Font Size: a A A

Information Tort In Baidu Post Bar From The Perspective Of Group Communication

Posted on:2018-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z W ChenFull Text:PDF
GTID:2348330518950355Subject:Communication
Abstract/Summary:PDF Full Text Request
With the development of network technology,some Internet forums like tianya and baidu post bar com e into being.They becom e important channels of chatting and m aking friends.Internet users browse Baidu Post Ba r for purpose of entertaining.However,there always exists a lot of civil infringement activities like the p rivacy infringement,to which we should pay much attention.With group communication as th e main theory angle,combined with the communication strategy “go viral” and legal th eories,this study analyses privacy infrin gement cases in the process of com bating fraud.It aim s to illus trate the reaso n for this phenom enon,and the purpose of transmitting the inf ringement information as well as what communication techniques are adopted.Meanwhile,it works to understand what influence is exerted on users.The infringement information posted between March 13 and November 15 2016 is the research sample.Research m ethods include content analysis,te xtual analysis and questionnaires.The following three questions are explored in the resea rch: 1)the content of infringement information in Baidu Post Bar and its status quo;2)the illegality of infringement information and what leads users to participate in the communicatio n of this kind of information;3)what communication te chniques are adopted by in fringers,as well as what influence the information exerted on users.Part Two of the essay answered the first ques tion with content analysis.There does exist content that infringes privacy and the condition is not so positive.In Baidu Post Bar,there are volumes of contents that com plement the purpose of combating fraud by infringing the privacy.It is discovered that the m ain methods of infringem ent include exposing nam es,phone numbers,photos,IDs on social p latforms,financial accoun ts and other for ms of identity information.Infringers find fraudsters and express anger by means mentioned above.Most replies in Baidu Post Bar show sympathy and support to infringers.Combined with legal theories,part three demonstrates the illegality and violation of public order and good custom.It also discusses mains reasons and features of infringement in Baidu Post Bar.Privacy inf ringement mainly displays in the baidu post bar for both intent and negligence tort form s.In add ition,this part of the study al so found that the virus-like communication in tort infor mation has played a pivotal role in th e process,in the form of a story is spread,and through a va riety of forms of infringement combination can expand the infringing information transmission range,speed up the transmission speed.Part four of the article pe rforms text analysis to infringing content expression and baidu post bar user m essage.It founds violators through three pattern s like logic to resort to,personality appeal and emotional appeal to persuade.They use rationality,character,affect the user s tate of m ind as behav ioral characteristics to a chieve the their tar get.Privacy infringing content which exist in the Baidu Post Bar are not only to produce m any bad influences,but also has a nega tive effect on other users,m ain show is the influence of cognition,attitude and behavior three aspects.The innovation point of this research is to no longer simply from the Angle of legal theory,but a com prehensive community transm ission and tort theory,combined with viral review Baidu Post Bar in the phenom enon of invasi on of privacy.The artic al through content analysis and textual analysis to show the present situation of the infringing content,explores why users involved in the infr ingement of infor mation transmission in the process of information transmission and infringement activities which impact on its own.
Keywords/Search Tags:Group communication, viruses-like spreading model, Infringement of privacy, Internet privacy
PDF Full Text Request
Related items