{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T22:05:09Z","timestamp":1771797909495,"version":"3.50.1"},"reference-count":32,"publisher":"EDP Sciences","license":[{"start":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T00:00:00Z","timestamp":1688083200000},"content-version":"vor","delay-in-days":180,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Social Science Foundation Project titled \u201cResearch on the Legal Risks and Prevention of China\u2019s Social Media Platforms Operating in the United States\u201d","award":["21BXW040"],"award-info":[{"award-number":["21BXW040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Safety"],"accepted":{"date-parts":[[2023,4,30]]},"published-print":{"date-parts":[[2023]]},"abstract":"<jats:p>The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine, and other technologies that interact with human behavior and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioral regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.<\/jats:p>","DOI":"10.1051\/sands\/2023011","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T12:03:44Z","timestamp":1683893024000},"page":"2023011","source":"Crossref","is-referenced-by-count":24,"title":["Digital identity, privacy security, and their legal safeguards in the Metaverse"],"prefix":"10.1051","volume":"2","author":[{"given":"Hong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wenxiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"250","published-online":{"date-parts":[[2023,6,30]]},"reference":[{"key":"R1","unstructured":"Sun Y. On the Adjustment of the Metaverse and the Intelligent Socio-Legal Order, 2022, Legal Research."},{"key":"R2","unstructured":"David L, \u2018Digital Identity in the Metaverse\u2019. Forbes, 2021, https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2021\/12\/28\/digital-identity-in-%0D%0Athe-metaverse\/?sh=737835831fb6%0D%0A."},{"key":"R3","unstructured":"Zhaowang L. \u2018The Order and Rules of the Metaverse\u2019. ACADEMICS, 2022."},{"key":"R4","unstructured":"Stephenson N. Avalanche. Sichuan Science and Technology Press, 2018."},{"key":"R5","unstructured":"Zhu JM. Metaverse and Post-Human Society. Economic Observer, 2021."},{"key":"R6","unstructured":"Xiao C. Spatial Reconstruction Analysis of the \u201cMetaverse\u201d. Geography and Geographic Information Science, 2022."},{"key":"R7","unstructured":"Qin X. The First Campus Metaverse Model \u201cCUHKSZ Metaverse\u201d Was Born in Hong Kong Central University (Shenzhen), In-Depth Interview With Designer Prof. Cai Wei. Daily Daily Planet, 2021."},{"key":"R8","unstructured":"Yu G. The Future of Media: Iteration, Restructuring and Sublimation of \u201cHuman Connection\u201d \u2013 From \u201cScene Era\u201d to \u201cMetaverse\u201d to \u201cHeart World\u201d, 2021."},{"key":"R9","unstructured":"Yu J, Metaverse: Political Order Reconstruction and Challenges in a Changing World. Exploration and Controversy. Exploration and Controversy, 2021."},{"key":"R10","unstructured":"CoinYuppie. Metaverse and Self Sovereign Identity (SSI): The New Superpower? In: Lessig L, editor, Code 2.0: Law in Cyberspace. Tsinghua University Press, 2018."},{"key":"R11","unstructured":"Wang W and Dong S. Identifying digital identities in a Metaverse environment. China Soc. Sci. J. 2022. http:\/\/ex.cssn.cn\/zx\/bwyc\/202207\/t20220721_5418801.shtml."},{"key":"R12","unstructured":"Chen J. Beyond the Metaverse: Digital Identity, NFT and Plural Regulation NFT and Pluralistic Regulation. Legal Research, 2022."},{"key":"R13","unstructured":"Miller V. The Essence of Digital Culture. Tsinghua University Press, 2017."},{"key":"R14","unstructured":"Wang W and Dong S. Identifying Digital Identities in a Metaverse environment. Chin Soc Sci J. 2022. http:\/\/ex.cssn.cn\/zx\/bwyc\/202207\/t20220721_5418801.shtml."},{"key":"R15","unstructured":"Luhmann N. Trust: A Simplifying Mechanism of Social Complexity. Shanghai People\u2019s Publishing House, 2005."},{"key":"R16","unstructured":"Lee V. Freedom and Order: Value Choices of Metaverse Access and Meta-Rules of Identity Authentication. Legal Research, 2022."},{"key":"R17","unstructured":"Chenxin R. The Legal Limits of Internet Trusted Authentication from the Perspective of Legal Benefit Measurement. Eastern Law, 2020."},{"key":"R18","unstructured":"Jinhua C. The Rule of Law Principle of Metaverse Governance. Eastern Jurisprudence, 2022."},{"key":"R19","unstructured":"Lu Q. Identity construction and its legal protection in the digital age: reflections on the protection of personal information. Chin J Law 2021; 43."},{"key":"R20","unstructured":"Chen H. User data privacy in the Metaverse. J Xinjiang Normal Univ 2022, Philosophy and Social Science."},{"key":"R21","doi-asserted-by":"crossref","unstructured":"Kramer ADI, Guillory JE and Hancock JT. Experimental Evidence of Massive-Scale Emotional Contagion through Social Networks. Princeton University, 2014.","DOI":"10.1073\/pnas.1320040111"},{"key":"R22","unstructured":"Stouffer C. Online Scams: An Overview + 20 Internet Scams to Avoid in 2023, 2022. https:\/\/us.norton.com\/blog\/emerging-threats\/internet-scams#."},{"key":"R23","unstructured":"Facefirst. Stop In-Store Violence and Theft with Facefirst Facial Matching Software, 2022. https:\/\/www.facefirst.com."},{"key":"R24","unstructured":"Guo X. Personal information security challenges and responses in the era of artificial intelligence. J Zhejiang Univ. Humanities and Social Sciences, 2021."},{"key":"R25","unstructured":"More Than 200 Classified Areas around the World Leaked, US, UK, Russia, France And Netherlands Pitted by A Watch. Watchdog.com, 2018. https:\/\/www.guancha.cn\/internation\/2018_07_11_463658_2.shtml."},{"key":"R26","unstructured":"Yu L and Zhou X. Technology Embedding: The Construction of Individual Privacy Security System in Cyberspace: An Analytical Framework Based on Concept, Technology and System. J Henan Norm Univ (Philos Soc Sci) 2022; 49."},{"key":"R27","unstructured":"Sharma V. Introducing a Personal Boundary for Horizon Worlds and Venues. Meta, 2022. https:\/\/about.fb.com\/news\/2022\/02\/personal-boundary-horizon\/."},{"key":"R28","unstructured":"Jing L. On the Legal Nature of Artificial Intelligence Virtual Idols. Zhejiang Social Science. 2020."},{"key":"R29","unstructured":"Zheng G. Blockchain and the Future Rule of Law. Eastern Jurisprudence, 2018."},{"key":"R30","unstructured":"Wang W and Dong S. Identifying digital identities in a metaverse environment. Chin Soc Sci J. 2022. http:\/\/ex.cssn.cn\/zx\/bwyc\/202207\/t20220721_5418801.shtml."},{"key":"R31","unstructured":"Li X. Legal Governance of the Metaverse in the Perspective of Structural Changes in Network Society. Legal Research. 2022."},{"key":"R32","unstructured":"Montesquieu B. On the Spirit of the Law (First and Second Volumes). The Commercial Press, 2009."}],"container-title":["Security and Safety"],"original-title":[],"link":[{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2023011\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T11:59:07Z","timestamp":1688644747000},"score":1,"resource":{"primary":{"URL":"https:\/\/sands.edpsciences.org\/10.1051\/sands\/2023011"}},"subtitle":[],"editor":[{"given":"Shiya","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chunhui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yangyu","family":"Fan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":32,"alternative-id":["sands20220011"],"URL":"https:\/\/doi.org\/10.1051\/sands\/2023011","relation":{},"ISSN":["2826-1275"],"issn-type":[{"value":"2826-1275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}