In the Internet era, human's communication method has greatly changed from face-to-face socialization to socializing on online social platforms.
Because of the virtuality and indirectness of the network environment, there are also phenomena and events that is morally condemned and cannot be restricted by law, among which cyber-violence has become one of the most typical phenomena.
To explore the origin, participators and bad influence of cyber-violence, the project takes the "young idol Cai Xukun's network defaming event" as a starting point and researches how to protect the victims of cyber-violence.
According to the cyber-violence type summarized in the aforementioned events, it can be found that there are three typical types of cyber-violence: 'malicious videos and images', 'excessive human flesh search' and 'rumor'.
And I analyzed in detail the correlated crowd and communication media of 'over-cyber manhunt'.
The core people
In the internet era, although different groups receive different levels of privacy infringement, the privacy disclosure can happy in anyone.
The seed of privacy infringement is buried in the corners of our lives, and the privacy safety of public characters receives most severe invasion.
Public figure is the core people in a cyber-violence event.
However, privacy infringerment does not only happon on public figures, but also in our daily lives.
So, I've categorized the types of privacy invasion into five severity levels and named the affected groups.
the island
the doll
stalked man
no face
invisible
To protect the privacy-weak group, firstly, it needs to establish a NGO to protect privacy-vulnerable people, and then allows NGO to construct a habitat for privacy-vulnerable group, allowing them to have a castle where they can live freely.