Welcome to Francis Academic Press

Academic Journal of Humanities & Social Sciences, 2022, 5(2); doi: 10.25236/AJHSS.2022.050219.

Based on the Theory of Standardized Youth Social Application Software Management Mechanism—— Takes Exploration and Dating Software as an Example

Author(s)

Wenping Ji

Corresponding Author:
Wenping Ji
Affiliation(s)

School of Political Science and Public Administration, East China University of Political Science and Law, Shanghai, 201620, China

Abstract

In recent years, under the influence of 5G technology, new coronavirus outbreak and diversified development of interpersonal values, cloud social as the main social model, the paper explore app loopholes in the case of social application software management mechanism, according to the government regulation theory, on the government regulation as the core, enterprise self-discipline, user supervision, multiple cooperation optimization management, provide a constructive basis for the comprehensive network management system.

Keywords

youth group, social application software, multi-subject collaborative supervision system, comprehensive network governance system

Cite This Paper

Wenping Ji. Based on the Theory of Standardized Youth Social Application Software Management Mechanism—— Takes Exploration and Dating Software as an Example. Academic Journal of Humanities & Social Sciences (2022) Vol. 5, Issue 2: 137-141. https://doi.org/10.25236/AJHSS.2022.050219.

References

[1] Wochuchi. Regulatory loss loopholes to fill the gray online marriage platform [J]. Legal Person, 2021, (02): 55-57.

[2] Zhao Nan, Liu Jia. Mobile APP Privacy Chaos [J]. SMEs in China, 2013 (10): 56-57.

[3] Duan Wangjie. Development Status and Strategy of Social short video APP in China [C]. Xiangtan University, 2019.

[4] Tian Hui. On the statutory and contractual obligations and their legal regulation [J]. Journal of Chongqing University: Social Science Edition, 2018 (3): 152-162

[5] Sun Jin; Alijiang Abdukyumu. Privacy crisis of free social software users and its regulations [J]. Information Security Research, 2020, 6 (07): 657-663.