Most accessed

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • Zhao Ziyu
    Information and Documentation Services. 2024, 45(2): 30-37. https://doi.org/10.12154/j.qbzlgz.2024.02.004
    [Purpose/significance] The widespread use of generative artificial intelligence has given rise to multiple da⁃ ta security risks. Traditional reactive and centralized governance models seem inadequate to address these new chal⁃ lenges. In contrast, agile governance, with its flexible approach, demonstrates a unique superiority. [Method/process] Firstly, a meticulous examination of the multifaceted risks in data security posed by generative artificial intelligence is conducted. Subsequently, a comparative analysis of the efficacy of three governance models in risk management is car⁃ ried out. It is suggested that China should promptly transition its governance model. Guided by this, a specific gover⁃ nance framework is constructed. [Result/conclusion] The agile governance approach, characterized by its adaptability, flexibility, and inclusiveness, offers a highly effective strategy for addressing data security risks associated with emerg⁃ ing technologies like generative artificial intelligence. It allows for the continuous optimization of the governance sys⁃ tem for generative artificial intelligence data security. Within the agile governance framework, it is essential to embrace the adaptive governance concept of "equal emphasis on prevention and response", construct a resilient governance mechanism that promotes "diverse participation and collaborative interactions",and employ inclusive governance ap⁃ proaches that combine technology with legal measures. This way, a comprehensive framework for ensuring the security of generative artificial intelligence data is constructed.
  • Yan Hui , Wu Zhaotong
    Information and Documentation Services. 2024, 45(2): 5-13. https://doi.org/10.12154/j.qbzlgz.2024.02.001
    [Purpose/significance] This article aims to employ the STS (Science, Technology and Society) theoretical perspective to analyze the top ten academic hotspots in information resource management discipline from 2019 to 2023. [Method/process] The paper selects the STS subsystem analysis mode to discover the distribution of the top ten aca⁃ demic hotspots in different relational dimensions, and combines the trajectory of the relationship between science, tech⁃ nology, and society in the development history of the discipline to determine the distribution pattern and future direc⁃ tions of academic hotspots. [Result/conclusion] The development history of the discipline of information resource man⁃ agement and the top ten academic hotspots in the past five years have revealed the essential characteristics of the disci⁃ pline being driven by society. Scientific research in this field tends to respond to and solve social problems, and pays more attention to the impact of technology on society. However, the two paths of society and science on the shaping of technology have not been emphasized by the discipline of information resource management in the past.
  • Xu Fang
    Information and Documentation Services. 2024, 45(2): 24-29. https://doi.org/10.12154/j.qbzlgz.2024.02.003
    [Purpose/significance] The application of generative artificial intelligence in smart library services has great potential and advantages, which can provide more efficient and intelligent services for smart library. However, since the legal status and responsibility of AIGC is not clear, the ensuing legal problems cannot be ignored. [Method/ process] This paper reviews the concepts of generative artificial intelligence and artificial intelligence-generated con⁃ tent. Then, it analyzes the main application scenarios of generative AI in smart library, including virtual consulting ser⁃ vice, subject knowledge service, micro, small and medium-sized enterprises thematic push service, reading promotion service and information literacy education and training service. Finally, it discusses the liability issues arising from AIGC accuracy, user privacy, copyright ownership and invalidation of relevant rules and algorithmic discrimination of AIGC in the main service scenario of intelligent library, and puts forward countermeasures. [Result/conclusion] The in-depth analysis of the internal logic behind these legal problems and the search for systematic solutions from the lev⁃ el of legal theory need to be further explored in the follow-up research.
  • Zhang Yanfeng , Liu Min
    Information and Documentation Services. 2024, 45(2): 48-56. https://doi.org/10.12154/j.qbzlgz.2024.02.006
    [Purpose/significance] Exploring the structural elements and formation mechanisms of digital hoarding be⁃ havior of mobile social media users helps to enrich the theoretical paradigm of information behavior research, and pro⁃ vides theoretical and applied references for analyzing the phenomenon of digital hoarding behavior of mobile social me⁃ dia users. [Method/process] Based on the I-PACE theoretical model framework, this paper analyzed the elements of mobile social media users' digital hoarding behavior from four dimensions of "user-emotion-cognition-behavior" and constructed a model of the mechanism relationship of it. [Result/conclusion] The specific guiding strategies for the be⁃ havior are proposed to provide reference for effectively solving the hoarding problems in the era of digital information.
  • Zhang Yuhan, Chen Gang
    Information and Documentation Services. 2024, 45(4): 5-13. https://doi.org/10.12154/j.qbzlgz.2024.04.001
    [Purpose/significance] On the basis of clarifying the historical development process of information science theory in China, explore the two dimensions of modernization development of information science theory in the new era.[Method/process] This article takes literature content analysis and autonomous theory construction as the main re⁃search methods, supported by some high-quality information science theory literature, governance theory literature,Marxist classic works, and new era party and government decision-making deployment documents publicly published in China. it analyzes and points out the areas that urgently need to be strengthened in the current development of infor⁃mation science theory, and proposes targeted development strategies.[Result/conclusion] The research results indicate that significant achievements have been made in the theoretical research of information science in China, but there is still a need for continuous improvement in terms of local adaptability, thinking mode construction, discourse system connection, theoretical timeliness and practicality. We can try to use the self-built governance concept system and the shaping of security concepts under the overall national security perspective as two dimensions to guide the moderniza⁃tion of information science theory, providing comprehensive theoretical scientific, contemporary, and authoritative sup⁃port. On the basis of strengthening the current situation and solving problems, we can further expand the perspective of information science theory reproduction and deepen our understanding and research of intelligence practice. And it is also necessary to promote interdisciplinary research in information science based on independent professional estab⁃lishment.

  • Information and Documentation Services. 2024, 45(1): 5-11.
  • Zhang Yan, Wu Dawei, Zhao Yuxiang, Zhu Qinghua
    Information and Documentation Services. 2024, 45(2): 57-65. https://doi.org/10.12154/j.qbzlgz.2024.02.007
    [Purpose/significance] With the increasing integration of digital technology, some older adults have devel⁃ oped smartphone dependency. This study explores the antecedents and consequences of smartphone existentially de⁃ pendent behavior among older adults, aiming to provide insights for promoting healthier smartphone use among this population. [Method/process] Data were collected through semi-structured interviews with 27 older adults and 8 fami⁃ ly members of older adults. Grounded theory was employed for coding and analysis. [Result/conclusion] The study es⁃ tablishes the facilitating and restraining mechanisms of smartphone existentially dependent behavior among older adults, highlighting the interplay between promoting and protective factors. Promoting factors include technological pressure, socio-cultural pressure, vulnerability to susceptibility, and emotional anxiety. Protective factors include selfcontrol and digital feedback. Moreover, smartphone existentially dependent behavior among older adults can lead to weakened social connections, intergenerational discord, and decreased sleep quality, further reinforcing their reliance on smartphones.
  • Information and Documentation Services. 2024, 45(3): 5-7.
  • Zhou Wenjie
    Information and Documentation Services. 2024, 45(2): 14-23. https://doi.org/10.12154/j.qbzlgz.2024.02.002
    [Purpose/significance] Combining the academic hotspots in the field of library, information and archival management over the past five years, this paper reviews the theoretical framework of Information Resource Manage⁃ ment (IRM). [Method/process] It revisits the traditional Data-Information-Knowledge-Wisdom (DIKW) model in the field of IRM and develops the corresponding Technic/Operate-Analyze-Strategy-Culture (TASC) model from a profes⁃ sional practice perspective. Building upon the alignment of these two models, the theoretical framework of IRM is sys⁃ tematically examined. [Result/conclusion] Starting from Claude Elwood Shannon's contributions to the quantification, measurement, encoding, transmission, and processing of information, IRM has evolved, incorporating Karl Popper's "World 3" theory, Bertram Claude Brookes' "Knowledge Maps", Jesse Shera's "Social Epistemology" as intermediar⁃ ies, and inheriting Brenda Dervin's "Sense-making" theory. Together, these elements form a coherent theoretical frame⁃ work in IRM.
  • Zhou Yi, Guo Langrui
    Information and Documentation Services. 2024, 45(3): 70-77. https://doi.org/10.12154/j.qbzlgz.2024.03.007
    [Purpose/significance] In addition to the leakage of data itself, data security risk includes the implicit secu⁃ rity risk brought about by data correlation analysis and intelligence generation and perception. In order to solve the con⁃ tradiction between open source intelligence derived from public data access and national security, it is necessary to im⁃ plement the governance of implicit data security risk, so as to improve the national data governance system and protect national data sovereignty. [Method/process] An analytical framework is established based on risk management under consequentialism to sort out the behavioral and cognitive flows of implicit data security risk governance. Based on the ontological understanding of implicit data security risk, its manifestations and generative logic are comprehensively sorted out, and targeted governance mechanisms are constructed. [Result/conclusion] Implicit data security risk has the existential state characteristics of concealment and randomness, the movement characteristics of transferability and diffusion, and the environmental characteristics of scenario and accumulation. Based on the generative logic of cogni⁃ tion, interest, system, and technology, it exhibits security risks in dark data, data aggregation, data mining, data profil⁃ ing, data rights, and privacy compute.
  • Chen Rui, Jiang Yihui
    Information and Documentation Services. 2024, 45(4): 87-95. https://doi.org/10.12154/j.qbzlgz.2024.04.009
    [Purpose/significance] In current research, there is less focus on the governance issues of training data for generative artificial intelligence. However, there are numerous risks in the lifecycle of training data that cannot be ig⁃nored and urgently need effective governance. [Methods/process] This paper, based on the demonstration that training data is the core driving force of generative artificial intelligence, uses the theoretical model of the data lifecycle to com⁃prehensively summarize the possible risk patterns in the training data lifecycle. Then, it analyzes the causes of related risks from the perspectives of the intrinsic characteristics of the training data, ecological factors, and operational factors of generative AI developers. [Results/conclusion] It can be found that the fragmented nature and biases of the data are the starting points for risk occurrence; the ecological imbalance of the data is an external cause leading to risk; mean⁃while, the "black box" training data, biased data labeling, and lax data desensitization are internal causes of risk occur⁃rence.Therefore, targeting the characteristics of training data, a comprehensive risk governance scheme that encompass⁃es legal, market, community norms, and frameworks can be constructed using the "compassionate dots" framework.
  • Qi Jinglin, Han Zhengbiao
    Information and Documentation Services. 2024, 45(3): 31-40. https://doi.org/10.12154/j.qbzlgz.2024.03.003
    [Purpose/significance] The purpose of this study is to elucidate the applications and contributions of behav⁃ ioural economics theories in information behaviour research, thereby fostering the continued development of these theo⁃ ries within the realm of information behaviour research. [Method/process] Drawing upon the extensive research litera⁃ ture on information behaviour, encompassing both domestic and foreign journals and academic conferences, this study offers a comprehensive generalization and summary of the utilization of behavioural economics theories in the realm of research. Furthermore, it highlights the theoretical contributions of these applications and provides a forward-looking perspective on future research avenues. [Result/conclusion] First, behavioural economics theories have been widely applied to information retrieval, information evaluation and other research themes. Second, behavioural economics theo⁃ ries provide a theoretical foundation for revealing the cognitive styles and thinking logic behind users’information be⁃ haviours from four aspects: understanding bounded rationality and‘irrational’in users’information behaviour, under⁃ standing the rules of gain and loss in users’decisions, revealing the heuristics in cognitive and behavioural strategies, and interpreting the cognitive biases in information behaviours. Finally, the corresponding outlooks are proposed from three aspects: interdisciplinary theory development in information behaviour, the zeitgeist information behaviour re⁃ search, and scientific decision-making of users.
  • Wu Dawei, Lian Jingwen, Zhao Yuxiang, Jia Mingxia
    Information and Documentation Services. 2024, 45(4): 64-75. https://doi.org/10.12154/j.qbzlgz.2024.04.007
    [Purpose/significance] With the exponential growth of work-related data, digital hoarding has become a typical irrational behavior in the workplace. By clarifying the influencing factors and mechanisms of digital hoarding be⁃havior in this context, this study aims to provide recommendations for optimizing existing research paradigms and im⁃plementing targeted coping strategies. [Method/process] Based on the I-PACE model, this research explores the influ⁃encing factors of digital hoarding behavior in the workplace across seven dimensions: individual characteristics, organi⁃zational pressure, technostress, coping styles, cognitive biases, emotional and cognitive responses, and lack of self-con⁃trol. Additionally, it analyzes the conceptual implications and behavioral consequences. Through normative analysis,this study elucidates five influencing and action mechanisms: individual bias mechanisms, emotion intensification
    mechanisms, cognitive dissonance mechanisms, compensatory loss of control mechanisms, and behavioral consequence mechanisms, proposing five normative propositions accordingly. [Result/conclusion] This study constructs a frame⁃work for the influencing mechanism of digital hoarding behavior in the workplace based on the I-PACE model. Future research prospects and coping strategies are suggested for different mechanisms. The findings aim to enrich research on digital hoarding behavior and optimize information management practices in the workplace.
  • Zhu Xiaofeng, Zhang Han, Hong Lei, Wu Jingxian
    Information and Documentation Services. 2024, 45(4): 14-23. https://doi.org/10.12154/j.qbzlgz.2024.04.002
    [Purpose/significance] The intelligence talent training chain oriented towards national strategy helps to re⁃construct the intelligence talent training model, promote the resonance between intelligence talent training and national strategy, and better meet the needs of national strategy for intelligence talents. [Method/process] Firstly, the historical changes of national strategy were sorted out, and the basic meaning and key links of the intelligence talent training chain were defined; Secondly, the basic logic of the training chain for national strategic intelligence talents was ana⁃lyzed; Subsequently, a theoretical model for the training chain of national strategic intelligence talents was constructed from the dimensions of subject, object, and content; Ultimately, a complete talent training chain from undergraduate and graduate students to leading talents will be established for different levels of national strategy implementation. [Re⁃sult/conclusion] The training chain for national strategic intelligence talents is essentially a symbiotic chain that em⁃powers and assists various entities in the formation of national strategies. It is a talent supply chain formed by continu⁃ously deepening and expanding the training objects in response to the development of national strategies. It is a learn⁃ing chain that matches the professional knowledge and capabilities of intelligence science with national strategies. The intelligence talent training chain, from undergraduate and graduate students to leading talents, is not only a process of continuously improving the quality of intelligence education, but also a process of constantly adapting, fitting and meet⁃ing national strategic needs.
  • Si Li, He Yi, Guo Xiaotong
    Information and Documentation Services. 2024, 45(1): 12-22. https://doi.org/10.12154/j.qbzlgz.2024.01.001
    [Purpose/significance] Since the 21st century, the themes, methods and applications of Knowledge Organi⁃ zation (KO) research have presented new features under the influence of the new generation of scientific and technologi⁃ cal revolution. By summarizing and refining relevant research topics and features abroad, this paper can provide refer⁃ ence for Chinese scholars in this field. [Method/process] This study first comprehensively collected the relevant litera⁃ ture of foreign KO from 2000 to 2022, and then used content analysis to code them one by one to obtain the characteris⁃ tics of research topics and research contents of KO. [Result/conclusion] Important findings of this study include: the KO research topics tend to be diversified, and the focus has shifted from digitization to dataization and semantics; the quality assessment of knowledge organization systems is emphasized; the organization method presents a coexistence trend of technology, crowdsourcing and experts; application areas has centered on scenario-oriented research. It is sug⁃ gested that Chinese KO research should: (1)focus on the construction of Chinese data infrastructure and promote the process of knowledge integration and association;(2)establish a reasonable evaluation system to improve KO quality; (3) accelerate the organization of intelligent data by "crowdsourcing + technology + experts"; (4)expand the application in specific fields to improve the service level.
  • Li Zhuozhuo, Zhang Chuhui
    Information and Documentation Services. 2024, 45(1): 23-34. https://doi.org/10.12154/j.qbzlgz.2024.01.002
    [Purpose/significance] This paper reviews the origins and development of information ethics since the 1980s, answers whether information ethics has been replaced by data ethics and artificial intelligence ethics, and whether it can cope with more complex and diverse ethical issues in the digital transformation. Then, this paper reveals the ethical significance and important value of information ethics, and identifies the anchor point for the research and practice of information ethics in the digital transformation. [Method/process] Through literature research and content analysis, this paper summarizes the main views and key issues of information ethics in about 40 years, clarifies the con⁃ notation and evolution of information ethics, and discusses the value and significance of information ethics in each peri⁃ od. [Result/conclusion] The research finds that information ethics originated from computer ethics, and its develop⁃ ment has undergone two shifts from an ethical perspective to an information issue and from an information perspective to an ethical issue, and its core issue reflects the imbalance of the information rights order caused by the generation and control of information flow. In-depth research on information ethics is of great significance to break down the complex and diversified ethical issues today, and it is urgent to strengthen the research value of information ethics, broaden the research boundary of information ethics, and actively integrate into the digital transformation process.
  • Zhou Wenjie
    Information and Documentation Services. 2024, 45(3): 8-17. https://doi.org/10.12154/j.qbzlgz.2024.03.001
     [Purpose/significance] Based on previous studies, a V-shape Model has been constructed to comprehen⁃
    sively analyze the knowledge system, logical structure, and professional practices of information resource management.
    [Method/process] Using a layered analysis approach, the overall theoretical structure of information resource manage⁃
    ment is explored from four aspects: user cognitive levels, forms of information resources, types of management opera⁃
    tions, and societal cognitive demands. [Result/conclusion] The holistic theoretical framework, knowledge structure,
    and professional practices of information resource management can be encompassed within the V-shape Model, consist⁃
    ing of four models: (1) a collective cognitive development model composed of memory, thinking, understanding, and in⁃
    ternalization, forming the basis for understanding users at different cognitive levels and providing targeted information
    resource management and services; (2) an information resource management theoretical hierarchy model composed of
    data, information, knowledge, and wisdom, expressing the intrinsic attributes of information resource management be⁃
    fore and after different forms; (3) an information resource management operational hierarchy model composed of tech⁃
    nology/operations, analysis, strategy, and culture, revealing specific types of information resource management opera⁃
    tions from the perspective of professional practices;(4) the social awareness hierarchy model which is comprised of four
    levels: entertainment/experience needs, personalized information needs, general knowledge needs, and knowledge inno⁃
    vation needs. The model aims to provide a comprehensive analysis of the mission and objectives of the information re⁃
    source management profession as a whole.
  • Zeng Yueliang , Lv Xiaolong
    Information and Documentation Services. 2024, 45(1): 101-110. https://doi.org/10.12154/j.qbzlgz.2024.01.009
    [Purpose/significance] Improving the older adults’digital literacy is necessary to bridge the social digital divide and promote digital inclusion. Singapore government's initiatives and successful experience to improve older adults' digital literacy can provide references for the top-level design, project development and implementation optimi⁃ zation of the government of China. [Method/process] Based on literature, this paper conducts an in-depth investiga⁃ tion on Singapore government and older adults service websites, obtains the government-issued policy on older adults’ digital literacy and the information of its leading projects, and systematically sorts out the key initiatives. [Result/con⁃ clusion] Singapore government's core initiatives to improve older adults' digital literacy include formulating policies, setting up specialized agencies and service teams, establishing platform for digital skills learning and communication, and providing financial and equipment support. These initiatives led by government and widely participated by various social forces, are characterized by paying attention to the role of generations and peers, combining online and offline learning models, and obtaining multi-party financial and technical support. According to the present situation of prac⁃ tice in our country, the government is supposed to give full play to its functions and integrate superior resources of vari⁃ ous social parties, design practical projects with nationwide influence, expand the platform of learning digital skills for older adults, and increase financial support and supply of age-friendly smart devices.
  • Wei Jianxiang, Liang Shuai, Zhu Yunxia, Huang Weidong
    Information and Documentation Services. 2023, 44(6): 35-43. https://doi.org/10.12154/j.qbzlgz.2023.06.004
    [Purpose/significance] "Event" is the core concept of human social activities and the key element of intelli⁃ gence activities. With the development of machine learning, big data, artificial intelligence and other emerging technol⁃ ogies, a new technology with event as the research object, named "Event Evolution Graph" (EEG), comes into being. This paper sorts out and summarizes the research advance of the EEG, so as to provide reference for the research and application of this technology. [Method/process] The concept, research status and key technologies of the EEG were investigated, analyzed and summarized based on literature research. Firstly, this paper introduces the basic concept and research status. Then, the overall technical framework is summarized and the key technologies related are dis⁃ cussed in detail. Finally, the challenges faced and future prospects of the EEG are proposed. [Result/conclusion] At present, information science research is gradually changing from static object to dynamic object knowledge manage⁃ ment with event as the core. Since it was first proposed in 2017, the EEG has gradually attracted extensive attention from academia and the industry, and has achieved application results in various fields, which will provide strong techni⁃ cal support for the research of information science in the future.
  • Tang Xuemei, Lai Shengqiang
    Information and Documentation Services. 2024, 45(3): 41-48. https://doi.org/10.12154/j.qbzlgz.2024.03.004
    [Purpose/significance] Online negative emotion is an important factor to promote the outbreak of online public opinion events. And online emotion itself is the emotional response of online users to public opinion events. How⁃ ever, how the characteristics of public opinion events affect the negative emotion intensity and emotion type of individu⁃ als is still lacking of in-depth discussion. [Method/process] Two experiments were conducted to explore the impact of characteristics such as event severity, event responsibility, and event uncertainty on the initial emotion of the audience. [Result/conclusion] The results show that the responsibility and severity of events have a positive impact on the of neg⁃ ative emotion intense, and anger, fear, anxiety and sadness of the audience are prevalent in different situations of public opinion event responsibility and event uncertainty.
  • Zuo Min, Qiu Jiangnan
    Information and Documentation Services. 2024, 45(4): 34-43. https://doi.org/10.12154/j.qbzlgz.2024.04.004
    [Purpose/significance] In the context of generative AI, Online Knowledge Communities (OKC) have intro⁃duced a large number of bots embedded with AI algorithms, posing new challenges for developing human-bot collabora⁃tion patterns to better improve the performance of knowledge social construction. [Method/process] Collect humanbot collaboration network log data from 136 human users and 48 bot users in Wikipedia, and use grounded theory for multi case analysis. [Result/conclusion] The study establishes a human-bot collaborative knowledge social construc⁃tion model for OKC in generative AI contexts, revealing the mechanism of human-bot collaborative knowledge social construction, elaborating the effect of three basic task dependencies(flow,fit,sharing) and human-bot team resources re⁃quired for task execution on the formation of two human-bot collaboration patterns, automated assistance and enhanced assistance, as well as the important impact of these two human-bot collaboration patterns on the knowledge social con⁃
    struction performance.From the perspective of human-bot collaboration, the research enriched and developed the coor⁃dination theory and social constructivist theory, providing useful guidance for human collaborating strategies and knowl⁃edge social construction performance improvement strategies in generative AI contexts.
  • Zhang Weidong , Chen Xipeng , Li Songtao
    Information and Documentation Services. 2024, 45(2): 66-74. https://doi.org/10.12154/j.qbzlgz.2024.02.008
    [Purpose/significance] The popularity bias of the personalized recommendation system is to recommend the most popular items rather than the most relevant ones to users. It is one of the important factors affecting fairness and has serious consequences for multiple stakeholders in recommendation systems. Accurately identifying popularity bias through scientific quantitative methods is of great theoretical and practical value for assessing the bias problems existing in current recommendation algorithms, helping to optimize the system and realizing trustworthy artificial intelli⁃ gence. [Method/process] Through the comparative analysis, the mainstream popularity bias measurement metrics in the current recommendation system field are compared. Based on this, a multidimensional measurement metrics frame⁃ work for discovering popularity bias in recommendation systems was constructed, and an empirical analysis was carried out. [Result/conclusion] From the six dimensions including diversity, personalization, user satisfaction, fairness, longterm benefits, and overall performance, the measurement method of popularity bias in personalized recommendation systems is clarified. The empirical results show that the measurement method has a certain degree of advancement in terms of wide coverage of indicators, high measurement accuracy, and strong scientific practice
  • Dai Yanqing, Liu Zhenyu
    Information and Documentation Services. 2024, 45(2): 105-112. https://doi.org/10.12154/j.qbzlgz.2024.02.01
    [Purpose/significance] The article explores the relationship between the supply subjects of the new public reading space from the perspective of symbiosis theory, and provides a new perspective for optimizing the relationship between the supply subjects. [Method/process] The article firstly clarifies the applicability of symbiosis theory to the study of inter-subject relationships in the supply of new public reading space from the three elements of symbiosis unit, symbiosis mode and symbiosis environment, and then analyzes the current situation of inter- subject relationships in the supply of new public reading space in Hu′nan Province by using the fieldwork method and the in-depth interview method. [Result/conclusion] The study found that at present, there are problems such as different interests of supply subjects among supply subjects of new public reading space, insufficient collaboration and interaction among supply subjects, and insufficient support of policies and cultural environment. Finally, solution paths such as optimizing symbi⁃ otic units, improving symbiotic modes and cultivating symbiotic environments are proposed to address these problems.
  • Zhang Xiaoyue
    Information and Documentation Services. 2024, 45(3): 60-69. https://doi.org/10.12154/j.qbzlgz.2024.03.006
    [Purpose/significance] Generation Z (Gen Z) users account for more than half of China’s social media us⁃ ers. Their social media culture characteristics including (1) meme as a language,(2)leveraging the technology to cope with the negative influences that social media platforms posed,(3)Finsta culture. Understanding Gen Z users’informa⁃ tion posting behaviors in social media, can provide empirical references for understanding their preferences on their us⁃ age and intentions of Internet activities. [Method/process] Through theoretical sampling, semi-structured interviews were conducted among 12 Gen Z users who had both primary and secondary accounts on the same social media plat⁃ form. Based on grounded theory, the transcript of the interviews was analyzed. Finally, 6 core categories are identified, namely, Gen Zs’use purpose on social media, privacy cognition, interpersonal relationships cognition, information re⁃ ceiver cognition, spaces’boundaries setting on social media, and social media information posting behaviors. The rela⁃ tionships among the 18 specific categories and the 3 transformation paths of users’migration were discussed. [Result/ conclusion] Gen Z users“social disconnections”“emotionexpressionandself- emotion regulation”,and“self- develop⁃ ment”usage needs on social media promote their resetting on spaces within same social media platform. Such informa⁃ tion practice creates and enhances Gen Z users’new cognition on online interpersonal interaction that is“Secondary Account as Privacy”. Based on such cognition, Gen Z users can redefine the boundaries of“privacy space”on social media, by controlling the posted information’s scope, content’s context, and frequencies. Based on that, this paper dis⁃ cusses the user experience optimization service approaches, from the perspective of the platform and users.
  • Zheng Rong, Gao Zhihao, Wang Xiaoyu, Wang Shengwen, Wei Mingzhu
    Information and Documentation Services. 2024, 45(2): 86-96. https://doi.org/10.12154/j.qbzlgz.2024.02.010
    [Purpose/significance] In the era of comprehensive digital transformation and value release of data ele⁃ ments, data security governance has become extremely important. Therefore, focusing on the issue of industrial data se⁃ curity governance in complex information environments and exploring and proposing a complete industrial data securi⁃ ty governance system framework will help to reduce the risks of industrial data throughout the supply, circulation, and use processes, and promote the effective release of industrial data value and the implementation of industrial digitiza⁃ tion. [Method/process] On the basis of literature research and comparative analysis, this article defines the connota⁃ tion of industrial data security governance in complex information environments, uses blockchain, privacy computing, and data lake technology to build a underlying technical architecture, proposes administrative measures for security governance of industrial data supply, circulation, and usage ends, and constructs a framework for industrial data securi⁃ ty governance system with "core elements technical architecture administrative measures" as the core. [Result/conclu⁃ sion] This article systematically proposes industrial data security governance issues, governance methods, and system architecture in complex information environments. Taking the artificial intelligence industry as an example, while veri⁃ fying the feasibility of the governance system framework, it also elaborates on the operational process and guarantee strategies of the industrial data security governance system, providing guidance for effectively solving data security is⁃ sues throughout the entire process of industrial data elements in complex information environments.
  • Tong Zehua, Chen Zhaojuan, Xu Haiyun, Xue Xiaona, Han Chunhua,
    Information and Documentation Services. 2024, 45(3): 18-30. https://doi.org/10.12154/j.qbzlgz.2024.03.002
    [Purpose/significance] Data pollution, data risks, data barriers and other data quality concerns affect the pace of scientific innovation of researchers, research on issues such as quality control of scientific research big data is imminent, the state, the community are actively exploring research on the quality control of scientific research big data. [Method/process] The study shows that the evolutionary game model of research big data quality control is composed of three parties: research big data providers, research big data consumers and research big data regulators, and the evo⁃ lutionary and stable strategies of the three parties of the game are derived through model analysis and simulation, and then the roles of research big data quality control are analyzed, and the principles of quality control are given, and final⁃ ly the four-in-one research big data quality control implementation strategy system of "base-wing" phase optimization strategy, "responsive-alliance" control strategy, whole process technology integration strategy, and talent-platform du⁃ al-drive linkage strategy is proposed. [Result/conclusion] The study shows that the evolutionary game model of scien⁃ tific research data quality control is composed of three parties: scientific research data providers, scientific research da⁃ ta consumers and scientific research data regulators, and the evolutionary stabilization strategies of the three parties are derived through model analysis and simulation. Furthermore, the role positioning of quality control subject of scientific research big data was analyzed. Finally, we propose a four-in-one research big data quality control strategy system, in⁃ cluding "base-wing" optimization strategy, "responsive-alliance" control strategy, whole process technology integra⁃ tion strategy, and talent-platform dual drive strategy. Keywords: scientific research big data quality control
  • Li Jiaxuan, Chu Jiewang
    Information and Documentation Services. 2024, 45(4): 53-63. https://doi.org/10.12154/j.qbzlgz.2024.04.006
    [Purpose/significance] Digital intelligence empowerment provides a new knowledge generation logic for re⁃gional knowledge innovation, which not only accelerates the knowledge flow within the system, but also improves the de⁃gree of knowledge coupling between regions. Exploring the new evolutionary logic and knowledge generation capability of the knowledge ecosystem empowered by digital intelligence can improve the level of regional knowledge innovation and knowledge generation capacity in China. [Method/process] According to the dissipative structure theory, the Brus⁃selator model was translated and applied to the digital intelligence knowledge ecosystem, and the evolution process of the digital intelligence knowledge ecosystem was analyzed. Then, the regional knowledge input-knowledge generation ability index under the empowerment of digital intelligence is proposed, and the empirical analysis of the data is used to draw corresponding conclusions. [Result/conclusion] It is found that the knowledge ecosystem has new dissipative steady-state characteristics under the empowerment of digital intelligence. At the same time, driven by digital intelli⁃gence technology, the composition, evolution and knowledge generation ability of the knowledge ecosystem have under⁃gone significant changes.
  • Fu Yu, Cao Yi′nan, Wang Qiang
    Information and Documentation Services. 2024, 45(1): 55-67. https://doi.org/10.12154/j.qbzlgz.2024.01.005
     [Purpose/significance] In the Internet landscape, multimodal User-Generated Content (UGC) comprising images and text on mobile social media has emerged as a crucial information source influencing users' decision-mak⁃ ing. However, existing studies on user information adoption have analyzed multimodal content such as images and text in a piecemeal fashion, leading to a lack of clarity regarding the comprehensive influence mechanism of multidimen⁃ sional UGC features, especially fusion features, on user information adoption. [Method/process] This study employs Xiaohongshu, a representative experience-sharing mobile social media platform, as the research object. We further im⁃ prove the information analysis method by utilizing NLP and CV technologies. Specifically, we propose a multidimen⁃ sional feature measurement method for multimodal UGC, which captures both images and text's deep, shallow, and fu⁃ sion features. Furthermore, we develop an econometric model to investigate the influence mechanism of multidimen⁃ sional features on user information adoption. [Result/conclusion] The results indicate that the impact of two image-tex⁃ tharmony features on user information adoption is significantly higher than that of image or text features in isolation.Ad⁃ ditionally, the influence of shallow features is greater than that of deep features; the key features affecting user informa⁃ tion adoption exhibit moderating effects; and the specific influence mechanisms differ in the three types of scenarios: nature, object, and others. The findings of this study provide crucial insights for facilitating high-quality UGC creation and effective information adoption in mobile social media.
  • Huo Chaoguang, Han Yueji
    Information and Documentation Services. 2024, 45(2): 38-47. https://doi.org/10.12154/j.qbzlgz.2024.02.005
    [Purpose/significance] Scholars are the main body of interdisciplinary research. The measurement of schol⁃ ar’s interdisciplinary is an important part of interdisciplinary research and an effective support for talent management and technological innovation. Because of the shortcomings of the existing research on the interdisciplinary measure⁃ ment of scholars from the aspects of scholars′ publications and citations, this paper proposes to measure scholars' inter⁃ disciplinary collaboration from a new perspective. [Method/process] Based on cross-language alignment of authors and integration of Chinese and English research, scholars' disciplines are identified according to China's discipline cat⁃ alogs and departmental setting system, and the interdisciplinary collaboration network of scholars are constructed. This paper proposes three diversity indicators of scholars' interdisciplinary collaboration: variety, balance, and disparity, and two cohesion indicators of scholars' interdisciplinary collaboration: intensity and density. Taking Renmin Universi⁃ ty of China as a case, after connecting the Chinese and English information of the authors, the interdisciplinary collabo⁃ ration network of scholars in Renmin University of China is constructed to measure the scholars’interdisciplinarity. [Result/conclusion] The results show that this indicator system can effectively measure scholars’interdisciplinary col⁃ laboration. The measurement indicator system proposed in this paper is an effective supplement to interdisciplinary measurement research. It has certain application value for understanding the characteristics of scholars’interdisciplin⁃ ary collaboration and provides a scientific reference for the development of disciplinary development and the manage⁃ ment of interdisciplinary collaboration.
  • Chen Yanfang, Zhou Xiaoying, Pei Junliang
    Information and Documentation Services. 2024, 45(1): 35-45. https://doi.org/10.12154/j.qbzlgz.2024.01.003
    [Purpose/significance] Design a multi-dimensional and multi-level comprehensive governance framework for online health rumors to curb the spread and misuse of online health rumors. [Method/process] By abstracting the dissemination process of online health rumors and the blocking methods at each stage of dissemination, the main stages and key points of online health rumors governance are summarized and analyzed. Then, following the characteristics of health rumors generation and dissemination, each stage's governance objectives, governance targets, and governance measures are analyzed in detail, and a closed-loop governance framework is derived accordingly. [Result/conclusion] The governance framework mainly includes one core technology module (content identification technology model) and three central platforms modules (the platform for the online media, the platform for the rumor-refuting experts and the platform for sharing rumor-refuting information), which basically covers the core issues that need to be considered in current online health rumors governance. It can serve as the top-level design foundation and action guide for health ru⁃ mors governance activities.