18 September 2024, Volume 45 Issue 5
    

  • Select all
    |
  • Wang Kangqing, Xie Xiaozhuan
    Information and Documentation Services. 2024, 45(5): 5-12. https://doi.org/10.12154/j.qbzlgz.2024.05.001
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The intelligence ethics framework comprises the value criteria and ethical norms that should guide intelligence activities. It serves as the foundation for assessing whether intelligence activities conform to ethical standards. Exploring the development and evolution of the intelligence ethics framework and its underlying logic can provide a theoretical basis for its establishment. [Method/process] Focusing on academic literature, this study employs the method of academic history to chronologically review the developmental trajectory of the intelligence ethics framework and analyze the dynamics and logic behind its evolution. [Result/conclusion] The study reveals that the intelligence ethics framework has undergone significant developmental stages, including the "primitive theory of un⁃ethical intelligence, the justice intelligence theory in the anti-terrorism era, and the upgraded stepwise intelligence eth⁃ics framework in the big data era." It has evolved into a theory of just intelligence that encompasses ethical principles such as "just cause, lawful authority, legitimate purpose, proportionality principle, rationality principle, and alignment with objectives." The fundamental logic driving the evolution of the intelligence ethics framework is the balancing act
    between the security interests of survival and development and the rights to individual freedom and privacy. Among var⁃ious driving factors, the security situation, threat perception, and emerging technologies exert the most direct and pro⁃found influence.
  • Wang Bing, Shi Zhiyong, Wang Yuanjie
    Information and Documentation Services. 2024, 45(5): 13-21. https://doi.org/10.12154/j.qbzlgz.2024.05.002
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Data-intelligence empowerment is a common concern and focus of both the aca⁃demic and practical communities in today’s data-intelligence era. However, no consensus has been reached on what data-intelligence empowerment is. Therefore, there is an urgent need to trace back and clarify the concept of data-in⁃telligence empowerment and to provide a comprehensive interpretation of data-intelligence empowerment, so as to lay the foundation for data-intelligence empowerment research and practice. [Method/process] Based on the theory of da⁃ta-intelligence and the theory of empowerment, the concepts of data-intelligence and empowerment were traced and ex⁃plained respectively according to the basic logic of word formation. On this basis, the two concepts of data-intelligence and empowerment were refuted, and the sources, meanings and perspectives of data-intelligence empowerment were analyzed. [Result/conclusion] The research shown that data-intelligence empowerment is an interactive synergy. It is based on the premise of mutual authorization between the enabler, the empowerment object and the data-intelligence tool. It is the process of generating big data through digitalization and intelligentization means, then mining and extract⁃
    ing intelligence from big data and pointing to intelligence applications. Its purpose is to stimulate and promote a certain or a series of capabilities of the empowerment object to achieve from nothing to something, from something to something good, and then expand the value creation space. The perspectives of data-intelligence empowerment mainly include eight aspects: connection, aggregation, openness, adaptation, intelligence, precision, dynamics, and synergy.
  • Liu Chunyan, Qi Xuechen, Ma Haiqun
    Information and Documentation Services. 2024, 45(5): 22-31. https://doi.org/10.12154/j.qbzlgz.2024.05.003
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The overall national security concept urgently needs to enhance big data security capabilities, revealing the multiple paths under the coupling of multiple influencing factors of big data security capabili⁃ties. This not only helps to promote the rational utilization and management of regional data resources, enhance regional big data collaborative security capabilities, but also helps to build a national security guarantee system. [Method/pro⁃cess] Based on an improved TOE theoretical framework, a framework for influencing factors of big data security was constructed from four aspects: technical level, organizational capability, environmental factors, and data elements. 31 provinces (cities, autonomous regions) were selected as research objects, and a combination of Structural Equation Mod⁃eling (PLS-SEM) and Qualitative Comparison (QCA) was used to explore the relationships between various factors and the path of China's big data security capability from a configuration perspective. [Result/conclusion] The closer the re⁃
    lationship between technical level, organizational ability, environmental factors, and data elements, the higher the level of big data security capability; information infrastructure, innovation capability, organizational governance and securi⁃ty, economic level, education level, data resource construction, and data element circulation cannot be the necessary conditions for achieving big data security capabilities alone, and they need to be combined and matched with each oth⁃er; the configuration paths for high-level data security capabilities include organization data balance type, data gover⁃nance element circulation type, data resource construction dominant type, and data element circulation dominant type.The configuration paths for non high-level data security capabilities include technology environment data comprehen⁃sive deficiency type, data foundation deficiency type, technology resource deficiency type, and technology deficiency type; China should follow the guiding ideology of the overall national security concept, start from the advantages of each region, combine the configuration perspective of each region, and choose a path suitable for the development of big data security capabilities in each region.
  • Liu Bing , Li Xing, Bai Xiaoxuan, Liu Yuhong
    Information and Documentation Services. 2024, 45(5): 32-40. https://doi.org/10.12154/j.qbzlgz.2024.05.004
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Focusing on the main factors that affect the satisfaction of elderly users with infor⁃mation disclosure in public health emergencies, this research explores the impact and relationship between them to re⁃veal the mechanism of elderly user satisfaction, in order to provide reference for governments at all levels to optimize the form of information disclosure work and improve information disclosure services in public health emergencies, in or⁃der to better meet the information needs and expectations of elderly users. [Method/process] The elderly population is the specific research subjects in the article, conducting a systematic analysis of the survey data obtained using structur⁃al equations. Based on hypothesis verification, a model of factors affecting the satisfaction of elderly users with public health emergencies information disclosure is constructed. [Result/conclusion] The model, with trust level, subjective ability, demand expectations, and social support as independent variables and perceived accessibility, perceived quali⁃ty, and perceived value as intermediate variables, reveals that the satisfaction of elderly users with information disclo⁃sure in public health emergencies is a chain reaction process result of multiple complex factors, revealing the informa⁃tion psychology and behavioral characteristics of the elderly population in this area.
  • Xia Zhijie , Lv Ning
    Information and Documentation Services. 2024, 45(5): 41-50. https://doi.org/10.12154/j.qbzlgz.2024.05.005
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] To delve into the potential worth of intelligent technology in resolving the problem of misinformation, comprehending the mechanisms of human-computer interaction regarding users' perception of infor⁃mation and their information behavior can facilitate internet platforms in designing appropriate intelligent systems to as⁃sist the public in strengthening their ability to identify misinformation. [Method/process] Based on the framework of social cognitive theory, Two-way ANOVA and One-way ANOVA are employed to analyze the data collected through laboratory experiment methods. This paper explores the differences between whether the interaction objects are human experts or intelligent systems and the mode of independent interaction or group interaction to enhance the public's abili⁃ty to discriminate information. [Result/conclusion] Users' cognition of interactive objects and interaction mode will have a cross-effect on information literacy ability and perception of information authenticity. During the process of hu⁃
    man-computer interaction with intelligent systems, simultaneous participation in group interaction will significantly en⁃hance the information literacy ability, raise the perception level of information authenticity, and reduce the "like" be⁃havior of misinformation.
  • Zhao Ruihan , Chen Junlei, Zhang Xiaoyue
    Information and Documentation Services. 2024, 45(5): 51-63. https://doi.org/10.12154/j.qbzlgz.2024.05.006
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] High quality governance of public data will effectively promote the modernization of national governance capabilities, and it plays an important leading role in comprehensively promoting the reform of the data production element market and empowering the high-quality development of the digital economy. To advance the development of public data governance, this paper explores more in the lens of policy tools and data life cycle col⁃laboratin. Such perspective will make up for the shortcomings of existing studies in the perspective of collaborative anal⁃ysis. [Method/process] From the perspective of the full data life cycle governance of public data, this study analyzes 104 policy texts promulgated at the provincial and municipal levels in China. This study will contribute to improve pub⁃lic data governance policies and data governance system design. [Result/conclusion] There are problems in public data governance policies, such as the need to enhance the leadership of governance entities, the lack of standardization and innovation in governance objects, and the need to improve the execution of governance tools. Therefore, it is necessary to broaden and deepen the field of public data governance in policy-making activities, strengthen the governance of the
    whole life cycle of public data, and strengthen collaboration to enhance the operability and effectiveness of policies.
  • Sun Shaodan
    Information and Documentation Services. 2024, 45(5): 64-72. https://doi.org/10.12154/j.qbzlgz.2024.05.007
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In the context of the national cultural digitization strategy, this article takes linear cultural heritage data as research subject and examines the semantic enhancement mechanism of linear cultural heri⁃tage data from a philosophical perspective. It provides a theoretical foundation for the intelligent construction of linear cultural heritage data. [Method/process] This paper primarily constructs a cognitive framework for the semantic en⁃hancement mechanism of linear cultural heritage data from three dimensions: "Dao" "Qi" and "Yong". Based on infor⁃mation processing theory and cognitive scheme theory, focusing on the progressive cognitive process of users towards linear cultural heritage, the article extracts three spiral upward cognitive processes: "user perception and data encod⁃ing" "content representation and knowledge linkage" and "semantic expansion and contextual interpretation". Based on this, a technical system for the semantic enhancement mechanism of linear cultural heritage data is constructed. [Re⁃sult/conclusion] The cognitive framework and technical system proposed in this paper provide theoretical guidance for the intelligent management and development of linear cultural heritage data from the top-level design perspective, lay⁃ing a solid theoretical foundation for the infrastructure of linear cultural heritage.
  • Xia Lixin, Chen Huan, Li Xueman, Zhai Shanshan
    Information and Documentation Services. 2024, 45(5): 73-81. https://doi.org/10.12154/j.qbzlgz.2024.05.008
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Under the background of increasingly rich multimodal information resources, cross modal information organization has important value for the sequential storage and sharing of intangible cultural heritage information resources. This paper proposes a method of constructing intangible cultural heritage cross modal knowl⁃edge graph for image and text data. [Method/process] This paper combined multimodal information extraction and knowledge graph technology to reorganize the knowledge of intangible cultural heritage digital resources. Firstly, the schema layer of intangible cultural heritage cross modal knowledge graph is designed from the content and modal di⁃mensions of intangible cultural heritage digital resources to provide top-level design for graphic data organization. Sec⁃ondly, this paper discusses the knowledge extraction scheme of image and text resources in the field of intangible cultur⁃al heritage, obtains the intangible cultural heritage knowledge in the mode of image and text, and verifies the effective⁃ness of the knowledge extraction method. Finally, a series of cross modal knowledge linking methods for different scenes are used to extract the cross-modal relationships between intangible cultural heritage graphic entities. [Result/
    conclusion] Taking the intangible cultural heritage project of Chu opera as an example, the cross-modal knowledge graph of Chu opera was constructed through the combination of multiple data sources and technologies, which verified the feasibility of the construction method proposed in this study, and had a certain reference value for the digital con⁃struction of intangible cultural heritage.
  • LiuYao , Zhou Jiahui, Qiu Wuwen
    Information and Documentation Services. 2024, 45(5): 82-91. https://doi.org/10.12154/j.qbzlgz.2024.05.009
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In order to provide humanities and social sciences researchers with text analysis and business model construction services, a business agent construction platform is built to provide efficient support.[Method/process] With the guiding principle of“large language models + agents”, this paper proposes an automatic it⁃erative fine-tuning mechanism of large language models, and builds a business agent construction platform in humani⁃ties and social sciences through PaaS based on business process cognitive graph technology, on-demand generation of resource parsing tools, and low-code function development technology. [Result/conclusion] The platform has the abili⁃ty of customized generation of business resources, automatic construction and visualization of business models. By uti⁃lizing the platform, business agents can perform specific analyses, thereby providing support for research work in the humanities and social sciences.
  • Peng Xun , Feng Yongcai
    Information and Documentation Services. 2024, 45(5): 92-99. https://doi.org/10.12154/j.qbzlgz.2024.05.010
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] As a new form of learning under the digital background of the new era, the future learning center of university libraries has adapted to the paradigm of higher education and the requirements of educa⁃ tional modernization. It is an important way for university libraries to achieve functional and role transformation. [Meth⁃od/process] Based on the connotation characteristics and functional positioning of future learning centers in university libraries, a detailed analysis was conducted on the construction examples of future learning centers in four domestic uni⁃versity libraries through literature reading and official website information. [Result/conclusion] The study found that the construction of future learning centers in sample cases is based on the practice of educational concepts, always with technology as the foundation and spatial construction as the focus. Drawing on its experience, the construction strategy of future learning centers in university libraries is summarized.
  • Sun Peng, Wang Yu, Liu Xinyong
    Information and Documentation Services. 2024, 45(5): 100-106. https://doi.org/10.12154/j.qbzlgz.2024.05.011
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The emergence of ChatGPT has triggered a new round of "thinking revolution" in the reshaping and development of social industry ecology, and will also empower the reshaping of library business ecolo⁃gy. [Method/process] Based on the temporal summary of the evolution of artificial intelligence in the library business ecosystem, this paper analyzes the practical foundation and logical direction that ChatGPT has given to the develop⁃ment of libraries, and constructs an application scenario for ChatGPT to support library service innovation. [Result/conclusion] Libraries should rationally control, apply and interpret this "thinking revolution", promote the ecological reshaping of industry development, create new ecological scenes in core business levels such as content production, ser⁃vice consulting and resource retrieval, and make it a new track for innovative development of libraries in the era of artifi⁃cial intelligence.
  • Liu Yan
    Information and Documentation Services. 2024, 45(5): 107-112. https://doi.org/10.12154/j.qbzlgz.2024.05.012
    Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Reading bazaar is a reading service model emerging in public libraries in recent years. This paper takes the“urban hall wake up program”program as an example to discuss the systematic elements and constructive logic of reading bazaar. [Method/process] Under the perspective of“spatial triadic dialectics”, we an⁃alyze and elaborate the four major elements of reading bazaar and the logic of construction through literature research and data analysis. Finally, it puts forward relevant suggestions for the problems of reading bazaar. [Result/conclusion]The reading bazaar includes four major elements: space, content, form and organization; and there are four major con⁃structive strategies,conjunction, determination,disjunction,integration.