Articles in this Volume

Research Article Open Access
A study on the inverted U-shaped relationship between perceived algorithmic recommendation accuracy and user satisfaction on short video platforms
Article thumbnail
Clarifying the relationship mechanism between perceived algorithmic recommendation accuracy and user satisfaction helps platforms optimize recommendation algorithms in a targeted manner and guide algorithms to be benevolent. Based on the Stimulus-Organism-Response (S-O-R) theory, this study constructs a theoretical model of how perceived algorithmic recommendation accuracy affects user satisfaction on short video platforms. By analyzing 398 valid questionnaires, the conclusions are drawn as follows: First, there is an inverted U-shaped relationship between perceived algorithmic recommendation accuracy and user satisfaction, which first increases and then decreases; second, algorithm fatigue plays a mediating role in the inverted U-shaped relationship between perceived algorithmic recommendation accuracy and user satisfaction; third, information-seeking motivation moderates the inverted U-shaped relationship between perceived algorithmic recommendation accuracy and user satisfaction.
Show more
Read Article PDF
Cite
Research Article Open Access
"Digital Leviathan" and "Digital Commons": a comparative study of digital government development paths in China and the United States with consideration of privacy rights
Amid the global wave of digital government transformation, China and the United States have pursued markedly different development paths. This paper investigates the fundamental differences between the two countries’ approaches in terms of top-level design, technological applications, public participation, and the impact on privacy rights, as well as the underlying logic behind these differences. Through comparative case studies and policy text analysis, the research focuses on China’s “Health Code” and “One-Stop Online Services,” alongside the EU’s GDPR and California’s CCPA as core cases. The main findings are as follows: China’s path is state-led and efficiency-oriented, producing highly effective governance tools but facing the risk of a “Digital Leviathan”; the U.S./EU path prioritizes rights and checks and balances, building a “Digital Commons” at the potential cost of efficiency. Both approaches must confront their respective challenges and explore avenues for dialogue and mutual learning.
Show more
Read Article PDF
Cite
Research Article Open Access
Analysis of criminal law regulation on defamation by cyber water army
With the development of information network technology, crimes in cyberspace are also increasing. In view of the defamation behavior of using the cyber water army, it is found that it has the development trend of industrialization and concealment, and its serious harm to social order and individual rights and interests. By analyzing the characteristics of defamation in the cyber water army, which are different from traditional defamation in behavior mode and communication mechanism, this paper points out the difficulties faced by the current criminal law in subject identification, plot standard and prosecution procedure. Therefore, it is proposed that people should clearly crack down on the main sponsors and active participants, set quantifiable standards of seriousness of the circumstances, and promote the lowering of the threshold of public prosecution and the improvement of related crimes, so as to build a governance path that takes into account both the cracking effect and the modesty of criminal law.
Show more
Read Article PDF
Cite
Research Article Open Access
A study on copyright issues of AI-generated works in China
This article discusses the copyright issues involved in China’s artificial intelligence-generated works, focusing on two core controversial points: “copyrightability” and “copyright attribution”. The article systematically reviews the different views of academic circles and judicial practice at home and abroad: in terms of copyrightability, supporters believe that the works generated by artificial intelligence meet the basic standards of originality and intellectual creation, while opponents emphasize that they lack human subjectivity and direct intellectual control. In terms of copyright attribution, the main views include the theory of artificial intelligence attribution, the theory of artificial intelligence user attribution and the theory of investor attribution. The author believes that the works generated by artificial intelligence should be copyrighted, and proposes to adopt the practice of “user ownership as the principle”. This method will include clarifying the legislation on the nature of the work, establishing a traceability mechanism, and limiting the protection period to a certain range to balance innovation incentives and public interests, so as to provide theoretical reference for China’s artificial intelligence copyright framework.
Show more
Read Article PDF
Cite
Research Article Open Access
Post-structuralist challenges to the fixed order of capitalism: a case study of two images inMythologiesby Roland Barthes andDeluxeby Dana Thomas
Article thumbnail
Post-structuralism is a philosophical movement that emerged in France in the 1960s. It critiques structuralism's pursuit of fixed frameworks and emphasizes the fluidity of meaning as well as the co-constitution of power and knowledge. In simple terms, it rejects the notion of a "single truth" and seeks, through deconstruction, to expose concealed social prejudices and monetary power relations. Situated within a specific historical context, this paper argues that post-structuralism calls into question the ideological superiority of capitalism, which aspires to view the world as a fixed and stable order. Representative examples include Roland Barthes's Mythologies, which dismantles colonial myths through the image of a "Black soldier saluting the French flag," and Dana Thomas's Deluxe, which clears away the illusion of material worship through the image of "a paper box bearing a luxury logo that contains French fries." Drawing on Dao De Jing by Laozi, Marxist philosophy, and communist thought, this paper advocates the construction of social order around benevolence that transcends utilitarian calculation. Such an approach offers a possible path for the freedom explored by post-structuralists, enabling a shift from criticizing an ideologically static order to recognizing and accommodating that order.
Show more
Read Article PDF
Cite
Research Article Open Access
Policy empowerment and space activation: a blockchain-driven path to community-based activation of folk intangible cultural heritage—An interpretation and pathway design of the "bazaar/performance market" mechanism based on foucault's critique of power
Against the backdrop of China's current realities—namely the supply of community physical infrastructure, the orientation of cultural and creative economic policies, and the persistently high vacancy rates of community-use spaces—this study focuses on the core profit logic and practical feasibility of implementing folk Intangible Cultural Heritage (ICH) within community settings. Integrating local and nationally representative ICH resources such as Jinzhou paper-cutting and Jingdezhen ceramics, together with four UNESCO-recognized elements—Kunqu Opera, the Twenty-Four Solar Terms, traditional Chinese tea-making techniques, and Guqin music—the study takes multi-city practices in Jinzhou, Beijing, and Chengdu as empirical samples. Employing a mixed-methods approach that combines policy analysis, multiple case studies, spatial assessment, and quantitative statistical analysis, the research systematically examines the three-dimensional advantages of "policy–resources–demand" and the logic of blockchain-enabled empowerment. The findings indicate that without sustainable profit support, community-based cultural economies cannot be effectively realized or maintained. The establishment of a closed-loop industrial chain integrating "cultural institutions + market-oriented operations + industry–academia–research collaboration," together with blockchain functions such as value attribution and process traceability, constitutes the key to overcoming implementation barriers and bottlenecks in scalable replication. Accordingly, this study proposes an integrated six-dimensional implementation framework—"policy guidance, spatial activation, multi-stakeholder collaboration, resource integration, blockchain empowerment, and closed-loop industrial development"—to provide theoretical support and practical reference for the living transmission of intangible cultural heritage and the revitalization of grassroots cultural economies.
Show more
Read Article PDF
Cite
Research Article Open Access
Research on primary school science practical activities based on an integrative approach—A case study of the "Weather" unit in the education science press edition
Against the policy backdrop of the "addition" in science education, this study focuses on the design and implementation of practical activities in primary school science, conducting an empirical exploration through the "Weather" unit in the Education Science Press edition. The study emphasizes that integrating science practical activities with the science curriculum is essential for promoting students' integration and application of knowledge and for cultivating their core scientific competencies. To prevent practical science activities from becoming an additional burden on students, the study proposes that the core strategy lies in constructing such activities in close alignment with the national science curriculum system. Fragmented activity designs detached from the national curriculum are prone to increasing cognitive load, thereby undermining the goal of "reducing burden while enhancing effectiveness." Accordingly, this study advocates embedding an integrative, post-unit practical activity after the completion of national curriculum instruction for a specific unit. This activity is designed to systematically connect the core knowledge of the unit and to guide students in comprehensively applying, transferring, and deepening their learning in authentic or simulated contexts. This practice model, which is deeply integrated with the national curriculum, effectively avoids increasing students' learning burden while significantly enhancing their holistic understanding and application of scientific concepts. It represents an efficient pathway for deepening national curriculum learning and promoting the development of students' core scientific competencies.
Show more
Read Article PDF
Cite
Research Article Open Access
Behind the digital mask: semi-anonymity and user self-disclosure in the Momo phenomenon on Xiaohongshu
In contemporary society, where digitalization has fully permeated, social media has profoundly reshaped the fundamental paradigms of information dissemination and interpersonal interaction. However, with the strengthening of panoramic prison surveillance and the dissolution of online privacy boundaries, users are facing an unprecedented tension between pursuing social connections and safeguarding personal privacy. Against this backdrop, the Momo phenomenon emerged on the Xiaohongshu platform, where many users voluntarily adopted uniform pink dinosaur avatars and nicknames, forming a large, semi-anonymous group and becoming a unique cultural landscape and social practice. This study aims to deeply analyze the Momo phenomenon on the Xiaohongshu platform through a literature review and theoretical analysis, and to explore how anonymity changes users' risk-perception structure and thereby motivates their self-disclosure behaviour. Based on the Privacy Calculus Model, the research reveals that by adopting standardized identities, users effectively reduce the social risks and psychological costs of self-disclosure, making the benefits of a sense of security and belonging exceed the potential costs of privacy leakage. Meanwhile, the Social Identity Model of Deindividuation Effects (SIDE) explains the high degree of collective identity and behavioral consistency exhibited by this group in specific situations: deindividuation does not lead to simple disorder but rather prompts individuals to shift from personal identity to group identity. This mechanism is a double-edged sword. It not only provides a haven for marginal viewpoints and emotional venting but may also induce group polarization and cyber violence through moral disengagement.
Show more
Read Article PDF
Cite
Research Article Open Access
A study on the exposure of contemporary 12-year-old adolescents to age-inappropriate online content: prevalence and risks
Twelve-year-old adolescents are in a critical transitional phase of cognitive development, marked by underdeveloped worldviews and limited capacity to discern and resist complex information. In today's digital landscape, the ease of information dissemination and blurred boundaries often expose this demographic to "age-inappropriate" content—including adult-themed topics and developmentally mismatched discourse—through passive engagement with social platform recommendation algorithms. Current governance of youth-oriented online content predominantly focuses on explicit harmful material, while the identification and intervention of implicit age-inappropriate content remain inadequate, failing to effectively safeguard adolescents' digital growth. As internet penetration deepens among younger users, the boundaries of information exposure become increasingly ambiguous, sparking societal concerns about psychological "precocity." This study employs empirical methods to investigate the prevalence of age-inappropriate online content exposure among 12-year-olds. Using Sina Weibo as a case platform, Python-based web scraping collected user content, and a Bayesian classifier trained on adolescent health-related datasets was applied to classify content into "appropriate" and "inappropriate" categories. By analyzing the sample accounts, this research aims to assess the extent of "precocity risk." The findings are expected to provide data-driven insights for enhancing digital literacy education and improving online content governance.
Show more
Read Article PDF
Cite