LANGUAGE-CN
Elysian Field
In the Internet era, human's communication method has greatly changed from face-to-face socialization to socializing on online social platforms. Because of the virtuality and indirectness of the network environment, there are also phenomena and events that is morally condemned and cannot be restricted by law, among which cyber-violence has become one of the most typical phenomena. To explore the origin, participators and bad influence of cyber-violence, the project takes the "young idol Cai Xukun's network defaming event" as a starting point and researches how to protect the victims of cyber-violence.
Creator_XULIN | 2020-2021 | speculative design | graphic design

Operational Mechanism of Cyber Violence

According to the cyber-violence type summarized in the aforementioned events, it can be found that there are three typical types of cyber-violence: 'malicious videos and images', 'excessive human flesh search' and 'rumor'. And I analyzed in detail the correlated crowd and communication media of 'over-cyber manhunt'.
system-map

The core people

In the internet era, although different groups receive different levels of privacy infringement, the privacy disclosure can happy in anyone. The seed of privacy infringement is buried in the corners of our lives, and the privacy safety of public characters receives most severe invasion.
the core people

Public figure is the core people in a cyber-violence event.
However, privacy infringerment does not only happon on public figures, but also in our daily lives.
So, I've categorized the types of privacy invasion into five severity levels and named the affected groups.

fivecard1
the island
fivecard2
the doll
fivecard3
stalked man
fivecard4
no face
fivecard5
invisible

To protect the privacy-weak group, firstly, it needs to establish a NGO to protect privacy-vulnerable people, and then allows NGO
to construct a habitat for privacy-vulnerable group, allowing them to have a castle where they can live freely.

detail3
detail4
last