Most accessed

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • Wang Bing, Shi Zhiyong, Wang Yuanjie
    Information and Documentation Services. 2024, 45(5): 13-21. https://doi.org/10.12154/j.qbzlgz.2024.05.002
    [Purpose/significance] Data-intelligence empowerment is a common concern and focus of both the aca⁃demic and practical communities in today’s data-intelligence era. However, no consensus has been reached on what data-intelligence empowerment is. Therefore, there is an urgent need to trace back and clarify the concept of data-in⁃telligence empowerment and to provide a comprehensive interpretation of data-intelligence empowerment, so as to lay the foundation for data-intelligence empowerment research and practice. [Method/process] Based on the theory of da⁃ta-intelligence and the theory of empowerment, the concepts of data-intelligence and empowerment were traced and ex⁃plained respectively according to the basic logic of word formation. On this basis, the two concepts of data-intelligence and empowerment were refuted, and the sources, meanings and perspectives of data-intelligence empowerment were analyzed. [Result/conclusion] The research shown that data-intelligence empowerment is an interactive synergy. It is based on the premise of mutual authorization between the enabler, the empowerment object and the data-intelligence tool. It is the process of generating big data through digitalization and intelligentization means, then mining and extract⁃
    ing intelligence from big data and pointing to intelligence applications. Its purpose is to stimulate and promote a certain or a series of capabilities of the empowerment object to achieve from nothing to something, from something to something good, and then expand the value creation space. The perspectives of data-intelligence empowerment mainly include eight aspects: connection, aggregation, openness, adaptation, intelligence, precision, dynamics, and synergy.
  • Peng Xun , Feng Yongcai
    Information and Documentation Services. 2024, 45(5): 92-99. https://doi.org/10.12154/j.qbzlgz.2024.05.010
    [Purpose/significance] As a new form of learning under the digital background of the new era, the future learning center of university libraries has adapted to the paradigm of higher education and the requirements of educa⁃ tional modernization. It is an important way for university libraries to achieve functional and role transformation. [Meth⁃od/process] Based on the connotation characteristics and functional positioning of future learning centers in university libraries, a detailed analysis was conducted on the construction examples of future learning centers in four domestic uni⁃versity libraries through literature reading and official website information. [Result/conclusion] The study found that the construction of future learning centers in sample cases is based on the practice of educational concepts, always with technology as the foundation and spatial construction as the focus. Drawing on its experience, the construction strategy of future learning centers in university libraries is summarized.
  • Di Liya
    Information and Documentation Services. 2024, 45(4): 96-103. https://doi.org/10.12154/j.qbzlgz.2024.04.010
    [Purpose/significance] The deep opening of government data indicates that China will enter the stage of open and utilization of government data based on user demand, high value and high quality. [Method/process] The pa⁃per adopts literature research and comparative research methods to explain and analyze the meaning, background, char⁃acteristics, and development strategies of deep openness of government data from the perspective of the phased develop⁃ment of open government data in China. [Result/conclusion] It is proposed to further promote the supply-side reform of open government data, actively explore the effective circulation mechanism of public data primary processing data factors, optimize the realization method of public data property rights structural separation and right allocation to pro⁃mote the strategy of deepening open government data in China.
  • Wu Dawei, Lian Jingwen, Zhao Yuxiang, Jia Mingxia
    Information and Documentation Services. 2024, 45(4): 64-75. https://doi.org/10.12154/j.qbzlgz.2024.04.007
    [Purpose/significance] With the exponential growth of work-related data, digital hoarding has become a typical irrational behavior in the workplace. By clarifying the influencing factors and mechanisms of digital hoarding be⁃havior in this context, this study aims to provide recommendations for optimizing existing research paradigms and im⁃plementing targeted coping strategies. [Method/process] Based on the I-PACE model, this research explores the influ⁃encing factors of digital hoarding behavior in the workplace across seven dimensions: individual characteristics, organi⁃zational pressure, technostress, coping styles, cognitive biases, emotional and cognitive responses, and lack of self-con⁃trol. Additionally, it analyzes the conceptual implications and behavioral consequences. Through normative analysis,this study elucidates five influencing and action mechanisms: individual bias mechanisms, emotion intensification
    mechanisms, cognitive dissonance mechanisms, compensatory loss of control mechanisms, and behavioral consequence mechanisms, proposing five normative propositions accordingly. [Result/conclusion] This study constructs a frame⁃work for the influencing mechanism of digital hoarding behavior in the workplace based on the I-PACE model. Future research prospects and coping strategies are suggested for different mechanisms. The findings aim to enrich research on digital hoarding behavior and optimize information management practices in the workplace.
  • Zhao Ruihan , Chen Junlei, Zhang Xiaoyue
    Information and Documentation Services. 2024, 45(5): 51-63. https://doi.org/10.12154/j.qbzlgz.2024.05.006
    [Purpose/significance] High quality governance of public data will effectively promote the modernization of national governance capabilities, and it plays an important leading role in comprehensively promoting the reform of the data production element market and empowering the high-quality development of the digital economy. To advance the development of public data governance, this paper explores more in the lens of policy tools and data life cycle col⁃laboratin. Such perspective will make up for the shortcomings of existing studies in the perspective of collaborative anal⁃ysis. [Method/process] From the perspective of the full data life cycle governance of public data, this study analyzes 104 policy texts promulgated at the provincial and municipal levels in China. This study will contribute to improve pub⁃lic data governance policies and data governance system design. [Result/conclusion] There are problems in public data governance policies, such as the need to enhance the leadership of governance entities, the lack of standardization and innovation in governance objects, and the need to improve the execution of governance tools. Therefore, it is necessary to broaden and deepen the field of public data governance in policy-making activities, strengthen the governance of the
    whole life cycle of public data, and strengthen collaboration to enhance the operability and effectiveness of policies.
  • An Xiaomi, Long Zhiqi, Kuang Miaomiao
    Information and Documentation Services. 2024, 45(6): 75-83. https://doi.org/10.12154/j.qbzlgz.2024.06.009
    [Purpose/significance] This study aims to build a theoretical framework for large model data governance from a standardization perspective, covering multidimensional and multifaceted elements. This framework seeks to fill in current gaps in specialized research and standardization research on large model data governance, which will enrich theoretical research on large model data governance and provide implications to practices. [Method/process] By holis⁃tic approach to content analysis and expert consultation, this study systematically reviews and analyzes relevant stan⁃dards and representative Chinese and English journal literature, iteratively refining and constructing a theoretical framework for large model data governance. [Result/conclusion] The theoretical framework for large model data gover⁃nance covers multiple dimensions, including large model data quality management, large model data management, large model data resource management, large model data asset management, and large model data risk management. These five dimensions are structured along with the logical progression of "fundamental premises - execution methods - im⁃plementation pathways - core objectives - intrinsic guarantees",forming a comprehensive theoretical framework.
  • Xu Yongjun, Xiong Chunlan, Zhang Chenglong, Lu Sijia
    Information and Documentation Services. 2025, 46(1): 13-20. https://doi.org/10.12154/j.qbzlgz.2025.01.001
    [Purpose/significance] On 25 April 2024, the Renmin University of China launched the Philosophy and So⁃cial Sciences Preprint Server (PSSXiv), the first preprint server in Chinese philosophy and social sciences. It has pro⁃found significance in advancing the construction of the“Three Systems”of Philosophy and Social Sciences with Chi⁃nese Characteristics and China’s Independent Knowledge System. [Method/process] Through systematic analysis,this paper summarises the valuable experience of constructing China’s first preprint platform in philosophy and social sciences and suggests a future outlook for its construction. [Result/conclusion] PSSXiv is operated by a specialized ed⁃itorial and publishing institution that provides full-chain services and full-version academic exchanges across the en⁃
    tire philosophy and social sciences field. It actively advocates cooperation with journals and strives to support the devel⁃opment of a collaborative innovation ecosystem. PSSXiv aims to establish itself as a world-class preprint server for phi⁃losophy and social sciences with Chinese characteristics. PSSXiv plans to achieve this by establishing disciplinary subservers,strengthening bilingualism, integrating intelligent technology, the cohesion of academic communities, and con⁃structing a natural evaluation model to diversify its content, expand its international presence, and enhanceits synergyand academic credibility.
  • Liu Chunyan, Qi Xuechen, Ma Haiqun
    Information and Documentation Services. 2024, 45(5): 22-31. https://doi.org/10.12154/j.qbzlgz.2024.05.003
    [Purpose/significance] The overall national security concept urgently needs to enhance big data security capabilities, revealing the multiple paths under the coupling of multiple influencing factors of big data security capabili⁃ties. This not only helps to promote the rational utilization and management of regional data resources, enhance regional big data collaborative security capabilities, but also helps to build a national security guarantee system. [Method/pro⁃cess] Based on an improved TOE theoretical framework, a framework for influencing factors of big data security was constructed from four aspects: technical level, organizational capability, environmental factors, and data elements. 31 provinces (cities, autonomous regions) were selected as research objects, and a combination of Structural Equation Mod⁃eling (PLS-SEM) and Qualitative Comparison (QCA) was used to explore the relationships between various factors and the path of China's big data security capability from a configuration perspective. [Result/conclusion] The closer the re⁃
    lationship between technical level, organizational ability, environmental factors, and data elements, the higher the level of big data security capability; information infrastructure, innovation capability, organizational governance and securi⁃ty, economic level, education level, data resource construction, and data element circulation cannot be the necessary conditions for achieving big data security capabilities alone, and they need to be combined and matched with each oth⁃er; the configuration paths for high-level data security capabilities include organization data balance type, data gover⁃nance element circulation type, data resource construction dominant type, and data element circulation dominant type.The configuration paths for non high-level data security capabilities include technology environment data comprehen⁃sive deficiency type, data foundation deficiency type, technology resource deficiency type, and technology deficiency type; China should follow the guiding ideology of the overall national security concept, start from the advantages of each region, combine the configuration perspective of each region, and choose a path suitable for the development of big data security capabilities in each region.
  • Zhang Yuhan, Chen Gang
    Information and Documentation Services. 2024, 45(4): 5-13. https://doi.org/10.12154/j.qbzlgz.2024.04.001
    [Purpose/significance] On the basis of clarifying the historical development process of information science theory in China, explore the two dimensions of modernization development of information science theory in the new era.[Method/process] This article takes literature content analysis and autonomous theory construction as the main re⁃search methods, supported by some high-quality information science theory literature, governance theory literature,Marxist classic works, and new era party and government decision-making deployment documents publicly published in China. it analyzes and points out the areas that urgently need to be strengthened in the current development of infor⁃mation science theory, and proposes targeted development strategies.[Result/conclusion] The research results indicate that significant achievements have been made in the theoretical research of information science in China, but there is still a need for continuous improvement in terms of local adaptability, thinking mode construction, discourse system connection, theoretical timeliness and practicality. We can try to use the self-built governance concept system and the shaping of security concepts under the overall national security perspective as two dimensions to guide the moderniza⁃tion of information science theory, providing comprehensive theoretical scientific, contemporary, and authoritative sup⁃port. On the basis of strengthening the current situation and solving problems, we can further expand the perspective of information science theory reproduction and deepen our understanding and research of intelligence practice. And it is also necessary to promote interdisciplinary research in information science based on independent professional estab⁃lishment.

  • Information and Documentation Services. 2025, 46(1): 5-12.
  • Li Yifei, Wang Xiezhou
    Information and Documentation Services. 2024, 45(6): 59-65. https://doi.org/10.12154/j.qbzlgz.2024.06.007
    [Purpose/significance] False self-disclosure behavior can have a direct and significant negative impact on audience's cognition, emotion and decision-making, and it is necessary to explore its recognition mechanism and cri⁃sis. [Method/process] Based on the type of expected reward by the participants, the paper analyzes how the subject us⁃es the digital body to give the audience a sense of mimetic intimacy in order to pursue online social capital; how the au⁃dience performs emotional labour to promote the subject's dependence in order to realise virtual symbiotic relation⁃ships; how the media uses algorithmic recommendations to intervene in the audience's information reception sources,guide the subject's information content production order, and strengthen the psychological contract to stimulate the sub⁃ject's content production volume in order to gather private traffic on the platform production volume. [Result/conclu⁃sion] For the crises of subject identity confusion, audience emotional interpretation, and environmental false consen⁃
    sus, it is appropriate to realize the dissolution of false self-disclosure crisis from three aspects: the subject establishes situational self-consciousness, the audience maintains the boundaries of emotional expression, and the media imple⁃ments the justice of information distribution.
  • Yao Yifan, Hu Feng
    Information and Documentation Services. 2025, 46(2): 5-15. https://doi.org/10.12154/j.qbzlgz.2025.02.001
    [Purpose/significance] To effectively respond to diversified, concealed, high-intensity, large-scale, and persistent cyberspace security threats, it is imperative to construct an integrated, comprehensive, and intelligent cyber⁃space security intelligence service architecture. [Method/process] Using the enhanced Hall model as the analytical framework and adhering to the principles of centering on cyberspace security and security intelligence as a service, this study constructs a cyberspace security intelligence service architecture and deeply analyzes its operating mechanism.[Result/conclusion] The cyberspace security intelligence service architecture consists of three components: process submodule, logic submodule, and cognition submodule. The service processes cater to three types of demands: cyber⁃space security perception, cyberspace security judgment, and cyberspace security execution. The service work reflects the operating logic of " attack scenario traceability-event correlation identification-crisis response escalation". The
    cognition of cyberspace security intelligence services is mainly embodied in three aspects: value consensus, technical support, and capability guarantee. The construction of the cyberspace security intelligence service architecture can pro⁃ vide a reference for intelligence service work in China's cyberspace security guarantee system.
  • Chen Rui, Jiang Yihui
    Information and Documentation Services. 2024, 45(4): 87-95. https://doi.org/10.12154/j.qbzlgz.2024.04.009
    [Purpose/significance] In current research, there is less focus on the governance issues of training data for generative artificial intelligence. However, there are numerous risks in the lifecycle of training data that cannot be ig⁃nored and urgently need effective governance. [Methods/process] This paper, based on the demonstration that training data is the core driving force of generative artificial intelligence, uses the theoretical model of the data lifecycle to com⁃prehensively summarize the possible risk patterns in the training data lifecycle. Then, it analyzes the causes of related risks from the perspectives of the intrinsic characteristics of the training data, ecological factors, and operational factors of generative AI developers. [Results/conclusion] It can be found that the fragmented nature and biases of the data are the starting points for risk occurrence; the ecological imbalance of the data is an external cause leading to risk; mean⁃while, the "black box" training data, biased data labeling, and lax data desensitization are internal causes of risk occur⁃rence.Therefore, targeting the characteristics of training data, a comprehensive risk governance scheme that encompass⁃es legal, market, community norms, and frameworks can be constructed using the "compassionate dots" framework.
  • Li Yujia , Ran Xiaoya, Liu Chang
    Information and Documentation Services. 2025, 46(2): 51-60. https://doi.org/10.12154/j.qbzlgz.2025.02.006
    [Purpose/significance] The rapid development of generative artificial intelligence has propelled changes in user interaction behaviors and cognitive patterns. This study focuses on the differences in users' interactive behaviors with generative artificial intelligence and their evaluations of system performance under tasks with different levels of cognitive complexity. [Method/process] This study employs the user experimentation method and uses the Kruskal-Wallis test to explore the impact of task cognitive levels on user interaction behaviors and system evaluations. It also employs thematic analysis to induce new metrics for user evaluations of generative AI. [Result/conclusion] In terms of interaction behavior, during the completion of tasks at different cognitive levels, the duration of information usage by us⁃ers remains almost unchanged, while it is always the duration of information acquisition that varies. Tasks of evaluation and creation take the most time, involve the most question-and-answer rounds, and have the shortest average response
    length. In the answers to application and analysis tasks, the total copy ratio is lower than that of memory, understanding,evaluation and creation tasks. In terms of system evaluation, tasks of evaluation and creation receive the poorest overall performance. Regarding new evaluation metrics, the study has induced 6 major categories and 17 minor categories of new metrics. This paper supplements user-centered evaluation metrics for generative AI at the theoretical level and helps intelligent systems understand user behavioral characteristics under different task types at the practical level, pro⁃viding more targeted information services.
  • Lou Chao, Shen Wenjun
    Information and Documentation Services. 2024, 45(4): 44-52. https://doi.org/10.12154/j.qbzlgz.2024.04.005
    [Purpose/significance] Generative artificial intelligence technologies represented by ChatGPT can partici⁃pate in knowledge production and data value creation, which is beneficial for promoting the diversification of knowl⁃edge production entities, enhancing the personalization and diversity of output,facilitating the circulation and sharing of data information, and achieving the collaboration of production structures. The discussion related to the practical mechanism and the legal mechanism in this process will be necessary, which can provide the sufficient institutional guarantee for the effective implementation of this process. [Method/process] The premise of arguing ChatGPT partici⁃pating in knowledge production and legal mechanism lies in the clarification of problems and hidden dangers caused by it, the involvement of ChatGPT in knowledge production may weaken the creativity and autonomy of humans as the main creators, undermine the authenticity of relevant contents, impact the basic value of data, disrupt the existing knowledge production environment, and interfere with effective human control over the effective order of knowledge dis⁃semination, even pose a threat to the dominant position of mainstream ideologies. [Result/conclusion] In this regard,there is a need to establish a systematic legal mechanism for ChatGPT's participation in knowledge production,estab⁃lish the legal regulatory system based on the compliance of principles of the value rationality, improve the full process administrative supervision and judicial remedies, and form the collaborative governance pattern that all social entities participate commonly.
  • Xia Lixin, Chen Huan, Li Xueman, Zhai Shanshan
    Information and Documentation Services. 2024, 45(5): 73-81. https://doi.org/10.12154/j.qbzlgz.2024.05.008
    [Purpose/significance] Under the background of increasingly rich multimodal information resources, cross modal information organization has important value for the sequential storage and sharing of intangible cultural heritage information resources. This paper proposes a method of constructing intangible cultural heritage cross modal knowl⁃edge graph for image and text data. [Method/process] This paper combined multimodal information extraction and knowledge graph technology to reorganize the knowledge of intangible cultural heritage digital resources. Firstly, the schema layer of intangible cultural heritage cross modal knowledge graph is designed from the content and modal di⁃mensions of intangible cultural heritage digital resources to provide top-level design for graphic data organization. Sec⁃ondly, this paper discusses the knowledge extraction scheme of image and text resources in the field of intangible cultur⁃al heritage, obtains the intangible cultural heritage knowledge in the mode of image and text, and verifies the effective⁃ness of the knowledge extraction method. Finally, a series of cross modal knowledge linking methods for different scenes are used to extract the cross-modal relationships between intangible cultural heritage graphic entities. [Result/
    conclusion] Taking the intangible cultural heritage project of Chu opera as an example, the cross-modal knowledge graph of Chu opera was constructed through the combination of multiple data sources and technologies, which verified the feasibility of the construction method proposed in this study, and had a certain reference value for the digital con⁃struction of intangible cultural heritage.
  • Huang Guobin, Liu Jingyi
    Information and Documentation Services. 2024, 45(6): 5-12. https://doi.org/10.12154/j.qbzlgz.2024.06.001
    [Purpose/significance] The construction and development of preprint platforms for philosophy and social sciences in China, oriented towards facilitating the establishment of an independent knowledge system in these fields,are crucial to the inheritance and dissemination of China's excellent culture. This article aims to provide development strategies for China's preprint platforms in philosophy and social sciences to address the numerous challenges they face. [Method/process] This article intends to use online survey research and comparative analysis to systematically analyze the current development status, main characteristics, primary issues, and underlying causes of China's preprint platforms in philosophy and social sciences. Based on this analysis, several measures will be proposed to efficiently ad⁃vance the development of these platforms. [Result/conclusion] With the principle of effectively balancing publication speed and academic quality, key measures are proposed: introducing a reviewed preprint mechanism to effectively rec⁃oncile the conflict between publication speed and academic quality, supporting the publication of preprint-associated
    research data to enhance the verifiable persuasiveness of key arguments in preprints, and offering registered reports to promote the media integrity layout of preprint platforms for philosophy and social sciences in an open science environ⁃ment. These measures strive to provide feasible decision-making references for efficiently advancing the development of China's preprint platforms in philosophy and social sciences at this stage.
  • Wu Yingqiang, Zhang Maping, Wen Lijun, Li Baiyang
    Information and Documentation Services. 2025, 46(2): 16-25. https://doi.org/10.12154/j.qbzlgz.2025.02.002
    [Purpose/significance] Overcoming the "temporal blind spot", this study explores the multifactor linkage effects for enhancing the utilization level of Open Government Data (OGD) platforms in the temporal dimension, aiming to provide theoretical contributions and practical value to research on government data openness. [Method/process]Employing the dynamic QCA method, based on panel data from 29 municipal platforms (2019-2023), this study analyz⁃es the temporal trends of local government OGD platform utilization levels, identifying condition configurations consid⁃ering both spatial and temporal factors. [Result/conclusion] There are no necessary conditions affecting OGD platform utilization levels; rather, the utilization level is influenced by multiple factors acting together, not controlled by a single factor. In the sufficiency analysis of condition combinations, three configuration paths are identified: platform driven by fiscal support and data resource construction, government-led platform construction and public demand-driven, gov⁃
    ernment-led platform and data resource-driven. The level of data platform construction is the core factor promoting high utilization levels of OGD platforms. The configuration analysis results show no apparent temporal effects but exhib⁃it case effects resulting from certain spatial differences.
  • Wang Kangqing, Xie Xiaozhuan
    Information and Documentation Services. 2024, 45(5): 5-12. https://doi.org/10.12154/j.qbzlgz.2024.05.001
    [Purpose/significance] The intelligence ethics framework comprises the value criteria and ethical norms that should guide intelligence activities. It serves as the foundation for assessing whether intelligence activities conform to ethical standards. Exploring the development and evolution of the intelligence ethics framework and its underlying logic can provide a theoretical basis for its establishment. [Method/process] Focusing on academic literature, this study employs the method of academic history to chronologically review the developmental trajectory of the intelligence ethics framework and analyze the dynamics and logic behind its evolution. [Result/conclusion] The study reveals that the intelligence ethics framework has undergone significant developmental stages, including the "primitive theory of un⁃ethical intelligence, the justice intelligence theory in the anti-terrorism era, and the upgraded stepwise intelligence eth⁃ics framework in the big data era." It has evolved into a theory of just intelligence that encompasses ethical principles such as "just cause, lawful authority, legitimate purpose, proportionality principle, rationality principle, and alignment with objectives." The fundamental logic driving the evolution of the intelligence ethics framework is the balancing act
    between the security interests of survival and development and the rights to individual freedom and privacy. Among var⁃ious driving factors, the security situation, threat perception, and emerging technologies exert the most direct and pro⁃found influence.
  • Li Jiaxuan, Chu Jiewang
    Information and Documentation Services. 2024, 45(4): 53-63. https://doi.org/10.12154/j.qbzlgz.2024.04.006
    [Purpose/significance] Digital intelligence empowerment provides a new knowledge generation logic for re⁃gional knowledge innovation, which not only accelerates the knowledge flow within the system, but also improves the de⁃gree of knowledge coupling between regions. Exploring the new evolutionary logic and knowledge generation capability of the knowledge ecosystem empowered by digital intelligence can improve the level of regional knowledge innovation and knowledge generation capacity in China. [Method/process] According to the dissipative structure theory, the Brus⁃selator model was translated and applied to the digital intelligence knowledge ecosystem, and the evolution process of the digital intelligence knowledge ecosystem was analyzed. Then, the regional knowledge input-knowledge generation ability index under the empowerment of digital intelligence is proposed, and the empirical analysis of the data is used to draw corresponding conclusions. [Result/conclusion] It is found that the knowledge ecosystem has new dissipative steady-state characteristics under the empowerment of digital intelligence. At the same time, driven by digital intelli⁃gence technology, the composition, evolution and knowledge generation ability of the knowledge ecosystem have under⁃gone significant changes.
  • Fu Shaoxiong, Cheng Qi
    Information and Documentation Services. 2025, 46(2): 61-69. https://doi.org/10.12154/j.qbzlgz.2025.02.007
     [Purpose/significance] Short videos have gradually become one of the primary channels for the public to ob⁃tain information. Through short videos, various types of information can rapidly disseminate among users, including a large number of false short videos. Many of false short videos are adopted or shared by users, it may harm them and dis⁃turb the online information environment. Therefore, this study explores the factors influencing the dissemination of false short videos, in order to provide references for the governance of false short video and the optimization of online in⁃formation ecology. [Method/process] To explore the influence of content sentiment of false short video on user emotion and false short video dissemination effect, this study employed user sentiment as a mediator and content relevance as a moderator, constructed the research model based on the CAC Model and ELM Model, and then collected 1007 effective false short videos from the TikTok, extracted image, text and audio sentiment from these false short videos based on text
    sentiment analysis, image recognition, and other technologies. As such, the study verified the moderating effect of con⁃tent relevance. [Result/conclusion] Images, text and audio sentiment of false short videos exert significant positive ef⁃fects on users' emotions in different degrees, while the author's avatar and background music exert no significant effect on users' emotions. User emotion exerts a significant negative effect on dissemination effect of false short videos, and partly plays a mediating role between the content sentiment of false short video and its dissemination effect. Content rel⁃evance significantly moderates the influence of the negative impact of user emotion on false short video dissemination effect.
  • Xue Xiang, MaHaiyun, Zhao Yuxiang, Zhu Qinghua
    Information and Documentation Services. 2025, 46(1): 78-89. https://doi.org/10.12154/j.qbzlgz.2025.01.008
    [Purpose/significance] The increasing prevalence and pernicious impact of misinformation on social media present a formidable challenge for which algorithms and experts alone are increasingly inadequate. Research has dem⁃onstrated that proactive individual verification of information can effectively combat misinformation. Therefore, it is im⁃perative to investigate strategies to boost social media users' intention to verify information before sharing it. [Method/process] Based on the theory of planned behavior, this study aims to construct a model on the factors that influence us⁃ers' intention to verify before sharing on social media. An empirical test was conducted to validate the proposed model and all assumptions. [Result/conclusion] The results indicate that five factors fundamentally influence users' verifica⁃tion intention before sharing on social media. Specifically, competency and awareness enhance perceived behavioral control, while awareness, discussion heterogeneity preference, and third-person perception increase attitudes, and per⁃
    ceived social support strengthens subjective norms. Furthermore, perceived behavioral control, attitudes, and subjec⁃tive norms strengthen verification intention before sharing. Subjective norms also indirectly promote verification inten⁃tion by promoting attitudes. However, perceived information overload negatively moderates the association between per⁃ceived behavioral control and verification intention before sharing. The findings deepen the understanding of users' health information verification behaviour and provide new insights for stakeholders in health misinformation gover⁃nance. 
  • Li Shanman, Yao Leye
    Information and Documentation Services. 2025, 46(1): 40-49. https://doi.org/10.12154/j.qbzlgz.2025.01.004
    [Purpose/significance] Starting from the analytical framework of actor-network theory, analyzing the datadriven model of smart elderly care around various scenarios will help us gain a deeper understanding of the infrastruc⁃ture of data-driven smart elderly care services and master its data-driven strategy to continuously promote the develop⁃ment of smart elderly care. [Method/process] Based on the actor-network theory, combined with the data value chain model and the concept of service scenario, the basic elements of data-driven smart elderly care services are analyzed.Starting from the three aspects of the physical space, interactive space and data space of the scenario, combined with lit⁃erature analysis, research interviews and domestic and foreign practical experience, the basic logic of data-driven smart elderly care services is deconstructed in the scenario. [Result/conclusion] The basic elements and translation
    process of the smart elderly care actor network demonstrate the infrastructure and logical path of data-driven smart el⁃derly care services. Among them, the basic elements of the smart elderly care actor network emphasize multi-dimen⁃sional interactive service scenarios, structured data activities, and heterogeneously coupled actors as the infrastructure of data-driven smart elderly care services; the translation process of the smart elderly care actor network focuses on the logical path of data-driven smart elderly care services, with the purpose of industry docking, platform empowerment,and data efficiency enhancement, centering on service integrators, service providers, service demanders, and the data collection, organization, circulation, and utilization activities they participate in, through processes such as problem identification, benefit granting, subject absorption, and goal mobilization, data drives smart elderly care services.
  • Zuo Min, Qiu Jiangnan
    Information and Documentation Services. 2024, 45(4): 34-43. https://doi.org/10.12154/j.qbzlgz.2024.04.004
    [Purpose/significance] In the context of generative AI, Online Knowledge Communities (OKC) have intro⁃duced a large number of bots embedded with AI algorithms, posing new challenges for developing human-bot collabora⁃tion patterns to better improve the performance of knowledge social construction. [Method/process] Collect humanbot collaboration network log data from 136 human users and 48 bot users in Wikipedia, and use grounded theory for multi case analysis. [Result/conclusion] The study establishes a human-bot collaborative knowledge social construc⁃tion model for OKC in generative AI contexts, revealing the mechanism of human-bot collaborative knowledge social construction, elaborating the effect of three basic task dependencies(flow,fit,sharing) and human-bot team resources re⁃quired for task execution on the formation of two human-bot collaboration patterns, automated assistance and enhanced assistance, as well as the important impact of these two human-bot collaboration patterns on the knowledge social con⁃
    struction performance.From the perspective of human-bot collaboration, the research enriched and developed the coor⁃dination theory and social constructivist theory, providing useful guidance for human collaborating strategies and knowl⁃edge social construction performance improvement strategies in generative AI contexts.
  • Ma Jing, Zhang Li
    Information and Documentation Services. 2024, 45(6): 13-20. https://doi.org/10.12154/j.qbzlgz.2024.06.002
    [Purpose/significance] To explore the innovative significance of preprints in academic communication,grasp the factors that influence the adoption of preprint academic communication models by the academic community,and provide a basis for promoting and optimizing the development of domestic preprint platforms. [Method/process]Through online research and case analysis, summarize the functions and features of major preprint platforms at home and abroad. On this basis, based on the theory of innovation diffusion, summarize the structural and cognitive factors that currently affect the further development of preprints. [Result/conclusion] It is recommended that preprint plat⁃forms strengthen communication and cooperation, and promote open science and preprint policies; establish an academ⁃ic committee system to unite diverse entities for collaborative development; develop academic service tools and embed them into online academic communication contexts; improve academic standards for preprints, enhance credibility and
    recognition.
  • Zhu Xiaofeng, Zhang Han, Hong Lei, Wu Jingxian
    Information and Documentation Services. 2024, 45(4): 14-23. https://doi.org/10.12154/j.qbzlgz.2024.04.002
    [Purpose/significance] The intelligence talent training chain oriented towards national strategy helps to re⁃construct the intelligence talent training model, promote the resonance between intelligence talent training and national strategy, and better meet the needs of national strategy for intelligence talents. [Method/process] Firstly, the historical changes of national strategy were sorted out, and the basic meaning and key links of the intelligence talent training chain were defined; Secondly, the basic logic of the training chain for national strategic intelligence talents was ana⁃lyzed; Subsequently, a theoretical model for the training chain of national strategic intelligence talents was constructed from the dimensions of subject, object, and content; Ultimately, a complete talent training chain from undergraduate and graduate students to leading talents will be established for different levels of national strategy implementation. [Re⁃sult/conclusion] The training chain for national strategic intelligence talents is essentially a symbiotic chain that em⁃powers and assists various entities in the formation of national strategies. It is a talent supply chain formed by continu⁃ously deepening and expanding the training objects in response to the development of national strategies. It is a learn⁃ing chain that matches the professional knowledge and capabilities of intelligence science with national strategies. The intelligence talent training chain, from undergraduate and graduate students to leading talents, is not only a process of continuously improving the quality of intelligence education, but also a process of constantly adapting, fitting and meet⁃ing national strategic needs.
  • Zhang Weidong, Li Songtao, Li Fengrui
    Information and Documentation Services. 2024, 45(6): 28-39. https://doi.org/10.12154/j.qbzlgz.2024.06.004
    [Purpose/significance] Government rumor refutation is widely recognized as an effective means to curb the spread of rumors, with social media users showing variability in their interaction with refutation information. This study,by analyzing the characteristics of individual users' interaction behaviors with government refutation information, iden⁃tifies the key factors and their impact on the information interaction effectiveness among user groups. It aims to further refine theories related to information interaction and provide theoretical guidance for the scientific refutation efforts of government departments. [Method/process] Based on the traditional cellular automata model and drawing on the SEIR model theory, this approach subdivides user groups according to the specific information states of individual us⁃ers. It quantitatively describes users' interaction states with refutation information and utilizes MATLAB R2022a for simulation. This process constructs a model of government rumor refutation information interaction behavior that incor⁃porates individual user differences. Furthermore, it analyzes important parameters of the model to identify key factors.[Result/conclusion] The effectiveness of social media users' interaction behaviors with government rumor refutation in⁃formation is primarily influenced by different government refutation interaction strategies, the removal rate of govern⁃ment refutation information, and the distribution patterns of refutation participants. Among these, when considering dif⁃ferent government refutation interaction strategies, comprehensive intervention strategies prove to be more effective than adjusting social distances and following opinion leaders. The lower the removal rate of government refutation infor⁃mation, the better the interaction effect of government refutation information. The distribution patterns of refutation par⁃ticipants can be broadly categorized into random, concentrated, and uniform types, with the random distribution of refu⁃tation participants yielding the best interaction effect with government refutation information.
  • Li Fei, Li Qipu
    Information and Documentation Services. 2024, 45(6): 93-101. https://doi.org/10.12154/j.qbzlgz.2024.06.011
    [Purpose/significance] The maturity of virtual digital human technology has brought new opportunities and challenges to the development of libraries. As a new type of active entity, virtual digital humans will be an indispens⁃able role for libraries in providing information services in the future, especially in the metaverse. This article, from the perspective of the information service ecosystem, deeply explores the construction and implementation path of the li⁃brary's virtual digital human service model under the background of the metaverse, aiming to provide a theoretical refer⁃ence for the future service construction of libraries. [Method/process] Based on the theories of information ecology and service ecology, this article conducts a systematic analysis of the various elements in the library's virtual digital hu⁃man information service ecosystem. Based on this analysis, a library virtual digital human information service model is constructed. Furthermore, the specific implementation path of this model is explored in-depth from six different dimen⁃sions. [Result/conclusion] This article provides a new theoretical framework and practical guidance for libraries to car⁃ry out virtual digital human services. It clarifies the role positioning and functions of various elements in libraries' provi⁃sion of virtual digital human services. At the same time, this article also provides useful references and insights for sub⁃sequent research and practice, contributing to the advancement of library information services to a higher level.
  • Hu Feng
    Information and Documentation Services. 2024, 45(6): 40-49. https://doi.org/10.12154/j.qbzlgz.2024.06.005
    [Purpose/significance] In the risk landscape society created by the VUCA era, public health emergency in⁃formation disclosure is an indispensable action strategy to build a democratic and responsible government, protect the physical and mental health of citizens, and maintain the stability of social order. [Method/process] Using activity theo⁃ry as the analytical framework, this paper conducts an in-depth perspective on the elements and operating system of public health emergency information disclosure activities. On the one hand, the normative analysis method is used to explain the activity elements and system composition of public health emergency information disclosure; on the other hand, semi-structured interviews, government official website (official microblog), academic literature, policy docu⁃ments, media reports, etc. are used as data sources to conduct empirical discussions on the shortcomings and solutions in the operation practice of the public health emergency information disclosure system. [Result/conclusion] The cou⁃pling and complementation of six elements such as subject, object, community, rules, tools and division of labor consti⁃tute the operational element structure of public health emergency information disclosure; information production sys⁃tem, release specification system, task collaboration system and dialogue sharing system are an operating system struc⁃ture for public health emergency information disclosure was constructed. At the same time, targeted relief strategieswere proposed for the four major dilemmas existing in the operation of the four major subsystems: insufficient tool em⁃bedding, incomplete rules and regulations, unsmooth efficient collaboration, and inactive dialogue and communication.
  • Zhang Jing, Liao Jiaqi
    Information and Documentation Services. 2025, 46(2): 70-81. https://doi.org/10.12154/j.qbzlgz.2025.02.008
    [Purpose/significance] Managing sensory information resources in cultural heritage and creating sensory interactive experiences are crucial pathways for cultural heritage conservation and revitalization in the digital age. Com⁃pared to vision and hearing, the sense of smell is a dimension that has not been fully recognized. Revealing olfactory in⁃formation in cultural heritage activation and achieving olfactory reconstruction of cultural heritage is an important and exploratory frontier research. [Method/process] Based on comprehensive literature review, this paper proposes core concepts such as cultural heritage smellscape and its information revelation and digital construction using interdisci⁃plinary theories, methods, and perspectives. Building upon these concepts, an overarching framework for the informa⁃tion revelation and digital construction of smellscape in cultural heritage, relying on the discipline of information re⁃source management, is developed. [Result/conclusion] This framework, with cultural heritage activation as the strate⁃
    gic background, centers on olfactory information resources and management, with digitization as the mainline, consist⁃ing of two stages: digital preparation (information revelation) and digital implementation (digital construction), and five components: olfactory information collection, olfactory information organization, olfactory information presentation, ol⁃factory information foundational applications, and olfactory information comprehensive applications. Corresponding to the two stages in the framework, the paper further elaborates on two critical issues: the representation of olfactory infor⁃mation in cultural heritage and olfactory information interaction, and outlines an interdisciplinary methodological sys⁃tem for addressing these issues.