Please login first

List of accepted submissions

 
 
Show results per page
Find papers
 
  • Open access
  • 54 Reads
The Communication of Health Knowledge in Social Media under the Special Chinese Culture Context: the Moderating Effect of Loss of Face

The communication of health knowledge in social media plays an important role in public health literacy and health behavior promotion. But with the accumulation of user-generated health knowledge in social media, more and more misleading health information, health gossip and health rumors are inhibiting the communication of health knowledge and the development of information ecology in social media. This study focuses on the information ecology in social media and contributes to the communication of health knowledge in social media ecology, highlighting the characteristics of health knowledge and the special Chinese culture. Based on the definition of three effective communication forms embedded in the communication of health knowledge—the fear communication, the trust communication and the face communication, an explanatory framework is constructed to examine their interactions and impacts on the communication of health knowledge in social media. Data collected from 329 respondents was tested using a partial-least-squares (PLS) approach. The results indicate that fear communication and trust communication both act as effective communication forms contributing to the communication of health knowledge; face communication acts as a barrier constraining the trust communication while no effect on fear communication. Theoretical and practical contributions are discussed in this paper.

  • Open access
  • 147 Reads
A Model of Deceitful Information Communication: Some Views on Theory and Practice of Semantic Information

In the field of information science and philosophy of information, semantic information[1] is a hard nut to crack. In spite of this situation, some scholars pay their attention to this topic.

Recently, with the development and popularization of modern information technology, network and telecommunication fraud is becoming more and more common and serious. Similar cases suggest that theorists must study a new type of semantic information: deceitful semantic information and deceitful information communication.

In ancient times, some scholars concerned about some issues of communication. In modern times, Claude Elwood Shannon established a modern theory of communication and proposed a model of communication in 1948. However, the model is widely called Shannon–Weaver model of communication and regarded as the "mother of all models." [2]

Shannon-Weaver model can be illustrated as follows.

  • --------------------------------------------

Sender

Message

Encoding

Signal

Channel

Transmitting

Decoding

Message

Receiver

Interpreting

Noise  


On one hand Shannon distinguished signal from message; on the other hand Shannon says, “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point. Frequently the messages have meaning; that is they refer to or are correlated according to some system with certain physical or conceptual entities. These semantic aspects of communication are irrelevant to the engineering problem.”[3] It means that Shannon excluded the semantic dimension in the field of communication.

However, as far as social communication is concerned, the semantic dimension has to be included rather than excluded. Weaver points out that there are three levels of communication: level A as the technical level, level B as the semantic level, and level C as the effectiveness level.[4]

Because of the difficulty of semantic research, only a minority of scholars research the topic of semantic information and semantic information communication in the field of information science.

We have to admit that in the field of traditional information science, semantic information and semantic information communication is the most difficult topic.

As for semantic information communication, there are three kinds of communication: normal semantic information communication, secret semantic information communication and deceitful semantic information communication.

This article focuses on the last one.

As for deceitful communication, a new model should be proposed, because Shannon-Weaver model no longer fits for this situation.

A model of deceitful communication can be illustrated as follows.

①--------------------------------------------------------

Cheater/sender

-------------------

Original message

Feigning

Cheater/sender

————

Deceitful message

 

Encoding

Signal

----------⑤----------------------------- -------------- 

Channel

Transmitting

Noise

Decoding

Deceitful message

Distinguisher /receiver

------------------------------

Penetrating

Penetrator/original message

or

Cheatee/deceitful message

In comparison to Shannon-Weaver model, this model has four characteristics.

First, in the aspect of role structure, besides sender and receiver, four new roles enter into this model, which are cheater, distinguisher, penetrator and cheatee.

Second, in the aspect of operation, besides encoding and decoding, two new operations enter into this model, which are feigning and penetrating.

Third, while Shannon-Weaver model involves only level A that Weaver defines, the model of semantic information communication involves the semantic information. What’s more, semantic information is divided into two kinds, normal semantic information and deceitful semantic information. The model focuses on the latter.

Last but not least, in the aspect of ethics and axiology, the most important thing is that the concept deceitful information can be interpreted as a neutral concept rather than a negative one. For examples, when one tells a white lie or a spy for the sake of justice sends deceitful information in order to mislead the enemy, the pieces of deceitful information have positive value. In a word, the impact of deceitful information can be negative or positive.

In order to interpret this model, we should emphasize four points.

First, in the field of traditional information science, semantic information seems to be a paradoxical topic. On one hand semantic information is regarded as an important topic in theory; on the other hand semantic information approach is regarded as useless in practice. For example, a telegram cannot be charged by semantic information rather than by words. However, in the field of information ecology deceitful semantic information becomes an important issue which should be studied.

Second, although Weaver points out there levels of information, he does not explain  how to change level A of information into level B. According to linguist Ferdinand de Saussure, sign is a unity of signifier and signified.[5] Going a step further, we can consider that when a person uses a symbol he gives it a semanteme. So the process of communication includes two main operation,giving meaning and interpreting meaning.[6] This is why and how semantic information is produced and can be changed.[7]

Third, semantic information is divided into two categories, normal semantic information and deceitful semantic information. As for semantic information communication, it is important to note that the model of deceitful semantic information is formed by adding cheater and feigning at beginning and distinguisher, penetrating and cheatee to Shannon-Weaver model.

Finally, at first appearance, deceitful semantic information which is false information is a particular topic rather than a general one in the field of semantic information study. However, from point of view of giving meaning and interpreting meaning, on one hand deceitful semantic information is not semantic-information-itself as symbol, but is a result of giving meaning by cheater; on the other hand deceitful semantic information can be believed information or exposed information both as a result of receiver-distinguisher’s penetrating his received information. It means that besides ordinarily giving and interpreting normal meaning, people must attach importance to special giving and penetrating deceitful meaning, which is also a common social phenomenon.

 

References

[1] Semantic Conceptions of Information, In Stanford Encyclopedia of Philosophy. https://plato.stanford.edu/entries/information-semantic/

[2] https://en.wikipedia.org/wiki/Shannon–Weaver_model#cite_ref-4

[3] Shannon C. E. A Mathematical Theory of Communication [J]. BSTJ, 27(3), 27(4),1948.

[4] Weavel, Warren. Recent Contributions to the Mathematical Theory of Communication. http://www.panarchy.org/weaver/communication.html

[5] Saussure, Ferdinand de. Course in General Linguistics. London: G. Duckworth. 1983.

[6] Li, Bocong. Giving Meaning and Interpreting Meaning: Information in Multiple Relationships [J]. Philosophical Research, 1997(1):48-56.

[7] Li, Bocong. The Symbolic World in the high-tech era [M]. Tianjin Science and Technology Press 2000.  

  • Open access
  • 32 Reads
A non-linear analogy procedure for gene repair

Non-coding DNA region takes an important role in genetic variations that affect human disease. Owing to the ECODE project, it is convenient for bioinformatics researchers to find informational content in non-coding DNA sequences. In this paper, for analogy of non-coding DNA sequences, logistic map is applied, which felicitously stimulates the chaotic behavior of gene. By this way, two statuses were set, healthy status and ill status, generated by logistic map with two different system parameters. And two sequences were set, healthy sequence and ill sequence. These two sequence had same length and initial value. However, every single piece of healthy sequence was in healthy status, while four fifth of the ill sequence was in healthy status and the one fifth was in ill status. To repair the ill part of ill sequence by replacing it with adaptive sequence, ill sequence’s healthy part nearby the ill part was compressed four times to generate a new sequence of same length of ill part. Displaying the ill part with the new sequence and conducting a similarity analysis between healthy sequence and repaired sequence, it is showed that the repaired sequence is highly similar to the health sequence. In fact, as to this gene repair, by using healthy neighbor to replace ill part is essentially repairing the system parameter. This indicates that changing the parameter of a body system will change the status inside body. This concept may provide a new direction to biomedical study.

  • Open access
  • 94 Reads
A Theory of semantic Information

Shannon Theory of Information has dealt with the theory of statistically syntactic information. However, the semantic information is much more concerned in everyday life and academic studies. Therefore, a theory of semantic information with applications is presented in the paper.  

  • Open access
  • 59 Reads
An assessment on the hidden ecological factors of the incidence of malaria

Confounding effects of climatic factors temporally contribute to the prevalence of malaria. In this study, we explore a new framework for assessment and identification of hidden ecological factors to the incidence of malaria. A statistical technique, partial least squares path modeling and exploratory factor analysis, is employed to identify hidden ecological factors. Three hidden factors are identified: Factor I is related to minimum temperature and relative humidity, Factor II is related to maximum temperature and solar radiation and Factor III is related to precipitation and wind speed, respectively. Factor I is identified as the most influential hidden ecological factor of malaria incidence in the study area, as evaluated by communality and Dillon-Goldstein’s indices.

  • Open access
  • 46 Reads
Error Resilient Video Coding for Wireless Visual Sensor Network

This work proposes an error-resilient video coding scheme for improving the ecosystem of Wireless Visual Sensor Network (WVSN). In order to optimize the video information communication over WVSN, this work first provides a discussion on ecology technology model of video transmission in the WVSNs. And then proposes a Distributed Video Parallel Coding scheme, which make use of the correlation of video information in the decoder side, to cope with the loss of video data over wireless error-prone channel. Specifically, this work proposes a Partition Irregular Repeat Accumulate codec, which exhibits better error resilience performance and obtain the same compression ratio with traditional video coding method. The experimental results indicate that the performance of the proposed Distributed Video Parallel Coding scheme is promising and can better optimize the ecosystem of video communication over WVSN.

  • Open access
  • 43 Reads
Information Conversion and Intelligence Creation

The most typical, and also most significant, activities for humans is the interaction between human subject and object. Within this framework, what the subject received is the information presented by object (termed "object information") in outside world and then what the subject has to produce is the intelligent action reacting on the object. How can the intelligent action be produced based on the object information ? The paper will analyze the problem and give the answer.

  • Open access
  • 124 Reads
Information Ecology: Proper Methodology for Information Study

Due to the great difference between matter and information, the methodology of reductionism featured with "divide and conquer", which has been proved very successful, is no longer sufficient for information study. Instead, the new methodology named information ecology should be employed. The concepts related to information, information process, information system, and information ecology will be explained, the reason why information ecology can be regarded as the proper methodology for information study will be analyzed in the paper.

  • Open access
  • 68 Reads
Inherent emotional feature extraction of neonatal cry

As machine learning for emotion recognition always needs a large number of samples, the method of mining the inherent emotional feature of life with a small number of samples is explored in this study. Neonatal demand for the outside world comes from the instinct without interferences such as intentions, and cry is the main medium of communication between neonates and the outside world. Thus, Neonatal cry is selected as the object of this study. The inherent emotional features of neonatal cry are excavated based on the nonlinear method. The minimum embedding dimension of neonatal cry is taken as the feature representing nervous system activity and emotion. It is found that the minimum embedding dimension of neonatal cry in the state of pain is higher and that in the state of sadness is lower. This result is consistent with related research of brain nerve activity under different emotions. The minimum embedding dimensions of neonatal cry at multiple scales are analyzed. It is also found that the minimum embedding dimension of neonatal cry in the state of pain has a certain change rule in different frequency bands. And this result is also consistent with crying characteristics in the state of pain. The extracted emotion-related parameters, which reflect the inherent physiological feature of the human body, can be used to identify and classify emotions by sounds.

  • Open access
  • 83 Reads
Methodology Challenge to Human Body Medicine Study

There have many categories of human body medicine existed in the world. Two of them are in China, namely Traditional Chinese Medicine and Western Medicine. Both of them have achieved good results on one hand and been facing problems,owing to the different methodologies - reductionism for Western Medicine and Ecology-ism for Traditional Chinese Medicine. It is explained in the paper that there is a need for integration of the two methodologies for the complex human body medicine study.This is really the challenge to human body medicine study.  

Top