Artículos de revistas sobre el tema "Great Firewall"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Great Firewall.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Great Firewall".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mulvenon, James C. y Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julio de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Liu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.

Texto completo
Resumen
A firewall serves as a crucial computer program designed to block malicious software, thereby safeguarding the user's system. It helps prevent the unauthorized dissemination of personal information and the incursion of harmful viruses. Taking inspiration from China's "Great Firewall"—a sophisticated system utilizing advanced software and hardware to automatically filter, censor, and monitor internet content—this research aims to devise a router-based firewall system capable of autonomously shielding users' computers from viruses and unauthorized websites. A comprehensive questionnaire was deployed to unearth the predominant sources of information leakage among computer users and ascertain the role of firewalls within computer systems. The analytical findings underscore that the majority of information leakage security risks stem from a significant lack of personal privacy awareness and a deficient understanding of firewall security systems. The proposed firewall system harnesses router-based control to address the limitations inherent in PC software-based firmware systems. This innovation enhances the control of viral threats and the prevention of user privacy leaks. Serving as a tangible barrier, the router-based firewall obstructs the route of viruses or malevolent programs before reaching the user's computer. This strategic design substantially reduces user intervention, ensuring the continuous operation of the firewall to steadfastly protect the user's computing environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Hughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de marzo de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Scarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.

Texto completo
Resumen
The advent of the digital revolution has brought about a change in the nature of political engagement in China. The Internet and digital technologies have broadened the horizons of China’s net citizens and despite rigorous censorship and intervention on the part of the Chinese Communist Party (CCP); voices are being heard from behind the ‘Great Firewall’. With more than 500 million Internet users, Chinese citizens are a huge online presence, consequences of which include an explosion in blogging culture, cyber vigilantism and user-generated media content. It is clear that the Internet has empowered Chinese citizens in both the online and offline spheres. These developments have prompted scholars to contemplate whether there is a form of civil society developing in China in the wake of the digital revolution. However a culturally attuned conception of civil society must be developed in order to discuss an emerging Chinese civil society with any meaningful outcomes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Manaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Texto completo
Resumen
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz y Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Texto completo
Resumen
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ensafi, Roya, Philipp Winter, Abdullah Mueen y Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.

Texto completo
Resumen
AbstractA nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Anderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (noviembre de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Gu, Grace. "The Great Firewall of China and Marketplace Disintermediation". Academy of Management Proceedings 2019, n.º 1 (1 de agosto de 2019): 14860. http://dx.doi.org/10.5465/ambpp.2019.14860abstract.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Mathieson, SA. "Researchers find way around Great Firewall of China". Infosecurity Today 3, n.º 4 (julio de 2006): 4. http://dx.doi.org/10.1016/s1742-6847(06)70421-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Huang, Gregory T. "Going online behind the Great Firewall of China". New Scientist 196, n.º 2629 (noviembre de 2007): 66–67. http://dx.doi.org/10.1016/s0262-4079(07)62859-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

AKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (13 de mayo de 2023): 442–69. http://dx.doi.org/10.52096/usbd.7.28.30.

Texto completo
Resumen
This article delves into the historical development of surveillance practices in China, tracing their roots from the construction of the Great Wall to the contemporary cyber surveillance system known as the Great Firewall. The study explores the strategic importance of the Great Wall as an early warning system and its significance in shaping China's modern national security strategies. Additionally, the article examines the evolution of surveillance techniques throughout China's dynastic history, the impact of Western influences, and the emergence of a modern surveillance state under the People's Republic of China. The analysis then shifts its focus to the development, implementation, and objectives of the Great Firewall, highlighting its role in both domestic control and international cyber warfare. Lastly, the article addresses the ethical debates surrounding surveillance and privacy in China, along with the future implications of emerging technologies and trends in the country's national security strategy. Through this historical lens, the article aims to provide a comprehensive understanding of China's long-standing relationship with surveillance and its crucial role in national security, while also shedding light on potential future developments and global implications. Keywords: Chinese national security, Cyber surveillance, Cyber surveillance, Great Wall of China, History of surveillance in China. Jel Codes: F50, H56, H56, P25, P37.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

AKDUMAN, Birol. "From the Great Wall to the Great Firewall: A Historical Analysis of Surveillance". International Journal of Social Sciences 7, n.º 28 (9 de mayo de 2023): 293–319. http://dx.doi.org/10.52096/usbd.7.28.21.

Texto completo
Resumen
This article delves into the historical development of surveillance practices in China, tracing their roots from the construction of the Great Wall to the contemporary cyber surveillance system known as the Great Firewall. The study explores the strategic importance of the Great Wall as an early warning system and its significance in shaping China's modern national security strategies. Additionally, the article examines the evolution of surveillance techniques throughout China's dynastic history, the impact of Western influences, and the emergence of a modern surveillance state under the People's Republic of China. The analysis then shifts its focus to the development, implementation, and objectives of the Great Firewall, highlighting its role in both domestic control and international cyber warfare. Lastly, the article addresses the ethical debates surrounding surveillance and privacy in China, along with the future implications of emerging technologies and trends in the country's national security strategy. Through this historical lens, the article aims to provide a comprehensive understanding of China's long-standing relationship with surveillance and its crucial role in national security, while also shedding light on potential future developments and global implications. Keywords: Chinese national security, Cyber surveillance, Cyber surveillance, Great Wall of China, History of surveillance in China.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Li, Jinying. "Toward a Genealogy of the Wall-Screen". differences 33, n.º 1 (1 de mayo de 2022): 28–59. http://dx.doi.org/10.1215/10407391-9735441.

Texto completo
Resumen
This essay explores the genealogical overlap between the wall and the screen by tracing the material and discursive formation of China’s Great Firewall, a geoblocking system for network censorship, to the cultural history of ping (screen).The censoring effect of the Great Firewall is described in Chinese as pingbi, with the word ping referring to an architectural object that is simultaneously a system of visual display and a device of spatial management. Examining the structure and operation of ping in Chinese history, the essay argues that ping is a combinational media system of the wall-screen, a noninformation surface that displays itself to enable spatial enclosure. As a self-displaying system, the positioning of ping not only signifies sociopolitical demarcation but is also bound up with the spectacular display and performance of the imperial sovereign. This meaning of ping as wall-screen has shaped the construction of the Great Firewall as a technological and political project, shifting its conceptual framework from security to sovereignty.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Zulfikar, Faisal Mufti. "PEMBATASAN AKSES INTERNET SEBAGAI UPAYA CHINA MENJAGA KEAMANAN NASIONAL: THE GREAT FIREWALL OF CHINA". BHUVANA: Journal of Global Studies 1, n.º 1 (17 de marzo de 2023): 26–38. http://dx.doi.org/10.59408/bjgs.v1i1.54.

Texto completo
Resumen
The Internet is a key factor in driving globalization. The internet enables people around the world to have an easier access to expand knowledge and collaborate. As such, countries seek to learn how the Internet works. However, China, which has the largest number of internet users in the world, instead created a censorship system called the Great Firewall of China. China set up the system because it saw that the Internet was formed by the values of freedom promoted by the western countries. Therefore, national security became the main factor motivating China to build the system. By using the theory of neoliberalism and the concept of national security, this research aims to explain the Great Firewall of China to protect its national security. The research method used in this research is analytical descriptive, with literature studies in place. The results of the study show that the idea of cyber sovereignty promoted by China has not only led to the implementation of a censorship system at the domestic level, but has also had an impact on the multinational company Google in China. The Great Firewall of China forced Google to leave China.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Normile, Dennis. "Science suffers as China plugs holes in Great Firewall". Science 357, n.º 6354 (31 de agosto de 2017): 856. http://dx.doi.org/10.1126/science.357.6354.856.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Marks, Paul. "Will Google's help breach the great firewall of China?" New Scientist 206, n.º 2754 (marzo de 2010): 17. http://dx.doi.org/10.1016/s0262-4079(10)60777-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Bensen, Tierney, Patrick Henze y Geoff Farnsworth. "The Great Chinese Firewall: A Safeguard or Stop Sign?" Journal of Information Privacy and Security 2, n.º 3 (julio de 2006): 42–61. http://dx.doi.org/10.1080/15536548.2006.10855797.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Hu, Lingyun, Shuai Wen y Hongjun Yuan. "Thinking and Research on the Construction of Web Application Firewall in Smart Campus Environment". International Journal of Education and Humanities 14, n.º 2 (30 de mayo de 2024): 66–69. http://dx.doi.org/10.54097/kzcr2296.

Texto completo
Resumen
With the rapid development of information technology, the Internet has penetrated into various fields, especially the field of education. As an important carrier of education informatization, smart campus provides strong support for improving education quality and management level. However, the network security problems of smart campus also come up, especially the security problems of Web applications. Web Application Firewall, as an important network security technology, plays a vital role in the construction of smart campus, and is of great significance for guaranteeing the information security of smart campus. This paper mainly discusses how to effectively build a Web Application Firewall in a smart campus environment, including the design, configuration, and management of the firewall, in order to safeguard the security of the smart campus network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Stone, R. y H. Xin. "Google Plots Exit Strategy As China Shores Up 'Great Firewall'". Science 327, n.º 5964 (21 de enero de 2010): 402–3. http://dx.doi.org/10.1126/science.327.5964.402-a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Wowor, Harvardry Gerald Abraham, Arfin Sudirman y Falhan Hakiki. "China’s Great Firewall: Cybersecurity as Strategy for Building World Cyberpower". JISPO Jurnal Ilmu Sosial dan Ilmu Politik 13, n.º 2 (22 de marzo de 2024): 193–232. http://dx.doi.org/10.15575/jispo.v13i2.27713.

Texto completo
Resumen
The information, communication, and technology (ICT) sector has grown significantly in China. One of the advancements they have seen is in the area of cybersecurity. China's growing cybersecurity competence enabled it to create the Great Firewall of China (GFW), a set of control and censorship regulations for internet communications in China. This article investigates the significance of cybersecurity in the development of China's authoritarian authority, with a focus on the GFW as a strategic component. The concepts of cybersecurity and cyberpower served as the article's theoretical foundation. Through interviews and literature reviews, this article employs qualitative methodologies. This article demonstrates how China employs GFW to protect its citizens from cyber-attacks by focusing on political risks. China's cyber power is likewise increasing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Currier, Carrie Liu. "Roberts, Margaret E. Censored: Distraction and Diversion Inside China’s Great Firewall". Journal of Chinese Political Science 24, n.º 4 (7 de noviembre de 2019): 713–14. http://dx.doi.org/10.1007/s11366-019-09634-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Rodzvilla, John. "Margaret E. Roberts: Censored: Distraction and Diversion Inside China’s Great Firewall". Publishing Research Quarterly 35, n.º 1 (17 de enero de 2019): 185–86. http://dx.doi.org/10.1007/s12109-019-09635-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

SHAN, Wei. "Winning Public Opinion Online: China's Internet Content Control". East Asian Policy 06, n.º 03 (julio de 2014): 41–52. http://dx.doi.org/10.1142/s1793930514000257.

Texto completo
Resumen
The Chinese authorities have demonstrated great capability in putting online activities under strict surveillance. A comprehensive and complex system of internet monitoring and censorship has been established, consisting of the Great Firewall, online content control and targeted suppression, as well as an army of online commentators. Since Xi assumed leadership in late 2012, Beijing has shown considerable determination to win “public opinion” in the cyber world.
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Sundquist, James. "Censored: Distraction and Diversion Inside China's Great Firewall by Margaret E. Roberts". China Review International 23, n.º 4 (2016): 405–7. http://dx.doi.org/10.1353/cri.2016.0161.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Kim, Sung Wook y Aziz Douai. "Google vs. China’s “Great Firewall”: Ethical implications for free speech and sovereignty". Technology in Society 34, n.º 2 (mayo de 2012): 174–81. http://dx.doi.org/10.1016/j.techsoc.2012.02.002.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Haslam, Thomas. "Ubiquitous Learning behind the Great Firewall: Transforming the English Major at Shantou University". Ubiquitous Learning: An International Journal 9, n.º 1 (2016): 9–20. http://dx.doi.org/10.18848/1835-9795/cgp/v09i01/9-20.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Zheng, Yanfeng y Qinyu (Ryan) Wang. "Shadow of the great firewall: The impact of Google blockade on innovation in China". Strategic Management Journal 41, n.º 12 (8 de julio de 2020): 2234–60. http://dx.doi.org/10.1002/smj.3179.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Rahayu, Restu Karlina. "A Critical Analysis On Margaret E. Roberts (2018), Censored: Distraction And Diversion Inside China’s Great Firewall". Journal of Political Issues 1, n.º 2 (25 de enero de 2020): 92–102. http://dx.doi.org/10.33019/jpi.v1i2.8.

Texto completo
Resumen
Margaret E. Robert book builds on a foundation of the basic law of economy which is the relationship between supply and demand. She argues that censorship Chinese government censorship has violated free market law. In her book, she specified three mechanisms of censorship; fear, friction, and flooding (Roberts 2018). She explained in detail how Chinese’s people reactions toward the censorship in chapter four, five and six. In this paper, I challenged Roberts idea that fear is not part of the censorship mechanism. I have two arguments; first fear is emotion it needs stimuli to appear. Second fear and curiosity are motivation behind information seeking. Fear appeared from negative experience while curiosity appeared from positive outcomes. Fear is part of information behavior, it works like a brake system (Heinstrom 2010). Through fear, the disappointment and punishment will be evaluated by individuals to decide the next move. Fear is something dynamic, as time evolve it creates sensitivity, but it does not stop the basic need of information. American astronaut Thomas P. Stafford mentioned that evolution made us the ultimate learning machine, and the ultimate learning machine needs to be oiled by curiosity (Stafford 2012). At the end of my paper, I suggested Roberts to consider using word threat as one of censorship mechanism rather than fear.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Wang, Qi, Ling Li y Shuai Hu. "Computer Network Information Security Protection Faced by Digital Art Museums Based on the Internet of Things". Wireless Communications and Mobile Computing 2021 (15 de diciembre de 2021): 1–10. http://dx.doi.org/10.1155/2021/2297733.

Texto completo
Resumen
The development of the Internet of things provides a great opportunity for the development of all walks of life, but it also brings many risks in the process, of which the most important thing is the protection of computer network information security. Digital art museums play a great role in viewing, education, and other functions. This article is aimed at analyzing the computer network information security protection problems faced by digital art museums. Analyze the application of the digital art gallery in the computer Internet of things, and combine the different aspects involved in the two parts to carry out experimental analysis and comparison. The difference between the various subjects of the digital art gallery, such as exhibits, writers, and visitors, is to maintain the security of Internet computer information. Introduce the application. The results show that compared with that of fog computing technology and that of edge computing technology, the performance of the Internet of things is generally better, with faster data processing speed, shorter processing time, higher quality, and stronger scalability. But at the same time, it is also facing greater computer network security threats. According to statistics, 83.3% of consumers worry about its usability but people are more concerned about its safety performance. Nearly 87.5% of consumers worry about whether their information will be leaked. When cloud computing technology is applied to digital art museums, how to protect computer network information security is particularly important. Based on the traditional firewall, this paper designs a hybrid firewall, which can better solve the problem of computer network information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Wang, Yu Lin y Jin Heng Wang. "Research on Security Technology of Campus Network". Advanced Materials Research 971-973 (junio de 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.

Texto completo
Resumen
Campus networks are education, research and service with network of operation properties, due to network with connection of diversity,uneven distribution terminal, openness, interconnection, borderless, Freedom and so on, Causes the network vulnerable to attacks by hackers and viruses, and caused a great damage to society, schools. In this paper, Base on network security system dynamic APPDRR model for the theoretical guidance,combined with the characteristics of network system, a brief analysis of campus network security risk. And And the current mainstream network security technology were reviewed such as adaptive proxy technology, firewall, stateful inspection technology, agent technology, intrusion detection, security scanning technology. In this paper based on the analysis of campus network security technology research, with strong pertinence and feasibility. Researching on campus network security technologies are of great practical significance.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Dev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture". International Journal for Research in Applied Science and Engineering Technology 9, n.º 9 (30 de septiembre de 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.

Texto completo
Resumen
Abstract: To get first-hand experience for setting up a network infrastructure in a medium size hospital to manage the patient’s services, check-ups, follow-up plans from different parts of the hospital primes and store the data into the secured and safe manner in the database and use the data whenever required from the management team for their references. The network architecture based on the concept of the Three- layer network architecture combination of Mesh topology & Bus topology taking into the consideration of the primary data security, remote access to the network, size of the hospital organization, cost-effective, user-friendly and most importantly scalability required in the network architecture for future changes based on the size of the database, utilization of applications remotely, and for security of the data, changing technology etc. The goal of any network architecture is to protect the DATA from any attacks both internally and externally. For internal DATA security it is protected through various user permissions in different layers in the network for the end users. For Outside threat VPN tunnel, Policies, traffic filtering configured at the firewall level. Keywords: HIS-Hospital Information System, VPN- virtual private network tunnel, VLAN- Virtual LAN, HL7- Health Level Seven International, L3- Layer 3, ISP- Internet service provider
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Tai, Zixue. "Casting the Ubiquitous Net of Information Control". International Journal of Advanced Pervasive and Ubiquitous Computing 2, n.º 1 (enero de 2010): 53–70. http://dx.doi.org/10.4018/japuc.2010010104.

Texto completo
Resumen
Alongside the rise of the Internet as a pivotal economic and cultural force in Chinese society, the Chinese government has implemented a two-tiered strategy in dealing with the great potential and underlying risks associated with the network era. This paper offers a critical, in-depth overview of China’s state-orchestrated Internet surveillance apparatus from the Great Firewall to the latest Green Dam project. The author examines the conceptual and historical evolution of the Golden Shield program and analyzes the legal framework through which official regulation is justified or rationalized. Next, the author examines the prevalent practice of industry self-regulation among both Chinese and foreign companies engaged in online business in China. The paper ends with a discussion of the aborted official effort of extending content control to individual computers with the Green Dam Youth Escort project.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Liu, Hai Yan. "Designed Data Mining System Based on the Distribute Intrusion Detection Designed". Advanced Materials Research 1056 (octubre de 2014): 202–5. http://dx.doi.org/10.4028/www.scientific.net/amr.1056.202.

Texto completo
Resumen
With the development of computer and communication technology, the network has become an important part of the global information infrastructure, but the security problem "is constantly exposed to the vast majority of only using firewall this passive defense means within the network, there are still" great security risk which needs some positive active! The defense strategy, the most important one of which is intrusion detection system through the analysis of network or system in a number of key points to collect information and its, find the breach of security strategy behavior and the signs of being attacked, is a combination of software and hardware of intrusion detection.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Yang, Qinghua y Yu Liu. "What’s on the other side of the great firewall? Chinese Web users’ motivations for bypassing the Internet censorship". Computers in Human Behavior 37 (agosto de 2014): 249–57. http://dx.doi.org/10.1016/j.chb.2014.04.054.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Lee, Wing Ki. "Network Unavailable". A Peer-Reviewed Journal About 9, n.º 1 (4 de agosto de 2020): 130–41. http://dx.doi.org/10.7146/aprja.v9i1.121495.

Texto completo
Resumen
This paper problematizes assumptions of global all-pervading ‘available’ network culture by examining ‘network unavailability’ phenomenon in contemporary Chinese network culture through a post-colonial critique. The central argument of ‘network unavailable’ in China is contextualized by the performativity of the Great Firewall and the Golden Shield Project, Chinese media artist Fei Jun’s net art project Interesting World (2019) in the Venice Biennale and network happenings during the 2019 Anti-extradition Law Amendment Bill protests in Hong Kong. Through these examples the author argues that network culture in China is political and geopolitical and the discussion of networks should go beyond mere structuralism and emphasize the everyday life, tactical, and microscopic decision-making process.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Gunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik y Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks". Indonesian Journal of Electrical Engineering and Computer Science 12, n.º 2 (1 de noviembre de 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.

Texto completo
Resumen
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Taneja, Harsh y Angela Xiao Wu. "Does the Great Firewall Really Isolate the Chinese? Integrating Access Blockage With Cultural Factors to Explain Web User Behavior". Information Society 30, n.º 5 (2 de octubre de 2014): 297–309. http://dx.doi.org/10.1080/01972243.2014.944728.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Romanovsky, Vladislav y Rifat Kildeev. "Legal Framework for Counter-Terrorism in Social Networks in Russia and Abroad". SHS Web of Conferences 134 (2022): 00031. http://dx.doi.org/10.1051/shsconf/202213400031.

Texto completo
Resumen
The article discusses measures to counter terrorist threats in social networks and instant messengers. It is emphasized that the modern form of communication using digital technologies has started to be actively used by terrorist organizations for recruiting supporters, raising funds, and preparing terrorist attacks. The article analyzes the German (Act on Improving Law Enforcement in Social Networks) and Chinese (Chinese Great Firewall) experience of introducing restrictions and prohibitions in the framework of regulating the activities of companies moderating information through applications and social networks. It is shown that implementing the requirements of the legal regime has not only a legal, but also technological aspect. The peculiarities of the Internet functioning contribute to free implementation of information, including illegal information. This circumstance significantly complicates the tasks of law enforcement agencies in countering terrorist threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

PATOKINA, E. L. "MARKETING STRATEGIES AND TOOLS FOR ENTERING THE CHINESE MARKET". EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, n.º 7 (2021): 184–88. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.023.

Texto completo
Resumen
The article reveals the features of the application of marketing strategies in the market of the People's Republic of China. The Chinese market is significantly different from the European, American and Russian ones, moreover, this consumer segment is least disclosed in the works of Russian authors. Despite the fact that the great Chinese firewall system imposes some restrictions on the dissemination of foreign information within China and thus restricts access to this market, there are ways and methods available to Russian businesses. Some of them are described in this article and represent a full-fledged system consisting of both trading platforms and marketing tools. The scope of application of the research results is the foreign trade of Russian small and medium-sized businesses in the Asia-Pacific region.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Yao, Jian. "Model Design of Big Data Information Security Management Based on the Internet of Things". Security and Communication Networks 2022 (10 de octubre de 2022): 1–10. http://dx.doi.org/10.1155/2022/4380037.

Texto completo
Resumen
At present, the level of modernization and informatization is constantly improving, especially in rapidly developing China. A large amount of information is collected every second, forming a huge database and making people live in the “big data era.” Following cloud computing and the Internet of things, big data technology has become another revolutionary change in the global society, changing global development and becoming a new development point for technological innovation, industrial policy, and national information security. Big data in the new age poses new challenges and perspectives for the nation’s infosec development. Big data is a renewed tool for state security. Nations use big data to create state infosec, offering great facilitation, potential for adoption, and business value. This is a “new blue ocean” for competition among countries. Although big data brings convenience to public life, it also poses a serious threat to national information security. After the research and experiment of the model design of big data information security management of the Internet of things, the experimental data have shown that 86.67% set passwords in communication devices and storage devices. 66.67% installed firewalls, and 76.67% ran antivirus software. Compared with before, the total ratio of setting a password increased by 53.34% and the total ratio of installing a firewall and running antivirus software both increased by 26.67%. It can be seen from the above data that the protection of big data information under the Internet of things has been significantly improved. From the above data, through the big data information security management of the Internet of things, a new development direction is proposed for the development of information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Dong, Li Na. "Design of Computer Information Network Security System". Applied Mechanics and Materials 539 (julio de 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Texto completo
Resumen
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Han, Rongbin. "Censored: Distraction and Diversion Inside China’s Great Firewall. By Margaret E. Roberts. Princeton: Princeton University Press, 2018. 288p. $29.95 cloth." Perspectives on Politics 16, n.º 4 (23 de noviembre de 2018): 1134–35. http://dx.doi.org/10.1017/s1537592718002608.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Tucker, Joshua A. "Censored: Distraction and diversion inside China's great firewall. Roberts, Margaret E.Princeton University Press, Princeton, New Jersey, 2018. 288 pp. $29.95 (cloth)". Governance 32, n.º 3 (19 de junio de 2019): 586–87. http://dx.doi.org/10.1111/gove.12420.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Resnick, Marc. "Internet-Based Error Reporting Systems: Usability is Power". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 51, n.º 13 (octubre de 2007): 822–26. http://dx.doi.org/10.1177/154193120705101301.

Texto completo
Resumen
Error reporting systems have been around for many decades, in domains such as aerospace, with great success. In contrast, domains such as health care have resisted broad-based systems, due in part to cultural issues and fear of litigation. A recurring issue in the development of all of these systems is usability. Usability affects the development, growth, usage, and sustainability of error-reporting systems in many ways. As these systems migrate to the Internet and become more broadly accessible, usability will become a dominant factor in system success. Whether the system is publicly accessible, Intranet-based behind a company firewall, or semi-private and managed through a government agency or non-governmental organization, some usability issues will apply to all systems and others will shift in importance. This paper applies an existing knowledge management model to the analysis of error reporting systems, highlighting the significant impact and necessity of usability on the success of error-reporting systems, using examples from a variety of domains.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Hartley, John, Lucy Montgomery y Henry Siling Li. "A new model for understanding global media and China: ‘Knowledge clubs’ and ‘knowledge commons’". Global Media and China 2, n.º 1 (marzo de 2017): 8–27. http://dx.doi.org/10.1177/2059436417705919.

Texto completo
Resumen
The topic of this article and title of this journal are the same: ‘global media and China’. Although ‘global’ suggests a single universal unit, adding ‘China’ necessarily creates a difference, especially in the context of the ‘Great Firewall’, which creates a well-defined boundary between global media and China. Should our title read ‘Global Media versus China’, suggesting that the apparent universality of ‘global’ phenomena may be an illusion in a world marked by difference? We argue the contrary: that difference, produced along borderlines between different cultures – defined as those sociocultural groups whose boundaries require translation to cross, rather than simple transmission – is the productive energy that generates new knowledge (and thence, innovation) among large populations. We show that the peculiarity of current relations between global media and China is not evidence of exceptional ‘Chinese characteristics’, but of how culture deals with the globalisation of communication, and consciousness of that process among whole populations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Li, Gongfa, Jianyi Kong, Guozhang Jiang, Liangxi Xie, Han Xiao, Zehao Wu y Siqiang Xu. "Remote Monitoring and Diagnosis System of Rolling Mill Based on CORBA and SOAP/Web Service Technology". Noise & Vibration Worldwide 42, n.º 10 (noviembre de 2011): 23–27. http://dx.doi.org/10.1260/0957-4565.42.10.23.

Texto completo
Resumen
A detailed solution to the remote monitoring and diagnosis system for a rolling mill is introduced. The hardware and software structure of remote monitoring and diagnosis system is presented. The structure of the system is made up of four subsystems, namely online monitoring subsystem, data servo subsystem, database service subsystem and www server subsystem. Software module of system includes seven parts, namely online monitoring module, data query module, fault information query module, trend analysis module, diagnosis analysis module, engineer station module and eigenvalue query module. The system adopts B/S model and integrates CORBA technology with SOAP/Web Service technology. It makes dynamic display and traversing for a great deal of on-line data and Firewall traversal possible. It has run a long time that proves that the system interface is friendly and easy to use. It has better security, good portability, expandability and stability. It can judge the running-condition of a rolling mill in real time.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Douglas, Frederick, Weiyang Pan y Matthew Caesar. "Salmon: Robust Proxy Distribution for Censorship Circumvention". Proceedings on Privacy Enhancing Technologies 2016, n.º 4 (1 de octubre de 2016): 4–20. http://dx.doi.org/10.1515/popets-2016-0026.

Texto completo
Resumen
Abstract Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on low-performance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system designed to resist a censor with the resources of the “Great Firewall” of China. Salmon relies on a network of volunteers in uncensored countries to run proxy servers. Although any member of the public can become a user, Salmon protects the bulk of its servers from being discovered and blocked by the censor via an algorithm for quickly identifying malicious users. The algorithm entails identifying some users as especially trustworthy or suspicious, based on their actions. We impede Sybil attacks by requiring either an unobtrusive check of a social network account, or a referral from a trustworthy user.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía