Advertisement

A Role of Law in Network Security Supervision Based on Public Internet Perspective

  • Caihong ChenEmail author
Conference paper
  • 18 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1146)

Abstract

In recent years, with the accelerated implementation of national big data development strategies, the innovation and application of big data technology have become increasingly active, generating and aggregating massive types of network data with increasing types and increasing application values, which have become key production factors for the development of the digital economy. Common network security problems include leaking user information without permission, abusing and disseminating data through the Internet, and conducting illegal transactions, etc., and there is an upward trend. Therefore, it is particularly urgent to manage network data security in the Internet industry. Network security issues are emerging one after another. This requires us to study how to prevent and respond to endless network security issues in the context of big data, and how to give full play to the legal role in network security supervision in order to face the new era of new technologies. Threats and challenges.

Keywords

Public internet Network security regulation Legal role 

References

  1. 1.
    Qi, C.: Causes and countermeasures of computer network information security problems. Electron. Technol. Softw. Eng. 23, 191–192 (2019). (in Chinese)Google Scholar
  2. 2.
    Chen, C.: Analysis of legal guarantee mechanism for big data security. J. Shanxi Inst. Polit. Sci. Law 32(04), 104–106 (2019). (in Chinese)Google Scholar
  3. 3.
    Xueting, L.: The dilemma of the rule of law and the way out for China’s network security in the Internet + era. J. Hunan Inst. Humanit. Sci. Technol. 36(06), 12–16 (2019). (in Chinese)Google Scholar
  4. 4.
    Yunying, Y.: Security problems and counter measures in network information construction. Electron. Technol. Softw. Eng. 22, 202–203 (2019). (in Chinese)Google Scholar
  5. 5.
    Xing, M.: Analysis of computer network information security management strategy. Chin. Foreign Entrepreneurs 34, 191 (2019). (in Chinese)Google Scholar
  6. 6.
    Mengyuan, Z., Zhongyi, Y.: Development, characteristics and enlightenment of US, network security review system. J. Netw. Inf. Secur. 5(06), 1–9 (2019). (in Chinese)Google Scholar
  7. 7.
    Xin, J.: Path choice of legalization of network social governance. J. Liaoning Public Secur. Judicial Administrators Coll. 06, 9–13 (2019). (in Chinese)Google Scholar
  8. 8.
    Yan, S.: Analysis and reflection on Russian “Break Network” exercises. Net Inf. Mil. Civ. Integr. 11, 45–47 (2019). (in Chinese)Google Scholar
  9. 9.
    Xinghua, X.: Legal issues that must be paid attention to when expanding big data business (1). Manag. Commun. Enterprises 12, 38–41 (2019). (in Chinese)Google Scholar
  10. 10.
    Xiao, Z.: Analysis on the legal basis of computer network security review. J. Hubei Open Vocat. Coll. 32(21), 107–109 (2019). (in Chinese)Google Scholar
  11. 11.
    Deng, R., Yu, M., Ding, Y., et al.: Building network powers with the legal system to guarantee cyberspace security—interpretation of the network security law and national cyberspace security strategy. Electro. Gov. Aff. (02), 2–35 (2017). (in Chinese)Google Scholar
  12. 12.
    Chunhui, W.: Analysis of the six legal systems of the “Network Security Law”. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) 37(01), 1–13 (2017). (in Chinese)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Fuzhou University of International Studies and TradeFuzhouChina

Personalised recommendations