代寫 會員中心 TAG標簽
網站地圖 RSS
英國作業 新西蘭作業 愛爾蘭作業美國作業 加拿大作業
返回首頁

微信技術實踐的倫理困境The ethical dilemma of technological practice on

時間:2019-07-15 10:42來源:未知 作者:anne 點擊:
微信能夠在智能手機應用中取得成功,不能離開其技術架構的獨特性,微信軟件的敏捷性和準確的產品定位是其成功的關鍵因素。騰訊在開發初期就將微信定位為即時通訊軟件。同時,它顯示了
微信能夠在智能手機應用中取得成功,不能離開其技術架構的獨特性,微信軟件的敏捷性和準確的產品定位是其成功的關鍵因素。騰訊在開發初期就將微信定位為即時通訊軟件。同時,它顯示了與其他軟件的區別。敏捷性是指微信團隊在使用過程中出現問題或漏洞,違反相關規定,能夠及時進行修改和升級的能力。因此,本文希望探討微信技術實踐的倫理困境。
WeChat can succeed in among smart phone applications, cannot leave the uniqueness of its technical architecture, WeChat software agility and accurate product positioning is the key factor for its success. Tencent positioned WeChat as an instant messaging software early in its development. At the same time, it shows the difference with other software. Agility refers to the ability of the WeChat team to modify and upgrade in a timely manner if there is a problem or vulnerability that violates the relevant regulations during the use. Therefore, this article would like to discuss the ethical dilemma of technological practice on WeChat.
在網絡中共享和運行需要協議。操作系統和運營商之間的協議是相同的。如果你需要在微信中擴展新功能,你需要添加新的邏輯和協議。如果協議內容在其他移動軟件中過大,將導致沖突(Lien&Cao,2014)。但在微信中,該協議滿足正向兼容的條件,新增加的協議可以作為對以前協議的補充和擴展。在協議代碼的生成過程中,不需要進行比較,只需進行描述,然后使用代碼生成工具。添加新邏輯通常會導致數據量增加。程序的大小變化不大,新的數據將存儲在原來的冗余空間中。這是因為原始數據存儲空間的末尾有一個標志字段,用于標識剩余空間的大小。
Sharing and running in a network requires protocols. Protocols are the same across operating systems and carriers. If you need to extend new functionality in WeChat, you need to add new logic and protocols. If the content of the agreement is too large in other mobile software, it will cause conflicts (Lien & Cao, 2014). However, in WeChat, the protocol satisfies the condition of forward compatibility, and the newly added protocol can be regarded as supplementing and extending the previous protocol. During the generation of protocol code, there is no need for comparison, just use for description and then code generation tools. The addition of new logic often leads to an increase in data volume. The size of the program does not change much, and the new data will be stored in the original redundant space. This is because there is a flag field at the end of the original data storage space to identify the size of the remaining space.
在微信新發布的過程中,并非所有的邏輯變化都是一次性發布的。在每次更新中,只分發一部分內部測試用戶,在確認沒有問題后,將釋放所有用戶(Dong等人,al,2018)。灰度發布不會走極端,所以用戶有更好的響應。將所有用戶移動到系統B,并使用傳統的ABTEST模式進行平滑過渡。在這個過程中,一些用戶使用系統A,另一些用戶使用系統B,通過實際應用測試,可以及時修改問題。
對于微信中更復雜的邏輯,它被固定在后臺。在這一過程中,需要處理的問題主要包括存儲組件的擴展和屏蔽災難、監控報告、統計和監控框架,隨時添加新的邏輯、邏輯服務器容器的邏輯、10分鐘的內部S結構。服務器和客戶端自動代碼生成框架等。During the new release of WeChat, not all logical changes are released at once. In each update, only a part of the internal test users will be distributed, and after confirming that there is no problem, all users will be released (Dong et.,al, 2018) . The grayscale release will not go to extremes, so users have a better response. Move all users to system B and make a smooth transition using the traditional ABtest mode. In this process, some users use system A, others use system B. Through the actual application test, the problem can be modified in time.
For more complex logic in WeChat, it is immobilized in the background. In this process, the need to deal with the problems mainly include the storage components of expansion and shielding disaster,  monitoring reports, statistics and monitoring framework, at any time to add a new logic, logic of LogicServer containers, ten minutes of the construction of the internal Server and Client framework of automatic code generation, etc.
In the technical architecture of WeChat, clearer module design is adopted. In the whole large system, various functions of storage and logical structure are designed separately. In this way, in the process of WeChat operation, once a problem occurs, it can be timely discovered (Dai et.,al, 2015). WeChat, logic with similar functions will be placed in a unified storage space, and logic with different functions will be placed in different storage Spaces. In this way, there will be no contradiction and conflict between different logic, and when modifying one logic, it will not affect the normal operation of other logic. Among numerous logic, if need to modify and expand a certain logic, just need to find the corresponding logical block, and carries on the part of the change, don't need to modify them one by one the whole logic, greatly improve the efficiency. Finally, all the logical functions are provided to the user through the same interface to realize user-oriented operations.
By setting WeChat's name and avatar to an official account, you can impersonate WeChat's assistant and defraud WeChat users' information. WeChat has positioning function. By three-point positioning method, the location of the target can be determined, so as to obtain the location information of WeChat users. Shake function in WeChat can match users who use this function together at the same time, and provide information of both parties, which is easy to be used by criminals. In WeChat's friend circle function, strangers can view 10 photos of users without corresponding Settings. In this way, some criminals can obtain certain information from photos, so as to conduct targeted fraud (Lisha, et.,al, 2017). Therefore, WeChat users should turn this function off to prevent inadvertent disclosure of their private information. In addition, if WeChat users do not set up friend authentication, some people will send some interesting content or links to users after adding them as friends and include Trojan horses, viruses and so on. Once the user enters the content, the Trojan virus will invade the user's mobile phone and steal the information. Added in the new WeChat WeChat payment functions, there are a lot of potential safety problems, the lack of a digital certificate, the function such as identity authentication, only through bank card password to protect the security of funds, very easy to crack outlaws, resulting in economic losses.
For the traffic generated by the application software, it is saved through the Android simulator, installed and logged in WeChat, and then sent messages. WeChat runs most of the traffic generated on TCP port 8080, reserved for HTTP connections. However, Wireshark cannot parse an HTTP load. WeChat's communication protocol is custom, and the initial load is to recognize the initial header, where there is no HTTP session. The subsequent body of the message is associated with the opcode in the form of encryption. In version 4.3.5 of WeChat, there are some loopholes that can intercept the message body for fast decryption of traffic and send and receive user mail attacks(Yang, Chulu, & Danqing, 2018). Developers use unlicensed debugging infrastructure to debug WeChat, but attackers can also use it to steal users' private information. In addition, there are also significant vulnerabilities for remote logging. With this capability, an attacker can develop a malicious program to leak the ContentProvider. The appropriate debugging is then set up to obtain WeChat log records and control the server.
In the real world, people's communication activities are restricted by laws, morals, customs and other social norms, and the virtual and indirect nature of WeChat provides a virtual communication space for people. In order to avoid all kinds of constraints, some people prefer to use WeChat for communication and seek for knowledge. In the world of WeChat, communication object is not so much a real person, but rather a artificial intelligence, a strong communicative subjects have a reality, exchanges between the object and their interactions with the virtual sex. In such an environment, people get rid of the restriction of social norms and the influence of material factors in their communication and become more freewheeling. When people immersed in the fantasy, the reality of interpersonal communication ability will decline, leading to not adapt to the realistic social interactions, or virtual in a way for the reality of interpersonal communication, obviously the two interactions cannot agree, prone to frustration for communicative subjects, exclusion of reality. Severe frustration may cause people to abandon their real relationships and experience feelings of emptiness, anxiety, loneliness and insecurity. When an individual cannot get self-recognition in the real communication, he will seek for himself in the virtual communication, and then form two selves, namely the ego in the virtual world and the ego in the real world. These two selves are mutually exclusive and contradictory, and the confrontation between reality and fiction can easily lead to the split of personality. In addition, if people sink too much in the virtual world, they will ignore the real world. Human nature is a living creature in reality, the personality un-unity between the two worlds, and the neglect of the real world. As the subject of practice, people will have doubts about their real existence.


推薦內容
  • 英國作業
  • 新西蘭作業
  • 愛爾蘭作業
  • 美國作業
  • 加拿大作業
  • 代寫英國essay
  • 代寫澳洲essay
  • 代寫美國essay
  • 代寫加拿大essay
  • MBA Essay
  • Essay格式范文
  • 澳洲代寫assignment
  • 代寫英國assignment
  • 新西蘭代寫assignment
  • Assignment格式
  • 如何寫assignment
  • 代寫英國termpaper
  • 代寫澳洲termpaper
  • 英國coursework代寫
  • PEST分析法
  • literature review
  • Research Proposal
  • 參考文獻格式
  • case study
  • presentation
  • report格式
  • Summary范文
  • common application
  • Personal Statement
  • Motivation Letter
  • Application Letter
  • recommendation letter
  • 好多糖果走势图
    今天山西快乐十分开 中原风釆22选5走势图 山水广西麻将最新版 不吃牌广东麻将技巧 天天赚钱app官方版 3G配资 福建十一选五走势图500彩票网 湖南快乐10分 黑龙江11选5定胆技巧 湖北十一选五 四川快乐十二走势图 狂欢节 贵州11选5开奖走势图八 青海十一选五 陕快乐10分走势图开奖直播 幸运飞艇有哪些技巧