7,875 research outputs found

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    A systematic literature review on Virtual Reality and Augmented Reality in terms of privacy, authorization and data-leaks

    Full text link
    In recent years, VR and AR has exploded into a multimillionaire market. As this emerging technology has spread to a variety of businesses and is rapidly increasing among users. It is critical to address potential privacy and security concerns that these technologies might pose. In this study, we discuss the current status of privacy and security in VR and AR. We analyse possible problems and risks. Besides, we will look in detail at a few of the major concerns issues and related security solutions for AR and VR. Additionally, as VR and AR authentication is the most thoroughly studied aspect of the problem, we concentrate on the research that has already been done in this area.Comment: 9 Pages, 4 figure

    Emerging Technology Adoption and Use : Consolidated Assignments from Spring 2020

    Get PDF
    Digitalization changes the world. Information systems, software applications and other technologies are in a central role in this change. They enable new work practices and processes, new business models and opportunities, initiate changes in how technologies are used, perceived and interpreted, and ultimately force individuals, organizations, and even societies at large to respond to those changes. Individuals, organizations, and societies have to somehow transform and adjust their old ways of doing things. Yet, not only technologies drive digital transformation. Increasing amounts of data that is produced by numerous sensors, applications, and systems account for the transformation as well. Such data is gathered and collected, merged together, and analyzed by different methods and tools; by using artificial intelligence, data analytics, or data science. The sense-making of such versatile data is of importance because not only can it be used to improve decision-making at workplaces but also, it can be utilized for the benefit of individuals and societies, in organizational and non-work settings. These views, transformation and smartness, pose several questions for information system (IS) research. In general, we might ask what actually is the smartness of individuals, organizations, or a society. We can even ask whether stakeholders possess the required abilities, skills and competences to enable and support the change. These, and other related questions arise due to fast evolving landscape of information technology, and information and technology. The nuanced understanding of Smart Transformation in IS has become even more critical due to governmental and organizational programs that foster smartness. This report summarizes research reports of students attending ā€œEmerging Technology Adoption and Useā€ course in Tampere University. During the course, we focused on three emerging technologies. Extended Reality Blockchain Artificial Intelligence Each group collaborated on finding a common topic of interest. They focused on the adoption and/or use of a particular emerging technology in a setting of their own choosing. As you are about to see, the findings of each group emphasize different perspectives. These range from the negative effects of technology use to the opportunities and delights of information systems
    • ā€¦
    corecore