Reference Hub4
Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices

Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices

Greg Gogolin, Erin Gogolin, Hwee-Joo Kam
Copyright: © 2014 |Volume: 4 |Issue: 1 |Pages: 13
ISSN: 1947-3087|EISSN: 1947-3079|EISBN13: 9781466652576|DOI: 10.4018/ijalr.2014010103
Cite Article Cite Article

MLA

Gogolin, Greg, et al. "Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices." IJALR vol.4, no.1 2014: pp.30-42. http://doi.org/10.4018/ijalr.2014010103

APA

Gogolin, G., Gogolin, E., & Kam, H. (2014). Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices. International Journal of Artificial Life Research (IJALR), 4(1), 30-42. http://doi.org/10.4018/ijalr.2014010103

Chicago

Gogolin, Greg, Erin Gogolin, and Hwee-Joo Kam. "Virtual Worlds and Social Media: Security and Privacy Concerns, Implications, and Practices," International Journal of Artificial Life Research (IJALR) 4, no.1: 30-42. http://doi.org/10.4018/ijalr.2014010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The use of virtual worlds and social media has grown to the point that more than one-quarter of the world's population utilize it in some manner. Security and privacy concerns regarding the use and capabilities of current and emerging technologies such as gaming, blogging, podcasting, virtual meetings, virtual worlds and Web 3.0 is examined. Security and privacy concerns are investigated in the context of exploits, vulnerabilities, and related security risks; confidential access control; communication trends and patterns in the use of massive communication strategies; intellectual property and product risk management; resource management; financial considerations and accountability; and safety. Several technologies and personal practices are reviewed, as well as ways to mitigate or eliminate their associated risks. The core principles of information security - confidentiality, integrity, and availability - provide an overall framework.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.