Essays about: "Man-in"
Showing result 6 - 10 of 81 essays containing the word Man-in.
-
6. “Big Black Cocks” & Interracial Attraction : A Quantitative Study on Stereotypes in Pornography & Black Men’s Sexualities
University essay from Malmö universitet/Fakulteten för hälsa och samhälle (HS)Abstract : The portrayed, stereotypical sexuality of the Black man in pornography is nothing short of extraordinary when it comes to stamina, skill and performance. The stereotype of the “Big Black Cock” and its impact on sexual partners is widely known by consumers of pornography but what impact does the depiction of it have on Black men and their sexual performances in real life? This thesis aims to examine, through a quantitative approach, if and how the tendency towards conforming to the stereotype of the “Big Black Cock”, makes an impact on the sex life of the participant and if it also brings about a perception of a societal expectation of being attracted to White women. READ MORE
-
7. Same, Same, but Different: Exploring Autonomy in Collective Memory Formation for Ontological Security in Macau, Hong Kong, and Taiwan : A Comparative Analysis of the Second Sino-Japanese War and Japanese Occupation in School Curricula and History Textbooks
University essay from Uppsala universitet/Hugo Valentin-centrumAbstract : This thesis contributes to the existing literature by exploring the intersection between collective memory theory and ontological security theory within East Asia’s autonomous entities. It explores how varying degrees of political autonomy shape the construction of collective memory in history textbooks, navigating the dynamics in the pursuit of ontological security. READ MORE
-
8. Edge Computing Security for IoT : A Systematic Literature Review
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : This study conducts a systematic literature review (SLR) to explore the security threats, their mitigation strategies, and the roles of blockchain and 5G technologies in enhancing the security of IoT devices in edge computing environments. Utilizing digital libraries as resources, the review examines three research questions that delve into the common security threats for IoT devices in edge computing, the unique security issues for sensors, gateways, and actuators, and the advantages of integrating blockchain and 5G technologies into edge computing security for IoT systems. READ MORE
-
9. Exploring IoT Security Threats and Forensic Challenges: A LiteratureReview and Survey Study
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Internet of Things (IoT) devices have increased rapidly in recent years, revolutionizing many industries, including healthcare, manufacturing, and transportation, and bringing benefits to both individuals and industries. However, this increase in IoT device usage has exposed IoT ecosystems to numerous security threats and digital forensic challenges. READ MORE
-
10. HRTF-Based Sound Field Interpolation in the Presence of a Human Head
University essay from Lunds universitet/Matematisk statistikAbstract : There are different ways of evaluating the sound pressure in a sound field. Doing so is an essential part of several applications, such as active sound control and voice analysis. READ MORE