Same text, different meaning: China’s risk-based approach to data protection
Xiaodong Ding, Hao Huang, Zhengyu Shi
et al.
Abstract This article analyzes the divergence between China’s Personal Information Protection Law (PIPL) and the EU’s General Data Protection Regulation (GDPR), despite their textual similarities. It argues that China’s approach to data protection is shaped by distinct domestic understandings of “risk,” rooted in past legislation, judicial practices, and social concerns. Using focal point theory, the authors identify three key dimensions of risk in China: large-scale participation, economic loss, and threats from third parties. These focal points explain why China’s risk-based approach prioritizes different enforcement goals than the GDPR. The article also shows how these differences manifest in several areas, including the definition of personal information, the regulation of automated decision-making, and the design of enforcement authorities. Ultimately, the article challenges the assumption that legal diffusion through the “Brussels Effect” leads to uniform global standards. Instead, it highlights how domestic cultural and institutional factors reshape transplanted laws, creating seemingly performative enforcement that reflects localized regulatory logics.
History of scholarship and learning. The humanities, Social Sciences
Fusing content and social relationships: a multi-modal heterogeneous graph transformer approach for social bot detection
Jianhong Luo, Chaoqi Jin
Abstract Social bots pose a significant threat to online platforms, demanding robust methods to detect their increasingly complex behaviors. This paper introduces MM-HGT-Bot, a multi-modal framework that advances the field by operationalizing social network theory in a new way. Our core contribution is the deconstruction of social ties into two distinct, theoretically-grounded dimensions: information source selection (the following network) and potential influence (the follower network). Our architecture employs a Heterogeneous Graph Transformer (HGT) to learn the unique patterns emerging from these different relationship types. It then synergistically fuses these relational insights with context-aware representations of user-generated content. Extensive experiments on the widely-used Cresci-15 and Twibot-20 datasets demonstrate that our approach consistently outperforms state-of-the-art baselines. These findings highlight that a more fine-grained and theoretically-informed modeling of social relationships is crucial for building effective and robust bot detection systems.
Computer applications to medicine. Medical informatics
Comprehensive assessment of privacy security of financial services in cloud environment
Dongri He, Ming Yang, Rong Jiang
et al.
Abstract In recent years, the financial industry has become a disaster area for information leakage, which has serious implications for user privacy security. In the absence of risk identification and assessment, the risk will be difficult to prevent, and once the risk occurs it will directly cause serious losses. Therefore, this study plans to construct a comprehensive assessment framework combining fuzzy analytic hierarchy process (FAHP) and Dempster-Shafer (D-S) theory, aiming at assessing the weights and risk levels of the privacy security risks of financial services. (Privacy security risks refer to integrated factors in management, security, or other aspects that may lead to user privacy leakage, and they are considered an integrated concept.) The case study illustrates that the model and method proposed in this paper are effective and feasible. Finally, a comparison with the current mainstream privacy security assessment methods demonstrates that the method proposed in this paper is more capable of objectively and quantitatively reflecting the real privacy risks, providing users with more perspectives of the assessment results, and helping users to reasonably manage their personal privacy information, so as to effectively prevent and control the privacy risks.
Development of the Theoretical Approach Based on Matrix Theory for Analyzing the State of Information Security Systems
Bobok I.I., Kobozeva A.A.
. The widespread introduction of information technologies into all spheres of society, the crea-tion of a significant amount of confidential and critical data in digital form leads to an increase in the priority of information security tasks everywhere, including in the energy sector, which relates to the critical infrastructure of any state. The purpose of the work is to develop the men-tioned approach to ensure the possibility of increasing the efficiency of information security methods based on it. The goal was achieved through a detailed study of disturbances in the val-ues of formal parameters that uniquely determine the matrix that is assigned to the information security system under conditions of active attacks (disturbances) on the system. Singular num-bers and singular vectors of the matrix are considered as such parameters. The most important result of the work is the substantiation of the existence and establishment of interconnected re-gions of stabilization of disturbances of singular numbers and singular vectors of the system ma-trix, while the region of stabilization of singular numbers corresponds to the region of monoto-nous decrease in their disturbances with increasing numbers, while the stabilization of singular vectors corresponds to the region in which their disturbances are comparable with 90 degrees. It is shown that the stabilization process is determined by the mathematical properties of the pa-rameters under consideration. The significance of the obtained result lies in the possibility of using it to improve various information security systems that were built or studied using a gen-eral approach to analyzing their state, both theoretically and practically. The work provides ex-amples of such use.
Electrical engineering. Electronics. Nuclear engineering, Production of electric energy or power. Powerplants. Central stations
IMPRESSIONS OF THE PARTICIPANTS OF THE X INTERNATIONAL MILITARY-TECHNICAL FORUM "ARMY-2024"
Alexander Yu. Nikiforov, Nikolai A. Usachev, Alexander V. Ermakov
Information technology, Information theory
Semasiological management
V. Ya. Tsvetkov
The development of society is accompanied by an increase in the complexity of management objects and management mechanisms. To counteract the growth of complexity, new management models and methods should be introduced. New methods include semasiological management which uses a model approach and induction principle. It borrows the ideas of semasiology from linguistics and forms management decisions on the basis of application of information management units. Despite the fact that this complicates the preliminary process of preparing for management, it also gives an advantage in the comparability of different management decisions and technologies. Semasiological management allows, when reconfiguring management, not to create management models anew, but to modernise them by replacing management information units or forming new combinations of these units. Semasiological management is related to onomasiological information modeling and requires its use. In addition, it can be used in automated management, smart management, and digital twin management. Semasiological management requires special organisation and specific training, such as a special management language. The research proposes a variant of semasiological management which is based on the application of the theory of information units.
Electronics, Management information systems
Developing an Ethical Regulatory Framework for Artificial Intelligence: Integrating Systematic Review, Thematic Analysis, and Multidisciplinary Theories
Jian Wang, Yujia Huo, Jinli Mahe
et al.
Artificial intelligence (AI) ethics has emerged as a global discourse within both academic and policy spheres. However, translating these principles into concrete, real-world applications for AI development remains a pressing need and a significant challenge. This study aims to bridge the gap between principles and practice from a regulatory government perspective and promote best practices in AI governance. To this end, we developed the Ethical Regulatory Framework for AI (ERF-AI) to guide regulatory bodies in constructing mechanisms, including role setups, procedural configurations, and strategy design. The framework was developed through a systematic review, thematic analysis, and the integration of interdisciplinary concepts. A comprehensive search was conducted across four electronic databases (PubMed, IEEE Xplore, Web of Science, and Scopus) and four additional sources containing AI standards and guidelines from various countries and international organizations, focusing on studies published from 2014 to 2024. Thematic analysis identified and refined key themes from the included literature and integrated concepts from process control theory, computer science, organizational management, information technology, and behavioral psychology. This study adhered to the PRISMA guidelines and employed NVivo for thematic analysis. The resulting framework encompasses 23 themes, particularly emphasizing three feedback-loop processes: the ethical review process, the incentive and penalty process, and the mechanism improvement process, offering theoretical guidance for the construction of ethical regulatory mechanisms. Based on this framework, a seven-step process and case examples for mechanism design are presented, enhancing the practicality of ERF-AI in developing ethical regulatory mechanisms. Future research is expected to explore customization of the framework to remain responsive to emerging AI trends and challenges, supported by empirical studies and rigorous testing for further refinement and expansion.
Electrical engineering. Electronics. Nuclear engineering
Effect of a self-care promoting program on engagement in self-care behaviors and health-related outcomes among persons with type 2 diabetes and diabetic retinopathy: A single-blind randomized controlled trial
Wimol Madit, Teeranut Harnirattisai, Debra Hain
et al.
Background: Diabetic retinopathy (DR) is the most common microvascular complication of diabetes, leading to visual impairment and eventual blindness. Promoting self-care behaviors is crucial in controlling DR progression and preventing blindness.
Objective: This study aimed to investigate the effects of a Self-Care Promoting Program (SCPP) on engagement in self-care behaviors, HbA1c levels, visual acuity (VA), severity of DR, and vision-related quality of life (VRQoL) among individuals with type 2 diabetes and DR.
Methods: This study employed a single-blind randomized controlled trial design to compare SCPP with conventional diabetic care interventions (standard care). The SCPP was based on the Self-Care of Chronic Illness Theory, Self-efficacy theory, and the Association of Diabetic Care and Education Specialist (ADCES) guidelines incorporating health education, self-care maintenance, monitoring, and management skills training over 12 weeks. Ninety-eight participants were randomly allocated to the experimental or control group (n = 49 per group). While the experimental group received SCPP alongside standard care, the control group received standard care alone. Data collection occurred between May 2022 and March 2023 and included demographic information, the Self-Care of Diabetes Index questionnaire (SCODI), the self-care for diabetes eye care questionnaire (SCFDE), the impact of visual impairment questionnaire (IVI-Thai version), and retinal images for DR severity grading. Data analysis utilized descriptive statistics, Chi-Square tests, t-tests, and MANOVA.
Results: Following 8 and 16 weeks of SCPP, the experimental group had significantly higher mean scores in engagement with self-care and eye-care behaviors compared to the control group (p <0.001). The highest scores were observed in self-care and eye-care confidence behaviors, followed by maintenance, monitoring, and management. Furthermore, HbA1c levels and VRQoL significantly decreased and were lower than those of the control group at week 16 (p <0.001 and p <0.05, respectively). However, there were no significant differences in VA, and DR severity increased in both groups by week 16.
Conclusion: SCPP benefits individuals with DR, enhancing their confidence and ability to perform, monitor, and manage self-care behaviors. These strategies contribute to improved diabetes management, enhanced quality of life, and reduced DR-related blindness. Integrating SCPP into routine DR management is recommended, with nurses playing a pivotal role in overseeing and driving this integration, highlighting the critical role of nurses in managing this widespread global disease.
Trial Registry Number: Thai Clinical Trials Registration (TCTR20230302002)
ASSESSING AND FORECASTING THE STATE OF DETERIORATING SYSTEMS WITH THE USE OF MODIFIED REGRESSION POLYNOMIALS ON THE BASIS OF FUNCTIONAL APPROXIMATION OF THEIR COEFFICIENTS
Lev Raskin , Larysa Sukhomlyn, Dmytro Sokolov
et al.
Object of research is technical state of deteriorating systems whose operating conditions depend on a large number of interacting factors. The caused inhomogeneity of the sample of initial data on the technical state leads to impossibility of correct use of traditional methods of assessing the state of a system (meaning methods using mathematical tools of regression analysis). Subject of research is developing a method for constructing a regression polynomial based on the results of processing a set of controlled system parameters. Non-linearity of the polynomial describing the evolution of the technical state of real systems leads to an increase in the number of regression polynomial coefficients subject to estimation. The problem is further complicated by the growing number of factors affecting the technical state of the system. In these circumstances, the so-called <small sample effect> occurs. Goal the research consists in developing a method for constructing an approximation polynomial that describes evolution of the system state in a situation where the volume of the initial data sample is insufficient for correct estimating coefficients of this polynomial. The results obtained. The paper proposes a method for solving the given problem, based on implementation of a two-stage procedure. At the first stage a functional description of the approximation polynomial coefficients is performed; and this radically reduces the number of regression polynomial parameters to be estimated. This polynomial is used for preliminary estimation of its coefficients with the aim of filtering out insignificant factors and their interactions. At the second stage, parameters of the truncated polynomial are estimated by means of using standard technologies of mathematical statistics. Two approaches to constructing a modified polynomial have been studied: the additive one and the multiplicative one. It has been shown that the additive approach is, on average, an order of magnitude more effective than the multiplicative one.
Computer software, Information theory
Application Characteristics and Innovation of Digital Technology in Visual Communication Design
Jiasui Cai, Jie Su
While China has made major social and economic breakthroughs, it has also raised the level of research, development, and application of science and technology, especially the application of digital technology. Combining digital technology with visual communication design to meet diversified design needs can maximize the level of innovation in visual communication design work. The effective use and continuous innovation of digital technology in visual communication design make visual information more intuitive and image . and constantly bring people a fresh and unique visual experience, and the development of visual communication design has been strongly promoted. This paper analyzes the advantages of the application of digital technology in visual communication design, focusing on the application of digital technology in visual communication design, and from different perspectives such as art space tools, it is extremely critical and important to apply and expand the theory of advanced innovation. From the aspects of artistry, diversification, and science and technology, the application of digital technology in visual communication design is discussed, and the application innovation strategy of digital technology in visual communication design is further discussed. We hope that this research can provide some useful references for the development of modern visual communication design.
Electronic computers. Computer science
<i>Computing Attitude and Affect in Text: Theory and Applications</i> James G. Shanahan, Yan Qu, and Janyce Wiebe (editors) (Clairvoyance Corporation and University of Pittsburgh) Dordrecht: Springer (The information retrieval series, edited by W. Bruce Croft), 2006, xv+341 pp; hardbound, ISBN 1-4020-4026-1, $99.00, €74.95
Michael Gamon
Computational linguistics. Natural language processing
A Cross-cultural Comparison of Chinese and American Tourists’ Satisfaction with Chengdu
Liu Xueqian
Compared with China’s domestic and outbound tourism, China’s inbound tourism has developed relatively slowly. An understanding of cultural similarities and differences can support destination managers in formulating strategies and increase the satisfaction of inbound tourists. As one of the best tourist cities in China, Chengdu is an important destination for inbound tourists. Meanwhile, American tourists are the major source of tourists for Chengdu’s inbound tourism. Based on the Cultural Dimensions Theory proposed by Hofstede, this research focuses on a cross-cultural comparison of two important markets for Chengdu tourism: Chinese and American tourists. In addition, electronic word-of-mouth (E-WOM) has become an important source of tourist information, the analysis of E-WOM may provide more insights into users’ feelings than questionnaires. This study uses content analysis to quantify online reviews and importance performance analysis to compare the importance and satisfaction of Chinese and American tourists with destination attributes. The results clearly show the comparison between the two groups in destination assessment.
Empirically Tested Health Literacy Frameworks
Joycelyn Cudjoe, Sabianca Delva, Mia Cajita
et al.
BACKGROUND: Health literacy is a significant determinant of health behaviors, but the pathways through which health literacy influences health behaviors are not completely clear nor consistent. The purpose of this systematic review is to critically appraise studies that have empirically tested the potential pathways linking health literacy to health behavior.
METHODS: We performed searches of the electronic databases PubMed, Embase, and CINAHL to identify studies that proposed a conceptual framework and empirically tested the proposed mechanism through which health literacy influences certain health behaviors. Twenty eligible studies were included for analysis.
KEY RESULTS: The 20 studies addressed various health behaviors: chronic disease self-management (n = 8), medication adherence (n = 2), overall health status (n = 4), oral care (n = 1), cancer screening (n = 1), shared decision-making (n = 1), health information sharing (n = 1), physical activity and eating behaviors (n = 1), and emergency department visits (n = 1). Most studies were conducted in the United States (n = 13) and used a cross-sectional design (n = 15). The Short Test of Functional Health Literacy in Adults was commonly used to assess health literacy levels. Selection of variables and their operationalization were informed by a theoretical model in 12 studies. Age, gender, race/ethnicity, and insurance status were reported antecedents to health literacy. The most commonly tested mediators were self-efficacy (n = 8) and disease knowledge (n = 4). Fit indices reported in the studies ranged from acceptable to excellent.
DISCUSSION: Current evidence supports self-efficacy as a mediator between health literacy and health behavior. Further research is needed to identify how health literacy interplays with known psychosocial factors to inform people's use of preventive care services. Future studies should include more disadvantaged populations such as immigrants with high disease burden and those with low health literacy. Theory-based, empirically tested health literacy models can serve as the conceptual basis for developing effective health interventions to improve health behaviors and ultimately decrease the burden of disease in such vulnerable populations. [HLRP: Health Literacy Research and Practice. 2020;4(1):e21–e44.]
PLAIN LANGUAGE SUMMARY: This review systemically compiles, and critically appraises 20 existing studies that test conceptual frameworks that propose potential pathways through which health literacy affects health behaviors. The findings from this review can help inform the development of health literacy-focused interventions to improve the health behaviors of populations with disease burdens.
Public aspects of medicine
QATIPANA: Processes of Individuation on the Relationship Between Art, Machine and Natural Systems
Renzo Ch. Filinich Orozco, Tamara J. Chibey Rivas
The present research turns around the concepts and processes of Becoming and Individuation where it evidences a functional model based on the articulation of an informational processing system based on the approaches of the philosopher Gilbert Simondon. It aims to model a sensorimotor cycle performed by the cognitive system of an Artificial Intelligence agent. To establish this model of biological inspiration, we use the concepts of information in cybernetics by Norbert Wiener, information and modulation in Gilbert Simondon and the notion of machine performativity in light of Bernard Stiegler's ideas. Although the architecture that we have called Qatipana (Quechua word that denotes the flow of information processing systems) cannot be considered as a systems theory, it has the utility of being able to explain some empirical observations that we also present here. In conclusion, the implications and limitations of this model and the research that is being carried out to present its utility and probability as a model of the algorithmic cognitive system are part of the questions of communication and affect in the decisions provided by the automatic system.
Speculative philosophy, Ethics
Building a noise-tolerant code based on a holographic representation of arbi-trary digital information
A.L. Timofeev, A.Kh. Sultanov
The article considers a method of error-correcting coding based on the holographic representation of a digital signal. The message encoding process is a mathematical simulation of a hologram created in virtual space by a wave from an input signal source. The code word is a hologram of a point, it is also a one-dimensional zone ruler that carries information about the input data block in the form of an n-bit code of the coordinate of the center of the Fresnel zones. It is shown that the holographic representation of the signal has significantly greater noise immunity and allows you to restore the original digital combination when most of the code message is lost and when the encoded signal is distorted by noise several times higher than the signal level. To assess the noise immunity, the reliability of information transmission over the channel with additive white Gaussian noise is compared using the Reed-Solomon code, the Reed-Muller code, the majority code, and the holographic code. The comparative efficiency of codes in the presence of packet errors caused by the effect of fading due to multipath propagation in radio channels is considered. It is shown that holographic coding provides the correction of packet errors regardless of the length of the packet and its location in the codeword. The holographic code is of interest for transmitting information over channels with a low signal-to-noise ratio (space communications and optical communication systems using free space as a transmission channel, terrestrial, including mobile radio communications), as well as for storing information in systems exposed to ionizing radiation.
Information theory, Optics. Light
N $$ \mathcal{N} $$ = 2 S-duality revisited
Matthew Buican, Zoltan Laczko, Takahiro Nishinaka
Abstract Using the chiral algebra bootstrap, we revisit the simplest Argyres-Douglas (AD) generalization of Argyres-Seiberg S-duality. We argue that the exotic AD superconformal field theory (SCFT), T 3 , 3 2 $$ {\mathcal{T}}_{3,\frac{3}{2}} $$ , emerging in this duality splits into a free piece and an interacting piece, T X $$ {\mathcal{T}}_X $$ , even though this factorization seems invisible in the Seiberg-Witten (SW) curve derived from the corresponding M5-brane construction. Without a Lagrangian, an associated topological field theory, a BPS spectrum, or even an SW curve, we nonetheless obtain exact information about T X $$ {\mathcal{T}}_X $$ by bootstrapping its chiral algebra, X T X $$ {}_{\mathcal{X}}\left({\mathcal{T}}_X\right) $$ , and finding the corresponding vacuum character in terms of Affine Kac-Moody characters. By a standard 4D/2D correspondence, this result gives us the Schur index for T X $$ {\mathcal{T}}_X $$ and, by studying this quantity in the limit of small S 1, we make contact with a proposed S 1 reduction. Along the way, we discuss various properties of T X $$ {\mathcal{T}}_X $$ : as an N $$ \mathcal{N} $$ = 1 theory, it has flavor symmetry SU(3) × SU(2) × U(1), the central charge of X T X $$ {}_{\mathcal{X}}\left({\mathcal{T}}_X\right) $$ matches the central charge of the bc ghosts in bosonic string theory, and its global SU(2) symmetry has a Witten anomaly. This anomaly does not prevent us from building conformal manifolds out of arbitrary numbers of T X $$ {\mathcal{T}}_X $$ theories (giving us a surprisingly close AD relative of Gaiotto’s T N theories), but it does lead to some open questions in the context of the chiral algebra/4D N $$ \mathcal{N} $$ =2SCFT correspondence.
Nuclear and particle physics. Atomic energy. Radioactivity
Anatomy of a Spin: The Information-Theoretic Structure of Classical Spin Systems
Vikram S. Vijayaraghavan, Ryan G. James, James P. Crutchfield
Collective organization in matter plays a significant role in its expressed physical properties. Typically, it is detected via an order parameter, appropriately defined for each given system’s observed emergent patterns. Recent developments in information theory, however, suggest quantifying collective organization in a system- and phenomenon-agnostic way: decomposing the system’s thermodynamic entropy density into a localized entropy, that is solely contained in the dynamics at a single location, and a bound entropy, that is stored in space as domains, clusters, excitations, or other emergent structures. As a concrete demonstration, we compute this decomposition and related quantities explicitly for the nearest-neighbor Ising model on the 1D chain, on the Bethe lattice with coordination number k = 3 , and on the 2D square lattice, illustrating its generality and the functional insights it gives near and away from phase transitions. In particular, we consider the roles that different spin motifs play (in cluster bulk, cluster edges, and the like) and how these affect the dependencies between spins.
Quantum gambling based on Nash-equilibrium
Pei Zhang, Xiao-Qi Zhou, Yun-Long Wang
et al.
Quantum information: Quantum gambling based on Nash-equilibrium Gambling or betting on an event with an uncertain outcome, is one of the most widely practiced activities in human society. Despite its widespread usage and applications, fair gambling between two spatially separated parties cannot be made without the assistance of a trusted third party. A group of international scientists led by Prof. Pei Zhang from Xi'an Jiaotong University, China, has experimentally demonstrated a novel gambling protocol, which enables fair gambling between two distant parties without the help of a third party. By incorporating the key concepts and methods of game theory, their protocol will “force” the two parties to move their strategies to a Nash-equilibrium point which guarantees the fairness through the physical laws of Quantum Mechanics. Furthermore, the authors show that the protocol can be easily adapted to a biased version, which would find applications in lottery, casino, etc.
Physics, Electronic computers. Computer science
Writing in and reading ICU diaries: qualitative study of families' experience in the ICU.
Maité Garrouste-Orgeas, Antoine Périer, Philippe Mouricou
et al.
PURPOSE: Keeping an ICU patient diary has been reported to benefit the patient's recovery. Here, we investigated the families' experience with reading and writing in patient ICU diaries kept by both the family and the staff. METHODS: We conducted a qualitative study involving 32 semi-structured in-depth interviews of relatives of 26 patients (34% of all family members who visited patients) who met our ICU-diary criterion, i.e., ventilation for longer than 48 hours. Grounded theory was used to conceptualise the interview data via a three-step coding process (open coding, axial coding, and selective coding). RESULTS: Communicative, emotional, and humanising experiences emerged from our data. First, family members used the diaries to access, understand, and assimilate the medical information written in the diaries by staff members, and then to share this information with other family members. Second, the diaries enabled family members to maintain a connection with the patient by documenting their presence and expressing their love and affection. Additionally, families confided in the diaries to maintain hope. Finally, family members felt the diaries humanized the medical staff and patient. CONCLUSIONS: Our findings indicate positive effects of diaries on family members. The diaries served as a powerful tool to deliver holistic patient- and family-centered care despite the potentially dehumanising ICU environment. The diaries made the family members aware of their valuable role in caring for the patient and enhanced their access to and comprehension of medical information. Diaries may play a major role in improving the well-being of ICU-patient families.
Safety of political communication in modern Russia
Morozov Ilya Leonidovich
The article analyzes transformation of the new threat in the information area. The author requests for discussion the various models of information security of Russia in the modern world. The article includes recommendations and proposals aimed at strengthening the security of the democratic state.
History of Russia. Soviet Union. Former Soviet Republics, International relations