{"id":"https://openalex.org/W4312575515","doi":"https://doi.org/10.1109/iotm.002.2200003","title":"The Role of Cyber Threat Intelligence Sharing in the Metaverse","display_name":"The Role of Cyber Threat Intelligence Sharing in the Metaverse","publication_year":2022,"publication_date":"2022-12-19","ids":{"openalex":"https://openalex.org/W4312575515","doi":"https://doi.org/10.1109/iotm.002.2200003"},"language":"en","primary_location":{"id":"doi:10.1109/iotm.002.2200003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotm.002.2200003","pdf_url":null,"source":{"id":"https://openalex.org/S4210201254","display_name":"IEEE Internet of Things Magazine","issn_l":"2576-3180","issn":["2576-3180","2576-3199"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067924120","display_name":"Kealan Dunnett","orcid":"https://orcid.org/0000-0002-0010-1499"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Kealan Dunnett","raw_affiliation_strings":["Queensland University of Technology,Australia","Queensland University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"Queensland University of Technology,Australia","institution_ids":["https://openalex.org/I160993911"]},{"raw_affiliation_string":"Queensland University of Technology, Australia","institution_ids":["https://openalex.org/I160993911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043613674","display_name":"Shantanu Pal","orcid":"https://orcid.org/0000-0002-8784-0154"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shantanu Pal","raw_affiliation_strings":["Deakin University,Australia","Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin University,Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080148923","display_name":"Zahra Jadidi","orcid":"https://orcid.org/0000-0002-6694-7753"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zahra Jadidi","raw_affiliation_strings":["Griffith University,Australia","Griffith University, Australia"],"affiliations":[{"raw_affiliation_string":"Griffith University,Australia","institution_ids":["https://openalex.org/I11701301"]},{"raw_affiliation_string":"Griffith University, Australia","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088135082","display_name":"Raja Jurdak","orcid":"https://orcid.org/0000-0001-7517-0782"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Raja Jurdak","raw_affiliation_strings":["Queensland University of Technology,Australia","Queensland University of Technology, Australia"],"affiliations":[{"raw_affiliation_string":"Queensland University of Technology,Australia","institution_ids":["https://openalex.org/I160993911"]},{"raw_affiliation_string":"Queensland University of Technology, Australia","institution_ids":["https://openalex.org/I160993911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067924120"],"corresponding_institution_ids":["https://openalex.org/I160993911"],"apc_list":null,"apc_paid":null,"fwci":2.3834,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8915944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"6","issue":"1","first_page":"154","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metaverse","display_name":"Metaverse","score":0.7182095050811768},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6260094046592712},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5817168951034546},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5369358658790588},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5022869110107422},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40233179926872253},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3228757381439209},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.19849559664726257},{"id":"https://openalex.org/keywords/virtual-reality","display_name":"Virtual reality","score":0.07858267426490784}],"concepts":[{"id":"https://openalex.org/C53332860","wikidata":"https://www.wikidata.org/wiki/Q2632041","display_name":"Metaverse","level":3,"score":0.7182095050811768},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6260094046592712},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5817168951034546},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5369358658790588},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5022869110107422},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40233179926872253},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3228757381439209},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.19849559664726257},{"id":"https://openalex.org/C194969405","wikidata":"https://www.wikidata.org/wiki/Q170519","display_name":"Virtual reality","level":2,"score":0.07858267426490784},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iotm.002.2200003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotm.002.2200003","pdf_url":null,"source":{"id":"https://openalex.org/S4210201254","display_name":"IEEE Internet of Things Magazine","issn_l":"2576-3180","issn":["2576-3180","2576-3199"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Magazine","raw_type":"journal-article"},{"id":"pmh:oai:eprints.qut.edu.au:236699","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402607","display_name":"QUT ePrints (Queensland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I160993911","host_organization_name":"Queensland University of Technology","host_organization_lineage":["https://openalex.org/I160993911"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Internet of Things Magazine","raw_type":"Contribution to Journal"},{"id":"pmh:oai:research-repository.griffith.edu.au:10072/427123","is_oa":false,"landing_page_url":"http://hdl.handle.net/10072/427123","pdf_url":null,"source":{"id":"https://openalex.org/S4306402548","display_name":"Griffith Research Online (Griffith University, Queensland, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11701301","host_organization_name":"Griffith University","host_organization_lineage":["https://openalex.org/I11701301"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2533698187","https://openalex.org/W2760313715","https://openalex.org/W2888333559","https://openalex.org/W2914446816","https://openalex.org/W2921909273","https://openalex.org/W2964522977","https://openalex.org/W3013184170","https://openalex.org/W3176367300","https://openalex.org/W3211399974","https://openalex.org/W4211092666","https://openalex.org/W4294891500"],"related_works":["https://openalex.org/W2166821106","https://openalex.org/W4312864667","https://openalex.org/W4376853950","https://openalex.org/W4237056396","https://openalex.org/W4366210097","https://openalex.org/W4366734514","https://openalex.org/W4388442643","https://openalex.org/W4362644763","https://openalex.org/W4316660760","https://openalex.org/W4385541443"],"abstract_inverted_index":{"The":[0],"emergence":[1],"of":[2,30,46,60,139,142,154],"the":[3,20,57,67,84,91,105,133,136,152],"Metaverse":[4,68,120,134],"promises":[5],"to":[6,10,74,83],"provide":[7],"several":[8],"benefits":[9],"society,":[11],"e.g.,":[12,145,179],"fully":[13],"immersive":[14],"and":[15,22,32,38,44,78,87,94,169,182],"interactive":[16],"environments":[17],"in":[18,115],"health-care,":[19],"workplace,":[21],"everyday":[23],"life.":[24],"However,":[25],"it":[26],"introduces":[27],"a":[28,71,119,140],"number":[29,141],"privacy":[31,77],"security":[33,79],"concerns,":[34],"including":[35],"identity,":[36],"network,":[37],"economy-related":[39],"threats,":[40,144],"for":[41],"both":[42],"providers":[43],"users":[45,163,170],"Metaverse-based":[47],"applications,":[48],"which":[49],"remain":[50],"unaddressed.":[51],"In":[52,96],"this":[53],"article,":[54],"we":[55,98,149],"high-light":[56],"potential":[58,137],"role":[59],"Cyber":[61],"Threat":[62],"Intelligence":[63],"(CTI)":[64],"sharing":[65,117,128,156,160,177],"within":[66,118,132],"context":[69],"as":[70,164,166],"promising":[72],"opportunity":[73],"address":[75],"such":[76],"issues.":[80],"CTI":[81,116,127,176],"refers":[82],"relevant,":[85],"timely":[86],"actionable":[88],"information":[89],"about":[90],"latest":[92],"threats":[93],"attacks.":[95],"particular,":[97],"examine":[99],"how":[100],"organizations":[101,168],"could":[102],"proactively":[103],"manage":[104],"cyber":[106],"risks":[107],"associated":[108],"with":[109],"their":[110],"digital":[111],"infrastructure":[112],"by":[113],"participating":[114],"context.":[121],"We":[122],"also":[123],"propose":[124],"that":[125,151,171],"user-based":[126,155],"should":[129],"be":[130],"considered":[131],"given":[135],"prevalence":[138],"user-specific":[143],"identity-related":[146],"threats.":[147],"Finally,":[148],"emphasise":[150],"integration":[153],"creates":[157],"additional":[158],"threat":[159],"flows":[161],"between":[162,167],"well":[165],"are":[172],"lacking":[173],"from":[174],"existing":[175],"approaches,":[178],"user-to-user,":[180],"organization-to-user,":[181],"user-to-organization.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
