7,875 research outputs found
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial
render instructional content in a three-dimensional immersive computer
experience for training youth with learning impediments. There are limited
prior works that explored attack vulnerability in VR technology, and hence
there is a need for systematic frameworks to quantify risks corresponding to
security, privacy, and safety (SPS) threats. The SPS threats can adversely
impact the educational user experience and hinder delivery of VRLE content. In
this paper, we propose a novel risk assessment framework that utilizes attack
trees to calculate a risk score for varied VRLE threats with rate and duration
of threats as inputs. We compare the impact of a well-constructed attack tree
with an adhoc attack tree to study the trade-offs between overheads in managing
attack trees, and the cost of risk mitigation when vulnerabilities are
identified. We use a vSocial VRLE testbed in a case study to showcase the
effectiveness of our framework and demonstrate how a suitable attack tree
formalism can result in a more safer, privacy-preserving and secure VRLE
system.Comment: Tp appear in the CCNC 2019 Conferenc
A systematic literature review on Virtual Reality and Augmented Reality in terms of privacy, authorization and data-leaks
In recent years, VR and AR has exploded into a multimillionaire market. As
this emerging technology has spread to a variety of businesses and is rapidly
increasing among users. It is critical to address potential privacy and
security concerns that these technologies might pose. In this study, we discuss
the current status of privacy and security in VR and AR. We analyse possible
problems and risks. Besides, we will look in detail at a few of the major
concerns issues and related security solutions for AR and VR. Additionally, as
VR and AR authentication is the most thoroughly studied aspect of the problem,
we concentrate on the research that has already been done in this area.Comment: 9 Pages, 4 figure
Emerging Technology Adoption and Use : Consolidated Assignments from Spring 2020
Digitalization changes the world. Information systems, software applications and other technologies are in a central role in this change. They enable new work practices and processes, new business models and opportunities, initiate changes in how technologies are used, perceived and interpreted, and ultimately force individuals, organizations, and even societies at large to respond to those changes. Individuals, organizations, and societies have to somehow transform and adjust their old ways of doing things. Yet, not only technologies drive digital transformation. Increasing amounts of data that is produced by numerous sensors, applications, and systems account for the transformation as well. Such data is gathered and collected, merged together, and analyzed by different methods and tools; by using artificial intelligence, data analytics, or data science. The sense-making of such versatile data is of importance because not only can it be used to improve decision-making at workplaces but also, it can be utilized for the benefit of individuals and societies, in organizational and non-work settings. These views, transformation and smartness, pose several questions for information system (IS) research. In general, we might ask what actually is the smartness of individuals, organizations, or a society. We can even ask whether stakeholders possess the required abilities, skills and competences to enable and support the change. These, and other related questions arise due to fast evolving landscape of information technology, and information and technology. The nuanced understanding of Smart Transformation in IS has become even more critical due to governmental and organizational programs that foster smartness. This report summarizes research reports of students attending āEmerging Technology Adoption and Useā course in Tampere University. During the course, we focused on three emerging technologies. Extended Reality Blockchain Artificial Intelligence Each group collaborated on finding a common topic of interest. They focused on the adoption and/or use of a particular emerging technology in a setting of their own choosing. As you are about to see, the findings of each group emphasize different perspectives. These range from the negative effects of technology use to the opportunities and delights of information systems
- ā¦