Most Downloaded

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    In last 3 years
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Research Progress in the Application of Flow Theory Abroad
    Jiang Tingting,  Chen Peilong Xu Yanrun
    Journal of Information Resources Management    2021, 11 (5): 4-16.   DOI: 10.13365/j.jirm.2021.05.004
    Abstract2483)      PDF(pc) (1703KB)(2675)       Save
    Flow refers to the holistic sensation that people feel when they act with total involvement. Related research of flow mainly focuses on the fields of education, computer and business administration, and has not been widely used in information behavior research. This study conducted a systematic review on 78 empirical studies that applied the flow theory. According to the research framework, those empirical studies were divided into three categories: the antecedents that affect the flow experience, the flow consequences triggered by the flow experience, and the mediating effects of flow experience between the antecedents and consequences. Combined with Person-Artifact-Task (PAT) model, this study summarized the related studies and elaborated on the practical enlightenment that flow can bring to real life, actively considered possible breakthroughs in flow measurement methods, and provided a clear and systematic approach to the application of flow theory to information behavior research.
    Related Articles | Metrics | Comments0
    Users’ Information Behavior from the Perspective of Metaverse:Framework and Prospect
    Wu Jiang Cao Zhe Chen Pei He Chaocheng Ke Dan
    Journal of Information Resources Management    2022, 12 (1): 4-20.   DOI: 10.13365/j.jirm.2022.01.004
    Abstract1858)      PDF(pc) (3218KB)(2074)       Save
    The metaverse is a digital society of the ternary world, in which people participate in the integration of virtuality and reality with a digital identity. From the perspective of the metaverse, the virtual and reality have been deeply integrated. Accordingly, information has a richer production and representation form, and users have new demands and experiences. It is noted that there exist both similarities and differences in users’ information behaviors between the metaverse and traditional environments. Specifically, from the perspective of the metaverse, the research on users’ information behaviors can be based on the existing theories and combined with the characteristics of the new environment. It can be carried out from the three dimensions of the user, information, and technology to achieve more effective information resource management and user behavior understanding, so as to promote the application promotion and risk management of the metaverse.
    Related Articles | Metrics | Comments0
    A Review of Metaverse Research and Applications
    Star X.Zhao Qiao Lili Fred Y.Ye
    Journal of Information Resources Management    2022, 12 (4): 12-23,45.   DOI: 10.13365/j.jirm.2022.04.012
    Abstract1724)      PDF(pc) (934KB)(1629)       Save
    In review of the current situation and future of research and application of metaverse, this paper focus on four aspects: theoretical concepts, key technologies, application scenarios and policy governance. The academic community has now formed three major theoretical perspectives: parallel universe view, fusion universe view and evolutionary universe view, which converge three technological development paths of replicated reality, augmented reality and transcendental reality, respectively. The digital economics in business life, industrial production, culture and education, and urban society have produced a positive weather of blossoming. In terms of governance, this paper suggests that the development of metaverse in China should be built with "autonomous and controllable" industry, "virtual-reality interaction" direction and "inclusive and prudent" attitude. Finally, this paper presents three basic metaverse indicators, namely metaverse index, metaverse duration and metaverse population, to characterize the space, time and development of metaverse respectively.
    Related Articles | Metrics | Comments0
    Review on the Influencing Factors of Social Media Users’ Information Avoidance Behavior
    Dai Bao Yang Zeguo
    Journal of Information Resources Management    2022, 12 (2): 13-24.   DOI: 10.13365/j.jirm.2022.02.013
    Abstract1195)      PDF(pc) (2651KB)(1491)       Save
    This paper aims to uncover the influencing factors of social media users’ information avoidance behavior to provide convenience to scholars for future research, and it also provides theoretical guidance to relevant organizations for their practices of decreasing individuals’ information avoidance so as to improve the effectiveness of information communication. In order to find the main causes of social media users’ information avoidance behavior, the existing literature about ad avoidance, news avoidance, and other types of information avoidance were analyzed by using the systematical review approach. The results showed that social media users’ information avoidance was mainly impacted by the information-related factors (e.g., information quality, amount, and expression form), the user-related factors (e.g., cognition, affection, interests, attitudes, and behaviors), and situation factors (e.g., the characteristics of social media, and social influence of other users).
    Related Articles | Metrics | Comments0
    Recognizing Clinical Named Entity from Chinese Electronic Medical Record Texts Based on Semi-Supervised Deep Learning
    Jing Shenqi Zhao Youlin
    Journal of Information Resources Management    2021, 11 (6): 105-115.   DOI: 10.13365/j.jirm.2021.06.105
    Abstract1557)      PDF(pc) (3032KB)(1182)       Save
    The electronic medical record document records the entire process of patient diagnosis and treatment in detail. Medical knowledge is the most abundant in the electronic medical record. Therefore, it is of great value to explore the potential knowledge structure of the electronic medical record document. The primary task for knowledge mining of unstructured electronic medical records is named entity recognition. The existing named entity recognition methods in the medical field face the problems of low quality and insufficient annotation data. At the same time, the existing methods only consider the sequence characteristics of the text, and ignore the dependence between words and characters in the text, which limits the effect of named entity recognition. This paper proposes a medical named entity recognition method based on semisupervised deep learning, which combining the semiautomatic entity annotation method of Chinese encyclopedia with expert authority and the BERT-GCN-CRF framework to perform medical named entity recognition and extraction on electronic medical record text. Taking the real electronic medical record text as the experimental object, the accuracy, recall, and F1 value obtained by this model are significantly improved, and the comprehensive average of P, R and F1 are 84.6%, 84.0% and 84.2%, respectively. At the same time, the workload of manual labeling is significantly reduced. The new method is of great significance to the unstructured text mining of electronic medical records.
    Related Articles | Metrics | Comments0
    Exploration on the Development Trend of Information Science in the Era of Data Intelligence Empowerment
    Lu Wei Yang Jinqing
    Journal of Information Resources Management    2022, 12 (2): 4-12.   DOI: 10.13365/j.jirm.2022.02.004
    Abstract1295)      PDF(pc) (4891KB)(1011)       Save
    In the age of digital intelligence, the comprehensive intervention of big data, artificial intelligence and other new technologies has ushered in new opportunities for the development of information discipline. This paper first reveals the disciplinary characteristics of information science based on a review of the origins of the discipline, then analyzes the evolutionary path of information science research driven by data, and finally explores the development trend of information science by taking different periods of the disciplinary evolutionary path as a guide. The study found that information science started from scientific and technological information work, formed in the construction of information resources, grew in information management and services, developed in the expansion of information services, and has been constantly pioneering and innovating. The development of information science cannot be separated from the technology empowerment, especially the empowerment of big data + artificial intelligence and other information technology. This kind of empowerment will bring new growth points for the future development of information science.
    Related Articles | Metrics | Comments0
    The Impact of Open Source Intelligence on National Intelligence Work System Innovation: A Systematic Literature Review
    Zhang Bin
    Journal of Information Resources Management    2021, 11 (4): 60-69.   DOI: 10.13365/j.jirm.2021.04.060
    Abstract994)      PDF(pc) (1984KB)(880)       Save
    Having an analysis on the impact of open source intelligence on the national intelligence work system, will simultaneously contribute to the abundance of the overall national security concept. The paper uses the method of systematic literature review, and analyzes the current content from four aspects: the characteristics of open source intelligence, open source intelligence technology,the current application field and the bottleneck restricting open source intelligence research, to construct a theoretical relationship diagram of the four national intelligence work system. Then it summarizes how the national intelligence work system should be improved to adapt to the development of open source intelligence better.Open source intelligence, which is mainly used in the fields of major epidemic prevention and control, think tanks, and national defense technology transfer, has the characteristics of open source and open analysis methods. However, there are still some deficiencies existing in personnel training and technology. The national intelligence work system should attach great importance to the top-level design and formulate rational criteria for the analysis method of dividing open source intelligence sources. To improve the flexibility and validity of the overall system, each department should combine its own characteristics to develop a system suitable for open source intelligence to play its own role, as a necessary supplement to the overall system. A "horizontal" and "vertical" talent training mechanism need to be established, and the connotation of the national intelligence work system need to be expanded. Above all, cross-field and compound talents with both intelligence analysis capabilities and information technology capabilities also need to be cultivated.
    Related Articles | Metrics | Comments0
    Criteria of Structural Equation Modeling: Comparisons and Enlightenments of CB-SEM and PLS-SEM
    Yuan Ye Shiau Wenlung Yu Yuan Wang Kanliang Li Yiran
    Journal of Information Resources Management    2023, 13 (3): 6-22.   DOI: 10.13365/j.jirm.2023.03.006
    Abstract1687)      PDF(pc) (2464KB)(838)       Save
    Structural Equation Modeling (SEM) is used to analyze the complex relationships between observed variables and latent variables. Covariance-based structural equation modeling (CB-SEM) and partial least squares structural equation modeling (PLS-SEM) are the two types of SEM. SEM has been widely used in social science such as organizational management, information systems, marketing management and other disciplines. In recent years the number of research papers using PLS-SEM method has increased. Since CB-SEM and PLS-SEM are different in algorithm and requirements, the application of unsuitable methods may lead to inaccurate results. Therefore, it is necessary to understand the differences between the two methods and report guidelines. This paper reviews the conditions and application criteria of CB-SEM and PLS-SEM, and takes the use of fintech by wealth management enterprises as an example to compare the analysis process and results of the two methods, emphasizing the importance and necessity of choosing appropriate methods. This paper provides a valuable reference for researchers to use SEM for accurate data analysis.
    Related Articles | Metrics | Comments0
    A Review for Information Behavior Research During the Time Period of the 13th Five-Year Plan in China
    Li Yuelin Zhang Jianwei Wang Shanshan Zhang Xiaotong Zhang Tairui Li Anyi
    Journal of Information Resources Management    2022, 12 (1): 21-33,45.   DOI: 10.13365/j.jirm.2022.01.021
    Abstract840)      PDF(pc) (3218KB)(769)       Save
    The study conducts a content analysis of 497 research papers on information behavior published during the time period of the 13th Five-Year Plan in China, aiming to reveal the features of the research and problem existed. The results indicate that the research is concerned with various user groups and has extended to different information use environments and involved more information types. Health information behavior has been a hot topic in the area; case studies are becoming a new approach to information behavior research; an interdisciplinary research approach has been an obvious feature of information behavior research. In addition, the study identifies the shortcomings and problems, including lack of examination of the problems emerging from the development of the society from the macro level, lack of foresighted and predictive research to support the development of new technologies, lack of theoretical basis and theoretical innovation, and lack of understanding of various research methods and their limitations. The paper is concluded by a discussion how to conduct information behavior research during the time period of the 14th Five-Year Plan and the future.
    Related Articles | Metrics | Comments0
    The Main Practice and Basic Experience of Foreign Government Data Asset Management
    Xia Yikun Guan Qian
    Journal of Information Resources Management    2022, 12 (6): 18-30.   DOI: 10.13365/j.jirm.2022.06.018
    Abstract1199)      PDF(pc) (840KB)(722)       Save
    In the digital era, with the rapid expansion of government data volume and the updating of technological means, especially with the continuous promotion of big data strategy, open government data strategy, artificial intelligence strategy, and digital economy strategy, the important value of data as a strategic asset has become a global consensus. Focusing on the full realization of government data value and risk balance,this paper takes the strategies, policies and practical regulations of government data assets management in representative countries as the research object, then analyzes and summarizes its common characteristics and basic experience. That is, at the macro level, it is necessary to establish a comprehensive view of data assets and promote the overall layout of data asset management; at the meso level, the process management of data assets should be strengthened based on policies and schemes; at the micro level, the comprehensive application of technology, multiple partners, capabilities, and other elements should be used.
    Related Articles | Metrics | Comments0
    Research on the Path to Realize the Value of Data Elements
    Ma Feicheng Wu Yishu Lu Huizhi
    Journal of Information Resources Management    2023, 13 (2): 4-11.   DOI: 10.13365/j.jirm.2023.02.004
    Abstract851)      PDF(pc) (1011KB)(690)       Save
    Identifying the path to realize the value of data elements is of great significance to accelerate the deep integration of digital economy and real economy. In order to explore the mechanism and path of realizing the value of data elements, this study combs the existing ways and attributes of data elements, clarifies the mechanism of realizing the value of data elements on this basis, and constructs the value realization path including basic activities, auxiliary activities and value development based on the value chain theory. The research shows that the value realization mechanism of data elements includes subject participation mechanism, marketization realization mechanism, ownership definition and transfer mechanism. Data collection, data organization, data circulation and data utilization are the basic paths to realize the value of data elements, while the three auxiliary activities of data security protection, data technical support and data talent guarantee ensure the realization of value.
    Related Articles | Metrics | Comments0
    Research on the Construction of Risk Assessment and Decision-making Model of Major Public Health Emergency
    Liu Bing Xiao Gaofei Chao Shiyu
    Journal of Information Resources Management    2021, 11 (5): 17-26.   DOI: 10.13365/j.jirm.2021.05.017
    Abstract860)      PDF(pc) (1460KB)(656)       Save
    In order to establish a risk assessment and decision-making mechanism that adapts to the characteristics of different stages of the development and evolution of major public health emergencies, and play the collaborative and cooperative role of the participants and the decision support and driving role of information and knowledge, this paper constructs a dynamic and flexible risk assessment and decision-making model of major public health emergencies, which consists of four independent core levels : life cycle, risk assessment and decision-making, participants, information and knowledge, and the restricting factors and constraint conditions are the moderator variables. It provides a scientific and verifiable theoretical framework for the study of emergency management of major public health emergencies, and guides the risk assessment and decision-making practice under major public health emergencies.
    Related Articles | Metrics | Comments0
    Journal of Information Resources Management    2021, 11 (6): 4-9.   DOI: 10.13365/j.jirm.2021.06.004
    Abstract692)      PDF(pc) (585KB)(621)       Save
    Related Articles | Metrics | Comments0
    Frames and Impact on Vaccine Hesitancy of COVID-19 Vaccine Information among Social Media:Content Analysis and Online Control Experiment Based on Sina Weibo
    Cui Jiayong Wang Xiling
    Journal of Information Resources Management    2022, 12 (3): 165-180.   DOI: 10.13365/j.jirm.2022.03.165
    Abstract925)      PDF(pc) (3562KB)(584)       Save
    It is important to understand how information of COVID-19 vaccine is organized among social media and how social media messages influence public vaccine hesitancy. Based on Prospect Theory and Framing Theory, this paper conducts a content analysis to analyze the organization of vaccine information in social media during the early period of COVID-19 vaccine promotion and explore the persuasion mechanism of vaccine information frames to ease vaccine hesitancy by online controlled experiment. This study found that: 1) nearly 20% of the weibo content about COVID-19 vaccine uses gain-loss frame, of which the gain frame is the majority. Individualism and collectivism values account for half respectively, and about 50% contain narrative elements; 2) the gain-loss frame and narrative elements may affect the comment intention of users; 3) the loss frame, individualism values and narrative elements in vaccine advocacy content help to alleviate one’s vaccine hesitancy, and there is an interactive effect between goal frame and justice perspective. The results revealed the mechanism of social media information on vaccination attitudes in the early stage of COVID-19 vaccination, providing enlightenment for the government and media in health promotion during the pandemic.
    Related Articles | Metrics | Comments0
    Value Co-Creation Theory and Its Application and Prospect in the Field of Information System Research
    Zhou Yusheng Yuan Qinjian
    Journal of Information Resources Management    2021, 11 (6): 17-26.   DOI: 10.13365/j.jirm.2021.06.017
    Abstract1022)      PDF(pc) (1205KB)(580)       Save
    To clarify the origin and development of value co-creation theory and its application progress in the field of information systems to provide insights for scholars who need to apply value co-creation theory in the field of information systems, this paper reviews and summarizes the application of value co-creation theory in the field of information systems, and summarizes the current research achievements, existing problems, and future research directions. The application of value co-creation theory in information system research mainly includes five aspects: information system design, information technology service innovation, consumers’ online participation in enterprise value co-creation, online information/knowledge sharing behavior, and online word-of-mouth and consumer purchase intention. In the meantime, there were still some undefined problems in the existing research, including “lack of research on the effect of cultural factors on value co-creation” and “lack of support from behavioral data”. Moreover, the future direction should pay more attention to the effect of cultural differences on value co-creation, consumers’ actual value co-creation behavior, and user value co-creation in different types of social platforms.
    Related Articles | Metrics | Comments0
    Prediction of Microblogging Public Opinion Reversal in the Context of Hot Events
    An Lu Hui Qiuyue
    Journal of Information Resources Management    2022, 12 (3): 21-34.   DOI: 10.13365/j.jirm.2022.03.021
    Abstract533)      PDF(pc) (1506KB)(580)       Save
    The rapid broadcasting of hot events by new media makes the phenomenon of public opinion reversal occur from time to time. It is important to identify the influence factors of public opinion reversal, which can help predict the reversal of public opinion at the beginning of public events. Successful prediction of public opinion reversal can help emergency management departments predict and guide the development trend of public opinion in time. It also helps enhance the credibility of the media and maintain the healthy development of the online ecological environment. We crawled the hot microblog posts of the topics about 38 hot events on Sina Weibo from 2017 to 2020. Based on the previous research, we proposed the public opinion reversal prediction models that consisted of 30 features from four aspects of events, users, information, and dissemination. The XGBoost technique was used to calculate the importance of different features in the public opinion reversal prediction model. The Logistic Regression, Decision Tree, Random Forest, XGBoost and Gaussian Naive Bayes techniques were used to construct the public opinion reversal prediction models. The models were trained and evaluated in the experiment to find out the optimal prediction model. The experimental result showed that the information balance, the type of the user who exposes the event, and the event type had the most significant impact on the prediction performance of the public opinion reversal model. The prediction models based on the Random Forest and XGBoost techniques achieved the best performance among all the five public opinion reversal models. Suggestions were also made on the discrimination and governance of public opinion reversal from three aspects, i.e., media, the public and social media platform.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors and Associated Path of Mobile Social Media Fatigue Based on ISM-MICMAC
    Wan Zhen Zou Kai Zhang Yanfeng Liu Yali
    Journal of Information Resources Management    2022, 12 (1): 46-55.   DOI: 10.13365/j.jirm.2022.01.046
    Abstract771)      PDF(pc) (1777KB)(561)       Save
    By analyzing the influencing factors of mobile social media fatigue, it can provide management decision-making reference for related enterprises and service operators to face and prevent mobile social media fatigue crisis. From information ecosystem theory, combined with extracted elements in four aspects of information human factors, information factors, information environment factors and technical factors based on the interpretive structure model (ISM) and cross-impact matrix multiplication applied to classification (MICMAC), the influence factors of the social media fatigue are proposed, and the corresponding mechanism model is constructed, and then the corresponding management strategy is put forward. The results show that soulmate difficulty,social anxiety,fear of missing out and compulsive use, as independent group factors, have the deepest influence on users’ social media fatigue. At the same time, the survey results also show that once the factors of low attention change, the factors of emotional exhaustion, low interest and low sense of accomplishment will change correspondingly, and further affect the users’social media fatigue behavior in varying degrees.
    Related Articles | Metrics | Comments0
    The Framework, Implementation Path, and Challenges on Information Management of Supply Chain Empowered by Blockchain from the Perspective of Complex Sociotechnical Systems
    Zou Liuxin Wu Jiang Xia Mengchen
    Journal of Information Resources Management    2023, 13 (1): 91-102.   DOI: 10.13365/j.jirm.2023.01.091
    Abstract464)      PDF(pc) (6056KB)(529)       Save
    The combination of blockchain technology and supply chain information management is a trend in the development of digital supply chains, which attracts wide attention from many fields. This paper conducts thematic evolution analysis and clustering analysis on the scientific literature of blockchain-based supply chain information management in Web of Science. It proposes a research framework and analyzes the supply chain information management empowered by digital intelligence through blockchain technology from the perspective of complex sociotechnical systems. Through knowledge sharing, information traceability, and trust establishment, blockchain technology interlaces and verifies material circulation, commercial circulation, information circulation, capital circulation, and information at all levels of the technical system. Information management empowers the security and visualization of logistics, the transparency and traceability of commercial circulation, the sharing and immutability of information circulation, and the credibility and anonymity of capital circulation. Finally, this paper analyzes the supply chain information management practices based on blockchain technology from the management challenge and the application industry, and prospects for future research directions. It explores the transformation of information management enabled by blockchain technology from the level of technical and social systems, where thinking about information management from the perspective of complex sociotechnical systems inspires the development and digital construction of supply chains.
    Related Articles | Metrics | Comments0
    Research on Influencing Factors of Privacy Fatigue of Mobile Social Media Users:Analysis based on Grounded Theory and Interpretative Structural Model
    Tian Xinluan Han Yuxin Zhang Xiaojuan,
    Journal of Information Resources Management    2021, 11 (5): 103-113.   DOI: 10.13365/j.jirm.2021.05.103
    Abstract977)      PDF(pc) (1942KB)(526)       Save
    Privacy fatigue has become a characteristic of the times that cannot be ignored by modern mobile social media users. This study constructs the influencing factor model of privacy fatigue from empirical data and further combs the relationship between factors to reveal the generation mechanism of user privacy fatigue. By adopting the grounded theory research method, this study collects data through in-depth interviews with 18 social media users, combs and summarizes the influencing factors of privacy fatigue through the stages of principal axis coding, selective coding, and theoretical saturation test, and uses the interpretative structural model method to analyze the internal relationship between various factors. The results show that perceived cost is the direct factor affecting user privacy fatigue, self-efficacy and perceived trust are the root factors, and perceived control and self-cognitive bias play a vital role in the formation of user privacy fatigue. On the basis of summarizing the influencing factors of social media users' privacy fatigue, this paper further combs the relationship between the factors, which not only provides a theoretical reference for understanding the influencing mechanism of users’privacy fatigue but also provides a new research perspective for the prediction of users’privacy behavior in the future.
    Related Articles | Metrics | Comments0
    A Review of Secondary Analysis in Information Management and Information Systems Research in China: Research Methods,Topics, and Theory Applications
    Chen Liping Ren Fei
    Journal of Information Resources Management    2023, 13 (3): 61-78.   DOI: 10.13365/j.jirm.2023.03.061
    Abstract423)      PDF(pc) (1792KB)(518)       Save
    This study conducts a content analysis of 282 Chinese research papers published from 2012 to 2022 that use secondary analysis in the area of information management and information systems (IM&IS), aiming to reveal the distribution and trend of research methods, topics, and theory applications. The results show that the advantages of secondary analysis in data acquisition and causality identification are increasingly prominent, as reflected in the gradual diversity of data sources, rigorous empirical analysis on causality testing, richer mechanism analyses, and the emergence of mixed-method research. Four research topic trends have been identified, including macro digital development, enterprise digital transformation, information interaction between enterprise and market, and user online behavior. However, IM&IS theory development and the application of Chinese theories require further improvement. This study is novel in that it combines bibliometric analysis with machine learning methods (LDA and DTM) to reveal a multi-dimensional overview of the secondary analysis in IM&IS in China. The findings provide evidence and guidelines for further strengthening research norms, grasping research topic trends, developing and applying theories, as well as suggestions for disciplinary development and strategic research planning.
    Related Articles | Metrics | Comments0
    The Evolution and Classification of Data Monopoly:Based on Domestic Public Data and Commercial Data
    Deng Song Lyu Yuting Yang Di
    Journal of Information Resources Management    2022, 12 (1): 80-90.   DOI: 10.13365/j.jirm.2022.01.080
    Abstract645)      PDF(pc) (4891KB)(516)       Save
    The rapid development of the digital economy and big data has caused an explosive growth in the amount of data in society. At the same time, data monopoly has become an important issue affecting the healthy development of the economy and society. Through literature analysis, model construction and case analysis, starting from the classification of data monopoly, the impact of data monopoly and its response are analyzed. The following conclusions are drawn: Firstly, it defines data monopoly separately from public data and commercial data, and divides data monopoly into four types: public data development type, public data monopoly type, commercial data development type and commercial data monopoly type; Secondly, the impact of data monopoly on the economy and society can be divided into two aspects: positive and negative. Different types of impacts are different. The policy measures that should be adopted are focused on strengthening data disclosure and sharing, establishing a data right confirmation mechanism, maintaining normal market competition, and afterwards supervision shifting to ex-ante supervision; Thirdly, based on the degree of data collection and marketization, a theoretical model of data monopoly classification is constructed.
    Related Articles | Metrics | Comments0
    Research on the Influencing Factors of Information Avoidance Behavior of College Students as Social Media Users in Public Health Emergencies
    Wen Xinyue Cheng Huiping
    Journal of Information Resources Management    2022, 12 (2): 25-38.   DOI: 10.13365/j.jirm.2022.02.025
    Abstract675)      PDF(pc) (1249KB)(510)       Save
    To explore the influencing factors and mechanism of social media users’ information avoidance behavior in public health emergency, is great for providing reference path for better meeting users’ information needs and optimizing social media information environment. Taking the epidemic situation of COVID-19 as an example, college students with rich experience in using social media were selected as the research samples, and the data were obtained through in-depth interviews. Using the qualitative research method of grounded theory, this paper extracts concepts and categories, and constructs the influencing factors model of social media users’ information avoidance behavior under public health emergencies. In public health emergency, information overload and environmental factors indirectly affect social media users’ information avoidance behavior by stimulating users’ emotion, cognitive structure and risk perception; cognitive structure and risk perception directly affect social media users’ information avoidance behavior, and also stimulate users’ emotion; high wake-up emotion and low wake-up emotion in emotional factors can lead to different types of information avoidance behavior of social media users. Strong-ties social media and weak-ties social media have moderating effect in the impact of information overload on users’ emotion, cognitive structure and risk perception.
    Related Articles | Metrics | Comments0
    Open Source Intelligence Acquisition and Utilization Methods for New Types of Cross-border Organized Cybercrime
    Bai Yun Li Baiyang Wang Shiyun
    Journal of Information Resources Management    2022, 12 (2): 65-75.   DOI: 10.13365/j.jirm.2022.02.065
    Abstract644)      PDF(pc) (4835KB)(498)       Save
    With the emergence of the network and cross-border characteristics of organized crime, the use of open source intelligence to conduct cybercrime big data association analysis based on knowledge graphs and criminal identification based on social network analysis can effectively combat criminal acts and minimize the living space of criminals. Taking "Cross-border Telecom Fraud Criminal Governance" as an example, use open-source data to construct a knowledge graph of cross-border telecom fraud events and a network of stakeholders in each event to identify the core figures of criminal groups and potential criminals. Most cybercrimes commit crimes in the form of criminal gangs or groups. In order to avoid supervision and combat, criminals gradually transfer criminal dens and communication tools abroad, and purposefully implement cross-border networks against Chinese citizens crime. Graphing cases, incidents, etc., and building large-scale knowledge nodes and relationship links, can effectively discover hidden personnel, funds, technology, information flows, etc., and help the public security department to adopt precise combat methods to curb criminal behavior.
    Related Articles | Metrics | Comments0
    Construction and Reflection of Revolution (Red) Document Service Platform for the Inheriting and Spreading of Red Culture
    Liu Qianqian Xia Cuijuan Zhu Wuxin
    Journal of Information Resources Management    2021, 11 (4): 17-24.   DOI: 10.13365/j.jirm.2021.04.017
    Abstract755)      PDF(pc) (2400KB)(485)       Save
    With the dividends brought by modern information technology, the purpose of this study is to explore digital humanities methods and technologies to build a red document service platform in the context of red culture inheritance, to realize the integration of red documents of multiple resource types and the fusion of multi-source heterogeneous red culture data, and to transform the traditional document search services into knowledge services. By investigating and comparing several red document projects in China, we have completed the practice of the first phase of the Revolution(Red) Document Service Platform project by relying on the red document resources in the collection and applying Linked Data technology, GIS technology and visualization technology. We propose a framework path and method for the construction of multiple types and heterogeneous resource service platforms in the field of red documents, and help peers to cooperate and share resources in the field of red culture inheritance, as well as the promotion of red culture.
    Related Articles | Metrics | Comments0
    An Empirical Study on the Influence of Socio-technical Factors on Short Video Addiction: The Moderating Effect of Recommendation Algorithms
    Xie Xinzhou Du Yan
    Journal of Information Resources Management    2023, 13 (1): 65-77.   DOI: 10.13365/j.jirm.2023.01.065
    Abstract387)      PDF(pc) (1232KB)(478)       Save
    Based on a socio-technical perspective, this study examined the influence of social and technological factors on short video addiction through an online questionnaire survey. The findings reveal that personalization, responsiveness, active user control, and parasocial relationships can predict short video addiction. At the same time, user’s use of algorithms moderate the relationships between various factors and addiction. It will aggravate addiction by strengthening the influence of susceptibility factors and weakening the constraint of inhibitory factors. This study emphasizes the importance of the socio-technical interaction and algorithmic context on short video addiction, which enriches theoretical models and empirical studies of short video addiction. The results provide important practical implications for improving the effectiveness of anti-addiction through the synergistic optimization of social and technological systems.
    Related Articles | Metrics | Comments0
    Research on the Influence of School Factors on Minors’Cyberspace Literacy
    Tian Li Zhang Hualin Li Zhezhe
    Journal of Information Resources Management    2021, 11 (4): 121-132.   DOI: 10.13365/j.jirm.2021.04.121
    Abstract568)      PDF(pc) (5036KB)(467)       Save
    Recently, Internet has penetrated into the younger groups, while their cyberspace literacy is facing the double blank of practical training and theoretical research. School is an important life scene and learning way for minors. This paper studies the influence of teachers, school environment and peers on the cyberspace literacy of minors from the perspective of school. It is found that the network using of teachers, information technology education and network security education in schools, and the cognition of teachers and peers on Internet are important factors. We should set up correct Internet cognition, strengthen school network education and improve teachers’ cyberspace literacy to improve the level of minors’ cyberspace literacy.
    Related Articles | Metrics | Comments0
    Computational Analysis of Public Opinion Evolution of Short Video in Emergencies
    Chen Jinghao Wang Youfeng Nie Huizi
    Journal of Information Resources Management    2022, 12 (3): 152-164,180.   DOI: 10.13365/j.jirm.2022.03.152
    Abstract577)      PDF(pc) (11879KB)(466)       Save
    In emergencies, the public has become accustomed to using short video platforms to publish crisis short videos, track crisis situations, and express emotions. This has brought great challenges to public opinion research, especially when faced with massive and high-frequency short video public opinion data, quickly grasping its evolutionary law is very important, which can provide support for emergency decision-making. Based on this, this paper proposes a short video public opinion evolution analysis framework for emergencies. It includes functions such as short video collection, compression, life cycle division, account type statistics, video classification, emotional tendency calculation, and topic mining. By using the case data of "Zhengzhou 7.20 Heavy Rain", this paper verifies the framework and finds that it can well complete the analysis task.
    Related Articles | Metrics | Comments0
    A Threat Assessment Model of Money Laundering Based on Intelligence-led Policing
    Chen Liang
    Journal of Information Resources Management    2021, 11 (5): 27-37.   DOI: 10.13365/j.jirm.2021.05.027
    Abstract539)      PDF(pc) (1018KB)(464)       Save
    Money laundering has a high incidence in the world. In order to effectively combat and contain money laundering, we can carry out threat assessment against money laundering gangs, so as to determine key targets of fighting crimes and reasonably allocate police resources. This method originates from the theory of intelligence-led policing. Through Delphi and Pearson correlation coefficient, the author selects 13 indicators such as concealment ability, degree of specialization, connection with upstream criminal gangs, intelligence ability, etc. to profile money laundering gangs, and further evaluates the harmfulness of money laundering with its upstream crimes, thus forming a comprehensive evaluation model to measure the threat of these crimes. This model can help the police clarify the organizational structure and operation mode of money laundering and related criminal gangs, find their vulnerability and finally optimize the strategic decision-making of anti-money laundering intelligence investigation.
    Related Articles | Metrics | Comments0
    Data and Algorithm Security Governance in the United States: Approaches, Characteristics and Enlightenments
    Ma Haiqun Cai Qingping Cui Wenbo Zhang Tao
    Journal of Information Resources Management    2023, 13 (1): 52-64.   DOI: 10.13365/j.jirm.2023.01.052
    Abstract586)      PDF(pc) (1298KB)(455)       Save
    The new technological revolution and industrial transformation will reshape the global economy.Data and algorithms become an important driver of the new technological revolution, which also gives rise to a series of security risks. The United States has long attached great importance to data and algorithm security governance, and the study of data and algorithm security governance characteristics in the United States can play an important role in establishing and improving data and algorithm security governance mechanisms and systems in China. Starting from two dimensions of federal government, state and local government governance systems and institutions, it systematically sorts out the systems and institutional powers and responsibilities related to data and algorithm security in the United States, in order to realize the governance approach of data and algorithm security in the United States, and summarize its governance characteristics from two aspects of governance system and governance institution. Finally, four recommendations are made in the light of the current situation of governance in China: to build a "sub-field, refined, multi-level" personal privacy data security regulatory system; to build a "hardlaw for coordination" data and algorithm security governance mechanism; to establish an AI ethics code with " International discourse power"; to establish a "hierarchical, multi-party governancing" collaborative governance institution.
    Related Articles | Metrics | Comments0
    Research on Cognition and Judgment of Short Video Credibility
    Liu Pingping Chen Ye Cheng Xi
    Journal of Information Resources Management    2021, 11 (6): 85-94.   DOI: 10.13365/j.jirm.2021.06.085
    Abstract957)      PDF(pc) (1458KB)(435)       Save
    Given the uneven quality of short videos in China and the insufficient judgment ability of short video credibility of some netizens, it is of great significance to investigate the cognition and judgment of short video credibility, to improve the judgment ability of short video credibility of users. This study takes college students as the survey object,combines the methods of literature research, depth interview, and questionnaire survey to explore the influencing factors of short video credibility judgment of users, as well as the importance and correlation of each influencing factor. The results show that the influencing factors of short video credibility judgment of users include four dimensions: source credibility, content credibility, media credibility, and external verification,and it is found that there is no significant correlation between the four dimensions. The research will provide theoretical support for the research on new media credibility, and provide method reference for users to judge the credibility of short videos.
    Related Articles | Metrics | Comments0