Literatura científica selecionada sobre o tema "Great Firewall"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Great Firewall".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Great Firewall"
Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.
Texto completo da fonteMulvenon, James C., e Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julho de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.
Texto completo da fonteZhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.
Texto completo da fonteLiu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de março de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.
Texto completo da fonteHughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de março de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.
Texto completo da fonteScarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.
Texto completo da fonteManaseer, Saher, Ahmad K. Al Hwaitat e Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de setembro de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.
Texto completo da fonteTsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz e Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.
Texto completo da fonteEnsafi, Roya, Philipp Winter, Abdullah Mueen e Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.
Texto completo da fonteAnderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (novembro de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.
Texto completo da fonteTeses / dissertações sobre o assunto "Great Firewall"
Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China". Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.
Texto completo da fonteLovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.
Texto completo da fonteHsiao, Yu-Hsuan, e 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.
Texto completo da fonte國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Livros sobre o assunto "Great Firewall"
Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8a ed. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.
Encontre o texto completo da fonteRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Encontre o texto completo da fonteNelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.
Encontre o texto completo da fonteRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.
Encontre o texto completo da fonteRoberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.
Encontre o texto completo da fonteGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Encontre o texto completo da fonteGriffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.
Encontre o texto completo da fonteGriffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Encontre o texto completo da fonteGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Encontre o texto completo da fonteGriffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Great Firewall"
Clayton, Richard, Steven J. Murdoch e Robert N. M. Watson. "Ignoring the Great Firewall of China". In Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.
Texto completo da fonteTaylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP". In China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.
Texto completo da fonteGaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet". In The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.
Texto completo da fonteMao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010". In Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.
Texto completo da fonteKeats, Jonathon. "Great Firewall". In Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.
Texto completo da fonte"17. The Great Firewall". In Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.
Texto completo da fonteGainous, Jason, Rongbin Han, Andrew W. MacDonald e Kevin M. Wagner. "Jumping Over the Great Firewall". In Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.
Texto completo da fonte"Jumping the wall". In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.
Texto completo da fonte"Uyghurs online". In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.
Texto completo da fonte"NoGuGe". In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Great Firewall"
Pang, Sheng, Changjia Chen e Jinkang Jia. "Session Hijack in the Great Firewall of China". In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.
Texto completo da fonteEnsafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver e Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers". In IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.
Texto completo da fonteComb, Matthew, e Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks". In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.
Texto completo da fonteWeinberg, Zachary, Diogo Barradas e Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China". In WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.
Texto completo da fonteChandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao e Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall". In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.
Texto completo da fonteHillmer, Dirk. "VirTeam Tool". In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.
Texto completo da fonteRelatórios de organizações sobre o assunto "Great Firewall"
Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, junho de 2008. http://dx.doi.org/10.21236/ada488175.
Texto completo da fonte