14,321 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Success factors in IT Outsourcing

    Get PDF
    Abstract. To survive and respond to the everchanging business world companies are seeking new ways to concentrate and improve core competencies, as well as improve their competitive status against the market. Companies are exploring how to exploit the core competencies of other companies. The goals of the partnership might differ depending on the scope of the partnership. The goal might be one or many of the following: cost reduction, access to higher quality service, access to technology and/or know-how. Even if the first IT outsourcing was done around 30 years ago by Eastman Kodak and General Dynamics and the area has been studied quite heavily, the topic seems to be still difficult for companies to grasp the wanted benefits. As the IT outsourcing is widely used option in the business world and the results are not firm, I feel the topic is still relevant to study. The research question for the study is: “What factors affect the success of IT outsourcing relationship?” The research question is answered through the literature review. From the literature review eleven high level success factors can be identified. In some cases, some factors are combined. The success factors are Cost and Quality, Trust, Alignment to business strategy, Culture, Communication, Contracts, Strategic Partnership, Governance, Management support, Infrastructure, and Know-how. How important each individual factors are in outsourcing engagement in question depends on the sort of the partnership. The theoretical implications are very limited, but the practical implications regarding communication, trust and governance should be considered when companies enter IT outsourcing partnerships. Putting an emphasis on setting up proper governance functions and people who are good at communicating with the other party will pay the efforts back in success of the relationship

    Increased lifetime of Organic Photovoltaics (OPVs) and the impact of degradation, efficiency and costs in the LCOE of Emerging PVs

    Get PDF
    Emerging photovoltaic (PV) technologies such as organic photovoltaics (OPVs) and perovskites (PVKs) have the potential to disrupt the PV market due to their ease of fabrication (compatible with cheap roll-to-roll processing) and installation, as well as their significant efficiency improvements in recent years. However, rapid degradation is still an issue present in many emerging PVs, which must be addressed to enable their commercialisation. This thesis shows an OPV lifetime enhancing technique by adding the insulating polymer PMMA to the active layer, and a novel model for quantifying the impact of degradation (alongside efficiency and cost) upon levelized cost of energy (LCOE) in real world emerging PV installations. The effect of PMMA morphology on the success of a ternary strategy was investigated, leading to device design guidelines. It was found that either increasing the weight percent (wt%) or molecular weight (MW) of PMMA resulted in an increase in the volume of PMMA-rich islands, which provided the OPV protection against water and oxygen ingress. It was also found that adding PMMA can be effective in enhancing the lifetime of different active material combinations, although not to the same extent, and that processing additives can have a negative impact in the devices lifetime. A novel model was developed taking into account realistic degradation profile sourced from a literature review of state-of-the-art OPV and PVK devices. It was found that optimal strategies to improve LCOE depend on the present characteristics of a device, and that panels with a good balance of efficiency and degradation were better than panels with higher efficiency but higher degradation as well. Further, it was found that low-cost locations were more favoured from reductions in the degradation rate and module cost, whilst high-cost locations were more benefited from improvements in initial efficiency, lower discount rates and reductions in install costs

    The interpretation of Islam and nationalism by the elite through the English language media in Pakistan.

    Get PDF
    The media is constructed and interpreted through what people 'know'. That knowledge is, forthe most part, created through day to day experiences. In Pakistan, Islam and nationalism aretwo components of this social knowledge which are intrinsically tied to the experiences of thePakistani people. Censorship and selection are means through which this knowledge isarticulated and interpreted.General conceptions of partially shared large scale bodies of knowledge and ideas reinforce,and are reinforced by, general medium of mass communication: the print and electronic media.Focusing on the govermnent, media institutions and Pakistani elites, I describe and analyse thedifferent, sometimes conflicting, interpretations of Islam and Pakistani nationalism manifest inand through media productions presented in Pakistan.The media means many things, not least of which is power. It is the media as a source ofpower that is so frequently controlled, directed and manipulated. The terminology may beslightly different according to the context within which one is talking - propaganda, selection,etc. - but ultimately it comes down to the same thing - censorship. Each of the three groups:government, media institutions and Pakistani elites - have the power to interpret and censormedia content and consideration must be taken of each of the other power holders consequentlyrestricting the power of each group in relation to the other two. The processes of thismanipulation and their consequences form the major themes of this thesis

    How to Be a God

    Get PDF
    When it comes to questions concerning the nature of Reality, Philosophers and Theologians have the answers. Philosophers have the answers that can’t be proven right. Theologians have the answers that can’t be proven wrong. Today’s designers of Massively-Multiplayer Online Role-Playing Games create realities for a living. They can’t spend centuries mulling over the issues: they have to face them head-on. Their practical experiences can indicate which theoretical proposals actually work in practice. That’s today’s designers. Tomorrow’s will have a whole new set of questions to answer. The designers of virtual worlds are the literal gods of those realities. Suppose Artificial Intelligence comes through and allows us to create non-player characters as smart as us. What are our responsibilities as gods? How should we, as gods, conduct ourselves? How should we be gods

    Innovation systems’ response to changes in the institutional impulse: Analysis of the evolution of the European energy innovation system from FP7 to H2020

    Get PDF
    This study addresses how the institutional impulse developed by the European Union influenced the evolution of the European energy innovation system. Considering the contributing role of innovation systems in the development of new knowledge and technology, it can be stated that the institutional impulse achieved by the European Union through the research framework programmes creates a network of relations between entities and projects. This enables the exchange of information and expertise, which is considered a key element for innovation development. Previous studies have attempted to determine whether institutional impulse is an essential element in understanding the efficiency of innovation systems and their related research policies. However, their investigations have yielded inconclusive results. Using the CORDIS database of the European Commission, this study aims to fill this gap by assessing the European energy innovation system for two periods (2007–2013 and 2014–2020) through two of its research funding programmes—FP7 and H2020—thereby contributing to the literature in the innovation systems field. Social network analysis has been conducted to examine how changes in the institutional impulse, reflected in the new objectives in the research funding programmes, are associated with changes in the structural and topological properties of the innovation systems’ underlying networks. The first contribution indicates that the innovation system responds to changes in the goals of funding programmes, as the taxonomy, topology, and structural properties of their underlying networks underwent modifications due to the newly proposed objectives. The second contribution shows that network properties (cohesion and centrality metrics) can explain the efficiency and effectiveness of innovation systems, drawing useful conclusions for policymakers and individual entities. This last contribution also has important policymaking implications, as it provides the basis for understanding how innovation policy goals can be achieved by changing the institutional impulse to direct the innovation system towards these objectives

    Studies of strategic performance management for classical organizations theory & practice

    Get PDF
    Nowadays, the activities of "Performance Management" have spread very broadly in actually every part of business and management. There are numerous practitioners and researchers from very different disciplines, who are involved in exploring the different contents of performance management. In this thesis, some relevant historic developments in performance management are first reviewed. This includes various theories and frameworks of performance management. Then several management science techniques are developed for assessing performance management, including new methods in Data Envelopment Analysis (DEA) and Soft System Methodology (SSM). A theoretical framework for performance management and its practical procedures (five phases) are developed for "classic" organizations using soft system thinking, and the relationship with the existing theories are explored. Eventually these results are applied in three case studies to verify our theoretical development. One of the main contributions of this work is to point out, and to systematically explore the basic idea that the effective forms and structures of performance management for an organization are likely to depend greatly on the organizational configuration, in order to coordinate well with other management activities in the organization, which has seemingly been neglected in the existing literature of performance management research in the sense that there exists little known research that associated particular forms of performance management with the explicit assumptions of organizational configuration. By applying SSM, this thesis logically derives some main functional blocks of performance management in 'classic' organizations and clarifies the relationships between performance management and other management activities. Furthermore, it develops some new tools and procedures, which can hierarchically decompose organizational strategies and produce a practical model of specific implementation steps for "classic" organizations. Our approach integrates popular types of performance management models. Last but not least, this thesis presents findings from three major cases, which are quite different organizations in terms of management styles, ownership, and operating environment, to illustrate the fliexbility of the developed theoretical framework
    • …
    corecore