Application Control Signatures Netdefendos Secursityec Urity Ver

Total Page:16

File Type:pdf, Size:1020Kb

Application Control Signatures Netdefendos Secursityec Urity Ver Network Security Firewall Application Control Signatures NetDefendOS SecurSityec urity Ver. 10.21.02 Network Security Solution http://www.dlink.com Application Control Signatures DFL-260E/860E/1660/2560/2560G NetDefendOS Version 10.21.02 D-Link Corporation No. 289, Sinhu 3rd Rd, Neihu District, Taipei City 114, Taiwan R.O.C. http://www.DLink.com Published 2014-10-31 Copyright © 2014 Application Control Signatures DFL-260E/860E/1660/2560/2560G NetDefendOS Version 10.21.02 Published 2014-10-31 Copyright © 2014 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without the written consent of D-Link. Disclaimer The information in this document is subject to change without notice. D-Link makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for a particular purpose. D-Link reserves the right to revise this publication and to make changes from time to time in the content hereof without any obligation to notify any person or parties of such revision or changes. Limitations of Liability UNDER NO CIRCUMSTANCES SHALL D-LINK OR ITS SUPPLIERS BE LIABLE FOR DAMAGES OF ANY CHARACTER (E.G. DAMAGES FOR LOSS OF PROFIT, SOFTWARE RESTORATION, WORK STOPPAGE, LOSS OF SAVED DATA OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES) RESULTING FROM THE APPLICATION OR IMPROPER USE OF THE D-LINK PRODUCT OR FAILURE OF THE PRODUCT, EVEN IF D-LINK IS INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHERMORE, D-LINK WILL NOT BE LIABLE FOR THIRD-PARTY CLAIMS AGAINST CUSTOMER FOR LOSSES OR DAMAGES. D-LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN EXCESS OF THE AMOUNT D-LINK RECEIVED FROM THE END-USER FOR THE PRODUCT. Table of Contents 1.Antivirus .........................................................................................................40 1.1. Sophos update ...................................................................................... 40 1.2. ZoneAlarm Updates ............................................................................... 40 2. Application Service ........................................................................................... 41 2.1. Microsoft ActiveSync .............................................................................. 42 2.2. Apple Push Notification Service ................................................................ 42 2.3. Apple App Store .................................................................................... 42 2.4. Dictionary Server ................................................................................... 43 2.5. EndPoint Mapper ................................................................................... 43 2.6. Generic Attribute Registration Protocol ..................................................... 43 2.7. Google Play ........................................................................................... 43 2.8. iCloud (Apple) ....................................................................................... 44 2.9. Iminent.com .......................................................................................... 44 2.10. iOS over-the-air (OTA update) ................................................................. 44 2.11. Lighweight Directory Access Protocol ...................................................... 44 2.12. Lighweight Directory Access Protocol Secure ............................................ 45 2.13. Mandriva Update ................................................................................. 45 2.14. IBM Websphere MQ .............................................................................. 45 2.15. NetBSD Updates ................................................................................... 46 2.16. ESET NOD32 Antivirus Updates ............................................................... 46 2.17. Symantec Norton AntiVirus Updates ........................................................ 46 2.18. Name Service Provider Interface ............................................................. 46 2.19. OpenBSD Updates ................................................................................ 47 2.20. Panda Update ...................................................................................... 47 2.21. Perforce Protocol .................................................................................. 47 2.22. Port Mapper ........................................................................................ 47 2.23. Samsung Apps ..................................................................................... 48 2.24. Service Location Protocol ...................................................................... 48 2.25. Simple Service Discovery Protocol ........................................................... 48 2.26. Syslog ................................................................................................. 49 2.27. Windows Marketplace ........................................................................... 49 2.28. X Font Server ....................................................................................... 49 3.Audio/Video ....................................................................................................50 3.1.050plus ................................................................................................52 3.2.6play ....................................................................................................53 3.3. Adobe Connect ...................................................................................... 53 3.4.AirVideo ...............................................................................................53 3.5. AllMusic.com ......................................................................................... 54 3.6.Aol.On ..................................................................................................54 3.7. Apple Airplay ......................................................................................... 54 3.8. Apple HTTP Live Streaming ...................................................................... 55 3.9. Baidu Player .......................................................................................... 55 3.10. BBC Player ........................................................................................... 55 3.11. Blip.tv TV Series .................................................................................... 56 3.12. Blockbuster.com .................................................................................. 56 3.13. ISO Base Media File Format .................................................................... 56 3.14.VodCCTV .............................................................................................57 3.15. Cnettv.cnet.com ................................................................................... 57 3.16.COMM ................................................................................................57 3.17. Apple FaceTime ................................................................................... 58 3.18. Flash Media Playback ............................................................................ 58 3.19. Free Music Download Pro - Downloader and Player ................................... 58 3.20. Fuze meeting ....................................................................................... 58 3.21. GoToMeeting Online Meeting ................................................................ 59 3.22. Grooveshark.com ................................................................................. 59 3.23.H225 ..................................................................................................59 4 Application Control Signatures 3.24.H245 ..................................................................................................60 3.25. h248 Protocol (Megaco) in binary mode ................................................... 60 3.26. h248 Protocol (Megaco) in text mode ...................................................... 60 3.27.HBOGO ..............................................................................................60 3.28. Howcast.com ....................................................................................... 61 3.29. Hulu.com ............................................................................................ 61 3.30. Inter Asterisk eXchange ......................................................................... 61 3.31.icall ....................................................................................................62 3.32. icecast ................................................................................................ 62 3.33.iTunes ................................................................................................62 3.34. magicJack ........................................................................................... 63 3.35. Cisco MeetingPlace ............................................................................... 63 3.36. Metacafe.com ...................................................................................... 63 3.37. Media Gateway Control Protocol ............................................................. 64 3.38. Microsoft Multimedia Streaming ............................................................
Recommended publications
  • Najlepsze Programy Do Pobierania Torrentów
    TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 Wybieramy dziesięć najlepszych programów do pobierania plików torrent. {reklama-artykul} Torrenty to nie najnowszy, aczkolwiek jeden z najbardziej popularnych sposobów pobierania plików z internetu. Zasada działania tej sieci jest bardzo prosta - każdy z użytkowników pobierając jakiś plik, udostępnia go także innym osobom, a prędkość pobierania jest uzależniona głównie od ilości aktywnych internautów. Do pobierania torrentów służą specjalne programy, różniące się między sobą ilością opcji konfiguracyjnych oraz poziomem skomplikowania. Poniżej przedstawiamy dziesięć najlepszych według nas klientów sieci torrent, które sprostają oczekiwaniom nawet najbardziej wymagających użytkowników. Kolejność rankingu jest całkowicie losowa. Vuze Licencja: Bezpłatna (freeware) / Rozmiar: 10.3 MB / System: Windows XP/Vista/7/8/10 Vuze obsługuje wszystkie popularne typy plików torrent, choć jego działanie nie kończy się na pobieraniu i udostępnianiu danych. Twórcy skupili się na szerszych możliwościach związanych z multimediami. Program posiada wbudowaną wyszukiwarkę, za pomocą której znajdziemy najnowsze filmy czy też muzykę na najpopularniejszych stronach z torrentami. To jednak nie wszystko. Vuze posiada również rozbudowane opcje społecznościowe, dzięki którym udostępnimy pliki naszym znajomym, a nawet przydzielimy im odpowiednią ilość pasma internetowego. Aplikacja posiada wbudowany odtwarzacz plików multimedialnych, by bez wychodzenia z programu podejrzeć to, co właśnie ściągnęliśmy. Vuze należy zatem traktować jako kombajn multimedialny oferujący możliwość pobierania plików torrent. Vuze - Pobierz za darmo! Program Vuze 1 / 7 TOP 10: Najlepsze programy do pobierania torrentów Wpisany przez Wojtek Onyśków Wtorek, 10 Listopad 2015 09:00 uTorrent Licencja: Bezpłatna (freeware) / Rozmiar: 1.73 MB / System: Windows XP/Vista/7/8/10 uTorrent to jeden z najpopularniejszych programów do pobierania plików torrent.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • My Friend P2p
    MY FRIEND P2P Music and Internet for the Modern Entrepreneur Lucas Pedersen Bachelor’s Thesis December 2010 Degree Program in Media Digital Sound and Commercial Music Tampereen ammattikorkeakoulu Tampere University of Applied Sciences 2 ABSTRACT Tampere University of Applied Sciences Degree Program in Media Digital Sound and Commercial Music PEDERSEN, LUCAS: My Friend p2p – Music and Internet for the Modern Entrepreneur Bachelor’s thesis 81 pages December 2010 _______________________________________________________________ The music industry is undergoing an extensive transformation due to the digital revolution. New technologies such as the PC, the internet, and the iPod are empowering the consumer and the musician while disrupting the recording industry models. The aim of my thesis was to acknowledge how spectacular these new technologies are, and what kind of business structure shifts we can expect to see in the near future. I start by presenting the underlying causes for the changes and go on to studying the main effects they have developed into. I then analyze the results of these changes from the perspective of a particular entrepreneur and offer a business idea in tune with the adjustments in supply and demand. Overwhelmed with accessibility caused by democratized tools of production and distribution, music consumers are reevaluating recorded music in relation to other music products. The recording industry is shrinking but the overall music industry is growing. The results strongly suggest that value does not disappear, it simply relocates. It is important that both musicians and industry professionals understand what their customers value and how to provide them with precisely that. _______________________________________________________________ Key Words: Music business, digital revolution, internet, piracy, marketing.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Cyber Security for Chinese Taipei
    ___________________________________________________________________________ 2020/TEL61/SPSG/009 Agenda Item: 7 Cyber Security for Chinese Taipei Purpose: Information Submitted by: Chinese Taipei Security and Prosperity Steering Group Meeting 9 October 2020 Cyber Security for Chinese Taipei 1. International Cooperation (update to September 2020) Chinese Taipei actively cooperates with international cybersecurity organizations in incident handling and response. From January to August 2020, Chinese Taipei (TWNCERT) received and handled 735 incident reports from international cybersecurity organizations. The incidents mainly fall under the categories of malware, login attempt, spam and phishing. Chinese Taipei (TWNCERT) also issued 2,042 incident reports to 65 international cybersecurity organizations, mainly fall under the category of suspicious network attack, as well as spam host and infected system. TWNCERT is a member of Asia Pacific Computer Emergency Response Team (APCERT) Steering Committee and the convenor of Training Working Group. Chinese Taipei aims to provide a platform for APCERT community to share and exchange valuable experiences and foster collaboration among members, thus raising the comprehensive cybersecurity defense capabilities of the Asia Pacific region. From January to August 2020, Chinese Taipei had convened three live streaming training programs, with a total of 22 APCERT member teams participating. TWNCERT also participates in the APCERT Drill Working Group, planning the APCERT Drill 2020 which was held in March
    [Show full text]
  • Comments of the Center for Democracy & Technology
    Comments of the Center for Democracy & Technology Regarding Agency Information Collection Activities: Arrival and Departure Record (Forms I-94 and I-94W) and Electronic System for Travel Authorization 19 August 2016 The Center for Democracy & Technology appreciates the opportunity to provide comments to the Department of Homeland Security on its proposal to begin requesting disclosure of social media identifiers and other online account information from Visa Waiver Program applicants. DHS proposes to ask foreign visitors applying for a waiver of visa requirements to provide “information associated with [their] online presence,” including the “provider/platform” and “social media identifier” used by the applicant. While the details of this proposed information collection are unclear, DHS’s Notice of Collection Activities states that the solicited online identity information “will enhance the existing investigative process” and “provide DHS greater clarity and visibility to possible nefarious activity and connections” of visitors to the United States.1 CDT is deeply concerned that this proposal would invade the privacy and chill the freedom of expression of visitors to the United States and United States citizens. Under the proposed changes, visitors to the U.S. who seek admittance through the Electronic System of Travel Authorization (ESTA), or complete Form I-94W, will be subject to unspecified review and monitoring of their public online activity by U.S. Customs and Border Protection (CBP) officials. This program will also increase the surveillance of U.S. citizens, both as a result of their online connections to visitors to the U.S. and because other countries may seek similar information from U.S.
    [Show full text]
  • Introduction to Web 2.0 Technologies
    Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information.
    [Show full text]
  • Raider of the Lost Art - What Kind of a Product Is Film?
    Raider of the Lost Art - What Kind of a Product is Film? Marketing Master's thesis Niklas Rinne 2013 Department of Marketing Aalto University School of Business Powered by TCPDF (www.tcpdf.org) Abstract Purpose of this study Film is a complex product that can be used in many different ways. The age of the digitalization has affected not only the product itself, but the way we consume it as well. If once film could be seen as a magical experience, then nowadays it reminds more of a disposable product. New innovations give us the freedom of enjoying it whenever and wherever. My objective in this research is to reveal the current value of film. How do we perceive films nowadays, how do we watch them and in the end what kind of a product film is in 2013? Methodology The theoretical framework discussed the literature relating to postmodernism, consumer culture theory, hedonic consumption, and downloading. The empirical part of the study is of the qualitative manner. The long interviews (McCracken, 1988) were used as data collection for the study. The ten participants all had a different approach to film, some worked with film and some studied film. Through these discussions I found ten different perceptions of film and ways of using film. The discussions revealed not only interesting ideas and concepts about the format of art itself. The question “how we use film “eventually lead to a much more fascinating question “why is it that we use film in that specific way”… Findings Every time an individual puts a film on, he/she has a goal.
    [Show full text]
  • List of Brands
    Global Consumer 2019 List of Brands Table of Contents 1. Digital music 2 2. Video-on-Demand 4 3. Video game stores 7 4. Digital video games shops 11 5. Video game streaming services 13 6. Book stores 15 7. eBook shops 19 8. Daily newspapers 22 9. Online newspapers 26 10. Magazines & weekly newspapers 30 11. Online magazines 34 12. Smartphones 38 13. Mobile carriers 39 14. Internet providers 42 15. Cable & satellite TV provider 46 16. Refrigerators 49 17. Washing machines 51 18. TVs 53 19. Speakers 55 20. Headphones 57 21. Laptops 59 22. Tablets 61 23. Desktop PC 63 24. Smart home 65 25. Smart speaker 67 26. Wearables 68 27. Fitness and health apps 70 28. Messenger services 73 29. Social networks 75 30. eCommerce 77 31. Search Engines 81 32. Online hotels & accommodation 82 33. Online flight portals 85 34. Airlines 88 35. Online package holiday portals 91 36. Online car rental provider 94 37. Online car sharing 96 38. Online ride sharing 98 39. Grocery stores 100 40. Banks 104 41. Online payment 108 42. Mobile payment 111 43. Liability insurance 114 44. Online dating services 117 45. Online event ticket provider 119 46. Food & restaurant delivery 122 47. Grocery delivery 125 48. Car Makes 129 Statista GmbH Johannes-Brahms-Platz 1 20355 Hamburg Tel. +49 40 2848 41 0 Fax +49 40 2848 41 999 [email protected] www.statista.com Steuernummer: 48/760/00518 Amtsgericht Köln: HRB 87129 Geschäftsführung: Dr. Friedrich Schwandt, Tim Kröger Commerzbank AG IBAN: DE60 2004 0000 0631 5915 00 BIC: COBADEFFXXX Umsatzsteuer-ID: DE 258551386 1.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]