当前位置:网站首页>Practice and improvement of children's network protection industry based on mobile Internet application
Practice and improvement of children's network protection industry based on mobile Internet application
2022-07-19 04:31:00 【Midoer technology house】
《 Law of the people's Republic of China on the protection of minors (2020 The revision )》 On 2021 year 6 month 1 In force on , One of the highlights is the addition of “ Network protection ” Chapter , In response to the urgent need to properly protect minors in the digital age . As a more vulnerable group among minors , The effectiveness of its network protection should also be paid more attention . If children's network protection is the main line , Take the mobile Internet application as the starting point , Through combing the child protection practices of mainstream mobile Internet applications at home and abroad in recent years , It can be found that the current network protection measures for children in mobile Internet applications mainly realize the prevention of addiction 、 The function of content management , And privacy protection 、 As the development direction and practical difficulty of children's network protection, age recognition , Still need to be in the institutional system 、 Improve the compliance level .
Content catalog :
0 lead said
1 Mobile Internet applications (App) Main practices of child protection
2 The main functions of children's network protection 、 Development and difficulties
2.1 at present “ Youth model ” The main functional objectives of
2.2 The development direction of children's network protection
2.3 The practical difficulties of children's network protection
3 Mobile Internet applications (App) The improvement of children's network protection
3.1 Systematically coordinate the privacy protection in children's network protection function
3.2 Different App Segmentation and typology of compliance requirements such as age identification
4 junction language
0 lead said
2020 year 9 Released on 《 Youth Blue Book : Report on Internet use of Chinese Minors (2020)》 Show : The Internet penetration rate of minors in China has reached 100% 99.3%, Significantly higher than the overall Internet penetration rate in China (64.5%). In a huge number “ Digital natives ” Enjoy efficiency 、 Convenient digital technology , How to protect their personal rights and digital rights is an important topic worthy of attention and discussion .
For example, algorithm bias 、 information cocoons 、 Personal information protection and a series of emerging digital society problems , Even in adults
边栏推荐
- Thesis research NLP
- leetcode209. 长度最小的子数组
- 数据分析报告这样写,才算真正读懂了数据
- On the third day of security, iptables prevents nmap scanning and binlog
- rotoc-gen-go: unable to determine Go import path for **. proto
- B+ tree stored procedures, triggers, substring and substr, and truncate and delete
- About the problem of database, the concept of uniqueness and non repetition
- 51单片机一究到底输入模式
- DNS原理及解析过程
- Leetcode7 DFS + dynamic programming + double pointer
猜你喜欢

Technical writing guide for programmers to leave work early

OSPF的优化和配置

李宏毅_机器学习_作业4(详解)_HW4 Classify the speakers

OSPF路由控制,防环相关知识

If by frame package name modifier

Intel experts share: how to program efficiently on XPU architecture? Zhiqiang Research Institute

Distributed notes (02) - redis of distributed cache (brief description of uses, features, high availability solutions redis cluster, tweetproxy, CODIS)

Wechat e-book reading of applet completion works (7) Interim inspection report

Xdc 2022 Intel technology special session: Intel Software and hardware technology builds the cornerstone of cloud computing architecture

Impersonate the server for requests
随机推荐
Optimization and configuration of OSPF
In the era of super video, what is the solution to the data flood?
智能硬件语音控制的时频图分类挑战赛2.0(思路以及结果,目前top5)
Intensive reading series of papers
Software testing - use cases
论文研究NLP
B+ tree stored procedures, triggers, substring and substr, and truncate and delete
kettle5.4问题记录
OSPF基础优化
Wechat e-book reading of applet completion works (7) Interim inspection report
AutoJs学习-找图数据生成
深度学习中的标量、向量、矩阵和张量的区别
CAD video course recommendation station B
Touchid and faceid~2
Tree array: [jxoi2017] addition problem solution
OpenLDAP自定义schema
C language explanation series - practice and consolidation of circular sentences, explanation of binary search
[wechat applet] super easy to understand conditional rendering and list rendering
What does the project set price mean?
Touchid and faceid~1