微信能够在智能手机应用中取得成功,不能离开其技术架构的独特性,微信软件的敏捷性和准确的产品定位是其成功的关键因素。腾讯在开发初期就将微信定位为即时通讯软件。同时,它显示了与其他软件的区别。敏捷性是指微信团队在使用过程中出现问题或漏洞,违反相关规定,能够及时进行修改和升级的能力。因此,本文希望探讨微信技术实践的伦理困境。
WeChat can succeed in among smart phone applications, cannot leave the uniqueness of its technical architecture, WeChat software agility and accurate product positioning is the key factor for its success. Tencent positioned WeChat as an instant messaging software early in its development. At the same time, it shows the difference with other software. Agility refers to the ability of the WeChat team to modify and upgrade in a timely manner if there is a problem or vulnerability that violates the relevant regulations during the use. Therefore, this article would like to discuss the ethical dilemma of technological practice on WeChat.
在网络中共享和运行需要协议。操作系统和运营商之间的协议是相同的。如果你需要在微信中扩展新功能,你需要添加新的逻辑和协议。如果协议内容在其他移动软件中过大,将导致冲突(Lien&Cao,2014)。但在微信中,该协议满足正向兼容的条件,新增加的协议可以作为对以前协议的补充和扩展。在协议代码的生成过程中,不需要进行比较,只需进行描述,然后使用代码生成工具。添加新逻辑通常会导致数据量增加。程序的大小变化不大,新的数据将存储在原来的冗余空间中。这是因为原始数据存储空间的末尾有一个标志字段,用于标识剩余空间的大小。
Sharing and running in a network requires protocols. Protocols are the same across operating systems and carriers. If you need to extend new functionality in WeChat, you need to add new logic and protocols. If the content of the agreement is too large in other mobile software, it will cause conflicts (Lien & Cao, 2014). However, in WeChat, the protocol satisfies the condition of forward compatibility, and the newly added protocol can be regarded as supplementing and extending the previous protocol. During the generation of protocol code, there is no need for comparison, just use for description and then code generation tools. The addition of new logic often leads to an increase in data volume. The size of the program does not change much, and the new data will be stored in the original redundant space. This is because there is a flag field at the end of the original data storage space to identify the size of the remaining space.
在微信新发布的过程中,并非所有的逻辑变化都是一次性发布的。在每次更新中,只分发一部分内部测试用户,在确认没有问题后,将释放所有用户(Dong等人,al,2018)。灰度发布不会走极端,所以用户有更好的响应。将所有用户移动到系统B,并使用传统的ABTEST模式进行平滑过渡。在这个过程中,一些用户使用系统A,另一些用户使用系统B,通过实际应用测试,可以及时修改问题。
对于微信中更复杂的逻辑,它被固定在后台。在这一过程中,需要处理的问题主要包括存储组件的扩展和屏蔽灾难、监控报告、统计和监控框架,随时添加新的逻辑、逻辑服务器容器的逻辑、10分钟的内部S结构。服务器和客户端自动代码生成框架等。During the new release of WeChat, not all logical changes are released at once. In each update, only a part of the internal test users will be distributed, and after confirming that there is no problem, all users will be released (Dong et.,al, 2018) . The grayscale release will not go to extremes, so users have a better response. Move all users to system B and make a smooth transition using the traditional ABtest mode. In this process, some users use system A, others use system B. Through the actual application test, the problem can be modified in time.
For more complex logic in WeChat, it is immobilized in the background. In this process, the need to deal with the problems mainly include the storage components of expansion and shielding disaster, monitoring reports, statistics and monitoring framework, at any time to add a new logic, logic of LogicServer containers, ten minutes of the construction of the internal Server and Client framework of automatic code generation, etc.
In the technical architecture of WeChat, clearer module design is adopted. In the whole large system, various functions of storage and logical structure are designed separately. In this way, in the process of WeChat operation, once a problem occurs, it can be timely discovered (Dai et.,al, 2015). WeChat, logic with similar functions will be placed in a unified storage space, and logic with different functions will be placed in different storage Spaces. In this way, there will be no contradiction and conflict between different logic, and when modifying one logic, it will not affect the normal operation of other logic. Among numerous logic, if need to modify and expand a certain logic, just need to find the corresponding logical block, and carries on the part of the change, don't need to modify them one by one the whole logic, greatly improve the efficiency. Finally, all the logical functions are provided to the user through the same interface to realize user-oriented operations.
By setting WeChat's name and avatar to an official account, you can impersonate WeChat's assistant and defraud WeChat users' information. WeChat has positioning function. By three-point positioning method, the location of the target can be determined, so as to obtain the location information of WeChat users. Shake function in WeChat can match users who use this function together at the same time, and provide information of both parties, which is easy to be used by criminals. In WeChat's friend circle function, strangers can view 10 photos of users without corresponding Settings. In this way, some criminals can obtain certain information from photos, so as to conduct targeted fraud (Lisha, et.,al, 2017). Therefore, WeChat users should turn this function off to prevent inadvertent disclosure of their private information. In addition, if WeChat users do not set up friend authentication, some people will send some interesting content or links to users after adding them as friends and include Trojan horses, viruses and so on. Once the user enters the content, the Trojan virus will invade the user's mobile phone and steal the information. Added in the new WeChat WeChat payment functions, there are a lot of potential safety problems, the lack of a digital certificate, the function such as identity authentication, only through bank card password to protect the security of funds, very easy to crack outlaws, resulting in economic losses.
For the traffic generated by the application software, it is saved through the Android simulator, installed and logged in WeChat, and then sent messages. WeChat runs most of the traffic generated on TCP port 8080, reserved for HTTP connections. However, Wireshark cannot parse an HTTP load. WeChat's communication protocol is custom, and the initial load is to recognize the initial header, where there is no HTTP session. The subsequent body of the message is associated with the opcode in the form of encryption. In version 4.3.5 of WeChat, there are some loopholes that can intercept the message body for fast decryption of traffic and send and receive user mail attacks(Yang, Chulu, & Danqing, 2018). Developers use unlicensed debugging infrastructure to debug WeChat, but attackers can also use it to steal users' private information. In addition, there are also significant vulnerabilities for remote logging. With this capability, an attacker can develop a malicious program to leak the ContentProvider. The appropriate debugging is then set up to obtain WeChat log records and control the server.
In the real world, people's communication activities are restricted by laws, morals, customs and other social norms, and the virtual and indirect nature of WeChat provides a virtual communication space for people. In order to avoid all kinds of constraints, some people prefer to use WeChat for communication and seek for knowledge. In the world of WeChat, communication object is not so much a real person, but rather a artificial intelligence, a strong communicative subjects have a reality, exchanges between the object and their interactions with the virtual sex. In such an environment, people get rid of the restriction of social norms and the influence of material factors in their communication and become more freewheeling. When people immersed in the fantasy, the reality of interpersonal communication ability will decline, leading to not adapt to the realistic social interactions, or virtual in a way for the reality of interpersonal communication, obviously the two interactions cannot agree, prone to frustration for communicative subjects, exclusion of reality. Severe frustration may cause people to abandon their real relationships and experience feelings of emptiness, anxiety, loneliness and insecurity. When an individual cannot get self-recognition in the real communication, he will seek for himself in the virtual communication, and then form two selves, namely the ego in the virtual world and the ego in the real world. These two selves are mutually exclusive and contradictory, and the confrontation between reality and fiction can easily lead to the split of personality. In addition, if people sink too much in the virtual world, they will ignore the real world. Human nature is a living creature in reality, the personality un-unity between the two worlds, and the neglect of the real world. As the subject of practice, people will have doubts about their real existence.#p#分页标题#e#
In the beginning of the invention, a technology will first consider the practicability and validity of it, is a utility and service, technology was asked by precise calculation of utilitarian method to to the end, the emphasis on instrumental rationality. Relative to character, to think of the existence of the technology and the significance, and look at technology value rationality is often ignored, because the rational value goal and the direction of technology development limited is given. WeChat technology is the product of post-industrialization and information age, and the contradiction between instrumental rationality and value rationality of technology becomes more prominent. Information age emphasizes the central position of the person WeChat technology also adhere to the people-centered values, attaches great importance to the user when use in the technical development of comfort and convenience, the pursuit of the user experience, pursuing economic benefits brought by the instrumental rationality, ignore the value significance of technology, lack of thinking on the value of the technology. Humans are used to the domination of nature, maintain their own interests, depending on the nature of the object, the excessive development of nature, by conquering nature to obtain the joy of the victory, completely with abundant connotation of the moral value reason behind. Engels once said, "let us not be too intoxicated with our victory over nature, for every such victory nature has avenged us." Although WeChat technology has not triggered "natural revenge" at present, it contains the rupture of instrumental rationality and value rationality, which will eventually lead people to the abyss of self-struggle. "The underlying logic of this rationalization is the logic of strengthening domination and oppression. Man's dominion over nature becomes man's dominion over man, and eventually falls into the nightmare of self-domination. Of course, the contradiction between tool rationality and value rationality are not irreconcilable, reflections on WeChat technology ethics, introducing ethical standards WeChat technology is necessary, the development and use of WeChat technology also requires harmony between instrumental rationality and value rationality.
In this era of efficiency, economic factors have become the primary consideration in all technological development. Whether a technology can bring economic benefits is directly related to the survival of the technology. Driven by economic benefits, technical developers pursue the economic value of technology in the process of progress, but often ignore its ethical value. The economic value of technology provides a guarantee for the improvement and redevelopment of technology. In order to maintain such a cycle, technical developers blindly pursue technological progress and realize the economic value of technology. WeChat technology can bring great economic benefits. In line with this, WeChat technology development also requires more humanization, personalization and convenience, so ethical problems follow. As a result, the development of WeChat technology, no matter how influential, will lead to a crisis of "losing the sense of meaning in our lives". Accused those who believe that the progress of science and technology will naturally people overcome the global crisis is a kind of the confusion of "collective", "yourself to make the authority of the mystery of science, modern society give scientific a noble cloak, but don't know how many despicable idea is to cover." technology developers do not have the correct value guidance, often in the process of technology development can not stand the temptation of economic interests, coupled with the political, economic, social, cultural and other factors, make WeChat technology in the process of developing and using strayed from the true path, produced a series of ethical questions.
Strengthen the responsibility consciousness of the technical subject of WeChat. The influence of micro letter technology with time in the future in space and ductility, is no longer limited to the scene at this time, it must be in time and space to expand and complement, or care for offspring, concerned about the future, care for others, care for nature. The core and key to deal with the technical ethics problem of WeChat is people. To clarify and improve people's sense of responsibility is an effective means to prevent and manage the technical ethics problem of WeChat. As the subject, people have different identities, one is the developer of WeChat technology, the other is the user of WeChat technology. Responsibility consciousness emphasize to your behavior, in the development and use micro letter technology, must be responsible for yourself, developers in the process of the micro letter technology development must shoulder their social responsibility, and users should be aware of excessive use of adverse consequences. If responsibility is marginalised, WeChat technology could become reactionary, creating a destructive force that would throw human life into chaos. Therefore, it is necessary to strengthen the sense of responsibility of the subject of WeChat technology, so as to make its development and application healthier and bring benefits to mankind.
It is not surprising that the development of WeChat technology has brought people into a virtual field without center and strong standardization. Because no manager in the virtual world, there is no constraint behavior norms, not restrict people's behavior, some people will be the main time, interest, energy on the micro letter, micro letter again with the humanization, personalization and convenient design further encourage people lose self-discipline and overindulge. The restriction of social and moral norms on individuals conflicts with the unconstraint of virtual world, which may also lead to the bad consequences of the separation between virtual world and real world.
Reference list
1. Dai, W., Han, D., Dai, Y., & Xu, D. (2015). Emotion recognition and affective computing on vocal social media. Information & Management, 52(7), 777-788. doi:10.1016/j.im.2015.02.003
From the respective of the users of the Wechat, it can be found on the solution on the technological practice.
2. Dong, Y. d., Xue, Y. y., Luo, M. m., Mo, D. m., Dong, W. w., Zhang, Z. z., & Liang, H. h. (2018). Investigating the impact of mobile SNS addiction on individual’s self-rated health. Internet Research, 28(2), 278-292. doi:10.1108/IntR-05-2017-0198
The source of the technological practice of the Wechat
3. Lien, C. e., & Cao, Y. c. (2014). Examining WeChat users’ motivations, trust, attitudes, and positive word-of-mouth: Evidence from China. Computers In Human Behavior, 41104-111. doi:10.1016/j.chb.2014.08.013
Search the behavior of the users on the Wechat
4. Lisha, C. l., Goh, C. g., Yifan, S. h., & Rasli, A. m. (2017). Integrating guanxi into technology acceptance: An empirical investigation of WeChat. Telematics & Informatics, 34(7), 1125-1142. doi:10.1016/j.tele.2017.05.003
The source of the technological practice of the Wechat
5. Yang, C., Chulu, L., & Danqing, C. (2018). Understanding WeChat Users' Behavior of Sharing Social Crisis Information. International Journal Of Human-Computer Interaction, 34(4), 356-366. doi:10.1080/10447318.2018.1427826
Find out the potential gaps of the Wechat
Source Analysis Table
Name of Source C R A A P Overall Grade
1. Academic Journals 4 5 5 4 5 23
2. Academic Journals 5 4 4 5 5 23
3. Academic Journals 4 5 5 5 4 24
4. Academic Journals #p#分页标题#e#4 5 5 4 5 23
5. Academic Journals 5 4 4 5 5 23
|