{"id":"https://openalex.org/W1482637812","doi":"https://doi.org/10.1007/978-3-8348-9283-6_12","title":"Theft of Virtual Property \u2014 Towards Security Requirements for Virtual Worlds","display_name":"Theft of Virtual Property \u2014 Towards Security Requirements for Virtual Worlds","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1482637812","doi":"https://doi.org/10.1007/978-3-8348-9283-6_12","mag":"1482637812"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108778793","display_name":"Anja Beyer","orcid":null},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anja Beyer","raw_affiliation_strings":["Fachgebiet Virtuelle Welten/Digitale Spiele IfMK, Technische Universit\u00e4t Ilmenau, Germany","Technische Universit\u00e4t Ilmenau"],"affiliations":[{"raw_affiliation_string":"Fachgebiet Virtuelle Welten/Digitale Spiele IfMK, Technische Universit\u00e4t Ilmenau, Germany","institution_ids":["https://openalex.org/I119449181"]},{"raw_affiliation_string":"Technische Universit\u00e4t Ilmenau","institution_ids":["https://openalex.org/I119449181"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5108778793"],"corresponding_institution_ids":["https://openalex.org/I119449181"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06008584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"119","last_page":"127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12787","display_name":"Human Behavior and Motivation","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12787","display_name":"Human Behavior and Motivation","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metaverse","display_name":"Metaverse","score":0.8564591407775879},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5650123357772827},{"id":"https://openalex.org/keywords/amusement","display_name":"Amusement","score":0.5452225804328918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4876362383365631},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4315217137336731},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.42782294750213623},{"id":"https://openalex.org/keywords/virtual-reality","display_name":"Virtual reality","score":0.3553776144981384},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.18660694360733032}],"concepts":[{"id":"https://openalex.org/C53332860","wikidata":"https://www.wikidata.org/wiki/Q2632041","display_name":"Metaverse","level":3,"score":0.8564591407775879},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5650123357772827},{"id":"https://openalex.org/C2779056813","wikidata":"https://www.wikidata.org/wiki/Q2844542","display_name":"Amusement","level":2,"score":0.5452225804328918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4876362383365631},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4315217137336731},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.42782294750213623},{"id":"https://openalex.org/C194969405","wikidata":"https://www.wikidata.org/wiki/Q170519","display_name":"Virtual reality","level":2,"score":0.3553776144981384},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.18660694360733032},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_12","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1521891762","https://openalex.org/W1556057683","https://openalex.org/W1673763615","https://openalex.org/W2144326031","https://openalex.org/W2442503619","https://openalex.org/W3094134784"],"related_works":["https://openalex.org/W2388412749","https://openalex.org/W2359419959","https://openalex.org/W1999564783","https://openalex.org/W2584215657","https://openalex.org/W2363529160","https://openalex.org/W2682407614","https://openalex.org/W2372900810","https://openalex.org/W1911213545","https://openalex.org/W2758213419","https://openalex.org/W2382407842"],"abstract_inverted_index":{"The":[0,185],"article":[1,166,186],"is":[2,80,84,95,139],"focused":[3],"to":[4,15,38,115,130,141,173,182],"introduce":[5],"the":[6,27,31,44,72,88,144,148,160,165],"topic":[7],"of":[8,54,74,162,171,191,193,208,217],"information":[9],"technology":[10],"security":[11,17,133,149,210],"for":[12,146],"Virtual":[13,20,122,136,154,183,194],"Worlds":[14,21,137,155,195],"a":[16,52,96,107,121,179,189],"experts\u2019":[18],"audience.":[19],"are":[22,151],"Web":[23,175],"2.0":[24,176],"applications":[25],"where":[26],"users":[28],"cruise":[29],"through":[30],"world":[32,76],"with":[33,71,168,214],"their":[34],"individually":[35],"shaped":[36],"avatars":[37],"find":[39],"either":[40],"amusement,":[41],"challenges":[42],"or":[43],"next":[45],"best":[46],"business":[47],"deal.":[48],"People":[49],"do":[50],"invest":[51,59],"lot":[53],"time":[55],"but":[56],"beyond":[57],"they":[58],"in":[60,120],"buying":[61],"virtual":[62,118],"assets":[63,192,200],"like":[64],"fantasy":[65],"witcheries,":[66],"wepaons,":[67],"armour,":[68],"houses,":[69],"clothes,...etc":[70],"power":[73],"real":[75,97],"money.":[77],"Although":[78],"it":[79,138],"called":[81,124],"\u201cvirtual\u201d":[82],"(which":[83],"often":[85],"put":[86],"on":[87],"same":[89],"level":[90],"as":[91],"\u201cnot":[92],"existent\u201d)":[93],"there":[94],"value":[98],"behind":[99],"it.":[100],"In":[101,128],"November":[102],"2007":[103],"dutch":[104],"police":[105],"arrested":[106],"seventeen":[108],"years":[109],"old":[110],"teenager":[111],"who":[112],"was":[113],"suspicted":[114],"have":[116],"stolen":[117],"items":[119],"World":[123],"Habbo":[125],"Hotel":[126],"[Reuters07].":[127],"order":[129],"successfully":[131],"provide":[132],"mechanisms":[134],"into":[135,159],"necessarry":[140],"fully":[142],"understand":[143,174],"domain":[145,161],"which":[147],"mechansims":[150],"defined.":[152],"As":[153],"must":[156],"be":[157,202],"clasified":[158],"Social":[163],"Software":[164],"starts":[167],"an":[169,206,215],"overview":[170,207],"how":[172,198],"and":[177,204,212],"gives":[178,205],"short":[180],"introduction":[181],"Worlds.":[184],"then":[187],"provides":[188],"consideration":[190],"participants,":[196],"describes":[197],"these":[199],"can":[201],"threatened":[203],"appopriate":[209],"requirements":[211],"completes":[213],"outlook":[216],"possible":[218],"countermeasures.":[219]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
