Abstract
The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Richard Bartle: Avatar, Character, Persona. Immerse yourself..., http://www.mud.co.uk/richard/acp.htm, published in 2001, last access: 11-07-2008
Beyer, Anja: Security in online games — Case study: Second Life. In Proc. Florida AI Research Symposium (FLAIRS-07), Key West, FL, USA, May 2007, Florida AI Research Society, 2007
BusinessWeek Cover Story, My virtual life, http://www.businessweek.com/magazine/content/06_18/b3982001.htm, 01-05-2006, last access 11-07-2008.
Common Criteria for the Information Technology Security Evaluation, Version CC v3.1 (September 2007), Three Parts downloadable at www.commoncriteriaportal.org, last access 11-07-2008.
Mihály Csíkszentmihályi: Beyond boredom and anxiety: experiencing flow in work and play. Jossey-Bass Inc., 2000.
Dibbell, Julian: Play Money: Or, How I Quit My Day Job and Made Millions Trading Virtual Loot, B&T, 2006
MDY Industries, LLC v. Blizzard Entertainment, Inc. et al, Filing 39, http://docs.justia.com/cases/federal/district-courts/arizona/azdce/2:2006cv02555/322017/39/, last access 11-07-2008
Koll, Virtuelle Welten warten noch auf Sicherheitsstandards, Computerzeitung, 2007, 38, 8
Raph Koster: A theory of fun for game design. Paraglyph Press, Inc., Scottsdale, AZ, USA, 2005.
Abraham H. Maslow. Motivation und Persönlichkeit. Walter-Olten Verlag Freiburg im Breisgau, 1977. The original title “Motivation and Personality” was published at Harper and Row, New York, in 1954
Raiu, Costin G: From viruses to malware; from malware to cybercrime, Information Security Solutions Europe, 25–27 September 2007 Warsaw, presentation slides.
“Police arrest teenage online furniture thief”, news message at Reuters Website, http://www.reuters.com/article/oddlyEnoughNews/idUSN149845120071114, November 14th 2007
Andrew Rollings and Ernest Adams: Game Design, New Riders, 2003
Website of the Virtual World Second Life by LindenLab, www.secondlife.com, last access 11-07-08
Tim O’Reilly: What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software, article published at http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-isweb-20.html on 30-09-2005, last access 11-07-2008
Website of the MMORPG World of Warcraft, http://www.wow-europe.com/de/index.xml, last access 11-07-2008
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Beyer, A. (2009). Theft of Virtual Property — Towards Security Requirements for Virtual Worlds. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_12
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)