Monday, December 30, 2019

Outline on the Effects of Reality Tv Essay examples

Outline: Research Paper: Reality TV and its influence on the younger generation I. Introduction A. Media has a huge impact on how people truly see themselves, particularly in women and young female teens. Reality television has made the standards of beauty quite high these days and there is a definite change in society’s view on what is truly beautiful. Turning off the TV has simply become too hard when it comes to reality TV shows 1. Turning into their favorite movie star is becoming more normal than ever. Skipping meals to look like the girl on the cover of the magazine keeps many people wandering what other lengths girls will go to to look like someone else. 2. These reality TV shows are gruesome and harmful to†¦show more content†¦Kids also have mistaken this show for an excuse to experiment with sexual desires. While high school students are taught to abstain from sex in numerous health classes, they learn from MTV that a lot of teenagers participate in sexual intercourse. This gives them the idea that sex is normal for young teens and that they should j oin the bandwagon too III. Kids experiment with drugs and alcohol when they see other kids their age on TV doing the same things IV. Young girl’s self-images are influenced by the reality TV shows they watch. A. Girls especially are influenced by what they see on TV. 1. Most girls will do whatever it takes to be skinny and look like the stars that weigh 100 pounds ...the media influence on the cultural phenomenon of dieting and the perfect body. â€Å"Commercials and reality TV shows make you feel bad about yourself so you buy into the fad, Cohn said. The diet industry earns $50 billion each year on diet pills, and $8.4 billion is spent every year on cosmetic surgery. Women -- and men, Cohn stressed -- want to be thin, because large men and women are ridiculed (Demmel). Eating disorders continues to be problem among young girls because of their role models. Girls on reality TV shows have that perfect body and girls what to be everything like them. B. Influences girls to want to alter theirShow MoreRelatedThe Reality Of Reality Tv991 Words   |  4 PagesI truly believe that reality TV needs a different name. At first reality TV was created with the aim to depict reality, but over tim e different interests and actions have resulted in doing the opposite of this. I would even go so far to say that reality TV has become just as fictional as fiction based television. â€Å"Reality† is defined as â€Å"the world or the state of things as they actually exist, as opposed to an idealistic or notional idea of them†. However, Reality TV in no way represents this definitionRead MoreDiscuss The Article ‘Reinforcing The Myth: Constructing1546 Words   |  7 PagesAustralian identity in â€Å"reality TV† ’. The main contention in Price Erma’s article ‘ Reinforcing the myth: Constructing Australian identity in â€Å"reality TV† ’ which published online on May 2010, is to portray the myth of Australian identity shows in TV that there is a balance to measure how much is true, how much is false. Erma leads the reader to understand that the myth is against ‘reality TV’ because there always has tension between ideas of credibility and performance even TV shows are based on ‘real’Read MoreResearch Paper Outline on Violence in Media Contributes to Violence in Children888 Words   |  4 PagesResearch paper outline/Annotated bibliography Introduction The media is generally seen by people as a way of conveying the truth. If something is seen on TV, has been heard on the radio or something has been read in the newspapers then it is perceived as being the truth. Throughout history the media has been used as a tool to convey different messages to people. The issue of the behavior of children when exposed to violence on media has been an issue to be debated upon and studied for a very longRead MoreThe Code And Conventions Of The Tv Show American Choppers Based From Orange County, New York1500 Words   |  6 PagesReality Television is a genre of television programming that documents unscripted situations and actual occurrences. The genre often highlights personal drama and conflict between characters to a much greater extent than other genres. (Lyle, 2008)The paper seeks to analyze the codes and conventions of authenticity used in the TV show American Choppers based in Orange County, New York. This reality-based TV show outlines the lives of Paul Teutul Sr., his son Paul Jr., makers of the universe s mostRead MoreViolence on Television Can Have Negative Effects on Children1210 Words   |  5 Pagesdesensitizes children to violence, and similarly incorrect portrayals of sex on television may contribute to adolescent sex. Violence, and sex on television negatively impacts todays youth, and adolescents. In fact, a main contributor to these negative effects on children are caused by parents. Some parents pay little to no attention to the ratings of television shows, or movies, or the amount of sex, and/or violence their child sees on television. Studies indicate as follows,Many parents find the entertainmentRead MoreScience Fiction : Reality And Fiction1325 Words   |  6 PagesDeforest Kelley played Dr. McCoy in the classic science fiction TV Show Star Trek. Kelley’s favorite thing about playing a doctor on television was when people would tell him, that they became a doctor because of a fictional character he played. Fiction is a dream of â€Å"what could be†, a plan to outline in front of an audience saying over and over again, â€Å"This could be you, you can make this, you can be this.† The best example of this is in science fiction, as science fiction is known to predict futureRead MoreThe Impact Of Media On A Global Level1616 Words   |  7 Pagesabili ty to interpret a series of squiggles as letters with meaning. Now, as language and modes of communication are evolving, so are the definitions of literacy. Media messages are rapidly assimilating into culture at unprecedented rates, with lasting effects. The makes it just as necessary for people to understand how to interpret media messages as it is for them how to know to read printed language (Thoman Jolls, 2004). While media literacy was initially implemented into American curricula as a wayRead MoreExposing Our Children to Subliminal Messages890 Words   |  4 Pagesto. The shows, movies, and even commercials children are watching effect not only their actions and thought process but can also effect the future decisions and choices they make. From the day we are born to the day we die we have seen many different movies and seen many different TV shows; while we are watching and hearing these through our own eyes and ears we do not truly realize what our brains are consuming, because in reality we are viewing and hearing much more than we can naturally see. SubliminalRead MoreThree Theoretical Approaches Essay784 Words   |  4 PagesOutline the three theoretical approaches discussed in the text. What image is held of each? What core questions does each approach ask? Which of the three approaches strikes you as the most useful? Why?   Approaches 1. Structural-functional approach * Sees society as complex system * Promotes solidarity and stability * Macro-level orientation * Social structure * Social functions * Manifest functions * Latent functions * Social dysfunction * What makes societyRead MoreReality Shows And Its Effects On The World s View Of Society2118 Words   |  9 Pagestelevision, social media and the made up notion of what reality is. Reality Television shows are defined as a program purposely and continuously filmed and is intended for pure entertainment and not education. Reality shows can be found on almost every single television network, from PBS to The O Network. Many Americans are addicted and obsessed with these staged situations that they believe are part of some normal way of living. Television and reality shows have somehow become part of our everyday lives

Sunday, December 22, 2019

Computer Components The Graphics Card - 796 Words

Introduction The Graphics Card is computer component in most modern day PCs. The Card uses the PCI (Peripheral Component Interconnect) or PCI-E (PCI Express) slots on the motherboard. It’s used to show all of the visuals on the computer screen: it can use the following: DIV (Digital Visual Interface), VGA (Video Graphics Array), and HDMI (High-Definition Multimedia Interface) output. The oldest of the three is VGA; VGA was made in 1987 and still used to this day. The next one used is DVI. DVI is a lot newer than VGA but it’s still not the greatest now a day’s. The last and newest is HDMI; HDMI is what most people use today. It was made in the late 20’s. I wrote this paper about the graphics Card because I have always been fascinated with them, every day I use them I always wanted to know how they worked. Out of every other computer part without them we would have to just use the command prompted, which is very hard without understanding computers more in-depth. I eval uate my resources by comparing the deferent information I gathered with other web sites, and I asked my Instructor if I thought something about the information I was getting was wrong. Most if all of my information is coming from web sites. My topic has to deal with part computers for I think using the web to find most of my information is fitting, the web is very useful with dealing with this topic there are many articles dealing with it. In the body of this paper the following will be talked about in detail:Show MoreRelatedPersonal Note On Computer Games1551 Words   |  7 Pagesto do with a computer? Personally, I like to do a few things on a computer. My most favorite thing to do in a computer is to play a computer games. I choose to play games in a computer due to a few reasons, which are the graphics, availability and portability. Firstly, I choose to play games in my computer for its flawless graphics it displays on the screen, especially the recently released games. Personally, computer has the ability to process quite a delightful quality of graphics. What reallyRead MoreA Report On Gaming Pc1587 Words   |  7 PagesGaming PC The user will mainly use this computer for playing highly graphical video games such as Far Cry 4, the Call of Duty Franchise and Counter Strike: Global Offensive. The user will be using this pc for hours a day, so he/she will need a pc which is able to handle hours of gaming and being able to run the games at at least 60FPS and be able to run them at high graphical settings and be able to display these graphics in 1080x1920 resolution. The components needed for this: Case - Thermaltake R31Read MoreWindows Desktop Pc : Components And Hardware Description Essay1441 Words   |  6 PagesWindows desktop PC Component/Hardware Description Motherboard A motherboard is the arguably the biggest, necessary component of any computer as it is the piece of equipment which connects all the other components together. This is done by containing many smaller pieces of hardware, slots and ports. The majority, if not all, motherboards work with processors only from Intel or AMD. Case and Fans The case of a computer reduces the amount of dust that can access the components that make a PC, whichRead MoreInformative Speech Outline On A Computer821 Words   |  4 Pagesbuild a computer General purpose: To inform Specific Purpose: To inform my audience how to build a computer and the components need it. Introduction: I. Attention-getting and orientation material: Have you ever consider build your own computer? II. According to Brian Benton, a IT director/chief engineering technician, one of the reason to build a computer it’s because â€Å"It’s much easier to get exactly what you want† II. Thematic Statement: Today, I hope to inform you about the components that youRead MoreP5. How I Install Ram Essay1294 Words   |  6 Pagesbe installed on your computer, the majority of motherboards however will have a limit to how much memory can be utilised, regardless of the amount of RAM slots. 3. Browse the options available to you for companies to purchase RAM form, this will determine the: pricing, quality and time in which you receive your new RAM. A few of the most reliable companies that sell RAM are: Kingston, OCZ, G. Skill and Crucial. 4. Now that you have the correct RAM specifically for your computer you will need to turnRead MoreDifferent Types Of Cloud Storage : Information And Drives1620 Words   |  7 PagesCAPACITY IMAGE USB PENDRIVE USB Pen Drives are often used for the same purposes as the floppy disks or CDs were used. This means they are used for storage, data back-up and transfer of computer files from one computer to another one. 2GB TO 256GB SD/ MICRO SD MEMORY CARD Micro SD is a type of removable flash memory card used for storing information, data, and etc. This type is mainly used in Mobile Phones, Tablets and Cameras. 2GB TO 256GB MAGNETIC TAPE STORAGE Magnetic tape data storage is aRead MoreBuilding a Gaming Computer1125 Words   |  5 Pages Building a gaming computer may be an intimidating endeavour, but in all actuality with a little hard work anyone can be a whiz at putting together a gaming computer. Why build a custom gaming PC? Well it’ll save money, and give the builder a great experience. It’s always fun to learn how different things work. The price of a top of the line retail gaming computer runs from two thousand on up to five thousand dollars and beyond, a monitor alone could cost one thousand dollars. The two types of gamingRead MoreBuilding A Computer Essay1036 Words   |  5 PagesYou can save money by building your own computer rather than buying it from a retail store. Today you will be learning how to build your own pc step by step. There’s a lot of steps when it comes to building a computer. From getting the case of the computer to all the hardware. First of all you will need to know what kind of computer you will be wanting to build for example, if you want to build a home office for word processing, you will have much different requirements than if you were to be buildingRead MoreEssay about Chapter 1 Lab848 Words   |  4 PagesChapter 1 First Look at Computer Parts and Tools Lab 1.1 Record Your Work and Make Deliverables Review Questions 1. What are the eight categories in the Category view in Control Panel? Answer: System and Security Network and Internet Hardware and Sound Programs User Accounts and Family Safety Appearance and Personalization Clock, Language and Region Ease of Access 2. What are the four file types that can be used to save a snip using the Windows SnippingRead MoreThe Daunting Task of Buying a Computer877 Words   |  3 Pages Buying a computer can be a daunting task fraught with many choices, depending on your needs. The process can be simplified by determining what your primary use for the computer will be and picking specific components geared towards your use. The main components that one must select from is the CPU, Video Card, Hard Drive, and Memory or RAM as its known in the Tech world. The CPU is an acronym for the Central Processing Unit. The CPU is the brains of the computer, where all the calculations

Saturday, December 14, 2019

Math Portfolio Ib Circles Free Essays

MATHS PORTFORLIO SL TYPE I CIRCLES ? In this portfolio I am investigating the positions of points in intersecting circles. (These are shown on the following page. The following diagram shows a circle C1 with centre O and radius r, and any point P. We will write a custom essay sample on Math Portfolio Ib Circles or any similar topic only for you Order Now The circle C2 has centre P and radius OP. Let A be one of the points of intersection of C1 and C2. Circle C3 has the centre A, and radius r. The point P? is the intersection of C3 with (OP). This is shown in the diagram below. As shown on the assignment sheet, r=OA. We therefore need to find the values of OP? hen r=OA=1 for the following of the values of OP: OP=2, OP=3 and OP=4. We first of all extract the triangle OPA from the above diagram and since we have the values for all the three sides we can finds the angle AOP which will later on help to get the value of length OP?. The circle C2 and triangle OPA are shown below with all side of OPA indicated. OP=AP since they are the radii of the same circle, C2. Having all the three sides, we can now calubulate the angle AOP using the cosine rule. Angle AOP is calculated below: Cos AOP=(2^(2 _ ) 2^(2 _ ) 1^2)/(-2? 2? 1) Cos AOP=0. 25 ? AOP =COS-10. 5 =75. 52248781 ?75. 5? Since we now having the triangle AOP, we can extract the triangle AOP? from the diagram shown on the previous page which in return will help us to find OP? using the sine rule. The triangle AOP? is shown below: O P For accuracy the value of angle AOP will be used as cos-10. 25 instead of 75. 5?. Since triangle AOP? is an isosceles triangle, AOP=AP? O=cos-10. 25. Therefore OAP? = (180-(2? cos-10. 25)). The calculation of the value of OP? is shown below: (OP? )/(sinOAP? )=(AP? )/(sinAOP? ) (OP? )/sin? (180-(2 cos? ^(-1) 0. 25) ) =1/sin? (? cos? ^(-1) 0. 5) op? = 1/sin? (0. 25) ? (180-(2 cos? ^(-1) 0. 25) ) op? =1/2 When OP=3, the triangle OPA and the calculation of OP? are as follows: Cos AOP = (3^2-3^2-1^2)/(-2? 3? 1) Cos AOP = 1/6 ? AOP = cos-1 1/6 =84. 4? From the triangle AOP? we can now calculate the length of OP? using the sine rule as before. The triangle AOP? and the calculator of OP? is shown below: A 16 OP’ AP? O=AOP? =cos-11/6 OAP? = (180-(2 cos? ^(-1) 1/6) (OP? )/(sinOAP ? )= (AP? )/(sinAOP? ) (OP? )/sin? (180-(2 cos? ^(-1) 1/6) ) =1/sin? (? cos? ^(-1) 1/6) op? = 1/sin? (1/6) ? (180-(2 cos? (-1) 1/6) ) = 1/3 When OP=4; Cos AOP =(4^2-4^2-1^2)/(-2? 4? 1) Cos AOP = 1/8 ? AOP =cos-1 1/8 =82. 4? Using the sine rule; (OP? )/(sinOAP ? )= (AP? )/(sinAOP? ) (OP? )/sin? (180-(2 cos? ^(-1) 1/8) ) =1/sin? (? cos? ^(-1) 1/8) op? = 1/(sin? (? cos? ^(-1 ) 1/8))? (180-(2 cos? ^(-1) 1/8) ) = 1/4 When OP=2, OP? = 1/2;when OP=3 , OP? = 1/3 and when OP=4, OP? = 1/4 . This indicates that the value of OP? is dependent on the value of OP. In fact it is inversely proportional to the value of OP. To arrive at the value of OP? , 1 is divided by the value of OP. Therefore generally, the value of OP’ can be written as: OP=r/OP Moreover, from the values of OP? calculated above, it is observed that the value of OP? is twice Cos AOP. The general statement therefore can be written as: OP? = 2 Cos? Let OP=2. Find OP? when r=2, r=3 and r=4. Describe what you notice and write a general statement to represent this. Comment on whether or not this statement is consistent with your earlier statement. First of all we need to calculate the value of OP? when OP=2 and r=2. The triangle AOP now looks like as follows: A 22 1. 5P’ Since all the sides are of the same length, then AOP=APO=OAP=60Â ° (according to the angle sum of the triangle). The triangle AOP? is shown below from which OP? is found. A 22 O2P’ AO=AP? from the diagram given on the lab sheet, therefore AOP=APO=60Â °. The remaining angle OAP= (180-(2? 60)) = 60Â °. This then means that triangle AOP? is an equilateral triangle – all its sides are the same. ?AO=AP? =OP? =2 We now need to calculate the value of OP? when OP=2 and r=3. Below is the triangle AOP and the calculation of angle AOP. 22 3 Cos AOP = (2^2-2^2-3^2)/(-2? 2? 3) Cos AOP = 3/4 AOP = cos-1 3/4 = 41. 4Â ° Having calculated the value of angle AOP, we can now calculate the value of OP? from AOP? using the sine rule as shown below: A 33 O P? Angle OAP? = 180-(2 Cos? ^(-1) 3/4) (OP? )/(sinOAP ? )= (AP? )/(sinAOP? ) (OP? )/sin? (180-(2 cos? ^(-1) 3/4) ) =1/sin? (? cos? ^(-1) 3/4) op? = 1/sin? (? cos? ^(-1) 3/4) ? (180-(2 cos? ^(-1) 1/8) ) =9/2=4. 5 The value of OP? is now calculated when OP=2 and r=4 using the same method as above. 22 O4P 44 P? Cos AOP = (2^2-2^2-4^2)/(-2? 2? 4) Cos AOP = 1 ? AOP = cos-1 1= 0 AOP? =AP? O=0 ?OAP? =180-(2? 0) = 180Â ° OP? 2= OA2+ AP? 2-2? OA? AP? Cos OAP? = 42+42-2? 4? 4 Cos 180Â ° = 64 OP? = v64 = 8 Below is the table for the vales of r, OP and OP’ when OP is kept constant. ROPOP’ 222 324. 5 428 When OP=2, OP? =2; when OP=3, OP? = ( 9)/2 and when OP=4, OP? =8. From these results it can be seen that the length OP? increases with the increasing length OP and the general statement for the variation in the values of OP? is as follows: OP? = r^2/OP. This general statement is not fully consistent with the first one because r/OP is not always equal to r^2/OP. When the above values are substituted into the first general statement, wrong values of OP? are obtained but the latter general statement holds for both data. However both the general statements hold true when r=1 since 12=1, which indicates that for this value of r, r^2/n=r/n. Use technology to investigate other values of r and OP. Find the general statement of OP?. I used GeoGebra to draw the intersecting circles with the values of r and OP stated and the values of OP? were automatically calculated. When r=1and OP=2 OP=0. 5 How to cite Math Portfolio Ib Circles, Essay examples

Friday, December 6, 2019

Threat to Personal Privacy Posed by the Emerging Networking

Question: Discuss about theThreat to Personal Privacy Posed by the Emerging Networking. Answer: Introduction The information technology have helped in enhancing the life style of the human being in the world. The use of the information technology in the market have modified the technological aspects of the human being. There are various associated with the privacy of the information technology. This report discusses about the privacy issues in the networking. There has been a proper analysis of the threats in the info ration technology on the networks. This report outlines the basic threats that are prevailing in the network. A proper evaluation of the threats has been done in the report. There are various recommendation have been provided that helps in mitigating the challenges in the network security. Identification to issues The use of the internet has increases the threats to the privacy of the personal data and information of the users all over the world [1]. Cybercriminals are causing major risk to the personal data d information of the users. There are gas been many reports of the cyber-attacks in the world that have caused data loss in the organization and at personal level. Technology with weak security Many new technologies are released in the market in a daily basis. However, the security protocols of these devices and technologies are not so good to prevent form cyber-attacks in the world [2]. The hackers cab easily breach into these devices and breach all personal information. Social media attacks Hackers are now focusing in the social media including the Facebook and Twitter. Many users are sharing their personal information over these social media websites [3]. This has been attracting the hackers to attack their accounts and breach their personal data and information. Third-party entry Security experts have seen chance in mobile phone security since the initial of availability to Internet. Considering the way of life's unbreakable dependence on mobile phones and how little cybercriminals have focused on them, it makes a cataclysmic risk [4]. Target is the ideal specimen of a noteworthy system attacks through outsider section focuses [5]. The worldwide retailer's HVAC merchant were deplorable worker whose qualifications were stolen and used to take money related informational indexes for 70 million clients [6]. Lack of Encryption The lack in the encryption of data has been a major cause for the cyber-attacks in the network. The data packets needs to be encrypted during transmission. Ensuring sensitive business information and still is measure couple of businesses presently cannot seem to grasp, in spite of its adequacy [7]. The encrypted from data and information in the network helps in maintaining the security of the data. The data packets over the network are transmitted with encryption.[8]. Analysis The various cyber-attacks in the network has been causing a great threat to the privacy of the users over the network. The lack in the security of the data and information over the network have caused cyber-attacks over the network. The security of the personal data over the network can be accessed by using the IP address of the user over the network. Data assurance laws are in compel in all countries. The data standard hidden these laws is the prerequisite of educated assent for preparing by the information subject [9]. These improvements have on a very basic level changed practices of data innovation. Even inside the scholarly research field, momentum practices of composing, submitting, inspecting and distributing writings, for example, this one would be incomprehensible without data innovation. In the meantime, many gatherings group data about distributions, creators, and so on. This empowers suggestions on which paper researchers should read, however in the meantime manufactures a detailed profile of every individual researcher [10]. As network expands for accessing the data, it additionally for specialists to act in light of the new wellsprings of data. When these sources contain personal data, risks of damage, imbalance, separation, and loss of self-sufficiency effortlessly rise [11]. Besides, frameworks instead of clients may choose which data is shown, in this manner defying clients just with news that matches their profiles [12]. The lack in the security of the data and information over the network have caused cyber-attacks over the network. The security of the personal data over the network can be accessed by using the IP address of the user over the network. Recommendations There are various techniques that helps in preventing the personal data and information for hacking. The users are recommended not to share their personal information over the internet including social media. The personal data and information includes contact number, address, age and banking information. These are not secure over the internet. The use of an updated antivirus and firewall helps in providing security to the system. This prevents viruses and malwares from entering into network of users. Therefore, it prevents form the cyber-attacks over the internet. Conclusion It can be concluded that the cyber security over the network. Many new technologies are released in the market in a daily basis. The hackers can easily breach into these devices and breach all personal information. There are various recommendations provided in the report for mitigating the challenges in the risk of the personal data and information. References [1] Cao, Ning, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. "Privacy-preserving multi-keyword ranked search over encrypted cloud data."IEEE Transactions on parallel and distributed systems25, no. 1 (2014): 222-233. [2] Li, Yibin, Wenyun Dai, Zhong Ming, and Meikang Qiu. "Privacy protection for preventing data over-collection in smart city."IEEE Transactions on Computers65, no. 5 (2016): 1339-1350. [3] Xia, Zhihua, Xinhui Wang, Xingming Sun, and Qian Wang. "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data."IEEE Transactions on Parallel and Distributed Systems27, no. 2 (2016): 340-352. [4] Hashem, Ibrahim Abaker Targio, Ibrar Yaqoob, Nor Badrul Anuar, Salimah Mokhtar, Abdullah Gani, and Samee Ullah Khan. "The rise of big data on cloud computing: Review and open research issues."Information Systems47 (2015): 98-115. [5] Sicari, Sabrina, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. "Security, privacy and trust in Internet of Things: The road ahead."Computer Networks76 (2015): 146-164. [6] Aggarwal, Charu C., Naveen Ashish, and Amit Sheth. "The internet of things: A survey from the data-centric perspective." InManaging and mining sensor data, pp. 383-428. Springer US, 2013. [7] Perera, Charith, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, and Albert Y. Zomaya. "Big data privacy in the internet of things era."IT Professional17, no. 3 (2015): 32-39. [8] Roman, Rodrigo, Jianying Zhou, and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things."Computer Networks57, no. 10 (2013): 2266-2279. [9] Fallahi, Amin, Xi Liu, Yuzhe Tang, Shuang Wang, and Rui Zhang. "Towards Secure Public Directory for Privacy-Preserving Data Sharing." InDistributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on, pp. 2577-2578. IEEE, 2017. [10] Nandwani, Mona, and Rishabh Kaushal. "Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms." InInternational Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 342-353. Springer, Cham, 2017. [11] Tso, Raylin, Abdulhameed Alelaiwi, Sk Md Mizanur Rahman, Mu-En Wu, and M. Shamim Hossain. "Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud."Journal of Signal Processing Systems89, no. 1 (2017): 51-59. [12] Gangadharan, Seeta Pea. "The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal Internet users."new media society19, no. 4 (2017): 597-615.