{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:13Z","timestamp":1750220473493,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3482720","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:39:27Z","timestamp":1637602767000},"page":"413-417","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Path of Rule of Law in Cyberspace Governance Based on Cloud Computing under the Background of Big Data"],"prefix":"10.1145","author":[{"given":"Qiao","family":"Peng","sequence":"first","affiliation":[{"name":"Wuhan Railway Vocational College of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"issue":"8","key":"e_1_3_2_1_1_1","first-page":"158","article-title":"Thoughts on Network Public Opinion Communication in the Big Data Era","volume":"257","author":"Yixuan Chen","year":"2020","unstructured":"Chen Yixuan . Thoughts on Network Public Opinion Communication in the Big Data Era . Science and Technology Communication , vol. 257 , no. 8 , pp. 158 - 159 , 2020 . Chen Yixuan. Thoughts on Network Public Opinion Communication in the Big Data Era. Science and Technology Communication, vol. 257, no. 8, pp. 158-159, 2020.","journal-title":"Science and Technology Communication"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.04.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1758-5899.12298"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"11","article-title":"Governance and development of illegal content on the Internet in China under the background of big data","volume":"23","author":"Yizhou Chen","year":"2020","unstructured":"Chen Yizhou . Governance and development of illegal content on the Internet in China under the background of big data . World of IT Managers , vol. 23 , no. 1 , pp. 11 - 12 , 2020 . Chen Yizhou. Governance and development of illegal content on the Internet in China under the background of big data. World of IT Managers, vol. 23, no. 1, pp. 11-12, 2020.","journal-title":"World of IT Managers"},{"volume-title":"The governance and development of China's Internet illegal content under the background of big data. The era of big data","author":"Yingxin Zhang","key":"e_1_3_2_1_5_1","unstructured":"Zhang Yingxin . The governance and development of China's Internet illegal content under the background of big data. The era of big data , vol. 34 , no. 1, pp. 28-33, 2020. Zhang Yingxin. The governance and development of China's Internet illegal content under the background of big data. The era of big data, vol. 34, no. 1, pp. 28-33, 2020."},{"issue":"12","key":"e_1_3_2_1_6_1","first-page":"50","article-title":"Blockchain Governance\" of Healthy Big Data Platform","volume":"118","author":"Xiang Wang","year":"2019","unstructured":"Wang Xiang . \" Blockchain Governance\" of Healthy Big Data Platform . Cyberspace Security , vol. 118 , no. 12 , pp. 50 - 57 , 2019 . Wang Xiang. \"Blockchain Governance\" of Healthy Big Data Platform. Cyberspace Security, vol. 118, no. 12, pp. 50-57, 2019.","journal-title":"Cyberspace Security"},{"volume-title":"Space theory and the construction of cyberspace in the era of big data","author":"Zhenglin Luo","key":"e_1_3_2_1_7_1","unstructured":"Luo Zhenglin . Space theory and the construction of cyberspace in the era of big data . Modern Communication (Journal of Communication University of China) , vol. 41 , no. 1, pp. 49-56, 2019. Luo Zhenglin. Space theory and the construction of cyberspace in the era of big data. Modern Communication (Journal of Communication University of China), vol. 41, no. 1, pp. 49-56, 2019."},{"issue":"8","key":"e_1_3_2_1_8_1","first-page":"40","article-title":"Internet+\" and","volume":"745","author":"Qian Lu","year":"2019","unstructured":"Lu Qian . \" Internet+\" and \"Big Data\u00d7\": The Strategic Engine for the Modernization of National Governance Capabilities in the New Era. Leadership Science , vol. 745 , no. 8 , pp. 40 - 43 , 2019 . Lu Qian. \"Internet+\" and \"Big Data\u00d7\": The Strategic Engine for the Modernization of National Governance Capabilities in the New Era. Leadership Science, vol. 745, no. 8, pp. 40-43, 2019.","journal-title":"Leadership Science"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"36","article-title":"Research on Big Data Governance Technology Solutions for Data Sovereignty","volume":"8","author":"Gang Zhao","year":"2017","unstructured":"Zhao Gang , Wang Shuai , Wang Peng . Research on Big Data Governance Technology Solutions for Data Sovereignty . Information Security and Technology , vol. 8 , no. 2 , pp. 36 - 42 , 2017 . Zhao Gang, Wang Shuai, Wang Peng. Research on Big Data Governance Technology Solutions for Data Sovereignty. Information Security and Technology, vol. 8, no. 2, pp. 36-42, 2017.","journal-title":"Information Security and Technology"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"18","volume":"1","author":"Lina Dai","year":"2017","unstructured":"Dai Lina . Reform and Innovation of Cyberspace Information Governance . News and Writing , vol. 1 , no. 1 , pp. 18 - 18 , 2017 . Dai Lina. Reform and Innovation of Cyberspace Information Governance. News and Writing, vol. 1, no. 1, pp. 18-18, 2017.","journal-title":"News and Writing"},{"issue":"4","key":"e_1_3_2_1_11_1","first-page":"205","article-title":"Government Governance from the Perspective of Big Data","volume":"18","author":"Xiaoling Zeng","year":"2019","unstructured":"Zeng Xiaoling . Government Governance from the Perspective of Big Data . Industry and Technology Forum , vol. 18 , no. 4 , pp. 205 - 206 , 2019 . Zeng Xiaoling. Government Governance from the Perspective of Big Data. Industry and Technology Forum, vol. 18, no. 4, pp. 205-206, 2019.","journal-title":"Industry and Technology Forum"},{"volume-title":"Hiller J S. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis. American business law journal","author":"Raig A N","key":"e_1_3_2_1_12_1","unstructured":"Raig A N , Shackelford S J , Hiller J S. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis. American business law journal , vol. 52 , no. 4, pp. 721-787, 2015. Raig A N, Shackelford S J, Hiller J S. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis. American business law journal, vol. 52, no. 4, pp. 721-787, 2015."},{"issue":"19","key":"e_1_3_2_1_13_1","first-page":"7","article-title":"Challenges and prevention of cyber terrorism in the era of big data","volume":"17","author":"Yi Xu","year":"2018","unstructured":"Xu Yi , Shen Jianfeng . Challenges and prevention of cyber terrorism in the era of big data . Industry and Technology Forum , vol. 17 , no. 19 , pp. 7 - 9 , 2018 . Xu Yi, Shen Jianfeng. Challenges and prevention of cyber terrorism in the era of big data. Industry and Technology Forum, vol. 17, no. 19, pp. 7-9, 2018.","journal-title":"Industry and Technology Forum"},{"issue":"13","key":"e_1_3_2_1_14_1","first-page":"68","article-title":"Analysis of the risk of personal information sharing under the Internet + big data model and its knowledge governance analysis","volume":"16","author":"Zengfu Li","year":"2020","unstructured":"Li Zengfu . Analysis of the risk of personal information sharing under the Internet + big data model and its knowledge governance analysis . Computer Knowledge and Technology , vol. 16 , no. 13 , pp. 68 - 69 , 2020 . Li Zengfu. Analysis of the risk of personal information sharing under the Internet + big data model and its knowledge governance analysis. Computer Knowledge and Technology, vol. 16, no. 13, pp. 68-69, 2020.","journal-title":"Computer Knowledge and Technology"}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3482720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3482720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:38Z","timestamp":1750193318000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3482720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":14,"alternative-id":["10.1145\/3482632.3482720","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3482720","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}