16,621 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Victims' Access to Justice in Trinidad and Tobago: An exploratory study of experiences and challenges of accessing criminal justice in a post-colonial society
This thesis investigates victims' access to justice in Trinidad and Tobago, using their own narratives. It seeks to capture how their experiences affected their identities as victims and citizens, alongside their perceptions of legitimacy regarding the criminal justice system. While there have been some reforms in the administration of criminal justice in Trinidad and Tobago, such reforms have not focused on victims' accessibility to the justice system. Using grounded theory methodology, qualitative data was collected through 31 in-depth interviews with victims and victim advocates. The analysis found that victims experienced interpersonal, structural, and systemic barriers at varying levels throughout the criminal justice system, which manifested as institutionalized secondary victimization, silencing and inequality. This thesis argues that such experiences not only served to appropriate conflict but demonstrates that access is often given in a very narrow sense. Furthermore, it shows a failure to encompass access to justice as appropriated conflicts are left to stagnate in the system as there is often very little resolution. Adopting a postcolonial lens to analyse victims' experiences, the analysis identified othering practices that served to institutionalize the vulnerability and powerlessness associated with victim identities. Here, it is argued that these othering practices also affected the rights consciousness of victims, delegitimating their identities as citizens. Moreover, as a result of their experiences, victims had mixed perceptions of the justice system. It is argued that while the system is a legitimate authority victims' endorsement of the system is questionable, therefore victims' experiences suggest that there is a reinforcement of the system's legal hegemony. The findings suggest that within the legal system of Trinidad and Tobago, legacies of colonialism shape the postcolonial present as the psychology and inequalities of the past are present in the interactions and processes of justice. These findings are relevant for policymakers in Trinidad and Tobago and other regions. From this study it is recognized that, to improve access to justice for victims, there needs to be a move towards victim empowerment that promotes resilience and enhances social capital. Going forward it is noted that there is a need for further research
Responsible E-Waste Value Chains in Africa
Population growth, increasing prosperity and changing consumer habits globally are increasing demand for consumer electronics. Further to this, rapid changes in technology, falling prices, increased affordability and consumer appetite for new products have exacerbated e-waste management challenges and seen millions of tons of electronic devices become obsolete. This rapid literature review collates evidence from academic, policy focussed and grey literature on e-waste value chains. The report should be read I conjunction with an earlier report on e-waste management.
E-waste is any electrical or electronic equipment, including all components, subassemblies and consumables, which are part of the equipment at the time the equipment becomes waste. When e-waste is collected and treated formally, it normally includes the following steps: Collection, Sorting and disassembly, Size reduction, Separation.
The following five pillars of a sustainable e-waste management system have been identified:
• Business and finance
• Policy and regulation
• Technology and skills
• Monitoring and control
• Marketing and awareness
As such, to support the development of a responsible e-waste value chain, the following elements must be addressed.
• Understanding how e-waste is currently managed
• There is no one-size-fits all solution to building a robust e-waste management system based on extended producer responsibility.
• An e-waste system built without a participatory approach is likely to be hampered by a series of issues.
• An overarching policy is necessary
• The choices made for the sector should be founded on two crucial elements – data from on the ground, and inputs from stakeholders.
• Enforcement is incumbent on the government mandate
The push towards a circular economy has provided stakeholders across the value chain with an impetus to initiate systemic improvements and invest in infrastructure and awareness raising.FCDO (Foreign, Commonwealth and Development Office
Recommended from our members
Design and modeling of an on-site greywater treatment system for a hotel building
As the United States is making a significant move towards rejoining the Paris Agreement on climate change, there is a high demand for sustainable solutions across various industries, including construction and hospitality sectors. The aim of this project was to design and model an on-site greywater treatment system for a hotel building for the effective reuse of sewage water. The study considered Los Angeles, California, as a case study location and referred to respective climate conditions and construction standards. This study considered various options of greywater treatment plants such as Membrane Bioreactor (MBR), Sequencing Batch Reactor (SBR), and Reverse Osmosis with Upflow Anaerobic Sludge Blanket (RO with UASB) which were carefully reviewed and modeled through the GPS-X software. The design and modeling results were verified by hand calculations and were followed by the estimation of capital and operational expenses required for the implementation of the plants. Having relatively low capital and operational expenditure requirements as well as superior technical performance, the MBR plant proved to be the most effective solution for the considered location and standards and was recommended for use in hotel buildings
Building body identities - exploring the world of female bodybuilders
This thesis explores how female bodybuilders seek to develop and maintain a viable sense of self despite being stigmatized by the gendered foundations of what Erving Goffman (1983) refers to as the 'interaction order'; the unavoidable presentational context in which identities are forged during the course of social life. Placed in the context of an overview of the historical treatment of women's bodies, and a concern with the development of bodybuilding as a specific form of body modification, the research draws upon a unique two year ethnographic study based in the South of England, complemented by interviews with twenty-six female bodybuilders, all of whom live in the U.K. By mapping these extraordinary women's lives, the research illuminates the pivotal spaces and essential lived experiences that make up the female bodybuilder. Whilst the women appear to be embarking on an 'empowering' radical body project for themselves, the consequences of their activity remains culturally ambivalent. This research exposes the 'Janus-faced' nature of female bodybuilding, exploring the ways in which the women negotiate, accommodate and resist pressures to engage in more orthodox and feminine activities and appearances
Towards a sociology of conspiracy theories: An investigation into conspiratorial thinking on Dönmes
This thesis investigates the social and political significance of conspiracy theories, which has been an academically neglected topic despite its historical relevance. The academic literature focuses on the methodology, social significance and political impacts of these theories in a secluded manner and lacks empirical analyses. In response, this research provides a comprehensive theoretical framework for conspiracy theories by considering their methodology, political impacts and social significance in the light of empirical data. Theoretically, the thesis uses Adorno's semi-erudition theory along with Girardian approach. It proposes that conspiracy theories are methodologically semi-erudite narratives, i.e. they are biased in favour of a belief and use reason only to prove it. It suggests that conspiracy theories appear in times of power vacuum and provide semi-erudite cognitive maps that relieve alienation and ontological insecurities of people and groups. In so doing, they enforce social control over their audience due to their essentialist, closed-to-interpretation narratives. In order to verify the theory, the study analyses empirically the social and political significance of conspiracy theories about the Dönme community in Turkey. The analysis comprises interviews with conspiracy theorists, conspiracy theory readers and political parties, alongside a frame analysis of the popular conspiracy theory books on Dönmes. These confirm the theoretical framework by showing that the conspiracy theories are fed by the ontological insecurities of Turkish society. Hence, conspiracy theorists, most readers and some political parties respond to their own ontological insecurities and political frustrations through scapegoating Dönmes. Consequently, this work shows that conspiracy theories are important symptoms of society, which, while relieving ontological insecurities, do not provide politically prolific narratives
The Professional Identity of Doctors who Provide Abortions: A Sociological Investigation
Abortion is a medicalised problem in England and Wales, where the law places doctors at the centre of legal provision and puts doctors in control of who has an abortion. However, the sex-selection abortion scandal of 2012 presented a very real threat to 'abortion doctors', when the medical profession's values and practices were questioned in the media, society and by Members of Parliament. Doctors found themselves at the centre of a series of claims that stated doctors were acting both illegally and unethically, driven by profit rather than patient needs. Yet, the perspectives of those doctors who provide abortions has been under-researched; this thesis aims to fill that gap by examining the beliefs and values of this group of doctors. Early chapters highlight the ambiguous position of the abortion provider in Britain, where doctors are seen as a collective group of professionals motivated by medical dominance and medical autonomy. They outline how this position is then questioned and contested, with doctors being presented as unethical. By studying abortion at the macro-, meso- and micro-levels, this thesis seeks to better understand the values of the 'abortion doctor', and how these levels shape the work and experiences of abortion providers in England and Wales. This thesis thus addresses the question: 'What do abortion doctors' accounts of their professional work suggest about the contemporary dynamics of the medicalisation of abortion in Britain?'. It investigates the research question using a qualitative methodological approach: face-to-face and telephone interviews were conducted with 47 doctors who provide abortions in England and Wales. The findings from this empirical study show how doctors' values are linked to how they view the 'normalisation of abortion'. At the macro-level doctors, openly resisted the medicalisation of abortion through the position ascribed to them by the legal framework, yet at the meso-level doctors construct an identity where normalising abortion is based on further medicalising services. Finally, at the micro-level, the ambiguous position of the abortion provider is further identified in terms of being both a proud provider and a stigmatised individual. This thesis shows that while the existing medicalisation literature has some utility, it has limited explanatory power when investigating the problem of abortion. The thesis thus provides some innovative insights into the relevance and value of medicalisation through a comprehensive study on doctors' values, beliefs and practices
- …