Article

Unlocking the potential of cybersecurity behavior in the metaverse: Overview, opportunities, challenges, and future research agendas

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The metaverse, often referred to as the next stage of the Internet, is a virtual space that utilizes advanced technologies, such as augmented reality, virtual reality, and mixed reality, to enable real-time engagement and experiences beyond what can be achieved in reality. Cybersecurity behavior in the metaverse refers to the actions taken by individuals and organizations to protect themselves and their information from various cyber threats in virtual reality environments by implementing various cybersecurity measures. Research on cybersecurity behavior in the metaverse is still limited. This study offers an overview of cybersecurity behavior in the metaverse and identifies a range of potential opportunities. It also discusses the current and prospective challenges and suggests large-scale research agendas that can be examined in future research. The research agendas encompass extensive subject areas, such as security of the metaverse, influential factors, human behavior in the metaverse, virtual identity and access management, privacy, legal, and ethical issues, and cybersecurity education and awareness. This study offers a crucial and timely insight into cybersecurity practices in the metaverse, considering the advancement of metaverse technology.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Emotional connections and positive user experiences have been found to enhance engagement, while subjective norms and perceived behavioral control also play a significant role (Liu & Park, 2024). However, much of this research has focused on the positive aspects of virtual tourism, with limited exploration of the challenges users face, such as perceived complexity and technological risks (Al-Emran & Deveci, 2024;Kumar et al., 2023). These gaps highlight the need for further investigation into negative user experiences in Metaverse tourism Jung et al., 2024). ...
... Users' motivation to use the technology diminishes when they perceive that the costs outweigh the benefits. Therefore, we propose the following hypothesis: Hypothesis 2: Perceived cost negatively affects virtual tourists' intention to use Wonder Verse Indonesia Perceived technological threat refers to users' concerns about the potential risks associated with using new technologies, such as the misuse of personal information, physical risks (e.g., falling, getting injured), or cybersickness (e.g., dizziness, disorientation, nausea, eye strain) (Al-Emran & Deveci, 2024;Suh, 2024). In the context of WonderVerse Indonesia, virtual tourists may worry about the safety of their personal data, the likelihood of experiencing cybersickness, or the overall reliability of the platform. ...
... In the context of WonderVerse Indonesia, virtual tourists may worry about the safety of their personal data, the likelihood of experiencing cybersickness, or the overall reliability of the platform. Such concerns can create fear and mistrust, reducing users' willingness to adopt the platform (Al-Emran & Deveci, 2024;Singh et al., 2024). When users perceive the platform as posing significant technological risks, their intention to use it will likely decline. ...
Article
This study investigates the impact of various inhibiting factors on the intentions and overall satisfaction of Generation Z and Y virtual tourists engaging with WonderVerse Indonesia, a metaverse-based tourism platform. Using covariance-based structural equation modeling (CB-SEM), the research tests five hypotheses, focusing on how perceived complexity, cost, and technological and social threats influence user behavior. The findings reveal that perceived complexity, high costs, and concerns over technological and social threats significantly decrease users' intentions to engage with the platform. However, when users have stronger intentions to engage, their overall satisfaction with the virtual tourism experience increases significantly. These results provide key insights into the barriers hindering user adoption of metaverse tourism, particularly among younger generations. By identifying these factors, the study offers valuable guidance for managers, developers, and decision-makers in the metaverse tourism industry. It highlights the need to reduce perceived complexity and mitigate costs and perceived threats to enhance user engagement. Furthermore, the study emphasizes the importance of strengthening user intentions to boost satisfaction. These insights are crucial for improving the design and marketing strategies of virtual tourism platforms like WonderVerse Indonesia to ensure their long-term success and relevance in the rapidly evolving digital tourism landscape.
... The evaluation of the studies highlighted the importance of cybersecurity awareness training and education to equip farmers and workers within farms with skills to reduce the risks of cyberattacks. In their research, Al-Emran and Deveci [73] advocated for appropriate cybersecurity behavior in the metaverse to protect themselves and their organizations from cyberattacks. The arguments stipulated that cybersecurity threats within the virtual environments were similar across different application domains, including business and agriculture, where they exploited the user's lack of security expertise, diverse human errors, and a lack of standardization for security within virtual environments. ...
... In Fig. 9, the diverse cybersecurity challenges faced in the metaverse were similar to those in smart agriculture, where a lack of user education, lack of standardization, human errors, legal and ethical issues, and interoperability problems were reported. Al-Emran and Deveci [73] further argued that to address the various cybersecurity threats, a multi-faceted cybersecurity approach was required where users would be educated about the potential risks in the metaverse, including privacy and confidentiality concerns. Adopting similar strategies in smart farming would ensure that farmers were secure from the cybersecurity risks experienced. ...
... Adopting similar strategies in smart farming would ensure that farmers were secure from the cybersecurity risks experienced. However, Chaudhary, Gkioulos, and Katsikas [74] contradicted Al-Emran and Deveci [73] and posited that in some instances, small-scale enterprises were not engaging in cybersecurity training either due to the lack of financial resources or their attitudes where they viewed cyber-risks to affect only large corporates. The negative attitudes against cybersecurity training hindered efforts to equip SME owners with security skills. ...
Article
Full-text available
The primary aim of this study was to explore cybersecurity threats in agriculture 4.0 and 5.0, as well as possible mitigation strategies. A secondary method was employed involving narrative review in which many studies on cybersecurity were sampled and analyzed. The study showed that the main risks that increase cybersecurity threats to agricultural organizations include poor cybersecurity practices, lack of regulations and policies on cybersecurity, and outdated IT software. Moreover, the review indicated that the main cybersecurity threat in agriculture 4.0 and 5.0 involves denial of service attacks that target servers and disrupt the functioning of relevant smart technologies, including equipment for livestock tracking, climate monitoring, logistics and warehousing, and crop monitoring. The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. Some of the impacts of cybersecurity breaches were noted to include data loss, reduced efficiency of digitized systems, and reduced food security. A crucial mitigation strategy against cybersecurity threats includes using advanced technologies such as artificial intelligence (AI), blockchain, and quantum computing to improve malware detection in Internet of Things (IoT) digital equipment and ensure faster response to any threats. The other mitigation measures include training employees on best cybersecurity practices and creating guidelines and regulatory standards on best cybersecurity practices.
... The evaluation of the studies highlighted the importance of cybersecurity awareness training and education to equip farmers and workers within farms with skills to reduce the risks of cyberattacks. In their research, Al-Emran and Deveci [73] advocated for appropriate cybersecurity behavior in the metaverse to protect themselves and their organizations from cyberattacks. The arguments stipulated that cybersecurity threats within the virtual environments were similar across different application domains, including business and agriculture, where they exploited the user's lack of security expertise, diverse human errors, and a lack of standardization for security within virtual environments. ...
... In Fig. 9, the diverse cybersecurity challenges faced in the metaverse were similar to those in smart agriculture, where a lack of user education, lack of standardization, human errors, legal and ethical issues, and interoperability problems were reported. Al-Emran and Deveci [73] further argued that to address the various cybersecurity threats, a multi-faceted cybersecurity approach was required where users would be educated about the potential risks in the metaverse, including privacy and confidentiality concerns. Adopting similar strategies in smart farming would ensure that farmers were secure from the cybersecurity risks experienced. ...
... Adopting similar strategies in smart farming would ensure that farmers were secure from the cybersecurity risks experienced. However, Chaudhary, Gkioulos, and Katsikas [74] contradicted Al-Emran and Deveci [73] and posited that in some instances, small-scale enterprises were not engaging in cybersecurity training either due to the lack of financial resources or their attitudes where they viewed cyber-risks to affect only large corporates. The negative attitudes against cybersecurity training hindered efforts to equip SME owners with security skills. ...
Article
Full-text available
The primary aim of this study was to explore cybersecurity threats in agriculture 4.0 and 5.0, as well as possible mitigation strategies. A secondary method was employed involving narrative review in which many studies on cybersecurity were sampled and analyzed. The study showed that the main risks that increase cybersecurity threats to agricultural organizations include poor cybersecurity practices, lack of regulations and policies on cybersecurity, and outdated IT software. Moreover, the review indicated that the main cybersecurity threat in agriculture 4.0 and 5.0 involves denial of service attacks that target servers and disrupt the functioning of relevant smart technologies, including equipment for livestock tracking, climate monitoring, logistics and warehousing, and crop monitoring. The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. Some of the impacts of cybersecurity breaches were noted to include data loss, reduced efficiency of digitized systems, and reduced food security. A crucial mitigation strategy against cybersecurity threats includes using advanced technologies such as artificial intelligence (AI), blockchain, and quantum computing to improve malware detection in Internet of Things (IoT) digital equipment and ensure faster response to any threats. The other mitigation measures include training employees on best cybersecurity practices and creating guidelines and regulatory standards on best cybersecurity practices.
... Human behavior is critical, as user engagement and deviant actions create significant challenges (XinYing et al., 2024). Thus, understanding the drivers of cybersecurity behavior in this environment is vital (Al-Emran and Deveci, 2024). ...
... This synthesis comprehensively analyzes the evolving threat landscape and the interplay of psychological states and social contexts. In the Metaverse, where virtual and physical realities converge, unique security issues like identity theft (Al-Emran and Deveci, 2024), unauthorized data access , and malicious exploitation arise. TTAT explains users' avoidance behavior toward technological threats, while TPB captures the psychological and social factors driving cybersecurity behavior. ...
Article
Purpose The Metaverse holds vast amounts of user data, making it essential to address threats to its confidentiality, integrity and availability. These threats are not purely technological, as user actions and perceptions, shaped by psychological factors, can influence cybersecurity challenges. Thus, a holistic approach incorporating technological and psychological dimensions is crucial for safeguarding data security and privacy. This research explores users’ cybersecurity behavior in the Metaverse by integrating the technology threat avoidance theory (TTAT) and the theory of planned behavior (TPB). Design/methodology/approach The model was assessed using data collected from 746 Metaverse users. The empirical data were analyzed using a dual structural equation modeling-artificial neural network (SEM-ANN) approach. Findings The main PLS-SEM findings indicated that cybersecurity behavior is significantly affected by attitude, perceived behavioral control, subjective norms, perceived threat and avoidance motivation. The ANN results showed that perceived threat with a normalized importance of 100% is the most significant factor influencing cybersecurity behavior. The ANN results also showed that perceived severity with a normalized importance of 98.79% significantly impacts perceived threat. Originality/value The novelty of this research stems from developing a unified model grounded in TTAT and TPB to understand cybersecurity behaviors in the Metaverse. Unlike previous Metaverse studies that solely focused on measuring behavioral intentions or user behaviors, this study takes a step further by evaluating users’ cybersecurity behaviors. Alongside its theoretical insights, the study offers practical recommendations for software developers, decision-makers and service providers.
... Having an effective cybersecurity strategy is of utmost importance for the success of cybersecurity measures [46]. Another important aspect of good cybersecurity governance is having robust security policies and protocols [2,42,47,48]. Preparing internal security policies and protocols and making sure that the whole organisation abides by them is integral to cybersecurity governance. Furthermore, governance is related to alignment with risk management and existing frameworks, establishing ownership for assets, and creating risk awareness as specified by Bobbert and Scheerder [42]. ...
... The second focus is about being vigilant and up to date regarding potential cyber threats and new attack types [8,48,51]. ...
Article
Full-text available
As businesses increasingly adopt digital processes and solutions to enhance efficiency and productivity, they face heightened cybersecurity threats. Through a systematic literature review and concept development, this article examines the intersection of digitalisation and cybersecurity. It identifies the methodologies and tools used for cybersecurity assessments, factors influencing the adoption of cybersecurity measures, and the critical success factors for implementing these measures. The article also puts forward the concept of cybersecurity governance process categories, which are used to classify the factors uncovered in the research. Findings suggest that current information security standards tend to be too broad and not adequately tailored to the specific needs of small and medium-sized enterprises (SMEs) when implementing emerging technologies, like Internet of Things (IoT), blockchain, and artificial intelligence (AI). Additionally, these standards often employ a top-down approach, which makes it challenging for SMEs to effectively implement them, as they require more scalable solutions tailored to their specific risks and limited resources. The study thus proposes a new framework based on the Plan-Do-Check model, built around the cybersecurity governance process categories and the three core pillars of governance, culture and standards. This is essentially a bottom-up approach that complements current top-down methods, and will be of value to both information technology (IT) professionals as an operational guide, and to researchers as a basis for future research in this field.
... These findings indicated that subcultural appeal and originality play a much greater role in individuals' perception of consoles than attractiveness in coolness theory. Similarly, an equivalent level of significance pertains to the security of AI and MAPPs (Al-Emran & Deveci, 2024;Fotouhi et al., 2020;Tlili et al., 2024;Wang et al., 2023). When individuals perceive a potential threat to the security of their personal information, they often show reluctance to continue using these technologies Eltanbouly et al., 2025). ...
Article
The Metaverse represents a fusion of the physical and digital worlds, heralding the next evolution in the manufacturing and services sector. Given the rapid proliferation of Metaverse-associated apps (MAPPs), gaining a profound understanding of consumer proclivities and intentions to use them is crucial. However, existing Metaverse literature primarily uses symmetric variance-based approaches, which have not fully captured the complex interactions among factors influencing adoption. We address this gap by examining how various psychosocial factors and their configurations influence MAPPs adoption through the lens of configuration and complexity theories. The research results were based on a sample of 372 Chinese consumers analyzed using PLS-SEM, NCA, and fsQCA, identifying seven distinct solutions, each characterized by a unique combination of personality, motivational, social, and functional traits. This study adds to the Metaverse literature by offering a robust theoretical framework to explain the asymmetric impact of psychosocial factors on MAPP adoption.
... • Cybersecurity: The digitalization and interconnection of systems increases vulnerability to cyberattacks. It is crucial to implement robust security measures to protect sensitive information and critical port systems [34]. • Port staff training: Port staff need to adapt to new virtual environments and develop skills to operate in the metaverse. ...
Article
Full-text available
The implementation of the metaverse in Spanish ports poses challenges and opportunities, but it is crucial to identify and prioritize the key factors ensuring a successful transition to this new technological paradigm. To date, the literature has explored various aspects of digital transformation in ports, but few studies have specifically addressed the integration of the metaverse in this context. This study employed a prioritization matrix to evaluate five categories of factors: new operating models, institutional cooperation and coordination, customer services, data and technological maturity, and sector assimilation. Each category was evaluated based on its potential impact, urgency, ease of implementation, and cost. The results revealed that the factors related to the new operating models and institutional cooperation and coordination were considered the most important and urgent for the implementation of the metaverse in Spanish ports. On the other hand, technological maturity and sectoral assimilation were identified as the lowest priority categories. These findings suggest that the focus should be on improving operability and institutional collaboration to maximize the benefits of the metaverse in the Spanish port environment. In conclusion, this study provides a practical guide for decision-makers in the planning and implementation of digital transformation strategies in Spanish ports. By prioritizing key factors, resources can be optimized and the metaverse adoption process can be accelerated, thus contributing to the improvement of efficiency and competitiveness in the port sector.
... Existing studies have identified the determinant elements affecting the adoption of Metaverse platforms such as Wu and Yu (2024) stress the significance of attitude and intrinsic motivation in increasing user engagement, while Liu and Park (2024) point to the consequences of subjective norms and perceived behavioural control. However, the majority of the prior studies centres on the positive aspects of Metaverse tourism, often neglecting the potential challenges users may encounter (Al-Emran & Deveci, 2024). The complexities of negative user experiences in the Metaverse remain largely unexplored (Gupta et al., 2024). ...
Article
Full-text available
Orientation: This study explored metaverse travelers focusing on the platform of Worderverse Indonesia to enhance the intention to use and satisfaction. Purpose of the study: First, this study verifies the influence of metaverse travellers’ perceived usefulness on metaverse travellers' intention to use and satisfaction. Moreover, it investigates the impact of the metaverse travellers’ perceived enjoyment on metaverse travellers’ intention to use and satisfaction. Finally, this framework explores the influence of metaverse travellers’ intention to use on metaverse travellers' satisfaction. Research approach/design and method: Employing a simple random sampling method, the sample of this study includes 183 metaverse travellers who use the platform Wondersverse Indonesia. This study analysed the data employing confirmatory factor analysis and structural equation modelling via Amos program. Main Findings: The results showed that metaverse travellers’ perceived usefulness positively and significantly impacts metaverse travellers’ intention to use and satisfaction. Similarly, metaverse travellers’ perceived enjoyment positively and substantially affects metaverse travelers’s intention to use and satisfaction. Finally, metaverse travellers' intention to use positively and significantly affects metarverse travellers’ satisfaction. Practical/managerial implications: The research findings afford significant understandings into management implications for enhancing metaverse platforms like Wondersverse Indonesia. Orientation: This study explored metaverse travelers focusing on the platform of Worderverse Indonesia to enhance the intention to use and satisfaction.
... The digital world, facilitated by the Internet, has brought about revolutionary advancements, but it also comes with its fair share of challenges (Al-Sharafi et al., 2024). Cybersecurity becomes paramount in such a digital realm (Al-Emran & Deveci, 2024). The need for cybersecurity arises from a plethora of threats that malicious agents pose. ...
... Additionally, digital monopolies, unequal access to the metaverse, the complex technological infrastructure, and procurement difficulties, require solutions [10], [25], [32]. A general lack of expertise, standards for interaction and exchange in the metaverse, are also challenging [33]. Next to the technological challenges, organizational challenges such as unwillingness to adapt, culture and organizational readiness, impede the implementation of the metaverse [34]. ...
Article
Full-text available
The diffusion of the much-anticipated metaverse seems to have stalled. However, the industrial metaverse, aimed at facilitating human-machine interaction and streamlining operational processes, is credited with transformative potential. Due to a fragmented and contested information landscape regarding the industrial metaverse, the future of this technology in business practice remains uncertain. In our study, we contribute to this debate by addressing the question of how the industrial metaverse will shape the operations of companies in the mid-term future. We developed 20 projections on the future of the industrial metaverse based on the current literature, and employed a Delphi approach using input from 33 selected experts to form a scenario for the industrial metaverse in the year 2033. We uncover realistic potentials and challenges that need to be addressed to make the industrial metaverse a reality. Accordingly, the industrial metaverse in 2033 is still not fully developed, which causes a divide between companies that already are using the industrial metaverse and companies that have not yet implemented it. In perspective, our findings provide insight into what needs to be considered for proactive industrial metaverse strategies.
... Issues related to privacy, security, digital rights management, and interoperability remain significant concerns, requiring robust frameworks and protocols to safeguard user data and ensure seamless interaction between virtual environments. Moreover, questions surrounding digital identity, governance structures, and the equitable distribution of wealth and resources in virtual economies necessitate careful consideration and stakeholder engagement to address societal inequalities and promote inclusivity within the metaverse [19], [20]. ...
Article
The metaverse, a concept originating from science fiction, has gained substantial traction in recent years as advancements in technology have brought it closer to reality. This virtual shared space, accessed through immersive technologies like virtual reality (VR) and augmented reality (AR), has captivated the imagination of both tech enthusiasts and the general public. This study aims to explore the dynamics of the metaverse discourse by analyzing online discussions across various platforms. We employed a combination of data collection methods, including Twitter API access and web scraping, to gather a diverse dataset of tweets related to the metaverse. Subsequently, the collected data underwent extensive preprocessing to ensure consistency and prepare it for analysis. Our analysis encompassed user statistics, word analysis in tweets, hashtag analysis, and tweet distribution patterns. The findings reveal intriguing insights into user behavior, content trends, and temporal patterns within the metaverse discourse. We observed prominent usernames, geographic distributions of users, prevalent words and hashtags, as well as temporal fluctuations in tweet activity. For instance, the most common username is "Fatemeh ashoobian" with 800 users, indicating a significant presence in the metaverse community. Furthermore, the number of tweets about the metaverse per day over a certain period shows daily fluctuations with the highest peak on November 14, 2023. These insights contribute to a deeper understanding of the metaverse ecosystem and its implications for society, technology, and culture. Through our research, we aim to provide valuable insights to stakeholders across various sectors, including technology developers, policymakers, content creators, and end-users. By understanding the emergent trends and themes within the metaverse discourse, stakeholders can navigate this rapidly evolving landscape more effectively and harness its transformative potential for the benefit of humanity.
... 3D spatial computing and metaverse technologies, facial shape and appearance modeling, and spatial mapping algorithms (Al-Emran & Deveci, 2024;Grupac & Lăzăroiu, 2022) enhance lifestyle behavior actions and habits of 3D photorealistic avatars across engaging extended reality environments. 3D garment simulation technologies improve multi-dimensional metaverse experiences, behaviors, and preferences throughout avatar motion and virtual scene control, image-based 3D scene representation, and 3D clothed avatar and facial appearance reconstruction. ...
Article
Full-text available
Due to Dimension Studios and Unsigned Group, by likeness and movement digitization, the human supermodel Eva Herzigová’s highly realistic metahuman and 3D digital twin lead to perpetual career extension (e.g., on virtual runway shows by catwalk replication or in advertising campaigns by particular pose adoption), including in virtual worlds such as metaverse spaces, by use of extended reality technologies, in terms of virtual clothing, digital hair, skin texture, facial and body expressions, and makeup styling as avatar appearance and persona. In this paper, we show how, by likeness capturing (e.g., signature walk by motion capture shoot for face and body movement tracking) and virtual clothing, Eva Herzigová’s hyperreal 3D avatar (lifelike 3D digital human clone or realistic virtual human) is configured with subsequent restyled hair and make-up, 3D clothing modeling, and extended reality fashion shows on virtual catwalks or campaign shoots. We clarify that photographic reference materials and a sensor-based motion capture suit assisted Metahuman Creator in capturing facial and motion data for Eva Herzigová’s digital avatar, configuring realistic depiction and virtual activations of beauty standards, in addition to digital likeness, signature style, talent representation, and narrations, typifying digital human creation and presence in virtual worlds (e.g., for metaverse-based shoots). We conclude that Eva Herzigová’s hyperrealistic 3D digital human twin and MetaHuman avatar operate as a styled virtual alter ego and versatile personal brand extension by motion capture technologies for immersive virtual fashion shows, live video streams and broadcast, and digital wearable modeling.
... In continuation, the metaverse is defined as a virtual environment that combines the digital and real worlds, giving users a platform to communicate and engage by adopting virtual identities known as avatars [8]. In this digital era, the metaverse has grown exponentially by causing changes in many facets of society [9], so adopting it can drive retail SME growth, operational efficiency, and customer experience. Hence, the investigation of the drivers of metaverse adoption for retail SMEs is justified. ...
Article
Full-text available
Small and medium-sized enterprises (SMEs) rely on a thriving distribution network and digital technologies, including the metaverse, to remain competitive. The retail industry is perceived as a portfolio-based and granular business. Hence, retail SMEs can be a key source of innovation and a major source of growth that need technical flexibility to react quickly to changing customer needs. Therefore, grounded in the TOE framework, this study is undertaken to explore the drivers of metaverse adoption for enhancing the marketing capabilities of retail SMEs. Online surveys were used to gather primary data from 300 marketing practitioners employed in retail SMEs. Subsequently, the data were analysed using quantitative research methodology. The finding reveals that the metaverse is gaining attention from retail SMEs due to its technological, organisational, and environmental drivers, as well as its ability to provide immersive experiences to customers. Thereafter, metaverse adoption enhances the marketing capabilities of SMEs with new sales channels, tailored marketing, and increased customer reach with an understanding of the marketplace focused on customer relations, market research, and cross-management capabilities.
Article
The Metaverse is rapidly transforming virtual interactions, especially in education, but its growth also attracts cyber threats. Without understanding and addressing users’ cybersecurity behaviors, the Metaverse’s full potential is at risk, making investigating these behaviors a pressing necessity. Grounded on the theory of planned behavior (TPB), technology threat avoidance theory (TTAT), and protection motivation theory (PMT), this research develops an integrated theoretical model to evaluate users’ cybersecurity behaviors in the Metaverse. Data were gathered from 701 Metaverse users and were analyzed using a hybrid structural equation modeling-artificial neural network (SEM-ANN) approach. Of the 11 proposed hypotheses, the Partial Least Squares-Structural Equation Modeling results showed that nine were supported, explaining 63.1% of the variance in cybersecurity behavior. The ANN analysis revealed that avoidance motivation and attitude are the most significant factors influencing cybersecurity behavior. In addition to its theoretical contributions, the findings offer actionable insights for various stakeholders.
Article
Full-text available
The media and entertainment industry is one of the industries that can and should respond quickly to technological innovations. New technologies and digitalisation are generally evaluated positively by investors, employees, customers, viewers and listeners in the media and entertainment industry. Metaverse has proven that it can be present in many business areas and will be present in the future. The expectation that the number of Metaverse users will increase significantly in the future makes it essential to identify and predict the current and potential effects of the Metaverse on business areas. This study aims to evaluate the Metaverse in the media and entertainment industry, which has not been found to be examined in the literature within the scope of SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis. This study is thought to can provide helpful information to industrial investors, users and researchers about the strengths, weaknesses, opportunities and threats of the Metaverse in the media and entertainment industry.
Article
Full-text available
The paper Effect of Data Security Frameworks against Cybercrimes and Cyber Security in Nigeria critically examines the various data protection frameworks in Nigeria and how these are impacting curtailing cybercrimes in the country. The paper examined the institutions responsible for data security and how they carry it out. The work utilized both the secondary and primary sources of data collection. Key Informant Interview (KII) and the observation method were deployed to collect primary data for the study. Information on data protection was also collected from (NDPC) and other relevant agencies. Information from reports from the internet, scholarly articles in journals, and information from websites and books were used in the paper. The paper utilised the Social Strain Theory (SST) as the theoretical framework for the study. The paper observed that data protection regulations in Nigeria make it mandatory for all Public Institutions (PIs) in Nigeria to have a comprehensive cyber security framework, which is to protect against unauthorized access. Several factors are responsible for data insecurity and the attendant increase in cybercrimes in the country. These include, among others: i. Lack of knowledge on the part of most officers of the penalty for data breach allowed by them. ii. Poor dissemination of the content of the NDPA. iii. The poor economic condition of the country makes many officers to seek means of getting extra money, this also includes their volunteering information that they should not disclose in the first place. The paper observed that though cyber security in Nigeria is not within the mandate of the EFCC, the Commission plays very important role in dealing with the threat of cybercrimes in Nigeria. Records shows that of the 12,394 convictions of the EFCC from inception till 31st December 2023. Over 80% of them are on cybercrime and related offences. The paper concluded that inspire of the efforts of the EFCC and other agencies in tackling cybercrimes in Nigeria, the failure of the data protection frameworks in the country in ensuring confidentiality, integrity and security of the data at their disposal is the reason for the spiralling of cybercrimes in the country. The paper recommends that the Nigerian government adopt the best practice policies and regulations, promote awareness, and continuously update cyber security practices, which is germane to enhancing data protection in the country.
Chapter
This chapter thoroughly investigates safeguarding the Metaverse's complex infrastructure. The chapter, segmented into four distinct yet interconnected sections, meticulously dissects the multifaceted layers of Metaverse security. Initially, it delves into securing the architectural framework, examining everything from user interfaces to backend databases and underscoring the necessity for robust protocols to shield against various vulnerabilities. The chapter then focuses on strategies for mitigating DDoS (Distributed Denial of Service) attacks, highlighting the importance of advanced network security measures and AI-driven predictive models. Subsequently, it addresses the pivotal need for secure networking in real-time interactions within the Metaverse, emphasizing data encryption, secure authentication, and user privacy. The final section provides a comprehensive overview of cloud security considerations essential for the Metaverse, discussing challenges like data breaches and outlining best practices for maintaining a secure cloud infrastructure. By incorporating diverse perspectives from network engineering to digital ethics, this chapter extensively analyzes the current state and evolving challenges in Metaverse security, aiming to empower developers, policymakers, and users in navigating and reinforcing this novel digital realm's security landscape. Novelty: The source of the novelty is a multidisciplinary approach that combines network security measures, AI-driven predictive models, strong encryption protocols, and thorough cloud security practices to empower developers, policymakers, and users in the process of strengthening the security landscape of the Metaverse. By employing this all-complete perspective, data and service availability, confidentiality, and integrity within the dynamic digital space of the Metaverse are effectively protected.
Chapter
The User Education and Awareness chapter in Metaverse Security Paradigms tackles the essential aspects of user education and awareness in safeguarding against the myriad security risks. Beginning with an in-depth analysis of common security threats such as data breaches, identity theft, and phishing attacks, the chapter catalogues these risks. Then, it explores the influential roles of community leaders and the adoption of innovative approaches like gamification to establish security as a collective responsibility. The practical implementation of these strategies across diverse virtual platforms is also thoroughly examined. Next, the chapter delves into the processes for reporting and responding to security incidents in the Metaverse. It details the establishment of efficient reporting channels, the formation of rapid response teams, and the use of automated systems for early threat detection. Concluding with a guide on best practices, the chapter equips users with strategies for personal protection, from basic digital hygiene to advanced tactics against complex threats.
Article
While offering novel user experiences, the Metaverse introduces complex cybersecurity challenges due to the sophisticated interaction of augmented reality (AR), virtual reality (VR), and web technologies. Addressing the barriers to cybersecurity behavior is essential to protect users against risks such as identity theft and loss of digital assets. Therefore, this research aims to investigate these barriers by developing a theoretical model that draws factors from the Technology Threat Avoidance Theory (TTAT) and considers variables such as privacy concerns, perceived risks, and response costs. The data were collected from 395 Metaverse users and were analyzed using the Partial Least Squares-Structural Equation Modeling (PLS-SEM) and fuzzy-set Qualitative Comparative Analysis (fsQCA). The PLS-SEM findings showed that perceived threats, privacy concerns, and response costs have a significant negative impact on cybersecurity behavior, while perceived risks have an insignificant negative influence. The fsQCA results revealed that there is not a single pathway leading to robust cybersecurity behavior. Instead, eight configurations that include the presence and absence of certain conditions can lead to this desirable outcome. The findings not only advance the academic conversation on Metaverse security but also offer actionable strategies for stakeholders to reinforce user protection in this dynamic virtual environment.
Article
Full-text available
The Metaverse, a virtual reality (VR) space where users can interact with each other and digital objects, is rapidly becoming a reality. As this new world evolves, Artificial Intelligence (AI) is playing an increasingly important role in shaping its development. Integrating AI with emerging technologies in the Metaverse creates new possibilities for immersive experiences that were previously impossible. This paper explores how AI is integrated with technologies such as the Internet of Things, blockchain, Natural Language Processing, virtual reality, Augmented Reality, Mixed Reality, and Extended Reality. One potential benefit of using AI in the Metaverse is the ability to create personalized experiences for individual users, based on their behavior and preferences. Another potential benefit of using AI in the Metaverse is the ability to automate repetitive tasks, freeing up time and resources for more complex and creative endeavors. However, there are also challenges associated with using AI in the Metaverse, such as ensuring user privacy and addressing issues of bias and discrimination. By examining the potential benefits and challenges of using AI in the Metaverse, including ethical considerations, we can better prepare for this exciting new era of VR. This paper presents a comprehensive survey of AI and its integration with other emerging technologies in the Metaverse, as the Metaverse continues to evolve and grow, it will be important for developers and researchers to stay up to date with the latest developments in AI and emerging technologies to fully leverage their potential.
Article
Full-text available
During the upheaval of the COVID-19 pandemic, the Jet Propulsion Laboratory (JPL), like most organizations, found itself trying to adjust to a new reality of remote and hybrid work. An emerging concept that seemed promising was the notion of a metaverse—a collection of technologies that could create, or recreate, our physical spaces and interactions. In response, JPL experimented with a rollout of its own metaverse, with mixed results. While some technologies filled a vital role in reconnecting the workforce, others were novelties at best and hindrances at worst. This article provides a candid review of the technical and policy elements that were explored as part of the Welcome to Our Metaverse experiment, the results that were observed, and the key takeaways and lessons learned for further exploration and technology adoption.
Article
Full-text available
The term metaverse is described as the next iteration of the Internet. Metaverse is a virtual platform that uses extended reality technologies, i.e. augmented reality, virtual reality, mixed reality, 3D graphics, and other emerging technologies to allow real-time interactions and experiences in ways that are not possible in the physical world. Companies have begun to notice the impact of the metaverse and how it may help maximize profits. The purpose of this paper is to offer perspectives on several important areas, i.e. marketing, tourism, manufacturing, operations management, education, the retailing industry, banking services, healthcare, and human resource management that are likely to be impacted by the adoption and use of a metaverse. Each includes an overview, opportunities, challenges, and a potential research agenda.
Article
Full-text available
The metaverse, as an instance of cyber–physical–social systems (CPSS) that originates in cyber–physical systems (CPS), features growing complexity, and diversity in terms of functionalities, as well as the exponentially increasing demand in network bandwidth and computational resources, thereby leading to exaggerated security threats. However, compared with the extensive attention received by the metaverse, solutions defending against the threats have not kept pace. A major obstacle to such solutions is virtuality–reality-synthesized threats. Therefore, it is imperative to design new paradigms to defend the metaverse effectively. In this article, we advance a parallel system, dubbed ParaDefender, to defend the metaverse against emerging new threats effectively. Inspired by parallel intelligence, ParaDefender comprises artificial cyberspace, computational experiments, and parallel execution. The basic idea is to make artificial and real cyberspaces executed in parallel to mutually guide each other for enhanced security, wherein the parallel execution is scenario driven in the sense that the scenarios originate from all possible spatial–temporal combinations of security threats in the metaverse. We also demonstrate how to land ParaDefender onto real-world applications, including the Industrial Internet of Things (IIoT) security operation application in the industrial metaverse, and the social governance application.
Article
Full-text available
The metaverse could provide a new way of interacting with nature through immersive three-dimensional virtual worlds. This digital nature recreation has the potential to shape users' perceptions, knowledge, and behavior toward nature. Despite this potential, its user demand is currently unknown. This study analyzes the demand for digital forest recreation in the metaverse by conducting a discrete choice experiment with university students as potential metaverse users to fill this knowledge gap. The study results revealed that users preferred digital forest recreation to experience outdoor adventure and a nature-based digital twin in the metaverse, indicating that digital forest recreation has the potential to influence human-nature interactions. The students required responsible and immersive metaverse platforms for digital forest recreation that were not subject to invasions of user privacy (e.g., selling big data of users), biased algorithms (e.g., racism), algorithms selling virtual goods, cyberaggression (e.g., trolling), and less immersive virtual experiences. These findings highlight both opportunities and challenges for creating user-centered digital forest recreation in the metaverse. The research contributes to understanding potential interactions between technological, social, and ecological systems.
Article
Full-text available
The Metaverse is a network of 3D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments [1]. Metaverse is considered the third wave of the Internet revolution, and it is built on new and emerging technologies such as Extended Reality (XR) and Artificial Intelligence (AI). Research on the impact of the Metaverse on education exploded in 2022. Here we explore learning across the Metaverse and propose a new and innovative theoretical framework by reviewing literature and synthesizing best practices in designing metaverse learning environments. This Ecosystem consists of four major hubs: A) Instructional design and performance technology hub, B) Knowledge hub, C) Research and technology hub, and D) Talent and training hub. Common to all four hubs are the factors in the three wheels (Fig. 8): a) Infrastructure, business industry, and communication: b) technology access and equity, and c) user rights, data security, and privacy policy. We believe that this framework can help guide emerging research and development on the applications of Metaverse in education. We also hope this paper can serve as a launch pad for the special issue on Metaverse and the Future of Education supported by the IEEE Education Society.
Article
Full-text available
During the COVID-19 pandemic, engagement in various remote activities such as online education and meetings has increased. However, since the conventional online environments typically provide simple streaming services using cameras and microphones, there have limitations in terms of physical expression and experiencing real-world activities such as cultural and economic activities. Recently, metaverse environments, three-dimensional virtual reality that use avatars, have attracted increasing attention as a means to solve these problems. Thus, many metaverse platforms such as Roblox, Minecraft, and Fortnite have been emerging to provide various services to users. However, such metaverse environments are potentially vulnerable to various security threats because the users and platform servers communicate through public channels. In addition, sensitive user data such as identity, password, and biometric information are managed by each platform server. In this paper, we design a system model that can guarantee secure communication and transparently manage user identification data in metaverse environments using blockchain technology. We also propose a mutual authentication scheme using biometric information and Elliptic Curve Cryptography (ECC) to provide secure communication between users and platform servers and secure avatar interactions between avatars and avatars. To demonstrate the security of the proposed mutual authentication scheme, we perform informal security analysis, Burrows–Abadi–Needham (BAN) logic, Real-or-Random (ROR) model, and Automated Validation of Internet Security Protocols and Applications (AVISPA). In addition, we compare the computation costs, communication costs, and security features of the proposed scheme with existing schemes in similar environments. The results demonstrate that the proposed scheme has lower computation and communication costs and can provide a wider range of security features than existing schemes. Thus, our proposed scheme can be used to provide secure metaverse environments.
Article
Full-text available
The metaverse has the potential to extend the physical world using augmented and virtual reality technologies allowing users to seamlessly interact within real and simulated environments using avatars and holograms. Virtual environments and immersive games (such as, Second Life, Fortnite, Roblox and VRChat) have been described as antecedents of the metaverse and offer some insight to the potential socio-economic impact of a fully functional persistent cross platform metaverse. Separating the hype and “meta…” rebranding from current reality is difficult, as “big tech” paints a picture of the transformative nature of the metaverse and how it will positively impact people in their work, leisure, and social interaction. The potential impact on the way we conduct business, interact with brands and others, and develop shared experiences is likely to be transformational as the distinct lines between physical and digital are likely to be somewhat blurred from current perceptions. However, although the technology and infrastructure does not yet exist to allow the development of new immersive virtual worlds at scale - one that our avatars could transcend across platforms, researchers are increasingly examining the transformative impact of the metaverse. Impacted sectors include marketing, education, healthcare as well as societal effects relating to social interaction factors from widespread adoption, and issues relating to trust, privacy, bias, disinformation, application of law as well as psychological aspects linked to addiction and impact on vulnerable people. This study examines these topics in detail by combining the informed narrative and multi-perspective approach from experts with varied disciplinary backgrounds on many aspects of the metaverse and its transformational impact. The paper concludes by proposing a future research agenda that is valuable for researchers, professionals and policy makers alike.
Article
Full-text available
This article discusses some of the issues surrounding an avatar of a real-life person in a metaverse. Given that the anticipated rise of metaverse is a developing area, the first part of the article discusses what the metaverse would entail, some suggestions on what these avatars would be like, why such avatars’ rights should be protected and whether consciousness should be a defining characteristic before these rights are granted. The second part of the article analyses incorporation techniques to grant legal personality to avatars in the metaverse as well as some of the potential harms that avatars could cause there, potentially leading to an extension of the real world. The third part of the article deals with imposing liability on a real-life person by lifting the ‘veil’ of the avatar to identify the real person behind the avatar through four foreseeable scenarios, i.e. fraud, defamation, identity theft and crime. The article briefly explores other potential legal issues in the metaverse. The article makes two final recommendations, the possibility of statutory remedies and judicial interpretation to rectify torts committed by avatars.
Article
Cutting-edge technologies play a pivotal role in achieving the three pillars of sustainable development: environment, economy, and society. These technologies might have positive or negative impacts on sustainable development. While IS theories, such as TAM, UTAUT, and UTAUT2, have provided invaluable insights into the determinants of technology adoption and use, they overlooked the subsequent impacts of technology use. From the sustainability perspective, this necessitates a holistic theoretical framework that goes beyond existing IS theories/models by examining the direct effect of technology use on environmental, economic, and social sustainability. Therefore, we developed the Technology-Environmental, Economic, and Social Sustainability Theory (T-EESST) in this research. T-EESST extends beyond existing IS theories by linking technology use to the three dimensions of sustainability. Due to its inclusivity of all facets of sustainability, the Metaverse is selected as a case study to evaluate the T-EESST. The data collected from a survey of 311 Metaverse users provided empirical support for T-EESST. The results showed that technology use significantly impacts environmental, economic, and social sustainability. The T-EESST contributes significantly to the IS and sustainability literature by bridging the gap between technology acceptance models and sustainability. The study offers practical implications for policymakers, decision-makers, developers, designers, service providers, and practitioners. It also provides numerous research directions as a road map for future extensions to T-EESST.
Article
The metaverse is a confluence of several technical breakthroughs that promotes social and economic engagement, resulting in a novel and immersive online purchasing experience. The main objective of this study is to investigate how metaverse attributes affect users’ sense of telepresence, product knowledge and purchase intentions in the metaverse stores. This research provides a theoretical basis for understanding customer behavior in virtual stores by adapting the Stimulus Organism Response (S–O-R) model. The Partial Least Square Structural Equations Modelling (PLS-SEM) approach was applied to analyze the data collected from 258 respondents via an online survey. Respondents were consumers who have actively engaged in the metaverse applications. Metaverse stimuli attributes (i.e., effectiveness, vividness, and interactivity) have a positive significant influence on metaverse organismic experience (i.e., telepresence). Additionally, metaverse telepresence has a significant positive influence on customers responses (i.e., perceived product knowledge, and purchase intentions). This study offers cutting-edge recommendations for tech giants and metaverse developers to facilitate consumers’ buying behavior in metaverse stores.
Article
The emergence of the Metaverse promises to provide several benefits to society, e.g., fully immersive and interactive environments in healthcare, the workplace, and everyday life. However, it introduces a number of privacy and security concerns, including identity, network, and economy-related threats, for both providers and users of Metaverse-based applications, which remain unaddressed. In this paper, we highlight the potential role of Cyber Threat Intelligence (CTI) sharing within the Metaverse context as a promising opportunity to address such privacy and security issues. CTI refers to the relevant, timely and actionable information about the latest threats and attacks. In particular, we examine how organisations could proactively manage the cyber risks associated with their digital infrastructure by participating in CTI sharing within a Metaverse context. We also propose that user-based CTI sharing should be considered within the Metaverse given the potential prevalence of a number of user-specific threats, e.g., identity-related threats. Finally, we emphasise that the integration of user-based sharing creates additional threat sharing flows between users as well as between organisations and users that are lacking from existing CTI sharing approaches, e.g., user-to-user, organisation-to-user, and user-to-organisation.
Article
Metaverse is an immersive virtual universe where users interact with each other using an avatar. The Metaverse is promised to offer numerous opportunities for many sectors. While the Metaverse promotes the social interaction between users, there is a scarcity of knowledge on what affects its social sustainability. Hence, this research develops a model by integrating the UTAUT2 constructs and big five personality traits to understand the social sustainability of the Metaverse. The model is tested by employing a hybrid covariance-based structural equation modeling (CB-SEM) and artificial neural network (ANN) approach based on collecting data from 446 Metaverse users. The CB-SEM results showed that performance expectancy, social influence, hedonic motivation, price value, habit, agreeableness, neuroticism, and openness significantly impact the social sustainability of the Metaverse, while no significant effect is reported regarding effort expectancy, facilitating conditions, conscientiousness, and extraversion. All these factors explained 80% of the variance in social sustainability. The ANN results showed that habit is the most important factor in predicting social sustainability. Drawing on these findings, the study offers several theoretical contributions and sheds light on several practical implications for developers, designers, and decision-makers promoting the use of the Metaverse.
Article
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize. Driven by recent advances in emerging technologies such as extended reality, artificial intelligence, and blockchain, metaverse is stepping from science fiction to an upcoming reality. However, severe privacy invasions and security breaches (inherited from underlying technologies or emerged in the new digital ecology) of metaverse can impede its wide deployment. At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive realism, hyper spatiotemporality, sustainability, and heterogeneity. In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures. Finally, we draw open research directions for building future metaverse systems.
Article
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats. Understanding the cybersecurity behaviors of young adults, and identifying the measures and factors that can help reduce cyber threats is thus crucial. Since the existing studies have not sufficiently explored these factors, this study adopted a socio-behavioral perspective. It employed the primary constructs of the theory of planned behavior (TPB) with other factors, including perceived awareness and knowledge of cyber threats, to predict young adults' behavioral intent to practice cybersecurity behaviors. Data were collected from a random sample of 1581 young adults studying at Technical and Vocational Training Corporation (TVTC) colleges in Saudi Arabia through an online survey and were analyzed using the least-squares partial structural equation modeling (SEM). The results revealed that attitude (ATT), subjective norm (SN), and perceived behavioral control (PBC) strongly influenced young adults’ intentions to practice cybersecurity behavior (IPC). Also important for IPC was the perceived awareness of the consequences of the risks of cyber threats and the need for cybersecurity behavior (PCST). Moreover, while PCST and IPC were directly related to practicing cybersecurity behaviors, PBC was not. Future studies may benefit from examining cultural, and socio-demographic aspects that may influence CSB.
Article
Immersive virtual reality (VR) that utilizes head-mounted displays (HMD) is one of the key emerging technologies of the 21st century and has drawn keen attention from consumers, practitioners, and scholars in various disciplines. Nevertheless, the information systems (IS) discipline has neglected immersive VR, given that only a handful of studies have been published in mainstream IS journals. However, the recent advancements in immersive VR technology provide new opportunities for organizations and IS researchers. In light of these points, we reviewed the immersive VR literature to provide a holistic view of opportunities and challenges for organizations and future research directions for the IS field. By examining the technical capabilities of immersive VR and the previous literature, we identified five affordances: embodiment, interactivity, navigability, sense-ability, and create-ability. Our review of the 151 studies from the IS and related fields synthesized how these affordances were utilized in various research domains. Guided by the affordance-actualization theory, we also identified the strategic opportunities and challenges that come with implementing VR. The actualization of immersive VR affordances in organizations is indeed a fruitful area for IS scholars as there are various venues to move the IS field as well as the VR research in the organizational context forward.
Article
The use of a secure and robust digital identification system that is capable of protecting privacy is an essential, reliable and user-friendly element for a strong cyber resilience strategy and is a source of new business opportunities and applications for banks, private sector with a return on their investment. The march towards Digital Identity is well underway therefore, focus should be on both adoption and adaption of the new structures and regulations. These are needed to govern the associated services and transactions as well as establishing laws that enforce penalties for violations. There is no doubt then that more and more entities and institutions would move to the cloud. Security challenges affecting the cloud may not be new but the mode of addressing them would be different. The authors develop a Data Colouring technique for securing data processed or stored on both cloud and non-cloud platforms. The technique combines Public Key Infrastructure (PKI), concatenated fingerprints and digital watermarking. Using this technique, data can be secured at creation or during storage and remains secure during processing.
Article
While the Internet has become an indispensable aspect of personal and professional lives, it has also served to render many individuals vulnerable to cybersecurity threats. Thus, the promotion of cybersecurity behaviors can effectively protect individuals from these threats. However, cybersecurity behaviors do not necessarily come naturally, and people need support and encouragement to develop and adopt them. A habit is an important factor that may motivate cybersecurity behaviors, but it has often been overlooked in past studies. To address this limitation, this study examined the formation of cybersecurity behavioral habits. Hierarchical regression analysis was used to analyze cybersecurity behavior survey data obtained from 393 college student participants. The results revealed the following: (1) efficacy and behavioral comprehensiveness predict cybersecurity behavioral habits; (2) efficacy has a positively impact on behavioral comprehensiveness; (3) situational support has a positive influence on efficacy. These findings suggest that cybersecurity behavioral habits can be formed by promoting the diversity of cybersecurity measures practiced (behavioral comprehensiveness) and efficacy.