Academic literature on the topic 'Great Firewall'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Great Firewall.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Great Firewall"
Jagani, Aishwarya. "India’s Great Firewall." Index on Censorship 52, no. 1 (April 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Full textMulvenon, James C., and Michael S. Chase. "Breaching the Great Firewall." Journal of E-Government 2, no. 4 (July 31, 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Full textZhang, Lena L. "Behind the ‘Great Firewall’." Convergence: The International Journal of Research into New Media Technologies 12, no. 3 (August 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Full textLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Full textHughes, Christopher R. "Google and the Great Firewall." Survival 52, no. 2 (March 25, 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Full textScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’." Groundings Undergraduate 6 (April 1, 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Full textManaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Full textTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Full textEnsafi, Roya, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Full textAnderson, Daniel. "Splinternet Behind the Great Firewall of China." Queue 10, no. 11 (November 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Full textDissertations / Theses on the topic "Great Firewall"
Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.
Full textLovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.
Full textHsiao, Yu-Hsuan, and 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.
Full text國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Books on the topic "Great Firewall"
Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8th ed. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.
Find full textRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Find full textNelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.
Find full textRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.
Find full textRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Find full textGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Find full textGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Find full textGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Find full textBook chapters on the topic "Great Firewall"
Clayton, Richard, Steven J. Murdoch, and Robert N. M. Watson. "Ignoring the Great Firewall of China." In Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.
Full textTaylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP." In China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.
Full textGaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet." In The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.
Full textMao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010." In Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.
Full textKeats, Jonathon. "Great Firewall." In Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.
Full text"17. The Great Firewall." In Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.
Full textGainous, Jason, Rongbin Han, Andrew W. MacDonald, and Kevin M. Wagner. "Jumping Over the Great Firewall." In Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.
Full text"Jumping the wall." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.
Full text"Uyghurs online." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.
Full text"NoGuGe." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.
Full textConference papers on the topic "Great Firewall"
Pang, Sheng, Changjia Chen, and Jinkang Jia. "Session Hijack in the Great Firewall of China." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.
Full textEnsafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers." In IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.
Full textComb, Matthew, and Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.
Full textWeinberg, Zachary, Diogo Barradas, and Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China." In WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.
Full textChandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao, and Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall." In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.
Full textHillmer, Dirk. "VirTeam Tool." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.
Full textReports on the topic "Great Firewall"
Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, June 2008. http://dx.doi.org/10.21236/ada488175.
Full text