Most Viewed

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All

Please wait a minute...
  • Select all
    |
  • LI Hui, CHEN Shu, TAN Xiao
    Scientific Information Research. 2025, 7(3): 1-11. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.001
    [Purpose/significance]The unique form and systematic characteristics of great power competition, such as system-establishment and whole of society confrontation, multi-domain and multi-depth high-tech containment and counter-containment, and multi-means and multi-element mixed deterrence, determine that national scientific and technological intelligence must have considerable systemic capabilities to match and follow up. [Method/process]This article focuses on scientific and technological intelligence institutions within the traditional system, defines the connotation of national scientific and technological intelligence system capabilities, constructs a six-dimensional capability cognition model of "institutional improvement capability-system coordination capability-resource guarantee capability-technological innovation capability-intelligence shaping capability-safe operation capability", and expounds its main contents. [Result/conclusion]Based on the six-dimensional capability cognition model, this article proposes the main tasks for the development of national scientific and technological intelligence system capabilities, with a view to providing reference for achieving optimal overall emergence of the national scientific and technological intelligence system.
  • YANG Guoli
    Scientific Information Research. 2025, 7(3): 123-132. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.012
    [Purpose/significance]The security intelligence process is the fundamental path for intelligence to support security governance and decision-making. The incompleteness and even deceptive nature of the information relied upon in security intelligence activities, as well as the concealment and adversarial nature of security issues, determine significant differences in the scientific perspective and methodology of constructing security intelligence processes compared to other intelligence processes. [Method/process]Starting from the analysis of existing problems in the security intelligence process and optimization suggestions, this article constructs a security intelligence process model based on the conceptual model of the intelligence process, based on the information chain theory. [Result/conclusion]The constructed security intelligence process model emphasizes intelligence requirement management based on security event systems, strategic intelligence research oriented towards conceptualization of security event systems, and operational mechanisms such as the integration of intelligence business flow and security information flow. In addition, this article provides strategies for identifying intelligence requirements, evaluating the reliability of information sources, iterating and upgrading information collection, understanding the meaning of information, protecting intelligence activities, and identifying proactive defense and opportunity creation, among other key questions of the security intelligence process.
  • LIU Jiangfeng, WANG Zihui, HU Zhiwei, PEI Lei
    Scientific Information Research. 2025, 7(3): 93-100. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.009
    [Purpose/significance]Clarifying the influencing factors of young scholars' willingness to use AIGC and its path of action,then making effective enhancement strategies,would help to further expand the application of AIGC in academic writing. [Method/process]This paper combs through the studies on AIGC information behavior, and identifys TOE(Technology-Organization-Envifonment,TOE) theory and research life cycle theory as the base theory. Semi-structured interviews were conducted for procedural grounded theory coding. Then, a questionnaire survey and qualitative comparative analysis using fuzzy sets were conducted to obtain the influencing factors grouping path. [Result/conclusion]Five factors, induding content quality, system quality, perceived risk, expectation confirmation, and group norms, together constitute an influential model of willingness to use AIGC in young scholars' academic writing. The group norms analysis produces three paths of high-level willingness to use: system-dominant, expectation-group double-dominant, and content-expectation double-dominant paths. Strategies are proposed to improve the willingness to use AIGC in young scholars' academic paper writing, including improving the quality of content and optimizing the platform system at the technical level, improving the literacy of AI-use and managing expectations at the individual level, and accelerating the formation of norms and encouraging publicity and guidance at the environmental level.
  • LI Xiaoyu, GU Lei, MENG Haohan
    Scientific Information Research. 2025, 7(3): 133-142. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.013
    [Purpose/significance]Analyzing the perceptions of mainstream U.S. think tanks towards the China-U.S. competition in quantum science and technology contributes to examining their thinking frameworks and strategic judgments, providing strategic insights for China to effectively respond to U.S. containment and blockade in this field. [Method/process]By selecting 13 research reports from 8 mainstream U.S. think tanks and utilizing the literature analysis method, this study systematically reviews the multidimensional perceptions of U.S. think tanks on the China-U.S. competition in quantum science and technology, thus revealing the underlying logic behind their perceptions. [Result/conclusion]U.S. think tanks generally advocate for competition with China in quantum science and technology in the name of safeguarding national security. Their perceptions clearly reflect an underlying logic of right-wing political tendencies, techno-nationalism, and national policy orientations. In light of this, China should incorporate elements such as independent innovation, international cooperation, and supply chain security into policy considerations.
  • ZHOU Jie, AN Peijun, XIAO Xiantao
    Scientific Information Research. 2025, 7(3): 59-69. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.006
    [Purpose/significance]Starting from the related concepts of disciplinary topic evolution, this study comprehensively examines the forms and methods of disciplinary topic evolution. It identifies problems with existing concepts and shortcomings in current methods, and suggests directions for improvement, providing a reference for future research in this area. [Method/process]Using a systematic review method, the literature on disciplinary topic evolution from the CNKI and Web of Science, as well as other academic platforms, was analyzed. The study defines related concepts, summarizes the forms of disciplinary topic evolution, and systematically reviews the current state of research on methods for disciplinary topic evolution. It analyzes existing methods from different perspectives: word frequency-based methods, co-word-based methods, citation-based methods, and topic model-based methods, summarizing their respective advantages and disadvantages. [Result/conclusion]This study defines the concept of disciplinary topic evolution, clarifies the forms of disciplinary topic evolution, and summarizes the gaps in existing research, such as the unclear definition of the concept, non-standard evolution forms, single data sources and the limited diversity of analytical methods. Finally, it proposes future directions, including clarifying the connotation and extension of disciplinary topic evolution, standardizing its forms, utilizing multi-source data as data sources, and actively integrating different methods for topic evolution analysis.
  • WANG Xuefen, GUO LEI, CHANG Liyan, JIANG Zejiao
    Scientific Information Research. 2025, 7(3): 36. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.004
    [Purpose/significance]To explore the internal formation mechanism of unplanned irrational online comments is of great significance to promote the governance of cyberspace and the control of user behavior. [Method/process]Based on the dual-system theory, the study constructed a model for the formation mechanism of irrational online comments, and revealed how online disinhibition and the spiral of silence affect individual internal states to stimulate irrational comments through empirical analysis. [Result/conclusion]Research reveals that:compared to mild irrational comments, aggressive irrational comments are more likely to be unplanned behaviors; the cognitive-emotional preoccupation with online comments is the main driving factor for irrational online comments, while the cognitive-behavioral control over online comments plays a partial inhibitory role; online disinhibition intensifies cognitive-emotional preoccupation and weakens cognitive-behavioral control, while the spiral of silence simultaneously strengthens cognitive-emotional preoccupation and cognitive-behavioral control; online disinhibition and the spiral of silence positively affect irrational online comments through the mediating role of cognitive-emotional preoccupation; cognitive-behavioral control serves as a mediating factor in the impact of online disinhibition on aggressive irrational comments.
  • YU Chuanming, DENG Bin, ZHANG Zhengang
    Scientific Information Research. 2025, 7(3): 12-23. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.002
    [Purpose/significance]This study addresses the issue of inadequate perception of entity boundaries in traditional character-level modeling-based named entity recognition models by integrating syntax information containing entity boundary features into the task using a multi-head graph attention network with dense connections. This integration enhances the effectiveness of named entity recognition. [Method/process]This study proposes a Syntax-enhanced Boundary-aware Named Entity Recognition Model (SynBNER), which utilizes BERT for text semantic representation and integrates syntax information using a dense-connected graph attention network. This integration incorporates implicit entity boundary information from syntax information into word representations, thereby enhancing the model's entity boundary perception capability. [Result/conclusion]Empirical studies are conducted on the ACE2005, MSRA, and People's Daily datasets, the F1 scores of the SynBNER model are respectively 86.11%, 96.03%, and 95.81%. The experimental results demonstrate that the method of enhancing entity boundary awareness with syntax information can significantly improve the effectiveness of named entity recognition.
  • WEI Ruibin, WANG Yidan, XU Yan
    Scientific Information Research. 2025, 7(1): 41-52. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.004
    [Purpose/significance]The main path analysis of citation networks can be used to identify important literature in specific fields and can achieve the extraction of mainstream research threads. This paper will use the main path analysis method to analyze the research path of knowledge graphs and sort out the context of their research development. [Method/process]This paper firstly obtains research papers in the field of knowledge graphs from the Web of Science platform, then uses the HistCite software to generate a direct citation network of the literature, and then imports the data into Pajek to generate multiple main paths of the dataset, and combines the content of the papers on the main paths for qualitative analysis. [Result/conclusion]Through main path analysis, some main paths in the field of knowledge graphs can be quickly identified, such as the construction of knowledge graph, research on the application of knowledge graphs in recommendation and question answering and other application scenarios, research on the application of knowledge graphs in specific application fields such as manufacturing. These paths reflect the development context and research direction of knowledge graph technology. Review studies have played an important role in the development of the knowledge.
  • HUA Bolin, WANG Yingze
    Scientific Information Research. 2025, 7(1): 53-64. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.005
    [Purpose/significance]With the strong ability to process large-scale datasets and outstanding performance in various natural language processing tasks, large language models (LLMs) have excelled across multiple industries. Since scientific and technical intelligence primarily relies on textual data, LLMs are naturally well-suited for this field, ushering in a new wave of transformative changes. [Method/process]This article discusses the advantages of LLMs from five perspectives: low-dimensional dense vector representations of text, large-scale pre-trained models, fine-tuning and prompt learning, high-quality large-scale training data, and human alignment techniques. [Result/conclusion]LLMs have extensive applications in tasks such as intelligence identification, intelligence tracking, intelligence evaluation, and intelligence prediction, resulting in significant optimization improvements or paradigm shifts.
  • ZHANG Chen, JIANG Weihan, QIAN Pengbo
    Scientific Information Research. 2025, 7(1): 118-130. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.011
    [Purpose/significance]This study aims to explore the influencing mechanisms of information addiction behavior among college students, providing valuable reference for the prevention and management of information addiction behavior among college students. [Method/process]The Stimulus-Organism-Response (S-O-R) theory is introduced, and the external stimuli in the process of college students' information addiction are summarized through literature review. The cognitive psychology that arises in the addiction process of the body is deeply analyzed, and the theoretical model of college students' information addiction behavior is constructed. The trigger path of college students' information addiction is empirically analyzed using structural equation modeling. [Result/conclusion]Based on the research results, information overload, intermittent rewards, and behavioral management significantly positively affect college students' avoidance of uncertainty, leading to information addiction. At the same time, information overload also makes college students produce information anxiety, and information anxiety significantly positively affects college students' information addiction behavior. targeted suggestions and countermeasures are proposed for higher education institutions, college student groups, and technology enterprises, which are conducive to improving the management system of higher education institutions, promoting students' adaptation to the information environment, and driving the better development couse of education.
  • WANG Dakun, HUA Bolin
    Scientific Information Research. 2025, 7(1): 131-140. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.012
    [Purpose/significance]Identifying and foreseeing emerging technologies, bring technological first-mover advantages to enterprises and governments, and grasp technological development trends in a timely manner. [Method/process]This study uses BERTopic's topic modeling method to obtain domain topic distribution, and merges paper and patent topics based on the cosine similarity of topic vectors to identify emerging topics. [Result/conclusion]Using the BERTopic topic modeling method combined with index evaluation can effectively identify emerging topics and emerging terms.Taking the field of new energy vehicles as an example to carry out empirical research, using two methods: divided verification period and data verification method, 12 of the 16 identified topics passed the verification, which verified the effectiveness of this research method.
  • LI Junhua, YUAN Qian, YAN Xiang, LV Changhong
    Scientific Information Research. 2025, 7(1): 95-108. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.009
    [Purpose/significance]This study aims to automatically generate claims using the GPT-4 model, in order to reduce the writing difficulty for inventor and improve the work efficiency and quality. [Method/process]The article constructs Prompts suitable for automatically generating patent claims and implements four prompting strategies: Zero-Shot, Exact-Drafting, Stepwise-Claim, and Exact-Step Claim. By inputting patent specifications and technical disclosure documents into the GPT-4 model and using Prompts to guide its output, the automated generation of patent claims is achieved. The ROUGE and BERTScore evaluation metrics were used to assess the quality of the text, and the generated text was analyzed in comparison with the reference text from multiple dimensions, including the number of claims, text length, high-frequency words, keywords, and common collocations. Finally, the quality of the generated claim documents was evaluated through expert assessment in five aspects: clarity, consistency, relevance, professionalism, and completeness. [Result/conclusion]Empirical research shows that the Exact-Step Claim prompting strategy significantly improves the quality of generated claims; moreover, claims generated based on patent specifications are more closely matched in the number of claims and text length with the reference texts, indicating that the application effect of the GPT-4 model in the field of natural language understanding and generation is closely related to the quality of the input text. This study provides an efficient and intelligent assistance method that contributes to the development of the patent text writing and review field. However, there are challenges, and further improvements are needed for the model to precisely understand complex technical terms and comply with patent regulations, as well as to explore how to optimize the model's ability to judge the number of claims and the length of the text.
  • DENG Sanhong, GUO Jianming, SHI Yujie
    Scientific Information Research. 2025, 7(2): 1-12. https://doi.org/10.19809/j.cnki.kjqbyj.2025.02.001
    [Purpose/significance]Disruptive technology is regarded as a revolutionary force that "changes the rules of the game" and "reshapes the future pattern", and has gradually become a hot and difficult issue in interdisciplinary research. This paper summarizes the literature related to disruptive technologies, clarifies the concepts and characteristics of disruptive technologies, subdivides research topics and directions, summarizes research focuses and looks forward to future development trends, and provides reference for relevant personnel. [Method/process]On the basis of sorting out the latest related research on disruptive technologies, this paper clarifies the research progress of disruptive technologies from three aspects: the concept and characteristics of disruptive technologies, common identification methods, and the evolution and prediction analysis of disruptive technologies, and grasps the research status and development trend of this field. [Result/conclusion]This paper comprehensively summarized the current research status of disruptive technology, and analyzed the existing problems and shortcomings.
  • DUAN Yuzhu, FU Qiang, LI Yuqiong
    Scientific Information Research. 2025, 7(1): 86-94. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.008
    [Purpose/significance]The innovation of national defense-related science and technology promoting the development of new-quality fighting capacity has become a national strategic demand, effectively forecasting innovation pathways in national defense-related science and technology is of great significance to improve the innovation capability of national defense-related science and technology and create the Chinese new quality fighting capacity. [Method/process] In view of characteristics of the innovation of national defense-related science and technology, i.e. mutability, uncertainty and high risk, this thesis constructs a logical framework of forecasting innovation pathway in national defense-related science and technology based on the theoretical analysis of the core elements of forecasting innovation path, and adopts three submodels i.e. identification of military needs, prediction of key technologies and mining of supportive policies to forecast innovation pathway in national defense-related science and technology. [Result/conclusion]The research results show that the foundation model can effectively predict the development trend of national defense-related science and technology and key technological break throughs, which provide scientific basis for the decision-making of innovation of national defense-related science and technology and effectively promote the integration of the new quality productivity and the new quality fighting capacity.
  • DENG Sanhong, ZHANG Yiqin, WANG Hao,
    Scientific Information Research. 2025, 7(1): 1. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.001
    [Purpose/significance]This paper explores the guiding role of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era in the development of the Information Resource Management discipline with Chinese characteristics, providing significant insights for the innovative advancement of China's Information Resource Management discipline and strengthening the discourse power of Chinese social sciences. [Method/process]This paper systematically reviews the core elements of the development philosophy of the Information Resource Management discipline within Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era from a holistic perspective, elucidates the logical system of the development of the discipline from the diverse perspectives of national strategy integration, innovative development paths, and discourse system construction, and summarizes the value implications from both theoretical and practical viewpoints. Based on research papers published in core journals of the Information Resource Management discipline and related policy texts, this paper employs topic mining techniques to analyze the development overview and thematic evolution features of the research in the Information Resource Management field from a concrete perspective. [Result/conclusion]This study results indicate that Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era has provided guidance for theoretical innovation and interdisciplinary integration in the field of Information Resources Management. It has strengthened the discipline's role in supporting and responding to national strategies, offering both theoretical foundations and practical references for the high-quality development of philosophy and social sciences with Chinese characteristics.
  • SHI Zhuorun, ZHAO Yupan, YAN Ruyu
    Scientific Information Research. 2025, 7(2): 72-81. https://doi.org/10.19809/j.cnki.kjqbyj.2025.02.007
    [Purpose/significance]The public data authorization and operation policy plays an important guiding role in further guiding and regulating the practice of public data authorization and operation, as well as promoting the development and utilization of public data. Analyzing the existing public data authorization and operation policies can provide important references for the development of public data authorization and operation practices, as well as for policy formulation and improvement. [Method/process]This article selects relevant policies on public data authorization and operation issued by various levels of government in China, and uses the structural topic model to analyze and evaluate the existing policy texts. [Result/conclusion]The research shows that existing public data authorization and operation policies focus on three main themes: data security, data sharing and openness, and operational supervision. Among these, there is more emphasis on the supervision of public data operation platforms, while there is less attention paid to data security and data development. Based on this, the article proposes targeted countermeasures and suggestions, aiming to provide references for the practice of public data authorization and operation and policy formulation.
  • ZHOU Ying, YANG Danjie, JIANG Mei, ZHAO Xiaochun
    Scientific Information Research. 2025, 7(2): 13-22. https://doi.org/10.19809/j.cnki.kjqbyj.2025.02.002
    [Purpose/significance]The quantitative evaluation of existing effective artificial intelligence (AI) policies aims to provide reference for government department to formulate scientific and reasonable AI policies and promote the development of AI. [Method/process]Taking 10 AI policies in the Yangtze River Delta region from 2015 to 2024 as the research samples, the text mining method is used to construct the evaluation index system of AI policies in the Yangtze River Delta region, and conduct quantitative evaluation by combining the PMC index model. [Result/conclusion]The study found that from a macro policy text perspective, the average PMC index of the 10 AI policy samples in the Yangtze River Delta region was 7.11, indicating that the overall policy design was scientifically rational. From a micro policy text perspective, there were significant differences in the levels of AI policy texts in the Yangtze River Delta region. Based on the research conclusions, targeted policy improvement suggestions are proposed in terms of expanding the scope of policy targets, establishing a policy evaluation system, adjusting policy directions, and implementing policies tailored to local conditions.
  • HAO Jiayi, WANG Yuzhuo, ZHANG Chengzhi
    Scientific Information Research. 2025, 7(1): 16-29. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.002
    [Purpose/significance]Research methods in information science are one of the critical research directions in this field. Constructing a fine-grained research method corpus and extracting research method entities can help scholars quickly understand the research methods in this field, explore the evolution of methods and their future development trends, and lay the foundation for the service and application of the research method corpus in the subsequent digital wave. [Method/process]Firstly, based on academic articles published in the Journal of the China Society for Scientific and Technical Information from 2000 to 2023, this study randomly selected 50 articles and manually annotated the research methodology entities within them, using these as the training corpus for entity extraction. Secondly, two models, BERT-base-chinese and Chinese-BERT-wwm-ext, were selected for entity extraction, and the model with superior performance was chosen as the final entity extraction model for this study. [Result/conclusion]This paper constructs a fine-grained research method annotation corpus of informatics that includes six types of entities: theoretical entity, method entity, dataset entity, indicator entity, tool entity, and other entities. In the task of training an entity extraction model based on manually annotated corpora, the Chinese-BERT-wwm-ext model performed better, with an accuracy rate, recall rate, and F1 score of 0.808 2, 0.846 7, and 0.827 0, respectively. Furthermore, this paper conducts an analysis of the research method entities and their categories, discovering that research methodologies in information science are becoming increasingly diverse, with emerging technologies coexisting alongside traditional methods, each showcasing their unique strengths.
  • ZHANG Yanfeng, YU Minqian
    Scientific Information Research. 2025, 7(1): 75-85. https://doi.org/10.19809/j.cnki.kjqbyj.2025.01.007
    [Purpose/significance]To analyze the evolution characteristics of health anxiety before and after information search behavior from the perspective of phenomenological graph analysis, and to explain the internal mechanism of the interaction between health anxiety and information search behavior. [Method/process]By using the phenomenological qualitative research method, the interactive mechanism between health anxiety and information search behavior was deeply explored. Based on the I-PACE theoretical model framework, the model elements of users' health anxiety and information search behavior were analyzed from the four dimensions of "Person-Affect-Cognition-Execution". To construct a mechanistic relationship model between health anxiety and information search behavior. [Result/conclusion]The research results revealed that the interaction mechanism between health anxiety and information search behavior could be divided into four sub-mechanisms: emotional triggering, browsing regulation, cognitive control and behavior feedback. Based on these findings of this study, the cultivation strategies of public information literacy in the context of health anxiety were proposed.
  • MAO Taitian, PENG Yihe
    Scientific Information Research. 2025, 7(3): 70-81. https://doi.org/10.19809/j.cnki.kjqbyj.2025.03.007
    [Purpose/significance]This article conducts an in-depth exploration of international artificial intelligence (AI) regulatory policies and gains insights into the regulatory focuses and trends of various countries, with the aim of providing valuable references for global AI governance strategies. [Method/process]This paper applies the LDA topic clustering analysis method to conduct an in-depth study of twenty-seven international policy documents. The aim is to accurately identify the topics, analyze the key theme words, and further reveal the regulatory hotspots in the field of artificial intelligence. [Results/conclusion]The study reveals six core regulatory themes: systemic risk assessment, ethical and legal regulation, social impact governance, transparency and trust, innovation and risk control, and global regulatory strategies, and accordingly makes four policy recommendations.