Current location - Education and Training Encyclopedia - Graduation thesis - The harm of network violence and its countermeasures
The harm of network violence and its countermeasures
Cyber violence is a kind of violence different from the traditional concept of violence. The word "network" just illustrates the important way of this kind of violence, that is, the network virtual world platform. Information such as cyber violence is usually malicious, aggressive and cruel, which violates social moral values and goes beyond the basic constraint bottom line of public behavior. Although this kind of information is often aimed at an event, its information has exceeded the reasonable limit of objective evaluation of the event.

I. Overview of cyber violence

(A) the characteristics of cyber violence

1. Formal characteristics

Everyone has worldly desires, and being in a bad mood is a common thing in our daily life. It is also reasonable to vent negative emotions. However, the venting of negative emotions is often restricted by social regulations, moral standards and interpersonal habits. The online virtual world gives netizens equal right to speak and removes many behavioral constraints in real life, so people are more likely to release negative emotions in the online virtual environment, and verbal violence is one of the most common forms. It must be admitted that at present, this form of violence can be seen almost everywhere on the domestic network, especially on various websites and forums with high views. In fact, it is often an important part of all kinds of cyber violence, which has a significant impact on the expansion of the influence of cyber violence and the strengthening of the degree of harm.

2. Nature and characteristics

Rumor is a false word, but we have to admit that often the fabricators of rumors can catch the eye of netizens, which makes rumors spread rapidly and have a serious impact. In this process, netizens are both perpetrators and victims. The proliferation of rumors leads to the decline of netizens' trust, and people are prone to large-scale panic and even social unrest in the environment of rumors. Cyber violence is varied, not all of which come from rumors. The cyber violence related to rumors basically follows the law of "rumors spread by rumors to attract netizens to spread blindly and seek illegal interests". Although a lot of cyber violence has nothing to do with rumors at first, rumors keep emerging in the process of continuous fermentation of the incident, which leads to the truth of the incident being blurred. When the contradiction caused by an incident becomes very obvious, the focus of netizens' attention is no longer the original appearance of the incident, but the process of violence. Therefore, cyber violence is often not just a form of cyber violence, but a combination of various forms.

Second, the case analysis takes the "Shanghai subway chicken claw girl" incident as an example.

An Overview of Cyber Violence in the "Shanghai Metro Phoenix Claw Girl" Incident

The incident started from 2065438+20061a video uploaded by netizens on 2 October. Netizens gave a basic overview of the video content. In the afternoon, a fashionable girl ate a snack with pickled peppers and chicken feet in a carriage of Shanghai subway and threw the snack residue into the subway at will. Passengers around came forward to stop their behavior, but they were insulted and denied their behavior. An old man who also took the subway stood up and testified that the woman's indecent behavior was abused by the woman and her attitude was extremely bad.

The video shooter is Zhang from the Mathematics Department of East China Normal University. He contacted me through some channels. At first, he didn't realize the bad influence of the video exposure on the future life of the video protagonist. The starting point is just to let more people know about it, evaluate it, and let more people pay attention to subway civilization. However, a series of behaviors such as human flesh search and abuse triggered by other netizens are actually not in the original imagination, so I still want to apologize for this matter here.

(B) "Shanghai Metro Phoenix Claw Girl" incident in the network of violence incentives

1. The virtuality and anonymity of the network lead to the abuse of freedom of speech by netizens.

The online world is a virtual world based on information technology, so the ability to restrain the behavior of netizens is not strong. Internet provides anonymous identity and equal right to speak to netizens, which leads to the separation of citizens' real life and online virtual life. With the weakening of social responsibility, the abuse of discourse power is becoming more and more serious, which eventually gives birth to cyber violence. Furthermore, the super-high information dissemination efficiency of network information technology has also brought about the problem of "group polarization", which is a key point in the emergence of cyber violence, because the opinions of some group members tend to lead to a considerable number of group members' opinions tilted and even extreme. It is often influential netizens who express their opinions on the incident, which leads most netizens' emotions and public opinion to negative and induces cyber violence.

2. Mob: the phenomenon of "siege" caused by collective behavior.

As American sociologist David Popenoe said, "Collective behavior is essentially a spontaneous, unreasonable organization, unstable infrastructure and unpredictable behavior against a certain stimulus or event, which generally appears through clustering, scale panic and fashion." In his mind, cyber violence is the result of netizens' collective reaction to an event in the virtual world.

According to relevant theories, public opinion is defined as "social consensus", and the essence of public opinion is that members of society conduct extensive discussions on a certain issue and eventually form mainstream opinions (consensus). Then, back to this case, the brewing process of the incident was forwarded by a person in Weibo, which attracted the attention and participation of netizens. When the scope of influence is more and more extensive, opinions on the incident are quietly formed.

Third, the prevention and control measures of cyber violence

(a) the implementation of the network real name registration system.

Online real-name registration system is not a new concept. In fact, some countries have proposed and implemented this system. At present, some domestic websites have begun to try to implement the real-name registration system independently, but they have been questioned. To sum up, the focus of the debate is the security of personal information, the limitation of public opinion feedback, the difficulty of comprehensive supervision and the strictness of identity verification of grassroots Internet cafes.

The first is an accurate understanding of the "online real-name registration system". Some people mistakenly think that the online real-name registration system must apply real names in the online virtual world, but this is not the case. This idea should belong to the category of "real name in the foreground", but the more widely used model is "real name in the background", that is, netizens can customize their own online virtual world user names, but users' real names and identity information can be consulted in the background of network technology, which is similar to pen names in writing, but there are technical and legal restrictions. This is to ensure the security of personal information, and to ensure that personal information can only be consulted under the background of reasonable and legal means.

The second is the problem of limited public opinion feedback. First of all, we should face up to the fact that the people's true wishes are not afraid of being publicly expressed, and real-name registration system can just prevent illegal purposes from being achieved by public opinion. At present, there are feedback channels of public opinion supervision for the performance of government functions and official corruption in China, but to further improve it, an anonymous online reporting forum can be established to ensure the quality of public opinion supervision and the safety of reporting subjects. This idea can be realized from technical support and related laws and regulations. Thirdly, as far as the current technical level is concerned, the supervision of the online real-name registration system is not difficult. For example, through technical means, the online threshold is adjusted to the real-name registration system application, and online activities other than browsing cannot be carried out.

(2) Implement an effective supervision mechanism.

Some scholars misjudge the seriousness of cyber violence, which leads to an argument that the current legislation is sufficient to deal with cyber violence. In fact, the legal restraint of cyber violence is a very complicated problem, and the solution is not limited to how to provide relief after the violence. On the contrary, we should establish a perfect legal system to prevent cyber violence, control its violence and provide relief afterwards. Looking at the current domestic legislation, it is not difficult to find that most of the foothold lies in the relief after violence, and the legal setting for prevention and control is still blank. The best mode to solve the problem should be adequate prevention and situation control, rather than remedial afterwards.

(C) to strengthen network moral education

We have to admit that the prevention of cyber violence cannot be separated from the cultivation of citizens' morality. The source of cyber violence is generally psychological problems, which are often caused by the accumulation of negative emotions in daily life. Therefore, it is necessary to carry out targeted moral education, especially network moral education, to comprehensively improve the quality level of our citizens.

First of all, we should build a scientific network moral education system. Network moral education is not a mechanical copy of moral concepts, but a targeted moral evaluation based on the actual network situation and social environment in order to establish a more scientific and reasonable network moral education system.

Second, integrate the forces from all walks of life to promote comprehensive moral education. Moral education cannot be divorced from social reality. Therefore, the society must form a good moral fashion, further form a good network legal environment and moral atmosphere, and help network moral education.

Third, build an online education community. The virtual world on the Internet is a double-edged sword. The essence of cyber violence is the result of individuals' attachment to groups to vent their emotions, and the collection of negative emotions will bring unimaginable destructive effects. Therefore, enhancing the rational consciousness of individuals and even groups is an important means to prevent and control cyber violence. This is also of great benefit to netizens themselves.

Source of this article: Audio-visual: /w/qk /w/qk/950 1.html