Most Download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All
  • Most Downloaded in Recent Month
  • Most Downloaded in Recent Year

Please wait a minute...
  • Select all
    |
  • Information studies: Theory & Application. 2021, 44(11): 180. https://doi.org/10.16353/j.cnki.1000-7490.2021.11.024
    Information dissemination is gradually transitioning from single-modal forms such as text,image,audio,and video to multi-modal forms that merge with each other,and the amount of data is expanding rapidly.Since large-scale data requires huge storage space,it becomes crucial to effectively classify massive amounts of multi-modal data such as texts and images.This paper proposes a deep learning-based multimodal information classification model to solve the problem of classifying multi-modal data in the form of image and text.In this model,the text feature extraction model is designed using BiLSTM (Bi-directional Long Short-Term Memory),and the image feature extraction model is designed using VGG16 convolutional neural network.The text features and image features extracted from the two deep neural networks are fused to further achieve the classification of multimodal information.Experimental results on the NUS-WIDE public dataset demonstrate the validity of the approach presented in this paper.
     
  • Information studies: Theory & Application. 2021, 44(11): 173. https://doi.org/10.16353/j.cnki.1000-7490.2021.11.023
    [Purpose/significance] In a multi-language environment,users generate a lot of UGC notes based on the MOOC platform.In order to make better use of MOOC resources,this paper proposes a multi-language UGC course notes automatic generation model,which is conducive to promoting the sharing of high-quality education resources around the world and improving education equity.[Method/process] First,we grab and preprocess the UGC notes and lecture in multi-language environment,then merge the multi-language UGC notes into bilingual notes.Next,we implement the automatic sub-theme cluster fusion for the popular and unpopular course multi-language UGC.On this basis,we extract the best single note and determine the timestamp according to the weighted rules,and then arrange it in chronological order to form a systematic and complete bilingual course notes.[Result/conclusion] The validity of the model was verified by two examples.For popular courses,the accuracy rate and recall rate reached 100%;for unpopular courses,the accuracy rate was 79% and recall rate was 83%.
  • Information studies: Theory & Application. 2019, 42(6): 56. https://doi.org/10.16353/j.cnki.1000-7490.2019.06.010
    Abstract:[Purpose/significance] Safety & security management (SM) is an important practical problem that has been widely concerned nowadaysSafety & securityrelated intelligence (SI) aims at providing the support and service for SM,it plays a leading and guiding role in SMTherefore,it is of great theoretical and practical importance to study intelligenceled safety & security management (ILSM).[Method/process] By using the methods of theoretical deduction and speculation research,and based on the theory and knowledge on intelligence science and safety & security science (especially SM science),this article deeply discusses the basis for the establishment of ILSM from two aspects (namely,the theoretical basis and practical basis) respectively.Meanwhile,this paper analyzes the meaning of ILSM,and builds and explains the two models for ILSM (namely,the conceptual model and implementation model for ILSM).[Result/conclusion] The establishment of ILSM has a solid foundation,and ILSM refers to using SI to command and guide the all aspects and whole process of SMMoreover,the conceptual model and implementation model for ILSM proposed in this paper can provide the general theory and method guidance for the ILSM research and practice.
  • Information studies: Theory & Application. 2018, 41(11): 155.
    [Purpose/significance] Persona is a fast and precise data analysis tool to analyze user behavior patterns,consumption habits and other business information,which can lay the foundation for precise marketing and user experience improvement [Method/process] By the method of literature analysis,from the dimensions of definition,constituent elements,models and methods,this paper carries out a careful review of the latest research results of persona,points out the different modeling methods of persona,sums up the characteristics of these methods and the future direction of development,finally shows the implications of persona on Library and Information Science [Result/conclusion] As an emerging data analysis tool,its theoretical study and practical application are still relatively weak,so there is still a lot of room for exploration Through the literature review,the paper finds out the direction for further exploration and provides references for further research
  • Information studies: Theory & Application.
    [Purpose/significance] Based on the research on open source intelligence (OSINT) at home and abroad,this paper summarizes the theoretical and application achievements and shortcomings in order to provides guideline for future research[Method/process] After visualizing the annual publishing trend and analyzing keyword cooccurrence of literature with quantitative method,we further concludes the concept of OSINT and summarizes the research content and structure combined with the DIWK model[Result/conclusion] OSINT has been extensively explored,especially in the concept,collection,fusion,quality evaluation,model construction,etcHowever,the research on OSINT is still in its infancy,the research on theoretical models and methods is relatively lessIn addition,the application scenarios and content still need to be expanded
  • Information studies: Theory & Application. 2021, 44(8): 51. https://doi.org/10.16353/j.cnki.1000-7490.2021.08.008
    In recent years,under the trend of “traffic economy”,social media platforms have excessively used algorithmic technology to push users into “information cocoons” and “echo chambers”The extreme views caused by group polarization have increased significantlySo the study in the formation mechanism of group polarization on the platform can provide a reference for the government to regulate the polarization of public opinionOn the basis of reviewing relevant domestic and foreign research literature on group polarization,through the observation of the case,the study summarizes the social effects of network polarization and the causes of group polarization in social media platformsBased on previous studies and summarized factors,the study analyzed the three combined forces of network group polarization,and constructed the dynamic mechanism model and formation mechanism of the formation mechanism and guiding strategies of group polarization in Social Media PlatformsBased on the obtained model and the conclusions,the study proposes corresponding guidance strategies.
  • Information studies: Theory & Application. 2022, 45(5): 156-164. https://doi.org/10.16353/j.cnki.1000-7490.2022.05.020
    Abstract:The construction of emergency intelligence system is a powerful basis for management and decisionmaking after major public health events.However,there are still some deficiencies in the current emergency intelligence system in the aspects of intelligence storage,intelligence sharing,intelligence traceability,rapid warning and linkage response.Therefore,based on the current emerging blockchain technology,this paper introduces the ideas of blockchain,such as nontampering,decentralization,traceability and selftriggering,into the construction of emergency intelligence system.We use blockchain to store,share and trace intelligence integrally,uses smart contract to set early warning threshold,and broadcast all over the network to generate gear linkage response mode.According to the different stages of the development of the epidemic,we improve the emergency information system under the current major public health events,so as to provide the basis and guarantee for improving the national emergency management ability.
  • Information studies: Theory & Application. 2018, 41(4): 99.
    [Purpose/significance] User portrait describes the behavioral characteristics of the user group of a specific product,and provides merchants with multifaceted user information,so that merchants can understand their customers,improve products or services,and bring possibilities for precision marketing[Method/process] Based on the online review,the conceptual model of user portrait is constructed from three dimensions:user information attribute,hotel information attribute and user evaluation information attributeThen the tool of Protégé is used to establish the ontology to realize the association between user portrait attributes,and accomplish the complete description of the hotel users’ characteristics[Result/conclusion] Taking the online reviews of Ctrip hotels in Beijing as an example,the dimensions of user,hotel,and comment information are visualized to build user portraitThe result provides basis for merchants to understand customers’ needs and implement the strategy of precision marketing
  • Information studies: Theory & Application. 2020, 43(11): 169.
    [Purpose/significance] On the basis of domestic research,this paper systematically sorts out related literatures on data fusion and integration abroad,aiming at providing references for the work in the field of data fusion and integration[Method/processes] This paper mainly reviews relevant research,research approaches and methods,and applications and challenges,and points out future research directions from three aspects:concept,path and application[Result/conclusions] Research approaches and methods include data fusion and integration model and framework,phasebased strategy,featurebased representation method and semanticbased applicationAnd it is found that there are common or special application challenges in each field
  • Information studies: Theory & Application. 2022, 45(2): 85.
    [Purpose/significance] Technology transaction is the key link of technology transferIn addition to the matching of technology content,technology transaction is affected by many factorsStudying the influence mechanism of supply and demand matching in technology transaction is conducive to technology transaction[Method/process] Based on the data of Hubei Technology Exchange’s past trading contracts,this paper combs five antecedent variables of technology,subject and environment based on the TOE framework,and applies QCA method to explore the condition configuration and path of high turnover rate technology trading[Result/conclusion] It is found that there are two driving mechanisms for high turnover rate of technology trading,namely,the subjective type of distance policy perceived reliability and the objective type of distance policy organizational proximity technological reliabilityIn the two paths,distance and policy are important factors,while subjective reliability and objective technical conditions can produce substitution effect to a certain extent
  • Information studies: Theory & Application. 2022, 45(3): 89. https://doi.org/10.16353/j.cnki.1000-7490.2022.03.013
    [Purpose/significance] The emergence of metaverse provides a brand new idea and method for the improvement of smart library service mode.[Method/process] Based on the review of metaverse concept and its research status,this paper constructs the library metaverse architecture,and discusses the functions of six layers: physical layer,software layer,data layer,rule layer,application layer and interaction layer.[Result/conclusion] This paper believes that metaverse can positively promote and influence smart library service,and analyzes the problems that need to be solved in the construction of smart library from the perspective of metaverse,which intends to provide reference for the application research of metaverse in smart library.
  • Information studies: Theory & Application. 2022, 45(2): 121.
    [Purpose/significance] Humanities scholars face the technical dilemma of using traditional means to perceive data and the humanistic illusion of interactive cognition of data in the era of big dataFor spreading Chinese traditional culture and telling Chinese stories well,regardless of producerdriven or consumerdriven modes,it’s necessarily to pursue an information exchange and communication tool with both technical and humanistic frameworkData Storytelling (data narrative) can be endowed with new usage context and meaning in this sense,and supported by data science theory and practice,so as to become an important node of digital humanities methodology even technology system[Method/process] The research starts from the data perception and data interaction cognitive dilemmas in the era of big data,and clarifies the concept and logical context of data narrative through literature surveys,and refines the basic elements and theoretical foundations of data narrativeThen compares the application scenarios of early fields of data storytelling,such as media,business,education,etc,and in which analyzes the value of user experience,emotion,knowledge perception and communication,and cognitiondriven value of data storytelling,and then summarizes the application and practical significance of data narration from the perspective of Digital Humanities;finally puts forward the path and method of digital humanities for research and education by using data storytelling[Result/conclusion]The exploration and development of digital humanities in different languages and cultures have been iteratively upgraded around the technical law of data awareness and value discovery,as well as the humanistic framework or paradigm of narrative discourse systemUsing data science as a platform,information visualization as product or service form,and narratology as channel for value realization,data storytelling will be beneficial to promote the development of digital humanities,and become an important tool for integrating data resource,even spreading Chinese culture and stories
  • Information studies: Theory & Application. 2021, 44(7): 101.
    [Purpose/significance] The individuals are becoming “naked people” in the era of social media,which reflects that exploring the determinants and consequences of privacy attitude is necessary[Method/process] Based on social cognitive theory and “cognitiveattitudebehavior” model,this study integrates both of internal factors and external elements and utilizes the Structural Equation Model (SEM) and FuzzySet Qualitative Comparative Analysis (fsQCA) to investigate the mechanism of digital natives’ intention to protect privacy[Result/conclusion] The SEM results reveal that privacy attitude could be affected by privacy literacy and information sensitivity;peer effects only could positively affect privacy concern;parental influence could not exert any impact on privacy attitude;also,the privacy fatigue plays triple roles in the formation from privacy concern to intention to protect privacyThe fsQCA results indicate that four and three configurations lead to the high/low level of intention to protect privacy[Limitations] Only quantitative method was used in this research,the future studies can apply the qualitative method to explore the deep reasons of such phenomenon
  • Information studies: Theory & Application. 2018, 41(11): 138.
    [Purpose/significance] This paper aims to expound largescale knowledge graph and its typical application,analyze the challenges and countermeasures it faces,and present its development trend [Method/process] Using the methods of network investigation and content analysis,the paper systematically explores the largescale knowledge graph and its typical applications,its challenges and countermeasures,as well as its development trends [Result/conclusion] The typical applications of largescale knowledge graph are semantic search,indepth question and answer,intelligent recommendation,etc It faces the challenges of feature knowledge representation,knowledge lacking,knowledge updating,function comprehensiveness,and so on It is developing in the direction of specialization,openness and intelligence
  • Information studies: Theory & Application. 2021, 44(7): 178.
    [Purpose/significance] As for the complex and changeable characteristics of national security scenarios,multisource information needs to be fused for situational awareness and situation analysis of national security events,which could provide comprehensive,realtime and accurate data support for emergency management of national security events[Method/process] We first analyze the intelligence sources of national security events from the perspective of the threeworld theory;then,we propose an eventcentric multisource information collaborative awareness mechanism as well as a situation analysis framework based on the “timespacetopic” model;finally,we developed a sample situational awareness and analysis system for national security events based on the methodology proposed in our paper[Result/conclusion] With the help of information organization and information analysis theories and methods,the orderly organization and multidimensional analysis of situation information related to national security events can promote the effective use of situation information,thereby improving the efficiency of emergency response to national security events
  • Information studies: Theory & Application. 2019, 42(7): 80.
    [Purpose/significance]Exploring the formation mechanism of discontinued behavior of strongties social media users and the interaction mode of variables so as to provide comments and suggestions for strongties social media developers and operators to improve service quality,optimize user experience and improve user stickiness[Method/process]With the typical application of strongties social media WeChat Moment as the research object,this article gets the text data by depth interview and adopts grounded theory to extract concepts and categories through open coding,axial coding and selective coding,and builds the conceptual model under the framework of SOR theory[Result/conclusion] The situational factors (internal factors of the platform) and environmental factors (external factors of the platform) stimulate users to generate negative emotional cognition,which leads to different levels of discontinued behavior,and personal factors consisting of demographic factors,personality traits,usage characteristics,and relationship characteristics modulate the discontinued behavior of strongties social medias users
  • Information studies: Theory & Application. 2022, 45(2): 43.
    [Purpose/significance] In order to clarify the causative factors of information cocoon towards researchers under the Internet environment,prevent the emergence of academic information cocoon,and create a good information environment for researchers[Method/process] Used the grounded theory methods to make qualitative analysis by conducting semistructured interviews,data coding and model development[Result/conclusion] The results show that internal factor of researches,information factors,social environment and information situation factors are the key factors affecting the formation of information cocoon towards researchersSome suggestions,such as improving scientific management and services,enhancing interdisciplinary academic exchange and cooperation,and promoting information literacy,were pointed out in the end
  • Information studies: Theory & Application. 2022, 45(12): 119.
    [Purpose/significance] The impact evaluation of academic papers is an important methodological issue in the evaluation of academic achievements,and it is also an important practical topic that needs to be improved in scientific and technological evaluation or management activitiesThe use of ecological niche theory can provide a new research perspective and method for the impact evaluation academic papers from the perspective of resource occupation,so as to enrich and develop the evaluation theory of academic achievements[Method/process] According to the niche theory,this article divides the influence of academic papers into primary influence and regenerative influence,based on the perspective of resource occupation of the entire academic exchange ecosystem,and constructs an evaluation model for the niche breadth of academic papers from the three dimensions of content innovation,online attention and offline attention,so as to assess the impact of academic papersAnd select academic papers in library and information science for empirical analysis,to discusses the impact evaluation method of academic papers based on the niche perspective[Result/conclusion] The experimental results in this article show that the academic paper influence evaluation model proposed in this paper based on the niche theory,can be used as an effective method to evaluate the influence of academic papers scientifically and reasonably

  • Information studies: Theory & Application. 2022, 45(8): 47.
    [Purpose/significance] Digital twin technology brings new opportunities for digital economic growth and smart cities constructionAs an important part of smart city,the smart library scenario services based on digital twin technology will be a main direction for future transformation and upgrading[Method/process] By analyzing the concept and characteristics of digital twin technology,we propose the application scenario and architecture of digital twin technology in smart libraries,and combine with the“scenarioinformation expectationsituation”,explore the path and model of scenariobased services for smart libraries with digital twin technology[Result/conclusion] Digital twin technology has a wide range of application scenarios in smart libraries,and can provide better scenariobased services for users through the bidirectional iterative optimization of virtual libraries and physical librariesStandardization of construction,sharing of information,professionalization of developing talents and rationalization of privacy will be the development trend of innovative practice of scenariobased service of smart libraries with digital twin technology
  • Information studies: Theory & Application. 2021, 44(8): 112. https://doi.org/10.16353/j.cnki.1000-7490.2021.08.016
    [Purpose/significance] To explore the basic characteristics and internal regularity of the spread of network false information over time under the infodemic,to provide some theoretical support for the management of the spread of network false information under the infodemic,and to provide an effective way for relevant departments and platforms to curb the spread of network false information[Method/process] Using the crawler program in python language to collect the data set of network false information about the novel coronavirus pneumonia,constructing the time series of network false information dissemination,using statistical analysis,text classification,and topic mining technology,from the quantity,source and subject dimension to explore the dynamic transmission characteristics and regularity of network false information under the infodemic over time[Result/conclusion] The study shows that the network false information under the infodemic presents a segmented evolution,videoization and repeated fluctuations in the spreading regularity,and the COVID19 infodemic paralleled the propagation of the COVID19 epidemicIts sources and topics are different in the different stages of time series
  • Information studies: Theory & Application. 2021, 44(8): 75. https://doi.org/10.16353/j.cnki.1000-7490.2021.08.011
    [Purpose/significance] Personal information security impact assessment can improve the effective use of personal information,reduce personal information security compliance risk and promote information protection[Method/process] To guarantee the specific practical assessment,the thesis divides the flow of PISIA into phases,analyzes respective execution flow of each phase,and formulates assessment templates,including template for threshold assessment,map data flow template,safety risk analysis,and management template and the report template for personal information security impact assessment[Result/conclusion]The division of flow analysis and the use of templates can provide a constructive reference for assessment,thus improving the assessment efficiencyWith the development of the new technology,the intelligent assessment for personal information lifecycle will be the future research direction.
  • Information studies: Theory & Application. 2022, 45(4): 52.
    [Purpose/significance] By studying the knowledge sharing model of virtual communities in metaverse field,we provide a path for efficient knowledge sharing and innovation in future virtual communities[Method/process] Based on the analysis of relevant practices and existing research,combined with the transformation of knowledge sharing in virtual community in metaverse field,this paper constructs a knowledge sharing mode of virtual community in metaverse field[Result/conclusion] It is concluded that when users share knowledge in the virtual community under metaverse field,they start from the threedimensional selection and acquisition of community knowledge,then carry out situational knowledge internalized absorption and create a “knowledge black box”,and finally spread and share it into the community knowledge through private domain knowledge broadcasting,so as to promote the efficient sharing and innovation of knowledge in the virtual community[Limitations] Due to the lack of virtual community practices in metaverse field,it does not have sufficient empirical conditions for this study
  • Information studies: Theory & Application. 2021, 44(8): 119. https://doi.org/10.16353/j.cnki.1000-7490.2021.08.017
    Abstract:[Purpose/significance] The paper aims to learn from the experience of the challenge project of research impact improvement in North America university library and promote the related services in China[Method/process] Ten North American university libraries were selected to investigate the challenge project from aspects of challenge name,release method,application tools and task content[Result/conclusion] The success stems from the focus on theoretical basis,accumulation of rich experience,selection of challenge projects and preparation of sufficient resourcesBased on the experience of North America,University libraries in China should create challenge projects,explore localization service paths,improve the ability to control research evaluation and promotion tools,and develop service projects from the aspects of standardizing Identity document,popularizing measurement indicators,imparting improvement skills,encouraging international exchanges,and guiding open access
  • Information studies: Theory & Application. 2017, 40(12): 100-106. https://doi.org/10.16353/j.cnki.1000-7490.2017.12.018
    [Purpose/significance] This paper explores the influencing factors of social media fatigue and the interaction between social media fatigue and user’s passive behaviors,in order to enrich related theories of the user behavior and provide guidance for the healthy development of social media[Method/process] This research uses the depth interview to collect data based on the grounded theoryThrough open coding,spindle coding,selective coding and theoretical saturation test,a model of social media fatigue influencing factors and negative behavior is developed[Result/conclusion] External environmental factors affect the social media users’ personal cognition,and then environmental factors and users’ personal factors together have direct effect on social media fatigueSocial media fatigue further leads to users’ passive behaviorDifferent intensity and sources of fatigue cause different degrees of passive behaviors
  • Information studies: Theory & Application. 2024, 47(3): 1-15. https://doi.org/10.16353/j.cnki.1000-7490.2024.03.001

    Purpose/significance] The information science (IS) needs inheritance and innovation in the transitionThe discipline system of information science is reconstructed for national security strategy and development strategy in digital intelligence eraMethod/process] The features of digital intelligence era and the connotation of “three systems” are understanded, starting from the postgraduate educationThe paper discusses the origin of IS, and English and Chinese normal forms of ISThe linear structure of information chain is transformed to ring-type structure. This article puts forward the “information /intelligence integrated normal form” of ISThe author differentiates and analyses some English terms to clear the fuzzyReviewing some viewpoints of the discipline system of IS, the system is reconstructedResult/conclusion] The generalized IS and narrow IS are distinguished to deal with the relationship of military IS and civil ISThe similarities and differences of the two “IS” of English context and Chinese context are made clearThe integrated normal form merges together “information” normal form and “intelligence” normal form to some extentThe discipline system of IS with structure of layer-stepping and concentric circles type contributes fully to reflect complete picture of IS.

  • Information studies: Theory & Application. 2022, 45(2): 160.
    [Purpose/significance] Practice of management requires a deep understanding of user needsIn addition,as a significant channel of user preference expression,online review is promising source from which to reveal user needsTherefore,how to identify user needs from massive online reviews become an important issue[Method/process] In this case,based on KANO model,we propose an analytical framework of user needs for online reviewsSpecifically,product attributes are first elicited from online reviews based on LDAAfterwards,the short sentences are labeled into different attributes using BERT model,and the sentiment orientations of the short sentences are identified at the same timeNaturally,user needs can be identified by KANO model according to the short sentences and sentiment analysisBesides,a cell phone review dataset is used to validate the proposed model[Result/conclusion] The framework divides product attributes into four categories:mustbe quality attribute,onedimensional quality attribute,attractive quality attribute,and indifferent quality attribute,which will be presented in visualizationThe empirical study show that user needs can be effectively identified,and improvement strategies can be provided for enterprises[Limitations] The dataset in this paper is limited and unbalanced
  • Information studies: Theory & Application. 2022, 45(11): 21. https://doi.org/10.16353/j.cnki.1000-7490.2022.11.003

    Purpose/significanceThe research deepens the perspective of knowledge graph construction into the innovative content contained in patent documents,so as to focus and express the core innovation information of each patent structurally in a specific field,briefly express how the patent individual achieves innovation,reveal the essence of each patent innovation and semantic network of patent innovation in the field[Method/processThe research uses the Chinese patent documents abstract in the field of educational robotics as a dataset to build a knowledge graph of patent documents innovative contentBert model is used to identify and extract innovative sentences in patent documentsInnovation topic was analyzed by LDA topic modelBased on Bert4keras,entities and their relationships are extractedThis research uses Neo4j to store the knowledge graph[Result/conclusionThe deep learning method adopted in this study can effectively discover the core content of patent documents innovation,and the patent innovation knowledge graph constructed can better summarize and organize the core information of patent,which is technological innovation information

  • Information studies: Theory & Application. 2018, 41(1): 129-134.
    With the increasing scale of social question and answer (Q&A) community,the average quality of the users is decreased and the difficulty of content search is increased on the websitesTherefore,the main challenges for the high quality development of the Q&A community are to control the quality of the Q&A,to ensure users’ searching experience,and to distinguish the quality of usersUser profiling is a common and effective method for user description and modelingThis paper selects more than 120 thousand users’ activity index from social Q&A communities within 1342 daysCombining with the users’ practice in recommendation system and search engines,the paper constructs users’ profiles from users’ experience,participation,quality of answers,and developmentThe results are verified by specific user dataThis paper presents some methods to mark the user characteristics,and discusses the problems that may be encountered when dealing with the user characteristics of the communityThe paper provides references for the analysis of distinguishing users in the community,which can be used as the basis for the analysis of the user groups and the monitoring of community behavior
  • Information studies: Theory & Application. 2017, 40(7): 115-121. https://doi.org/10.16353/j.cnki.1000-7490.2017.07.021
    [ Purpose/significance] The supply chain logistics information ecosphere model based on block chain is constructed to promote the sustainable development of supply chain logistics information resources management[Method/process] Combining with the block chain definition,the basic framework model,and the key technologies and characteristics,this paper studies the coupling relationship between the block chain and the supply chain logistics information resources in the subjects,the transaction mechanism and the intelligent contractMoreover,block supply chain logistics information resources management is analyzed from objects,attributes and functions[Result/conclusion] The paper establishes a supply chain logistics information ecosphere model based on block chain,and improves supply chain logistics information ecology[Limitations] The empirical study on supply chain logistics information ecosphere model based on block chain needs to be deepened.
  • Information studies: Theory & Application. 2023, 46(1): 108-114. https://doi.org/10.16353/j.cnki.1000-7490.2023.01.013

    Purpose/significance To study the influencing factors and configuration path of digital hoarding behavior with college students as a sample,which can help enrich the related research in this field and provide some suggestions and countermeasures for the intervention of digital hoarding behavior among college students.Method/process Based on social cognitive theory,we analyzed the influencing factors of digital hoarding behavior from both individual and situational perspectives through questionnaire survey method and fuzzy set qualitative comparative analysis method and constructed a theoretical model.Result/conclusion The necessity and sufficiency analysis was conducted by fsQCA software and R software,and the results concluded that there were no necessary conditions for digital hoarding behavior among the six condition variables,and a total of five paths were obtained to trigger digital hoarding behavior,which can be further integrated into three major configurations according to their characteristics and the distribution of core conditions:preventive measures,precise location,and element aggregation.