Security and Privacy Concerns of Virtual Worlds

Author(s):  
Greg Gogolin

This chapter looks at security and privacy concerns of virtual worlds by investigating the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, and virtual worlds. Security and privacy concerns will be investigated in the context of exploits and IT-related security risks, access management and confidentiality, reputation and product risk management, resource management, financial considerations and accountability, and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security -confidentiality, integrity, and availability - provide an overall framework for the chapter.

2014 ◽  
Vol 4 (1) ◽  
pp. 30-42 ◽  
Author(s):  
Greg Gogolin ◽  
Erin Gogolin ◽  
Hwee-Joo Kam

The use of virtual worlds and social media has grown to the point that more than one-quarter of the world's population utilize it in some manner. Security and privacy concerns regarding the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, virtual worlds and Web 3.0 is examined. Security and privacy concerns are investigated in the context of exploits, vulnerabilities, and related security risks; confidential access control; communication trends and patterns in the use of massive communication strategies; intellectual property and product risk management; resource management; financial considerations and accountability; and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security - confidentiality, integrity, and availability - provide an overall framework.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2019 ◽  
Vol 5 (2) ◽  
pp. 144-162
Author(s):  
Regina Yanson ◽  
Melissa J. Mann

This article provides an overview of job design and offers an experiential teaching exercise to help students develop a better comprehension of job design and redesign, as well as learn the importance and challenges of such undertakings. Understanding the core elements of job design is especially important because job design serves as the foundational block for a deeper understanding and application of other organizational phenomenon such as the job characteristics model. This exercise is intended for the introductory undergraduate and graduate-level human resource management course as well as any courses covering “staffing.” Additionally, this activity may be used in the undergraduate Principles of Management or associated introductory management class.


2021 ◽  
Author(s):  
Heiko Apel ◽  
Sergiy Vorogushyn ◽  
Mostafa Farrag ◽  
Nguyen Viet Dung ◽  
Melanie Karremann ◽  
...  

<p>Urban flash floods caused by heavy convective precipitation pose an increasing threat to communes world-wide due to the increasing intensity and frequency of convective precipitation caused by a warming atmosphere. Thus, flood risk management plans adapted to the current flood risk but also capable of managing future risks are of high importance. These plans necessarily need model based pluvial flood risk simulations. In an urban environment these simulations have to have a high spatial and temporal resolution in order to site-specific management solutions. Moreover, the effect of the sewer systems needs to be included to achieve realistic inundation simulations, but also to assess the effectiveness of the sewer system and its fitness to future changes in the pluvial hazard. The setup of these models, however, typically requires a large amount of input data, a high degree of modelling expertise, a long time for setting up the model setup and to finally run the simulations. Therefor most communes cannot perform this task.</p><p> In order to provide model-based pluvial urban flood hazard and finally risk assessments for a large number of communes, the model system RIM<em>urban</em> was developed. The core of the system consists of a simplified raster-based 2D hydraulic model simulating the urban surface inundation in high spatial resolution. The model is implemented on GPUs for massive parallelization. The specific urban hydrology is considered by a capacity-based simulation of the sewer system and infiltration on non-sealed surfaces, and flow routing around buildings. The model thus considers the specific urban hydrological features, but with simplified approaches. Due to these simplifications the model setup can be performed with comparatively low data requirements, which can be covered with open data in most cases. The core data required are a high-resolution DEM, a layer of showing the buildings, and a land use map.</p><p>The spatially distributed rainfall input can be derived local precipitation records, or from an analysis of weather radar records of heavy precipitation events. A catalogue of heavy rain storms all over Germany is derived based on radar observations of the past 19 years. This catalogue serves as input for pluvial risk simulations for individual communes in Germany, as well as a catalogue of possible extreme events for the current climate. Future changes in these extreme events will be estimated based on regional climate simulations of a ΔT (1.5°C, 2°C) warmer world.</p><p>RIM<em>urban</em> simulates the urban inundation caused by these events, as well as the stress on the sewer system. Based on the inundation maps the damage to residential buildings will be estimated and further developed to a pluvial urban flood risk assessment. Because of the comparatively simple model structure and low data demand, the model setup can be easily automatized and transferred to most small to medium sized communes in Europe and even beyond, if the damage estimation is modified. RIM<em>urban</em> is thus seen as a generally appölicable screening tool for urban pluvial flood risk and a starting point for adapted risk management plans.</p>


2012 ◽  
Vol 3 (2) ◽  
pp. 36-49 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Osamah Ghaleb

This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this relation. Discussion, conclusion and future work are stated at the end of this paper.


2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


2020 ◽  
Author(s):  
Yong Weixiong ◽  
Kohei Dozono ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.


Sign in / Sign up

Export Citation Format

Share Document