Published: Dec 16, 2022
Converted to Gold OA:
DOI: 10.4018/IJSPPC.315591
Volume 15
Glorin Sebastian
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this...
Show More
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sebastian, Glorin. "A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework." IJSPPC vol.15, no.1 2023: pp.1-14. http://doi.org/10.4018/IJSPPC.315591
APA
Sebastian, G. (2023). A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1-14. http://doi.org/10.4018/IJSPPC.315591
Chicago
Sebastian, Glorin. "A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework," International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 15, no.1: 1-14. http://doi.org/10.4018/IJSPPC.315591
Export Reference
Published: Mar 3, 2023
Converted to Gold OA:
DOI: 10.4018/IJSPPC.318675
Volume 15
Jackson Adams, Hala Almahmoud
The key research objective of the current study is to answer the following research question: Why is ‘privacy' a contested concept that is hard to define? In doing so, the study will raise awareness...
Show More
The key research objective of the current study is to answer the following research question: Why is ‘privacy' a contested concept that is hard to define? In doing so, the study will raise awareness of the contemporary meaning of ‘privacy' in relation to cyber activities and to draw attention to the need for developing the right to cyber privacy and its legal protection. Hence, the current study has embarked on analysing the meaning of privacy in general, and the meaning of cyber or online privacy in particular. As a result, privacy has been found to be a perennially contestable concept, and this is exacerbated by the ever more rapidly developing digital world and also by the diverse perceptions which vary across societies, cultures, and generations. This has created a big challenge for regulators and legislators to define a specific privacy right that can be accorded with a legal protection against violations across national and international jurisdictions. However, the right to privacy has been found to be vague and open to multiple, competing interpretations.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Adams, Jackson, and Hala Almahmoud. "The Meaning of Privacy in the Digital Era." IJSPPC vol.15, no.1 2023: pp.1-15. http://doi.org/10.4018/IJSPPC.318675
APA
Adams, J. & Almahmoud, H. (2023). The Meaning of Privacy in the Digital Era. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1-15. http://doi.org/10.4018/IJSPPC.318675
Chicago
Adams, Jackson, and Hala Almahmoud. "The Meaning of Privacy in the Digital Era," International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 15, no.1: 1-15. http://doi.org/10.4018/IJSPPC.318675
Export Reference
Published: Mar 23, 2023
Converted to Gold OA:
DOI: 10.4018/ijsppc.318676
Volume 15
Varun Kharbanda, Seetharaman A, Maddulety K
Artificial intelligence (AI) has emerged as the most widely applicable field across varied industries. Being an evolving technology, it may be quite useful in sensitive areas such as cyber security...
Show More
Artificial intelligence (AI) has emerged as the most widely applicable field across varied industries. Being an evolving technology, it may be quite useful in sensitive areas such as cyber security where there is a dire need for implementation of AI technologies, such as expert systems, neural networks, intelligent agents, and artificial immune systems. The primary reason for AI fitment to cyber security area is its ability to detect anomalies proactively and predictively in the network, thereby working towards securing the network before the damage related to loss of data and/or reputation is done. There are different types of AI technologies as mentioned above that could be applied in cyber security in its varied forms. In this paper, the emphasis is on specific AI technologies that can bring unique benefits to the cyber security field with its unique applicability to different scenarios. The outcome of this study shows that AI technologies such as expert systems, neural networks, intelligent agents, and artificial immune systems are transforming the landscape for managing cyber threats.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kharbanda, Varun, et al. "Journal: Application of Artificial Intelligence in Cyber security." IJSPPC vol.15, no.1 2023: pp.1-13. http://doi.org/10.4018/ijsppc.318676
APA
Kharbanda, V., Seetharaman A, & Maddulety K. (2023). Journal: Application of Artificial Intelligence in Cyber security. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1-13. http://doi.org/10.4018/ijsppc.318676
Chicago
Kharbanda, Varun, Seetharaman A, and Maddulety K. "Journal: Application of Artificial Intelligence in Cyber security," International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 15, no.1: 1-13. http://doi.org/10.4018/ijsppc.318676
Export Reference
Published: Mar 22, 2023
Converted to Gold OA:
DOI: 10.4018/IJSPPC.320225
Volume 15
Glorin Sebastian
The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including natural language processing. One of the most significant advancements in this area is the...
Show More
The rise of artificial intelligence (AI) has opened up new frontiers in various fields, including natural language processing. One of the most significant advancements in this area is the development of conversational agents (i.e., chatbots), which are computer programs designed to interact with humans through messaging interfaces. The emergence of large language models, such as ChatGPT, has enabled the creation of highly sophisticated chatbots that can mimic human conversations with impressive accuracy. However, the use of these chatbots also poses significant cyber risks that must be addressed. This research paper seeks to investigate the cyber risks associated with the use of ChatGPT and other similar AI-based chatbots, including potential vulnerabilities that could be exploited by malicious actors. As part of this research, a survey was conducted to explore the cybersecurity risks associated with AI-based chatbots like ChatGPT. Further, the paper also suggests mitigation methods that can be used to mitigate these cyber risks and vulnerabilities.
Content Forthcoming
Add to Your Personal Library: Article Published: Jun 8, 2023
Converted to Gold OA:
DOI: 10.4018/IJSPPC.324165
Volume 15
Sekoude Jehovah-nis Pedrie Sonon, Tahirou Djara, Matine Abdoul Ousmane, Abdou-Aziz Sobabe
Telephony over IP (ToIP) is a cost-saving communication technology based on voice over IP (VoIP) that enables enterprises to reduce communication fees. However, ToIP faces many security threats due...
Show More
Telephony over IP (ToIP) is a cost-saving communication technology based on voice over IP (VoIP) that enables enterprises to reduce communication fees. However, ToIP faces many security threats due to its IP-based nature. This work aims to improve ToIP security using cryptography and blockchain technology. The authors propose a secure approach to user registration, authentication, communication session establishment, and communication data storage. The proposed solution leverages blockchain technology to ensure the integrity, confidentiality, and availability of communication data. By implementing this solution, the researchers aim to enhance the security of ToIP networks and protect them from cyber threats. This approach provides a secure and reliable way to support ToIP services while preserving confidentiality and privacy.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sonon, Sekoude Jehovah-nis Pedrie, et al. "Real Impact of the Blockchain in Securing a ToIP Network." IJSPPC vol.15, no.1 2023: pp.1-22. http://doi.org/10.4018/IJSPPC.324165
APA
Sonon, S. J., Djara, T., Ousmane, M. A., & Sobabe, A. (2023). Real Impact of the Blockchain in Securing a ToIP Network. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 15(1), 1-22. http://doi.org/10.4018/IJSPPC.324165
Chicago
Sonon, Sekoude Jehovah-nis Pedrie, et al. "Real Impact of the Blockchain in Securing a ToIP Network," International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 15, no.1: 1-22. http://doi.org/10.4018/IJSPPC.324165
Export Reference
Published: Jul 11, 2023
Converted to Gold OA:
DOI: 10.4018/IJSPPC.325475
Volume 15
Glorin Sebastian
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as...
Show More
The evolution of artificial intelligence (AI) and machine learning (ML) has led to the development of sophisticated large language models (LLMs) that are used extensively in applications such as chatbots. This research investigates the critical issues of data protection and privacy enhancement in the context of LLM-based chatbots, with a focus on OpenAI's ChatGPT. It explores the dual challenges of safeguarding sensitive user information while ensuring the efficiency of machine learning models. It assesses existing privacy-enhancing technologies (PETs) and proposes innovative methods, such as differential privacy, federated learning, and data minimization techniques. The study also includes a survey of Chatbot users to measure their concerns related to data privacy with the use of these LLM-based applications. This study is meant to serve as a comprehensive guide for developers, policymakers, and researchers, contributing to the discourse on data protection in artificial intelligence.
Content Forthcoming
Add to Your Personal Library: Article
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSPPC should be directed to the attention of:
Submission-Related InquiriesTao Gao
Editor-in-Chief
International Journal of Security and Privacy in Pervasive Computing (IJSPPC)
Email:
ijapuc@gmail.comAuthor Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100