21,491 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Success factors in IT Outsourcing
Abstract. To survive and respond to the everchanging business world companies are seeking new ways to concentrate and improve core competencies, as well as improve their competitive status against the market. Companies are exploring how to exploit the core competencies of other companies. The goals of the partnership might differ depending on the scope of the partnership. The goal might be one or many of the following: cost reduction, access to higher quality service, access to technology and/or know-how.
Even if the first IT outsourcing was done around 30 years ago by Eastman Kodak and General Dynamics and the area has been studied quite heavily, the topic seems to be still difficult for companies to grasp the wanted benefits. As the IT outsourcing is widely used option in the business world and the results are not firm, I feel the topic is still relevant to study. The research question for the study is: âWhat factors affect the success of IT outsourcing relationship?â
The research question is answered through the literature review. From the literature review eleven high level success factors can be identified. In some cases, some factors are combined. The success factors are Cost and Quality, Trust, Alignment to business strategy, Culture, Communication, Contracts, Strategic Partnership, Governance, Management support, Infrastructure, and Know-how. How important each individual factors are in outsourcing engagement in question depends on the sort of the partnership.
The theoretical implications are very limited, but the practical implications regarding communication, trust and governance should be considered when companies enter IT outsourcing partnerships. Putting an emphasis on setting up proper governance functions and people who are good at communicating with the other party will pay the efforts back in success of the relationship
Mobile Arts for Peace: Small Grants Evaluation Report
The Mobile Arts for Peace (MAP) project is an international study that seeks to provide a comparative approach to peace-building utilising interdisciplinary arts-based practices, working with communities in Indonesia, Kyrgyzstan, Nepal and Rwanda (see figure 1.1). This research was commissioned by the project lead organisation, the University of Lincoln, and has been delivered by the University of Northamptonâs Institute for Social Innovation and Impact (see Appendix A for research biographies). This report focuses on the Small Grants awarded across the four countries, and acts as a follow-up to the Phase One Report that was produced in the winter of 2021. The delivery of the Small Grants projects has taken place over the last 12 months across the above four countries, and this report seeks to demonstrate, through a narrative case-study approach, how the Small Grants work delivered has promoted arts-based peacebuilding and supported community cohesion. The research reported in this document took place between February and October 2022 and focused on the below research aim and four key research questions. Aim: To evaluate the efficacy of the MAP Small Grants projects and understand their impact in communities. Specifically: 1. What outputs were delivered through the Small Grants projects? 2. What outcomes for beneficiaries/stakeholders were delivered through the Small Grants projects? 3. What impacts delivered for communities and societies across the four countries were delivered through the Small Grants projects? The report is structured as follows: first, the methodological approach undertaken in the evaluation will be presented; second, the case-studies across the four countries will be presented and discussed, utilising data gathered by the in-country research teams and the arts-based outputs produced; third, the findings will be summarised, with specific recommendations also made for the implications related to the MAP Large Grant evaluation projects and the recently awarded MAP Medium Grant projects. References and Appendices can also be found at the end of the report
Consent and the Construction of the Volunteer: Institutional Settings of Experimental Research on Human Beings in Britain during the Cold War
This study challenges the primacy of consent in the history of human experimentation and argues that privileging the cultural frameworks adds nuance to our understanding of the construction of the volunteer in the period 1945 to 1970. Historians and bio-ethicists have argued that medical ethics codes have marked out the parameters of using people as subjects in medical scientific research and that the consent of the subjects was fundamental to their status as volunteers. However, the temporality of the creation of medical ethics codes means that they need to be understood within their historical context. That medical ethics codes arose from a specific historical context rather than a concerted and conscious determination to safeguard the well-being of subjects needs to be acknowledged. The British context of human experimentation is under-researched and there has been even less focus on the cultural frameworks within which experiments took place. This study demonstrates, through a close analysis of the Medical Research Council's Common Cold Research Unit (CCRU) and the government's military research facility, the Chemical Defence Experimental Establishment, Porton Down (Porton), that the `volunteer' in human experiments was a subjective entity whose identity was specific to the institution which recruited and made use of the subject. By examining representations of volunteers in the British press, the rhetoric of the government's collectivist agenda becomes evident and this fed into the institutional construction of the volunteer at the CCRU. In contrast, discussions between Porton scientists, staff members, and government officials demonstrate that the use of military personnel in secret chemical warfare experiments was far more complex. Conflicting interests of the military, the government and the scientific imperative affected how the military volunteer was perceived
Older Peopleâs Online Information Search During the Pandemic
As the world continues to grapple with the pandemic, how competently people search and process COVID-19-related information online has serious ramifications. In this vein, a demographic segment that is particularly research-worthy includes older people, who are usually slower in technology adoption and use compared with younger people. For these reasons, the objective of this paper is to explore how people aged 65+ search and process online information related to COVID-19. Fifteen semi-structured, in-depth interviews were conducted in the UK. The older people were found to maintain varied and broad information portfolios. Many found the internet to be an efficient avenue to seek and share information. The participants generally dismissed social media but deemed authoritative information sources (e.g., the WHO website) to be reliable. They were cautious about scams and misinformation online, and were likely to adopt an âif in doubt, avoidâ approach to unfamiliar sites. The study shows that older people in their effort to avoid misinformation may limit their information consumption journeys; nevertheless, this practice keeps them safe. Based on these findings, several implications for theory and practice are discussed
Sponsorship of individual athletes in relation to the companyâs marketing strategy
Abstract. Sports marketing is constantly evolving and its importance as a marketing tool is strengthening worldwide. As a result, sponsorship of individual athletes and personal brands have become strategic marketing tools for companies. The marketing strategy of companies should follow and support the overall strategy of the company, therefore marketing measures, such as, sponsorship should also follow and support the overall strategy. Previous research has examined sponsorship from the perspective of value creation as well as from the perspective of how sponsorship affects the corporate image and the benefits of sponsorship for stakeholders. In terms of strategy, sponsorship has been examined from the perspective of what kind of sponsorship strategies companies have. Sponsorship in general and the sponsorship of individual athletes as its sub-theme are still very little studied themes in Finland. Therefore, comprehensive data is required on how sponsorship can be utilized as a strategic tool in marketing.
The aim of the study is to investigate how the sponsorship of individual athletes in Finland is linked to the marketing strategy of companies. Interviewing Finnish companies is of primary importance for researching this topic.
The research follows an abductive process, which means that the existing literature is studied first, and the empirical analysis is conducted based on the formed theoretical framework. The research is a qualitative multiple-case study, and the empirical data is collected through five semi-structured interviews with company representatives of large and medium-sized enterprises of various business sectors.
Based on the data, companies perceive individual athlete sponsorship either as an embedded part of a marketing strategy, as partially embedded marketing measure, or as not in relation to marketing strategy. This is influenced by factors, such as, industry, the size of the sponsorship agreement, the athletesâ own motivation, and the companiesâ ability or inability to utilize individual athletes in the companyâs marketing communications. Sponsorship of individual athletes was seen as a regionally significant factor from the perspective of corporate social responsibility
Strategies for Early Learners
Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: ⢠Developing curriculum through the planning cycle ⢠Theories that inform what we know about how children learn and the best ways for teachers to support learning ⢠The three components of developmentally appropriate practice ⢠Importance and value of play and intentional teaching ⢠Different models of curriculum ⢠Process of lesson planning (documenting planned experiences for children) ⢠Physical, temporal, and social environments that set the stage for childrenâs learning ⢠Appropriate guidance techniques to support childrenâs behaviors as the self-regulation abilities mature. ⢠Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety ⢠Making childrenâs learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp
Media sexualization and its impact on college aged women
Social and traditional media are often studied in relation to womenâs perceptions of sex. However, they are often studied separately instead of together, missing the overall connection of media on attitudes. The purpose of this study was to investigate the relationship between media consumption, specifically social media and television, and college-aged women\u27s levels of internalized sexualization. The findings of this study found a significant positive correlation between time spent consuming romanced-based reality television and romantic comedies and higher levels of internalized sexualization in college-aged women. This study also found there to be a significant positive correlation between college womenâs usage of Instagram and their levels of internalized sexualization. These findings suggest that there is a significant relationship between time spent on Instagram, consumption of romance-based reality television and romantic comedies, and higher levels of internalized sexualization
- âŚ