Skip to main content

Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

  • Chapter
ISSE 2008 Securing Electronic Business Processes
  • 470 Accesses

Abstract

The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Richard Bartle: Avatar, Character, Persona. Immerse yourself..., http://www.mud.co.uk/richard/acp.htm, published in 2001, last access: 11-07-2008

    Google Scholar 

  2. Beyer, Anja: Security in online games — Case study: Second Life. In Proc. Florida AI Research Symposium (FLAIRS-07), Key West, FL, USA, May 2007, Florida AI Research Society, 2007

    Google Scholar 

  3. BusinessWeek Cover Story, My virtual life, http://www.businessweek.com/magazine/content/06_18/b3982001.htm, 01-05-2006, last access 11-07-2008.

    Google Scholar 

  4. Common Criteria for the Information Technology Security Evaluation, Version CC v3.1 (September 2007), Three Parts downloadable at www.commoncriteriaportal.org, last access 11-07-2008.

    Google Scholar 

  5. Mihály Csíkszentmihályi: Beyond boredom and anxiety: experiencing flow in work and play. Jossey-Bass Inc., 2000.

    Google Scholar 

  6. Dibbell, Julian: Play Money: Or, How I Quit My Day Job and Made Millions Trading Virtual Loot, B&T, 2006

    Google Scholar 

  7. MDY Industries, LLC v. Blizzard Entertainment, Inc. et al, Filing 39, http://docs.justia.com/cases/federal/district-courts/arizona/azdce/2:2006cv02555/322017/39/, last access 11-07-2008

    Google Scholar 

  8. Koll, Virtuelle Welten warten noch auf Sicherheitsstandards, Computerzeitung, 2007, 38, 8

    Google Scholar 

  9. Raph Koster: A theory of fun for game design. Paraglyph Press, Inc., Scottsdale, AZ, USA, 2005.

    Google Scholar 

  10. Abraham H. Maslow. Motivation und Persönlichkeit. Walter-Olten Verlag Freiburg im Breisgau, 1977. The original title “Motivation and Personality” was published at Harper and Row, New York, in 1954

    Google Scholar 

  11. Raiu, Costin G: From viruses to malware; from malware to cybercrime, Information Security Solutions Europe, 25–27 September 2007 Warsaw, presentation slides.

    Google Scholar 

  12. “Police arrest teenage online furniture thief”, news message at Reuters Website, http://www.reuters.com/article/oddlyEnoughNews/idUSN149845120071114, November 14th 2007

    Google Scholar 

  13. Andrew Rollings and Ernest Adams: Game Design, New Riders, 2003

    Google Scholar 

  14. Website of the Virtual World Second Life by LindenLab, www.secondlife.com, last access 11-07-08

    Google Scholar 

  15. Tim O’Reilly: What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software, article published at http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-isweb-20.html on 30-09-2005, last access 11-07-2008

    Google Scholar 

  16. Website of the MMORPG World of Warcraft, http://www.wow-europe.com/de/index.xml, last access 11-07-2008

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Beyer, A. (2009). Theft of Virtual Property — Towards Security Requirements for Virtual Worlds. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_12

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics