Zeitschriftenartikel zum Thema „Great Firewall“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Great Firewall.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Great Firewall" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Jagani, Aishwarya. „India’s Great Firewall“. Index on Censorship 52, Nr. 1 (April 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mulvenon, James C., und Michael S. Chase. „Breaching the Great Firewall“. Journal of E-Government 2, Nr. 4 (31.07.2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhang, Lena L. „Behind the ‘Great Firewall’“. Convergence: The International Journal of Research into New Media Technologies 12, Nr. 3 (August 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Liu, Jingqing. „Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors“. Highlights in Science, Engineering and Technology 85 (13.03.2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.

Der volle Inhalt der Quelle
Annotation:
A firewall serves as a crucial computer program designed to block malicious software, thereby safeguarding the user's system. It helps prevent the unauthorized dissemination of personal information and the incursion of harmful viruses. Taking inspiration from China's "Great Firewall"—a sophisticated system utilizing advanced software and hardware to automatically filter, censor, and monitor internet content—this research aims to devise a router-based firewall system capable of autonomously shielding users' computers from viruses and unauthorized websites. A comprehensive questionnaire was deployed to unearth the predominant sources of information leakage among computer users and ascertain the role of firewalls within computer systems. The analytical findings underscore that the majority of information leakage security risks stem from a significant lack of personal privacy awareness and a deficient understanding of firewall security systems. The proposed firewall system harnesses router-based control to address the limitations inherent in PC software-based firmware systems. This innovation enhances the control of viral threats and the prevention of user privacy leaks. Serving as a tangible barrier, the router-based firewall obstructs the route of viruses or malevolent programs before reaching the user's computer. This strategic design substantially reduces user intervention, ensuring the continuous operation of the firewall to steadfastly protect the user's computing environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hughes, Christopher R. „Google and the Great Firewall“. Survival 52, Nr. 2 (25.03.2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Scarfe-James, Rose. „Chinese voices behind ‘The Great Firewall’“. Groundings Undergraduate 6 (01.04.2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.

Der volle Inhalt der Quelle
Annotation:
The advent of the digital revolution has brought about a change in the nature of political engagement in China. The Internet and digital technologies have broadened the horizons of China’s net citizens and despite rigorous censorship and intervention on the part of the Chinese Communist Party (CCP); voices are being heard from behind the ‘Great Firewall’. With more than 500 million Internet users, Chinese citizens are a huge online presence, consequences of which include an explosion in blogging culture, cyber vigilantism and user-generated media content. It is clear that the Internet has empowered Chinese citizens in both the online and offline spheres. These developments have prompted scholars to contemplate whether there is a form of civil society developing in China in the wake of the digital revolution. However a culturally attuned conception of civil society must be developed in order to discuss an emerging Chinese civil society with any meaningful outcomes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Manaseer, Saher, Ahmad K. Al Hwaitat und Riad Jabri. „Distributed Detection and prevention of Web Threats in Heterogeneous Environment“. Modern Applied Science 12, Nr. 10 (09.09.2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Der volle Inhalt der Quelle
Annotation:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz und Raul Poler. „Software defined networking firewall for industry 4.0 manufacturing systems“. Journal of Industrial Engineering and Management 11, Nr. 2 (06.04.2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Der volle Inhalt der Quelle
Annotation:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ensafi, Roya, Philipp Winter, Abdullah Mueen und Jedidiah R. Crandall. „Analyzing the Great Firewall of China Over Space and Time“. Proceedings on Privacy Enhancing Technologies 2015, Nr. 1 (01.04.2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.

Der volle Inhalt der Quelle
Annotation:
AbstractA nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Anderson, Daniel. „Splinternet Behind the Great Firewall of China“. Queue 10, Nr. 11 (November 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Gu, Grace. „The Great Firewall of China and Marketplace Disintermediation“. Academy of Management Proceedings 2019, Nr. 1 (01.08.2019): 14860. http://dx.doi.org/10.5465/ambpp.2019.14860abstract.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Mathieson, SA. „Researchers find way around Great Firewall of China“. Infosecurity Today 3, Nr. 4 (Juli 2006): 4. http://dx.doi.org/10.1016/s1742-6847(06)70421-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Huang, Gregory T. „Going online behind the Great Firewall of China“. New Scientist 196, Nr. 2629 (November 2007): 66–67. http://dx.doi.org/10.1016/s0262-4079(07)62859-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

AKDUMAN, Birol. „From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance“. International Journal of Social Sciences 7, Nr. 28 (13.05.2023): 442–69. http://dx.doi.org/10.52096/usbd.7.28.30.

Der volle Inhalt der Quelle
Annotation:
This article delves into the historical development of surveillance practices in China, tracing their roots from the construction of the Great Wall to the contemporary cyber surveillance system known as the Great Firewall. The study explores the strategic importance of the Great Wall as an early warning system and its significance in shaping China's modern national security strategies. Additionally, the article examines the evolution of surveillance techniques throughout China's dynastic history, the impact of Western influences, and the emergence of a modern surveillance state under the People's Republic of China. The analysis then shifts its focus to the development, implementation, and objectives of the Great Firewall, highlighting its role in both domestic control and international cyber warfare. Lastly, the article addresses the ethical debates surrounding surveillance and privacy in China, along with the future implications of emerging technologies and trends in the country's national security strategy. Through this historical lens, the article aims to provide a comprehensive understanding of China's long-standing relationship with surveillance and its crucial role in national security, while also shedding light on potential future developments and global implications. Keywords: Chinese national security, Cyber surveillance, Cyber surveillance, Great Wall of China, History of surveillance in China. Jel Codes: F50, H56, H56, P25, P37.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

AKDUMAN, Birol. „From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance“. International Journal of Social Sciences 7, Nr. 28 (09.05.2023): 293–319. http://dx.doi.org/10.52096/usbd.7.28.21.

Der volle Inhalt der Quelle
Annotation:
This article delves into the historical development of surveillance practices in China, tracing their roots from the construction of the Great Wall to the contemporary cyber surveillance system known as the Great Firewall. The study explores the strategic importance of the Great Wall as an early warning system and its significance in shaping China's modern national security strategies. Additionally, the article examines the evolution of surveillance techniques throughout China's dynastic history, the impact of Western influences, and the emergence of a modern surveillance state under the People's Republic of China. The analysis then shifts its focus to the development, implementation, and objectives of the Great Firewall, highlighting its role in both domestic control and international cyber warfare. Lastly, the article addresses the ethical debates surrounding surveillance and privacy in China, along with the future implications of emerging technologies and trends in the country's national security strategy. Through this historical lens, the article aims to provide a comprehensive understanding of China's long-standing relationship with surveillance and its crucial role in national security, while also shedding light on potential future developments and global implications. Keywords: Chinese national security, Cyber surveillance, Cyber surveillance, Great Wall of China, History of surveillance in China.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Li, Jinying. „Toward a Genealogy of the Wall-Screen“. differences 33, Nr. 1 (01.05.2022): 28–59. http://dx.doi.org/10.1215/10407391-9735441.

Der volle Inhalt der Quelle
Annotation:
This essay explores the genealogical overlap between the wall and the screen by tracing the material and discursive formation of China’s Great Firewall, a geoblocking system for network censorship, to the cultural history of ping (screen).The censoring effect of the Great Firewall is described in Chinese as pingbi, with the word ping referring to an architectural object that is simultaneously a system of visual display and a device of spatial management. Examining the structure and operation of ping in Chinese history, the essay argues that ping is a combinational media system of the wall-screen, a noninformation surface that displays itself to enable spatial enclosure. As a self-displaying system, the positioning of ping not only signifies sociopolitical demarcation but is also bound up with the spectacular display and performance of the imperial sovereign. This meaning of ping as wall-screen has shaped the construction of the Great Firewall as a technological and political project, shifting its conceptual framework from security to sovereignty.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Zulfikar, Faisal Mufti. „PEMBATASAN AKSES INTERNET SEBAGAI UPAYA CHINA MENJAGA KEAMANAN NASIONAL: THE GREAT FIREWALL OF CHINA“. BHUVANA: Journal of Global Studies 1, Nr. 1 (17.03.2023): 26–38. http://dx.doi.org/10.59408/bjgs.v1i1.54.

Der volle Inhalt der Quelle
Annotation:
The Internet is a key factor in driving globalization. The internet enables people around the world to have an easier access to expand knowledge and collaborate. As such, countries seek to learn how the Internet works. However, China, which has the largest number of internet users in the world, instead created a censorship system called the Great Firewall of China. China set up the system because it saw that the Internet was formed by the values of freedom promoted by the western countries. Therefore, national security became the main factor motivating China to build the system. By using the theory of neoliberalism and the concept of national security, this research aims to explain the Great Firewall of China to protect its national security. The research method used in this research is analytical descriptive, with literature studies in place. The results of the study show that the idea of cyber sovereignty promoted by China has not only led to the implementation of a censorship system at the domestic level, but has also had an impact on the multinational company Google in China. The Great Firewall of China forced Google to leave China.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Normile, Dennis. „Science suffers as China plugs holes in Great Firewall“. Science 357, Nr. 6354 (31.08.2017): 856. http://dx.doi.org/10.1126/science.357.6354.856.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Marks, Paul. „Will Google's help breach the great firewall of China?“ New Scientist 206, Nr. 2754 (März 2010): 17. http://dx.doi.org/10.1016/s0262-4079(10)60777-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Bensen, Tierney, Patrick Henze und Geoff Farnsworth. „The Great Chinese Firewall: A Safeguard or Stop Sign?“ Journal of Information Privacy and Security 2, Nr. 3 (Juli 2006): 42–61. http://dx.doi.org/10.1080/15536548.2006.10855797.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Hu, Lingyun, Shuai Wen und Hongjun Yuan. „Thinking and Research on the Construction of Web Application Firewall in Smart Campus Environment“. International Journal of Education and Humanities 14, Nr. 2 (30.05.2024): 66–69. http://dx.doi.org/10.54097/kzcr2296.

Der volle Inhalt der Quelle
Annotation:
With the rapid development of information technology, the Internet has penetrated into various fields, especially the field of education. As an important carrier of education informatization, smart campus provides strong support for improving education quality and management level. However, the network security problems of smart campus also come up, especially the security problems of Web applications. Web Application Firewall, as an important network security technology, plays a vital role in the construction of smart campus, and is of great significance for guaranteeing the information security of smart campus. This paper mainly discusses how to effectively build a Web Application Firewall in a smart campus environment, including the design, configuration, and management of the firewall, in order to safeguard the security of the smart campus network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Stone, R., und H. Xin. „Google Plots Exit Strategy As China Shores Up 'Great Firewall'“. Science 327, Nr. 5964 (21.01.2010): 402–3. http://dx.doi.org/10.1126/science.327.5964.402-a.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Wowor, Harvardry Gerald Abraham, Arfin Sudirman und Falhan Hakiki. „China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower“. JISPO Jurnal Ilmu Sosial dan Ilmu Politik 13, Nr. 2 (22.03.2024): 193–232. http://dx.doi.org/10.15575/jispo.v13i2.27713.

Der volle Inhalt der Quelle
Annotation:
The information, communication, and technology (ICT) sector has grown significantly in China. One of the advancements they have seen is in the area of cybersecurity. China's growing cybersecurity competence enabled it to create the Great Firewall of China (GFW), a set of control and censorship regulations for internet communications in China. This article investigates the significance of cybersecurity in the development of China's authoritarian authority, with a focus on the GFW as a strategic component. The concepts of cybersecurity and cyberpower served as the article's theoretical foundation. Through interviews and literature reviews, this article employs qualitative methodologies. This article demonstrates how China employs GFW to protect its citizens from cyber-attacks by focusing on political risks. China's cyber power is likewise increasing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Currier, Carrie Liu. „Roberts, Margaret E. Censored: Distraction and Diversion Inside China’s Great Firewall“. Journal of Chinese Political Science 24, Nr. 4 (07.11.2019): 713–14. http://dx.doi.org/10.1007/s11366-019-09634-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Rodzvilla, John. „Margaret E. Roberts: Censored: Distraction and Diversion Inside China’s Great Firewall“. Publishing Research Quarterly 35, Nr. 1 (17.01.2019): 185–86. http://dx.doi.org/10.1007/s12109-019-09635-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

SHAN, Wei. „Winning Public Opinion Online: China's Internet Content Control“. East Asian Policy 06, Nr. 03 (Juli 2014): 41–52. http://dx.doi.org/10.1142/s1793930514000257.

Der volle Inhalt der Quelle
Annotation:
The Chinese authorities have demonstrated great capability in putting online activities under strict surveillance. A comprehensive and complex system of internet monitoring and censorship has been established, consisting of the Great Firewall, online content control and targeted suppression, as well as an army of online commentators. Since Xi assumed leadership in late 2012, Beijing has shown considerable determination to win “public opinion” in the cyber world.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Sundquist, James. „Censored: Distraction and Diversion Inside China's Great Firewall by Margaret E. Roberts“. China Review International 23, Nr. 4 (2016): 405–7. http://dx.doi.org/10.1353/cri.2016.0161.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kim, Sung Wook, und Aziz Douai. „Google vs. China’s “Great Firewall”: Ethical implications for free speech and sovereignty“. Technology in Society 34, Nr. 2 (Mai 2012): 174–81. http://dx.doi.org/10.1016/j.techsoc.2012.02.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Haslam, Thomas. „Ubiquitous Learning behind the Great Firewall: Transforming the English Major at Shantou University“. Ubiquitous Learning: An International Journal 9, Nr. 1 (2016): 9–20. http://dx.doi.org/10.18848/1835-9795/cgp/v09i01/9-20.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Zheng, Yanfeng, und Qinyu (Ryan) Wang. „Shadow of the great firewall: The impact of Google blockade on innovation in China“. Strategic Management Journal 41, Nr. 12 (08.07.2020): 2234–60. http://dx.doi.org/10.1002/smj.3179.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Rahayu, Restu Karlina. „A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall“. Journal of Political Issues 1, Nr. 2 (25.01.2020): 92–102. http://dx.doi.org/10.33019/jpi.v1i2.8.

Der volle Inhalt der Quelle
Annotation:
Margaret E. Robert book builds on a foundation of the basic law of economy which is the relationship between supply and demand. She argues that censorship Chinese government censorship has violated free market law. In her book, she specified three mechanisms of censorship; fear, friction, and flooding (Roberts 2018). She explained in detail how Chinese’s people reactions toward the censorship in chapter four, five and six. In this paper, I challenged Roberts idea that fear is not part of the censorship mechanism. I have two arguments; first fear is emotion it needs stimuli to appear. Second fear and curiosity are motivation behind information seeking. Fear appeared from negative experience while curiosity appeared from positive outcomes. Fear is part of information behavior, it works like a brake system (Heinstrom 2010). Through fear, the disappointment and punishment will be evaluated by individuals to decide the next move. Fear is something dynamic, as time evolve it creates sensitivity, but it does not stop the basic need of information. American astronaut Thomas P. Stafford mentioned that evolution made us the ultimate learning machine, and the ultimate learning machine needs to be oiled by curiosity (Stafford 2012). At the end of my paper, I suggested Roberts to consider using word threat as one of censorship mechanism rather than fear.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Wang, Qi, Ling Li und Shuai Hu. „Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things“. Wireless Communications and Mobile Computing 2021 (15.12.2021): 1–10. http://dx.doi.org/10.1155/2021/2297733.

Der volle Inhalt der Quelle
Annotation:
The development of the Internet of things provides a great opportunity for the development of all walks of life, but it also brings many risks in the process, of which the most important thing is the protection of computer network information security. Digital art museums play a great role in viewing, education, and other functions. This article is aimed at analyzing the computer network information security protection problems faced by digital art museums. Analyze the application of the digital art gallery in the computer Internet of things, and combine the different aspects involved in the two parts to carry out experimental analysis and comparison. The difference between the various subjects of the digital art gallery, such as exhibits, writers, and visitors, is to maintain the security of Internet computer information. Introduce the application. The results show that compared with that of fog computing technology and that of edge computing technology, the performance of the Internet of things is generally better, with faster data processing speed, shorter processing time, higher quality, and stronger scalability. But at the same time, it is also facing greater computer network security threats. According to statistics, 83.3% of consumers worry about its usability but people are more concerned about its safety performance. Nearly 87.5% of consumers worry about whether their information will be leaked. When cloud computing technology is applied to digital art museums, how to protect computer network information security is particularly important. Based on the traditional firewall, this paper designs a hybrid firewall, which can better solve the problem of computer network information security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Wang, Yu Lin, und Jin Heng Wang. „Research on Security Technology of Campus Network“. Advanced Materials Research 971-973 (Juni 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.

Der volle Inhalt der Quelle
Annotation:
Campus networks are education, research and service with network of operation properties, due to network with connection of diversity,uneven distribution terminal, openness, interconnection, borderless, Freedom and so on, Causes the network vulnerable to attacks by hackers and viruses, and caused a great damage to society, schools. In this paper, Base on network security system dynamic APPDRR model for the theoretical guidance,combined with the characteristics of network system, a brief analysis of campus network security risk. And And the current mainstream network security technology were reviewed such as adaptive proxy technology, firewall, stateful inspection technology, agent technology, intrusion detection, security scanning technology. In this paper based on the analysis of campus network security technology research, with strong pertinence and feasibility. Researching on campus network security technologies are of great practical significance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Dev, Kankan. „A Great Approach for Medium Size Hospital Network Infrastructure Architecture“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. 9 (30.09.2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.

Der volle Inhalt der Quelle
Annotation:
Abstract: To get first-hand experience for setting up a network infrastructure in a medium size hospital to manage the patient’s services, check-ups, follow-up plans from different parts of the hospital primes and store the data into the secured and safe manner in the database and use the data whenever required from the management team for their references. The network architecture based on the concept of the Three- layer network architecture combination of Mesh topology & Bus topology taking into the consideration of the primary data security, remote access to the network, size of the hospital organization, cost-effective, user-friendly and most importantly scalability required in the network architecture for future changes based on the size of the database, utilization of applications remotely, and for security of the data, changing technology etc. The goal of any network architecture is to protect the DATA from any attacks both internally and externally. For internal DATA security it is protected through various user permissions in different layers in the network for the end users. For Outside threat VPN tunnel, Policies, traffic filtering configured at the firewall level. Keywords: HIS-Hospital Information System, VPN- virtual private network tunnel, VLAN- Virtual LAN, HL7- Health Level Seven International, L3- Layer 3, ISP- Internet service provider
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Tai, Zixue. „Casting the Ubiquitous Net of Information Control“. International Journal of Advanced Pervasive and Ubiquitous Computing 2, Nr. 1 (Januar 2010): 53–70. http://dx.doi.org/10.4018/japuc.2010010104.

Der volle Inhalt der Quelle
Annotation:
Alongside the rise of the Internet as a pivotal economic and cultural force in Chinese society, the Chinese government has implemented a two-tiered strategy in dealing with the great potential and underlying risks associated with the network era. This paper offers a critical, in-depth overview of China’s state-orchestrated Internet surveillance apparatus from the Great Firewall to the latest Green Dam project. The author examines the conceptual and historical evolution of the Golden Shield program and analyzes the legal framework through which official regulation is justified or rationalized. Next, the author examines the prevalent practice of industry self-regulation among both Chinese and foreign companies engaged in online business in China. The paper ends with a discussion of the aborted official effort of extending content control to individual computers with the Green Dam Youth Escort project.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Liu, Hai Yan. „Designed Data Mining System Based on the Distribute Intrusion Detection Designed“. Advanced Materials Research 1056 (Oktober 2014): 202–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1056.202.

Der volle Inhalt der Quelle
Annotation:
With the development of computer and communication technology, the network has become an important part of the global information infrastructure, but the security problem "is constantly exposed to the vast majority of only using firewall this passive defense means within the network, there are still" great security risk which needs some positive active! The defense strategy, the most important one of which is intrusion detection system through the analysis of network or system in a number of key points to collect information and its, find the breach of security strategy behavior and the signs of being attacked, is a combination of software and hardware of intrusion detection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Yang, Qinghua, und Yu Liu. „What’s on the other side of the great firewall? Chinese Web users’ motivations for bypassing the Internet censorship“. Computers in Human Behavior 37 (August 2014): 249–57. http://dx.doi.org/10.1016/j.chb.2014.04.054.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Lee, Wing Ki. „Network Unavailable“. A Peer-Reviewed Journal About 9, Nr. 1 (04.08.2020): 130–41. http://dx.doi.org/10.7146/aprja.v9i1.121495.

Der volle Inhalt der Quelle
Annotation:
This paper problematizes assumptions of global all-pervading ‘available’ network culture by examining ‘network unavailability’ phenomenon in contemporary Chinese network culture through a post-colonial critique. The central argument of ‘network unavailable’ in China is contextualized by the performativity of the Great Firewall and the Golden Shield Project, Chinese media artist Fei Jun’s net art project Interesting World (2019) in the Venice Biennale and network happenings during the 2019 Anti-extradition Law Amendment Bill protests in Hong Kong. Through these examples the author argues that network culture in China is political and geopolitical and the discussion of networks should go beyond mere structuralism and emphasize the everyday life, tactical, and microscopic decision-making process.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Gunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik und Nanang Ismail. „Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks“. Indonesian Journal of Electrical Engineering and Computer Science 12, Nr. 2 (01.11.2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.

Der volle Inhalt der Quelle
Annotation:
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Taneja, Harsh, und Angela Xiao Wu. „Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior“. Information Society 30, Nr. 5 (02.10.2014): 297–309. http://dx.doi.org/10.1080/01972243.2014.944728.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Romanovsky, Vladislav, und Rifat Kildeev. „Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad“. SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.

Der volle Inhalt der Quelle
Annotation:
The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started to be actively used by terrorist organizations for recruiting supporters, raising funds, and preparing terrorist attacks. The article analyzes the German (Act on Improving Law Enforcement in Social Networks) and Chinese (Chinese Great Firewall) experience of introducing restrictions and prohibitions in the framework of regulating the activities of companies moderating information through applications and social networks. It is shown that implementing the requirements of the legal regime has not only a legal, but also technological aspect. The peculiarities of the Internet functioning contribute to free implementation of information, including illegal information. This circumstance significantly complicates the tasks of law enforcement agencies in countering terrorist threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

PATOKINA, E. L. „MARKETING STRATEGIES AND TOOLS FOR ENTERING THE CHINESE MARKET“. EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, Nr. 7 (2021): 184–88. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.023.

Der volle Inhalt der Quelle
Annotation:
The article reveals the features of the application of marketing strategies in the market of the People's Republic of China. The Chinese market is significantly different from the European, American and Russian ones, moreover, this consumer segment is least disclosed in the works of Russian authors. Despite the fact that the great Chinese firewall system imposes some restrictions on the dissemination of foreign information within China and thus restricts access to this market, there are ways and methods available to Russian businesses. Some of them are described in this article and represent a full-fledged system consisting of both trading platforms and marketing tools. The scope of application of the research results is the foreign trade of Russian small and medium-sized businesses in the Asia-Pacific region.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Yao, Jian. „Model Design of Big Data Information Security Management Based on the Internet of Things“. Security and Communication Networks 2022 (10.10.2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.

Der volle Inhalt der Quelle
Annotation:
At present, the level of modernization and informatization is constantly improving, especially in rapidly developing China. A large amount of information is collected every second, forming a huge database and making people live in the “big data era.” Following cloud computing and the Internet of things, big data technology has become another revolutionary change in the global society, changing global development and becoming a new development point for technological innovation, industrial policy, and national information security. Big data in the new age poses new challenges and perspectives for the nation’s infosec development. Big data is a renewed tool for state security. Nations use big data to create state infosec, offering great facilitation, potential for adoption, and business value. This is a “new blue ocean” for competition among countries. Although big data brings convenience to public life, it also poses a serious threat to national information security. After the research and experiment of the model design of big data information security management of the Internet of things, the experimental data have shown that 86.67% set passwords in communication devices and storage devices. 66.67% installed firewalls, and 76.67% ran antivirus software. Compared with before, the total ratio of setting a password increased by 53.34% and the total ratio of installing a firewall and running antivirus software both increased by 26.67%. It can be seen from the above data that the protection of big data information under the Internet of things has been significantly improved. From the above data, through the big data information security management of the Internet of things, a new development direction is proposed for the development of information security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Dong, Li Na. „Design of Computer Information Network Security System“. Applied Mechanics and Materials 539 (Juli 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Der volle Inhalt der Quelle
Annotation:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Han, Rongbin. „Censored: Distraction and Diversion Inside China’s Great Firewall. By Margaret E. Roberts. Princeton: Princeton University Press, 2018. 288p. $29.95 cloth.“ Perspectives on Politics 16, Nr. 4 (23.11.2018): 1134–35. http://dx.doi.org/10.1017/s1537592718002608.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Tucker, Joshua A. „Censored: Distraction and diversion inside China's great firewall. Roberts, Margaret E.Princeton University Press, Princeton, New Jersey, 2018. 288 pp. $29.95 (cloth)“. Governance 32, Nr. 3 (19.06.2019): 586–87. http://dx.doi.org/10.1111/gove.12420.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Resnick, Marc. „Internet-Based Error Reporting Systems: Usability is Power“. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, Nr. 13 (Oktober 2007): 822–26. http://dx.doi.org/10.1177/154193120705101301.

Der volle Inhalt der Quelle
Annotation:
Error reporting systems have been around for many decades, in domains such as aerospace, with great success. In contrast, domains such as health care have resisted broad-based systems, due in part to cultural issues and fear of litigation. A recurring issue in the development of all of these systems is usability. Usability affects the development, growth, usage, and sustainability of error-reporting systems in many ways. As these systems migrate to the Internet and become more broadly accessible, usability will become a dominant factor in system success. Whether the system is publicly accessible, Intranet-based behind a company firewall, or semi-private and managed through a government agency or non-governmental organization, some usability issues will apply to all systems and others will shift in importance. This paper applies an existing knowledge management model to the analysis of error reporting systems, highlighting the significant impact and necessity of usability on the success of error-reporting systems, using examples from a variety of domains.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Hartley, John, Lucy Montgomery und Henry Siling Li. „A new model for understanding global media and China: ‘Knowledge clubs’ and ‘knowledge commons’“. Global Media and China 2, Nr. 1 (März 2017): 8–27. http://dx.doi.org/10.1177/2059436417705919.

Der volle Inhalt der Quelle
Annotation:
The topic of this article and title of this journal are the same: ‘global media and China’. Although ‘global’ suggests a single universal unit, adding ‘China’ necessarily creates a difference, especially in the context of the ‘Great Firewall’, which creates a well-defined boundary between global media and China. Should our title read ‘Global Media versus China’, suggesting that the apparent universality of ‘global’ phenomena may be an illusion in a world marked by difference? We argue the contrary: that difference, produced along borderlines between different cultures – defined as those sociocultural groups whose boundaries require translation to cross, rather than simple transmission – is the productive energy that generates new knowledge (and thence, innovation) among large populations. We show that the peculiarity of current relations between global media and China is not evidence of exceptional ‘Chinese characteristics’, but of how culture deals with the globalisation of communication, and consciousness of that process among whole populations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Li, Gongfa, Jianyi Kong, Guozhang Jiang, Liangxi Xie, Han Xiao, Zehao Wu und Siqiang Xu. „Remote Monitoring and Diagnosis System of Rolling Mill Based on CORBA and SOAP/Web Service Technology“. Noise & Vibration Worldwide 42, Nr. 10 (November 2011): 23–27. http://dx.doi.org/10.1260/0957-4565.42.10.23.

Der volle Inhalt der Quelle
Annotation:
A detailed solution to the remote monitoring and diagnosis system for a rolling mill is introduced. The hardware and software structure of remote monitoring and diagnosis system is presented. The structure of the system is made up of four subsystems, namely online monitoring subsystem, data servo subsystem, database service subsystem and www server subsystem. Software module of system includes seven parts, namely online monitoring module, data query module, fault information query module, trend analysis module, diagnosis analysis module, engineer station module and eigenvalue query module. The system adopts B/S model and integrates CORBA technology with SOAP/Web Service technology. It makes dynamic display and traversing for a great deal of on-line data and Firewall traversal possible. It has run a long time that proves that the system interface is friendly and easy to use. It has better security, good portability, expandability and stability. It can judge the running-condition of a rolling mill in real time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Douglas, Frederick, Weiyang Pan und Matthew Caesar. „Salmon: Robust Proxy Distribution for Censorship Circumvention“. Proceedings on Privacy Enhancing Technologies 2016, Nr. 4 (01.10.2016): 4–20. http://dx.doi.org/10.1515/popets-2016-0026.

Der volle Inhalt der Quelle
Annotation:
Abstract Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on low-performance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system designed to resist a censor with the resources of the “Great Firewall” of China. Salmon relies on a network of volunteers in uncensored countries to run proxy servers. Although any member of the public can become a user, Salmon protects the bulk of its servers from being discovered and blocked by the censor via an algorithm for quickly identifying malicious users. The algorithm entails identifying some users as especially trustworthy or suspicious, based on their actions. We impede Sybil attacks by requiring either an unobtrusive check of a social network account, or a referral from a trustworthy user.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie