Computer Science
SEU Phase 4 to 6 Social Media Personal Information Security Literature Review

Saudi electronic university

Question Description

I’m working on a Computer Science question and need guidance to help me study.

Look at the research and method file and start from 4 phase obey step by step and read details in any phsae find in bootom file. Summarizing 30 sheets is required. I have done 13 in the attached file new paper and you are doing 17. Follow the summarization steps in the attached resarch and method. The papers are in the folders fines a b c d e f and do 5phase, 6phase and phase 7. Follow the steps in their details. in the file

Unformatted Attachment Preview

Objective • • • • Learn research in a systematic fashion In-depth study of a topic Ability to read several articles and search for ideas and/or perform implementation Demonstrate understanding through an exam on selected articles Introduction • • • • A goal is to write professional research report after picking up a topic of interest. Present your report and demonstrate your understanding of the topic. Perform implementation and explain your work. Comprehend other presented reports and write a final exam on selected items. Course phases Phase 1: Topic selection • Select a topic in Computing disciplines. For example: •Database: Design, Monitoring, and tuning. •Knowledge based systems •Network management •Risk and Configuration Managements •E-Learning systems •Mobile Application Software •Software Testing Later we will study the tools that are available. However, before considering the tools, issues pertaining to concepts, models, algorithms, techniques, etc should be dealt with first. Then, collect various tools in your selected topic. Among others, should consider evaluation criteria, comparison elements, features, limitations, reviews, and experimentation with the tools. Phase 1: What to submit Send me a page by email. The page contains: • • • • • The name, ID, Course No and name. Topic title and the area A paragraph describing the topic and its significance and application. A paragraph indicating the motivation for selecting the topic. (reasons) Phase 2: Bibliography 1 • A list of all references related to your topic. Use any style such as APA, IEEE, MLA, etc. • Format: Cite the reference followed by a link to its contents in the SM. • Submit a SM of all references with links to their contents in the SM. Phase 3: References Evaluation • Follow the steps to be explained to obtain two lists: Accepted and reject. (AS EXPLAINED IN CLASS) • Format: Cite the reference followed by links to its contents and to its evaluation in the SM. • Submit a SM of the reference lists, their contents, and their evaluation. • Select a reference of the accepted and another of the rejected and present them. Phase 4: Annotated Bibliography • Cite each reference followed by three paragraphs to be explained later. Links should be there as before. • Submit: The SM will be as before with the annotated Bib added. Links are to the content, evaluation, and annotated bibliography in the SM. Links are next to the reference name per the format given to you in this document. • Select a reference and present its annotation. Phase 5: Literature Review (LR) • Present an informed evaluation of the literature • Organize information and relate it to the thesis or your research question See below. Phase 6: The final Report • LR + Findings + Tools and their evaluation. Phase 7: The final Exam • To be discussed later Steps of Research Process Objective. • Outline a simple and effective strategy for finding information for a research report and documenting the sources you find. • • 2 Step 1: Identify a Topic • State your topic. • Identify the main concepts or keywords in your topic. Step 2: Test your Topic • Test the main concepts or keywords in your topic by looking them up in the appropriate background sources or by using them as search terms • If you are finding too much information and too many sources, narrow your topic • Finding too little information may indicate that you need to broaden your topic • • Step 3: Find Background Information • Look up your keywords in the net, etc. • Read related articles to set the context for your research. • Note any relevant items in the bibliographies at the end of the articles. • Additional background information may be found in your lecture notes, textbooks, and reserve readings. • Use keyword searching for a narrow or complex search topic. • Use subject searching for a broad subject. • Print or write down the citation (author, title,etc.) and the location information (call number and library). • Scan the bibliography for additional sources. This should set the stage for extensive literature review. • Step 4: Use Indexes to Find Periodical Articles • Use periodical indexes and abstracts to find citations to articles. The indexes and abstracts may be in print or computer-based formats or both. Step 5: Find other Resources • In IT you may need SW & HW. • Tools. Research Tips • • • • Work from the general to the specific. Find background information first, then use more specific and recent sources. Record what you find and where you found it. Write out a complete citation for each source you find; You may need it again later. Bibliography • a list of citations to books, articles, and documents • Examples: 3 • 1. Mathkour, H., A. Touir, and G. Assasa. “An XML Medaitor”, Communication of ACM, Vol. 13, No. 3, 1999, pp. 31-45. • 2. Robin, M. Algorithms, John Wiley & Sons, Inc., new York, NY, 1966, 1st ed. • Use Standard citation. • MLA, APA, IEEE, Chicago, etc. Examples of Citations • You cite it in your report in different ways. Examples: Mathkour et.al. [1] points out that … • The system described in [1] lacks… • Several systems [1, 2] have been constructed Use Standard citation. MLA, APA, IEEE, Chicago, etc. Collecting References • • Form your bibliography by collecting appropriate references for your topic Scrutinize each reference by analyzing your source of information] Analyzing Information Resources (Here is the bibliography evaluation) • Appraise a source by first examining the bibliographic citation. • The bibliographic citation is the written description of a book, journal article, essay, or some other published material that appears in a catalog or index. • Bibliographic citations characteristically have three main components: author, title, and publication information. These components can help you determine the usefulness of this source for your paper. Initial Appraisal: Authors • What are the author's credentials--institutional affiliation (where he or she works), educational background, past writings, or experience? • Is the book or article written on a topic in the author's area of expertise? You can use the various Who's Who publications and the biographical information located in the publication itself to help determine the author's affiliation and credentials. • Has your instructor mentioned this author? Have you seen the author's name cited in other sources or bibliographies? Look for authors who are cited frequently. Is the author associated with a reputable institution or organization? What are the basic values or goals of the organization or institution? • Initial Appraisal: Date of Publication 4 • • When was the source published? This date is often located on the face of the title page below the name of the publisher. If it is not there, look for the copyright date on the reverse of the title page. On Web pages, the date of the last revision is usually at the bottom of the home page, sometimes every page. Is the source current or out-of-date for your topic? Topic areas of continuing and rapid development, such as sciences, demand more current information. On the other hand, topics in the humanities often require material that was written many years ago. At the other extreme, some news sources on the Web now note the hour and minute that articles are posted on their site. Initial Appraisal: Edition or revision • Is this a first edition of this publication or not? Further editions indicate a source has been revised and updated to reflect changes in knowledge, include omissions, and harmonize with its intended reader's needs. Also, many printings or editions may indicate that the work has become a standard source in the area and is reliable. If you are using a Web source, do the pages indicate revision dates? Initial Appraisal: Publisher • Who is the publisher? If the source is published by a university press, it is likely to be scholarly. Although the fact that the publisher is reputable does not necessarily guarantee quality, it does show that the publisher may have high regard for the source being published. Initial Appraisal: Title of Journal • Is this a scholarly or a popular journal? This distinction is important because it indicates different levels of complexity in conveying ideas. Next perform: This is the second part of the reference evaluation Content Analysis • • • After initial appraisal, examine the body of the source. Read the preface (abstract) to determine the author's intentions for the book. Scan the table of contents and the index to get a broad overview of the material it covers. • Note whether bibliographies are included. • Read the chapters that specifically address your topic. • Scanning the table of contents of a journal or magazine issue is also useful. The presence and quality of a bibliography at the end of the article may reflect the care with which the authors have prepared their work. 5 Intended Audience • • • What type of audience is the author addressing? Is the publication aimed at a specialized or a general audience? Is this source too elementary, too technical, too advanced, or just right for your needs? Objective Reasoning Is the information covered fact, oinion, or propaganda? Does the information appear to be valid and well-researched, or is it questionable and unsupported by evidences? • • Assumptions should be reasonable. Note errors or omissions. Are the ideas and arguments advanced more or less in line with other works you have read on the same topic? • The more radically an author departs from the views of others in the same field, the more carefully and critically you should scrutinize his or her ideas. Is the author's point of view objective and impartial? Coverage • Does the work update other sources, substantiate other materials you have read, or add new information? • Does it extensively or marginally cover your topic? You should explore enough sources to obtain a variety of viewpoints. • Is the material primary or secondary in nature? Primary sources are the raw material of the research process. Secondary sources are based on primary sources. Choose both primary and secondary sources when you have the opportunity. Writing Style • • • • Is the publication organized logically? Are the main points clearly presented? Do you find the text easy to read, or is it stilted or choppy? Is the author's argument repetitive? Evaluative Reviews Locate critical reviews of books in a reviewing source, such as Book Review Index, Book Review Digest, OR Periodical Abstracts. • Is the review positive? 6 • • Is the book under review considered a valuable contribution to the field? Does the reviewer mention other books that might be better? If so, locate these sources for more information on your topic. • Do the various reviewers agree on the value or attributes of the book or has it aroused controversy among the critics? To this point you have finished what is required to evaluate a reference. For references that are available only on the net, i.e., have been published only on the Web, you need to evaluate the web site itself. This is done as follows. Evaluating Web Sites • • • Step 1: identify the type of a page Step 2: use appropriate checklist Step 3: based on checklist criteria, determine relative quality of page Step 1: Identify the Type of Web Page • Advocacy • Business/Marketing • Informational • News • Personal • Entertainment Use the Appropriate Checklist • Answer questions with Yes or No Checklist: AUTHORITY • • • • • Is there a link to a page describing the purpose of the sponsoring organization? Is it clear who is responsible for the contents of the page? Is there a way of verifying the legitimacy of the page's sponsor? That is, is there a phone number or postal address to contact for more information? (Simply an email address is not enough.) Is it clear who wrote the material and are the author's qualifications for writing on this topic clearly stated? If the material is protected by copyright, is the name of the copyright holder given? Checklist: ACCURACY 7 • Are the sources for any factual information clearly listed so they can be verified in another source? • Is the information free of grammatical, spelling, and typographical errors? (These kinds of errors not only indicate a lack of quality control, but can actually produce inaccuracies in information.) • Is it clear who has the ultimate responsibility for the accuracy of the content of the material? • If there are charts and/or graphs containing statistical data, are the charts and/or graphs clearly labeled and easy to read? OBJECTIVITY • Is the information provided as a public service? • Is the information free of advertising? • If there is any advertising on the page, is it clearly differentiated from the informational content? Currency • Are there dates on the page to indicate: • When the page was written? • When the page was first placed on the Web? • When the page was last revised? • Are there any other indications that the material is kept current? • If material is presented in graphs and/or charts, is it clearly stated when the data was gathered? • If the information is published in different editions, is it clearly labeled what edition the page is from? Coverage • Is there an indication that the page has been completed, and is not still under construction? • If there is a print equivalent to the Web page, is there a clear indication of whether the entire work is available on the Web or only parts of it? • If the material is from a work which is out of copyright (as is often the case with a dictionary or thesaurus) has there been an effort to update the material to make it more current? Step 3: Based on the Checklist Criteria, Determine the Relative Quality of the Web Page 8 • The greater number of checklist questions answered yes, the more likely the page is of higher informational quality UP till Now • • You should have two lists of references: Accepted and Rejected according to the appraisal and various analysis pointed out so far You are now ready to annotate your bibliography, I.e., the accepted list of references Annotated Bibliography Paragraph1: • • • • describe the content (focus) of the item describe the usefulness of the item discuss any limitations that the item may have, e.g. grade level, timeliness etc. describe what audience the item is intended for Paragraph2: • • • evaluate reliability of the item evaluate the methods of research used in the item discuss any conclusions the author(s) may have made Paragraph3: • • describe your reaction to the item describe the relationships to other refs What Is the Purpose of an Annotated Bibliography? May serve a number of purposes. Including but not limited to: • • • • • A review of the literature on a particular subject Illustrate the quality of research that you have done Provide examples of the types of sources available Describe other items on a topic that may be of interest to the reader Explore the subject for further research Annotations Vs Abstracts • Abstracts are the purely descriptive summaries often found at the beginning of scholarly journal articles or in periodical indexes. 9 • Annotations are descriptive and critical; they expose the author's point of view, clarity and appropriateness of expression, and authority. Literature Review A review of the literature is a classification and evaluation of what accredited scholars and researchers have written on a topic, organized according to a guiding concept such as your research objective, thesis, or the problem/issue you wish to address. What to do • Recognize relevant information. • Integrate and evaluate them. Goal Your reader wants to know: • What literature exists • Your informed evaluation of the literature. Methods • Information seeking • Critical appraisal THEN • • • • organize information and relate it to the thesis or your research question synthesize your reading of texts into a summary identify controversy when it appears in the literature develop questions for further research. OUTPUT • A description of what you have read • A conceptually organized synthesis of the results of your search What to Scrutinize? 10 • • • • • • • • • • • • Has the author formulated a problem/issue? Is the problem/issue ambiguous or clearly articulated? Is its significance (scope, severity, relevance) discussed? What are the strengths and limitations of the way the author has formulated the problem or issue? Could the problem have been approached more effectively from another perspective? What is the author's theoretical framework? What is the relationship between the theoretical and research perspectives? Has the author evaluated the literature relevant to the problem/issue? Does the author include literature taking positions s/he does not agree with? In a research study, how good are the three basic components of the study design (i.e., population, intervention, outcome)? How accurate and valid are the measurements? Is the analysis of the data accurate and relevant to the research question? Are the conclusions validly based upon the data and analysis? In popular literature, does the author use appeals to emotion, one-sided examples, rhetorically-charged language and tone? Is the author objective, or is s/he merely 'proving' what s/he already believes? How does the author structure his or her argument? Can you 'deconstruct' the flow of the argument to analyze if/where it breaks down? Is this a book or article that contributes to the understanding of the problem under study, and in what ways is it useful for practice? What are the strengths and limitations? How does this book or article fit into the thesis, report, or question you are developing? LR Structure For the structure of your literature review, you may: • Review the literature in chronological order evaluating each stage • Compare one stream of literature with another • Analyze each of the major theoretical positions in turn • • • • Discuss and compare the thinking of the key writers in the field Analyze and compare different methodological approaches to a topic or issue Compare the way literature approaches a subject from different disciplines Compare popular literature with the more scholarly. Keep in Mind 11 • Remember you write about what writers say and how they think about their subject: how they reason, how they organize their ideas and the evidence they use to support their position? Citation • When you are writing the review it is critical that you cite and reference correctly. GOOD LUCK …It has been a pleasure. Thank you. 12 Student Name: AbdulAziz Hazazi Student ID:4411060 Social Media Personal Information Security With the rapid proliferation of internet and Web 2.0 technologies, online social media networks continue to increasingly gain popularity (Zhao and Shery). Almost every person from every corner of the world can access some form of online social media platform. Through the social media platforms, millions of people create and exchange user generated content, and connect with each other in ways never imagined before. Though the use of social media presents new opportunities for socialization, it also exposes its users to the increasing risk of cyberattacks (Zhao and Shery). Users of social media networks are therefore expected to be constantly alert and implement strategies and tools that would safeguard them from cyberattacks. Unfortunately, the field of cyber security is rapidly evolvin ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Student Name: AbdulAziz Hazazi
Student ID:4411060
Social Media Personal Information Security
With the rapid proliferation of internet and Web 2.0 technologies, online social media networks
continue to increasingly gain popularity (Zhao and Shery). Almost every person from every corner of the
world can access some form of online social media platform. Through the social media platforms,
millions of people create and exchange user generated content, and connect with each other in ways never
imagined before. Though the use of social media presents new opportunities for socialization, it also
exposes its users to the increasing risk of cyberattacks (Zhao and Shery). Users of social media networks
are therefore expected to be constantly alert and implement strategies and tools that would safeguard them
from cyberattacks. Unfortunately, the field of cyber security is rapidly evolving and users must keep pace
with the developments in cyber security in order know the appropriate tools to use in protecting their
personal information (Zhao and Shery).
The motivation for selecting this topic stems from the increasing number of cyberattacks. Every
single day, cyber criminals launch millions of attacks in the cyberspace. Unfortunately, information in the
cyberspace is not fully protected. Even the most prominent corporate organizations are vulnerable to
cyberattacks. The colossal vulnerability of social media users from cyber threats necessitates an
understanding of the best cyber security tools to protect personal information in the cyber space.
Exploring the current topic therefore creates a strong knowledge base on the best cyber security tools and
strategies available.

Reference Evaluation
List 1:papers Selected
NO

Paper Topic

Author Name

Publish& year

Type

Scour
e

1

Estimating Public Opinion in Social
Media Content Using Aspect-Based
Opinion Mining
Trust in Cyber Security
Recommendations
Recent Cyber Security Attacks and
Their Mitigation Approaches – An
Overview

Yen Hong Tran1

Isi&2018

Conference

85%

Johannes Nakayama

IEEE&2019

conference

80%

Abdullahi Chowdhury

Isi&2016

Conference

83%

4

Workplace digitalisation and
work-nonwork satisfaction:
the role of spillover social
media

Farveh Farivar

2020

article

86%

5

An Enhanced Cyber Attack Attribution
Framework
The Internet and Its Potentials for
Networking and Identity Seeking: A
Study on ISIS
Cyber- security: identiy deception
detection on social media platforms*

Nikolaos Pitropakis

Isi&2018

Conference

85%

Khalil Sarda
rnia & Rasoul
Safizadeh
Estee van eloff

Isi&2017

article

80%

2018

---

80%

Cyber Security in Social Media:
Challenges and the Way Forward
The human factor in the social media
security –combining education and
technology to reduce social
engineering risks and damages
The bottom-up formation and
maintenance of a Twitter community
Research on Children's Network
Privacy Protection in Mobile Social
Media
Early Warnings of Cyber Threats in
Online Discussions
Creation and Management of Social
Network Honeypots for Detecting
Targeted Cyber Attacks
Using Real-Time Fear Appeals to
Improve Social Media Security
IdentifyingKey-Player sinOnlineActivis t
Groupsonthe Facebook SocialNetwork
Mining Social Behavioral Biometrics in
Twitter
Evaluating Internet Security Awareness
and Practices of BulSU-SC Students

Kutub Thakur

IEEE&2019

article

85%

David Tayouri

2015

conference

70%

Eugene Ch’ng

isi&2015

journal

75%

Mengjia Hu1

IEEE&2018

Conference

Anna Sapienza

IEEE&2017

conference

80%

Abigail Paradise, Asaf
Shabtai, Rami Puzis

IEEE&2017

article

75%

Lei Li, Kai Qian

IEEE&2016

conference

75%

Mariam Nouh,jason

IEEE&2015

-----

70%

Madeena Sultana

IEEE&2014

conference

70%

Mary Grace, Elenitat

ICIET&2019

isi

85%

2
3

6

7

8
9

10
11

12
13

14
15
16
17

90%

18
19
20

21

The Science of Social Cyber-Security
SONAR:AutomaticDetectnofCyberSecu
rityEventsoverthe TwitterStream
1st International Workshop on Search
and Mining Terrorist Online Content &
Advances in Data Science for Cyber
Security and Risk on the Web
Parental Awareness on Cyber Threats
Using Social Media

Kathleen Carley
Quentin Le Sceller

2018
2017

conference
----

90%
80%

2017

conference

70%

isi&2019

journal

96%

Theodora T sikrika

NAZILAH AHMAD

22

Protocol for mitigating the risk Jeffrey Cashion
of hijacking social networking
sites.

2011

conference

80%

23

Cyber Threats/Attacks and a Defensive
Model to Mitigate Cyber Activities
The bottom-up formation and
maintenance of a Twitter community
The human factor in the social media
security –combining education and
technology to reduce social
engineering risks and damages
Computer habits and behaviours
among young children in Singapore
Technological Forecasting & Social
Change
Survey of emerging therats in
cybersucrity
Regulation of Cyber Space: An Analysis
of Chinese Law on Cyber Crime
An Enhanced Cyber Attack Attribution
Framework
Security and Vulnerability Assessment
of Social Media Sites: An Exploratory
Study
Security in Social Networking Services:
A Value Focused Thinking Exploration
in Understanding Users’ Privacy and
Security Concerns
The Future of Enterprise Security with
Regards to Mobile Technology and
Applications
Valuing information security from a
phishing attack

JAWAD HUSSAIN
AWAN
Eugene Ch’ng

2018

journal

85%

2015

article

75%

David Tayouri

IEC&2015

article

75%

Nirmala
KaruppiahGroble
Geroj sraidev

2015

article

70%

2016

__

70%

Julian surya

2014

--

70%

Xingan Li

ISI&2015

article

70%

Nikolaos Pitropakis1

ISI&2018

journal

80%

TIiVIi pse NpIooA

2015

journal

75%

Nadine BarrettMaitland, Corlane
Barclay & KwekuMuata Osei-Bryson
F.T. Tagoe1(&) and
M.S. Sharif2

2016

article

70%

2016

journal

70%

Kenneth D.
Nguyen1,Heather
Rosoff2, Richard S.
John1
Serkan SAVAŞ1,
Nurettin TOPALOĞLU2
Kirti Kumari1·Jyoti
Prakash Singh1·Yogesh
Kumar
Dwivedi2·Nripendra
Pratap Rana3

2017

conference

70%

isi&2017

journal

80%

isi&2019

journal

85%

24
25

26
27
28
29
30
31

32

33

34

35
36

Data analysis through social media
according to the classified crime
Towards Cyberbullying-free social
media in smart cities: a unified multimodal approach

37

Prediction of drive-by download
attacks on Twitter
Behavioral analysis and classification of
spammers distributing pornographic
content in social media
Social Sentiment Sensor in Twitter for
Predicting Cyber-Attacks Using l(1)
Regularization

Airwave

2018

Article

85%

Monika Singh

isi&2016

artical

80%

Aldo HernandezSuarez

isi&2018

artical

85%

40

The Social Networks of Cyberbullying
on Twitter

Glenn Sterner

2017

isi

80%

41

Cyber-Extremism: Isis and the Power of
Social Media
Motives for Instagram Use and Topics
of Interest among Young Adults
Group behavior in social media:
Antecedents of initial trust formation

Imran Awan1

isi&2017

journal

80%

Yi-Ting Huang

2018

article

80%

Mahmud A. Shareef

isi&2020

article

85%

44

Gender differences in the addiction
to social networks in the Southern
Spanish university students

Panel PilarAparicioMartínez

2020

article

85%

45*

Detecting breaking news rumors of
emerging topics in social media

Sarah A. Alkhodair

isi&2020

article

90%

46

Opinion Dynamics Research
on Social Media: Breakthroughs and
Challenges

Lun Zhang

2020

article

90%

Vajisha Udayangi

2020

_____

95%

Marianela García

Elsevier &2020

article

90%

IEEE&2020

article

75%

2020

journal

90%

38

39

42
43

47
48

Veracity assessment of online data

49

Simple Statistics Are Sometime Too
Dan Vilenchik
Simple: A Case Study in Social Media
Data
Attitudes and Knowledge of Adolescents in Jordan Regarding the
Ethics of Social Media Data Use for Research Purposes

50

Phase 4: Annotated Bibliography
Ahmad, N., Arifin, A., Asma’Mokhtar, U., Hood, Z., Tiun, S., & Jambari, D. I. (2019).
Parental Awareness on Cyber Threats Using Social Media. Jurnal Komunikasi:
Malaysian Journal of Communication, 35(2).
The article explores the level of parental awareness linked to cyber threats when they use social
media platforms. It is useful as it captures whether or not parents know what their families get
into when sharing information via social sites. The write-up focuses on academicians and
parents.
The article uses scholarly sources, which makes it reliable. The research uses survey and
questionnaires to gather information. The authors argue that parents should be exposed to cyber
threats and risks earlier before joining social sites.
The material is robust and informative. It brings new details, which bolsters the views held by
other sources. The article is appropriate for the forthcoming research.
Al Zou’bi, H. W., Khatatbeh, M., Alzoubi, K. H., Khabour, O. F., & Al-Delaimy, W. K.
(2020). Attitudes and Knowledge of Adolescents in Jordan Regarding the Ethics of
Social Media Data Use for Research Purposes. Journal of Empirical Research on
Human Research Ethics, 15(1-2), 87-96.

The article captures how Jordan adolescents perceive ethics of social media. It is useful because
it explores the knowledge and attitudes of young individuals towards the use of social media
platforms. The source is designed for academicians.
The material uses data and information from peer reviewed journals, which makes it reliable.
The study uses online surveys. The material suggests that children need to be trained more on the
use of social sites.
The article is detailed. It brings new details, which bolsters the views held by other sources. The
article is appropriate for the forthcoming research.
Aparicio-Martínez, P., Ruiz-Rubio, M., Perea-Moreno, A. J., Martínez-Jiménez, M. P.,
Pagliari, C., Redel-Macías, M. D., & Vaquero-Abellán, M. (2020). Gender
differences in the addiction to social networks in the Southern Spanish university
students. Telematics and Informatics, 46, 101304.
The article explores how various genders in the Southern Spanish university students get
addicted to social media platforms. It is useful because it shows the sex that is highly affected by
social sites. The source targets scholars.
The material utilizes data from scholarly sources, which makes it reliable. It uses interviews to
collect data. The source shows that the female ...

PhilipTutor (15063)
UCLA

Anonymous
I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

Anonymous
The tutor was pretty knowledgeable, efficient and polite. Great service!

Anonymous
I did not know how to approach this question, Studypool helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4