Abstract
In recent years, with the accelerated implementation of national big data development strategies, the innovation and application of big data technology have become increasingly active, generating and aggregating massive types of network data with increasing types and increasing application values, which have become key production factors for the development of the digital economy. Common network security problems include leaking user information without permission, abusing and disseminating data through the Internet, and conducting illegal transactions, etc., and there is an upward trend. Therefore, it is particularly urgent to manage network data security in the Internet industry. Network security issues are emerging one after another. This requires us to study how to prevent and respond to endless network security issues in the context of big data, and how to give full play to the legal role in network security supervision in order to face the new era of new technologies. Threats and challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qi, C.: Causes and countermeasures of computer network information security problems. Electron. Technol. Softw. Eng. 23, 191–192 (2019). (in Chinese)
Chen, C.: Analysis of legal guarantee mechanism for big data security. J. Shanxi Inst. Polit. Sci. Law 32(04), 104–106 (2019). (in Chinese)
Xueting, L.: The dilemma of the rule of law and the way out for China’s network security in the Internet + era. J. Hunan Inst. Humanit. Sci. Technol. 36(06), 12–16 (2019). (in Chinese)
Yunying, Y.: Security problems and counter measures in network information construction. Electron. Technol. Softw. Eng. 22, 202–203 (2019). (in Chinese)
Xing, M.: Analysis of computer network information security management strategy. Chin. Foreign Entrepreneurs 34, 191 (2019). (in Chinese)
Mengyuan, Z., Zhongyi, Y.: Development, characteristics and enlightenment of US, network security review system. J. Netw. Inf. Secur. 5(06), 1–9 (2019). (in Chinese)
Xin, J.: Path choice of legalization of network social governance. J. Liaoning Public Secur. Judicial Administrators Coll. 06, 9–13 (2019). (in Chinese)
Yan, S.: Analysis and reflection on Russian “Break Network” exercises. Net Inf. Mil. Civ. Integr. 11, 45–47 (2019). (in Chinese)
Xinghua, X.: Legal issues that must be paid attention to when expanding big data business (1). Manag. Commun. Enterprises 12, 38–41 (2019). (in Chinese)
Xiao, Z.: Analysis on the legal basis of computer network security review. J. Hubei Open Vocat. Coll. 32(21), 107–109 (2019). (in Chinese)
Deng, R., Yu, M., Ding, Y., et al.: Building network powers with the legal system to guarantee cyberspace security—interpretation of the network security law and national cyberspace security strategy. Electro. Gov. Aff. (02), 2–35 (2017). (in Chinese)
Chunhui, W.: Analysis of the six legal systems of the “Network Security Law”. J. Nanjing Univ. Posts Telecommun. (Nat. Sci. Ed.) 37(01), 1–13 (2017). (in Chinese)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, C. (2020). A Role of Law in Network Security Supervision Based on Public Internet Perspective. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-43306-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43305-5
Online ISBN: 978-3-030-43306-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)