15,395 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Identifying and responding to people with mild learning disabilities in the probation service

    Get PDF
    It has long been recognised that, like many other individuals, people with learningdisabilities find their way into the criminal justice system. This fact is not disputed. Whathas been disputed, however, is the extent to which those with learning disabilities arerepresented within the various agencies of the criminal justice system and the ways inwhich the criminal justice system (and society) should address this. Recently, social andlegislative confusion over the best way to deal with offenders with learning disabilities andmental health problems has meant that the waters have become even more muddied.Despite current government uncertainty concerning the best way to support offenders withlearning disabilities, the probation service is likely to continue to play a key role in thesupervision of such offenders. The three studies contained herein aim to clarify the extentto which those with learning disabilities are represented in the probation service, toexamine the effectiveness of probation for them and to explore some of the ways in whichprobation could be adapted to fit their needs.Study 1 and study 2 showed that around 10% of offenders on probation in Kent appearedto have an IQ below 75, putting them in the bottom 5% of the general population. Study 3was designed to assess some of the support needs of those with learning disabilities in theprobation service, finding that many of the materials used by the probation service arelikely to be too complex for those with learning disabilities to use effectively. To addressthis, a model for service provision is tentatively suggested. This is based on the findings ofthe three studies and a pragmatic assessment of what the probation service is likely to becapable of achieving in the near future

    Animating potential for intensities and becoming in writing: challenging discursively constructed structures and writing conventions in academia through the use of storying and other post qualitative inquiries

    Get PDF
    Written for everyone ever denied the opportunity of fulfilling their academic potential, this is ‘Chloe’s story’. Using composite selves, a phrase chosen to indicate multiplicities and movement, to story both the initial event leading to ‘Chloe’s’ immediate withdrawal from a Further Education college and an imaginary second chance to support her whilst at university, this Deleuzo-Guattarian (2015a) ‘assemblage’ of post qualitative inquiries offers challenge to discursively constructed structures and writing conventions in academia. Adopting a posthuman approach to theorising to shift attention towards affects and intensities always relationally in action in multiple ‘assemblages’, these inquiries aim to decentre individual ‘lecturer’ and ‘student’ identities. Illuminating movements and moments quivering with potential for change, then, hoping thereby to generate second chances for all, different approaches to writing are exemplified which trouble those academic constraints by fostering inquiry and speculation: moving away from ‘what is’ towards ‘what if’. With the formatting of this thesis itself also always troubling the rigid Deleuzo-Guattarian (2015a) ‘segmentary lines’ structuring orthodox academic practice, imbricated in these inquiries are attempts to exemplify Manning’s (2015; 2016) ‘artfulness’ through shifts in thinking within and around an emerging PhD thesis. As writing resists organising, the verb thesisising comes into play to describe the processes involved in creating this always-moving thesis. Using ‘landing sites’ (Arakawa and Gins, 2009) as a landscaping device, freely creating emerging ‘lines of flight’ (Deleuze and Guattari, 2015a) so often denied to students forced to adhere to strict academic conventions, this ‘movement-moving’ (Manning, 2014) opens up opportunities for change as in Manning’s (2016) ‘research-creation’. Arguing for a moving away from writing-representing towards writing-inquiring, towards a writing ‘that does’ (Wyatt and Gale, 2018: 127), and toward writing as immanent doing, it is hoped to animate potential for intensities and becoming in writing, offering opportunities and glimmerings of the not-yet-known

    Towards a sociology of conspiracy theories: An investigation into conspiratorial thinking on Dönmes

    Get PDF
    This thesis investigates the social and political significance of conspiracy theories, which has been an academically neglected topic despite its historical relevance. The academic literature focuses on the methodology, social significance and political impacts of these theories in a secluded manner and lacks empirical analyses. In response, this research provides a comprehensive theoretical framework for conspiracy theories by considering their methodology, political impacts and social significance in the light of empirical data. Theoretically, the thesis uses Adorno's semi-erudition theory along with Girardian approach. It proposes that conspiracy theories are methodologically semi-erudite narratives, i.e. they are biased in favour of a belief and use reason only to prove it. It suggests that conspiracy theories appear in times of power vacuum and provide semi-erudite cognitive maps that relieve alienation and ontological insecurities of people and groups. In so doing, they enforce social control over their audience due to their essentialist, closed-to-interpretation narratives. In order to verify the theory, the study analyses empirically the social and political significance of conspiracy theories about the Dönme community in Turkey. The analysis comprises interviews with conspiracy theorists, conspiracy theory readers and political parties, alongside a frame analysis of the popular conspiracy theory books on Dönmes. These confirm the theoretical framework by showing that the conspiracy theories are fed by the ontological insecurities of Turkish society. Hence, conspiracy theorists, most readers and some political parties respond to their own ontological insecurities and political frustrations through scapegoating Dönmes. Consequently, this work shows that conspiracy theories are important symptoms of society, which, while relieving ontological insecurities, do not provide politically prolific narratives

    Coloniality and the Courtroom: Understanding Pre-trial Judicial Decision Making in Brazil

    Get PDF
    This thesis focuses on judicial decision making during custody hearings in Rio de Janeiro, Brazil. The impetus for the study is that while national and international protocols mandate the use of pre-trial detention only as a last resort, judges continue to detain people pre-trial in large numbers. Custody hearings were introduced in 2015, but the initiative has not produced the reduction in pre-trial detention that was hoped. This study aims to understand what informs judicial decision making at this stage. The research is approached through a decolonial lens to foreground legacies of colonialism, overlooked in mainstream criminological scholarship. This is an interview-based study, where key court actors (judges, prosecutors, and public defenders) and subject matter specialists were asked about influences on judicial decision making. Interview data is complemented by non-participatory observation of custody hearings. The research responds directly to Aliverti et al.'s (2021) call to ‘decolonize the criminal question’ by exposing and explaining how colonialism informs criminal justice practices. Answering the call in relation to judicial decision making, findings provide evidence that colonial-era assumptions, dynamics, and hierarchies were evident in the practice of custody hearings and continue to inform judges’ decisions, thus demonstrating the coloniality of justice. This study is significant for the new empirical data presented and theoretical innovation is also offered via the introduction of the ‘anticitizen’. The concept builds on Souza’s (2007) ‘subcitizen’ to account for the active pursuit of dangerous Others by judges casting themselves as crime fighters in a modern moral crusade. The findings point to the limited utility of human rights discourse – the normative approach to influencing judicial decision making around pre-trial detention – as a plurality of conceptualisations compete for dominance. This study has important implications for all actors aiming to reduce pre-trial detention in Brazil because unless underpinning colonial logics are addressed, every innovation risks becoming the next lei para inglĂȘs ver (law [just] for the English to see)

    Embodying entrepreneurship: everyday practices, processes and routines in a technology incubator

    Get PDF
    The growing interest in the processes and practices of entrepreneurship has been dominated by a consideration of temporality. Through a thirty-six-month ethnography of a technology incubator, this thesis contributes to extant understanding by exploring the effect of space. The first paper explores how class structures from the surrounding city have appropriated entrepreneurship within the incubator. The second paper adopts a more explicitly spatial analysis to reveal how the use of space influences a common understanding of entrepreneurship. The final paper looks more closely at the entrepreneurs within the incubator and how they use visual symbols to develop their identity. Taken together, the three papers reject the notion of entrepreneurship as a primarily economic endeavour as articulated through commonly understood language and propose entrepreneuring as an enigmatic attractor that is accessed through the ambiguity of the non-verbal to develop the ‘new’. The thesis therefore contributes to the understanding of entrepreneurship and proposes a distinct role for the non-verbal in that understanding

    Orientalism Restated in the Era of COVID-19

    Get PDF
    This essay bridges a gap between an analysis of anti-Asian targeting and an analysis of Orientalism. Because histories of Orientalism and anti-Asian targeting pre-date the current moment, I demonstrate the centrality of Orientalism to the evolution of xenophobic language and sentiment in U.S.-foreign historical relations. I recount instances of anti-Asian, xenophobic, and “Yellow-Peril” rhetoric in the wake of the global COVID-19 pandemic. In doing so, I examine the racialization of COVID-19 as a trope of orientalism. This racialization, I argue, places the Asian-presenting body in a state of heightened visibility, precarity, and susceptibility to plunder. The newfound precarity of the Asian body has been redefined in terms of the epidemiology of COVID-19 and illustrates how today’s Orientalism has been reactivated within the phenomenological space of the human body
    • 

    corecore