Sunday, December 29, 2019

Analysis Of Charlotte Bronte s Jane Eyre - 1110 Words

Women have never been considered equal to men. They have not been since the beginning and although we say they are now, many would probably disagree. Charlotte Brontà « was no exception to this rule- she knew that society expected women to fit into a specific category rather than be their own individuals and she expressed her frustration towards this in Jane Eyre. Within this brief passage, Charlotte Brontà « elegantly employs symbolism, allusions, and diction in order to assert Jane’s determination to stay true to herself, despite the pressures exerted on her by society. To be honest, the amount of symbolism within the passage is actually quite minor in comparison to the rest of the novel, where it can be found in scores. However, the particular symbol Brontà « uses is a part of her rather prevalent symbolic pair of fire and ice. Brontà « has the tendency to link Jane to these two elements, subtly revealing the sharpness of the two contrasting boxes the world demands Jane to fit herself in: religion and secularity. Society views religious women as cold and devoted to labor, loving only towards God. On the other hand, more secular women are viewed as wild and passionate, although they walk a thin line between madness and sanity. To this end, examine the very example of the fire in Jane that the passage provides: â€Å"They have a worth—so I have always believed; and if I cannot believe it now, it is because I am insane—quite insane: with my veins running fire, and my heart beatingShow MoreRelatedAnalysis Of Charlotte Bronte s Jane Ey re 2054 Words   |  9 Pageswith the present and consumed by desire and materialism, resulting in their inevitable self-destruction. In Charlotte Brontà «Ã¢â‚¬â„¢s gothic novel, Jane Eyre, Brontà « creates a multitude of characters that represent the extremes of the id and the superego to contrast with Jane’s more balanced, ego-dominated self in order to reveal the dangers of falling out of balance within oneself. In doing so, Brontà « illustrates an aspect of the human condition that reveals that in order to maintain both inner and outerRead MoreAnalysis Of Charlotte Bronte s Jane Eyre 1245 Words   |  5 Pagesjust two examples of how Charlotte Bronte used the narrator to address the reader. In the novel Jane Eyre, Charlotte Bronte has the narrator address the reader as a friend to show compassion for her situation, to be understanding, and to make an argument. Charlotte Bronte refers to the reader threw out the novel in order to show the progression of the book. Whi le this story is about someones life there is an essence of Jane telling us this story of her life in her old age. Jane throughout the novel isRead MoreJane Eyre By Charlotte Bronte1374 Words   |  6 PagesJane Eyre by Charlotte Bronte Within the specter of the Gothic fictions arises the atmosphere of gloom, terror, and mystery with some elements of uncanny challenging reality. One major characteristic function of the Gothic fictions is to open the fiction to the realm of the irrational and perverse narratives, obsessions, and nightmarish terrors that hide beneath the literally civilized mindset in order to demonstrate the presence of the uncanny existing in the world known rationally through experienceRead MoreVictorian Schools Using Hard Times And Jane Eyre916 Words   |  4 PagesUnfair Treatment (An analysis of Victorian schools using Hard Times and Jane Eyre) The Victorian Era was a time of much turmoil. Through the reign of Queen Victoria there were many aspects of society that took a standstill and some may say, declined. Education is a tremendous example of the stand still in the British society, showing the negative approaches to teaching. Preston Barker wrote about the conditions of victorian schools explaining, â€Å"Children soon learnt to do what the teacher asked, otherwiseRead MoreAnalysis Of The Poem Second Child And Maria Branswell S Fifth Child2059 Words   |  9 Pagesbirth, the Bronte-Branswell family moved to another part of Yorkshire known as Haworth so her father had been given the opportunity of being perpetual curate to the S., Michael and All Angels Church. However while in Haworth, a deep tragedy stroke the family on September 15, 1821 when their loving mother had died of cancer. The family wasn’t fully abandoned for the sister of Maria, Elizabeth Branwell, had greatly helped Patrick on raising his five d aughters, Maria, Elizabeth, Charlotte, Emily, andRead MoreLiterary Analysis : Emily, Wuthering Heights, And Jane Eyre924 Words   |  4 PagesLiterary Analysis The novels Emma, Wuthering Heights, and Jane Eyre were written by women in the 1800’s. The three writers chose to write and publish their novels under a different name from their own. Emma was written by Jane Austen, and published anonymously in 1815 (Behrens and Rosen 361). Emily Brontà « wrote Wuthering Heights, and was published in 1847 under the name Ellis Bell (Behrens and Rosen 368). The author of Jane Eyre, who was also the sister of Emily Brontà «, was Charlotte Brontà «. This novelRead MoreThe Upbringing Of Orphans By Charles Dickens And Jane Eyre1714 Words   |  7 Pagesabout the injustices of the conditions of the orphans. The novels Oliver Twist by Charles Dickens 1838 and Jane Eyre by Charlotte Bronte 1847 depicted much of the 19th century working class and illustrated the treatment of orphans with different socio-economic perspectives. The role of the two orphans in the novels (Oliver and Jane) leads the reader through a maze of experiences, encountering li fe s threats and grasping its opportunities. The novels show an insight of the two characters with a commonRead MoreJane Eyre : A Fight For Women s Equality1749 Words   |  7 Pages Jane Eyre: A Fight for Women’s Equality Feminism: the doctrine advocating social, political, and all other rights of women equal to those of men (dictionary.com). Throughout history, women have fought for and struggled with gaining full and absolute equality in society--which has proven to be difficult in the long-cultivated patriarchal society that we still live in today. In modern times, women continue to be paid less than men, are vastly underrepresented, and face many forms of violence aroundRead MoreFeminism in Jane Eyre1423 Words   |  6 PagesFeminism in Jane Eyre Jay Sheldon Feminism has been a prominent and controversial topic in writings for the past two centuries. With novels such as Jane Austens Pride and Prejudice, or even William Shakespeares Macbeth the fascination over this subject by authors is evident. In Charlotte Brontes Jane Eyre the main character, Jane Eyre, explores the depth at which women may act in society and finds her own boundaries in Victorian England. As well, along with the notions of feminism oftenRead More Movie - Feminist Themes in Jane Eyre, Novel and Film Versions2260 Words   |  10 PagesAn Analysis of Feminist Themes in Jane Eyre and its Film Versions  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   Concern for womens rights dates from the Enlightenment, when the liberal, egalitarian, and reformist ideals of that period began to be extended from the bourgeoisie, peasants, and urban laborers to women as well. As did most interest groups of the time, feminists gained force and stability through its writing. The periods blossoming ideas concerning womens rights were fully set forth in Judith Murray’s On the

Saturday, December 21, 2019

What Is Value Chain Analysis What Does a Firm Gain When...

Developed by Michael Porter , Value Chain Analysis is an analytical framework that is used to analyse relationships between various parts of operations and the manner in which each part adds value to contribute to the level of revenues. Value Chain Analysis the business activities are divided into two categories: primary activities and support activities. The primary activities directly deal with the creation of products or services, whereas, support activities can be used to obtain or increase competitive edge in the marketplace. Primary activities: Inbound logistics; Operations; Outbound logistics; Marketing and sales; Service. Support activities: Infrastructure activities; Technology; Human resource management and development.†¦show more content†¦For Pacific Coffee it would be coffee beans and raw food items, as well as fixed assets such as buildings, machinery etc. Part A 2 a) Cost Leadership Strategy A firm chooses a cost leadership business strategy focuses on gaining advantages by reducing its costs to below those of all its competitors. This does not mean that this firm abandons other business or corporate strategies. Cost Leadership and Five Forces Mode Assignment 1 Lu Janet Tao S05001741 A. Cost Leadership and the Threat of Entry 1) It helps to reduce the threat of new entrants by creating cost barriers to entry 2) New entrants may have to invest heavily to reduce their costs prior to entry 3) New entrants will enter using another business strategy rather than attempting to compete on cost. B. Cost Leadership and the Threat of Rivalry The threat of rivalry is reduced through pricing strategies that low-cost firms can engage in and through their relation impact on the performance of a low-cost firm and its higher-cost rivals. C. Cost Leadership and the Threat of Substitutes High-cost firms may have to charge high prices to cover their costs, thus making substitutes more attractive , cost leaders can keep their price low and still earn normal or above-normal economic profits. D. Cost Leadership and the Threat of Powerful Suppliers 1) A cost leaderShow MoreRelatedEvaluating The Cost Structures Of A Firm And Determine The Reason For Expenses Increasing991 Words   |  4 Pagesshifts can either work effectively or ineffectively. Managers pursue many approaches to find the most effective route to successfully implementing a strategic plan for increasing a firm’s financial position. The pertinent information gain from historical and assumed future data allows managers to plan accordingly. The main purpose of this study is to evaluate the cost structures of a firm and determine the reason for expenses increasing, if certain situations occurs. Bloch et al (2013) describes four stagesRead MorePorters Five Forces, Value Chain, Balanced Score Car4410 Word s   |  18 PagesCritically evaluation of Porters five forces, Value Chain Analysis, Balanced Scored Card Given the demands of todays competitive and dynamic environment, it is quite challenging to understand strategic issues facing organizations and develop the capability for long term organizational success. This report aims to present a critically analysis of three frameworks across organizations: Porters Five Forces, Value Chain and Balanced Scorecard. Such critical evaluation includes identifying the benefitsRead MoreInternal Analysis: Distinctive Competencies, Competitive Advantage and Profitability4160 Words   |  17 PagesInternal Analysis: Distinctive Competencies, Competitive Advantage and  Profitability Posted on November 8, 2010 by Domingo Salazar, MBA The Roots of Competitive Advantage The Internal analysis is concerned  with the identifying the strengths and weaknesses of the company. The main implications on the read material about strategy formulation are as follows:   Starting on distinctive competencies, we can differentiate its products from its rivals, in order to  determine  our/them strengths, includingRead MoreWal Marts Competitive Advantage1744 Words   |  7 PagesWal-Mart Stores Inc. is American multinational retail corporation that operates a chain of discount department stores and a warehouse stores. The company is headquartered in Bentonville, Arkansas and was founded by Sam Walton. Wal-Mart is the world’s largest company by revenue, according to Fortune Global 500 list in 2014 and the biggest private employer in the world with over two millions employees. Wal-Mart analytical strategy is to focus on selling products at low prices to get higher volume salesRead MoreEvaluating Sainsbury s Resources And Capabilities Also For The Future Movement1725 Words   |  7 PagesIntroduction This report aims to evaluate Sainsbury’s policies in Egypt by implementing several frameworks such as SWOT, VRIO and PESTEL analysis, and FDI (Greenfield, Joint venture, Franchising). This report is using former evaluating tools in order to diagnose Sainsbury’s resources and capabilities also for the future movement in Egypt. [1]Analysis of internal environment [SWOT AND VRIO] 1-1 SWOT SWOT analysis is a useful method to investigate internal environment. By implementing SWOT as anRead MoreKudlers Strategy Essay1675 Words   |  7 PagesKudler’s Strategy Kudler Fine Foods is in a position to use its information technology, marketing strategies, and sales plans to create a prominent place in their niche market. Focusing on internal and external environments will help Kudler formulate a successful plan for the future and prepare for the changes that occur in such a diverse platform of partnerships, contracts, suppliers, and customers. Having a sales plan in place shows forward thinking of the management team. Planning is the mostRead MoreCorporate Level Of The Mcdonalds1329 Words   |  6 PagesThere are few business firms anywhere in the world that have been able to sustain the level of growth of McDonalds. McDonalds began by selling only hamburgers and has expanded its menu as well as its franchises on a global platform. According to Robert Hartley, McDonalds Corporation faced a decline. McDonalds Struggled to grow as a result of constantly opening new stores, the acquisition of other fast-food franchises and a few discrepancies i n the McDonalds menu. (Hartley, 2014, p.75). But asRead Moreidentifying competitive advantage3121 Words   |  13 Pagesorganization s customers place a greater value on than similar offerings from a competitor. Unfortunately, competitive advantages are typically temporary because competitors often seek ways to duplicate the competitive advantage. In turn, organizations must develop a strategy based on a new competitive advantage. When an organization is the first to market with a competitive advantage, it gains a first-mover advantage. The  Ã‚  first-mover advantage  occurs when an organization can significantly impactRead MoreCrafting and Executing Strategy Study Guide9008 Words   |  37 PagesChapter 1 What Is Strategy and Why Is It Important? CORE CONCEPTS A company s strategy consists of the competitive moves and business approaches that managers are employing to grow the business, attract and please customers, compete successfully, conduct operations, and achieve the targeted levels of organizational performance. A company achieves sustainable competitive advantage when an attractive number of buyers prefer its products or services over the offerings of competitors and when the basisRead MoreStrategic Management and Study Question6617 Words   |  27 PagesMonday, October 01, 2007 Chapter 11 Strategy in International Business Multiple Choice Questions STUDY QUESTION 1: What are some of the general features of the challenge and importance of strategy in international business? 1. Generally, managers planning strategy in the global marketplace consider it more complex due to all of the following except _____. a. the steady reduction in trade barriers creates fewer opportunities in previously protected markets (interpretation, page 363)

Friday, December 13, 2019

Liberty in America from 1865 to 1941 Free Essays

Liberty is not just a wonderful thing. It is a rare thing. As much as we would like to wish otherwise there is far more tyranny in the world as opposed to liberty. We will write a custom essay sample on Liberty in America from 1865 to 1941 or any similar topic only for you Order Now Throughout history, there have been tyrannical monarchies and totalitarian regimes that impose their will on the populace. Actually, one does not even have to look into the historical past for examples as there are many nations this very day where tyranny rules. Those who live in the United States, however, can at least lay claim to living in one of the freest nations on earth. This is because the United States has built itself upon the concept of liberty, democracy and freedom. While there have been dark patches in American history, many of those dark periods have been overcome. One of the more interesting periods in the nation’s history in terms of exploring liberty progression and regression would be during the time period from the end of the Civil War to just prior to American involvement in World War Two. During the Reconstruction Era, a tremendous amount of liberty was provided to African-Americans as freedom from slavery had arrived. Sadly, there was not much in the way of racial equality brought forth during this time period and many point to the apartheid like environment southern blacks had to endure. However, there was also the period of the Great Migration where many African-Americans moved north during World War One to take advantage of ob opportunities and a better living environment. No one impeded the migration as the liberty of being able to seek a better life was afforded. In addition, the liberties of the United States were afforded to people who lived outside the United States. This is evidenced in the significant immigration waves to the USA from Europe. These waves occurred throughout the late 19th century and early 20th century and all those who arrived were provided all the freedoms of the United States as well as being afforded the opportunity to take part in the democratic process. In addition to voting in the United States, many of these immigrants would go one to become major political figures. In fact, within a short number of decades many immigrants and African-Americans would become mayors of major cities. While liberty was not expanded quickly, it did expand and crossed all racial, gender and ethnic lines. Of course, at various times in American history there have been a number of challenges to liberty. Under President Woodrow Wilson, there were a number of famous assaults on the concept of liberty. This was most notable in Wilson’s Sedition Act which essentially imposed the totalitarian concept of the â€Å"enemy of the state† on people who opposed Wilson’s war policies. However, the way in which these procedures were enacted were so severe there is no way one could argue that these were sane policies. These laws arbitrarily targeted large numbers of the population and were quite random in their enforcement.. Thankfully, with the end of Wilson’s tenure such practices would cease to occur with the exception of the Japanese internment during World War Two. The reason this aberration is pointed out is because it is an aberration. Such extreme methods are not the general practice of the United States as it remains a reliable beacon of liberty where such liberties are provided for all. Yes, there are stumbling blocks to liberties now and then but ultimately the United States remains the freest nation of earth and one that cherishes its freedoms.             How to cite Liberty in America from 1865 to 1941, Essay examples

Thursday, December 5, 2019

Internet Computing for Second Conference- myassignmenthelp.com

Question: Discuss about theInternet Computing for Second International Conference. Answer: Introduction: This Assignment will emphasise on the basis of the collection of 12 articles based on Analyzing Social Network Security and Privacy. The following 12 articles will help to analyze and research the various methodologies and techniques which are going to be used for the intention of data gathering, fact-finding. In this report, these 12 articles will also reflect the viewpoint of the scholars and various security issues in online social network and their possible solutions. Main Body: Security Issues in Online Social Networks (Hongyu Gao, Jun HU, Tuo Huang, Jingnan Wang and Yan Chen, 2011) This research has been done to analyse the present security threats in online social networks and available tools and mechanisms to overcome online threat that arises during social networks activities. This research also highlights various kinds of security threats present while doing social networking activities. In this research security threats in online social networks has been categories into four groups and try to find out the appropriate system and mechanism to reduce or overcome the security threat. In this research, the authors discussed every individual category and analyze the relations between the different security issues involved. This research also focuses on privacy and security breach attacks which are very common threats in online social networks. Other than this a brief analysis of the security breaches has been done which has been formed on behalf of serviced provider which includes client-server architecture and responsibility of the service provider to protect t he security of individuals privacy. The researcher has discussed and proposed various alternative OSN architectures for the defence purpose during online networking activities. Other than security breaches by the service provider, users security breaches and third-party application security breaches are also explained (Gao, et, al, 2011). Social Privacy Protector - Protecting Users Privacy in Social Networks (Michael Fire, Dima Kagan, Aviad Elishar, and Yuval Elovici, 2012) This research has been done by the experts of Telekom Innovation Laboratories and Information Systems Engineering Department. This research has been done mainly to evaluate various security issues involves in social networking and its solution. The authors have discussed the security threat and personal privacy threat involved in social networking site FaceBook. The FaceBook has been taken as a case study and various analyses have been done to access the amount of personal information being shared in Face-Book and the consequences of the publicized of personal information in such extents. The authors also discussed the three protection layer of FaceBooks security model , its functioning and effectiveness The security features have been elaborately disused such as authentication process to ensure the registration of user in FaceBook and other user enabled features to protect the privacy and personal information .this research also discussed about the Social Privacy Protector Architect ure in FaceBook such as the friends analyzer Facebook Application, Social Privacy Protector Firefox Addon, and HTTP server security (Fire, et, al, 2012). Privacy in Social Networks Existing Challenges and proposals for Solution (Prof. Dr.Gunther Pernul, 2015) This research has been done to provide the basic information about the security issue in Social networking. Various images and graphical information has been utilized during the illustration of the security models and loopholes in social networking. The primary agenda of the research is to understand the various privacy settings in online social networks. Other agenda of this research is to acknowledge OSN stakeholders and its implications for Privacy. Various tools and process to improve privacy on the provider side as well as addressing the user consciousness has been discussed. This research is not only based on depth analysis of the networking security issue, but to acknowledge the different models of security in social media and user-based privacy protection such as Privacy setting on OSNs in which different options are available for the user. The author also discussed the secure procedure of sharing personal file and information in social media (Gunther ,et,al, 2015). Security Issues in Social Networking (Damera Vijay Kumar, P S S Varma2, and Shyam Sunder Pabboju, 2013) The motive of this research is to analyze the security issue in Social Networking in personal and organizational level. This research also concerns about extensive uses of the social networking by individual and organisations .Most of the organisation are using social media without proper security measures to promote their business which can lead to data theft and other online security issues. The author investigates the dangerous effects of social media such as cyber attacks and data theft in a corporate network. The research also emphasis on various kind of security threat which arises from the comment posted by employees on social media which may cause serious reputational damage for the organization (Kumar , et ,al, 2013). Privacy and social networks (Antoine Fressancourt, 2012) The scope of this research is not limited to security issues, but the author has analyzed the various problems and issue regarding the data security. In this research, the author has elaborately discussed the problem related to the individuals privacy which has been arises due to extensive use of social networking. This research emphasis on important networking security issues such as the process to protect the privacy in the social network, the various regulations that social networking sites required , technological solutions to prevent the privacy for social networks .In this research, various technical issues have been discussed along with various mechanism to protect the users data (Atos.net, 2018). This research highlighted the critical role of third party service providers. This research also evaluates the complexity of privacy protection and process to deal with misuse of private information in social networking Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned (Iasonas Polakis, Federico Maggi, Stefano Zanero, Angelos D. Keromytis, 2014) The point of view of this research is exploring the practical security and privacy problems which are major issues in the real world in social networks. The authors have shown their ethical concern and IRB approval during the practical exploring the security and privacy problems. The role of SPAM or malware has been analyzed. This research also analyse the various stages of large-scale experiments in OSNs and their workflow. The authors have shared their experience and mishaps happened while researching the possible threat while using various online social networking. The approach for the research has been based on Ethical aspects; photo-based social authentication, threat model, and findings of the research (Polakis ,et, al, 2014). Security and Privacy in Online Social Networks - A Survey(Ed Novak and Qun Li, 2012) The motive behind this research is to highlight the primary issues related to privacy and security in online social networks. The objective of this research is to protect user data and save the user personal and sensitive information from various types of attack which includes advertisers, third-party application developers an online social network platform provider. The various aspects of threats such as locating hubs, network inference, and user attributes have been studied. To understand the security threat the client-server architectures and distributed social networks also analyzed. This research also discussed about the software and hardware systems based on online social network with different models to find out the possible threat and networking failure (Novak and Li, 2012). Security and Privacy in Social Networks (Gail-Joon Ahn, Mohamed Shehab and Anna Squicciarini, 2011) The research discussed the contribution of online social networking sites and their popularity. Authors concerns about the current trends in social networks which require users to become part of the system and policy administrators to protect their online data and information. The unprotected security system of online social network has creates the major security concerns regarding the privacy and data security. This research also discussed the recent emergence of security threat which creates a huge challenge for the researcher and established them in a highly complicated networking arena. This research also investigates the various social network sites and their mode of online communications. This research shows that the various types of online networking sites, their mode of communication and their networking structure. Each social networking site have their own networking system, hence the security threat occurs in different online networking sites are different. The authors also discussed about the Protecting personal informations which are generally linked to various other information, therefore, ensuring the protection of individuals personal information is quite challenging (Ahn ,et ,al, 2011). Analysis of Privacy in Online Social Networks from the Graph Theory Perspective (Leucio Antonio Cutillo, Refik Molva and Melek Onen, 2011) The aim of this research is to analyse the various security issues arises due to extensive uses of online social networks (OSNs). To analyze the security issues authors have discussed the centralized or de-centralized character of the OSN. Author viewed that the privacy and security mainly depend on the graph- theoretical properties of the social media platforms and the methodology and patterns of friendly relations between the users. In this research three metrics are discussed (Cutillo, et, al, 2011). The three metrics are degree distribution, clustering coefficient and mixing time. This research also investigates the relationship between the topological architectures based on social network graph and interaction between the users and service providers. The analysis of social networking has been done on the real threat on the real social network platform. Privacy in Online Social Networks (Elie Raad and Richard Chbeir , 2014) The main objective of this research is to assess the influence of social media in our daily life and its effects. This research also highlights the networks utilize in online social networking. In this research, the data flow diagram, data sharing, and inter-user communication are discussed with their possible privacy-related issues. The major issues about preventing privacy and a various potential threat of invasion available during personal information exchange have been discussed. The analysis has been done on resorting to social network and link mining technique and other privacy issues. In this research, some major challenges are discussed on future privacy related model and data security (Raad and Chbeir, 2014). Role of Security in Social Networking (David Hiatt and Young B. Choi, 2016) The objective of this research is to analyze the various security tools and prevention methods to secure the individuals private information. In this research, various types of security risks associated with social media have been discussed. This research has been completed to help the reader to understand the security and privacy issues. This research also discussed the various steps and process by which a user can protect the personal information and various security tools have been discussed with their ability and limitation which can be utilized by the social network organizations to enhance the security (Hiatt and Choi, 2016). Network Security Threats and Protection Models (Amit Kumar and Santosh Malhotra, 2015) The research describes various network security threat models. In this research, some widespread threat has been discussed such as Trojan horses and spyware, Denial of service attacks (DOS), Data interception and theft. This research also discussed the design of the potential network architecture which provides security from any kind of data threat and other online mischievous activities. The research is based on server security holes which are the major causes of any security threat and theft of data and information. In this research, the authors have discussed protection models based on networking securities. In order to analyze the data and network security, various networking model and firewall has been discussed. Some security breaches techniques such as flooding, keyloggers, Trojan, Phishing, Radio Jamming and other security problems has been elaborately discussed(Kumar and Malhotra, 2015). This research also discussed different layers of protection models in online social network to prevent the cyber attack and data threat. The advanced firewall architecture and improvement of access control procedure has been analyzed. The authors also analyze the consistency problem in firewall rules. The author proposes the highly efficient real-time approach to identify inconsistencies in the firewall. Author emphasis on Firewall Anomaly Management Environment (FAME) and research have been done in order to design and built a powerful firewall architecture which allows the administrator to trace the security threat. Conclusion: From exploring 12 articles above that are mostly related to security thereat and privacy issues arises in social network , it can be conclude that there are various security issues in social networking ,therefore the preventing measures and proper networking security is very essential. References: Gao, H., Hu, J., Huang, T., Wang, J., and Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56-63. Fire, M., Kagan, D., Elishar, A., and Elovici, Y. (2012, October). Social privacy protector-protecting users privacy in social networks. In InProc. of the Second International Conference on Social Eco-Informatics (SOTICS), Venice, Italy. Netter, M., Pernul, G., Richthammer, C., and Riesner, M. (2015, February). Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In International Conference on Information Systems Security and Privacy (pp. 16-27). Springer, Cham. Kumar, D. V., Varma, P. S. S., Pabboju, S. S. (2013). Security issues in social networking.International Journal of Computer Science and Network Security (IJCSNS),13(6), 120. Atos.net. (2018). [online] Available at: https://atos.net/content/dam/global/ascent-whitepapers/ascent-whitepaper-privacy-and-social-networks.pdf [Accessed 18 Apr. 2018]. Polakis, I., Maggi, F., Zanero, S., and Keromytis, A. D. (2014, September). Security and privacy measurements in social networks: experiences and lessons learned. In Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), 2014 Third International Workshop on(pp. 18-29). IEEE. Novak, E., and Li, Q. (2012). A survey of security and privacy in online social networks. College of William and Mary Computer Science Technical Report, 1-32. Ahn, G. J., Shehab, M., and Squicciarini, A. (2011). Security and privacy in social networks. IEEE Internet Computing, 15(3), 10-12. Cutillo, L. A., Molva, R., and Onen, M. (2011, December). Analysis of privacy in online social networks from the graph theory perspective. In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE (pp. 1-5). IEEE. Raad, E., and Chbeir, R. (2014). Socio-graph representations, concepts, data, and analysis. In Encyclopedia of Social Network Analysis and Mining (pp. 1936-1946). Springer New York. Hiatt, D., and Choi, Y. B. (2016). Role of Security in Social Networking. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 7(2), 12-15. Kumar, A., and Malhotra, S. (2015). Network Security Threats and Protection Models. arXiv preprint arXiv:1511.00568.