Auswahl der wissenschaftlichen Literatur zum Thema „Great Firewall“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Great Firewall" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Great Firewall"
Jagani, Aishwarya. „India’s Great Firewall“. Index on Censorship 52, Nr. 1 (April 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Der volle Inhalt der QuelleMulvenon, James C., und Michael S. Chase. „Breaching the Great Firewall“. Journal of E-Government 2, Nr. 4 (31.07.2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Der volle Inhalt der QuelleZhang, Lena L. „Behind the ‘Great Firewall’“. Convergence: The International Journal of Research into New Media Technologies 12, Nr. 3 (August 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Der volle Inhalt der QuelleLiu, Jingqing. „Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors“. Highlights in Science, Engineering and Technology 85 (13.03.2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Der volle Inhalt der QuelleHughes, Christopher R. „Google and the Great Firewall“. Survival 52, Nr. 2 (25.03.2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Der volle Inhalt der QuelleScarfe-James, Rose. „Chinese voices behind ‘The Great Firewall’“. Groundings Undergraduate 6 (01.04.2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Der volle Inhalt der QuelleManaseer, Saher, Ahmad K. Al Hwaitat und Riad Jabri. „Distributed Detection and prevention of Web Threats in Heterogeneous Environment“. Modern Applied Science 12, Nr. 10 (09.09.2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Der volle Inhalt der QuelleTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz und Raul Poler. „Software defined networking firewall for industry 4.0 manufacturing systems“. Journal of Industrial Engineering and Management 11, Nr. 2 (06.04.2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Der volle Inhalt der QuelleEnsafi, Roya, Philipp Winter, Abdullah Mueen und Jedidiah R. Crandall. „Analyzing the Great Firewall of China Over Space and Time“. Proceedings on Privacy Enhancing Technologies 2015, Nr. 1 (01.04.2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Der volle Inhalt der QuelleAnderson, Daniel. „Splinternet Behind the Great Firewall of China“. Queue 10, Nr. 11 (November 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Der volle Inhalt der QuelleDissertationen zum Thema "Great Firewall"
Seiwald, Michael. „A detailed analysis of the follow-up scanning performed by the Great Firewall of China“. Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.
Der volle Inhalt der QuelleLovito, Monica. „Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo“. Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.
Der volle Inhalt der QuelleHsiao, Yu-Hsuan, und 蕭宇軒. „In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.
Der volle Inhalt der Quelle國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Bücher zum Thema "Great Firewall"
Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8. Aufl. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.
Den vollen Inhalt der Quelle findenRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Den vollen Inhalt der Quelle findenNelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.
Den vollen Inhalt der Quelle findenRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.
Den vollen Inhalt der Quelle findenRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Den vollen Inhalt der Quelle findenGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Den vollen Inhalt der Quelle findenGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Den vollen Inhalt der Quelle findenGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Den vollen Inhalt der Quelle findenGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Den vollen Inhalt der Quelle findenGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Great Firewall"
Clayton, Richard, Steven J. Murdoch und Robert N. M. Watson. „Ignoring the Great Firewall of China“. In Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.
Der volle Inhalt der QuelleTaylor, Monique. „Building Digital Authoritarianism: From the Great Firewall to the New IP“. In China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.
Der volle Inhalt der QuelleGaufman, Elizaveta. „Cybercrime and Punishment: Security, Information War, and the Future of Runet“. In The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.
Der volle Inhalt der QuelleMao, Weizhun. „Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010“. In Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.
Der volle Inhalt der QuelleKeats, Jonathon. „Great Firewall“. In Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.
Der volle Inhalt der Quelle„17. The Great Firewall“. In Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.
Der volle Inhalt der QuelleGainous, Jason, Rongbin Han, Andrew W. MacDonald und Kevin M. Wagner. „Jumping Over the Great Firewall“. In Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.
Der volle Inhalt der Quelle„Jumping the wall“. In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.
Der volle Inhalt der Quelle„Uyghurs online“. In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.
Der volle Inhalt der Quelle„NoGuGe“. In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Great Firewall"
Pang, Sheng, Changjia Chen und Jinkang Jia. „Session Hijack in the Great Firewall of China“. In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.
Der volle Inhalt der QuelleEnsafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver und Vern Paxson. „Examining How the Great Firewall Discovers Hidden Circumvention Servers“. In IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.
Der volle Inhalt der QuelleComb, Matthew, und Paul A. Watters. „Peeking behind the great firewall: Privacy on Chinese file sharing networks“. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.
Der volle Inhalt der QuelleWeinberg, Zachary, Diogo Barradas und Nicolas Christin. „Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China“. In WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.
Der volle Inhalt der QuelleChandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao und Zhang Zhipeng. „The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall“. In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.
Der volle Inhalt der QuelleHillmer, Dirk. „VirTeam Tool“. In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Great Firewall"
Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, Juni 2008. http://dx.doi.org/10.21236/ada488175.
Der volle Inhalt der Quelle