Review
BibTex RIS Cite

Metaverse: From Virtual Word to Real Security and Privacy Problems

Year 2022, , 100 - 106, 31.08.2022
https://doi.org/10.47769/izufbed.1130284

Abstract

Although the metaverse is a very common term encountered nowadays, it is the concept of real-world-like artificial worlds or 3-dimensional worlds that has existed since the 1990s. As well as with the great leaps happened in information and communication technologies in every ten years; with the effect of social guidance and new technologies such as virtual reality, augmented reality and Web 3.0, data security and right of privacy issues, experienced together with the previous leaps, have come to the daylight again. In this study, the concept of "Metaverse", which has not yet been conceptually outlined, and the data security and right of privacy issues that may be encountered in the metaverse are evaluated. User profile creation, user privacy and precautions against privacy were evaluated, and research was conducted on identity management, protection of user information and community management in terms of security.

References

  • Alan, T. (2021). “Eğitimde Dijitalleşme ve Yeni Yaklaşımlar”. Efe Akademi Yayınevi vol. 1,, 1-30.
  • B. Falchuk, S. L. (2018). “The social metaverse: Battle for privacy,”. IEEE Technol. Soc. Mag., vol. 37, no. 2, 52-61.
  • Bakioglu, B. S. (2009). Spectacular interventions of Second Life: Goon culture, griefing, and disruption in virtual spaces. Journal for Virtual Worlds Research, 1(3).
  • Bardzell, S., & Bardzell, J. (2007). Docile avatars: Aesthetics, experience, and sexual interaction in Second Life. The 21st British HCI Group Annual Conference on People and Computers (BCS-HCI’07), (s. 1-11).
  • Boneh, D., Grotto, A. J., McDaniel, P., & Papernot, N. (2019). "How relevant is the Turing tes in the age of sophisbots?". IEEE Security & Privacy, vol. 17 no.6, 64-71.
  • Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017). “Measuring #gamergate: A tale of hate, sexism, and bullying. The 26th International Conference on World Wide Web (WWW’17 Companion), (s. 1285-1920).
  • Conover, M. D., Goncalves, B., Ratkiewicz, J., Flammini, A., & Menczer, F. (2011). Predicting the political alignment of Twitter users. The 3rd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and the 3rd IEEE International Conference on Social Computing (SocialCom’11), (s. 192-199).
  • Cresci, S. (2020). "A decade of social bot detection". . Communications of the ACM, vol. 63 no. 10, 72-83.
  • Çelik, R. (2022:08). “Metaverse Nedir? Kavramsal Değerlendirme ve Genel Bakış”.
  • Davis, A., Murpy, J. D., Owens, D., Khazanchi, D., & Zigurs, I. (2009). “Avatars, People, and Virtual Worlds: Foundations for Research in Metaverses”,. Department of Information Systems and Quantitative Analysis,, 1-30.
  • Dionisio, J., III, W., & Gilbert, R. (2013). “3D virtual worlds and the metaverse: Current status and future possibilities,”. ACM Computing Surveys (CSUR) vol. 45, no. 3, 1-38.
  • Falchuck, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-62.
  • Flores-Sviaga, C., Keegan, B., & Savage, S. (2018). Mobilizing the Trump train: Understanding collective action in a political trolling community. The 12th International AAAI Conference on Web and Social Media (ICWSM’18).
  • Geeng, C., Hutson, J., & Roesner, F. (2020). Usable sexurity: Studying people’s concerns and strategies when sexting. 16th USENIX Symposium on Usable Privacy and Security (SOUPS’20), (s. 127-144).
  • Jaatun, Jensen, J., & G., M. (2013). "Federated identity management - we built it; why won't they come?". IEEE Security & Privacy vol. 11 no.2, 34-41.
  • Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes. Proceedings, 110(15), 5802-5805.
  • Kuş, O. (2021). Metaverse: ‘Dijital Büyük Patlamada’ Fırsatlar ve Endişelere Yönelik Algılar. Intermedia International e-Journal, 8(15) doi: 10.21645/intermedia.2021.109, 245-266.
  • Laperdrix, P., Bielove, B., Baundry, B., & Avoine, G. (2020). Browser fingerprinting: A survey. ACM Transactions on the Web, 14(2).
  • Lee, L. H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., . . . Hui, P. (2021, 11 3). All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. https://arxiv.org/: https://arxiv.org/abs/2110.05352 adresinden alındı
  • Ling, C., Balcı, U., Blackburn, J., & Stringhini, G. (2021). A first look at zoombombing. The 43rd IEEE Symposium on Security and Privacy (s. 1452-1467). IEEE.
  • Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., . . . Daneshmand, M. (2021). “A survey on metaverse: the state-of-the-art, technologies, applications, and challenges,”. arXiv preprint arXiv:2111.09673, 2021.
  • Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., & Tesconi, M. (2021). Coordinated behavior on social media in 2019 UK General Election. The 15th International AAAI Conference on Web and Social Media (ICWSM’21) (s. 443-454). AAAI.
  • Ruoyu Zhao, Y. Z. (2022, 3 8). Metaverse: Security and Privacy Concerns. https://arxiv.org/: https://arxiv.org/abs/2203.03854 adresinden alındı
  • Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.
  • Samir, E., We, H., Azab, M., Xin, C. S., & Zhang, Q. (2021). "DT-SSIM: A decentralized trustworthy self-sovereigh identity management framework". IEEE Internet of Things Journal, doi:10.1109/JIOT.2021.3112537.
  • Sanchez, J. (2007). “Second life: An interactive qualitative analysis,”. Society for Information Technology & Teacher Education International Conference, , 1240-1243.
  • Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017). Fifteen minutes of unwanted fame: Detecting and characterizing doxing. Internet Measurement Conference (IMC’17), (s. 432-444).
  • Stentoft, A. B. (2019). “Lifelogging in the wild: Participant experiences of using lifelogging as a research tool,”. IFIP Conference on Human-Computer Interaction, 431-451.
  • Stephenson, N. (2003). Snow crash: A novel. Spectra.
  • Türk, G. D. (2022). Metaverse ve Benlik Sunumu. The Turkish Online Journal of Design Art and Communication, 12 (2), 316-333. Weber, D., & Neumann, F. (2021). Amplifying influence through coordinated behaviour in social networks. Social Network Analysis and Mining, 11(1), 1-42.
  • Yuntao Wang, Z. S. (2022, 3 5). A Survey on Metaverse: Fundamentals, Security, and Privacy. https://arxiv.org/abs/2203.02662: https://arxiv.org/abs/2203.02662 adresinden alındı
  • Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sivivianos, M., Stringhini, G., & Suarez-Tangil, G. (2018). “On the origins of memes by means of fringe Web communities. The 2018 Internet Measurement Conference (IMC’18), (s. 188-202).
  • Zhu, J., Ni, P., & Wang, G. (2020). "Activity minimization of misinformation influance in online social networks". IEEE Transactions on Computational social Systems, vol. 7 no.4, 897-906.

Metaverse: Sanal Dünyadan Gerçek Gizlilik ve Güvenlik Problemlerine

Year 2022, , 100 - 106, 31.08.2022
https://doi.org/10.47769/izufbed.1130284

Abstract

Metaverse günümüzde çok sık karşılaşılan bir terim olsa da 1990’lardan beri var olan, gerçek dünya benzeri yapay dünyalar veya 3 boyutlu dünyalar konseptidir. Her on yılda bir bilgi ve iletişim teknolojilerinde yaşanan büyük sıçramalarla birlikte; sanal gerçeklik, artırılmış gerçeklik, Web 3.0 gibi yeni teknolojilerin ve toplumsal yönlendirmenin de etkisiyle, daha önceki sıçramalarla beraber yaşanan veri güvenliği ve özel hayatın gizliliği sorunları yeniden gün yüzüne çıkmıştır. Bu çalışmada henüz kavramsal olarak tüm çerçevesi çizilmemiş, “Metaverse” kavramı ve metaverse’te karşılaşılabilecek veri güvenliği ve gizlilik sorunları değerlendirilmiştir. Kullanıcı profili oluşturma, kullanıcı gizliliği ve gizliliğe karşı önlemler değerlendirilmiş, güvenlik konusunda kimlik yönetimi, kullanıcı bilgilerinin korunması ve toplum yönetimine dair araştırma yapılmıştır.

References

  • Alan, T. (2021). “Eğitimde Dijitalleşme ve Yeni Yaklaşımlar”. Efe Akademi Yayınevi vol. 1,, 1-30.
  • B. Falchuk, S. L. (2018). “The social metaverse: Battle for privacy,”. IEEE Technol. Soc. Mag., vol. 37, no. 2, 52-61.
  • Bakioglu, B. S. (2009). Spectacular interventions of Second Life: Goon culture, griefing, and disruption in virtual spaces. Journal for Virtual Worlds Research, 1(3).
  • Bardzell, S., & Bardzell, J. (2007). Docile avatars: Aesthetics, experience, and sexual interaction in Second Life. The 21st British HCI Group Annual Conference on People and Computers (BCS-HCI’07), (s. 1-11).
  • Boneh, D., Grotto, A. J., McDaniel, P., & Papernot, N. (2019). "How relevant is the Turing tes in the age of sophisbots?". IEEE Security & Privacy, vol. 17 no.6, 64-71.
  • Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017). “Measuring #gamergate: A tale of hate, sexism, and bullying. The 26th International Conference on World Wide Web (WWW’17 Companion), (s. 1285-1920).
  • Conover, M. D., Goncalves, B., Ratkiewicz, J., Flammini, A., & Menczer, F. (2011). Predicting the political alignment of Twitter users. The 3rd IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT’11) and the 3rd IEEE International Conference on Social Computing (SocialCom’11), (s. 192-199).
  • Cresci, S. (2020). "A decade of social bot detection". . Communications of the ACM, vol. 63 no. 10, 72-83.
  • Çelik, R. (2022:08). “Metaverse Nedir? Kavramsal Değerlendirme ve Genel Bakış”.
  • Davis, A., Murpy, J. D., Owens, D., Khazanchi, D., & Zigurs, I. (2009). “Avatars, People, and Virtual Worlds: Foundations for Research in Metaverses”,. Department of Information Systems and Quantitative Analysis,, 1-30.
  • Dionisio, J., III, W., & Gilbert, R. (2013). “3D virtual worlds and the metaverse: Current status and future possibilities,”. ACM Computing Surveys (CSUR) vol. 45, no. 3, 1-38.
  • Falchuck, B., Loeb, S., & Neff, R. (2018). The social metaverse: Battle for privacy. IEEE Technology and Society Magazine, 37(2), 52-62.
  • Flores-Sviaga, C., Keegan, B., & Savage, S. (2018). Mobilizing the Trump train: Understanding collective action in a political trolling community. The 12th International AAAI Conference on Web and Social Media (ICWSM’18).
  • Geeng, C., Hutson, J., & Roesner, F. (2020). Usable sexurity: Studying people’s concerns and strategies when sexting. 16th USENIX Symposium on Usable Privacy and Security (SOUPS’20), (s. 127-144).
  • Jaatun, Jensen, J., & G., M. (2013). "Federated identity management - we built it; why won't they come?". IEEE Security & Privacy vol. 11 no.2, 34-41.
  • Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes. Proceedings, 110(15), 5802-5805.
  • Kuş, O. (2021). Metaverse: ‘Dijital Büyük Patlamada’ Fırsatlar ve Endişelere Yönelik Algılar. Intermedia International e-Journal, 8(15) doi: 10.21645/intermedia.2021.109, 245-266.
  • Laperdrix, P., Bielove, B., Baundry, B., & Avoine, G. (2020). Browser fingerprinting: A survey. ACM Transactions on the Web, 14(2).
  • Lee, L. H., Braud, T., Zhou, P., Wang, L., Xu, D., Lin, Z., . . . Hui, P. (2021, 11 3). All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. https://arxiv.org/: https://arxiv.org/abs/2110.05352 adresinden alındı
  • Ling, C., Balcı, U., Blackburn, J., & Stringhini, G. (2021). A first look at zoombombing. The 43rd IEEE Symposium on Security and Privacy (s. 1452-1467). IEEE.
  • Ning, H., Wang, H., Lin, Y., Wang, W., Dhelim, S., Farha, F., . . . Daneshmand, M. (2021). “A survey on metaverse: the state-of-the-art, technologies, applications, and challenges,”. arXiv preprint arXiv:2111.09673, 2021.
  • Nizzoli, L., Tardelli, S., Avvenuti, M., Cresci, S., & Tesconi, M. (2021). Coordinated behavior on social media in 2019 UK General Election. The 15th International AAAI Conference on Web and Social Media (ICWSM’21) (s. 443-454). AAAI.
  • Ruoyu Zhao, Y. Z. (2022, 3 8). Metaverse: Security and Privacy Concerns. https://arxiv.org/: https://arxiv.org/abs/2203.03854 adresinden alındı
  • Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.
  • Samir, E., We, H., Azab, M., Xin, C. S., & Zhang, Q. (2021). "DT-SSIM: A decentralized trustworthy self-sovereigh identity management framework". IEEE Internet of Things Journal, doi:10.1109/JIOT.2021.3112537.
  • Sanchez, J. (2007). “Second life: An interactive qualitative analysis,”. Society for Information Technology & Teacher Education International Conference, , 1240-1243.
  • Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017). Fifteen minutes of unwanted fame: Detecting and characterizing doxing. Internet Measurement Conference (IMC’17), (s. 432-444).
  • Stentoft, A. B. (2019). “Lifelogging in the wild: Participant experiences of using lifelogging as a research tool,”. IFIP Conference on Human-Computer Interaction, 431-451.
  • Stephenson, N. (2003). Snow crash: A novel. Spectra.
  • Türk, G. D. (2022). Metaverse ve Benlik Sunumu. The Turkish Online Journal of Design Art and Communication, 12 (2), 316-333. Weber, D., & Neumann, F. (2021). Amplifying influence through coordinated behaviour in social networks. Social Network Analysis and Mining, 11(1), 1-42.
  • Yuntao Wang, Z. S. (2022, 3 5). A Survey on Metaverse: Fundamentals, Security, and Privacy. https://arxiv.org/abs/2203.02662: https://arxiv.org/abs/2203.02662 adresinden alındı
  • Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sivivianos, M., Stringhini, G., & Suarez-Tangil, G. (2018). “On the origins of memes by means of fringe Web communities. The 2018 Internet Measurement Conference (IMC’18), (s. 188-202).
  • Zhu, J., Ni, P., & Wang, G. (2020). "Activity minimization of misinformation influance in online social networks". IEEE Transactions on Computational social Systems, vol. 7 no.4, 897-906.
There are 33 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Articles
Authors

Tugay Mandal 0000-0002-9589-2712

Ahmet Bedirhan Sağır 0000-0001-6907-4807

Mehmet Nuri Alparslan Öztürk 0000-0002-5070-9822

Muhammed Yusuf Uysal 0000-0003-1296-8417

Murat Külekci 0000-0002-0511-9161

Banu Yeşim Büyükakıncı 0000-0001-7597-4406

Publication Date August 31, 2022
Submission Date June 13, 2022
Acceptance Date July 17, 2022
Published in Issue Year 2022

Cite

APA Mandal, T., Sağır, A. B., Öztürk, M. N. A., Uysal, M. Y., et al. (2022). Metaverse: Sanal Dünyadan Gerçek Gizlilik ve Güvenlik Problemlerine. İstanbul Sabahattin Zaim Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 4(2), 100-106. https://doi.org/10.47769/izufbed.1130284

20503

Bu eser Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.