2023 Volume 46 Issue 1 
Published: 20 January 2023
  
  • Select all
    |
  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance The world is now going through major changes unseen in a century,and safety & security risks are aggravated,which puts forward an increasingly urgent demand for safety & security governance.As an important means of safety & security governance,the research on Safety & security Situation Awareness and Shaping (SSAS) is of great significance.Method/process Firstly,from a perspective of safety & security intelligence,the connotation of SSAS is analyzed.Secondly,the safety & security intelligence path for SSAS is proposed.Finally,the SSAS model from a perspective of safety & security intelligence is constructed and explained.Result/conclusion The results show that,from a perspective of safety & security intelligence,the basic logical process of SSAS is gaining insight into the system safety & security situationgenerating the system safety & security situation intelligencegenerating the safety & security governance policy intelligenceapplying the safety & security governance policy intelligence to regulate the system safety & security situation.The model of SSAS from a perspective of safety & security intelligence is a comprehensive integration of four sub-models,including safety & security situation awareness sub-model,safety & security situation shaping sub-model,safety & security worker sub-model and SSAS system sub-model.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance Breaking through the disinformation,to grasp the development clues of S&T frontier is the key to improving the strategic layout of the S&T frontier and meeting the needs of S&T innovation during the 14th Five-Year Plan period.Method/process In this paper,the concept,discovery scope and strategic significance of the S&T frontier are analyzed.It also makes a systematic analysis of information work concerns and method combination to discover S&T frontier clue.Finally,the optimization ideas of the information methodology to discover S&T frontier clue are proposed.Result/conclusion The system of spectrum scanning methods is constructed under the guidance of full-spectrum thinking to respond to full-spectrum scanning,extreme insight,correlation perception,and characterization & expression.In terms of optimization of spectrum scanning methods,more attention should be paid to the benign integration of methods and techniques with each link in the information work flow.The suitability of the selection and combination of specific scanning methods should be emphasized based on specific scenarios.It also needs to rely on the support of professional discipline knowledge and new technology.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] This study aims at the problem of software security and long-term guarantee and the problem of “cut-off supply” of academic software that China is facing now,and proposes solutions for reference.[Method/process] The framework design is based on a literature review.This paper puts forward the problems of how to use the long-term preservation software,the problems existing in the long-term development guarantee of domestic software,and relevant countermeasures and suggestions.[Result/conclusion] The research suggests that,① implement emergency plan for long-term preservation of software core code and hardware operating system source code as soon as possible.② On the basis of ①,establish and improve academic software preservation system and guarantee system.③ Push for legislation of software preservation.④ Promote the inclusion of software level metrics in academic evaluation system.⑤ Encourage the independent innovation and development of domestic scientific research software.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Exploring the user privacy disclosure behavior in online health communities and its evolution law is of great significance to promote user privacy disclosure behavior,improve community privacy protection and improve the internet medical system.[Method/process] This paper constructs a tripartite evolutionary game model of “users- online health communities-governments”,then solves the evolutionary stable strategies (ESSs) in different situations,and finally uses numerical simulations to verify the accuracy of the model and the evolution results.[Result/conclusion] Firstly,users’ disclosure of personal privacy is the main driving force to form the optimal evolutionary path.Secondly,the medical service support,emotional support and other factors obtained by users after disclosing their private personal information affect user game strategy.Thirdly,the expected loss caused by privacy disclosure and the extra cost of implementing “active protection” affect online health communities’ game strategy.Fourthly,reputation gains and the extra cost of “high input supervision” affect the governments’ game strategy.In this regard,this paper suggests:multiple measures to enhance the explicit benefits of users;improve the mechanism to reduce the cost of “active protection”;strengthen supervision to play the dual effect of incentives and penalties.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance From the perspective of competition and confrontation,rival intelligence activities pose a serious threat to scientific and technological security.The open science environment has expanded the scope of open source intelligence,making this threat more prominent.Intelligence guarantee is a positive model for maintaining scientific and technological security.It plays an irreplaceable role in safeguarding scientific and technological security in an open scientific environment.Method/process Based on the analysis of the threat of opponents intelligence activities to the state,protection ability and situation of scientific and technological security,this paper constructs the framework of intelligence support system around the demand,function and application of intelligence;this paper puts forward the operation mode of intelligence guarantee system from the aspects of operation concept,operation environment,operation subject and decision-making path of scientific and technological security management.Result/conclusion The security intelligence activities and competitive intelligence activities carried out by the opponent against us may threaten our scientific and technological security.Intelligence can ensure the security of scientific and technological exchange,sensitive information and independent and controllable security by creating an information environment that rejects others and benefits oneself and shaping a controllable security situation.The intelligence support system needs to be supported by the challenge-response operation concept and the full participation operation environment,and promote its implementation practice,quality and efficiency through the coordination of multiple subjects and the construction of decision-making paths.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Science and technology think tanks are a solid force supporting scientific and technological decision-making.It is of great significance to explore the innovative development path of think tank intelligence services for improving the level of scientific and technological decision-making and promoting economic and social development.[Method/process] Summarize the relevant connotation of big data thinking,analyze the necessity and function performance of applying big data thinking to carry out intelligence services of science and technology think tanks,and build a model of intelligence service mechanism of science and technology think tanks from the level of big data thinking.[Result/conclusion] With the coordinated support of organizational mechanism,operation mechanism and guarantee mechanism,the intelligence service mechanism of science and technology think tanks based on big data thinking will effectively promote the construction of national governance capacity and governance system.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance With the intensification of science and technology competition between China and the United States,the United States has intensified its science and technology intelligence activities against China unprecedently.A series of major events related to national science and technology development and security have continuously warned China’s science and technology intelligence work,and exposed under the new situation,national science and technology intelligence system needs holistic reflection and optimization,national science and technology intelligence system overall ability needs to be strengthened.Method/process Based on system engineering theory,guided by the view of macro intelligence,coordination theory for traction,this paper defines the connotation of the national science and technology intelligence system,and analyzes on the factors of national science and technology intelligence system.This paper explores the reconstruction path of national science and technology intelligence system,from the concept of six dimensions,including concept culture,organization,resource,talent,theoretical methods and technologies and institutions.Result/conclusionStrengthening national science and technology intelligence system is importance to providing beneficial support for the improvement of Chinas national science and technology intelligence capacity,as well as the full play of science and technology intelligence value in the Sino-US science and technology competition.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] As a data infrastructure to facilitate unified curation and service of research data,research data repository alliance (RDRA) is a key trend of research data sharing.Exploring its collaborative operation strategies can provide references for the collaborative construction,operation and sustainable development of RDRA in China.[Method/process] Based on the synergy theory,this paper sorts out the stakeholders,elements,and process synergy problems in RDRA.Taking the Canadian FRDR platform as an example,it analyzes its collaborative strategies in platform construction,organizational structure,and data services in different stages.[Result/conclusion] FRDR provides references for the RDRA development in China,including:uniting a wide range of RDM stakeholders to form a national cooperation network;setting up a reasonable organizational structure and clarifying responsibilities;ensuring unified curation and realizing the whole process collaboration of RDM;unifying metadata standards and optimizing resource organization to improve discoverability;formulating user terms to strengthen intellectual property protection and data security.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] In order to explore whether and how the diversity of discipline layout promotes the improvement of discipline competitiveness,this paper analyzes the relationship between the diversity of discipline layout and the competitiveness of disciplines.[Method/process] Taking the universities listed in the subject of library and information science from the fourth round of subject assessment as the research objects,data including each university’s majors and research directions were collected.Stirling diversity index was adopted to investigate the layout diversity of library and information science,in addition,Pearson correlation coefficient was involved to test the correlations between the layout diversity of subjects and discipline competitiveness.[Result/conclusion] The layout diversity of subjects significantly and positively affects its disciplinary competitiveness.That is,the stronger the diversity of disciplinary layout is,the stronger the disciplinary competitiveness would be.The same conclusion exists in other first grade disciplines of management.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The evaluation system of social media APP privacy policy is constructed to conduct a scientific and reasonable evaluation of social media APP privacy policy in China,providing theoretical and practical guidance for the subsequent formulation and improvement of social media APP privacy policy.[Method/process] Through the literature research method and analytic hierarchy process,the research analyzes both local and foreign relevant laws,regulations and existing research results,from the basic information of the privacy policy,personal information collection and storage,using and sharing personal information,personal information security control,users’ personal rights of five dimensions to build evaluation index system of social media APP privacy policy.The text of privacy policy of 48 social media APPs in IOS APP Store is selected for empirical analysis.[Result/conclusion] The overall score of privacy policy of social media APP is basically qualified.There are still some questions about the integrity and operability of privacy policy.In order to further improve and correct implement privacy policy,users’ willingness to read the privacy policy should be improved,the text content of the privacy policy should be optimized,and the governance system of social media privacy protection should be constructed.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] This paper proposes a new technology evolution path identification and expansion method combining patent citation network and SAO semantic analysis method.This method provides a scientific decision-making reference for enterprises to make full use of R&D resources and carry out technological innovation activities efficiently.[Method/process] Firstly,patent information is divided into time windows according to technology life cycle theory,and the patent citation network is constructed by Gephi software.Secondly,the Girvan-Newman algorithm is used to divide citation networks into communities,and the SPC algorithm is used to extract the main path of the top three communities.Thirdly,the SAO structure of patents involved in the main path is extracted,and the SAO semantic paths are constructed after standardized processing.Finally,the latest scientific literature and patent information collected are linked to the end of SAO semantic paths by means of semantic similarity calculation and threshold setting,so as to overcome the problem of citation lag.[Result/conclusion] Applying this method to the field of All-Solid-State Lithium Batteries technology,the results reveal the evolution features,development directions and trends of it.The empirical study confirms the feasible and practical nature of the method,which provides the scientific decision-making support for the related enterprises to clarify the innovation path.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Social hot topics often attract high attention and discussion among the public,and may lead to group polarization in social media that is characterized by anonymity,high interaction and publicity.This paper views group polarization from the perspective of diversity of opinions,and proposes to measure group polarization based on the trend of the relative sizes of various opinions.[Method/process] Group polarization is regarded as a dynamic process.The opinion dispersion degree at each stage is computed,and the sequence of opinion dispersion degree is processed by regression analysis.It can be determined that there exists group polarization if the regression coefficient is significant and positive;there exists depolarization if the regression coefficient is significant and negative;it cannot be determined there exists polarization if the regression coefficient is not significant.This paper also presents the method of measuring and visualizing group polarization on social media based on text mining.[Result/conclusion] This paper takes the discussions on gender equality caused by “Nineone’s Speech on Music Festival” on Sina Weibo as an example to analyze and visualize the group polarization in these discussions,which shows there is no group polarization.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance To study the influencing factors and configuration path of digital hoarding behavior with college students as a sample,which can help enrich the related research in this field and provide some suggestions and countermeasures for the intervention of digital hoarding behavior among college students.Method/process Based on social cognitive theory,we analyzed the influencing factors of digital hoarding behavior from both individual and situational perspectives through questionnaire survey method and fuzzy set qualitative comparative analysis method and constructed a theoretical model.Result/conclusion The necessity and sufficiency analysis was conducted by fsQCA software and R software,and the results concluded that there were no necessary conditions for digital hoarding behavior among the six condition variables,and a total of five paths were obtained to trigger digital hoarding behavior,which can be further integrated into three major configurations according to their characteristics and the distribution of core conditions:preventive measures,precise location,and element aggregation.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance Aiming at the problem that the results of several comprehensive evaluation methods of academic influence of scholars are inconsistent,this paper proposes a novel combination evaluation model of academic influence of scholars considering consensus degree.Method/process Firstly,the concepts of this years total citations,last years total citations,and previous years total citations are defined,on the basis of which the index system of academic influence of scholars that contain H index,total citations,and these concepts is constructed.Then,the entropy weight-based Technique for Order Preference by Similarity to an Ideal Solution (EW-TOPSIS) method,Vlse Kriterijuska Optimizacija I Komoromisno Resenje (VIKOR) method,Heronian operator,Decision-making Trial and Evaluation Laboratory (DEMATEL) method,and power operator are utilized to calculate 5 different comprehensive evaluation results of academic influence of scholars.Finally,the information fusion method considering consensus degree is designed to determine the combination evaluation results of academic influence of scholars.Result/conclusion Taking 26 experts of international fuzzy decision-making field as the object,the empirical analysis shows that this model can get an objective and fair rank of academic influence of scholars owing to not only can this model consider the advantages and disadvantages of each comprehensive evaluation method,and avoid the adverse influence of the random selection of comprehensive evaluation methods,but this model can also get more reliable combination evaluation results.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance In the new era,intelligence support for rapid response to emergency decision-making has become an important part of emergency management.The application research of emergency management intelligence analysis based on war gaming thinking is a discussion of rapid response to emergency decision-making based on the core of emergency management intelligence analysis and the implementation method of war gaming.Method/process Firstly,the literature review is carried out on the related research on emergency management intelligence analysis,and the theoretical overview of the MPRR model and war gaming is carried out.Secondly,on the basis of sorting out the pain points of emergency management,the applicability of war games into emergency management is analyzed,and an intelligence analysis framework that fits the MPRR model and war games is constructed,and the corresponding analysis is carried out.Finally,in order to verify the practicability of the framework,taking urban flood disasters as an example,the whole process of the implementation of the urban flood disaster emergency management intelligence analysis war game is demonstrated from the three stages of preparation planning,implementation simulation and summary evaluation.Result/conclusion The study believes that war gaming have enriched the intelligence methods and theories of rapid response to emergency decision-making to a certain extent.At the same time,it also provides positive practical value for the on-site disposal and emergency deployment of emergency management.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance Public emergencies have become a difficult problem in social governance,and exploring the early warning process of the network public opinion crisis of the incident will help relevant departments to scientifically understand the development trend of public opinion and improve the ability to deal with crises.Method/process Based on the knowledge metamodel,this paper first expresses the network public opinion crisis early warning scenario from four aspects:scenario events,scenario driving elements,scenario reasoning elements,and scenario target elements,and constructs a dynamic Bayesian network model of early warning scenarios.Secondly,the model is trained and tested in combination with the EM algorithm,and the influencing factors of public opinion crisis early warning under each scenario are clarified.Finally,taking the epidemic incident at Nanjing Lukou Airport as an example,the early warning level of public opinion crisis in each scenario is evaluated and analyzed.Result/conclusion The dynamic Bayesian network trained in this paper has certain reliability,and different response plans in different scenario states will have different impacts on the warning level of public opinion crisis,providing a reference for the government and relevant departments to dynamically make crisis emergency decisions.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance Due to the abundance of existing technical resources and the industrys first-mover advantage,some countries and enterprises form the industrys technical barrier.This paper puts forward the method of detecting the core technology and identifying the gap between domestic and foreign technology,which may provide reference for Chinese enterprises to seek technological breakthrough opportunities.Method/process According to the product components,the paper builds four dimensional diagram (product-component-enterprise-patent),and mines products core technology on the basis of network-performance of technology and importance of technology.Then the paper identifies the technology gap between domestic enterprises and foreign enterprises based on TSA (Technology Share in the Area).Finally,the patent data of phone camera products from 2011 to 2021 are applied to empirically analyze the core technology of each component of phone camera products and the technology gap at home and abroad.Result/conclusion There is a big gap between Chinese and foreign enterprises in the fields of focusing motor,protective film,infrared filter and lens,while in the fields of image sensor and circuit connection substrate,Chinese enterprises has advantages.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance This article researches the regularity of information behavior to the initial-phase visitors of enterprise virtual brand communities in the stage of pre-registration.It provides guidance for the corporate community to implement targeted policies to meet the specific information value needs to initial-phase visitors.Method/process Summarizing the information behavior patterns of initial-phase visitors under different information value demands analyses the characteristics and influencing factors of basic information behavior by eye-tracking experiences of the role play.Result/conclusion Results show the significant differences in the information behavior patterns of initial-phase visitors under two differences value-needs of information for use and information for emotion.In these two patterns,characteristics and influencing factors of basic information behaviors to visitors for surfing and browsing are diversity.These two different information behavior patterns may response the variety of actions to initial-phase visitors by enterprises.

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] To assist the novelty evaluation of massive scientific literature,article abstracts and relevant citation texts are used to construct the commentary profile of scientific article from the perspective of research question and research method.[Method/process] This paper proposes a method of review profiles of scientific article that integrates the content of “self-evaluation + other-evaluation”.This method is based on sentences such as analytical questions and methods of structured abstracts of journal article,takes a single journal article as the target article,takes citation sentences in citing articles as a citation data set and categorizes them according to rules,and visualizes the self-evaluation and other-evaluation.There are two kinds of profiles in the construction of review portraits in scientific papers:one is visual classification according to problems and methods in citation texts,and the other is visual classification according to self-citation,other-citation and sentimental analysis.[Result/conclusion] The review profile of scientific article can display research results of the target article combining the perspectives of article authors and citation authors,which could assist the novelty assessment of scientific articles by combining the information of self-citation,other-citation and sentimental analysis.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Although multi-modal resources are rich in types,they are scattered and disordered.It is of great value for intelligent management and deep service of multi-modal resources to explore the implicit knowledge association among multi-modal resources and realize cross-modal and multi-angle knowledge reorganization.[Method/process] In this paper,based on the characteristics and the requirements of knowledge service,combined with the characteristics of the multi-modal resources,explore the multi-modal resources of knowledge mining scheme,and based on this scheme to explore general multi-dimensional knowledge restructuring scheme.On this basis,represented by multi-modal red resources,through the acquisition and processing of multi-modal resources related to red character Chen Yi,to achieve the knowledge reorganization of related text,image and video resources,and developed a visual knowledge service platform “old things of Chen Yi” project,it also discusses the realization path of visual knowledge service from different dimensions such as time,place,character and topic.[Result/conclusion] Through empirical research,the applicability and feasibility of the proposed knowledge reorganization scheme are verified,it can provide some reference for the deep mining,multi-dimensional organization and service application of multi-modal resources.[Limitations] Image and video resources need to be further explored;the way of knowledge association needs to be supplemented.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] To address the problems of vague pricing criteria,lack of transaction rules and information asymmetry between buyers and sellers,we propose a data resource pricing method based on stacking multi-algorithm fusion model.[Method/process] Firstly,the sample data are pre-processed based on the quartile method and Box-Cox method,and the data distribution is adjusted while eliminating abnormal data,and the feature screening is completed based on the Lasso algorithm with the goal of minimizing the root mean square error.Finally,we analyze the transaction data of Guoxin Youyi data platform as a sample.[Result/conclusion] The results show that the prediction accuracy and performance of XGBoost,SVR,KNN and MLP fusion model are significantly improved compared with the single-algorithm model and other integrated model algorithms;the two-way feedback balance between data resources themselves and the market is achieved,forming a closed-loop value chain and providing a reference for data resource pricing.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Key technical problems are of great significance for assisting innovation entities to grasp the direction of innovation breakthroughs,conquer key core technologies,and promote technological innovation.[Method/process] Aiming at the shortcomings in the identification samples,processes and methods of the current key technical problem areas,a multi-text analysis framework for identifying key technical problems in the field is proposed.It is mainly based on the technical background of the patent specification,supplemented by the conclusion of the review paper and the technical requirements document.The analysis is carried out from four links:data acquisition and transformation,technical problem extraction,technical problem topic identification,and key technical problem discovery.[Result/conclusion] The case study in the field of graphene proved the effectiveness of the multi-text analysis of the field’s key technical problem identification framework,and discovered the technical background of the patent specification,the conclusion of the review paper and the technical requirements document on the performance of mining technical problems,the description polarity,and the results have different interpretation strengths,which can be mutually corroborated and supplemented.
  • Abstract ( ) Download PDF ( )   Knowledge map   Save

    Purpose/significance The US controlled unclassified information system is generated or held by the US federal government,which is not a state secret.However,according to the laws,regulations and policies,it should take protective measures or restrict the management of information dissemination,which has reference value for the management of unclassified sensitive information of our government.Method/process Study the background and origin of the US controlled unclassified information system,study the management system and technical standard system,analyze the functional structure and development trend of the system implementation,and explore the reference path in comparison with our government's unclassified sensitive information.Result/conclusion Based on the common analysis of the protection of unclassified sensitive information,the study proposes to accelerate the construction of relevant management systems in China,form the scope of government unclassified sensitive information matters,establish a technical protection standard system and clarify relevant legal responsibilities.