{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:37:29Z","timestamp":1775230649590,"version":"3.50.1"},"reference-count":84,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T00:00:00Z","timestamp":1735516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Virtual Worlds"],"abstract":"<jats:p>Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), enables immersive experiences across various fields, including entertainment, healthcare, and education. However, its data-intensive and interactive nature introduces significant cybersecurity and privacy challenges. This paper presents a detailed adversary model to identify threat actors and attack vectors in XR environments. We analyze key risks, including identity theft and behavioral data leakage, which can lead to profiling, manipulation, or invasive targeted advertising. To mitigate these risks, we explore technical solutions such as Advanced Encryption Standard (AES), Rivest\u2013Shamir\u2013Adleman (RSA), and Elliptic Curve Cryptography (ECC) for secure data transmission, multi-factor and biometric authentication, data anonymization techniques, and AI-driven anomaly detection for real-time threat monitoring. A comparative benchmark evaluates these solutions\u2019 practicality, strengths, and limitations in XR applications. The findings emphasize the need for a holistic approach, combining robust technical measures with privacy-centric policies, to secure XR ecosystems and ensure user trust.<\/jats:p>","DOI":"10.3390\/virtualworlds4010001","type":"journal-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T04:10:23Z","timestamp":1735618223000},"page":"1","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Cybersecurity and Privacy Challenges in Extended Reality: Threats, Solutions, and Risk Mitigation Strategies"],"prefix":"10.3390","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4022-9999","authenticated-orcid":false,"given":"Mohammed","family":"El-Hajj","sequence":"first","affiliation":[{"name":"Faculty of Computer Studies (FCS), Arab Open University (AOU), Beirut 1100, Lebanon"},{"name":"Department of Semantics, Cybersecurity & Services, University of Twente, 7522 Enschede, The Netherlands"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Doolani, S., Wessels, C., Kanal, V., Sevastopoulos, C., Jaiswal, A., Nambiappan, H., and Makedon, F. (2020). A Review of Extended Reality (XR) Technologies for Manufacturing Training. Technologies, 8.","DOI":"10.3390\/technologies8040077"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"81","DOI":"10.11113\/humentech.v1n2.27","article-title":"A review of extended reality (XR) technologies in the future of human education: Current trend and future opportunity","volume":"1","author":"Alnagrat","year":"2022","journal-title":"J. Hum. Centered Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"179","DOI":"10.2478\/raft-2024-0019","article-title":"Virtual Reality (VR), Augmented Reality (AR) and Mixed Reality (MR), A Necessity of The Modern Diving Technology","volume":"29","author":"Agape","year":"2024","journal-title":"Land Forces Acad. Rev."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3652595","article-title":"Extended Reality (XR) Toward Building Immersive Solutions: The Key to Unlocking Industry 4.0","volume":"56","author":"Alhakamy","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1162\/pres.1997.6.6.603","article-title":"A framework for immersive virtual environments (FIVE): Speculations on the role of presence in virtual environments","volume":"6","author":"Slater","year":"1997","journal-title":"Presence Teleoperators Virtual Environ."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Craig, A.B. (2013). Understanding Augmented Reality: Concepts and Applications, Morgan Kaufmann.","DOI":"10.1016\/B978-0-240-82408-6.00002-3"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1016\/j.bushor.2018.05.009","article-title":"Go boldly!: Explore augmented reality (AR), virtual reality (VR), and mixed reality (MR) for business","volume":"61","author":"Farshid","year":"2018","journal-title":"Bus. Horiz."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Mourtzis, D., and Angelopoulos, J. (2023). Development of an Extended Reality-Based Collaborative Platform for Engineering Education: Operator 5.0. Electronics, 12.","DOI":"10.3390\/electronics12173663"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Tromp, J.G., Zachmann, G., Perret, J., and Palacco, B. (2022). Future Directions for XR 2021\u20132030: International Delphi Consensus Study. Roadmapping Ext. Real. Fundam. Appl., 1\u201334.","DOI":"10.1002\/9781119865810.ch1"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lastrucci, A., Wandael, Y., Barra, A., Ricci, R., Maccioni, G., Pirrera, A., and Giansanti, D. (2024). Exploring Augmented Reality Integration in Diagnostic Imaging: Myth or Reality?. Diagnostics, 14.","DOI":"10.3390\/diagnostics14131333"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Meccawy, M. (2022). Creating an immersive XR learning experience: A roadmap for educators. Electronics, 11.","DOI":"10.3390\/electronics11213547"},{"key":"ref_12","unstructured":"Johannesson, P., and Karlsson, J. (2024, December 25). The Early Stages of Extended Reality: An Analysis of the Opportunities and Challenges Faced by Early-Stage Businesses Within the Extended Reality (XR) Industry. Dissertation, Available online: https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:mau:diva-62637."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2397","DOI":"10.3390\/smartcities6050109","article-title":"Harnessing the potential of the metaverse and artificial intelligence for the internet of city things: Cost-effective XReality and synergistic AIoT technologies","volume":"6","author":"Bibri","year":"2023","journal-title":"Smart Cities"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Alkaeed, M., Qayyum, A., and Qadir, J. (2024). Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey. J. Netw. Comput. Appl., 103989.","DOI":"10.1016\/j.jnca.2024.103989"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bhattacharya, P., Saraswat, D., Savaliya, D., Sanghavi, S., Verma, A., Sakariya, V., Tanwar, S., Sharma, R., Raboaca, M.S., and Manea, D.L. (2023). Towards future internet: The metaverse perspective for diverse industrial applications. Mathematics, 11.","DOI":"10.3390\/math11040941"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"van der Wal, E.W., and El-Hajj, M. (2022, January 21\u201323). Securing networks of iot devices with digital twins and automated adversary emulation. Proceedings of the 2022 26th International Computer Science and Engineering Conference (ICSEC), Sakon Nakhon, Thailand.","DOI":"10.1109\/ICSEC56337.2022.10049355"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., It\u00e4pelto, T., and Gebremariam, T. (2024). Systematic literature review: Digital twins\u2019 role in enhancing security for Industry 4.0 applications. Secur. Priv., e396.","DOI":"10.22541\/au.171142917.74831577\/v1"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Kour, K.P., Singh, S.K.D., Gupta, D., and Gupta, K. (2024). Amalgamation of 5G and Edge Computing for Latency Reduction in Metaverse Using WSN and IoT. Emerg. Technol. Appl. WSN IoT, 83\u2013111.","DOI":"10.1201\/9781003438205-5"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bell, C., Egon, A., and Broklyn, P. (2024, December 25). The Cybersecurity Implication of Extended Reality Technologies: Safeguarding Users in Immersive Environments. Available online: https:\/\/ssrn.com\/abstract=4904947.","DOI":"10.2139\/ssrn.4904947"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"100678","DOI":"10.1016\/j.cosrev.2024.100678","article-title":"Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain","volume":"54","author":"Rafique","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"103127","DOI":"10.1016\/j.cose.2023.103127","article-title":"A systematic threat analysis and defense strategies for the metaverse and extended reality systems","volume":"128","author":"Qamar","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3614426","article-title":"Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses","volume":"56","author":"Qayyum","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e59409","DOI":"10.2196\/59409","article-title":"Cybersecurity and Privacy Issues in Extended Reality Health Care Applications: Scoping Review","volume":"1","author":"Lake","year":"2024","journal-title":"JMIR XR Spat. Comput. (JMXR)"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"S98","DOI":"10.1097\/SIH.0000000000000767","article-title":"Does Extended Reality Simulation Improve Surgical\/Procedural Learning and Patient Outcomes When Compared with Standard Training Methods? A Systematic Review","volume":"19","author":"Woodall","year":"2024","journal-title":"Simul. Healthc."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Morimoto, T., Kobayashi, T., Hirata, H., Otani, K., Sugimoto, M., Tsukamoto, M., Yoshihara, T., Ueno, M., and Mawatari, M. (2022). XR (extended reality: Virtual reality, augmented reality, mixed reality) technology in spine medicine: Status quo and quo vadis. J. Clin. Med., 11.","DOI":"10.3390\/jcm11020470"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"642","DOI":"10.51594\/ijarss.v6i4.1043","article-title":"Augmented and virtual reality in us education: A review: Analyzing the impact, effectiveness, and future prospects of ar\/vr tools in enhancing learning experiences","volume":"6","author":"Familoni","year":"2024","journal-title":"Int. J. Appl. Res. Soc. Sci."},{"key":"ref_27","unstructured":"Dalton, J. (2021). Reality Check: How Immersive Technologies Can Transform Your Business, Kogan Page Publishers."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Basu, B. (2023). Perspectives on the intersection between sports and technology. Sports Management in an Uncertain Environment, Springer.","DOI":"10.1007\/978-981-19-7010-8_7"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhang, S., and Li, W. (2024, January 19\u201321). Applying EXtended Reality (XR) Technology in Commerce, Management, and Business Applications: A Survey. Proceedings of the 2024 4th International Conference on Computer, Control and Robotics (ICCCR), Shanghai, China.","DOI":"10.1109\/ICCCR61138.2024.10585599"},{"key":"ref_30","first-page":"1","article-title":"Extended Privacy for Extended Reality: XR Technology Has 99 Problems and Privacy Is Several of Them","volume":"4","author":"Pahi","year":"2023","journal-title":"Notre Dame J. Emerg. Tech."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Jones, D., Ghasemi, S., Gra\u010danin, D., and Azab, M. (2023, January 23\u201328). Privacy, safety, and security in extended reality: User experience challenges for neurodiverse users. Proceedings of the International Conference on Human-Computer Interaction, Copenhagen, Denmark.","DOI":"10.1007\/978-3-031-35822-7_33"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Warin, C., and Reinhardt, D. (2022, January 29\u201330). Vision: Usable Privacy for XR in the Era of the Metaverse. Proceedings of the 2022 European Symposium on Usable Security, Karlsruhe, Germany.","DOI":"10.1145\/3549015.3554212"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Acheampong, R., Balan, T.C., Popovici, D.M., and Rekeraho, A. (2023, January 6\u20139). Embracing XR System Without Compromising on Security and Privacy. Proceedings of the International Conference on Extended Reality, Lecce, Italy.","DOI":"10.1007\/978-3-031-43401-3_7"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MPRV.2024.3432953","article-title":"Privacy in the Metaverse","volume":"23","author":"Paneva","year":"2024","journal-title":"IEEE Pervasive Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1109\/OJCOMS.2024.3356508","article-title":"Resource-Constrained eXtended Reality Operated With Digital Twin in Industrial Internet of Things","volume":"5","author":"Kamdjou","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lee, E.-S., and Shin, B.-S. (2023). Enhancing the Performance of XR Environments Using Fog and Cloud Computing. Appl. Sci., 13.","DOI":"10.3390\/app132212477"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"124716","DOI":"10.1016\/j.eswa.2024.124716","article-title":"Efficient Resource Allocation for IoT Applications in Mobile Edge Computing via Dynamic Request Scheduling Optimization","volume":"255","author":"Liu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Jhanjhi, N.Z. (2024). Utilizing Generative AI for Cyber Defense Strategies, IGI Global.","DOI":"10.4018\/979-8-3693-8944-7"},{"key":"ref_39","first-page":"101939","article-title":"Collaborative Threat Intelligence: Enhancing IoT Security Through Blockchain and Machine Learning Integration","volume":"36","author":"Nazir","year":"2024","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gadekallu, T.R., Huynh-The, T., Wang, W., Yenduri, G., Ranaweera, P., Pham, Q.V., da Costa, D.B., and Liyanage, M. (2022). Blockchain for the metaverse: A review. arXiv.","DOI":"10.1016\/j.future.2023.02.008"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Awadallah, A., Eledlebi, K., Zemerly, J., Puthal, D., Damiani, E., Taha, K., Kim, T.-Y., Yoo, P.D., Choo, K.-K.R., and Yim, M.-S. (IEEE Commun. Surv. Tutor., 2024). Artificial Intelligence-Based Cybersecurity for the Metaverse: Research Challenges and Opportunities, IEEE Commun. Surv. Tutor., in press.","DOI":"10.1109\/COMST.2024.3442475"},{"key":"ref_42","unstructured":"Rawat, D.B., and Hagos, D.H. (2024). Metaverse Survey & Tutorial: Exploring Key Requirements, Technologies, Standards, Applications, Challenges, and Perspectives. arXiv."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Senevirathna, T., La, V.H., Marchal, S., Siniarski, B., Liyanage, M., and Wang, S. (IEEE Commun. Surv. Tutor., 2024). A Survey on XAI for 5G and Beyond Security: Technical Aspects, Challenges and Research Directions, IEEE Commun. Surv. Tutor., in press.","DOI":"10.1109\/COMST.2024.3437248"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Andrade, T.M., Roscoe, J.F., and Smith-Creasey, M. (2023, January 20\u201323). Security of Input for Authentication in Extended Reality Environments. Proceedings of the International Congress on Information and Communication Technology, London, UK.","DOI":"10.1007\/978-981-99-3243-6_69"},{"key":"ref_45","unstructured":"Fneish, Z.A.A.M., El-Hajj, M., and Samrouth, K. (2023, January 11\u201312). Survey on iot multi-factor authentication protocols: A systematic literature review. Proceedings of the 2023 11th International Symposium on Digital Forensics and Security (ISDFS), Chattanooga, TN, USA."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Elshenraki, H.N. (2023). Forecasting Cyber Crimes in the Age of the Metaverse, IGI Global.","DOI":"10.4018\/979-8-3693-0220-0"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"63205","DOI":"10.1109\/ACCESS.2023.3288338","article-title":"Security threats to 5G networks for social robots in public spaces: A survey","volume":"11","author":"Oruma","year":"2023","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., and Beune, P. (2024). Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems. Information, 15.","DOI":"10.3390\/info15060304"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3654663","article-title":"Machine Learning in Metaverse Security: Current Solutions and Future Challenges","volume":"56","author":"Otoum","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_50","unstructured":"Noah, N., Shearer, S., and Das, S. (2022, January 26\u201328). Security and privacy evaluation of popular augmented and virtual reality technologies. Proceedings of the 2022 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence, and Neural Engineering (IEEE MetroXRAINE 2022), Rome, Italy."},{"key":"ref_51","unstructured":"Mealy, P. (2018). Virtual & Augmented Reality for Dummies, John Wiley & Sons."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Hatami, M., Qu, Q., Chen, Y., Kholidy, H., Blasch, E., and Ardiles-Cruz, E. (2024). A Survey of the Real-Time Metaverse: Challenges and Opportunities. Future Internet, 16.","DOI":"10.20944\/preprints202409.0889.v2"},{"key":"ref_53","unstructured":"Yang, Z., Li, C.Y., Bhalla, A., Zhao, B.Y., and Zheng, H. (2024). Inception Attacks: Immersive Hijacking in Virtual Reality Systems. arXiv."},{"key":"ref_54","unstructured":"Tepljakov, A., and Bahsi, H. (2020). User Behavior Analysis for Predictive Virtual Reality Applications: An Ethical and Data Security Perspective. [Master Thesis, School of Information Technologies, Tallinn University]."},{"key":"ref_55","unstructured":"Kachur, A., Lysenko, S., Bodnaruk, O., and Gaj, P. (2024, January 28). Methods of improving security and resilience of VR systems\u2019 architecture. Proceedings of the IntelITSIS, Khmelnytskyi, Ukraine."},{"key":"ref_56","first-page":"1","article-title":"Cloud-based xr services: A survey on relevant challenges and enabling technologies","volume":"2","author":"Theodoropoulos","year":"2022","journal-title":"J. Netw. Netw. Appl."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Iqbal, M.Z., Xu, X., Nallur, V., Scanlon, M., and Campbell, A.G. (2023). Security, ethics and privacy issues in the remote extended reality for education. Mixed Reality for Education, Springer.","DOI":"10.1007\/978-981-99-4958-8_16"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Hallal, L., Rhinelander, J., and Venkat, R. (2024). Recent Trends of Authentication Methods in Extended Reality: A Survey. Appl. Syst. Innov., 7.","DOI":"10.3390\/asi7030045"},{"key":"ref_59","first-page":"833","article-title":"Hey, you stole my avatar!: Virtual reality and its risks to identity protection","volume":"69","author":"Lake","year":"2019","journal-title":"Emory LJ"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Happa, J., Glencross, M., and Steed, A. (2019). Cyber security threats and challenges in collaborative mixed-reality. Front. ICT, 6.","DOI":"10.3389\/fict.2019.00005"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/OJCOMS.2024.3356076","article-title":"Communications Security in Industry X: A Survey","volume":"5","author":"Ahmad","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.comcom.2023.11.024","article-title":"Intelligent wireless sensing driven metaverse: A survey","volume":"214","author":"Zhao","year":"2024","journal-title":"Comput. Commun."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1109\/OJCOMS.2021.3078081","article-title":"The roadmap to 6G security and privacy","volume":"2","author":"Porambage","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3491207","article-title":"The eye in extended reality: A survey on gaze interaction and eye tracking in head-worn extended reality","volume":"55","author":"Plopski","year":"2022","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Rakkolainen, I., Farooq, A., Kangas, J., Hakulinen, J., Rantala, J., Turunen, M., and Raisamo, R. (2021). Technologies for multimodal interaction in extended reality\u2014A scoping review. Multimodal Technol. Interact., 5.","DOI":"10.3390\/mti5120081"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"92478","DOI":"10.1109\/ACCESS.2023.3307639","article-title":"Exploring Emotion Analysis Using Artificial Intelligence, Geospatial Information Systems, and Extended Reality for Urban Services","volume":"11","author":"Rokhsaritalemi","year":"2023","journal-title":"IEEE Access"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Ramirez, E.J., Jennett, S., Tan, J., Campbell, S., and Gupta, R. (2023). XR embodiment and the changing nature of sexual harassment. Societies, 13.","DOI":"10.3390\/soc13020036"},{"key":"ref_68","unstructured":"Fox, D., and Thornton, I.G. (2022). The IEEE Global Initiative on Ethics of Extended Reality (XR) Report\u2013Extended Reality (XR) Ethics and Diversity, Inclusion, and Accessibility, IEEE."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"100558","DOI":"10.1016\/j.cosrev.2023.100558","article-title":"Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review","volume":"48","author":"Ahmad","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Yan, Z., Zhao, X., Liu, Y., and Luo, X.R. (2024). Blockchain-driven Decentralized Identity Management: An Interdisciplinary Review and Research Agenda. Inf. Manag., 104026.","DOI":"10.1016\/j.im.2024.104026"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"26258","DOI":"10.1109\/ACCESS.2023.3257029","article-title":"Blockchain meets metaverse and digital asset management: A comprehensive survey","volume":"11","author":"Truong","year":"2023","journal-title":"IEEE Access"},{"key":"ref_72","unstructured":"Lai, K. (2022). Biometric-Enabled Decision Support Platform with Risk Assessment. [Ph.D. Thesis, University of Calgary]."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"e29871","DOI":"10.2196\/29871","article-title":"Data anonymization for pervasive health care: Systematic literature mapping study","volume":"9","author":"Zuo","year":"2021","journal-title":"JMIR Med. Inform."},{"key":"ref_74","first-page":"777","article-title":"Another Brick in the Wall: A Systematic Mapping Study Toward Defining Metaverse Engineering Through Socio-Technical Issues","volume":"37","author":"Palomba","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s44206-024-00114-1","article-title":"Safety and privacy in immersive extended reality: An analysis and policy recommendations","volume":"3","author":"Hine","year":"2024","journal-title":"Digit. Soc."},{"key":"ref_76","unstructured":"XRSI (2024, December 27). XRSI Privacy Framework v1.002. Available online: https:\/\/xrsi.org\/wp-content\/uploads\/2020\/09\/XRSI-Privacy-Framework-v1_002.pdf."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Abraham, M., Saeghe, P., Mcgill, M., and Khamis, M. (2022, January 8\u201312). Implications of xr on privacy, security and behaviour: Insights from experts. Proceedings of the Nordic Human-Computer Interaction Conference, Aarhus, Denmark.","DOI":"10.1145\/3546155.3546691"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Pavlou, M., Laskos, D., Zacharaki, E.I., Risvas, K., and Moustakas, K. (2021). XRSISE: An XR training system for interactive simulation and ergonomics assessment. Front. Virtual Real., 2.","DOI":"10.3389\/frvir.2021.646415"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.1109\/TSC.2022.3216539","article-title":"Detection of security and privacy attacks disrupting user immersive experience in virtual reality learning environments","volume":"16","author":"Valluripally","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"129782","DOI":"10.1109\/ACCESS.2021.3113162","article-title":"An open framework for analyzing and modeling XR network traffic","volume":"9","author":"Lecci","year":"2021","journal-title":"IEEE Access"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Merz, C., G\u00f6ttfert, C., Wienrich, C., and Latoschik, M.E. (2024, January 16\u201321). Universal Access for Social XR Across Devices: The Impact of Immersion on the Experience in Asymmetric Virtual Collaboration. Proceedings of the 2024 IEEE Conference Virtual Reality and 3D User Interfaces (VR), Orlando, FL, USA.","DOI":"10.1109\/VR58804.2024.00105"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.1108\/ITP-01-2023-0100","article-title":"The effects of Experience-Technology Fit (ETF) on consumption behavior: Extended Reality (XR) visitor experience","volume":"37","author":"Jung","year":"2024","journal-title":"Inf. Technol. People"},{"key":"ref_83","first-page":"18913","article-title":"Information Security with Cryptography Symmetric Key Encryption Algorithms: A Survey","volume":"11","author":"Ellapalli","year":"2022","journal-title":"I-Manager\u2019s J. Commun. Eng. Syst."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Bekaroo, G., and Dawarka, V. (2023). AI-assisted Extended Reality Toward the 6G Era: Challenges and Prospective Solutions. Driving 5G Mobile Communications with Artificial Intelligence Towards 6G, CRC Press.","DOI":"10.1201\/9781003205494-14"}],"container-title":["Virtual Worlds"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2813-2084\/4\/1\/1\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:56:18Z","timestamp":1760115378000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2813-2084\/4\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,30]]},"references-count":84,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["virtualworlds4010001"],"URL":"https:\/\/doi.org\/10.3390\/virtualworlds4010001","relation":{},"ISSN":["2813-2084"],"issn-type":[{"value":"2813-2084","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,30]]}}}