Advertisement

Journal of Computing in Higher Education

, Volume 25, Issue 2, pp 49–67 | Cite as

Risks and uncertainties in virtual worlds: an educators’ perspective

  • Fariborz Farahmand
  • Aman Yadav
  • Eugene H. Spafford
Article

Abstract

Virtual worlds present tremendous advantages to cyberlearning. For example, in virtual worlds users can socialize with others, build objects and share them, customize parts of the world and hold lectures, do experiments, or share data. However, virtual worlds pose a wide range of security, privacy, and safety concerns. This may lead educators to become (or not) apprehensive of the virtual worlds in using and adapting them as learning technologies. This study examined how educators perceive risks and uncertainties in virtual worlds. We also investigated how educators’ level of use of virtual worlds influences their risk perception level. Our results indicate a divergence between risk perception and reality in the virtual worlds. We use the seminal risk perception model developed by Fischhoff and his colleagues, and our revision to this model to explain these results. Finally, we discuss implications of our research for education management, and make recommendations to educators and policy makers who consider using virtual worlds as a learning technology.

Keywords

Computer uses in education Risk management Security and privacy protection Virtual reality 

Notes

Acknowledgments

Portions of this work were supported by the National Science Foundation under Grant No. 1230507, and CERIAS at Purdue University. The authors wish to thank Dr. Johannes Strobel for his contribution to survey development and distribution, and Dr. Melissa Dark for her comments.

References

  1. Antonacci, D., DiBartolo, E. N., Fritsch, K., McMullen, B., & Murch-Shafer, R. (2008). The power of virtual worlds in education: A second life primer and resource for exploring the potential of virtual worlds to impact teaching and learning. Angel Learning.Google Scholar
  2. Anwar, M., & Greer, J. (2011). Facilitating Trust in Privacy-preserving E-learning Environments. IEEE Transactions on Learning Technologies, published online = .Google Scholar
  3. Arakji, R. Y., & Lang, K. R. (2007). The virtual cathedral and the virtual bazaar. The Database for Advances in Information Systems, 38(4), 33–39.CrossRefGoogle Scholar
  4. Balkin, J., & Noveck, B. (2006). State of play: Law, games, and virtual worlds. New York, NY: NYU Press.Google Scholar
  5. Bray, D. A., & Konsynsky, B. R. (2007). Virtual worlds: Multi-disciplinary research opportunities. The Data Base for Advances in Information Systems, 38(4), 17–25.CrossRefGoogle Scholar
  6. Camerer, C., Lowestien, G., & Prelec, D. (2005). Neuroeconomics: How neuroscience can inform economics. Journal of Economic Literature, Vol. XLIII 9–64.Google Scholar
  7. Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., et al. (2009). Australian covert bullying prevalence study (ACBPS). Perth: Child Health Promotion Research Centre, Edith Cowan University.Google Scholar
  8. D’Ovidio, R., & Doyle, J. (2003). A study on cyberstalking understanding investigative hurdles. Law Enforcement Bulletin, 72(3), 10–21.Google Scholar
  9. Dickey, M. D. (2005). Three-dimensional virtual worlds and distance learning: Two case studies of active worlds as a medium for distance education. British Journal of Educational Technology, 36(3), 439–451.CrossRefGoogle Scholar
  10. Elliott, J. (2008). Help—somebody robbed my second life avatar. Journal of Virtual Worlds Research, 1(1), 1–11.Google Scholar
  11. ENISA (2010). Virtual worlds, real money; Security and Privacy in massively-multiplayer online games and social and corporate virtual worlds. European network and information security agency.Google Scholar
  12. Farahmand, F., Atallah, M., & Konsysnski, B. (2008). Incentives and Perceptions of Information Security Risks. Twenty Ninth International Conference on Information Systems, ICIS 2008, Paris, p. 16.Google Scholar
  13. Farahmand, F., & Spafford, E. H. (2013) Understanding insiders: An analysis of risk- taking behavior. Information Systems Frontiers, Springer Publications, pp. 11, to appear.Google Scholar
  14. Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., & Combs, B. (1978). How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Science, 9(2), 127–152.CrossRefGoogle Scholar
  15. Fishhoff, B. (2006). The psychological perception of risk. The McGraw-Hill Homeland Security Hanbook, pp. 463–493.Google Scholar
  16. Gartner (2007a). Corporate use of virtual worlds needs careful evaluation. Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=511370.
  17. Gartner (2009). “Gartner Says 80 Percent of Active Internet Users Will Have A “Second Life” in the Virtual World by the End of 2011,” Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=503861.
  18. Gredler, M. E. (2003). Games and simulations and their relationships to learning. Handbook of research for educational communications and technology (2nd ed., pp. 571–581). Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
  19. Harris, A. L. & Rea, A. (2009). Web 2.0 and virtual world technologies: A growing impact on IS Education. Journal of Information Systems Education, 20(2), 137–144.Google Scholar
  20. Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29, 129–156.Google Scholar
  21. Holfeld, B., & Grabe, M. (2012). An examination of the history, prevalence, characteristics, and reporting of cyberbullying in the United States. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 117–142). Malden, MA: Wiley-Blackwell.CrossRefGoogle Scholar
  22. Karat, J., Karat, C. M., Bertino, E., Li, N., Ni, Q., Brodie, C., et al. (2009). A policy framework for security and privacy management. IBM Journal of Research and Development, 53(2), 242–255.CrossRefGoogle Scholar
  23. Kirschner, P., & Selinger, M. (2003). The state of affairs of teacher education with respect to information and communications technology. Technology, Pedagogy and Education, 12(1), 5–12.CrossRefGoogle Scholar
  24. Kluge, S., & Riley, L. (2008). Teaching in virtual worlds: Opportunities and challenges. Issues in Informing Science and Information Technology, 5, 127–135.Google Scholar
  25. Knight, F. H. (1921). Risk, uncertainty and profit. Gloucester, UK: Dodo press.Google Scholar
  26. Lee, C. Y. (2009). Understanding security threats in virtual worlds. In Proceedings of the fifteenth Americas conference on information systems. San Francisco, CA: Association for Information Systems.Google Scholar
  27. Lenhart, A., Madden, M., Macgill, A. R., & Smith, A. (2007). Teens and social media. Pew Internet & American Life Project.Google Scholar
  28. NSF (2008). Fostering learning in the networked world: The cyberlearning opportunity and challenge. Report of the NSF Task Force on Cyberlearning, National Science Foundation, 2008.Google Scholar
  29. Schneier, B. (2008). The psychology of security. http://www.schneier.com/essay-155.html.
  30. Slator, B. M., Juell, P., McClean, P. E., Saini-Eidukatc, B., Schwertc, D. P., Whited, A. R., et al. (1999). Virtual environments for education. Journal of Network and Computer Applications, 22, 161–174.CrossRefGoogle Scholar
  31. Slovic, P., & Peters, E. (2006). Risk perception and affect. Current Directions in Psychological Sciences, 15(6), 322–325.CrossRefGoogle Scholar
  32. Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief, Brief No: RBX03-06.Google Scholar
  33. Stross, C. (2007). Halting state. New York: Ace Books.Google Scholar
  34. Vinge, V. (1981). True names. Retrieved from http://www.facstaff.bucknell.edu/rickard/TRUENAMES.pdf.
  35. Williams, M. (2004) Understanding king punisher and his order: Vandalism in a virtual reality community—motives, meanings and possible solutions. Internet Journal of Criminology.Google Scholar
  36. Yee, N. (2001). Everquest survey. Retrieved from http://www.nickyee.com/eqt/report.html.

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Fariborz Farahmand
    • 1
  • Aman Yadav
    • 2
  • Eugene H. Spafford
    • 1
  1. 1.Purdue UniversityWest LafayetteUSA
  2. 2.Purdue UniversityWest LafayetteUSA

Personalised recommendations