Saturday, December 28, 2019

Short Story - 1125 Words

I looked at my phone afternoon just waiting for it to light up, notifying me that Andrew has texted me. Tomorrow was Saturday which meant Andrew could ask to do the interview tomorrow. Question was, where exactly would it take place? Hes probably just going to do it over text, but then again I had a feeling he wouldnt. I looked over at my phone again and saw no notifications. I laid down on my bed closing my eyes, I felt tired after the fiasco in the cafeteria. Suddenly my phone beeped and I grabbed it quickly only to see it was Celine and Anastasia texting me about what happened in the cafeteria. I groaned and shut my phone off. ---- I felt sad he never called I was waiting all night and he didnt even text me. I was getting ready for†¦show more content†¦If this doesnt turn out good Im literally moving out of the country and changing my name. I did a few touch ups on my mascara and grabbed my mini backpack and put everything I needed inside, especially the interview. I placed it in a black binder neatly making sure their were no creases on it. My phone beeped and I checked it. Andrew: Come outside Im here. I put on perfume before heading out the door, standing up straight I said goodbye to my mom and walked out the door. He drove a sleek black car and to be honest I was impressed. I got into the car and once I entered it smelled like pine and mint. I looked over to Andrew and he wore a blood red t-shirt, a black leather jacket over it and black jeans to pull it all together. Hey. Andrew said, going on his phone choosing a different song to play. Hey, whats up? The ceiling. He smirked, probably proud of himself for that one. Hah very funny. I rolled my eyes lightly punching his arm. Andrew Vanessa looked great, the dress complimented her very nicely, she had her hair a bit messy making her look laid back. She looked out the window propping her arm on the inside handle of the door. She turned to me a few times stealing some glances here and there. So where are we headed to? She asked, her eyes wide. An ice cream shop. I said while focusing on the road ahead of us. OhShow MoreRelatedshort story1018 Words   |  5 Pagesï » ¿Short Stories:  Ã‚  Characteristics †¢Short  - Can usually be read in one sitting. †¢Concise:  Ã‚  Information offered in the story is relevant to the tale being told.  Ã‚  This is unlike a novel, where the story can diverge from the main plot †¢Usually tries to leave behind a  single impression  or effect.  Ã‚  Usually, though not always built around one character, place, idea, or act. †¢Because they are concise, writers depend on the reader bringing  personal experiences  and  prior knowledge  to the story. Four MajorRead MoreThe Short Stories Ideas For Writing A Short Story Essay1097 Words   |  5 Pageswriting a short story. Many a time, writers run out of these short story ideas upon exhausting their sources of short story ideas. If you are one of these writers, who have run out of short story ideas, and the deadline you have for coming up with a short story is running out, the short story writing prompts below will surely help you. Additionally, if you are being tormented by the blank Microsoft Word document staring at you because you are not able to come up with the best short story idea, youRead MoreShort Story1804 Words   |  8 PagesShort story: Definition and History. A  short story  like any other term does not have only one definition, it has many definitions, but all of them are similar in a general idea. According to The World Book Encyclopedia (1994, Vol. 12, L-354), â€Å"the short story is a short work of fiction that usually centers around a single incident. Because of its shorter length, the characters and situations are fewer and less complicated than those of a novel.† In the Cambridge Advanced Learner’s DictionaryRead MoreShort Stories648 Words   |  3 Pageswhat the title to the short story is. The short story theme I am going conduct on is â€Å"The Secret Life of Walter Mitty’ by James Thurber (1973). In this short story the literary elements being used is plot and symbols and the theme being full of distractions and disruption. The narrator is giving a third person point of view in sharing the thoughts of the characters. Walter Mitty the daydreamer is very humorous in the different plots of his dr ifting off. In the start of the story the plot, symbols,Read MoreShort Stories1125 Words   |  5 PagesThe themes of short stories are often relevant to real life? To what extent do you agree with this view? In the short stories â€Å"Miss Brill† and â€Å"Frau Brechenmacher attends a wedding† written by Katherine Mansfield, the themes which are relevant to real life in Miss Brill are isolation and appearance versus reality. Likewise Frau Brechenmacher suffers through isolation throughout the story and also male dominance is one of the major themes that are highlighted in the story. These themes areRead MoreShort Story and People1473 Words   |  6 Pagesï » ¿Title: Story Of An Hour Author: Kate Chopin I. On The Elements / Literary Concepts The short story Story Of An Hour is all about the series of emotions that the protagonist, Mrs. Mallard showed to the readers. With the kind of plot of this short story, it actually refers to the moments that Mrs. Mallard knew that all this time, her husband was alive. For the symbol, I like the title of this short story because it actually symbolizes the time where Mrs. Mallard died with joy. And with thatRead MoreShort Story Essay1294 Words   |  6 PagesA short story concentrates on creating a single dynamic effect and is limited in character and situation. It is a language of maximum yet economical effect. Every word must do a job, sometimes several jobs. Short stories are filled with numerous language and sound devices. These language and sound devices create a stronger image of the scenario or the characters within the text, which contribute to the overall pre-designed effect.As it is shown in the metaphor lipstick bleeding gently in CinnamonRead MoreRacism in the Short Stor ies1837 Words   |  7 PagesOften we read stories that tell stories of mixing the grouping may not always be what is legal or what people consider moral at the time. The things that you can learn from someone who is not like you is amazing if people took the time to consider this before judging someone the world as we know it would be a completely different place. The notion to overlook someone because they are not the same race, gender, creed, religion seems to be the way of the world for a long time. Racism is so prevalentRead MoreThe Idol Short Story1728 Words   |  7 PagesThe short stories â€Å"The Idol† by Adolfo Bioy Casares and â€Å"Axolotl† by Julio Cortà ¡zar address the notion of obsession, and the resulting harm that can come from it. Like all addictions, obsession makes one feel overwhelmed, as a single thought comes to continuously intruding our mind, causing the individual to not be able to ignore these thoughts. In â€Å"Axolotl†, the narr ator is drawn upon the axolotls at the Jardin des Plantes aquarium and his fascination towards the axolotls becomes an obsession. InRead MoreGothic Short Story1447 Words   |  6 Pages The End. In the short story, â€Å"Emma Barrett,† the reader follows a search party group searching for a missing girl named Emma deep in a forest in Oregon. The story follows through first person narration by a group member named Holden. This story would be considered a gothic short story because of its use of setting, theme, symbolism, and literary devices used to portray the horror of a missing six-year-old girl. Plot is the literal chronological development of the story, the sequence of events

Friday, December 20, 2019

Jane Eyre Feminist Analysis - 1066 Words

In 19th century Victorian England, it is ideal for women to be submissive, docile, and soft-spoken in a society where the man is viewed as the superior. While men are perceived to be revolutionary, daring, and ingenious for speaking their thoughts or pursuing their interests, women are viewed as hysterical, impudent, and presumptuous for acting on their true nature or their intuition. Jane Eyre, a semi-autobiography by Charlotte Brontà «, is an exemplary novel where an untraditional heroine defies societal normality. The female protagonist Jane Eyre exhibits a self-created drive for personal success and a perpetual ambition to learn, characteristics customary of men. After the publication of Jane Eyre, many critics has viewed it through the†¦show more content†¦Instead of passionately pursuing her dream of opening her own school or never getting married, Jane gives up her dawning career by marrying Mr. Rochester and settling down with him once he proposed. Similar to her so cially acceptable occupation as an educator and caregiver—a governess—Jane gives up her dreams of opening a school to become a caregiver for Mr. Rochester when he is disabled. Jane says â€Å"Reader, I married him† (Brontà « 457) in the concluding chapter to announce she accepts the wrongs done to her without further logical explanation—without further consideration of what she has given up for love and a man. Brontà «Ã¢â‚¬â„¢s portrayal of Jane shows she did not allow the heroine to act courageously to change herself and the world. Griesinger fails to adequately judge Brontà «Ã¢â‚¬â„¢s feminist motives due to the shortcoming of Jane Eyre. Unlike what Brontà « preached for, Jane became the epitome of a character who accepts injustice given to her by patriarchal figures and society—a contradiction to the feminist movement. However, Charlotte Brontà « encourages the feminist movement by using Jane’s character to criticize and reject patriarchal oppression. Jane is a devout Christian who allows most of her decisions to be influenced by her religious teachings and self-interpretation of God. This is crucial to Jane because this enables her to justify her denial ofShow MoreRelatedJane Eyre Feminist Analysis1045 Words   |  5 PagesJane Eyre is recognized and acclaimed as a classic feminist novel, a bold social commentary penned by a daring woman intent on shedding light on the hypocrisy that riddled Victorian society. This view is indeed accurate. However, Charlotte Brontà « only dares so much; she only sheds so much light. In â€Å"â€Å"The Maniac Bellowed†: Queer Affect and Queer Temporality in Charlotte Brontà «Ã¢â‚¬â„¢s Jane Eyre†, Carolyn Marjorie Davis asserts that the arms of Brontà «Ã¢â‚¬â„¢s feminism do not embrace women who fail to fulfill certainRead MoreFeminism in J ane Eyre1423 Words   |  6 PagesFeminism in Jane Eyre Jay Sheldon Feminism has been a prominent and controversial topic in writings for the past two centuries. With novels such as Jane Austens Pride and Prejudice, or even William Shakespeares Macbeth the fascination over this subject by authors is evident. In Charlotte Brontes Jane Eyre the main character, Jane Eyre, explores the depth at which women may act in society and finds her own boundaries in Victorian England. As well, along with the notions of feminism oftenRead More Movie - Feminist Themes in Jane Eyre, Novel and Film Versions2260 Words   |  10 PagesAn Analysis of Feminist Themes in Jane Eyre and its Film Versions  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚        Ã‚   Concern for womens rights dates from the Enlightenment, when the liberal, egalitarian, and reformist ideals of that period began to be extended from the bourgeoisie, peasants, and urban laborers to women as well. As did most interest groups of the time, feminists gained force and stability through its writing. The periods blossoming ideas concerning womens rights were fully set forth in Judith Murray’s On theRead MoreCharlotte Bronte1859 Words   |  8 Pagesvivid and creative imagination. They would play in made up kingdoms and would write stories and poems based on their childhood adventures. These writings that she developed with her sisters were the start of her love and passion for writing. In Jane Eyre, Charlotte describes her life at home as she was working and raising her two sisters. Charlotte disliked her job and decided to leave in order to study French in Belgium. In Belgium, she met Constantin Heger who helped her by giving a strong literaryRead MoreJane Eyre By Charlotte Bronte1733 Words   |  7 Pagesinteractions between the conventions of the Gothic fictions with other  thematic, ideological, and/or symbolic functions of the narrative  would rather be challenging. However, though the analysis of  Jane Eyre  written by  Charlotte Bronte, certain factors come into focus.The novel of Charlotte Bronte entitled Jane Eyre has showcased a lot of issues that specifies how women in that time have been depicted by the experiences that the protagonist of the novel has encountered. The novel was published in aRead More Revision of Master Narratives within Jane Eyre and Wide Sargasso Sea2157 Words   |  9 Pagesmood of the time was. From there one will be a ble to discuss how they were revised, and if in fact they were revised at all. nbsp;nbsp;nbsp;nbsp;nbsp;Bronte is known as one of the first revolutionary and challenging authoress’ with her text Jane Eyre. The society of her time was male dominated, women were marginally cast aside and treated as trophies for their male counterparts. Their main role in life was to be a mother and a wife, â€Å" Literature cannot be the business of a woman’s life†¦Ã¢â‚¬ ¦the moreRead MoreRepresentation of the Other in Charlotte Brontes Jane Eyre Essay4463 Words   |  18 PagesRepresentation of the ‘Other’ in Charlotte Brontes Jane Eyre Abstract This study aims at examining the representation of the’ other’ as portrayed in Charlotte Brontes Jane Eyre (1847). It attempts to inspect how the ‘Other’ is viewed in Nineteenth century England and the cultural ideology behind such specific representation. It poses crucial questions as to why the ‘Other’ is always represented negatively in main-stream western narrative as in the case of Bertha Mason who is portrayed asRead MoreAnalysis Of The Poem Second Child And Maria Branswell S Fifth Child2059 Words   |  9 Pagesstories and wrote them all down. Since their father was never home, it gave Charlotte Bronte the idea for Jane Eyre to be an orphan since its how she felt with her mother dead and a father who is never around. Especially with the events that took place in the boarding school, Charlotte used the events in her life and put the majority of them into one of her well known novel known as Jane Eyre. She was so drawn into her creativ e world that she began to dwell in the problems of her characters. So sheRead More A Comparison of the Ideals of Bronte in Jane Eyre and Voltaire in Candide2672 Words   |  11 PagesThe Ideals of Bronte in Jane Eyre and Voltaire in Candide      Ã‚  Ã‚  Ã‚   Subjective novelists tend to use personal attitudes to shape their characters. Whether it be an interjection of opinion here, or an allusion to personal experience there, the beauty of a story lies in the clever disclosure of the authors personality. Charlotte Bronte and Voltaire are no exceptions. Their most notable leading characters, Jane Eyre and Candide, represent direct expressions of the respective authors emotions andRead MoreJane Eyre And Depression Essay1886 Words   |  8 PagesCharlotte Bronte’s â€Å"Jane Eyre† has captivated readers for generations. As with all coming of age novels, young adults can relate to the struggles and triumphs of Jane. Jane’s setting influences and parallel her emotions. A reader can see the novel through her eyes and perspective. In Bronte’s â€Å"Jane Eyre,† the location often parallels Jane’s emotional growth through the tone presented by the environment, resulting in the different places she lives revealing her journey through depression. Jane’s behavioral

Wednesday, December 11, 2019

Game Fundamentals Actions in Games †Free Samples to Students

Question: Discuss about the Game Fundamentals for Actions in Games. Answer: Introduction: The concept of action in games refers to the various on-screen actions performed by the playable and non-playable characters inside a video game. The actions of the playable characters are controlled by the player using controller devices like keyboard or joystick whereas the actions of the unplayable characters are controlled by predefined programs (Arnab et al., 2015). The first action in games was simply one direction running movement whereas in the latest games, the characters are able to perform a wide variety of movements as well as move in all directions (360). History of the Concept Although the concept of video games was developed as early as in 1950s, the concept of action was developed much later when arcade games were flourishing in the gaming industry. The initial games where player actions were used were Super Mario, Donkey Kong, Dangerous Dave and others. However, in these games, the actions were very limited as the playable characters could only move in four directions forward, backward, up and down. In addition to the directional movement, the characters could not perform any other actions except shooting towards an enemy (Scharkow et al., 2015). However, with gradual development of the game, the actions were developed and currently in games, the characters can perform almost any action as a normal human will do provided these actions are programmed with the character. Terminology Related to the Concept Some common terminologies related to the concept are explained as follows. Gamer Control This is referred to the extent of control a gamer has over a playable character during a standard game play. Generally in todays games like Grand Theft Auto, Far Cry, Assassins Creed and other similar games, the player is able to control the movements and actions of the characters like running, jumping, crawling, shooting, fighting and others (Lameras et al., 2017). The control is established through the use of devices like keyboard and joystick. Motion Capture Although technology is extremely advanced, an AI does not have the power to recreate accurate movement of a character by itself. Hence, motion capture technology is used where motion mapping devices are fixed over a real person and the person is needed to perform various motions (Eichenbaum et al., 2015). The mapping devices capture these motions and apply the same on the graphically created character in the game. Example of this Concept in a Game For explaining this concept, the recent game of FIFA 18 has been used as an example. In this game, a player is required to control 11 football players on the pitch (one at a time) during a particular match. The footballers used are the graphical replicas of the real world football players. In order to increase the likeness and authenticity in the game, the developers EA Sports adopted the motion capture technology using which they capture the exact motions of the footballers and apply them on the in-game characters. As a result, while playing the game, the characters perform actions almost exactly like their real world counterparts. References Arnab, S., Lim, T., Carvalho, M.B., Bellotti, F., Freitas, S., Louchart, S., Suttie, N., Berta, R. and De Gloria, A., 2015. Mapping learning and game mechanics for serious games analysis. British Journal of Educational Technology, 46(2), pp.391-411. Eichenbaum, A., Kattner, F., Bradford, D., Gentile, D.A. and Green, C.S., 2015. Role-playing and real-time strategy games associated with greater probability of Internet gaming disorder. Cyberpsychology, Behavior, and Social Networking, 18(8), pp.480-485. Lameras, P., Arnab, S., Dunwell, I., Stewart, C., Clarke, S. and Petridis, P., 2017. Essential features of serious games design in higher education: Linking learning attributes to game mechanics. British Journal of Educational Technology, 48(4), pp.972-994. Scharkow, M., Festl, R., Vogelgesang, J. and Quandt, T., 2015. Beyond the core-gamer: Genre preferences and gratifications in computer games. Computers in Human Behavior, 44, pp.293-298.

Wednesday, December 4, 2019

Privacy Threats in a Big Data-.com

Question: Discuss about the Privacy Threats in a Big Data. Answer: Introduction The advent of big data has created numerous opportunities for business and organizations; in the process, numerous amounts of data has been generated that exceed the capacity for present commonly used software tools fro proper capture, management, and timely analysis and use. Every two years, the quantity of data to be analyzed is expected to double. Most of this data is in unstructured form and coming from various inputs including sensors, social media, surveillance, scientific applications, image and video archives, medical records, internet searches and indexes, system logs, and business transactions (Kerr Earle, 2016). The number of devices connected with the Internet of Things is continuing to increase to unprecedented levels generating large data amounts that require processing to make sense of and use productively. It has also become popular and cost effective to use on demand cloud based computing and processing power to analyze and get insights into this data. As big data e xpands, the traditional security and privacy protocols tailored to private computing systems such as demilitarized zones and use of firewalls are no longer effective (Kache, 2015). In big data, security protocols are expected to work over heterogeneous hardware, network domains, and operating system components. The collection and use of peoples data in big data applications has been met with stiff resistance from consumers with growing concerns expressed over methods that organizations use to collect and use private data and information (Martin, 2015; LeVPN,2017). The potential impact and effects of privacy and security beaches can be highlighted by the recent Facebook page in which there was a massive breach of privacy and security with regard to user data (The Economic Times, 2018). This paper discusses the issue of privacy in big data, first by reviewing related work, discussing the challenges and issues faced, the methodology of research and a proposed approach, before evaluatin g performance and drawing conclusions Related Work According to (Lu, Zhu, Liu, Liu, Shao, 2014), because big data can generate new useful knowledge for economic and technical benefits, it has received great attention inn recent times because of its high volume, high velocity, and variety challenges (3Vs). Apart from the 3V challenges, security and privacy has also emerged as an important issue in big data; If data is not authentic, the mined information is unconvincing, and if privacy is not properly addressed, there may be reluctance of resistance for data sharing. As such, an efficient privacy preserving mechanism, using an algorithm, is proposed by the authors to guarantee security in big data. In a systematic review of literature and discuss the concept of big data and the issues and challenges facing big data, moving forward. The authors discuss the issues facing big data including storage, volume, processing, storage, transportation, and ownership, providing a basis for which to understand big data (Kaisler, Armour, Espinosa, Money, 2013). Xu, Jiang,Wang, Yuan, Ren (2014) through a review of literature and methods of data mining, specifically the knowledge Discovery In Databases process (KDD), discuss the techniques used in KDD based on their appreciation and understanding of big data privacy and security risks. By analyzing the KDD process, the authors identify issues that eventually result in data breaches or loss of privacy, including data integration, data selection, and data transformation. Further, the authors identify the types of users involved in KDD applications, including data providers, data collectors, data miners and decision makers. Following this review, the authors propose methods to ensure privacy and data protection while undertaking data mining. The proposed approaches include using privacy preserving-association rule mining, privacy preserving classification of data, use of decision trees, using the Naive Bayesian classification, and data provenance. These methods apply to different players in data mining. Moura Serro (2015) allude to the increased use and sharing or personal data and information to public clouds and social networks when using a variety of devices, making data privacy and security, especially in the context of big data an important and hot issue. The authors also allude that traditional methods for enhancing data security, including the use of demilitarized zones and firewalls are not suitable for application in computing systems to su pport security in bid data. By reviewing existing literature, discussing some of the sources and causes of risks to data security in big data, and using case studies, the authors propose the use of Software Defined networking (SDN) as a novel approach to implement security in big data and address data privacy concerns. Narayanan, Huey, Felten, (2016) argue that once data is released to the public, it is not possible to take it back; with time, additional datasets become public with more analytics and information on the original data, including PII can be revealed making big data information increasingly vulnerable to being re-identified especially because current ad-hoc methods of De-identification being presently used are prone to being exploited by adversaries. It is not possible to know the probability of data being re-identified in future, and so the authors call fr a precautionary approach to securing privacy in big data. Risks to data privacy go beyond stereotypical re-identification and that it is impossible to know for certain the privacy risk for data protected using ad-hoc De-identification. According to Tene Polonetsky (2013), big data, data mining, and data analytics play a huge and critical role; data can be mined and analyzed in its raw form without the need to store and access dat a from structured databases. However, it comes with the challenge and problem of data privacy concerns that can result in regulation that would necessitate a backlash and stifle the befits of big data. The researchers propose that policy makers must balance the benefits of big data with privacy concerns, especially the need for privacy and what is defined as personally identifiable information (PII). Sagiroglu Sinanc (2013) discuss the concept of big data and its various aspects and concepts, including sources of data, their transmission, storage, and data mining, and then discuss in detail the privacy issues and concerns in big data. The authors, in an extensive review of literature, show that keeping data in a single place increases chances for breaches becomes it becomes a target for attacks. The authors propose controlled storage management, with encryption, restricted access to data, and securing the networks through which big data is managed. Terzi, Terzi, Sagriroglu (2015) provide a fresh perspective on big data security and privacy where extra security measures must be put in place to ensure security. The authors suggest, based on their research and literature review, th at extra security must be placed on big data networks through encryption, controlled access to devices, controlled access to network resources, data should be made anonymous before being analyzed, communications should proceed in secure channels, and networks monitored continuously for threatsMethodology This paper uses a critical systematic review of literature in which clearly formulated questions are used to undertake explicit and systematic approaches are used for identification, selection, and critical appraisal of relevant research and for collecting and analyzing data from those studies I order to generate novel solutions to the issue of privacy in big data. Challenges and Issues As more data is collected from connected devices and systems, the existing security protocols such as fire walls and DMZS are becoming increasingly irrelevant as means for ensuring big data security. The present issues in big data security and privacy are in four main areas; infrastructure, data privacy, data management, and integrity and reactive security (Kaisler, Armour, Espinosa, Money, 2013). With regard to infrastructure, the main issues include secure distributed data processing and best security and privacy actions for non relational databases. As relates data privacy, the main issues include data analysis through data mining methods that preserve data privacy, using cryptography for data security and privacy, and granular access control. The challenges in data management and integrity relate to granular audits, secure data storage as well as transaction logs, and data provenance. Reactive security and privacy issues allude to Validation and end to end filtering and real tim e supervision of privacy and security levels. The internet of things (IoT) is a major area of concern as relates privacy and security in big data. It has become difficult to to do anything in the present life without someones identity being associated with the task, from surfing the web to making social media comments and engaging in e-commerce. Security breaches also greatly compromise security through vulnerabilities in web interface insecurity, insufficient authentication and authorization, lack of encryption, insecure cloud and mobile device interfaces, inadequate security reconfigurability, insecure firmware and software, and poor physical security. In addition, companies unknowingly track and collect user data and pass them on to other people such as marketers for commercial gain, exposing private user data without their consent. Proposed Approach A novel approach is used based on the use of several methods, tools, and techniques to ensure data privacy and security is maintained in big data use. The limitations of traditional techniques for ensuring data privacy and security can be overcome using modern approaches that include Fully Homomorphic Encryption (FHE), Secure Function Evaluation (SFE), and Functional Encryption (FE). FHE is an encryption approach that allows specific computation types such as RSA to be undertaken on cypher text and generate encryptions that when decrypted matches operation results performed on plain text. This enables databases queries to be encrypted and keeps user information private from the location this data is stored. FHE also allows private encrypted queries to search engines and also helps ensure private user information remains private. Searches can also be conducted on encrypted data, such as encrypted social media data that helps keep identities private. The use of open rights management s ystems, specifically, OpenSDRM: this is a system architecture that allows different content business models to be implemented. The architecture is shown below; This approach, together with FHE, will ensure social media information is mined with privacy and anonymity retained. The proposed novel approach assumes initial registration of system services on the platform meaning that each of the different services have to be registered individually on the platform. Unique credentials are assigned to each service on the platform. The rights management platform manages user generated content (UGC) that enables secure storage of content securely in locations that have been configured. When social media users upload UGC, it remains protected and the permissions, rights, and restrictions about this content is user defined, and so helps retain privacy. This enables content generators and those willing to use such content, such as data mining firms, are registered and authenticated in the socia l network platform as well as on the rights management platform. Because users willing to access UGC on the platform must be registered and authenticated and given that UGC is presented in special URI form, user privacy is achieved. This is because the special URI is intercepted by the platform for rights management allowing secure access process. Another approach is to is an intelligent intrusion detection and prevention system (IDS/IPS) based on a software defined network (SDN). A Kinetic module controls the IDS/IPS behavior using the Kinetic language, which is a framework for controlling SDN where network policies can be defined as Finite State machines (FSM). Several dynamic event types are able to trigger between FSM states transitions. The IDS/ IPS security module ensures non privileged hosts and infected hosts are dropped; infected but privileged hosts then traffic from that specific hosts is redirected to a garden wall host automatically where corrective measures are taken on the infected host, A non infected host has its traffic directed to the intended destination. Performance Evaluation Evaluating the two approaches using a simulation in Linux showed promising outcomes in ensuring user private data is secured. The use of FHE as well as IDS/IPS not only ensures that private user data is maintained bot in databases as well as in internet search queries, but that the information remains secure from intrusion and unauthorized access, such as attacks undertaken using hacking techniques. Conclusion The increased use of big data and several interconnected devices, as well as technological advancements have led to massive data volumes being generated. The generation and use of big data has several economic and technical innovation benefits, but also raises risks of data privacy breaches, along with the 3Vs challenges. In this paper, past approaches have been evaluated and using a systematic review of literature, a combined approach using FHE encryption technologies and IDS/IPS to ensure personal user data remains private and secure, even when insights are used for big data analytics. An evaluation of the approach shows the proposed methods are highly promising in ensuring big data privacy and security. References Kaisler, S., Armour, F., Espinosa, A., Money, W. (2013). Big Data: Issues and Challenges Moving Forward. In 46th Hawaii International Conference on System Sciences (pp. 995-1003). Hawaii: IEEE Computer Society.Kache, F. (Ed.). (2015). Dealing with digital information richness in supply chain management: A review and a Big Data analytics approach. Kassel: Univ.-Press.Kerr, I., Earle, J. (2016, August 10). Prediction, Preemption, Presumption | Stanford Law Review. Retrieved from https://www.stanfordlawreview.org/online/privacy-and-big-data-prediction- preemption-presumption/Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren. (2014). Information Security in Big Data: Privacy and Data Mining. IEEE Access, 2, 1149-1176. https://dx.doi.org/10.1109/access.2014.2362522 'Le VPN'. (2017, October 10). Why Do Companies Collect Big Data and Store Personal Data? | Le VPN. Retrieved from https://www.le-vpn.com/why-companies-collect-big-data/Lu, R., Zhu, H., Liu, X., Liu, J. K., Shao, J. (20 14). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46-50. doi:10.1109/mnet.2014.6863131Martin, K. E. (2015). Ethical Issues in Big Data Industry. MIS Quarterly Executive, 4(2), 67-85. Retrieved from https://www.researchgate.net/publication/273772472_Ethical_Issues_in_Big_Data_IndustryMoura, J., Serro, C. (2015). Security and Privacy Issues of Big Data. Handbook Of Research On Trends And Future Directions In Big Data And Web Intelligence, 3(1), 20-52. https://dx.doi.org/10.4018/978-1-4666-8505-5.ch002Narayanan, A., Huey, J., Felten, E. (2016). A Precautionary Approach to Big Data Privacy. Data Protection On The Move, 24, 357-385. https://dx.doi.org/10.1007/978-94-017-7376-8_13Tene, O., Polonetsky, J. (2013). Big Data for All: Pr ivacy and User Control in the Age of Analytics. Northwestern Journal Of Technology And Intellectual Property, 11(5).Sagiroglu, S., Sinanc, D. (May 01, 2013). Big data: A review . In 2013 International Conference o n Collaboration Technologies and Systems (CTS 2013). 42-47. Ankara; Hawaii: IEEE Computer Society.Terzi, D., Terzi, R., Sagriroglu, S. (2015). A Survey on Security and Privacy Issues in Big Data. In The 10th International Conference for Internet Technology and Secured Transactions (pp. 202-206). London: International Conference for Internet Technology and Secured Transactions.'The Economic Times'. (2018, April 11). Mark Zuckerberg apologises to Congress over massive Facebook breach. Retrieved from https://economictimes.indiatimes.com/tech/internet/mark- zuckerberg-apologises-to-congress-over-massive-facebook- breach/articleshow/63704093.cms