Most accessed

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • Wang Bing, Shi Zhiyong, Wang Yuanjie
    Information and Documentation Services. 2024, 45(5): 13-21. https://doi.org/10.12154/j.qbzlgz.2024.05.002
    [Purpose/significance] Data-intelligence empowerment is a common concern and focus of both the aca⁃demic and practical communities in today’s data-intelligence era. However, no consensus has been reached on what data-intelligence empowerment is. Therefore, there is an urgent need to trace back and clarify the concept of data-in⁃telligence empowerment and to provide a comprehensive interpretation of data-intelligence empowerment, so as to lay the foundation for data-intelligence empowerment research and practice. [Method/process] Based on the theory of da⁃ta-intelligence and the theory of empowerment, the concepts of data-intelligence and empowerment were traced and ex⁃plained respectively according to the basic logic of word formation. On this basis, the two concepts of data-intelligence and empowerment were refuted, and the sources, meanings and perspectives of data-intelligence empowerment were analyzed. [Result/conclusion] The research shown that data-intelligence empowerment is an interactive synergy. It is based on the premise of mutual authorization between the enabler, the empowerment object and the data-intelligence tool. It is the process of generating big data through digitalization and intelligentization means, then mining and extract⁃
    ing intelligence from big data and pointing to intelligence applications. Its purpose is to stimulate and promote a certain or a series of capabilities of the empowerment object to achieve from nothing to something, from something to something good, and then expand the value creation space. The perspectives of data-intelligence empowerment mainly include eight aspects: connection, aggregation, openness, adaptation, intelligence, precision, dynamics, and synergy.
  • Wang Zhengchao
    Information and Documentation Services. 2025, 46(1): 57-67. https://doi.org/10.12154/j.qbzlgz.2025.01.006
    [Purpose/significance] While AIGC strongly empowers scientific research knowledge production, it also triggers traditional academic misconduct risks such as plagiarism, fabrication and falsification, giving rise to new risk patterns such as AI ghostwriting and AI technology limited academic misconduct, which will impact on the current sci⁃entific research evaluation system. It is necessary to trace the root causes of these risks and regulate them. [Method/process] By deconstructing the underlying logic of AIGC intervention in knowledge production, it can be seen that Gen⁃erative AI acts on the knowledge level evolution path of "data-information-knowledge", as well as the thinking opera⁃tion process of knowledge search and evaluation, resulting in diverse types of Human-AI collaboration relationships,such as AI dominant, AI cooperative and AI assisted. The academic misconduct responsibilities of researchers vary un⁃der different types of Human- AI collaboration. [Result/conclusion] In terms of specific responsibility regulation
    schemes, the traditional objective accountability stance is difficult to cope with the problem of "identity mismatch" be⁃tween AIGC academic misconduct subjects and responsible subjects. In this regard, the subjective accountability stance should be adopted, and set differentiated academic normative obligations such as originality declaration, trans⁃parency obligation, falsification prohibition, viewpoint tracing and factual examination for the author based on their "participation" and "contribution" in knowledge production. The author's subjective fault and its condemnability could be further evaluated by the nature and degree of obligation violations, thereby achieving a reasonable construction of the AIGC academic misconduct risk responsibility system.
  • An Lu, Cheng Haofei
    Information and Documentation Services. 2025, 46(1): 100-110. https://doi.org/10.12154/j.qbzlgz.2025.01.010
    [Purpose/significance] In emergency situations, information search obstacles and information asymmetry lead to the obstruction of event information dissemination. Evaluating and analyzing the friction of online public opin⁃ion information in emergency situations, and providing reference theoretical tools for emergency management are of great significance for improving the government's public opinion governance capabilities. [Method/process] Based on the concept of information friction in information economics, an evaluation indicator system for online public opinion in⁃formation friction in the context of public events is constructed from two dimensions: information search obstacles and information asymmetry. Using the entropy weight method to evaluate and rank information friction in different thematic time periods, we compare online public opinion information friction based on the Kruskal Wallis non parametric test for different lifecycles and topic types. The effectiveness of emergency response is measured from a public perspective.The impact mechanism of information friction on emergency response effectiveness is revealed through correlation anal⁃
    ysis. [Result/conclusion] This study establishes a quantitative standard for the friction of online public opinion infor⁃mation. Results find significant differences in information friction among different lifecycles and theme types, with high⁃er friction in the initiation and outbreak periods, and higher friction in the topics of investigation accountability and emotional expression. There is a significant negative correlation between information friction and the effectiveness of emergency response. Information search obstacles have a greater impact on the effectiveness of emergency response compared with information asymmetry. The findings provide suggestions for government departments to govern the dis⁃semination of online public opinion information during public events.
  • Peng Xun , Feng Yongcai
    Information and Documentation Services. 2024, 45(5): 92-99. https://doi.org/10.12154/j.qbzlgz.2024.05.010
    [Purpose/significance] As a new form of learning under the digital background of the new era, the future learning center of university libraries has adapted to the paradigm of higher education and the requirements of educa⁃ tional modernization. It is an important way for university libraries to achieve functional and role transformation. [Meth⁃od/process] Based on the connotation characteristics and functional positioning of future learning centers in university libraries, a detailed analysis was conducted on the construction examples of future learning centers in four domestic uni⁃versity libraries through literature reading and official website information. [Result/conclusion] The study found that the construction of future learning centers in sample cases is based on the practice of educational concepts, always with technology as the foundation and spatial construction as the focus. Drawing on its experience, the construction strategy of future learning centers in university libraries is summarized.
  • Xu Yongjun, Xiong Chunlan, Zhang Chenglong, Lu Sijia
    Information and Documentation Services. 2025, 46(1): 13-20. https://doi.org/10.12154/j.qbzlgz.2025.01.001
    [Purpose/significance] On 25 April 2024, the Renmin University of China launched the Philosophy and So⁃cial Sciences Preprint Server (PSSXiv), the first preprint server in Chinese philosophy and social sciences. It has pro⁃found significance in advancing the construction of the“Three Systems”of Philosophy and Social Sciences with Chi⁃nese Characteristics and China’s Independent Knowledge System. [Method/process] Through systematic analysis,this paper summarises the valuable experience of constructing China’s first preprint platform in philosophy and social sciences and suggests a future outlook for its construction. [Result/conclusion] PSSXiv is operated by a specialized ed⁃itorial and publishing institution that provides full-chain services and full-version academic exchanges across the en⁃
    tire philosophy and social sciences field. It actively advocates cooperation with journals and strives to support the devel⁃opment of a collaborative innovation ecosystem. PSSXiv aims to establish itself as a world-class preprint server for phi⁃losophy and social sciences with Chinese characteristics. PSSXiv plans to achieve this by establishing disciplinary subservers,strengthening bilingualism, integrating intelligent technology, the cohesion of academic communities, and con⁃structing a natural evaluation model to diversify its content, expand its international presence, and enhanceits synergyand academic credibility.
  • Xia Lixin, Chen Huan, Li Xueman, Zhai Shanshan
    Information and Documentation Services. 2024, 45(5): 73-81. https://doi.org/10.12154/j.qbzlgz.2024.05.008
    [Purpose/significance] Under the background of increasingly rich multimodal information resources, cross modal information organization has important value for the sequential storage and sharing of intangible cultural heritage information resources. This paper proposes a method of constructing intangible cultural heritage cross modal knowl⁃edge graph for image and text data. [Method/process] This paper combined multimodal information extraction and knowledge graph technology to reorganize the knowledge of intangible cultural heritage digital resources. Firstly, the schema layer of intangible cultural heritage cross modal knowledge graph is designed from the content and modal di⁃mensions of intangible cultural heritage digital resources to provide top-level design for graphic data organization. Sec⁃ondly, this paper discusses the knowledge extraction scheme of image and text resources in the field of intangible cultur⁃al heritage, obtains the intangible cultural heritage knowledge in the mode of image and text, and verifies the effective⁃ness of the knowledge extraction method. Finally, a series of cross modal knowledge linking methods for different scenes are used to extract the cross-modal relationships between intangible cultural heritage graphic entities. [Result/
    conclusion] Taking the intangible cultural heritage project of Chu opera as an example, the cross-modal knowledge graph of Chu opera was constructed through the combination of multiple data sources and technologies, which verified the feasibility of the construction method proposed in this study, and had a certain reference value for the digital con⁃struction of intangible cultural heritage.
  • An Xiaomi, Long Zhiqi, Kuang Miaomiao
    Information and Documentation Services. 2024, 45(6): 75-83. https://doi.org/10.12154/j.qbzlgz.2024.06.009
    [Purpose/significance] This study aims to build a theoretical framework for large model data governance from a standardization perspective, covering multidimensional and multifaceted elements. This framework seeks to fill in current gaps in specialized research and standardization research on large model data governance, which will enrich theoretical research on large model data governance and provide implications to practices. [Method/process] By holis⁃tic approach to content analysis and expert consultation, this study systematically reviews and analyzes relevant stan⁃dards and representative Chinese and English journal literature, iteratively refining and constructing a theoretical framework for large model data governance. [Result/conclusion] The theoretical framework for large model data gover⁃nance covers multiple dimensions, including large model data quality management, large model data management, large model data resource management, large model data asset management, and large model data risk management. These five dimensions are structured along with the logical progression of "fundamental premises - execution methods - im⁃plementation pathways - core objectives - intrinsic guarantees",forming a comprehensive theoretical framework.
  • Information and Documentation Services. 2025, 46(1): 5-12.
  • Zhao Ruihan , Chen Junlei, Zhang Xiaoyue
    Information and Documentation Services. 2024, 45(5): 51-63. https://doi.org/10.12154/j.qbzlgz.2024.05.006
    [Purpose/significance] High quality governance of public data will effectively promote the modernization of national governance capabilities, and it plays an important leading role in comprehensively promoting the reform of the data production element market and empowering the high-quality development of the digital economy. To advance the development of public data governance, this paper explores more in the lens of policy tools and data life cycle col⁃laboratin. Such perspective will make up for the shortcomings of existing studies in the perspective of collaborative anal⁃ysis. [Method/process] From the perspective of the full data life cycle governance of public data, this study analyzes 104 policy texts promulgated at the provincial and municipal levels in China. This study will contribute to improve pub⁃lic data governance policies and data governance system design. [Result/conclusion] There are problems in public data governance policies, such as the need to enhance the leadership of governance entities, the lack of standardization and innovation in governance objects, and the need to improve the execution of governance tools. Therefore, it is necessary to broaden and deepen the field of public data governance in policy-making activities, strengthen the governance of the
    whole life cycle of public data, and strengthen collaboration to enhance the operability and effectiveness of policies.
  • Liu Chunyan, Qi Xuechen, Ma Haiqun
    Information and Documentation Services. 2024, 45(5): 22-31. https://doi.org/10.12154/j.qbzlgz.2024.05.003
    [Purpose/significance] The overall national security concept urgently needs to enhance big data security capabilities, revealing the multiple paths under the coupling of multiple influencing factors of big data security capabili⁃ties. This not only helps to promote the rational utilization and management of regional data resources, enhance regional big data collaborative security capabilities, but also helps to build a national security guarantee system. [Method/pro⁃cess] Based on an improved TOE theoretical framework, a framework for influencing factors of big data security was constructed from four aspects: technical level, organizational capability, environmental factors, and data elements. 31 provinces (cities, autonomous regions) were selected as research objects, and a combination of Structural Equation Mod⁃eling (PLS-SEM) and Qualitative Comparison (QCA) was used to explore the relationships between various factors and the path of China's big data security capability from a configuration perspective. [Result/conclusion] The closer the re⁃
    lationship between technical level, organizational ability, environmental factors, and data elements, the higher the level of big data security capability; information infrastructure, innovation capability, organizational governance and securi⁃ty, economic level, education level, data resource construction, and data element circulation cannot be the necessary conditions for achieving big data security capabilities alone, and they need to be combined and matched with each oth⁃er; the configuration paths for high-level data security capabilities include organization data balance type, data gover⁃nance element circulation type, data resource construction dominant type, and data element circulation dominant type.The configuration paths for non high-level data security capabilities include technology environment data comprehen⁃sive deficiency type, data foundation deficiency type, technology resource deficiency type, and technology deficiency type; China should follow the guiding ideology of the overall national security concept, start from the advantages of each region, combine the configuration perspective of each region, and choose a path suitable for the development of big data security capabilities in each region.
  • Li Yifei, Wang Xiezhou
    Information and Documentation Services. 2024, 45(6): 59-65. https://doi.org/10.12154/j.qbzlgz.2024.06.007
    [Purpose/significance] False self-disclosure behavior can have a direct and significant negative impact on audience's cognition, emotion and decision-making, and it is necessary to explore its recognition mechanism and cri⁃sis. [Method/process] Based on the type of expected reward by the participants, the paper analyzes how the subject us⁃es the digital body to give the audience a sense of mimetic intimacy in order to pursue online social capital; how the au⁃dience performs emotional labour to promote the subject's dependence in order to realise virtual symbiotic relation⁃ships; how the media uses algorithmic recommendations to intervene in the audience's information reception sources,guide the subject's information content production order, and strengthen the psychological contract to stimulate the sub⁃ject's content production volume in order to gather private traffic on the platform production volume. [Result/conclu⁃sion] For the crises of subject identity confusion, audience emotional interpretation, and environmental false consen⁃
    sus, it is appropriate to realize the dissolution of false self-disclosure crisis from three aspects: the subject establishes situational self-consciousness, the audience maintains the boundaries of emotional expression, and the media imple⁃ments the justice of information distribution.
  • Yao Yifan, Hu Feng
    Information and Documentation Services. 2025, 46(2): 5-15. https://doi.org/10.12154/j.qbzlgz.2025.02.001
    [Purpose/significance] To effectively respond to diversified, concealed, high-intensity, large-scale, and persistent cyberspace security threats, it is imperative to construct an integrated, comprehensive, and intelligent cyber⁃space security intelligence service architecture. [Method/process] Using the enhanced Hall model as the analytical framework and adhering to the principles of centering on cyberspace security and security intelligence as a service, this study constructs a cyberspace security intelligence service architecture and deeply analyzes its operating mechanism.[Result/conclusion] The cyberspace security intelligence service architecture consists of three components: process submodule, logic submodule, and cognition submodule. The service processes cater to three types of demands: cyber⁃space security perception, cyberspace security judgment, and cyberspace security execution. The service work reflects the operating logic of " attack scenario traceability-event correlation identification-crisis response escalation". The
    cognition of cyberspace security intelligence services is mainly embodied in three aspects: value consensus, technical support, and capability guarantee. The construction of the cyberspace security intelligence service architecture can pro⁃ vide a reference for intelligence service work in China's cyberspace security guarantee system.
  • Li Yujia , Ran Xiaoya, Liu Chang
    Information and Documentation Services. 2025, 46(2): 51-60. https://doi.org/10.12154/j.qbzlgz.2025.02.006
    [Purpose/significance] The rapid development of generative artificial intelligence has propelled changes in user interaction behaviors and cognitive patterns. This study focuses on the differences in users' interactive behaviors with generative artificial intelligence and their evaluations of system performance under tasks with different levels of cognitive complexity. [Method/process] This study employs the user experimentation method and uses the Kruskal-Wallis test to explore the impact of task cognitive levels on user interaction behaviors and system evaluations. It also employs thematic analysis to induce new metrics for user evaluations of generative AI. [Result/conclusion] In terms of interaction behavior, during the completion of tasks at different cognitive levels, the duration of information usage by us⁃ers remains almost unchanged, while it is always the duration of information acquisition that varies. Tasks of evaluation and creation take the most time, involve the most question-and-answer rounds, and have the shortest average response
    length. In the answers to application and analysis tasks, the total copy ratio is lower than that of memory, understanding,evaluation and creation tasks. In terms of system evaluation, tasks of evaluation and creation receive the poorest overall performance. Regarding new evaluation metrics, the study has induced 6 major categories and 17 minor categories of new metrics. This paper supplements user-centered evaluation metrics for generative AI at the theoretical level and helps intelligent systems understand user behavioral characteristics under different task types at the practical level, pro⁃viding more targeted information services.
  • Wu Yingqiang, Zhang Maping, Wen Lijun, Li Baiyang
    Information and Documentation Services. 2025, 46(2): 16-25. https://doi.org/10.12154/j.qbzlgz.2025.02.002
    [Purpose/significance] Overcoming the "temporal blind spot", this study explores the multifactor linkage effects for enhancing the utilization level of Open Government Data (OGD) platforms in the temporal dimension, aiming to provide theoretical contributions and practical value to research on government data openness. [Method/process]Employing the dynamic QCA method, based on panel data from 29 municipal platforms (2019-2023), this study analyz⁃es the temporal trends of local government OGD platform utilization levels, identifying condition configurations consid⁃ering both spatial and temporal factors. [Result/conclusion] There are no necessary conditions affecting OGD platform utilization levels; rather, the utilization level is influenced by multiple factors acting together, not controlled by a single factor. In the sufficiency analysis of condition combinations, three configuration paths are identified: platform driven by fiscal support and data resource construction, government-led platform construction and public demand-driven, gov⁃
    ernment-led platform and data resource-driven. The level of data platform construction is the core factor promoting high utilization levels of OGD platforms. The configuration analysis results show no apparent temporal effects but exhib⁃it case effects resulting from certain spatial differences.
  • Xue Xiang, MaHaiyun, Zhao Yuxiang, Zhu Qinghua
    Information and Documentation Services. 2025, 46(1): 78-89. https://doi.org/10.12154/j.qbzlgz.2025.01.008
    [Purpose/significance] The increasing prevalence and pernicious impact of misinformation on social media present a formidable challenge for which algorithms and experts alone are increasingly inadequate. Research has dem⁃onstrated that proactive individual verification of information can effectively combat misinformation. Therefore, it is im⁃perative to investigate strategies to boost social media users' intention to verify information before sharing it. [Method/process] Based on the theory of planned behavior, this study aims to construct a model on the factors that influence us⁃ers' intention to verify before sharing on social media. An empirical test was conducted to validate the proposed model and all assumptions. [Result/conclusion] The results indicate that five factors fundamentally influence users' verifica⁃tion intention before sharing on social media. Specifically, competency and awareness enhance perceived behavioral control, while awareness, discussion heterogeneity preference, and third-person perception increase attitudes, and per⁃
    ceived social support strengthens subjective norms. Furthermore, perceived behavioral control, attitudes, and subjec⁃tive norms strengthen verification intention before sharing. Subjective norms also indirectly promote verification inten⁃tion by promoting attitudes. However, perceived information overload negatively moderates the association between per⁃ceived behavioral control and verification intention before sharing. The findings deepen the understanding of users' health information verification behaviour and provide new insights for stakeholders in health misinformation gover⁃nance. 
  • Fu Shaoxiong, Cheng Qi
    Information and Documentation Services. 2025, 46(2): 61-69. https://doi.org/10.12154/j.qbzlgz.2025.02.007
     [Purpose/significance] Short videos have gradually become one of the primary channels for the public to ob⁃tain information. Through short videos, various types of information can rapidly disseminate among users, including a large number of false short videos. Many of false short videos are adopted or shared by users, it may harm them and dis⁃turb the online information environment. Therefore, this study explores the factors influencing the dissemination of false short videos, in order to provide references for the governance of false short video and the optimization of online in⁃formation ecology. [Method/process] To explore the influence of content sentiment of false short video on user emotion and false short video dissemination effect, this study employed user sentiment as a mediator and content relevance as a moderator, constructed the research model based on the CAC Model and ELM Model, and then collected 1007 effective false short videos from the TikTok, extracted image, text and audio sentiment from these false short videos based on text
    sentiment analysis, image recognition, and other technologies. As such, the study verified the moderating effect of con⁃tent relevance. [Result/conclusion] Images, text and audio sentiment of false short videos exert significant positive ef⁃fects on users' emotions in different degrees, while the author's avatar and background music exert no significant effect on users' emotions. User emotion exerts a significant negative effect on dissemination effect of false short videos, and partly plays a mediating role between the content sentiment of false short video and its dissemination effect. Content rel⁃evance significantly moderates the influence of the negative impact of user emotion on false short video dissemination effect.
  • Information and Documentation Services. 2025, 46(1): 21-21.
  • Zhang Jing, Liao Jiaqi
    Information and Documentation Services. 2025, 46(2): 70-81. https://doi.org/10.12154/j.qbzlgz.2025.02.008
    [Purpose/significance] Managing sensory information resources in cultural heritage and creating sensory interactive experiences are crucial pathways for cultural heritage conservation and revitalization in the digital age. Com⁃pared to vision and hearing, the sense of smell is a dimension that has not been fully recognized. Revealing olfactory in⁃formation in cultural heritage activation and achieving olfactory reconstruction of cultural heritage is an important and exploratory frontier research. [Method/process] Based on comprehensive literature review, this paper proposes core concepts such as cultural heritage smellscape and its information revelation and digital construction using interdisci⁃plinary theories, methods, and perspectives. Building upon these concepts, an overarching framework for the informa⁃tion revelation and digital construction of smellscape in cultural heritage, relying on the discipline of information re⁃source management, is developed. [Result/conclusion] This framework, with cultural heritage activation as the strate⁃
    gic background, centers on olfactory information resources and management, with digitization as the mainline, consist⁃ing of two stages: digital preparation (information revelation) and digital implementation (digital construction), and five components: olfactory information collection, olfactory information organization, olfactory information presentation, ol⁃factory information foundational applications, and olfactory information comprehensive applications. Corresponding to the two stages in the framework, the paper further elaborates on two critical issues: the representation of olfactory infor⁃mation in cultural heritage and olfactory information interaction, and outlines an interdisciplinary methodological sys⁃tem for addressing these issues.
  • Li Shanman, Yao Leye
    Information and Documentation Services. 2025, 46(1): 40-49. https://doi.org/10.12154/j.qbzlgz.2025.01.004
    [Purpose/significance] Starting from the analytical framework of actor-network theory, analyzing the datadriven model of smart elderly care around various scenarios will help us gain a deeper understanding of the infrastruc⁃ture of data-driven smart elderly care services and master its data-driven strategy to continuously promote the develop⁃ment of smart elderly care. [Method/process] Based on the actor-network theory, combined with the data value chain model and the concept of service scenario, the basic elements of data-driven smart elderly care services are analyzed.Starting from the three aspects of the physical space, interactive space and data space of the scenario, combined with lit⁃erature analysis, research interviews and domestic and foreign practical experience, the basic logic of data-driven smart elderly care services is deconstructed in the scenario. [Result/conclusion] The basic elements and translation
    process of the smart elderly care actor network demonstrate the infrastructure and logical path of data-driven smart el⁃derly care services. Among them, the basic elements of the smart elderly care actor network emphasize multi-dimen⁃sional interactive service scenarios, structured data activities, and heterogeneously coupled actors as the infrastructure of data-driven smart elderly care services; the translation process of the smart elderly care actor network focuses on the logical path of data-driven smart elderly care services, with the purpose of industry docking, platform empowerment,and data efficiency enhancement, centering on service integrators, service providers, service demanders, and the data collection, organization, circulation, and utilization activities they participate in, through processes such as problem identification, benefit granting, subject absorption, and goal mobilization, data drives smart elderly care services.
  • Yuan Li
    Information and Documentation Services. 2025, 46(1): 33-39. https://doi.org/10.12154/j.qbzlgz.2025.01.003
    [Purpose/significance] The overall architecture of the smart elderly care data resource system has been pro⁃posed and it provided a theoretical framework and directional guidance for building a smart elderly care data resource system. [Method/process] According to the overall architecture concept, it clarified the vision and goals of the smart elderly care data resource system and built the basic framework for the system based on information ecology theory. It explored the key points and interrelationships of the four elements, including the diversified subject relationships, the process of data elementization, the application scenarios of data service, and the overall process integration guarantee.[Result/conclusion] The smart elderly care data resource system is a data ecosystem guided by the Healthy China strat⁃egy and the Digital China strategy, consisting of four elements: muti-agent, data resources, service applications, and in⁃tegrated security. It identified the problems that exist in various elements in practice through investigation, and pro⁃posed that the construction of smart elderly care data resource system should focus on the following four aspects, includ⁃ing: supply and demand matching based on multi-agent collaboration, data resources-based construction of elderly care data, value mining of application scenarios and services, and integrated system construction of elder data resourc⁃es.
  • Huang Guobin, Liu Jingyi
    Information and Documentation Services. 2024, 45(6): 5-12. https://doi.org/10.12154/j.qbzlgz.2024.06.001
    [Purpose/significance] The construction and development of preprint platforms for philosophy and social sciences in China, oriented towards facilitating the establishment of an independent knowledge system in these fields,are crucial to the inheritance and dissemination of China's excellent culture. This article aims to provide development strategies for China's preprint platforms in philosophy and social sciences to address the numerous challenges they face. [Method/process] This article intends to use online survey research and comparative analysis to systematically analyze the current development status, main characteristics, primary issues, and underlying causes of China's preprint platforms in philosophy and social sciences. Based on this analysis, several measures will be proposed to efficiently ad⁃vance the development of these platforms. [Result/conclusion] With the principle of effectively balancing publication speed and academic quality, key measures are proposed: introducing a reviewed preprint mechanism to effectively rec⁃oncile the conflict between publication speed and academic quality, supporting the publication of preprint-associated
    research data to enhance the verifiable persuasiveness of key arguments in preprints, and offering registered reports to promote the media integrity layout of preprint platforms for philosophy and social sciences in an open science environ⁃ment. These measures strive to provide feasible decision-making references for efficiently advancing the development of China's preprint platforms in philosophy and social sciences at this stage.
  • Wang Kangqing, Xie Xiaozhuan
    Information and Documentation Services. 2024, 45(5): 5-12. https://doi.org/10.12154/j.qbzlgz.2024.05.001
    [Purpose/significance] The intelligence ethics framework comprises the value criteria and ethical norms that should guide intelligence activities. It serves as the foundation for assessing whether intelligence activities conform to ethical standards. Exploring the development and evolution of the intelligence ethics framework and its underlying logic can provide a theoretical basis for its establishment. [Method/process] Focusing on academic literature, this study employs the method of academic history to chronologically review the developmental trajectory of the intelligence ethics framework and analyze the dynamics and logic behind its evolution. [Result/conclusion] The study reveals that the intelligence ethics framework has undergone significant developmental stages, including the "primitive theory of un⁃ethical intelligence, the justice intelligence theory in the anti-terrorism era, and the upgraded stepwise intelligence eth⁃ics framework in the big data era." It has evolved into a theory of just intelligence that encompasses ethical principles such as "just cause, lawful authority, legitimate purpose, proportionality principle, rationality principle, and alignment with objectives." The fundamental logic driving the evolution of the intelligence ethics framework is the balancing act
    between the security interests of survival and development and the rights to individual freedom and privacy. Among var⁃ious driving factors, the security situation, threat perception, and emerging technologies exert the most direct and pro⁃found influence.
  • Ma Jing, Zhang Li
    Information and Documentation Services. 2024, 45(6): 13-20. https://doi.org/10.12154/j.qbzlgz.2024.06.002
    [Purpose/significance] To explore the innovative significance of preprints in academic communication,grasp the factors that influence the adoption of preprint academic communication models by the academic community,and provide a basis for promoting and optimizing the development of domestic preprint platforms. [Method/process]Through online research and case analysis, summarize the functions and features of major preprint platforms at home and abroad. On this basis, based on the theory of innovation diffusion, summarize the structural and cognitive factors that currently affect the further development of preprints. [Result/conclusion] It is recommended that preprint plat⁃forms strengthen communication and cooperation, and promote open science and preprint policies; establish an academ⁃ic committee system to unite diverse entities for collaborative development; develop academic service tools and embed them into online academic communication contexts; improve academic standards for preprints, enhance credibility and
    recognition.
  • Hu Feng
    Information and Documentation Services. 2024, 45(6): 40-49. https://doi.org/10.12154/j.qbzlgz.2024.06.005
    [Purpose/significance] In the risk landscape society created by the VUCA era, public health emergency in⁃formation disclosure is an indispensable action strategy to build a democratic and responsible government, protect the physical and mental health of citizens, and maintain the stability of social order. [Method/process] Using activity theo⁃ry as the analytical framework, this paper conducts an in-depth perspective on the elements and operating system of public health emergency information disclosure activities. On the one hand, the normative analysis method is used to explain the activity elements and system composition of public health emergency information disclosure; on the other hand, semi-structured interviews, government official website (official microblog), academic literature, policy docu⁃ments, media reports, etc. are used as data sources to conduct empirical discussions on the shortcomings and solutions in the operation practice of the public health emergency information disclosure system. [Result/conclusion] The cou⁃pling and complementation of six elements such as subject, object, community, rules, tools and division of labor consti⁃tute the operational element structure of public health emergency information disclosure; information production sys⁃tem, release specification system, task collaboration system and dialogue sharing system are an operating system struc⁃ture for public health emergency information disclosure was constructed. At the same time, targeted relief strategieswere proposed for the four major dilemmas existing in the operation of the four major subsystems: insufficient tool em⁃bedding, incomplete rules and regulations, unsmooth efficient collaboration, and inactive dialogue and communication.
  • Zhang Weidong, Li Songtao, Li Fengrui
    Information and Documentation Services. 2024, 45(6): 28-39. https://doi.org/10.12154/j.qbzlgz.2024.06.004
    [Purpose/significance] Government rumor refutation is widely recognized as an effective means to curb the spread of rumors, with social media users showing variability in their interaction with refutation information. This study,by analyzing the characteristics of individual users' interaction behaviors with government refutation information, iden⁃tifies the key factors and their impact on the information interaction effectiveness among user groups. It aims to further refine theories related to information interaction and provide theoretical guidance for the scientific refutation efforts of government departments. [Method/process] Based on the traditional cellular automata model and drawing on the SEIR model theory, this approach subdivides user groups according to the specific information states of individual us⁃ers. It quantitatively describes users' interaction states with refutation information and utilizes MATLAB R2022a for simulation. This process constructs a model of government rumor refutation information interaction behavior that incor⁃porates individual user differences. Furthermore, it analyzes important parameters of the model to identify key factors.[Result/conclusion] The effectiveness of social media users' interaction behaviors with government rumor refutation in⁃formation is primarily influenced by different government refutation interaction strategies, the removal rate of govern⁃ment refutation information, and the distribution patterns of refutation participants. Among these, when considering dif⁃ferent government refutation interaction strategies, comprehensive intervention strategies prove to be more effective than adjusting social distances and following opinion leaders. The lower the removal rate of government refutation infor⁃mation, the better the interaction effect of government refutation information. The distribution patterns of refutation par⁃ticipants can be broadly categorized into random, concentrated, and uniform types, with the random distribution of refu⁃tation participants yielding the best interaction effect with government refutation information.
  • Yao Leye, Yang Yuqi
    Information and Documentation Services. 2025, 46(1): 22-32. https://doi.org/10.12154/j.qbzlgz.2025.01.002
    [Purpose/significance] The identification of smart elderly data resources around multiple subjects, with a view to providing important reference support for solving the matching of supply and demand of smart elderly services.[Method/process] A meta-ethnographic qualitative research method was used to integrate 28 original studies, and based on the results of the integration of smart aging data resources, a framework of smart aging data resource elements was constructed. [Result/conclusion] Three main dimensions of "individual subject""institutional subject" and "on⁃line information space", eight specific subject types of "elderly people""government agencies""elderly care organiza⁃tions""social organizations""healthcare organizations""elderly care communities""intelligent terminals devices" and "online spatial platforms", as well as the data resource elements of the 101 different subjects are integrated.
  • Deng Chunlin, Liu Xiaoqing
    Information and Documentation Services. 2025, 46(1): 68-77. https://doi.org/10.12154/j.qbzlgz.2025.01.007
    [Purpose/significance] Accurately grasping the driving factors and irrational performance characteristics of different types of social media users' differential situational motivational states under the risk perception of opinion in⁃volvement, and improving the targeting of the regulation of irrational user behavior and online public opinion risk man⁃agement. [Method/process] Based on the semi-structured interview data, user labels are extracted by using the root⁃ing theory, and a social media user portrait model of irrational behavior under the risk perception of public opinion in⁃volvement is constructed under the framework of the situation theory of problem solving, and the group structure of four categories of user portraits with significant differences is derived through the K-means clustering algorithm for empiri⁃cal analysis. [Result/conclusion] The irrational behavior user groups under the perception of risk of public opinion in⁃volvement can be divided into four categories: information-addicted, passive-adherent, interest-focused, and lossavoidance,and according to the characteristics of the different dimensional labels, behavioral guidance strategies can be proposed from the four aspects of demand guidance, information regulation, emotional reshaping, and technological empowerment.
  • Information and Documentation Services. 2025, 46(1): 111-112.
  • Li Fei, Li Qipu
    Information and Documentation Services. 2024, 45(6): 93-101. https://doi.org/10.12154/j.qbzlgz.2024.06.011
    [Purpose/significance] The maturity of virtual digital human technology has brought new opportunities and challenges to the development of libraries. As a new type of active entity, virtual digital humans will be an indispens⁃able role for libraries in providing information services in the future, especially in the metaverse. This article, from the perspective of the information service ecosystem, deeply explores the construction and implementation path of the li⁃brary's virtual digital human service model under the background of the metaverse, aiming to provide a theoretical refer⁃ence for the future service construction of libraries. [Method/process] Based on the theories of information ecology and service ecology, this article conducts a systematic analysis of the various elements in the library's virtual digital hu⁃man information service ecosystem. Based on this analysis, a library virtual digital human information service model is constructed. Furthermore, the specific implementation path of this model is explored in-depth from six different dimen⁃sions. [Result/conclusion] This article provides a new theoretical framework and practical guidance for libraries to car⁃ry out virtual digital human services. It clarifies the role positioning and functions of various elements in libraries' provi⁃sion of virtual digital human services. At the same time, this article also provides useful references and insights for sub⁃sequent research and practice, contributing to the advancement of library information services to a higher level.
  • Zhao Yuxiang
    Information and Documentation Services. 2025, 46(3): 13.