristics and Enlightenments
    Ma Haiqun Cai Qingping Cui Wenbo Zhang Tao
    Journal of Information Resources Management    2023, 13 (1): 52-64.   DOI: 10.13365/j.jirm.2023.01.052
    Abstract673)      PDF(pc) (1298KB)(514)       Save
    The new technological revolution and industrial transformation will reshape the global economy.Data and algorithms become an important driver of the new technological revolution, which also gives rise to a series of security risks. The United States has long attached great importance to data and algorithm security governance, and the study of data and algorithm security governance characteristics in the United States can play an important role in establishing and improving data and algorithm security governance mechanisms and systems in China. Starting from two dimensions of federal government, state and local government governance systems and institutions, it systematically sorts out the systems and institutional powers and responsibilities related to data and algorithm security in the United States, in order to realize the governance approach of data and algorithm security in the United States, and summarize its governance characteristics from two aspects of governance system and governance institution. Finally, four recommendations are made in the light of the current situation of governance in China: to build a "sub-field, refined, multi-level" personal privacy data security regulatory system; to build a "hardlaw for coordination" data and algorithm security governance mechanism; to establish an AI ethics code with " International discourse power"; to establish a "hierarchical, multi-party governancing" collaborative governance institution.
    Related Articles | Metrics | Comments0
    Human-chatbot Interaction vs. Human-human Interaction: Effects of Service Agent Perception and Two-sided Arguments in Conversational Commerce
    Li Mengxin Yi Cheng
    Journal of Information Resources Management    2023, 13 (3): 140-153.   DOI: 10.13365/j.jirm.2023.03.140
    Abstract571)      PDF(pc) (1820KB)(498)       Save
    The fact that conversational commerce has been one of the most favorable ways for companies to reach customers has generated an increasing number of use cases for chatbots. Making a comparison between human-chatbot communication and human-human communication can shed light on the behavioral rules which determine how humans interact with intelligent agents and provide design and application guidelines for chatbots. This study compares human-chatbot conversation with human-human conversation in the context of online customer service to figure out whether two-sided arguments have different effects on users’ purchase intentions and experiences. A laboratory experiment is conducted with a 2 (user’s perception of the customer service agent: chatbot vs. human) 2 (conversation design: two-sided argument vs. one-sided argument). The experiment applies Wizard of Oz method, with humans performing service tasks while giving the impression to that users they are chatting with chatbots. The results show that in human-human communication, two-sided arguments have a negative impact on users’ purchase intention for the product, while in human-chatbot communication, the effect is non-significant. When users believe they are interacting with a chatbot, the positive effects of two-sided arguments on user perceptions of source credibility and pleasure are amplified.
    Related Articles | Metrics | Comments0
    Data and Algorithm Security Governance in the European Union: Characteristics and Implications
    Cui Wenbo Zhang Tao Ma Haiqun Cai Qingping
    Journal of Information Resources Management    2023, 13 (2): 30-41.   DOI: 10.13365/j.jirm.2023.02.030
    Abstract478)      PDF(pc) (4166KB)(486)       Save
    Research on the structure and characteristics of data and algorithm security governance in typical global regions will provide a reference for data and algorithm security governance in China. The paper takes data and algorithm security as the governance object to investigate EU’s realization of the governance goal on digital sovereignty and technological sovereignty. In terms of governance content, the framework of the EU data and algorithm security governance with the core of the General Data Protection Regulations (GDPR) consists of four parts: privacy and data protection, data flow security, platform algorithm security, and artificial intelligence ethics. In terms of governance subjects, with the European Data Protection Regulatory Authority and other institutions as the core, a multi-party collaborative governance subject integrating "legislation-enforcement-service" is formed. The EU data and algorithm security governance has the typical characteristics of emphasizing personal privacy data security, establishing cross-border data flow security rules, forming a collaborative security governance model for algorithm nested data, and a human-centered AI ethics and governance. Based on the characteristics of data and algorithm security governance in the European Union, three suggestions are proposed for the current situation of data and algorithm security governance in China: to improve the collaborative governance mechanism of data and algorithm security, to establish a data flow system between subjects and an evaluation mechanism for intermediary agencies, as well as a balance mechanism between AI ethical supervision and innovative development.
    Related Articles | Metrics | Comments0
    Research on the Formation Mechanism of Social Media Group Polarization under Hot Events
    Peng Guochao Cheng Xiao
    Journal of Information Resources Management    2023, 13 (2): 42-52.   DOI: 10.13365/j.jirm.2023.02.042
    Abstract734)      PDF(pc) (1084KB)(477)       Save
    By exploring the mechanism of generating social media group polarization, this study aims to provide a reference for guiding and avoiding social media group polarization. Based on the social burning theory, this study uses existing literature and selected cases to refine six explanations, including interest oppeals, news narrative framework, opinion leaders, initial media, issue types, and communication forms, and uses the clear-set qualitative comparative analysis to explore the generative path of social media group polarization. The study found that news narrative framework is a necessary condition for social media group polarization, and opinion leaders are the core condition for social media group polarization, which act as "accelerators" to jointly promote the generation of group polarization; As the "ignition temperature", the issule type has a moderating effect on the generation of social media group polarization; Hot events in the form of pictures and texts are more likely to cause group polarization on social media.
    Related Articles | Metrics | Comments0
    Building Consensus and Promoting the First-Level Discipline Construction of Information Resource Management
    Ma Feicheng
    Journal of Information Resources Management    2023, 13 (1): 4-8.   DOI: 10.13365/j.jirm.2023.01.004
    Abstract767)      PDF(pc) (599KB)(456)       Save
    The knowledge system of LIS & Archives Management have undergone a long period of development, and its first-level discipline has been renamed "information resource management". As a first-level discipline name, information resource management highlights the characteristics of the times, covers the entire process of the field of library, information and archives, and opens up space for new fields. It is a concept that keeps pace with the times and integrates domestic and foreign information practice. After the renaming of the first-level discipline, an important issue that the academic community needs to solve is how to strengthen the construction of new majors. I suggest that both postgraduate and undergraduate levels can be considered comprehensively. At the postgraduate level, majors can be set according to the original secondary disciplines, or the connotation of information resource management, or a combination of the first two methods, which can not only retain the original secondary disciplines, but also contain new majors. At the undergraduate level, the major name of library and archives can be renamed as information resource management or information management to promote the connection between the undergraduate catalog and the postgraduate catalog.
    Related Articles | Metrics | Comments0
    Redrawing the Disciplinary Blueprint in the Name of Information Resources Management
    Feng Huiling
    Journal of Information Resources Management    2022, 12 (6): 4-10.   DOI: 10.13365/j.jirm.2022.06.004
    Abstract398)      PDF(pc) (659KB)(447)       Save
    This paper reviews the historical process of the renaming of the first-class discipline of "Library, Information and Archives Management" to "Information Resources Management", expounds the main reasons for the renaming of the discipline, responds to the doubts about the renaming, and finally puts forward three important tasks for the development of Information Resources Management in the future, namely, consolidating the basic theory of Information Resources Management in the new era, studying the basic framework of Information Resources Management, and ensuring the healthy development of Library Science, Information Science and Archival Science.
    Related Articles | Metrics | Comments0
    Best Deals for Livestreaming Fans:A Negotiation Model under the Anchor’ s Reputation Concern
    Yang Siyi Dou Yifan
    Journal of Information Resources Management    2023, 13 (3): 100-111.   DOI: 10.13365/j.jirm.2023.03.100
    Abstract404)      PDF(pc) (4766KB)(416)       Save
    In live-streaming e-commerce shows, the reputation of anchor plays a central role because it simultaneously affects the brand-side price negotiation and the anchor-side long-run profitability. This paper examines the effect of the anchors’ reputation on price negotiation with Nash bargaining model in light of the conflict between brands’ myopic focus on one-off profits and anchors’ focus on long-term reputation. Our analytical and numerical results suggest that the negotiated price is non-monotonically affected by the reputation concern. An anchor with a greater reputation concern may receive a smaller discount. Besides, the brand, the anchor, and consumers all benefit when the anchor has a moderate concern for his or her reputation.
    Related Articles | Metrics | Comments0
    The Effect of Online Doctor-patient Interaction on Compliance of Patients with Chronic Diseases: From the Perspective of Patient Characteristics and Satisfaction
    Wang Siqi Lu Qinyan Xu Xinxiang Qin Ziru Zhang Xiaofei
    Journal of Information Resources Management    2022, 12 (6): 70-83.   DOI: 10.13365/j.jirm.2022.06.070
    Abstract453)      PDF(pc) (1103KB)(406)       Save
    Using online health communities to manage the health conditions of patients with chronic diseases is an important approach to relieving the shortage of medical resources and improving the health outcome of such patients in the new era. However, there are inconsistent findings in the current literature about the impact of this model on patient compliance. This paper constructs a decision model on the effect of patient-doctor interaction on the compliance of patients with chronic disease based on an online health community, taking diabetic patients on a well-known online health community in China as the research object and combining the characteristics of chronic disease patients (demand levels and complications). It explores the decision-making process of people with chronic diseases from a social support theory perspective with a view to explaining the inconsistent findings in the literature. The research results show that informational support and emotional support provided by doctors in the online health community will positively affect the satisfaction of patients with chronic diseases, so as to improve their compliance through satisfaction as a mediator variable; the demand level of patients with chronic diseases has a positive moderating effect on the relationship between emotional support and satisfaction, complications have a negative moderating effect on the relationship between satisfaction and compliance. This study enriches the research on the influencing factors and conduction paths of chronic disease patients’ compliance in the online health community, and puts forward relevant practical suggestions for the online health platform to better serve chronic disease patients.
    Related Articles | Metrics | Comments0
    UK National Data Security Governance: Systems, Institutions and Implications
    Zhang Tao Cui Wenbo Liu Shuo Cai Qingping Ma Haiqun
    Journal of Information Resources Management    2022, 12 (6): 44-57.   DOI: 10.13365/j.jirm.2022.06.044
    Abstract681)      PDF(pc) (4413KB)(404)       Save
    This article sorts out the UK national data security governance measures from two aspects. First, the UK national data security governance system is divided into five parts: personal data security, government data security, network data security, data ethics security and artificial intelligence data security; The second is to sort out the powers and responsibilities of the UK data security governance institutions and analyze their characteristics. After years of evolution and changes in the UK national data security governance, its institutional evolution is from the outside to the inside. Focusing on personal data security and human rights, the UK was an early adopter of regulatory sandbox governance mechanism. Many related systems are still applicable after it left the EU. In terms of institutions, governance system of "one center, one network" has been developed. Finally, four suggestions are put forward in view of the current situation of data security governance in our country, that is, to improve a data security governance institutional system of "one center and one network", to build a data ethical cooperation mechanism among multiple stakeholders, to establish a supervision sandbox mechanism to effectively prevent and control data security risks, and to improve the institutional system of data security in the cross-border circulation.
    Related Articles | Metrics | Comments0
    Impacts of Platforms’ Privacy Assurance Mechanisms on Consumers’ Privacy Disclosure
    Shao Xiuyan Cao Cong Wang Ping
    Journal of Information Resources Management    2023, 13 (3): 23-38.   DOI: 10.13365/j.jirm.2023.03.023
    Abstract387)      PDF(pc) (2915KB)(403)       Save
    Protecting consumers’ privacy, eliminating their privacy concerns, and encouraging their self-disclosure are essential for online shopping platforms to promote personalized products and services, and maintain core competitiveness. In order to clarify the mechanism of privacy assurance mechanisms, this study integrated the elaboration likelihood model and herding theory, collected 231 samples through an online survey, and analyzed the data using SmartPLS. The results show that both trust belief and herd mentality significantly affect consumers’ privacy disclosure behavior, while trust belief has a greater effect. Both direct and indirect privacy assurance mechanisms establish consumers’ trust on platforms, however, direct privacy assurance mechanism is more effective of establishing consumers’ trust. The reputation of the platform affects consumers’ herd mentality. Consumers with higher analysis ability are more inclined to form trust belief based on platforms’ direct privacy assurance mechanism, whereas consumers with lower analysis ability rely more on peripheral cues to form trust beliefs and herd mentality. This study complements and improves the extant research, and provides useful guidelines for online shopping platforms and consumers on better privacy protection.
    Related Articles | Metrics | Comments0
    The Metaverse and Libraries: A Review of Frontier Research and Future Prospects
    Zhao Yawen Lai Xingxing
    Journal of Information Resources Management    2023, 13 (1): 29-40.   DOI: 10.13365/j.jirm.2023.01.029
    Abstract691)      PDF(pc) (804KB)(399)       Save
    Using the literature review method, this paper first attempts to clarify the meta-question of "what is the Metaverse" from an interdisciplinary perspective. Secondly, the existing research results of the Metaverse and the library are systematically reviewed, and it is found that preliminary research results have been achieved in the two major aspects of theoretical research and applied strategy research.However, there are some problems such as the tendency of technological pragmatism about the Metaverse, the neglect of people, and the insufficient reflection on the Metaverse and Libraries research. In this regard, it is suggested that the future research on the Metaverse and Libraries should focus on the following three aspects: in terms of research methods, we should focus on advancing in-depth theoretical research on the Metaverse and Libraries from an interdisciplinary perspective; in terms of research objects, we should focus on changes in the basic concepts of the libraries field and their relations; on the research topic, the rational reflection on the Metaverse and libraries from the dual perspectives of theory and practice should be paid attention.
    Related Articles | Metrics | Comments0
    Personal Information Protection in Precise Advertising Technology: Based on the Text Analysis of Cookie Technology in the Privacy Policies of 100 APPs in China
    Liao Bingyi Zhang Huihui Liu Dingwen
    Journal of Information Resources Management    2023, 13 (1): 103-114.   DOI: 10.13365/j.jirm.2023.01.103
    Abstract355)      PDF(pc) (829KB)(399)       Save
    The development of precision advertising cannot be separated from the legitimate use of personal information. On the basis of clarifying the technical logic of precision advertising and the relationship between cookies and personal information protection. This paper uses text analysis method to conduct in-depth analysis on the contents of cookie technology in the 100 mobile app privacy policies commonly used by domestic users, and finds that the overall app privacy policy in China has made considerable progress compared with the past, especially after the promulgation of the personal information protection law. There is still significant room for improvement in the protection of personal information in precision advertising, which can be improved from the following four directions of the basic principles of privacy policy, consent mode, language expression and user rights. With the help of the government, industry and enterprises, we can jointly promote the balance between the subject of personal information protection and the subject of privacy policy formulation, and promote the healthy and sustainable development of the advertising industry.
    Related Articles | Metrics | Comments0
    Influencing Factors of Doctors’ Online Rating Information Characteristics: Based on Social Capital Theory and Social Exchange Theory
    Han Xi Jiang Peiyao Han Wenting Zhu Qinghua
    Journal of Information Resources Management    2023, 13 (1): 78-90.   DOI: 10.13365/j.jirm.2023.01.078
    Abstract302)      PDF(pc) (1110KB)(391)       Save
    Under the background of "Internet + health" strategy, online doctor rating information is increasingly important for building online and offline trust between doctors and patients. Whether doctors’online reputation is credible or not is the common concern of doctors and patients. Based on social capital theory and social exchange theory, this paper uses regression analysis to analyze factors that influence doctors’ online reputation characteristics. Results show that the offline social capital and online participation of doctors have a significant correlation with the positive online rating information they obtain. Higher offline social capital (such as academic title, professional title, hospital level, city level, etc.) helps doctors get a higher probability of being rated and the number of comments, but some kinds of offline social capital are not significantly related to the level of rating scores. The online participation of doctors in the virtual medical community(such as online consultation and publishing popular science articles,etc.) is significantly related to the higher probability of being rated, rating scores, and the number of reviews. Online participation can also change the influence of inherent offline social capital on the doctors’ online reputation. In addition, in the case of small differences in rating scores, offline social capital and online participation have weaker explanatory power for the level of rating scores, but have higher explanatory power for the number of reviews and the probability of being rated. The research enriches social capital theory and social exchange theory, and provides practical implications for doctors, hospitals, physician rating websites and health management departments.
    Related Articles | Metrics | Comments0
    Influencing Factors of Online Health Information Searching Behavior Based on DEMATEL-ISM:From a Meta-analysis of Empirical Studies at Home and Abroad
    Zhao Wenjun Meng Kai Ma Jinhui Ni Zhifei
    Journal of Information Resources Management    2023, 13 (2): 53-66.   DOI: 10.13365/j.jirm.2023.02.053
    Abstract404)      PDF(pc) (3687KB)(379)       Save
    Systematic analysis of the influencing factors of online health information search behavior and its hierarchical logical relationship, this paper provided theoretical guidance for deepening academic research on online health information search behavior and optimizing online health information services. To synthesize and analyze the empirical studies on the influencing factors of online health information-seeking behavior at home and abroad based on the meta-analysis method, the overall effect of these influencing factors on online health information-seeking behavior and their significance were assessed, and 16 influencing factors of online health information-seeking behavior were extracted accordingly. Then DEMATEL-ISM was introduced to analyze the hierarchical logical structure and action path among the influencing factors. The results showed that health anxiety, health literacy, self-efficacy, health status, trust, and income were located at the top of the hierarchical model and directly influenced users’online health information-seeking behavior, categorized as neighborhood influencing factors. Nine influencing factors, such as perceived risk, perceived value, social support, and information quality, were located in the progressive hierarchy model’s middle level and categorized as transitional influencing factors. Internet access was located at the bottom of the recursive hierarchy model, and was classified as a fundamental influencing factor.
    Related Articles | Metrics | Comments0
    Seeking and Breaking Through: ChatGPT Illuminating the Way Ahead for the Discipline of Information Resource Management
    Liu Qiong Liu Guifeng Lu Zhangping Han Muzhe Guo Keyuan
    Journal of Information Resources Management    2023, 13 (5): 73-78.   DOI: 10.13365/j.jirm.2023.05.073
    Abstract445)      PDF(pc) (647KB)(369)       Save
    The application of ChatGPT, an artificial intelligence chatbot developed by the American Artificial Intelligence Laboratory OpenAI, has changed the pattern of information retrieval, making information interaction more intelligent and knowledge acquisition more accurate, and artificial intelligence has moved from professional fields to general fields. The discipline connotation, framework, personnel training and main application fields of the Discipline of Information Resource Management have also changed. This discipline should keep up with the trend, seize the opportunity, take the initiative to layout, expand the scope of business, reconstruct the ecological system of the discipline, establish multi-sector social collaboration, and cover the new format of information as much as possible in order to realize the leap-forward development.
    Related Articles | Metrics | Comments0
    Practice and Prospect of Full-text Bibliometric Analysis:Theory,Method and Application——A Review of the 2022 Academic Salon on Full-text Bibliometric Analysis
    Zhou Haichen Zhang Chengzhi Hu Zhigang Xu Shuo Yang Siluo Li Kai
    Journal of Information Resources Management    2023, 13 (2): 135-142.   DOI: 10.13365/j.jirm.2023.02.135
    Abstract374)      PDF(pc) (739KB)(369)       Save
    On December 1-2, 2022, the Fifth Chengdu Conference on Scientometrics & Evaluation was held, hosted by Chengdu Library and Information Center, Chinese Academy of Sciences and organized by the Sci-tech innovation Evaluation Research Center (SERC). The Third Academic Salon on Full-text Bibliometric, initiated by Zhang Chengzhi and others, was an important event of the Chengdu Conference, attracting more than 100 experts and scholars to participate and communicate. By summarizing the speeches and discussions of the guests at the salon, this article broke the main content of salon into theoretical research, technical methods and application directions, so as to reveal the research status and trend of full-text bibliometric analysis.
    Related Articles | Metrics | Comments0
    Online Brand Community Users’ Interaction Behavior Transformation Mechanism for Value Co-creation:Based on Grounded Theory
    Le Chengyi Zhu Xinya
    Journal of Information Resources Management    2023, 13 (3): 124-139.   DOI: 10.13365/j.jirm.2023.03.124
    Abstract316)      PDF(pc) (2271KB)(361)       Save
    Companies use online brand communities to facilitate user interaction behaviors as a major path to value co-creation. Through in-depth interviews with 19 active community members, data were collected and programmatically coded using a grounded theory approach to construct a theoretical model of the transformation process and drivers of user interaction behavior. According to the extent of user participation in value co-creation in the community, user interaction behavior can be classified as human-machine interaction, human-human interaction and human-enterprise interaction. The transition from human-machine interaction to human-human interaction is mainly influenced by information quality, social experience and self-realization, while the transition from human-human interaction to human-enterprise interaction is mainly influenced by community incentive, social enhancement and symbiotic co-creation. And the driving factors of users’ behavioral transitions can be categorized into visceral layer, behavioral layer and reflective layer, with information quality and community incentives in the visceral layer playing a greater role in the early stages of each behavioral transition, while self-realization and symbiotic co-creation in the reflective layer having the most effective and longest driving role. The results provide a theoretical reference for an indepth understanding of the transformation mechanism of user interaction behaviors in online brand communities, as well as suggestions for enterprises to target the promotion of user interaction behaviors and value co-creation at different stages.
    Related Articles | Metrics | Comments0
    Impact of Data Classified and Graded Rights Confirmation on the Realization of the Value of Data Elements
    Ma Feicheng Xiong Siyue Sun Yujiao Wang Wenhui
    Journal of Information Resources Management    2024, 14 (1): 4-12.   DOI: 10.13365/j.jirm.2024.01.004
    Abstract452)      PDF(pc) (1559KB)(346)       Save
    Data rights confirmation is essential for realizing the value of data elements and sustaining the normal operation and continuous development of data elements market. This study delves into concepts related to data rights confirmation and explores the path of how to establish a property right system to realize data rights confirmation. Furthermore, this study shows methods for the data classified and graded rights confirmation, analyzing their impact across the data value chain. Results show that in the data collection stage, the data classified and graded rights confirmation mechanism can motivate data supply, improve data quality, and stimulate market vitality. In the data organization stage, it can break down technical work, protect private data, and explore potential value. In the data circulation stage, it can regulate negative externalities, reduce transaction costs, and optimize the allocation of resources. And in the data utilization stage, it plays a key role in data compliance regulation and data value redevelopment.
    Related Articles | Metrics | Comments0
    The Construction of Cultural Heritage Smart Data for the Inheritance and Activation
    Wang Xiaoguang Hou Xilong
    Journal of Information Resources Management    2023, 13 (5): 5-14,43.   DOI: 10.13365/j.jirm.2023.05.005
    Abstract292)      PDF(pc) (2842KB)(341)       Save
    Smart data is becoming a new development trend of information resource construction in the age of data and intelligence. It is an advanced form of data resources organization and more suitable for the new demands and requirements on the data and service in the new environment. Firstly, this article systematically reviews the historical evolution and development trend of smart data, and analyzes the scientific meaning and critical features of smart data. Secondly, facing the problems of cultural heritage inheritance and activation, this article explains the internal logic of smart data empowering cultural heritage activation. Finally, the article puts forward the construction measures and path of cultural heritage smart data, including the construction mechanism, smart data standards and specifications, cultural gene deconstruction, quality control system. The research of smart data not only improves the quality and efficiency of big data resources, but also contributes to the theoretical reform of information resources management and knowledge management in the empowerment of data and intelligence. The construction of cultural heritage smart data resources will effectively promote the process of cultural heritage protection, inheritance and activation.
    Related Articles | Metrics | Comments0
    To be Eclectic: Discussion on the Data Management in the Context of the Discipline Construction of Information Resource Management
    Sun Jianjun Pei Lei Fu Shaoxiong
    Journal of Information Resources Management    2023, 13 (1): 9-17.   DOI: 10.13365/j.jirm.2023.01.009
    Abstract410)      PDF(pc) (725KB)(328)       Save
    The first-level discipline of “LIS & Archives Management” has been officially renamed as“Information Resource Management” (hereafter referred to as IRM), which opens a new chapter of discipline reform and strategic layout. As the new discipline name has a richer connotation, colleagues in the academic field can take this opportunity to open up new tracks and fields for development. By doing so, we can actively respond to the needs of IRM discipline development in the new era, and build a distinctive discourse system of Chinese IRM discipline. To build new advantages and dynamics for the discipline construction, "Data Management" is widely discussed by the academic community as one of the new second-level disciplines. To this end, this study deeply explains the disciplinary scope of data management, the relationship between information science, library science, archival science, and data management, and thus clarifies integration and innovation as the disciplinary orientation of data management. Next, this study explores the data management under the construction of new liberal arts, analyzes the data management towards the main economic battlefield, and thus indicates cross-innovation as the development trend of data management. Finally, this study discusses the degree education and education patterns of data management. On this basis, this study emphasizes that for the new journey of the discipline, data management can release the data dividends in the original research system of “LIS & Archives Management”, promote the cross-innovation of IRM discipline, and achieve the integration of industry-academia-research better. As such, a favorable new situation of IRM discipline construction can be created by incorporating data management.
    Related Articles | Metrics | Comments0
    Intelligent and Smart Service of Multi-model Cultural Heritage Resources: From Available to Evidential and Experiential
    Xia Cuijuan
    Journal of Information Resources Management    2023, 13 (5): 44-55.   DOI: 10.13365/j.jirm.2023.05.044
    Abstract308)      PDF(pc) (2030KB)(327)       Save
    The development of data and intelligence technologies is promoting the transformation from "digital GLAMs" to "smart GLAMs". In the transformation from digitalization to datafication and then to intelligence, the cultural heritage resources of GLAMs show the multi-model characteristics of multimedia, multi-format and multi-granularity. Aiming at the problem of how GLAMs provide intelligent services based on multmodel cultural heritage resources, this paper summarizes the transformation path of cultural heritage resources from digital, data to intelligent services based on case analysis and literature research. According to the low to high degree of resource intelligence, inteligent services can be summarized into three modes: available, evidential and experiential, which correspond to three different demand scenarios: resource-centered services, digital intelligence evidence-based services, and interactive experience-centered services. It is concluded that the intelligent services of multi-model cultural heritage resources are to predict in advance and automatically adapting to users' needs for different modes of cultural heritage resources in different demand scenarios.
    Related Articles | Metrics | Comments0
    The General Idea of Scientific Data Governance and Practical Case Verification—Taking the Astronomical Data Governance of the National(Guizhou) Hub Node of the Nationwide Integrated Computing Power Network as an Example
    Ma Xiao Guo Mingjun Yi Chengqi Dou Yue Liang Chuyi
    Journal of Information Resources Management    2023, 13 (5): 126-136.   DOI: 10.13365/j.jirm.2023.05.126
    Abstract195)      PDF(pc) (2119KB)(325)       Save
    Scientific data governance is an important way to promote scientific and technological progress and release the value of scientific data. As an important part of scientific data, astronomical data is of great significance for consolidating our country's international advantages in the field of astronomical research and achieving efficient and safe data governance. This paper adopts the theoretical deduction and case mapping as research methods. On the basis of fully learning from the mature model of data governance, based on collaborative innovation theory and public value theory, it studies “subject-object-carrier”and“problem and target oriented” in the “three bodies and two directions” analytical model of in the field of scientific data governance. Based on this model, a mapping study was carried out on the “FAST” astronomical data governance. It provides a research method from theory to practice of “guiding theory-analysis method-case mapping” for scientific data governance, and provides useful support for the exploration and formation of systematic astronomical data governance.
    Related Articles | Metrics | Comments0
    The Evolution and Contemporary Perspectives on the Empowerment of Intelligence by Artificial Intelligence Technology
    Li Guangjian Pan Jiali
    Journal of Information Resources Management    2024, 14 (2): 4-20.   DOI: 10.13365/j.jirm.2024.02.004
    Abstract291)      PDF(pc) (1976KB)(290)       Save
    This paper systematically explores the evolution and application of artificial intelligence (AI) technology in intelligence work, revealing its new developments in ideology, characteristics, technical methods, and practical scenarios. Transitioning from a rule-based paradigm to the era of foundation model approaches, AI presents significant opportunities for the intelligence field’ s enhancement in intelligence processing. However, it also introduces novel challenges related to ethics, legal considerations, and privacy concerns. The paper identifies issues and challenges that should be addressed by the intelligence community in the new era of intelligence. Furthermore, the paper proposes forward-thinking strategies to address these issues and challenges, providing valuable insights for the stable development of intelligence field.
    Related Articles | Metrics | Comments0