Metaverse: From Virtual Word to Real Security and Privacy Problems
Yıl 2022,
, 100 - 106, 31.08.2022
Tugay Mandal
,
Ahmet Bedirhan Sağır
,
Mehmet Nuri Alparslan Öztürk
,
Muhammed Yusuf Uysal
,
Murat Külekci
,
Banu Yeşim Büyükakıncı
Öz
Although the metaverse is a very common term encountered nowadays, it is the concept of real-world-like artificial worlds or 3-dimensional worlds that has existed since the 1990s. As well as with the great leaps happened in information and communication technologies in every ten years; with the effect of social guidance and new technologies such as virtual reality, augmented reality and Web 3.0, data security and right of privacy issues, experienced together with the previous leaps, have come to the daylight again. In this study, the concept of "Metaverse", which has not yet been conceptually outlined, and the data security and right of privacy issues that may be encountered in the metaverse are evaluated. User profile creation, user privacy and precautions against privacy were evaluated, and research was conducted on identity management, protection of user information and community management in terms of security.
Kaynakça
- Alan, T. (2021). “Eğitimde Dijitalleşme ve Yeni Yaklaşımlar”. Efe Akademi Yayınevi vol. 1,, 1-30.
- B. Falchuk, S. L. (2018). “The social metaverse: Battle for privacy,”. IEEE Technol. Soc. Mag., vol. 37, no. 2, 52-61.
- Bakioglu, B. S. (2009). Spectacular interventions of Second Life: Goon culture, griefing, and disruption in virtual spaces. Journal for Virtual Worlds Research, 1(3).
- Bardzell, S., & Bardzell, J. (2007). Docile avatars: Aesthetics, experience, and sexual interaction in Second Life. The 21st British HCI Group Annual Conference on People and Computers (BCS-HCI’07), (s. 1-11).
- Boneh, D., Grotto, A. J., McDaniel, P., & Papernot, N. (2019). "How relevant is the Turing tes in the age of sophisbots?". IEEE Security & Privacy, vol. 17 no.6, 64-71.
- Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017). “Measuring #gamergate: A tale of hate, sexism, and bullying. The 26th International Conference on World Wide Web (WWW’17 Companion), (s. 1285-1920).
- Conover, M. D., Goncalves, B., Ratkiewicz, J., Flammini, A., & Menczer, F. (2011). Predicting the political alignment of Twitter users. The 3rd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and the 3rd IEEE International Conference on Social Computing (SocialCom’11), (s. 192-199).
- Cresci, S. (2020). "A decade of social bot detection". . Communications of the ACM, vol. 63 no. 10, 72-83.
- Çelik, R. (2022:08). “Metaverse Nedir? Kavramsal Değerlendirme ve Genel Bakış”.
- Davis, A., Murpy, J. D., Owens, D., Khazanchi, D., & Zigurs, I. (2009). “Avatars, People, and Virtual Worlds: Foundations for Research in Metaverses”,. Department of Information Systems and Quantitative Analysis,, 1-30.
- Dionisio, J., III, W., & Gilbert, R. (2013). “3D virtual worlds and the metaverse: Current status and future possibilities,”. ACM Computing Surveys (CSUR) vol. 45, no. 3, 1-38.
- Falchuck, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-62.
- Flores-Sviaga, C., Keegan, B., & Savage, S. (2018). Mobilizing the Trump train: Understanding collective action in a political trolling community. The 12th International AAAI Conference on Web and Social Media (ICWSM’18).
- Geeng, C., Hutson, J., & Roesner, F. (2020). Usable sexurity: Studying people’s concerns and strategies when sexting. 16th USENIX Symposium on Usable Privacy and Security (SOUPS’20), (s. 127-144).
- Jaatun, Jensen, J., & G., M. (2013). "Federated identity management - we built it; why won't they come?". IEEE Security & Privacy vol. 11 no.2, 34-41.
- Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes. Proceedings, 110(15), 5802-5805.
- Kuş, O. (2021). Metaverse: ‘Dijital Büyük Patlamada’ Fırsatlar ve Endişelere Yönelik Algılar. Intermedia International e-Journal, 8(15) doi: 10.21645/intermedia.2021.109, 245-266.
- Laperdrix, P., Bielove, B., Baundry, B., & Avoine, G. (2020). Browser fingerprinting: A survey. ACM Transactions on the Web, 14(2).
- Lee, L. H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., . . . Hui, P. (2021, 11 3). All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. https://arxiv.org/: https://arxiv.org/abs/2110.05352 adresinden alındı
- Ling, C., Balcı, U., Blackburn, J., & Stringhini, G. (2021). A first look at zoombombing. The 43rd IEEE Symposium on Security and Privacy (s. 1452-1467). IEEE.
- Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., . . . Daneshmand, M. (2021). “A survey on metaverse: the state-of-the-art, technologies, applications, and challenges,”. arXiv preprint arXiv:2111.09673, 2021.
- Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., & Tesconi, M. (2021). Coordinated behavior on social media in 2019 UK General Election. The 15th International AAAI Conference on Web and Social Media (ICWSM’21) (s. 443-454). AAAI.
- Ruoyu Zhao, Y. Z. (2022, 3 8). Metaverse: Security and Privacy Concerns. https://arxiv.org/: https://arxiv.org/abs/2203.03854 adresinden alındı
- Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.
- Samir, E., We, H., Azab, M., Xin, C. S., & Zhang, Q. (2021). "DT-SSIM: A decentralized trustworthy self-sovereigh identity management framework". IEEE Internet of Things Journal, doi:10.1109/JIOT.2021.3112537.
- Sanchez, J. (2007). “Second life: An interactive qualitative analysis,”. Society for Information Technology & Teacher Education International Conference, , 1240-1243.
- Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017). Fifteen minutes of unwanted fame: Detecting and characterizing doxing. Internet Measurement Conference (IMC’17), (s. 432-444).
- Stentoft, A. B. (2019). “Lifelogging in the wild: Participant experiences of using lifelogging as a research tool,”. IFIP Conference on Human-Computer Interaction, 431-451.
- Stephenson, N. (2003). Snow crash: A novel. Spectra.
- Türk, G. D. (2022). Metaverse ve Benlik Sunumu. The Turkish Online Journal of Design Art and Communication, 12 (2), 316-333.
Weber, D., & Neumann, F. (2021). Amplifying influence through coordinated behaviour in social networks. Social Network Analysis and Mining, 11(1), 1-42.
- Yuntao Wang, Z. S. (2022, 3 5). A Survey on Metaverse: Fundamentals, Security, and Privacy. https://arxiv.org/abs/2203.02662: https://arxiv.org/abs/2203.02662 adresinden alındı
- Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sivivianos, M., Stringhini, G., & Suarez-Tangil, G. (2018). “On the origins of memes by means of fringe Web communities. The 2018 Internet Measurement Conference (IMC’18), (s. 188-202).
- Zhu, J., Ni, P., & Wang, G. (2020). "Activity minimization of misinformation influance in online social networks". IEEE Transactions on Computational social Systems, vol. 7 no.4, 897-906.
Metaverse: Sanal Dünyadan Gerçek Gizlilik ve Güvenlik Problemlerine
Yıl 2022,
, 100 - 106, 31.08.2022
Tugay Mandal
,
Ahmet Bedirhan Sağır
,
Mehmet Nuri Alparslan Öztürk
,
Muhammed Yusuf Uysal
,
Murat Külekci
,
Banu Yeşim Büyükakıncı
Öz
Metaverse günümüzde çok sık karşılaşılan bir terim olsa da 1990’lardan beri var olan, gerçek dünya benzeri yapay dünyalar veya 3 boyutlu dünyalar konseptidir. Her on yılda bir bilgi ve iletişim teknolojilerinde yaşanan büyük sıçramalarla birlikte; sanal gerçeklik, artırılmış gerçeklik, Web 3.0 gibi yeni teknolojilerin ve toplumsal yönlendirmenin de etkisiyle, daha önceki sıçramalarla beraber yaşanan veri güvenliği ve özel hayatın gizliliği sorunları yeniden gün yüzüne çıkmıştır. Bu çalışmada henüz kavramsal olarak tüm çerçevesi çizilmemiş, “Metaverse” kavramı ve metaverse’te karşılaşılabilecek veri güvenliği ve gizlilik sorunları değerlendirilmiştir. Kullanıcı profili oluşturma, kullanıcı gizliliği ve gizliliğe karşı önlemler değerlendirilmiş, güvenlik konusunda kimlik yönetimi, kullanıcı bilgilerinin korunması ve toplum yönetimine dair araştırma yapılmıştır.
Kaynakça
- Alan, T. (2021). “Eğitimde Dijitalleşme ve Yeni Yaklaşımlar”. Efe Akademi Yayınevi vol. 1,, 1-30.
- B. Falchuk, S. L. (2018). “The social metaverse: Battle for privacy,”. IEEE Technol. Soc. Mag., vol. 37, no. 2, 52-61.
- Bakioglu, B. S. (2009). Spectacular interventions of Second Life: Goon culture, griefing, and disruption in virtual spaces. Journal for Virtual Worlds Research, 1(3).
- Bardzell, S., & Bardzell, J. (2007). Docile avatars: Aesthetics, experience, and sexual interaction in Second Life. The 21st British HCI Group Annual Conference on People and Computers (BCS-HCI’07), (s. 1-11).
- Boneh, D., Grotto, A. J., McDaniel, P., & Papernot, N. (2019). "How relevant is the Turing tes in the age of sophisbots?". IEEE Security & Privacy, vol. 17 no.6, 64-71.
- Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017). “Measuring #gamergate: A tale of hate, sexism, and bullying. The 26th International Conference on World Wide Web (WWW’17 Companion), (s. 1285-1920).
- Conover, M. D., Goncalves, B., Ratkiewicz, J., Flammini, A., & Menczer, F. (2011). Predicting the political alignment of Twitter users. The 3rd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and the 3rd IEEE International Conference on Social Computing (SocialCom’11), (s. 192-199).
- Cresci, S. (2020). "A decade of social bot detection". . Communications of the ACM, vol. 63 no. 10, 72-83.
- Çelik, R. (2022:08). “Metaverse Nedir? Kavramsal Değerlendirme ve Genel Bakış”.
- Davis, A., Murpy, J. D., Owens, D., Khazanchi, D., & Zigurs, I. (2009). “Avatars, People, and Virtual Worlds: Foundations for Research in Metaverses”,. Department of Information Systems and Quantitative Analysis,, 1-30.
- Dionisio, J., III, W., & Gilbert, R. (2013). “3D virtual worlds and the metaverse: Current status and future possibilities,”. ACM Computing Surveys (CSUR) vol. 45, no. 3, 1-38.
- Falchuck, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-62.
- Flores-Sviaga, C., Keegan, B., & Savage, S. (2018). Mobilizing the Trump train: Understanding collective action in a political trolling community. The 12th International AAAI Conference on Web and Social Media (ICWSM’18).
- Geeng, C., Hutson, J., & Roesner, F. (2020). Usable sexurity: Studying people’s concerns and strategies when sexting. 16th USENIX Symposium on Usable Privacy and Security (SOUPS’20), (s. 127-144).
- Jaatun, Jensen, J., & G., M. (2013). "Federated identity management - we built it; why won't they come?". IEEE Security & Privacy vol. 11 no.2, 34-41.
- Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes. Proceedings, 110(15), 5802-5805.
- Kuş, O. (2021). Metaverse: ‘Dijital Büyük Patlamada’ Fırsatlar ve Endişelere Yönelik Algılar. Intermedia International e-Journal, 8(15) doi: 10.21645/intermedia.2021.109, 245-266.
- Laperdrix, P., Bielove, B., Baundry, B., & Avoine, G. (2020). Browser fingerprinting: A survey. ACM Transactions on the Web, 14(2).
- Lee, L. H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., . . . Hui, P. (2021, 11 3). All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. https://arxiv.org/: https://arxiv.org/abs/2110.05352 adresinden alındı
- Ling, C., Balcı, U., Blackburn, J., & Stringhini, G. (2021). A first look at zoombombing. The 43rd IEEE Symposium on Security and Privacy (s. 1452-1467). IEEE.
- Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., . . . Daneshmand, M. (2021). “A survey on metaverse: the state-of-the-art, technologies, applications, and challenges,”. arXiv preprint arXiv:2111.09673, 2021.
- Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., & Tesconi, M. (2021). Coordinated behavior on social media in 2019 UK General Election. The 15th International AAAI Conference on Web and Social Media (ICWSM’21) (s. 443-454). AAAI.
- Ruoyu Zhao, Y. Z. (2022, 3 8). Metaverse: Security and Privacy Concerns. https://arxiv.org/: https://arxiv.org/abs/2203.03854 adresinden alındı
- Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.
- Samir, E., We, H., Azab, M., Xin, C. S., & Zhang, Q. (2021). "DT-SSIM: A decentralized trustworthy self-sovereigh identity management framework". IEEE Internet of Things Journal, doi:10.1109/JIOT.2021.3112537.
- Sanchez, J. (2007). “Second life: An interactive qualitative analysis,”. Society for Information Technology & Teacher Education International Conference, , 1240-1243.
- Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017). Fifteen minutes of unwanted fame: Detecting and characterizing doxing. Internet Measurement Conference (IMC’17), (s. 432-444).
- Stentoft, A. B. (2019). “Lifelogging in the wild: Participant experiences of using lifelogging as a research tool,”. IFIP Conference on Human-Computer Interaction, 431-451.
- Stephenson, N. (2003). Snow crash: A novel. Spectra.
- Türk, G. D. (2022). Metaverse ve Benlik Sunumu. The Turkish Online Journal of Design Art and Communication, 12 (2), 316-333.
Weber, D., & Neumann, F. (2021). Amplifying influence through coordinated behaviour in social networks. Social Network Analysis and Mining, 11(1), 1-42.
- Yuntao Wang, Z. S. (2022, 3 5). A Survey on Metaverse: Fundamentals, Security, and Privacy. https://arxiv.org/abs/2203.02662: https://arxiv.org/abs/2203.02662 adresinden alındı
- Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sivivianos, M., Stringhini, G., & Suarez-Tangil, G. (2018). “On the origins of memes by means of fringe Web communities. The 2018 Internet Measurement Conference (IMC’18), (s. 188-202).
- Zhu, J., Ni, P., & Wang, G. (2020). "Activity minimization of misinformation influance in online social networks". IEEE Transactions on Computational social Systems, vol. 7 no.4, 897-906.