Home Current Issue

25 October 2025, Volume 45 Issue 05
    

  • Select all
    |
  • Pei Lei Zhan Xini Chen Shu
    Library & Information. 2025, 45(05): 1-11. DOI:10.11968/tsyqb.1003-6938.2025053
    Abstract ( ) Download PDF ( ) Knowledge map Save
    The Large Model AI System is reshaping the new pattern of the cyberspace content ecology, and it is of great significance to explore the challenges and governance modes of content ecosystem security in the context of AIGC to enhance the effectiveness of the application of AIGC and promote the safe and orderly development of the content ecosystem. This paper takes the current situation of content ecological security under the dual-wheel drive of technology and market as an entry point, we thoroughly studied the governance dilemmas faced by AIGC at the levels of model technology, content quality, legal and liability governance, and cognitive application, and analyzed in detail the multi-dimensional causes of various risks and dilemmas, and further put forward a smart adaptive governance model of content ecological security in the context of AIGC. Constructing a smart-adaptive governance system with self-learning, self-adaptation, and self-optimization capabilities around technology, resources, systems, and environments, carrying out technological intelligent adaptive governance driven by AI clusters, environmental intelligent adaptive governance oriented to international competition, cooperation, and market demands, resource intelligent adaptive governance integrating digital identity contracts, and institutional intelligent adaptive governance featuring the dual-track parallel system of supervision and coordination are of great significance in shaping a safe, orderly, and stable content ecological pattern of AIGC.
  • Pan Daqing Li Baiyang Ren Shangsheng
    Library & Information. 2025, 45(05): 12-23. DOI:10.11968/tsyqb.1003-6938.2025054
    Abstract ( ) Download PDF ( ) Knowledge map Save
    With the continuous proliferation of deepfake information in AI-generated content, it is imperative to accurately identify and assess users' deficiencies in coping with such risks, which provides a critical foundation for enhancing users' capabilities in managing deepfake information risks. Drawing on risk management theory, this paper integrates the three fundamental stages-risk identification, evaluation, and response-to construct a comprehensive indicator system for assessing deepfake information risk management capability. A risk assessment model is developed based on the five-element connection number framework of similarity, difference, and opposition, combining the Uncertainty Hierarchy Method with Set Pair Analysis. The model's effectiveness is demonstrated and validated through empirical case analysis. The empirical findings indicate that users' overall risk management capabilities regarding deepfake information remain at an average level, with only a weak tendency toward further decline, suggesting a relatively low risk of capability deterioration. Specifically, users' capabilities in risk identification, evaluation, and response are all situated within the anti-trend zone of negative development. Among these, the downward trend in risk response capability is the most pronounced, underscoring the need for targeted measures to optimize this dimension.
  • Chen Shu Li Baiyang Zhan Xini
    Library & Information. 2025, 45(05): 24-33. DOI:10.11968/tsyqb.1003-6938.2025055
    Abstract ( ) Download PDF ( ) Knowledge map Save
    In recent years, the rapid development and widespread application of generative artificial intelligence (GAI) technology have, on the one hand, brought opportunities for transformation and upgrading to socio-economic development, while on the other hand, new risks are also emerging rapidly. In this digital transformation environment, accurately identifying the safety risk points of generative AI is a crucial safeguard for the safe governance of generative AI. This paper employs a procedural grounded analysis of policy texts, conducting procedural coding on the content of 53 policy documents to construct the “ECA”model, which encompasses three core categories, 11 main categories, 31 subcategories, and 92 basic categories. Based on the four stages of digital transformation, this paper identifies and analyzes the risks faced by GenAI in each stage focusing on the characteristics of cocooning, pupation, metamorphosis, and ecologicalization in the digital transformation environment. It proposes a comprehensive dynamic governance strategy encompassing risk perception, early warning, monitoring, risk tiered management, and response.
  • Yang Yang Zheng Xihui Zhang Wen Li Gang
    Library & Information. 2025, 45(05): 34-46. DOI:10.11968/tsyqb.1003-6938.2025056
    Abstract ( ) Download PDF ( ) Knowledge map Save
    As a global leader in science, technology and military power, the United States has a profound influence on the global scientific landscape through its research funding strategies and priorities. This paper conducts topic mining and evolution analysis of the key science and technology funding projects of U.S. Department of Defense from 2015 to 2024 based on the BERTopic model. From the perspectives of topic distribution and dynamic topic evolution, it provides an empirical and systematic examination of the strategic layout and constituent factors of U.S. defense science and technology funding. The results show that the Department of Defense’s key science and technology funding projects cover 83 topics. While most topics exhibit relatively stable frequency changes over time, a small number demonstrate significant fluctuations or rapid growth, reflecting a key technology funding strategy that emphasizes “concentrated resource investment in core areas while broadly fostering emerging directions.” Overall, the U.S. Department of Defense have achieved the advancement of basic and applied research in the process of promoting science and technology, thereby constructing a frontier technology ecosystem oriented toward national security.
  • Wang Xu Xie Fang Liu Binbin Zhao Hongyu
    Library & Information. 2025, 45(05): 47-60. DOI:10.11968/tsyqb.1003-6938.2025057
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Analyzing the governance efficacy of generative AI policies and regulations can not only facilitate the development of GenAI-driven new quality productive forces and enrich theoretical research on generative AI governance, but also help enhance information governance effectiveness and advance national cyberspace governance capabilities. Drawing on relevant theoretical frameworks, this paper first analyzes the factors influencing the governance efficacy of generative AI policies and regulations from three dimensions: government governance, resource endowment, and technological environment. Subsequently, this paper takes the policies and regulations of generative AI in 30 countries as samples, employs the fsQCA method and utilizes PMC index evaluation results to explore potential pathways for enhancing the governance efficacy of generative AI policies and regulations. The findings demonstrate that the governance efficacy of generative AI policies and regulations is primarily influenced by six critical factors: the quality of policies and regulations, government conduct, risk capital investment, AI governance capacity, public subject activities, and AI safety mechanisms. Finally, the paper proposes three synergistic configuration paths to upgrade governance efficacy: technology-resource-driven path, policy-actors coordination, and government-led multi-subject coordination.
  • Wu Zhongcan Hao Wenqiang
    Library & Information. 2025, 45(05): 61-72. DOI:10.11968/tsyqb.1003-6938.2025058
    Abstract ( ) Download PDF ( ) Knowledge map Save
    While artificial intelligence promotes social innovation and development, it also brings technical security concerns. Balancing the structural tension between AI innovation and security risks is crucial for fully unleashing AI’s application value. Based on the UK's AI regulatory policy texts, this paper systematically analyzes the value objectives, basic principles, organizational system, technical tools, and institutional framework of AI regulation in the UK. Studies have shown that the UK has developed an "innovation-supporting AI regulation" model, this model achieves innovative and secure AI development winthin an institutional framework guided by national strategies, through goal-setting that balances safety protection and innovation, adherence to basic principles such as transparency, safety, fairness, legality, accountability, and redress, establishment of a "three-in-one integrated" organizational structure comprising independent regulation-coordinated regulation-sectoral regulation, and employment of regulatory sandboxes as safety protection technical tools. For China, it is advisable to refine the value orientation, build a multi-tiered organizational system, strengthen technical safeguards, and establish a multi-level institutional framework for AI regulation.
  • Zhang Yixuan Xiong Jing
    Library & Information. 2025, 45(05): 73-84. DOI:10.11968/tsyqb.1003-6938.2025059
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Artificial Intelligence (AI) technology has deeply integrated into personal growth, social progress, and national development. As core hubs for cultural dissemination and science-technology education, public libraries play an indispensable role in AI literacy education by virtue of their openness, inclusivity, and professionalism. The paper taking 15 American public libraries with high visit volume and diverse service programs as samples, this paper conducts web-based research and content analysis on their AI literacy education services. Through analysis from three dimensions-form, content, and collaboration-it finds that they have established a broad-coverage, multi-form, and all-round education service mechanism, and achieved solid resource guarantees through a multi-stakeholder collaborative network. Based on this and combined with the current status of AI literacy education services in China’s public libraies, the paper proposes four development strategies: accelerating digital-intelligent upgrading, meeting personalized needs, optimizing service plans, and integrating social resources.
  • Li Jia Wang Zhouhong Xiao Peng
    Library & Information. 2025, 45(05): 85-94. DOI:10.11968/tsyqb.1003-6938.2025060
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Advancing digital governance is a key direction in China’s government governance reform, with the “National Smart City Pilot Program” representing an important event to enhance urban digital governance capabilities in recent years. This paper leverages data from the fourth, fifth, and sixth national evaluation and grading of public libraries at or above county level across 57 eastern Chinese cities. Utilizing the difference-in-difference (DID) method, we empirically examine whether the smart city pilot policy, as a form of digital governance, can improve the development level of public libraries. Findings indicate that pilot policies significantly facilitated the upgrading of second-tier libraries to first-tier status, yet exerted minimal effects on third-tier library quantities. This reveals a “the strong get stronger, the ordinary remain ordinary” dynamic in policy implementation. This research contributes to the literature on evaluating digital governance policy effectiveness and provides empirical foundations and policy insights for refining digital governance policies.
  • Ding Li Wang Xueyan Zhang Rong
    Library & Information. 2025, 45(05): 95-103. DOI:10.11968/tsyqb.1003-6938.2025061
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Generative artificial intelligence (GenAI) tools have technical advantages in enhancing the information cataloging and retrieval capabilities of libraries, predicting user needs and providing personalized assistance, supporting information literacy cultivation and participating in collection services decision-making. They have been applied in aspects such as improving user assistance, optimizing content generation, enhancing retrieval recommendations, supporting literacy cultivation and participating in service decision-making in library knowledge services. Embedding generative artificial intelligence tools into library knowledge services faces multiple challenges such as errors and distortions in generated content, data privacy violations and leaks, input-output biases, and trust barriers among user groups. It is urgent to take systematic development measures such as creating an intelligence-driven content verification framework, designing an algorithm governance architecture, building an information security guarantee system, and cultivating professional teams to ensure the sustainable development of library knowledge services in the contect of the digital intelligence era.
  • Hu Jianfeng
    Library & Information. 2025, 45(05): 104-111. DOI:10.11968/tsyqb.1003-6938.2025062
    Abstract ( ) Download PDF ( ) Knowledge map Save
    As a cutting-edge development in artificial intelligence, embodied intelligence (EAI) demonstrates enormous potential in enriching public cultural service content and innovating service models. However, its current application in libraries is still in the exploratory stage of using "intelligent tools," which limits it from realizing its full potential. Focusing on the human-machine collaborative service model in libraries driven by embodied intelligence, this paper applies multi-modal perception fusion technology, digital twin technology, knowledge graphs, and cloud collaborative computing platforms at the technical level, and provides personnel, institutional, and organizational guarantees at the support layer. Through these measures, an application closed loop of "perception-decision-action-feedback" has been constructed and a human-machine collaborative model covering resource management, user services, activity implementation, and space management has been formed to transform libraries into smart spaces that are capable of autonomous perception, analysis, decision-making, and action.
  • An Xiaomi Long Zhiqi Sun Zihui
    Library & Information. 2025, 45(05): 112-122. DOI:10.11968/tsyqb.1003-6938.2025063
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Against the backdrop of data spaces becoming the core of global data strategy, constructing an efficient and trustworthy government data sharing mechanism is a critical proposition for national digital transformation. This paper focuses on the European Union's "Once-Only Technical System" (OOTS), viewing it as a key practice of the data space concept in the government domain. The aim is to analyze its operational mechanism in the context of data spaces. Based on Activity Theory, this paper constructs a three-dimensional framework of "Institutional Design-Technical Architecture-Ecological Synergy". This framework reveals how OOTS implements the core principles advocated by data spaces-such as data sovereignty, mutual trust and interoperability, trusted connections, and value co-creation-through a complete legal system and givernance system, a standardized set of interoperable technical tools, and a collaborative network of diverse stakeholders. The study finds that the successful practice of OOTS provides a systematic data space solution for overcoming the limitations of traditional government data sharing and establishing cross-domain trust. Accordingly, this paper proposes strategies for optimizing the government data sharing mechanism under China's data space strategy from three dimensions: improving top-level institutional design, constructing an interoperable technical architecture, and cultivating a collaborative governance ecosystem.
  • Guan Tao Xu Maoheng
    Library & Information. 2025, 45(05): 123-132. DOI:10.11968/tsyqb.1003-6938.2025064
    Abstract ( ) Download PDF ( ) Knowledge map Save
    Abstract In the era of big data, Trusted Data Spaces serve as critical infrastructure for the efficient circulation of data elements. However, the current construction of these spaces is often trapped in a predicament of fragmentation and staticity. This results in a discontinuous trust model that overemphasizes initial admission while neglecting in-process circulation and ex-post traceability. Consequently, persistent risks such as privacy breaches, privacy tampering, and a lack of cross-domain trust during internal processing and value-added integration become difficult to eradicate, impeding the high-quality development of both data spaces and the broader data element market. Full Lifecycle Theory, with its emphasis on dynamic evolution and closed-loop governance of data processing, offers a systematic solution. Specifically, by integrating the dynamic evolution of trust along the temporal dimension with a structured, layered, and categorized interconnection of various Trusted Data Spaces in the spatial dimension, this paper proposes a new paradigm. This paradigm requires that a Trusted Data Space must enforce strict admission trust at the front-end, ensure process trust in the mid-stream, and realize outcome trust at the back-end. This improve the construction paradigm of a comprehensive full-process trust management system designed to enhance the sustainability and adaptability of data spaces, ultimately promoting the high-quality development of the digital economy.
  • Hu Feng Li Liang Yao Yifan
    Library & Information. 2025, 45(05): 133-144. DOI:10.11968/tsyqb.1003-6938.2025065
    Abstract ( ) Download PDF ( ) Knowledge map Save
    The health data space plays an important role in ensuring the efficient and compliant circulation of health data and releasing strategic resource value of health data .Taking the European Health Data Space (EHDS) as a case study, this article first deconstructs its operational mechanism from the perspectives of its element structure and key functional mechanisms. Secondly, it analyzes operational challenges from the perspectives of subjects, system, and technology, and proposes strategies to address them. Data sources, platforms, subjects, systems, and technologies are the five elements of EHDS operation. The elements interact and coordinate with each other to achieve efficient cross-border circulation and utilization of health data. The three key action mechanisms of EHDS operation are the adjustment of rights and responsibilities oriented toward subject trust, the guidance and norms oriented toward rule trust, and the internal and external guarantees oriented toward ecological trust. Building a data community of interests based on the concept of value co-creation, consolidating the institutional foundation that follows the principle of combining rigidity and flexibility, and creating an active ecosystem that responds to agile iteration needs constitute the solutions to uneven distribution of benefits, insufficient institutional vitality, and technical design shortcomings in EHDS. The construction of the EHDS has enlightenment significance for the development of China's Health Data Space.