[Purpose/significance] Combining with real application scenarios and specific cases,this paper studies the characteristics of enterprise competitive intelligence work in the new period and new paradigm,and provides reference for the research of competitive intelligence theory and method and the innovative development of practical service work.[Method/process] Focus on the enterprise compliance management scenario,select Z Company,a benchmark enterprise of compliance management in China,as a typical case,introduce the case outline of Z Company from the perspective of competitive intelligence specialty,and study the characteristics of enterprise competitive intelligence work under the new period and new paradigm by combining the real behavior work of competitive intelligence with demand identification,participation in target meeting investigation,case study,literature research and expert consultation interview.[Result/conclusion] Qualitative analysis of compliance management real behavior,from competitive intelligence work,competitive intelligence methods,competitive intelligence support conditions,summed up the new period under the new paradigm of enterprise competitive intelligence work different from the previous several significant characteristics.
[Purpose/significance] To explore the impact of fragmented information on human information behavior as well as library services under the logic of social acceleration,and to point out the transformational services of libraries in the age of fragmented information.[Method/process] Based on the theory of social acceleration,the new concepts of information alienation and information resonance are proposed.The alienating representations of fragmented information are explored in the perspective of information alienation,and the alienating ways of bridging fragmented information are explored in the perspective of information resonance,respectively,and finally the transformative ways of libraries to cope with fragmented information are proposed.[Result/conclusion] Fragmented information is both an opportunity and a challenge for libraries,and libraries should actively take advantage of fragmented information to improve their own intelligent services,so as to enhance their knowledge services and knowledge diffusion capabilities.
[Purpose/significance] Analyzing the content structure of scientific data management policy to provide a theoretical basis for the improvement and optimization of follow-up policy system.[Method/process] Taking scientific data management policy issued in China as the research object,this study constructs a three-dimensional framework based on a policy tool perspective,incorporating stakeholder and life-cycle theories to analyze the content structure of the policy and identify the focus and orientation of policy implementation.[Result/conclusion] At present,China’s scientific data management policy is in the key implementation stage.The policies use a combination of three types of policy tools:supply-side,environmental-side,and demand-side,involving multiple stakeholders and covering all stages of the lifecycle.But the policy system still needs to be further optimized.Future policies should optimize the structure of overall policy tools,promote the participation of multiple subjects and focus on scientific data management across the life cycle.
[Purpose/significance] The innovation of academic papers is an important research topic in academia.In-depth citing content of the citing literature,revealing the citing intention of citing literature,and exploring the innovation of academic papers (cited literature) based on the citing intention,which provides a new way for scientific innovation evaluation of academic papers.[Method/process] This study takes the academic papers published in International Journal of Information Management in 2018 as the research object,and collects the information,including the citing intention,citing content,citing position,etc.through the newly added “citation by category item” of Web of Science to explore the relationship between the citing position and citing intention of citing literature,uses CRITIC weighting method to construct an innovation evaluation model of academic papers based on citing intention,and measures and evaluates.[Result/conclusion] The study found that: ① The “background” of citing intention in citing literature is particularly prominent,the citing position and citing intention are overlapping,and the emphasis of citing intention in different citing positions is also different.② The constructed the innovation evaluation model of academic papers based on citing intention can better select academic papers with high innovation.The model not only considers the citing intention of the authors of citing literature,but also fully considers the citation position,the level of the cited journal,the citation emotion and many other factors of the citation intention.
In the academic evaluation,the systematic error problem of the index system linear evaluation method has not been paid enough attention.Taking academic journals as an example,this paper conducts an in-depth analysis of related problems from the aspects of evaluation index selection,weight assignment,index standardization,and result announcement,and proposes a solution to reduce system errors.The results show that the systematic error problem of linear evaluation must be paid enough attention to;eliminating accidental errors is the basis of eliminating systematic errors;there are many links that produce systematic errors in linear academic evaluation,which should be comprehensively treated;the systematic error problem of linear evaluation has the universality of methodology.The related research expands the linear academic evaluation method and deepens the application of systematic error theory in the evaluation of indicator system.
[Purpose/significance] The data element circulation has become the key during the development of digital economy.The investigation and tracing of the origin of the data elements’ circulation is helpful to understand and master the laws of the circulation of data elements,accelerate the release of the value of data elements,and promote the sustainable and healthy development of digital economy.[Method/process] Division leads to exchange and exchange is the basis of circulation.Based on the division of labor theory,this paper discusses the germinal logic of data elements’ circulation,and concludes that data elements’ circulation is mainly realized through three links:data supply,data exchange and data trading,and gradually evolves into data elements’ market.The data elements’ market develops dynamically and circularly according to the path of “data supply-data scenario application-data re-supply”.[Result/conclusion] The study found that,under the influence of alienation from the evolution of division,the circulation of data elements will face such practical dilemmas in the future as the sharp increase of data right confirmation,the restriction of the development of data circulation related organizations,the breeding of data monopoly and the depletion of organizational innovation spirit.
[Purpose/significance] Introduces the risk management idea and studies the government data opening from the perspective of privacy risk control,so as to provide reference for the construction of our government data opening platform and the further development of open government data privacy risk management.[Method/process] Combs the concept of government data opening privacy risk control and demonstrates its necessity,analyzes the domestic and international research trends of government data opening privacy risk control,discusses the theoretical basis of government data opening privacy risk control from the risk management theory and the theory of multiple public administration views,and puts forward the basic ideas of our country’s research on government data opening privacy risk control.[Result/conclusion] The research on privacy risk control of government data opening in China should be based on multidimensional perspectives such as privacy risk identification,privacy risk assessment,and privacy risk control measures.
[Purpose/significance] Misinformation governance is a hot topic in the age of infodemic,and has been a prominent issue in the discipline of Library and Information Sciences (LIS) in recent years.The effect lag and limitations of debunking in traditional misinformation research have prompted scholars to focus on more proactive pre-interventions.Profiling the prebunking approach will generate significant theoretical and practical implications regarding information governance.[Method/process] This paper comprehensively reviewed the prebunking misinformation research in the past decades.Firstly,this paper analyzed the conceptualization of prebunking,reviewed the relevant theories and built a research framework of prebunking misinformation.[Result/conclusion] Prebunking is based on the inoculation theory,involving the disciplines of LIS,psychology,and communication.Prebunking approach involves four dimensions,namely time,content,objectives and characteristics.Existing literature focuses on “context- influencing factors- intervention methods- intervention outcomes” framework.We call for three future directions in prebunking research:to enhance the conceptualization,to explore behavioral characteristics,and to include innovative research methods.
[Purpose/significance] In the public emergency situation,too much public opinion conflict may confuse the public cognition and interfere with handling of the event.This study aims to explore how to identify the conflicting online public opinions in the context of public emergencies and to extract the overlapping consensus,which can provide the method and reference for the governance of the online public opinion conflict.[Method/process] Based on the conflict theory and the overlapping consensus theory,this study proposes a method of identifying conflicting opinions and extracting overlapping consensus in the public emergency situation.Conflicting opinions are identified by text clustering,topic extraction and emotion analysis,and triplet extraction using semantic role annotation combined with dependent syntactic analysis,and core semantic knowledge graphs are constructed by Neo4j for conflicting opinions and overlapping consensus identification and generalization.[Result/conclusion] Using Weibo as the data source,we conducted an empirical study on the topic of “COVID-19 vaccination”.The topic of coronavirus vaccination in the event of COVID-19 was studied in the environment of Sina Weibo.The results of the study showed that conflicting opinions exist in the topics of appointment and effect of the coronavirus vaccine,China provides coronavirus vaccines to other countries,and the appointment and cost of the coronavirus vaccine.However,there are also overlapping consensus.We provide the relevant departments with specific recommendations for managing the conflicting public opinions based on the research results.
[Purpose/significance] In view of the important information of technical innovation contained in outlier patents can provide first-hand data for enterprises to carry out innovation activities efficiently,this paper constructs a path based on outlier patent identification technology opportunities based on multi-dimensional technology innovation map.[Method/process] Firstly,the BERT-LOF algorithm (Local Outlier Factor) is used to extract candidate outlier patents,and the outlier patents are screened out by novelty,application scope and development ability.Secondly,the BERTopic topic modeling technology is used to extract the technology topics and innovation elements from the outlier patents,and the innovation elements are divided into dimensions based on the multidimensional map of technical innovation,and then coupled with a variety of innovation rules to identify a number of figurative technology opportunities.Again,using intuitionistic fuzzy analytic hierarchy process to evaluate figurative technology innovation opportunities.Finally,taking 3D printing technology as an example,the application process of opportunity recognition path is described.[Result/conclusion] The results show that the BERT-LOF outlier detection model proposed in this paper not only effectively improves the extraction accuracy of outlier patents,but also provides a scientific decision-making reference for enterprises to improve innovation efficiency and reduce innovation costs.
[Purpose/significance] Health Apps have become the main way of public health management.However,the current information visualization design of health Apps has not considered the impact of poor design on the negative emotions that users may generate.This paper explored the influence mechanism of the information visualization design of health Apps on users’ Internet health anxiety,aiming to provide a reference for the theoretical framework of information visualization design of health Apps and promote their sustainable development.[Method/process] This study used user reviews of health Apps,user discussions in virtual communities and Baidu Tieba and academic literature as empirical data to analyze,refine and code systematically.On this basis,a conceptual model of the influence mechanism of health Apps information visualization design on users’ internet health anxiety was constructed.[Result/conclusion] Health Apps users’ Internet health anxiety is influenced by the visual design level of the health Apps interface,the information architecture level of the health Apps,and health Apps information quality,in which user engagement plays a mediating role.Furthermore,this mediating role is moderated by the tolerance of uncertainty.
[Purpose/significance] Combined with the common social phenomenon that individuals frequently experience boredom,clarify the correlation mechanism of hedonic information system and excessive use of mobile phones,analyze its trigger path and driving mode,which helps users to arrange the use of mobile phones reasonably,and promotes hedonic information system to optimize the user experience.[Method/process] Using the Grounded theory method to analyze the interview data of 23 respondents,extracting the factors influencing the use of individual hedonic information systems,then designed the questionnaire,distributed to 342 respondents and collected 267 valid questionnaires.Finally,analyzed the data with fsQCA method to get the path for hedonic information system to excessive mobile phone use in different boredom tendency drive modes.[Result/conclusion] The significant positive influences on excessive mobile phone use in the difficult self-enjoyment drive mode,the environmental disturbance drive mode,the internal and external stimulation drive mode,and the low boredom drive mode all include content quality and platform services,while perceived behavioral control is the core negative influence in all boredom tendency drive modes except the low boredom drive mode;the trigger path of excessive mobile phone use in the low boredom drive mode is significantly different from other modes,in which individuals pay more attention to the functional attributes of hedonic information systems than to the hedonic attributes.
[Purpose/significance] In the current financial data industry standard specification,personal financial data privacy is divided into three or four levels according to the “degree of impact caused by damage or leakage”,but all of them lack quantitative research support.This paper mines financial privacy related texts,and quantitatively calculates the privacy value of financial data items,which provides a scientific and objective basis for personal financial privacy classification.[Method/process] Survey financial privacy related literature,establish financial privacy text base;according to the financial data industry standards and specifications,the financial privacy glossary framework is established to collect financial sensitive words;investigate financial institutions,collect their customer personal data,and complete financial sensitive vocabulary;based on the syntactic structure of the text,financial privacy verbs and financial sensitivity words are separated from the text base,and a financial privacy thesaurus is established;based on the privacy vocabulary,the sensitive data units are extracted from the financial text database,and the financial privacy model is established and measured.[Result/conclusion] The measurement results show that the privacy of personal data produced by financial institutions (personal account data,financial transaction data,personal lending data) is higher,the privacy of personal data used by the financial industry (property data,judicial data,medical data) is the next,and the privacy of personal identity data collected by the financial industry (identity basic data,identity identification data) is low.
[Purpose/significance] To clarify the correlation paths and hierarchical relationships of factors influencing mobile social media users’ digital hoarding behavior,to provide theoretical and applied guidance for the study of digital hoarding behavior,and to provide corresponding countermeasures and suggestions for solving users’ digital hoarding problems.[Method/process] The analysis of rooting theory was used to identify 16 influencing factors,combined with the fuzzy ISM (interpretation structure model)-MICMAC (cross matrix multiplication) to clarify the internal relationships and paths among the influencing factors,construct a model of influencing factors,and then draw conclusions and recommendations.[Result/conclusion] Information rarity,information quality,access ability and analysis ability,as independent group factors,have the strongest influence on users’ digital hoarding behavior,therefore,to solve the digital hoarding problem,we need to control information and improve users’ ability and literacy from the root;once factors such as perceived usefulness change,factors such as self-efficacy,miss anxiety and personality preference will also change accordingly and have different degrees of influence on users’ digital hoarding behavior.
[Purpose/significance] Based on the information search model,combined with the task of thesis writing,this paper reveals the changes of novice researchers’ information search demand and motivations in the process of information search,including the types of information,relevance requirements and search demand motivation.This research can provide a basis for optimizing the personalized service of information retrieval system and improving research literacy education in universities.[Method/process] The study used semi-structured in-depth interviews to conduct data on twenty novice researchers.The information search demand and motivations were analyzed through open coding.Then the matrices of information type-search demand motivation and relevance requirement- research-based motivation were constructed to reveal the changes.[Result/conclusion] A novice researcher’s demand to information type and relevance change with the different stages of the thesis writing task.Research-based,speculative,uncertainty-reduction,and emotional motivations can all be categorized as reasons why novice researchers search for information.The search demand and motivation of novice researchers have their own focus in various stages of information search.
[Purpose/significance] Evaluation of academic papers is the basis of scientific research evaluation,and it is a rigid need for scientific research management and evaluation.At present,there is still something to do to improving the effect of paper evaluation model based on citations and contents of papers.[Method/process] In this study,we constructed a paper importance evaluation model based on the node attributes of the article similarity network using complex network analysis,and explore the feasibility of evaluating the quality of papers from the perspective of the article similarity network.We selected eight medical disciplines,retrieved and downloaded academic papers to form eight datasets,and marked papers as important papers and general papers in advance respectively according to whether the papers were included by the faculty opinions database.three types of article similarity networks were constructed based on mesh structure,Doc2Vec algorithm and bibliographic coupling respectively by extracting mesh terms,titles/abstracts and references of included papers.For each type of article similarity network,we calculated node attributes in the network using complex network analysis,and selected node attributes with statistical differences as evaluation indicators of distinguishing two types of papers.Finally,four types of machine learning algorithms were conducted for classification learning of important papers and general papers in our dataset to build and assess the paper importance evaluation model.[Result/conclusion] We found that the method evaluating papers based on article similarity network is feasible.All three algorithms to construct paper similarity networks had little difference,the algorithm based on MeSH structure and the bibliographic coupling method were better than the Doc2Vec algorithm.BP Neural Network had the best performance in the article importance evaluation model based on the article similarity network.
[Purpose/significance] Exploring the information dissemination process and evolution law of short video users will help relevant departments to scientifically understand the development trend of public opinion and improve the ability to deal with public opinion crisis.[Method/process] On the basis of the traditional SEIR model,considering the interaction of netizens’ views,the communicators are divided into rumor communicators and information clarifiers.Based on this,the SICR model is constructed,and Python is used to crawl the short video comments on the “Zhongxuegao cannot be melt” incident on the Tiktok platform for data processing and simulation experiments to verify the applicability of the model.[Result/conclusion] During the outbreak of public opinion,the information clarifier increases the voice channel,occupies the highland of public opinion,and takes punishment measures to severely punish the rumor disseminator,which is conducive to leading the event to a positive discussion,making the real information known to the public,and calming public opinion.
[Purpose/significance] Recently,the issue of project sustainability has gradually emerged.Exploring sustainable development paths for cultural heritage crowdsourcing projects is of great significance for achieving the transmission,effective utilization,and reuse of cultural heritage resources.[Method/process] Project sustainability is a complex phenomenon and is influenced by the synergy of multiple factors.From the perspective of configuration,this paper adopts the fsQCA approach to explore the connected effects of multiple conditions on project sustainability with a sample of 27 CHC projects.[Result/conclusion] It is found that the multiple concurrence of seven conditions-project positioning and vision,task design,volunteer management,external support,technical support,results openness,and results innovation - forms diverse configurations that promote the sustainability of CHC projects.There are five paths for the sustainable development of CHC projects,which can be divided into three major categories:“strong technical support with high volunteer management”,“high results-openness-led”,and “high quality task design with high results innovation”.The research findings can further the understanding of the complexity of CHC project sustainability and can also shed light on the sustainable construction of CHC projects.
[Purpose/significance] Explore the theme and emotional evolution process in the development cycle of online public opinion on public health emergency,study the factors affecting the emotional fluctuations of Internet users,and provide decision-making support for effective control of online public opinion.[Method/process] Based on the time series characteristics of blog posts and life cycle theory,the cycle division is carried out,and the LDA model and BERT-BiLSTM-Attention model are used to build a researching framework to explore the differences of public opinion topics and emotional evolution in different cycles.[Result/conclusion] The evolution of offline virus mutation and online public opinion theme both have a relevance to the evolution of emotion.In the novel coronavirus variant corpus,the BERT-BiLSTM-Attention model has a classification accuracy of 0.8817 and an F1 value of 0.8778,which has certain advantages in the analysis of emotional evolution.The whole process analyzing framework of “data collection preprocessing,public opinion cycle division,theme evolution,emotion evolution to strategic support obtaining” constructed can provide decision-making support and theoretical support for relevant departments to effectively guide online public opinion,and BERT-BiLSTM-Attention model can more accurately classify emotions.[Limitations] The data source is single and only faces with time dimension in the evolution process analysis,lacking of space-time integration analysis.
[Purpose/significance] The influence of the Internet and social media on the speed of information diffusion makes listed companies more prone to public opinion crises when faced with online public opinion events,which in turn bring about incalculable losses.Exploring the formation path of online public opinion crises based on a histological perspective helps grasp the complex cause-and-effect relationship of crisis formation and helps companies adopt proactive and positive strategies to cope with and resolve crises.[Method/process] This paper explores and analyses the formation paths of online public opinion crises among listed companies by collecting data on 24 representative microblog topics from five dimensions:public,media,topic,government and company,and applying the fsQCA method.[Result/conclusion] The study shows that the formation of online public opinion crises is the result of the joint action of several factors,and the interaction between the public,media,government and companies forms two paths to generate public opinion crises,namely company-led crises and multi-corporate linked crises,among which company-led crises are more representative.
[Purpose/significance] China’s economy has entered a stage of high-quality development,and standards play a basic leading role in the new development stage.Multi-dimension knowledge discovery of standards based on knowledge maps can innovate the utilization of standards and improve the efficiency.[Method/process] Based on the content and structure characteristics of standards as well as the information needs,the multi-dimensional knowledge discovery needs are summarized.The standards ontology model is improved and constructed through systematic analysis of standards writing specifications,standards metadata,standards content,etc.Finally,the copyright field is selected for knowledge discovery instance exploration.[Result/conclusion] In order to meet the information needs of users,this paper proposes a six dimensional knowledge discovery framework of “standards-organization-person-terminology-structure-content”,and focuses on the general content and structure of standards,constructs a three tiered standards ontology model of “metadata-structure-content”,which includes 15 concepts and 21 object attributes,and can support six dimensional knowledge discovery,including associated standards,potential institutional personnel cooperation,term inconsistency discovery,structure reuse,content association discovery,etc.The three-layer standard ontology model proposed in this paper expands and refines the standard document entity types.The multi-dimensional knowledge discovery framework based on knowledge graph can provide a new direction for the development and utilization of standards.
[Purpose/significance] The U.S.Defense Technical Information Center (DTIC) is a centralized management and service support agency for defense scientific and technical information.The main task is to collect and disseminate scientific and technical information for the U.S.Department of Defense and its users,avoid duplication of investment,and ensure the advance of U.S.defense technology.Its successful experience is an important reference for us in terms of strategic planning formulation,centralized management of national defense science and technology information,hierarchical and classified services,and data analysis.[Method/process] This paper mainly analyzes the functional positioning and basic tasks of DTIC,summarizes its main practices in terms of information accumulation,information analysis,and information services,and deeply studies and judges the new version of the center’s new strategy.[Result/conclusion] The paper concludes with suggestions from the aspects of introducing strategic planning,strengthening centralized management and data intelligence analysis etc.