Today's world is a global village. Everyone is connected to one another in this vast network generated by the Internet. As social media sites continue to grow in popularity it promises a lot for the modern youth. Social media has been widely adopted, with high enthusiasm among youth around the world. With very few studies focusing on youth social media use in Ghana there is wide open array of work to be done. Based on the findings of several research studies in social media area, it has been found that these Social networking sites are having a great impact on the lives of young people. Also since most of the research works have been carried out in other countries, it was found necessary and important to carry out a study in Ghana on the impact of Social Media on the youth. The main objectives of this study were to investigate the extent of social media use and the purposes, access and impact of its use by the young people in Ghana. Two hundred youth aged between 15-25 participated in the study. The findings revealed patterns of young people's social media use consistent with similar studies of youths in other countries. The study revealed the need for young people to have a greater awareness of the risks of social media use. It was found that the majority of Ghanaian youths were using Social media on an enormous scale, mainly for communication purposes. According to this study, although social media has a positive impact on the youth, yet quite a large number of respondents reported having met with negative experiences on these online sites.
When cloud clients outsource their database to the cloud, they entrust management operations to a cloud service provider who is expected to answer the client's queries on the cloud where database is located. Efficient techniques can ensure critical requirements for outsourced data's integrity and authenticity. A lightweight privacy preserving verifiable scheme for outsourcing database securely is proposed, our scheme encrypts data before outsourcing and returned query results are verified with parameters of correctness and completeness. Our scheme is projected on lightweight homomorphic encryption technique and bloom filter which are efficiently authenticated to guarantee the outsourced database's integrity, authenticity, and confidentiality. An ordering challenge technique is proposed for verifying top-k query results. We conclude by detailing our analysis of security proofs, privacy, verifiability and the performance efficiency of our scheme. Our proposed scheme's proof and evaluation analysis show its security and efficiency for practical deployment. We also evaluate our scheme's performances over two UCI data sets.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.