Literatura académica sobre el tema "Great Firewall"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Great Firewall".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Great Firewall"
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Texto completoMulvenon, James C. y Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julio de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Texto completoZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Texto completoLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Texto completoHughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de marzo de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Texto completoScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Texto completoManaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completoTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz y Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Texto completoEnsafi, Roya, Philipp Winter, Abdullah Mueen y Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Texto completoAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (noviembre de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Texto completoTesis sobre el tema "Great Firewall"
Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China". Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.
Texto completoLovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.
Texto completoHsiao, Yu-Hsuan y 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.
Texto completo國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Libros sobre el tema "Great Firewall"
Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8a ed. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.
Buscar texto completoRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Buscar texto completoNelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.
Buscar texto completoRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.
Buscar texto completoRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Buscar texto completoGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Buscar texto completoGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Buscar texto completoGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Buscar texto completoGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Buscar texto completoGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Buscar texto completoCapítulos de libros sobre el tema "Great Firewall"
Clayton, Richard, Steven J. Murdoch y Robert N. M. Watson. "Ignoring the Great Firewall of China". En Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.
Texto completoTaylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP". En China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.
Texto completoGaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet". En The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.
Texto completoMao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010". En Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.
Texto completoKeats, Jonathon. "Great Firewall". En Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.
Texto completo"17. The Great Firewall". En Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.
Texto completoGainous, Jason, Rongbin Han, Andrew W. MacDonald y Kevin M. Wagner. "Jumping Over the Great Firewall". En Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.
Texto completo"Jumping the wall". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.
Texto completo"Uyghurs online". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.
Texto completo"NoGuGe". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.
Texto completoActas de conferencias sobre el tema "Great Firewall"
Pang, Sheng, Changjia Chen y Jinkang Jia. "Session Hijack in the Great Firewall of China". En 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.
Texto completoEnsafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver y Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers". En IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.
Texto completoComb, Matthew y Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks". En 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.
Texto completoWeinberg, Zachary, Diogo Barradas y Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China". En WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.
Texto completoChandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao y Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall". En 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.
Texto completoHillmer, Dirk. "VirTeam Tool". En ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.
Texto completoInformes sobre el tema "Great Firewall"
Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, junio de 2008. http://dx.doi.org/10.21236/ada488175.
Texto completo