Journal of Library and Information Science in Agriculture ›› 2024, Vol. 36 ›› Issue (4): 4-20.doi: 10.13998/j.cnki.issn1002-1248.24-0242
YANG Ruixian1,2, LI Hangyi1, SUN Zhuo1,*
CLC Number:
[1] 许一明, 李贺, 余璐. 隐私保护自我效能对社交网络用户隐私行为的影响研究[J]. 图书情报工作, 2019, 63(17): 128-136. XU Y M, LI H, YU L.Research on the influence of self-efficacy of privacy protection on privacy behaviors of social network users[J]. Library and information service, 2019, 63(17): 128-136. [2] 戢渼钧. 关于个性化信息服务的隐私保护[J]. 图书情报工作, 2006, 50(2): 49-51, 83. JI M J.Privacy protection in the personalized information service[J]. Library and information service, 2006, 50(2): 49-51, 83. [3] 黄如花, 李楠. 美国开放政府数据中的个人隐私保护研究[J]. 图书馆, 2017(6): 19-24, 76. HUANG R H, LI N.Research on individual privacy protection under open government data in the U.S[J]. Library, 2017(6): 19-24, 76. [4] 杜超楠, 袁勤俭, 岳泉. 我国隐私问题研究现状及热点主题分析——基于2004—2016年国家自然科学基金立项数据的研究[J]. 情报科学, 2018, 36(3): 99-104. DU C N, YUAN Q J, YUE Q.Analysis of the current status and hot topics of privacy issues in China - Based on the projects of national natural science foundation of China from 2004 to 2016[J]. Informa-tion science, 2018, 36(3): 99-104. [5] BATTISTA D, UVA G.Exploring the legal regulation of social media in Europe: A review of dynamics and challenges-current trends and future developments[J]. Sustainability, 2023, 15: 4144. [6] CLARKE R.Internet privacy concerns confirm the case for intervention[J]. Communications of the ACM, 1999, 42(2): 60-67. [7] BELANGER, CROSSLER.Privacy in the digital age: A review of information privacy research in information systems[J]. MIS quarterly, 2011, 35(4): 1017. [8] WARREN S D, BRANDEIS L D. The right to privacy[J]. Harvard law review, 1890, 4(5): 193. [9] 李效光, 李晖, 李凤华, 等. 差分隐私综述[J]. 信息安全学报, 2018, 3(5): 92-104. LI X G, LI H, LI F H, et al.A survey on differential privacy[J]. Journal of cyber security, 2018, 3(5): 92-104. [10] 蒋瀚, 刘怡然, 宋祥福, 等. 隐私保护机器学习的密码学方法[J]. 电子与信息学报, 2020, 42(5): 1068-1078. JIANG H, LIU Y R, SONG X F, et al.Cryptographic approaches for privacy-preserving machine learning[J]. Journal of electronics & information technology, 2020, 42(5): 1068-1078. [11] 王晰巍, 相甍甍, 张长亮, 等. 新媒体环境下信息隐私国内外研究动态及发展趋势[J]. 图书情报工作, 2017, 61(15): 6-14. WANG X W, XIANG M M, ZHANG C L, et al.Research on the development trend of domestic and foreign information privacy under new media environment[J]. Library and information service, 2017, 61(15): 6-14. [12] 侯海燕, 刘则渊, 陈悦, 等. 当代国际科学学研究热点演进趋势知识图谱[J]. 科研管理, 2006, 27(3): 90-96. HOU H Y, LIU Z Y, CHEN Y, et al.Mapping of science studies: The trend of research fronts[J]. Science research management, 2006, 27(3): 90-96. [13] BAO R X, CHEN Z K, OBAIDAT M S.Challenges and techniques in big data security and privacy: A review[J]. Security and privacy, 2018, 1(4): e13. [14] BERTINO E.Big data security and privacy[C]//2016 IEEE International Conference on Big Data(Big Data). Piscataway, New Jersey: IEEE, 2016: 3. [15] 胡文彬, 张宏宇, 王晨曦, 等. 社交网络中攻击背景下个人隐私泄露度量研究[J]. 南京大学学报(自然科学), 2021, 57(2): 289-298. HU W B, ZHANG H Y, WANG C X, et al.Leakage metrics of personal privacy under attack background in social network[J]. Journal of Nanjing university (natural science), 2021, 57(2): 289-298. [16] DIENLIN T, TREPTE S.Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors[J]. European journal of social psychology, 2015, 45(3): 285-297. [17] 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述[J]. 计算机科学, 2022, 49(1): 306-313. JIN H, ZHU J Y, WANG C D.Review on video privacy protection[J]. Computer science, 2022, 49(1): 306-313. [18] 杨瑞仙, 许帆, 沈嘉宁, 等. 基于社会渗透理论的社交网络用户隐私披露行为研究[J]. 图书情报工作, 2023, 67(6): 84-95. YANG R X, XU F, SHEN J N, et al.Research on social network users' privacy disclosure behavior based on social penetration theory[J]. Library and information service, 2023, 67(6): 84-95. [19] KIM J, NAM C, KIM S.The economic value of personal information and policy implication[C]//Proceedings of the 26th Europe a Regional ITS Conference. Los Angeles: ITS Press, 2015. [20] SPIEKERMANN S, KORUNOVSKA J, BAUER C.Psychology of ownership and asset defense: Why people value their personal information beyond privacy[J]. SSRN electronic journal, 2012, 4(1): 41-47. [21] 臧国全, 张凯亮, 闫励. 个人数据价值计量研究——基于改造的BDM机制[J]. 图书情报工作, 2020, 64(7): 103-109. ZANG G Q, ZHANG K L, YAN L.Research on personal data value measurement based on modified BDM experiment[J]. Library and information service, 2020, 64(7): 103-109. [22] 臧国全, 张盼盼, 柴文科, 等. 个人通信数据的敏感性识别与隐私计量研究[J/OL]. 图书情报知识, 2023: 1-11.(2023-11-21).https://kns.cnki.net/kcms/detail/42.1085.G2.20231120.1120.004.html. ZANG G Q, ZHANG P P, CHAI W K, et al. Sensitivity identification and privacy measurement of personal communication data[J/OL]. Documentation, information & knowledge, 2023: 1-11.(2023-11-21). https://kns.cnki.net/kcms/detail/42.1085.G2.20231120.1120.004.html. [23] 臧国全, 王家振, 毕崇武, 等. 政府数据中敏感数据识别与隐私计量研究[J]. 图书情报工作, 2022, 66(15): 66-75. ZANG G Q, WANG J Z, BI C W, et al.Research on sensitive data identification and privacy measurement in government data[J]. Library and information service, 2022, 66(15): 66-75. [24] 肖洋, 臧国全. 个人金融数据的敏感性识别与隐私计量研究[J]. 情报理论与实践, 2023, 46(9): 105-114, 86. XIAO Y, ZANG G Q.Research on sensitivity identification and privacy measurement of personal financial data[J]. Information studies: Theory & application, 2023, 46(9): 105-114, 86. [25] 张冰. 社交网络隐私保护技术研究[D]. 北京: 北京工业大学, 2019. ZHANG B.Research on privacy preservation in social network[D]. Beijing: Beijing University of Technology, 2019. [26] 付钰, 俞艺涵, 吴晓平. 大数据环境下差分隐私保护技术及应用[J]. 通信学报, 2019, 40(10): 157-168. FU Y, YU Y H, WU X P.Differential privacy protection technology and its application in big data environment[J]. Journal on communications, 2019, 40(10): 157-168. [27] 范艳芳. 协作环境下的时空约束强制访问控制模型[J]. 计算机科学, 2017, 44(8): 107-114. FAN Y F.Temporal-spatial-based mandatory access control model in collaborative environment[J]. Computer science, 2017, 44(8): 107-114. [28] BUI T, STOLLER S D, LI J J.Greedy and evolutionary algorithms for mining relationship-based access control policies[J]. Computers & security, 2019, 80: 317-333. [29] LI F H, LI Z F, HAN W L, et al.Cyberspace-oriented access control: A cyberspace characteristics-based model and its policies[J]. IEEE internet of things journal, 2019, 6(2): 1471-1483. [30] XU L, JIANG C X, HE N Q, et al.Trust-based collaborative privacy management in online social networks[J]. IEEE transactions on information forensics and security, 2019, 14(1): 48-60. [31] SUSAN S P, SARATH G.A trust network driven user authorization scheme for social cloud[C]//Recent Findings in Intelligent Computing Techniques: Proceedings of the 5th ICACNI 2017, Volume 1. Springer Singapore, 2019: 533-542. [32] 郭宝霞, 王佳慧, 马利民, 等. 基于零信任的敏感数据动态访问控制模型研究[J]. 信息网络安全, 2022, 22(6): 86-93. GUO B X, WANG J H, MA L M, et al.Research on dynamic access control model of sensitive data based on zero trust[J]. Netinfo security, 2022, 22(6): 86-93. [33] 张艺, 田立勤, 毋泽南, 等. 云服务中面向信任的动态访问控制博弈机制[J]. 小型微型计算机系统, 2021, 42(8): 1774-1779. ZHANG Y, TIAN L Q, WU Z N, et al.Trust oriented dynamic access control game mechanism in cloud services[J]. Journal of Chinese computer systems, 2021, 42(8): 1774-1779. [34] MA T H, SU Y M, RONG H, et al.Rule fusion of privacy protection strategies for co-ownership data sharing[J]. Mathematics, 2022, 10(6): 969. [35] 崔炜荣, 杜承烈. 社交网络中基于CP-ABE的隐私保护属性匹配方法[J]. 计算机应用, 2018, 38(4): 1051-1057. CUI W R, DU C L.Privacy preserving attribute matching method based on CP-ABE in social networks[J]. Journal of computer applications, 2018, 38(4): 1051-1057. [36] 李宇溪, 周福才, 徐紫枫. 支持K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021, 44(7): 1481-1500. LI Y X, ZHOU F C, XU Z F.Privacy-preserving k-nearest-neighbor search over mobile social network[J]. Chinese journal of computers, 2021, 44(7): 1481-1500. [37] HU D H, HU C Y, FAN Y Q, et al.oGBAC - A group based access control framework for information sharing in online social networks[J]. IEEE transactions on dependable and secure computing, 2021, 18(1): 100-116. [38] 李凤华, 孙哲, 牛犇, 等. 跨社交网络的隐私图片分享框架[J]. 通信学报, 2019, 40(7): 1-13. LI F H, SUN Z, NIU B, et al.Privacy-preserving photo sharing framework cross different social network[J]. Journal on communications, 2019, 40(7): 1-13. [39] 谢绒娜, 范晓楠, 袁琳, 等. 在线社交网络中延伸访问控制机制研究[J]. 网络与信息安全学报, 2021, 7(5): 123-131. XIE R N, FAN X N, YUAN L, et al.Research on extended access control mechanism in online social network[J]. Chinese journal of network and information security, 2021, 7(5): 123-131. [40] 单芳芳, 李晖, 朱辉. 基于博弈论的社交网络转发控制机制[J]. 通信学报, 2018, 39(3): 172-180. SHAN F F, LI H, ZHU H.Game theory based forwarding control method for social network[J]. Journal on communications, 2018, 39(3): 172-180. [41] KIABOD M, DEHKORDI M N, BAREKATAIN B.TSRAM: A time-saving k-degree anonymization method in social network[J]. Expert systems with applications, 2019, 125: 378-396. [42] YU F H, CHEN M J, YU B L, et al.Privacy preservation based on clustering perturbation algorithm for social network[J]. Multimedia tools and applications, 2018, 77(9): 11241-11258. [43] 史伟, 王园园, 李刚, 等. 基于KFCMSA的(k, l)加权社交网络匿名算法[J]. 计算机应用研究, 2023, 40(10): 3149-3154. SHI W, WANG Y Y, LI G, et al.(k, l) weighted anonymous algorithm for social network based on KFCMSA[J]. Application research of computers, 2023, 40(10): 3149-3154. [44] 周艺华, 张冰, 杨宇光, 等. 基于聚类的社交网络隐私保护方法[J]. 计算机科学, 2019, 46(10): 154-160. ZHOU Y H, ZHANG B, YANG Y G, et al.Cluster-based social network privacy protection method[J]. Computer science, 2019, 46(10): 154-160. [45] TIAN H, LU Y, LIU J T, et al.Betweenness centrality based k-anonymity for privacy preserving in social networks[C]//Proceedings of the 16th International Conference on Advances in Mobile Computing and Multimedia. New York: ACM, 2018: 19-21. [46] ROUSSEAU F, CASAS-ROMA J, VAZIRGIANNIS M.Community-preserving anonymization of graphs[J]. Knowledge and information systems, 2018, 54(2): 315-343. [47] LIN C, SONG Z H, SONG H B, et al.Differential privacy preserving in big data analytics for connected health[J]. Journal of medical systems, 2016, 40(4): 97. [48] KOUFOGIANNIS F, PAPPAS G J.Diffusing private data over networks[J]. IEEE transactions on control of network systems, 2018, 5(3): 1027-1037. [49] ABADI M, CHU A, GOODFELLOW I, et al.Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 308-318. [50] WANG S W, HUANG L S, NIE Y W, et al.Local differential private data aggregation for discrete distribution estimation[J]. IEEE transactions on parallel and distributed systems, 2019, 30(9): 2046-2059. [51] XU C G, REN J, ZHANG D Y, et al.GANobfuscator: Mitigating information leakage under GAN via differential privacy[J]. IEEE transactions on information forensics and security, 2019, 14(9): 2358-2371. [52] ZHU T Q, LI J, HU X Y, et al.The dynamic privacy-preserving mechanisms for online dynamic social networks[J]. IEEE transac-tions on knowledge and data engineering, 2022, 34(6): 2962-2974. [53] 高瑞, 陈学斌, 张祖篡. 面向部分图更新的动态社交网络隐私发布方法[J/OL]. 计算机应用, 2024: 1-10.(2024-04-18). https://kns.cnki.net/kcms/detail/51.1307.TP.20240415.0947.014.html. GAO R, CHEN X B, ZHANG Z C. Dynamic social network privacy publishing method for partial graph updating[J/OL]. Journal of computer applications, 2024: 1-10. (2024-04-18). https://kns.cnki.net/kcms/detail/51.1307.TP.20240415.0947.014.html. [54] 李凤华, 李晖, 贾焰, 等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016, 37(4): 1-11. LI F H, LI H, JIA Y, et al.Privacy computing: Concept, connotation and its research trend[J]. Journal on communications, 2016, 37(4): 1-11. [55] 李凤华, 李晖, 牛犇, 等. 隐私计算的学术内涵与研究趋势[J]. 网络与信息安全学报, 2022, 8(6): 1-8. LI F H, LI H, NIU B, et al.Academic connotation and research trends of privacy computing[J]. Chinese journal of network and in-formation security, 2022, 8(6): 1-8. [56] 李晖. 隐私计算—面向隐私保护的新型计算[J]. 信息通信技术, 2018, 12(6): 4-6. LI H.Privacy computing - A new computing oriented to privacy protection[J]. Information and communications technologies, 2018, 12(6): 4-6. [57] 杨瑞仙, 李兴芳, 王栋, 等. 隐私计算的溯源、现状及展望[J]. 情报理论与实践, 2023, 46(7): 158-167. YANG R X, LI X F, WANG D, et al.Privacy calculus/privacy computing: Provenance, research status and future prospect[J]. In-formation studies: Theory & application, 2023, 46(7): 158-167. [58] CULNAN M J, ARMSTRONG P K.Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation[J]. Organization science, 1999, 10(1): 104-115. [59] TREPTE S, SCHARKOW M, DIENLIN T.The privacy calculus contextualized: The influence of affordances[J]. Computers in human behavior, 2020, 104: 106115. [60] GERBER N, GERBER P, VOLKAMER M.Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior[J]. Computers & security, 2018, 77: 226-261. [61] 闫树, 吕艾临. 隐私计算发展综述[J]. 信息通信技术与政策, 2021, 47(6): 1-11. YAN S, LYU A L.Overview of the development of privacy preserving computing[J]. Information and communications technology and policy, 2021, 47(6): 1-11. [62] 焦海涛. 个人信息的反垄断法保护: 从附属保护到独立保护[J]. 法学, 2021(4): 108-124. JIAO H T.Protection of personal information through anti-trust law-From subsidiary protection to independent protection[J]. Law science, 2021(4): 108-124. [63] 董玮, 兰旻. 未成年人信息保护: 隐私、权责与公共善[J]. 青年记者, 2021(6): 95-96. DONG W, LAN M.Information protection for minors: Privacy, power and responsibility and public goodness[J]. Youth journalist, 2021(6): 95-96. [64] 梁译方, 周丽娜. 疫情信息传播与数据隐私保护——韩国社交媒体相关政策法规调整的考察与思考[J]. 中国广播, 2021(4): 77-80. LIANG Y F, ZHOU L N.Epidemic information dissemination and data privacy protection - Investigation and reflection on the adjustment of social media-related policies and regulations in South Korea[J]. China broadcasts, 2021(4): 77-80. [65] 辛文娟, 彭李余. 社交网络环境下大学生隐私保护现状及对策研究——基于对重庆市六所高校的问卷调查[J]. 中国出版, 2013(10): 61-64. XIN W J, PENG L Y.Research on the current situation and countermeasures of college students' privacy protection under the social network environment - Based on the questionnaire survey of six universities in Chongqing[J]. China publishing journal, 2013(10): 61-64. [66] XU H, UNIVERSITY P S, DINEV T, et al.Information privacy concerns: Linking individual perceptions with institutional privacy assurances[J]. Journal of the association for information systems, 2011, 12(12): 798-824. [67] ZHAO L, LU Y B, GUPTA S.Disclosure intention of location-related information in location-based social network services[J]. International journal of electronic commerce, 2012, 16(4): 53-90. [68] LI H, SARATHY R, XU H.The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors[J]. Decision support systems, 2011, 51(3): 434-445. [69] TADDEI S, CONTENA B.Privacy, trust and control: Which relationships with online self-disclosure?[J]. Computers in human behavior, 2013, 29(3): 821-826. [70] ZHANG S, MAKEDON F.Privacy preserving learning in negotiation[C]//Proceedings of the 2005 ACM symposium on Applied computing. New York: ACM, 2005: 821-825. [71] BARUH L, SECINTI E, CEMALCILAR Z.Online privacy concerns and privacy management: A meta-analytical review[J]. Journal of communication, 2017, 67(1): 26-53. [72] 申琦, 闫玲玲. 社交规模、社交经验与隐私管理边界——基于新浪微博用户的数据挖掘研究[J]. 河北经贸大学学报(综合版), 2021, 21(2): 43-52, 71. SHEN Q, YAN L L.The boundary of social network scale, experience in using social network media and privacy management[J]. Journal of Hebei University of economics and business (comprehensive edition), 2021, 21(2): 43-52, 71. [73] 程慧平, 郑雨霏, 闻心珗. 基于扎根理论的社交媒体用户隐私设置意愿影响因素研究[J]. 现代情报, 2021, 41(10): 130-139, 176. CHENG H P, ZHENG Y F, WEN X Y.Research on influencing factors of privacy setting intention of social media users based on grounded theory[J]. Journal of modern information, 2021, 41(10): 130-139, 176. [74] 张霁雯. 社交媒体用户隐私关注、自我表露和隐私管理行为的实证研究[J]. 新媒体研究, 2021, 7(4): 39-45. ZHANG J W.An empirical study on privacy concern, self-disclosure and privacy management behavior of social media users[J]. New media research, 2021, 7(4): 39-45. [75] READ K, VAN DER SCHYFF K. Modelling the intended use of Facebook privacy settings[J]. SA journal of information manage-ment, 2020, 22(1): 1-9 [76] 熊金波, 王敏燊, 田有亮, 等. 面向云数据的隐私度量研究进展[J]. 软件学报, 2018, 29(7): 1963-1980. XIONG J B, WANG M S, TIAN Y L, et al.Research progress on privacy measurement for cloud data[J]. Journal of software, 2018, 29(7): 1963-1980. [77] BAYARDO R J, AGRAWAL R.Data privacy through optimal k- anonymization[C]//21st International Conference on Data Engineer-ing (ICDE'05). Piscataway, New Jersey: IEEE, 2005: 217-228. [78] 姜火文, 曾国荪, 马海英. 面向表数据发布隐私保护的贪心聚类匿名方法[J]. 软件学报, 2017, 28(2): 341-351. JIANG H W, ZENG G S, MA H Y.Greedy clustering-anonymity method for privacy preservation of table data-publishing[J]. Journal of software, 2017, 28(2): 341-351. [79] 龚奇源, 杨明, 罗军舟. 面向关系-事务数据的数据匿名方法[J]. 软件学报, 2016, 27(11): 2828-2842. GONG Q Y, YANG M, LUO J Z.Data anonymization approach for microdata with relational and transaction attributes[J]. Journal of software, 2016, 27(11): 2828-2842. [80] XIONG J B, YAO Z Q, MA J F, et al.PRIAM: Privacy preserving identity and access management scheme in cloud[J]. KSII transac-tions on Internet and information systems, 2014, 8(1): 282-304. [81] JIANG T, HU S J.The elderly and the big data how older adults deal with digital privacy[C]//2016 International Conference on Intelligent Transportation, Big Data & Smart City(ICITBS). Piscataway, New Jersey: IEEE, 2016: 285-288. [82] SAMI N, MOHAMED E.The impact of privacy concerns and perceived vulnerability to risks on users privacy protection behaviors on SNS: A structural equation model[J]. International journal of advanced computer science and applications, 2016, 7(5): 142-147. [83] 杨丽丽. 大数据时代信息隐私关注与隐私保护行为研究[J]. 电子商务, 2017(5): 48-49. YANG L L.Research on information privacy concern and privacy protection behavior in the era of big data[J]. E-business journal, 2017(5): 48-49. [84] 刘宇涵, 陈红, 刘艺璇, 等. 图数据上的隐私攻击与防御技术[J]. 计算机学报, 2022, 45(4): 702-734. LIU Y H, CHENG H, LIU Y X, et al.State-of-the-art privacy attacks and defenses on graphs[J]. Chinese journal of computers, 2022, 45(4): 702-734. [85] 谌涛, 郝于越. 社会化媒体的隐私保护研究: 用户在社会化媒体中自我表露的隐私保护意识——以微博和微信的对比研究为例[J]. 新闻传播, 2017(4): 73, 75. CHEN T, HAO Y Y. Research on privacy protection of social media: Users' self-revealed privacy protection consciousness in social media-A comparative study of Weibo and WeChat as an example[J]. Journalism & communication, 2017(4): 73, 75. [86] MAMONOV S, BENBUNAN-FICH R.The impact of information security threat awareness on privacy-protective behaviors[J]. Com-puters in human behavior, 2018, 83: 32-44. [87] MOSTELLER J, PODDAR A.To share and protect: Using regulatory focus theory to examine the privacy paradox of consumers' social media engagement and online privacy protection behaviors[J]. Journal of interactive marketing, 2017, 39: 27-38. [88] TANEJA A, VITRANO J, GENGO N J.Rationality-based beliefs affecting individual's attitude and intention to use privacy controls on Facebook: An empirical investigation[J]. Computers in human behavior, 2014, 38: 159-173. [89] BENAMATI J H, OZDEMIR Z D, SMITH H J.An empirical test of an antecedents-privacy concerns-outcomes model[J]. Journal of information science, 2017, 43(5): 583-600. |
[1] | LIU Yang, TIAN Huiyi. Application of the EEG Technology in the Field of Library and Information Science: Current Situation and Perspectives [J]. Journal of Library and Information Science in Agriculture, 2024, 36(4): 63-71. |
[2] | CUI Kai. Analysis of Farmers' Information Acquisition Behavior for Digital Inclusion: Group Focus and Practical Concerns [J]. Journal of Library and Information Science in Agriculture, 2024, 36(1): 33-45. |
[3] | XIA Yikun, JIANG Jie, ZHANG Xiaheng, WANG Jiandong, ZHOU Wenjie, YANG Xinya, LI Yang. Developing the New Quality Productivity: Responses and Reflections on the Discipline of Information Resource Management [J]. Journal of Library and Information Science in Agriculture, 2024, 36(1): 4-32. |
[4] | SUN Lili, WANG WeiJie, SHENG Jiefei. Influencing Factors of Scientific Data Value Increment Based on System Dynamics [J]. Journal of Library and Information Science in Agriculture, 2023, 35(9): 28-42. |
[5] | SHAN Shuyang, XIA Cuijuan, LIU Qianqian. Exploration of Genealogy Public Knowledge Service Model with the Resources and Technology: Taking the Exhibition Project of "AR Surname Wall" as an Example [J]. Journal of Library and Information Science in Agriculture, 2023, 35(6): 83-92. |
[6] | MA Haiqun, LI Jinling, YU Tongtong, ZHANG Tao. A Framework of Ethics Guidelines on Public Data from a Whole Life Cycle Perspective [J]. Journal of Library and Information Science in Agriculture, 2023, 35(6): 29-42. |
[7] | MA Lecun, ZHAN Xini, ZHU Qiyu, SUN Rong, LI Baiyang. Digital Intelligence Integration Innovation Development of GLAM Driven by AIGC [J]. Journal of Library and Information Science in Agriculture, 2023, 35(5): 4-15. |
[8] | LV Ruijuan, ZHANG Jingbei, YAN Dan, CAI Yingchun. Innovative Development of AIGC and GLAM: Review of "Shaping the Future: AIGC and GLAM Innovative Development" Cutting-Edge Academic Forum [J]. Journal of Library and Information Science in Agriculture, 2023, 35(5): 27-36. |
[9] | LYU Kun, CHEN Yaoyao, XIANG Minhao. Influencing Factors of Sina Weibo Information Service Quality from the Perspective of Users: Exploratory Analysis Based on Grounded Theory [J]. Journal of Library and Information Science in Agriculture, 2022, 34(10): 70-81. |
[10] | YUAN Fan. The Mechanism of Personal Data Transfers of Social Network Users [J]. Journal of Library and Information Science in Agriculture, 2022, 34(5): 76-91. |
[11] | GUAN Fang, ZHAO Ketong, REN Wei, LIN Qiang. Model Construction and Empirical Research on Information Searching Behavior of Researchers from the Perspective of Situational Cognition [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 94-103. |
[12] | LI Bo, LI Honglian, GUAN Qing, LIU Yang. Fine-grained Sentiment Analysis of Social Network Platform of University Libraries Based on CNN-BiLSTM-HAN Hybrid Neural Network [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 63-73. |
[13] | SONG Shanshan, BAI Wenlin. A Review of Big Data Governance Research in China [J]. Journal of Library and Information Science in Agriculture, 2022, 34(4): 4-17. |
[14] | LI Jiawen, QIN Qin, KE Qing. Empirical Research on the Influencing Factors of Users' Knowledge Hiding Behavior in Virtual Question-and-Answer Community [J]. Journal of Library and Information Science in Agriculture, 2022, 34(2): 48-62. |
[15] | HUANG Jinxia, WANG Xuan, YANG Heng, LIU Jingyu, ZHANG Zhixiong, LIU Xiwen. Summary of the 10th China OA Week: Voices from Some Stakeholders on the Construction of China's Open Scientific Innovation Ecology [J]. Journal of Library and Information Science in Agriculture, 2022, 34(1): 49-61. |
|