How far are we from the cyber storm

2022-04-14

In the past two days, the news that a woman's take out brother finally died after being raped by the Internet is still fermenting. The simple goodwill finally ended with the internet violence of a chicken feather, which made many people sigh with regret. "Cyber violence" can be traced back to more than 10 years ago, but we may never really feel that cyber violence is so close to you and me. In terms of the recent internet violence, the victims are either public figures such as "stars" with high social attention, or news figures with topicality and controversy, which may make many people think that their identity alone has the "characteristics" of internet violence isolation. However, the occurrence of the aforementioned tragedy shows that this is not the case. This may also be the latest evidence of the generalization of cyber violence. How did cyber violence come into being? Public opinion has not stopped questioning. From the perspective of communication, many theories have explanatory power. As the consensus reached by the society, the "anonymity effect" of the Internet gives people the "courage" to break away from various norms of the real society, and the fluke psychology of not blaming the public gives "comfort" to unscrupulous words and deeds. The development of network technology enables the rapid "assembly" of violent discourse. In the formation mechanism of cyber violence, the "spiral of silence" effect appears. The silence of most people makes the noisy minority form a wrong perception of the climate of public opinion, think their views are welcome and encouraged, and then become more bold and extreme. However, as some communication theories have been questioned, no matter how sophisticated the communication mechanism is, it does not happen in a vacuum. The latest official statistical report shows that the number of Internet users in China has exceeded the 1 billion mark, of which nearly 1 / 5 are minor Internet users, and about 4 have a junior high school degree. The characteristics of the younger netizens and the pyramid distribution of their education level are a structural factor that can not be ignored when we discuss online violence. It is not difficult to find that most attacks are based on or begin with a kind of moral judgment. Although this kind of moral judgment is blind and extreme, the perpetrator thinks he is right and imposes this kind of moral judgment on the victim. For example, they ridiculed that the express payment of 200 yuan was "exquisite" and "stingy", and the Olympic champion's collection of a brand of sports shoes was "kneeling people", etc. In the face of cyber violence, any attempt to present facts and reason is useless. Instead, it provides them with more clues and resources of "emotional labor". Often pick up the moral stick, occupy the commanding height, denounce others, wantonly stigmatize, show their moral superiority, belittle the victims, and almost all dominate the perpetrators of cyber violence. This is certainly related to the psychological structure and way of thinking of Pan Taoism and morality formed in our long-term history and culture. At the same time, we should also see that stimulating information elements can be found in most internet violence events. If these specific information elements are further abstracted, they may be attributed to the realistic "motif" such as social mobility and differentiation, social security and trust, or to the value demands such as "justice" and "equality". Behind the extreme moral psychology of the perpetrator, we can more or less see the social conflict it points to and the social anxiety derived from it. It must be pointed out that cyber violence makes use of the virtuality and anonymity of cyberspace to attack others, or verbal abuse, or human flesh search, which constitutes an infringement of others' freedom and trampling on their privacy. It is a challenge to law and ethics, and we must say "no" to them. In addition, we also need to understand this point: Cyber violence or the distorted presentation of social conflicts and risks, which needs to be observed and considered in the context of "Transitional China". This is not an "excuse" for cyber violence, but an explanation that the understanding and management of cyber violence need to go beyond the vision of communication, and there are more complex evolution mechanisms and generating soil on the communication mechanism. Therefore, it can be said that it is important for the platform to actively take responsibility for the governance of online violence, and it is necessary to crack down severely by law, but this is not enough. It is reported that some network platforms have been designed to open the "anti riot mode" or strengthen the supervision of sensitive words. Relevant regulatory departments and experts have also proposed to strengthen the network real name system and attack the commercial "water army". We are happy to see that these efforts can effectively curb the escalation of cyber violence, and look forward to governance strategies beyond this perspective. (Xinhua News Agency)

Edit:Huang Huiqun    Responsible editor:Huang Tianxin

Source:gmw.cn

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Return to list

Recommended Reading Change it

Links

Submission mailbox:lwxsd@liaowanghn.com Tel:020-817896455

粤ICP备19140089号 Copyright © 2019 by www.lwxsd.com.all rights reserved

>