Journal Information
Sponsor: China Society for Defense Science and Technology Information
                Institute No. 210,CNGC
International serial number: ISSN 1000-7490
Domestic serial number: CN 11-1762/G3
Mailing address: Box 10, Box 2413, Haidian District, Beijing
Postal code: 100089
Email: itapress@163.com/1587682149@qq.com
Tel: 010-68961793/68963306
WeChat public account: qbllysj
2024 Volume 47 Issue 10 
Published: 15 November 2024
  
  • Select all
    |
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Intelligence facts (or intelligence evidences,including “raw WIKID” and “WIKID memes”) are the changes and trends of concerned things (and their pseudo presences) mapped into the arena of intelligence studiesCorrect understanding and effective employment of the concept of intelligence facts is helpful for both the exploration of the intelligence studies and the healthy development of the intelligence enterprise[Method/process] This paper,starting from the discussion of several related concepts,clarifies the concept of intelligence facts,explains three types of intelligence facts,displays the basic methods for creating WIKID memes through WIKID exploitation procedures,and analyses the concepts of “clues/threads”,“signals”,and “weak signals”[Result/conclusion] This paper points out that,by consciously and actively using the intelligence facts and practicing critical thinking,intelligence personnel and organizations can rapidly improve the quality and efficiency of their intelligence work in the process of addressing the challenges of information incompleteness faced by customers while making their decisions

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Exploring the mechanism and path of newquality talent training from the perspective of data elements,has very important and practical significance for accelerating the development of newquality productive forces (NQPR).[Method/process] Based on Marx’s Labor Process Theory,how to use data to enable the upward transformation of traditional productive forces to NQPR is clarified,how to use data elements to activate the core literacy of newquality talents is explained,and how to train newquality talents through the new educational paradigm is proposed[Result/conclusion] Data elements’ multiplier effect was played to unleash the full potential of dataThe core literacy development system of newquality talents with information literacy,digital literacy,innovation literacy,management literacy and interdisciplinary literacy was builtThe recommendations for the throughtheline training of newquality talents,emphasizing the application of digital technology to foster highquality development of education and expedite the establishment of a novel paradigm for comprehensive science education,have been put forth
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Along with the proposal of the overall national security concept,it has become a consensus in the intelligence community to create a secondlevel discipline of national security intelligence under the firstlevel discipline of national security scienceIn this context,a correct grasp of the concepts and methods of national security intelligence theory and research will help promote intelligence research to better serve the enhancement of national security capabilities[Method/process] Based on the academic contributions and dilemmas of national security intelligence theory research,we explain the philosophical basis of national security intelligence theory,and put forward the strategic choice of constructing national security intelligence theory with Chinese characteristics[Result/conclusion] The philosophical basis of intelligence theory determines that the construction of national security intelligence theory with Chinese characteristics should take into account the basic theory of intelligence and the applied theory of intelligence,the study of the history of intelligence and the study of intelligence normative theory,build a systematic and complete national security intelligence theory system with metatheory,mesotheory and microtheory,integrate the Chinese and foreign intelligence research,form the Chinese school of intelligence research,and find the theoretical basis for the development of intelligence science as a social science discipline and guide the theoretical researchTheory of intelligence as a social science discipline is to be found,and theoretical research is to be carried out under this guidance
  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] It is of practical significance to analyze the rationality and scientificity of China’s data elements policies in terms of policy tools,policy themes,and policy effectiveness to promote the sustainable development of data elements[Method/process] The paper takes 39 policy texts as samples,analyzes them through content analysis method,TFIDF algorithm,LDA theme modeling and PMC index model,and puts forward feasible suggestions based on the results[Result/conclusion] The results show that:① There is an imbalance in the use of data elements policy tools and their internal subtools,which is generally characterized by the Chinese government’s preference for supplyside policy tools and less use of demandside policy tools② There is a comprehensive coverage of policy themes,but there is an imbalance in regional development③ The overall performance of policy effectiveness is good,but there is still room for improvement of the scores on the indexes,such as policy timeliness and policy nature

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Privacy research involves a number of disciplines,and privacy scales are measurement tools in privacy research,yet there are divergences and differences in the understanding and objects of privacy scales in domestic and international researchTherefore,it is necessary to sort out the privacy scales to provide a reference for the subsequent quantitative research on privacy[Method/process] Through systematic literature review,we investigate the research results of privacy scales at home and abroad,sort out the objects and indicators of different privacy scales,and analyze the measurement focus of privacy scales from different perspectives[Result/conclusion] It is found that the existing privacy scales mainly include the privacy scales for users and the privacy scales for Internet service providers,which involve the measurement of users’ subjective feelings and the objective measurement of private informationIn addition,due to different understandings,there are indicators in the privacy scales for different objectsFuture research may consider combining cognitive and behavioral aspects in scale design,enhancing the complementarity of privacy general and special scales,focusing on their operability and dynamic portrayal of indicator design,and expanding the measurement of the risk of privacy information content

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    Purpose/significance] In academic evaluation,there are so many weight assignment methods to a certain extent,which also shows that there are many problems in it[Method/process] Introducing the error theory into the index weighting of academic evaluation,taking academic journals as an example,this paper analyzes the generation mechanism of accidental error and systematic error in weight assignment of academic evaluation index from the perspective of toplevel design of evaluation,index weighting method,and implementation of weight assignmentAnd put forward corresponding countermeasures[Result/conclusion] The study found that we must pay attention to the error of the weighting of academic evaluation indicators,and we should take systematic measures to reduce the error of academic evaluationIt is suggested that the results of academic evaluation must be checked for errorsThe scope of influence of weight assignment errors is very farreaching,and it cannot be simply analyzed from the weight assignment link,but should be comprehensively analyzed from the perspectives of evaluation design,index selection,weight assignment,standardization methods,and evaluation methods

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Conversational search is one of the key topics discussed in the field of interactive information retrieval,and it may become an information retrieval paradigm that will dominate the future in the context of HumanAI interactionThis paper reviews the theoretical and applied research progress of conversational search,in order to build a bridge between humanity and technology,enhance technological innovation,and finally focus on the improvement of user interactive experience of conversational search,providing inspiration for subsequent research[Method/process] Adopting a systematic review method,this paper firstly constructs the 4A conceptual analysis framework of conversational searchThen systematically sorts out the relevant research topics of conversational search in the context of HumanAI interaction from the four aspects of algorithm fusion,user interaction,effect evaluation and application practiceFinally,from the perspective of library and information science,this paper proposes the future research prospects of user conversational search behavior,including broadening the application boundaries of classical theories and models in the field of information behavior,optimizing the design elements of conversational search user information interaction behavior research,promoting the extension and expansion of conversational search under the perspective of "search as learning",building a conversational search efficiency evaluation system under the HumanAI interaction context,and creating new application scenarios of conversational search in the field of knowledge services[Result/conclusion] Relevant research conclusions can further enrich the research field of information retrieval,provide references for the design of conversational system functions and services,and form some enlightenment for the development and management of HumanCentered AI in a certain sense

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Research on the generation mechanism of information fog in border security risks is conducive to clarifying the impacts on border security and further exploring how to control border security risks through the information fog[Method/process] Based on indepth research in border areas and guided by information entropy theory and information awareness theory,the generation mechanisms of information fog in border security risks are summarizedBuilding on this foundation,information awarenessresponse strategies for border security risks are proposed[Result/conclusion] The generation mechanisms of information fog in border security risks involve issue construction,expression through writing and transmissionBased on this,strategies for addressing border security risks in the information fog include building a fact repository,intelligent scanning and monitoring,continuous perception,and categorized responses

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Digital government construction is one of the important driving forces of government reformThe formation of a good synergy state of digital government policies in the central and local regions can maximize the role of digital government construction in transforming government functions and breaking information barriersThrough the quantitative study of the centrallocal coordination status of digital government policies,the current situation of targeting,text innovation and implementation effect of digital government policies in the central and local regions can be clarified[Method/process] Taking 336 digital government policies in the central and local regions from 2019 to 2023 as the research sample,this paper uses the LDA topic modeling method,Doc2Vec and PMC index analysis method to establish a threedimensional analysis framework of “topic responsivenesstext responsivenesseffectiveness synergy degree” to conduct a quantitative study of the centrallocal coordination status of digital government policies[Result/conclusion] Central and local governments have issued more digital government policies,but there are great differences between provinces and regionsThe central and local policy theme synergy effect is good,and the policy text inheritance and innovation show a balanced stateThe policy effectiveness of some provinces needs to be further strengthened to promote the benign coupling and diffusion development of centrallocal policies


  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Currently,online media has become the main channel for information dissemination.Exploring the influencing factors of cross platform dissemination of event information is of great significance for improving the effectiveness of communication[Method/process] This study constructs a general mode for cross platform dissemination of event information based on multi case analysis,aiming to provide theoretical reference for information publishers to optimize dissemination strategies and effectively respond to online public opinionBy combining field theory and hypothetical news schema structure,an event information field framework is proposedBased on attention allocation theory,twolevel communication theory,and other theories,a framework of factors affecting the crossplatform dissemination effect of event information is constructedThe fsQCA method is used to analyze the condition configurations of four results of 30 cases:high and low platform coverage,and high and low dissemination heat[Result/conclusion] Environmental heat is a key driving factor for cross platform dissemination of event information,opinion leaders play an important role in expanding dissemination breadth and increasing dissemination heat,and less plot reversal helps to control the effectiveness of disseminationNon environmental heat (Reverse measurement) and nonplot reversal are necessary conditions for low platform coverage and low dissemination heatThis study proposes that the information dissemination of positive events can be improved by avoiding major hot events,creating complex plot settings,and refining communication strategiesFor negative events,interventions can be made by increasing environmental heat,implementing soothing emotional mobilization strategies,and responding promptly to avoid rumors,so as to avoid causing overheated public opinion and negative social impact

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Under the background of great power games and scientific and technological competition,the demand for information continues to grow,and the importance of national defence scientific and technological information is becoming more and more prominentConducting research on the assessment of the capabilities of defence scientific and technological information and constructing a relevant system of assessment indicators will help to fulfil the tasks of defence scientific and technological information[Method/process] The paper proposes a task descriptionoriented method for the construction of national defence science and technology information capability assessment index systemFirstly,taking the relevant studies in Chinese Social Sciences Citation Index database as the basic corpus,the theme model is used to obtain the classification results of the themes to generate the assessment indexesSecond,taking the tasks of national defence science and technology strategic information synthesis and judgment as an example,the assessment indexes are screened based on the semantic similarityFinally,the weights of the indexes are calculated,and the construction of the assessment index system is completed[Result/conclusion] According to the characteristics of different information tasks to build a differentiated information capability assessment index system,the results verify the effectiveness of the methodology,the comprehensive consideration of the strength of the source theme and the similarity of the index weight is more in line with the needs of the completion of the national defence science and technology information tasks

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The paper explores the relationship between social media false information’s characteristic and perceived trust,in order to enhance college students’ ability to distinguish false information[Method/process] It extracts general features of false information through grounded theory coding,and analyzes its relationship with perceived trust through the combination of questionnaire surveys and eye movement experiments[Result/conclusion] ①False information generally includes five feature dimensions(33 sub features):content,publisher,disseminator,emotion and form②College students mainly focus on the publisher,title,content,and image text when reading false information③The perception of trust is significantly correlated with the features of false information content,publisher,form and emotionalThis relationship is not influenced by the disseminator④The average perceived trust rating of college students towards false information is 295±1340,and their ability to identify false information needs to be improved

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Social media has become an important way to disseminate information about major public health events,and social media recommendation algorithms have an important impact on the dissemination of information about major public health eventsSocial media users participate in social media algorithmic rules through algorithmic resistance behaviors to actively regulate access to information about major public health eventsAlgorithm resistance behavior is important information behavior of users in social media information dissemination of major public health events[Method/process] This paper analyzes the interview data of 25 interviewees using the grounded research method,delineates the process stages of social media users’ algorithmic resistance behaviors under major public health events,identifies the influencing factors of different process stages,and summarizes the theoretical model of the process of algorithmic resistance behaviors[Result/conclusion] The process of algorithmic resistance behavior of social media users under major public health events includes the stage of situational demand triggering,the stage of recommendation evaluation and experience,and the stage of resistance assessment and decisionmakingAlgorithmic resistance behavior is directly influenced by the elements of resistance strategy evaluation,user literacy,emotional experience,recommendation evaluation,and indirectly influenced by situational pressure and user needsThis paper helps to deepen the theoretical study of social media users’ information behavior under major public health events,and provides a reference for emergency management and public opinion governance practices of major public health events

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] As the main audience and carrier of public opinion propagation,the indepth analysis of netizens’ spreading behavior and its driving factors are of great significance for understanding the spreading law of public opinion and improving the cyberspace governance system[Method/process] Focusing on the formation logic of netizens’ spreading behavior,with the help of network game,this paper designed three scenarios of public opinion propagation models that couple emotion and payoff,and quantified three methods of public opinion governanceThen,the spreading characteristics of public opinion were analyzed and the governance effects of different governance methods were compared thorough simulation experiments[Result/conclusion] The research shows that the public opinion propagation model coupled with emotion and payoff is more in line with the actual spreading processThe effect of emotional governance is unexpected and close to that of technical governance,both of which are superior to institutional governanceCompared with governance intensity,governance effect is more sensitive to governance timing;and the three indicators which represent netizens’ attributes play a differentiated role during public opinion propagation processA series of public opinion governance suggestions are proposed based on research findings

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] For the cultural industry,data storytelling with low cognitive threshold,strong interactive experience,and distinctive memory points enriches the path of cultural inheritance and dissemination,and provides a new medium for awakening collective memoryHowever,the current research on data storytelling mainly focuses on the generation of story content,ignoring the precontrol of source data,which makes the credibility and integrity of the story questionable[Method/process] Therefore,evidencebased thinking is introduced to construct a data storytelling model for archival documentary heritage,upholding the three basic principles of traceability evidencebased,reliability evidencebased,and interpretability evidencebased,comprehensively searching for evidence of events,constructing a chain of evidence of events based on spatiotemporal correlation and semantic logic,and combining the method of multivariate mutual evidence to create more accurate stories[Result/conclusion] Taking “Suzhou Taffeta Craft” in “Suzhou Silk Archives of Modern China” as a case study,we verify the validity and feasibility of the model,and reshape the research paradigm of data storytelling

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] With the popularization of digital reading and the transformation of information acquisition methods,fragmented reading has become a new normal of readingThis article aims to explore the psychological effects of fragmented reading on users,and investigate the impact of fragmented reading on subjective wellbeing and the mediating effect between them[Method/process] This article combines the fragmented reading context to design the Basic Psychological Needs Satisfaction Scale,the Fragmented Reading Positive and Negative Emotion Measurement Scale,and uses life satisfaction and emotional balance to jointly measure subjective wellbeingBased on the selfdetermination theory,this study examines the impact of fragmented reading content types on subjective wellbeing and the mediating role of basic psychological needsData is collected from fragmented reading groups using a questionnaire survey method[Result/conclusion] Firstly,news and information oriented,knowledge learning oriented,and entertainment oriented fragmented reading have a significant positive correlation with subjective wellbeingSecondly,the three types of fragmented reading are significantly positively correlated with life satisfaction,but not significantly correlated with emotional balanceThirdly,the autonomy and relational needs in basic psychological needs play a complete mediating role between the three types of fragmented reading and subjective wellbeing

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The application of S&T data for technical monitoring and early warning is an important issue for the research of S&T informationAt present,there are problems with a large number of technical elements extracted from S&T literature using natural language processing technology,which are difficult to displayThis paper proposes a technical filtering approach that integrates the features of S&T and public opinion data to screen and filter technical mining results[Method/process] In this paper,technologies are represented by technical terms extracted from the dataBased on lexical structure analysis and modifier matching methods,a hierarchical structure system of technical terminology is constructedUsing paper data representing the popularity of basic research on technology,patent data representing the popularity of technology research and development,and public opinion data representing the market attention of technology,four types of features are constructed:importance,growth,novelty,and persistenceMachine learning methods are used to train and determine the technology filtering model[Result/conclusion] By comparing the results with manual filtering,it was found that this method is more effective in filtering techniquesAmong various models,the technology filtering model constructed using three types of data and four types of features simultaneously has the best performanceThis method can provide a basis for conducting technology identification and prediction work,and developing technology mining tools[Limitations] This method has only been validated in the first layer of the technical terminology hierarchy,and further research is needed in terms of domain applicability and data types

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Citation Topic Recognition/Analysis (CTR/CTA) is one of the important research fields in Citation Content Analysis (CCA)Identifying/extracting topics from the citation corpus is expected to provide a new solution for the further research on the evaluation of academic contributions,analysis of knowledge diffusion and evolution[Method/process] This paper takes a highly cited paper related to the Nobel Prize in Physiology or Medicine as an example,uses the BERTopic algorithm to identify its citation topics based on its citation sentence corpus,and then analyzes and discusses the citation topics from multiple dimensions[Result/conclusion] Our research shows that CTR/CTA of a single highly cited paper can reveal its academic contributions and their evolution trend in a more comprehensive and detailed waySpecifically,BERTopic algorithm can well identify citation topics in our case paper;the characteristics of citing papers vary among different citation topics;the analysis of importance and evolution trend of citation topics and their differences from its original text topics can describe peers’ understanding of academic contributions to case paper from different dimensions,which further indicates that CTR/CTA research has indepth exploration value using for academic paper evaluation

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] The evolution of the training model of the national security intelligence science should be consistent with the national intelligence strategyThe training model of security intelligence specialty in the United States has maintained a good interaction relationship with the national intelligence strategy for a long timeAnalyzing its training mode has important theoretical and practical significance to improve the discipline systems of intelligence science[Method/process] Using USNew Major List and CIP course catalog as reference,the courses and teaching syllabuses of security intelligence majors in 20 selected American universities were quantitatively analyzed in order to explore the cultivation rules behind their department arrangements,specialty divisions,and curriculum settingWith the help of Khcoder text analysis tool,the word frequency analysis of the 2022 USNational Security Strategy was carried out,and training objectives proposed in the National Intelligence Strategy of the United States in 2023 were cited to verify and analyze the training mode of security intelligence of the United StatesCombining with the current situation of national security and intelligence science,this paper puts forward the training plan and curriculum setting path of national security and Intelligence science[Result/conclusion] In order to meet the overall needs of national security,the intelligence science training model of “purposemodalstrategy” has been initially formed for security intelligence majors in American universitiesReferring to this model,China’s national security intelligence science should take the overall national security concept as the strategic guidance,and the differentiation training as the “general starting point”In the concrete path,should establish the training purpose of serving intelligence strategy and improving the level of intelligence workClarify the curriculum system as soon as possible,improve the curriculum content,and avoid falling into the trap of conceptual terminology interpretation;focusing on the training purpose,implement the training program both integrity and innovation,take the discipline system as the “guiding standard”,and refer to Qian Xuesen’s theory of discipline hierarchy to promote the embodiment of the training model

  • Abstract ( ) Download PDF ( )   Knowledge map   Save
    [Purpose/significance] Through indepth research and content analysis of the governance policies of crossborder data flow in the United States and the European Union,this paper aims to provide enlightenment and reference for the formulation and management practice of crossborder data flow governance policies in China[Method/process] Based on the theoretical model of data life cycle,this paper uses literature research,network survey and qualitative text analysis to sort out and analyze the policy content of crossborder data flow governance in the United States and the European Union,and refines the common content elements of the policy by constructing a policy text analysis category system[Result/conclusion] The results show that the United States and Europe have integrated the idea of data life cycle into the governance policies of crossborder data flow,and there are many commonalities between the two,which reflects the overall compliance of crossborder data flow policymakingBased on this,this paper combines the common elements of the policy content of the United States and Europe,and based on China’s national conditions,and focuses on the “trilemma” in crossborder data flow,and puts forward countermeasures and suggestions from the aspects of protecting personal data rights,balancing crossborder data flow and data security,and maintaining data sovereignty,so as to provide ideas for the formulation and improvement of China’s crossborder data flow governance policies