Lecture Notes in Education Psychology and Public Media

- The Open Access Proceedings Series for Conferences

Volume Info.

  • Title

    Proceedings of the 4th International Conference on Educational Innovation and Philosophical Inquiries

    Conference Date







    978-1-83558-057-8 (Print)

    978-1-83558-058-5 (Online)

    Published Date



    Javier Cifuentes-Faura, University of Murcia

    Enrique Mallen, Sam Houston State University


  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231089

    Definition of “etc.” Behavior in the Crime of Assisting Information Network Criminal Activities

    Various kinds of cybercrime have emerged after entering the Internet era. In the Criminal Law Amendment (IX), the crime of assisting information network criminal activities has been added. However, there is an inconsistent understanding of the crime of assisting information network criminal activities among all parties in the practical circles. It is found that the judicial application of the crime of assisting information network criminal activities is more confusing by combing the relevant adjudication documents. For the purpose of eliminating this phenomenon, the “etc.” assistance in the crime of assisting information network criminal activities can be defined through legal norms analysis or case studies. This paper clarifies the boundary between crime and non-crime and between this crime and the other crime based on the following criteria. The objective assisting behavior needs to have the legal benefit infringement. The degree of “scienter” is relatively specific and determined. Meanwhile, the circumstances are severe. Besides, in order to clarify the scope of “etc.”, this paper analyzes the legal norms of the act of “using the account number in online games to transfer money,” which provides a more significant reference value for judicial application.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231094

    Research on the Protection of Rights and Interests of People with Disabilities in the Public Administration Process under the Perspective of Good Governance

    As the process of building a harmonious society continues to advance, the problems of disadvantaged groups, including people with disabilities, have been highlighted in the process of public administration in China in recent years. This paper tries to focus on the defects in the current process of protecting the rights and interests of people with disabilities in China from the perspective of good governance and proposes effective ways to protect the rights and interests of people with disabilities from three dimensions: from the rule of man to the rule of law, from the power-based to the service based, and from the government-based to the society-based, in order to promote social and political stability and create a harmonious society with positive interaction.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231095

    A Study on the Effect of Family Capital on College Students’ Academic Achievement

    The relationship between family socioeconomic status and students’ academic achievement has long been a topic of intense academic interest; however, few studies have combined family economic capital, cultural capital, and social capital as family capital to investigate its influence on students’ academic achievement and how it affects students’ academic achievement. This study investigates the relationship between family capital and the mechanisms of influence on students’ academic achievement in an effort to generate new strategies for enhancing family capital and students’ academic achievement. Using the method of literature review, it was determined that the social, cultural, and economic capital of students’ families were all substantially related to their academic achievement in school, and the greater the family capital, the higher the students’ academic achievement. In this process, academic goals play a mediating function, meaning that family capital not only directly affects students’ academic achievement, but also indirectly affects it by influencing their academic goals.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231097

    A Tentative Analysis on the Forming Factors of Introversion Psychology

    Introverts differ in their behavior and emotional expression from extroverts. They tend to be more solitary and deliberate, and are relatively less involved in social activities. This individual difference has been a topic of concern in psychological research. Introverts need to understand that introversion is a trait, not a flaw. Exploring the causes of introversion can help people better understand themselves, their strengths and weaknesses, and cope more effectively with their emotions and behaviors. At the same time, analyzing the psychological causes of introversion can also help people better understand others and improve their communication and interpersonal skills. All in all, this kind of research can help us better understand human individual differences and improve individual development and mental health. This paper combs the concept and development of introversion psychology, analyzes the characteristics of introversion psychology, analyzes the formation factors of introversion psychology from internal and external causes, and summarizes the advantages of introversion psychology.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231098

    Review and Prospect of Disaster Education Research in China

    Disaster education is an important part of both social education and school education. However, research on disaster education in China only gained attention after the Wenchuan earthquake on May 12, 2008, and there have been only a few studies on disaster education in the past decade. This paper reviews the basic consensus reached by scholars on issues related to the basic theory and educational practice of disaster education, including the value of disaster education, the current state of disaster education in China, and the cooperation of multiple subjects in disaster education. In conclusion, there are still deficiencies in China’s disaster education, such as unclear basic theoretical issues, general research perspectives, scattered research content, and traditional research methods. Future research on disaster education urgently needs to draw on international experience and rely on Chinese cultural traditions to combine multidisciplinary theoretical research with comprehensive practical exploration to explore feasible implementation strategies for disaster education and strive to build a disaster education system and research system with Chinese characteristics to enhance the pertinence and effectiveness of disaster education.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231100

    Challenges in China’s Integration of Rural and Urban Education

    The Chinese government’s promotion of the integration of urban and rural education is an important measure to solve the problem of urban-rural education imbalance in China. However, there are still some imbalanced issues. Therefore, this article first describes and analyzes the existing imbalances in the construction of educational integration through literature analysis, and then proposes suggestions to address these issues. According to research, there are issues in combining urban and rural education include the loss of students, uneven distribution of educational resources and funds, and gaps in teaching staff. In response to these issues, rural areas need to achieve local urbanization. The government should adhere to the principle of “rural priority”, evenly allocate education resources and increase investment in education funds. Additionally, government should innovate and improve the rural teacher team. The imbalance in education between urban and rural areas in China can only be resolved in this way, which will also help China better promote the integration of urban and rural education.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231101

    The Origins of Slut-shaming Phenomenon in High School Campus

    The present study examines the pervasive issue of slut-shaming, a phenomenon characterized by the disparaging and evaluative treatment of adolescent females who are deemed to engage in sexual behavior or have multiple sexual partners, frequently predicated on hearsay and conjecture. The objective of this study is to examine the occurrence of slut-shaming in high school settings and to ascertain the potential social, cultural, and psychological determinants that may impact this conduct. The researcher undertook a qualitative investigation of the occurrences of slut-shaming among high school students and formulated approaches aimed at averting and addressing the issue. According to the research, slut-shaming is a widespread problem that impacts adolescents globally, leading to adverse outcomes such as diminished self-worth, psychological distress, and social exclusion among the victims. The ramifications of engaging in slut-shaming behavior can be severe. Despite the negative impact it has on individuals, this practice persists in high school settings, and there is limited comprehension regarding the underlying factors that contribute to its prevalence. The study concludes by employing a semi-structural interview technique to examine the fundamental elements of female-oriented stigma that arise from “slut-shaming.” The aim is to promote a secure and supportive atmosphere for all students, devoid of the detrimental consequences of slut-shaming.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231102

    Exploring the Causes and Countermeasures of Cyber Violence in the Internet Era

    In this current Internet era, the Internet is very popular and almost everyone is using it. However, some problems have arisen from this, and cyber violence is one of them. Today, cyber violence is happening more and more. Therefore, this article will study the causes of cyber violence and the countermeasures for cyber violence. This study provides an insightful and comprehensive study of cyber violence and broadens the research on cyber violence. Finally, it is found that the causes of cyber violence are: First of all, The virtuality and anonymity of the Internet. Secondly, some information media and netizens disseminate information irrationally. Thirdly, the relevant laws and regulations are not perfect. Fourthly, the supervision of Internet platforms is not in place. Fifthly, Internet users are getting younger. The countermeasures for cyber violence are: Firstly, improve the regulatory policies and laws for cyber violence. Secondly, the Internet platform should improve the regulatory strategy. Thirdly, improve the network public opinion supervision and platform reporting system. Fourthly, strengthen the early warning of public opinion and the guiding role of mainstream media. Fifthly, improve the rule of law and moral cultivation of Internet users.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231103

    The Evolution of China-US Relations and the Game of Great Powers

    With the development of globalization, more countries have begun to pay more attention to the international community. As two important countries that dominate global political and economic development, China and the United States have a great influence on the international community. Therefore, this study focuses on the current situation of Sino-U.S. relations and its outlook for the future. The study analyses the evolution of the relationship between China and the US and explores the economic and political factors, and ideologies that influence this evolution. As for the future strategies the two countries should take towards the international community, this article argues that the two sides could improve relations by resuming cooperation economically and strengthening consensus on global issues. In terms of international status, China could make up for the lack of discourse power by cultivating diplomatic talents, while the US could turn its attention to multilateral cooperation instead of sticking to America First.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231104

    Exploring the Effectiveness of International Organizations’ Interventions on Sexual Violence in the Democratic Republic of the Congo: The United Nations and MÉDecins Sans Frontieres as Examples

    Women’s bodies often bear the consequences of war and conflict. To safeguard women’s dignity and health, international governmental organizations, represented by the UN, and international organizations, represented by Médecins Sans Frontières (MSF), have tried to prevent sexual violence through reforms and development interventions in countries in conflict. However, since the end of the civil conflict in 2003, the Democratic Republic of the Congo (DRC) has continued to experience high levels of sexual violence. This paper uses case studies to provide a deeper and more comprehensive understanding of the causes of the high prevalence of sexual violence and the reasons for the failure of two organisations’ interventions in the country. It also provides recommendations for future interventions by international organisations in the country. In particular, more realistic measures for the protection of victims and cooperation between international actors, not only focusing on conventional international actors but also taking into account cooperation with local NGOs and the media. As well as focusing more on how to change the deep-rooted gender inequalities. The intention is to fill the gap in how to address sexual violence from the perspective of international organisations.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231106

    Marriage Defraud: A Systematic Review of the Tongqi Group in China

    This systematic review endeavors to investigate the contentious kinship practice of Tongqi in mainland China. The term refers to the situation where women enter into marital relationships with gay men. The review assesses the prevalence of the Tongqi group in Chinese society, and further explores the socio-legal determinants that contribute to their predicament, including their psychological and social implications. It also delves into the legal and cultural milieu in which marriage defraud occurs in China and can be implicated in future research and policy interventions.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231108

    Analyze of Tracking Students into Different Classes Based on Grades and Its Alternatives

    Since tracking students into different classes based on grades is a popular teaching method in high schools in the United States, this paper analyzes and critiques it in light of learning theories like behaviorism and cognitivism. It is discovered that tracking is still problematic according to various learning theories, even though this system of education is relatively common. This paper then examines the effectiveness of Competency-based education and peer assessment as potential alternatives to track. The implementability of these three models in Chinese institutions is also briefly discussed in this work. This study offers a deeper understanding of tracking as well as ideas on how to use the tracking technique and potential substitutes to enhance the effectiveness and results of students’ learning.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231109

    The Features of ABAC Construction and Its Application in Chinese Second Language Teaching

    This study aims to provide guidance on how to help students master ABAC construction better, in terms of syntactic features, semantic features, as well as pedagogical methods. Based on the literature review, we analyzed the internal structure of ABAC construction. We selected 38 examples of ABAC construction applicable to teaching Chinese as a second language combined with the textbook “Chinese Roadmap” used in junior high school classes in Hong Kong. These sentences were analyzed both syntactically and semantically to identify the commonalities of the ABAC construction’s syntactic and semantic features, and investigated the patterns to obtain a systematic understanding of its characteristics. By integrating the characteristics of ABAC construction, we proposed teaching suggestions for teaching Chinese as a second language, including syntactic features, semantic rules, and teaching methods, hoping to deepen the learners’ systematic comprehension of ABAC construction and to provide a valuable reference for teaching Chinese construction as a second language.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231115

    Influencing Factors of Youth’s Antisocial Behavior

    The causes behind the antisocial crimes young people encounter in life are discussed and analyzed in this review. Although the final manifestations of criminal behavior vary, most young people’s antisocial crimes are originated from their childhood experiences. This article discussed the causes of antisocial crimes from two perspectives: the anatomy of the root behavior through reflection because of the genetic and biological background and acquired environmental reasons (family factors: domestic violence, education methods, the relationship between parents) and individual psychological problems. Antisocial behaviors emerge during adolescence and young adulthood, which is different from personality. The aim of the article is to review the effect of negative healthy growth environment on youth’s antisocial behavior by outlining classical theoretical frameworks concerning the various pathways and processes that may place young people at higher risk of delinquency. The findings of influencing factors, with particular reference to family function and parenting, social environment and the mediating effect on individual psychological causes and why lead to the emergence of criminal behavior, understanding and prediction of antisocial criminal behavior through the prediction of innate and acquired environment.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231118

    Regulatory Disputes to the Crime of Online Insult and Defamation in China

    The digital network era has significantly improved society and the economy, and network security protection has become a significant concern. The criminal regulation of these emerging types of cybercrime should be promptly addressed, given their frequent occurrence. Online violence and rumors have always been the focus of attention in constructing network security. Network personal information crime is not an unfamiliar crime field, its essence is a new form of combining the network as a medium of transmission or using network technology to connect traditional crimes. The insult and defamation crimes in the network are among the significant instances of online personal information crimes, which refer to behaviours that infringe on individuals’ rights, such as privacy and honour, using violent words in cyberspace. Because of their intersectionality, online insults and defamation crimes are extremely easy to be ignored. In reality, judicial and administrative agencies have different criteria for and disposal of violence in online insults and defamation. Hence, identifying research on Internet insults and defamation has become an essential issue in the legal community and judicial activities. This article summarizes and discusses the confirmation of participating entities, whether the behavior of the actor’s dessemination constitutes a crime, and the illegal obstacles caused by cyber insults and slander behaviors, and summarizes the corresponding conclusions.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231119

    The Application Dilemmas in the Crime of Refusing to Perform the Obligations of Information Security Management

    Aiming at cybercrimes, China has stipulated the crime of refusing to perform the obligations of information security management in the Amendment (IX) to the Criminal Law. However, in judicial practice, the application of this crime is extremely rare, causing a waste of legislative resources. The reason can be attributed to the zombification of legal provisions. This paper focuses on the dilemma of applying this crime in judicial practice. There are two specific dilemmas. The one is the identity of the applicable subject of the crime and the accompanying management obligations are vague. The other is that the boundary Between this crime and the crime of aiding network information crime is unclear, which can be attributed to the similarities in constituent elements. There are three aspects that this paper considers confusing including the identity of knowing, their criminal patterns and the boundaries Between consequential and behavioral offenses. Based on these judicial application dilemmas, this paper urges that the court should consider the details of the cybercrime more carefully in the trial to better apply this crime. Meanwhile, it is unacceptable to directly apply the crime of aiding network information crime as a pocket crime without detailed analysis. The popularization of law should focus on the underlying logic, which means targeting netizens. Therefore, the ultimate goal of eradicating cybercrime can be achieved.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231120

    A Separate Conviction Study on Online Rumors and False Information Dissemination in China

    With the rapid development of the Internet in the 21st century, more and more people choose to conduct social and other related activities in the online world, so the spread of online rumors and false information has become more frequent and threatening. In view of these practical factors, this paper mainly uses the method of legal normative analysis to study the separate criminalization of online rumors and false information dissemination in China. How to better face the rampant Internet chaos and the proliferation of criminal behavior. At present, China’s criminal law norms have undergone two amendments and two judicial interpretations, but there are still many problems. The victims of personal and property rights that have not been properly protected are increasing with the development of the Internet, and it is all the more necessary to separately criminalize the spread of online rumors and false information. This article argues that it is necessary to add separate crimes to the criminal law to regulate it. This article focuses on the contradiction between China’s current technological development and the old regulations. This has led to difficulties such as the criminal law cannot correspond to all online rumor-mongering behaviors, and the interpretation of the regulatory scope of false information is not clear enough. Attempts were made to change the status quo by separate legislation and additional interpretations. At the same time, the question of defining the boundaries of the offence, focusing on separate convictions, illustrates the necessity of such a move. In order to improve the green environment of the Internet, improve the stability of the Criminal Law, and improve laws and regulations.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231122

    Changes in the Internationalization of Higher Education in the Post-Epidemic Era

    The COVID-19 epidemic has a wide and long-term impact on the world’s politics, economy, education, and other fields to a certain extent. Higher education has faced additional obstacles in the post-epidemic age due to the strong-government governance style, the fundamental economic structure transformation, and the escalating social conflicts. By using the theory of government involvement in the field of education and the theory of internationalization of higher education, this paper analyzes the current situation of higher education development in Guangdong Province, China, and seeks to promote the high-quality development of higher education in the post-epidemic era. The findings indicate that while higher education develops more quickly in the post-epidemic age, its transition is still facing many new constraints. Therefore, there is a need to focus more on re-engineering the educational process based on popularization and internationalization, as well as adjusting the structure and direction of the globalization of higher education.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231124

    Redefining Rights in the Age of AI: Philosophical Perspectives in Shaping the Future of International Human Rights Law

    AI systems continue to evolve and become increasingly sophisticated, thereby causing concerns regarding their potential for consciousness, emotion, and self-awareness to come to the forefront. This study examines the ethical and legal challenges posed by advanced AI systems and their implications for the international human rights legislative frameworks. Thus, this research not only explores how different philosophical perspectives have defined the terms person and personhood, but also evaluated the shortcomings of current legal definitions and examined the difficulties these concepts present for the recognition of AI rights. The study also highlights the weaknesses of existing international human rights law related to AI rights and the need for more inclusive legal frameworks. The importance of non-governmental organizations (NGOs) in advancing AI rights and bridging the gap between governments, individuals, and international bodies is emphasized. Furthermore, this paper offers recommendations for the development and implantation of legal frameworks that can address AI rights while remaining responsive to future advances in AI technology.

  • Open Access | Article 2023-10-26 Doi: 10.54254/2753-7048/16/20231127

    Long-Arm Jurisdiction in Cross-Border Data Flows: EU-US Gaming and Balancing

    In the era of digital economy, the power struggle and legal challenges arising from cross-border data flows have become increasingly prominent, making data governance a focal topic in the international community. Countries are competing and cooperating in formulating rules on cross-border data flows, as this phenomenon becomes more significant with the global popularity and rapid development of big data-based digital products like ChatGPT. As traditional powers in this field, the United States and the European Union have established long-arm jurisdiction systems with unique characteristics and have engaged in multiple rounds of fierce gamesmanship over dominance in global data flow governance standards, while constantly seeking power balance in bilateral cooperation. Through historical research, comparative analysis, and case studies, this paper analyzes and summarizes the governance principles, regulatory models, and competitive and compromising processes of transatlantic data flows, leading to the conclusion that China’s data governance strategy should balance data security and data freedom, while transforming its approach to regulating data outflows and emphasizing the importance of efficiency values in maintaining data sovereignty. By expanding international cooperation and promoting the signing of regional data flow agreements, China can enhance its voice in the global data governance system.

Copyright © 2023 EWA Publishing. Unless Otherwise Stated