<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="reviewer-report"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>i̇züfbed</journal-id>
            <journal-title-group>
                                                                                    <journal-title>İstanbul Sabahattin Zaim Üniversitesi Fen Bilimleri Enstitüsü Dergisi</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2667-792X</issn>
                                                                                            <publisher>
                    <publisher-name>İstanbul Sabahattin Zaim Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.47769/izufbed.1130284</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="en">
                                    <trans-title>Metaverse: From Virtual Word to Real Security and Privacy Problems</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>Metaverse: Sanal Dünyadan Gerçek Gizlilik ve Güvenlik Problemlerine</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9589-2712</contrib-id>
                                                                <name>
                                    <surname>Mandal</surname>
                                    <given-names>Tugay</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-6907-4807</contrib-id>
                                                                <name>
                                    <surname>Sağır</surname>
                                    <given-names>Ahmet Bedirhan</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-5070-9822</contrib-id>
                                                                <name>
                                    <surname>Öztürk</surname>
                                    <given-names>Mehmet Nuri Alparslan</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-1296-8417</contrib-id>
                                                                <name>
                                    <surname>Uysal</surname>
                                    <given-names>Muhammed Yusuf</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-0511-9161</contrib-id>
                                                                <name>
                                    <surname>Külekci</surname>
                                    <given-names>Murat</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-7597-4406</contrib-id>
                                                                <name>
                                    <surname>Büyükakıncı</surname>
                                    <given-names>Banu Yeşim</given-names>
                                </name>
                                                                    <aff>İSTANBUL AYDIN ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220831">
                    <day>08</day>
                    <month>31</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>4</volume>
                                        <issue>2</issue>
                                        <fpage>100</fpage>
                                        <lpage>106</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220613">
                        <day>06</day>
                        <month>13</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220717">
                        <day>07</day>
                        <month>17</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2019, İstanbul Sabahattin Zaim Üniversitesi Fen Bilimleri Enstitüsü Dergisi</copyright-statement>
                    <copyright-year>2019</copyright-year>
                    <copyright-holder>İstanbul Sabahattin Zaim Üniversitesi Fen Bilimleri Enstitüsü Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="en">
                            <p>Although the metaverse is a very common term encountered nowadays, it is the concept of real-world-like artificial worlds or 3-dimensional worlds that has existed since the 1990s. As well as with the great leaps happened in information and communication technologies in every ten years; with the effect of social guidance and new technologies such as virtual reality, augmented reality and Web 3.0, data security and right of privacy issues, experienced together with the previous leaps, have come to the daylight again. In this study, the concept of &quot;Metaverse&quot;, which has not yet been conceptually outlined, and the data security and right of privacy issues that may be encountered in the metaverse are evaluated. User profile creation, user privacy and precautions against privacy were evaluated, and research was conducted on identity management, protection of user information and community management in terms of security.</p></trans-abstract>
                                                                                                                                    <abstract><p>Metaverse günümüzde çok sık karşılaşılan bir terim olsa da 1990’lardan beri var olan, gerçek dünya benzeri yapay dünyalar veya 3 boyutlu dünyalar konseptidir. Her on yılda bir bilgi ve iletişim teknolojilerinde yaşanan büyük sıçramalarla birlikte; sanal gerçeklik, artırılmış gerçeklik, Web 3.0 gibi yeni teknolojilerin ve toplumsal yönlendirmenin de etkisiyle, daha önceki sıçramalarla beraber yaşanan veri güvenliği ve özel hayatın gizliliği sorunları yeniden gün yüzüne çıkmıştır. Bu çalışmada henüz kavramsal olarak tüm çerçevesi çizilmemiş, “Metaverse” kavramı ve metaverse’te karşılaşılabilecek veri güvenliği ve gizlilik sorunları değerlendirilmiştir. Kullanıcı profili oluşturma, kullanıcı gizliliği ve gizliliğe karşı önlemler değerlendirilmiş, güvenlik konusunda kimlik yönetimi, kullanıcı bilgilerinin korunması ve toplum yönetimine dair araştırma yapılmıştır.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Metaverse</kwd>
                                                    <kwd>  Veri Güvenliği</kwd>
                                                    <kwd>  Gizlilik</kwd>
                                                    <kwd>  Sanal Gerçeklik</kwd>
                                                    <kwd>  Artırılmış Gerçeklik</kwd>
                                                    <kwd>  Kişisel Bilgi.</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="en">
                                                    <kwd>Data Security</kwd>
                                                    <kwd>  Privacy</kwd>
                                                    <kwd>  Virtual Reality</kwd>
                                                    <kwd>  Augmented Reality</kwd>
                                                    <kwd>  Personal Information.</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Alan, T. (2021). “Eğitimde Dijitalleşme ve Yeni Yaklaşımlar”. Efe Akademi Yayınevi vol. 1,, 1-30.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">B. Falchuk, S. L. (2018). “The social metaverse: Battle for privacy,”. IEEE Technol. Soc. Mag., vol. 37, no. 2, 52-61.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Bakioglu, B. S. (2009). Spectacular interventions of Second Life: Goon culture, griefing, and disruption in virtual spaces. Journal for Virtual Worlds Research, 1(3).</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Bardzell, S., &amp; Bardzell, J. (2007). Docile avatars: Aesthetics, experience, and sexual interaction in Second Life. The 21st British HCI Group Annual Conference on People and Computers (BCS-HCI’07), (s. 1-11).</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Boneh, D., Grotto, A. J., McDaniel, P., &amp; Papernot, N. (2019). &quot;How relevant is the Turing tes in the age of sophisbots?&quot;. IEEE Security &amp; Privacy, vol. 17 no.6, 64-71.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., &amp; Vakali, A. (2017). “Measuring #gamergate: A tale of hate, sexism, and bullying. The 26th International Conference on World Wide Web (WWW’17 Companion), (s. 1285-1920).</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Conover, M. D., Goncalves, B., Ratkiewicz, J., Flammini, A., &amp; Menczer, F. (2011). Predicting the political alignment of Twitter users. The 3rd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and the 3rd IEEE International Conference on Social Computing (SocialCom’11), (s. 192-199).</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Cresci, S. (2020). &quot;A decade of social bot detection&quot;. . Communications of the ACM, vol. 63 no. 10, 72-83.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Çelik, R. (2022:08). “Metaverse Nedir? Kavramsal Değerlendirme ve Genel Bakış”.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Davis, A., Murpy, J. D., Owens, D., Khazanchi, D., &amp; Zigurs, I. (2009). “Avatars, People, and Virtual Worlds: Foundations for Research in Metaverses”,. Department of Information Systems and Quantitative Analysis,, 1-30.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Dionisio, J., III, W., &amp; Gilbert, R. (2013). “3D virtual worlds and the metaverse: Current status and future possibilities,”. ACM Computing Surveys (CSUR) vol. 45, no. 3, 1-38.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Falchuck, B., Loeb, S., &amp; Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-62.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Flores-Sviaga, C., Keegan, B., &amp; Savage, S. (2018). Mobilizing the Trump train: Understanding collective action in a political trolling community. The 12th International AAAI Conference on Web and Social Media (ICWSM’18).</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Geeng, C., Hutson, J., &amp; Roesner, F. (2020). Usable sexurity: Studying people’s concerns and strategies when sexting. 16th USENIX Symposium on Usable Privacy and Security (SOUPS’20), (s. 127-144).</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Jaatun, Jensen, J., &amp; G., M. (2013). &quot;Federated identity management - we built it; why won&#039;t they come?&quot;. IEEE Security &amp; Privacy vol. 11 no.2, 34-41.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Kosinski, M., Stillwell, D., &amp; Graepel, T. (2013). Private traits and attributes. Proceedings, 110(15), 5802-5805.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Kuş, O. (2021). Metaverse: ‘Dijital Büyük Patlamada’ Fırsatlar ve Endişelere Yönelik Algılar. Intermedia International e-Journal, 8(15) doi: 10.21645/intermedia.2021.109, 245-266.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Laperdrix, P., Bielove, B., Baundry, B., &amp; Avoine, G. (2020). Browser fingerprinting: A survey. ACM Transactions on the Web, 14(2).</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Lee, L. H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., . . . Hui, P. (2021, 11 3). All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. https://arxiv.org/: https://arxiv.org/abs/2110.05352 adresinden alındı</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Ling, C., Balcı, U., Blackburn, J., &amp; Stringhini, G. (2021). A first look at zoombombing. The 43rd IEEE Symposium on Security and Privacy (s. 1452-1467). IEEE.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., . . . Daneshmand, M. (2021). “A survey on metaverse: the state-of-the-art, technologies, applications, and challenges,”. arXiv preprint arXiv:2111.09673, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., &amp; Tesconi, M. (2021). Coordinated behavior on social media in 2019 UK General Election. The 15th International AAAI Conference on Web and Social Media (ICWSM’21) (s. 443-454). AAAI.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Ruoyu Zhao, Y. Z. (2022, 3 8). Metaverse: Security and Privacy Concerns. https://arxiv.org/: https://arxiv.org/abs/2203.03854 adresinden alındı</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Salahdine, F., &amp; Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Samir, E., We, H., Azab, M., Xin, C. S., &amp; Zhang, Q. (2021). &quot;DT-SSIM: A decentralized trustworthy self-sovereigh identity management framework&quot;. IEEE Internet of Things Journal, doi:10.1109/JIOT.2021.3112537.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Sanchez, J. (2007). “Second life: An interactive qualitative analysis,”. Society for Information Technology &amp; Teacher Education International Conference, , 1240-1243.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Snyder, P., Doerfler, P., Kanich, C., &amp; McCoy, D. (2017). Fifteen minutes of unwanted fame: Detecting and characterizing doxing. Internet Measurement Conference (IMC’17), (s. 432-444).</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Stentoft, A. B. (2019). “Lifelogging in the wild: Participant experiences of using lifelogging as a research tool,”. IFIP Conference on Human-Computer Interaction, 431-451.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Stephenson, N. (2003). Snow crash: A novel. Spectra.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Türk, G. D. (2022). Metaverse ve Benlik Sunumu. The Turkish Online Journal of Design Art and Communication, 12 (2), 316-333.
Weber, D., &amp; Neumann, F. (2021). Amplifying influence through coordinated behaviour in social networks. Social Network Analysis and Mining, 11(1), 1-42.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Yuntao Wang, Z. S. (2022, 3 5). A Survey on Metaverse: Fundamentals, Security, and Privacy. https://arxiv.org/abs/2203.02662: https://arxiv.org/abs/2203.02662 adresinden alındı</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sivivianos, M., Stringhini, G., &amp; Suarez-Tangil, G. (2018). “On the origins of memes by means of fringe Web communities. The 2018 Internet Measurement Conference (IMC’18), (s. 188-202).</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Zhu, J., Ni, P., &amp; Wang, G. (2020). &quot;Activity minimization of misinformation influance in online social networks&quot;. IEEE Transactions on Computational social Systems, vol. 7 no.4, 897-906.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
