InfoSec in synthetic worlds

Historical perspectives from MOOs, MUDs, and MMOGs

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

From the time of clay tablets and abacuses, people have always sought new technological methods for supporting the organization and conduct of work. A new possibility in this realm has arisen over recent years in the form of threedimensional immersive environments, or synthetic worlds. In a synthetic world, each user has a representation of the self, called an “avatar,” that can be used to navigate through a realistic 3D environment rendered on a display. Although the idea of using a synthetic world to organize a large-scale work activity might seem like anathema to those whose jobs involve mainly physical resources, consider that more than 99 percent of the information produced by the human race last year was originated in digital form. Many contemporary theories and models of organizations focus primarily on the information management and processing capabilities of the organization and consider the movement of physical materials an important, but secondary concern. In this regard, virtual spaces are plausible as a substrate for functioning organizations. Indeed virtual spaces are, in effect, constructed from information. Whenever information is handled by humans, however, there is the possibility of mishandling and malfeasance. When appropriately motivated, people will hide information, corrupt information, send information to the wrong person, or otherwise misuse the information. In a synthetic world, which exists for exchange and manipulation of information, these possibilities for malfeasance could be devastating. Fortunately, we have a substantial history to draw upon because the creation of synthetic worlds predated the creation of the Internet. The first multi-user information interaction environments were developed in the 1970s, long before the Internet caught on as a public phenomenon. These early environments were called MUD s (multi-user dungeons) and almost from the start, security issues were an important consideration. This chapter reviews the history of MUD s, MOO s (MUD s object oriented) and MMOGs (massively multiplayer online games) for important clues about the future of security in virtual spaces. The chapter then provides an overview of areas where security researchers and practitioners should focus their efforts in these areas. As with other contributions to this volume, this chapter begins with a future scenario that highlights possible future security problems in virtual space.

Original languageEnglish (US)
Title of host publicationWorking Through Synthetic Worlds
PublisherAshgate Publishing Ltd
Pages383-397
Number of pages15
ISBN (Print)9780754694304, 9780754677123
StatePublished - Jan 1 2012

Fingerprint

Internet
Information management
Clay
Display devices
Substrates

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Stanton, J. M. (2012). InfoSec in synthetic worlds: Historical perspectives from MOOs, MUDs, and MMOGs. In Working Through Synthetic Worlds (pp. 383-397). Ashgate Publishing Ltd.

InfoSec in synthetic worlds : Historical perspectives from MOOs, MUDs, and MMOGs. / Stanton, Jeffrey M.

Working Through Synthetic Worlds. Ashgate Publishing Ltd, 2012. p. 383-397.

Research output: Chapter in Book/Report/Conference proceedingChapter

Stanton, JM 2012, InfoSec in synthetic worlds: Historical perspectives from MOOs, MUDs, and MMOGs. in Working Through Synthetic Worlds. Ashgate Publishing Ltd, pp. 383-397.
Stanton JM. InfoSec in synthetic worlds: Historical perspectives from MOOs, MUDs, and MMOGs. In Working Through Synthetic Worlds. Ashgate Publishing Ltd. 2012. p. 383-397
Stanton, Jeffrey M. / InfoSec in synthetic worlds : Historical perspectives from MOOs, MUDs, and MMOGs. Working Through Synthetic Worlds. Ashgate Publishing Ltd, 2012. pp. 383-397
@inbook{b1f9eaf8ecb34872b2c51599b222cb19,
title = "InfoSec in synthetic worlds: Historical perspectives from MOOs, MUDs, and MMOGs",
abstract = "From the time of clay tablets and abacuses, people have always sought new technological methods for supporting the organization and conduct of work. A new possibility in this realm has arisen over recent years in the form of threedimensional immersive environments, or synthetic worlds. In a synthetic world, each user has a representation of the self, called an “avatar,” that can be used to navigate through a realistic 3D environment rendered on a display. Although the idea of using a synthetic world to organize a large-scale work activity might seem like anathema to those whose jobs involve mainly physical resources, consider that more than 99 percent of the information produced by the human race last year was originated in digital form. Many contemporary theories and models of organizations focus primarily on the information management and processing capabilities of the organization and consider the movement of physical materials an important, but secondary concern. In this regard, virtual spaces are plausible as a substrate for functioning organizations. Indeed virtual spaces are, in effect, constructed from information. Whenever information is handled by humans, however, there is the possibility of mishandling and malfeasance. When appropriately motivated, people will hide information, corrupt information, send information to the wrong person, or otherwise misuse the information. In a synthetic world, which exists for exchange and manipulation of information, these possibilities for malfeasance could be devastating. Fortunately, we have a substantial history to draw upon because the creation of synthetic worlds predated the creation of the Internet. The first multi-user information interaction environments were developed in the 1970s, long before the Internet caught on as a public phenomenon. These early environments were called MUD s (multi-user dungeons) and almost from the start, security issues were an important consideration. This chapter reviews the history of MUD s, MOO s (MUD s object oriented) and MMOGs (massively multiplayer online games) for important clues about the future of security in virtual spaces. The chapter then provides an overview of areas where security researchers and practitioners should focus their efforts in these areas. As with other contributions to this volume, this chapter begins with a future scenario that highlights possible future security problems in virtual space.",
author = "Stanton, {Jeffrey M}",
year = "2012",
month = "1",
day = "1",
language = "English (US)",
isbn = "9780754694304",
pages = "383--397",
booktitle = "Working Through Synthetic Worlds",
publisher = "Ashgate Publishing Ltd",

}

TY - CHAP

T1 - InfoSec in synthetic worlds

T2 - Historical perspectives from MOOs, MUDs, and MMOGs

AU - Stanton, Jeffrey M

PY - 2012/1/1

Y1 - 2012/1/1

N2 - From the time of clay tablets and abacuses, people have always sought new technological methods for supporting the organization and conduct of work. A new possibility in this realm has arisen over recent years in the form of threedimensional immersive environments, or synthetic worlds. In a synthetic world, each user has a representation of the self, called an “avatar,” that can be used to navigate through a realistic 3D environment rendered on a display. Although the idea of using a synthetic world to organize a large-scale work activity might seem like anathema to those whose jobs involve mainly physical resources, consider that more than 99 percent of the information produced by the human race last year was originated in digital form. Many contemporary theories and models of organizations focus primarily on the information management and processing capabilities of the organization and consider the movement of physical materials an important, but secondary concern. In this regard, virtual spaces are plausible as a substrate for functioning organizations. Indeed virtual spaces are, in effect, constructed from information. Whenever information is handled by humans, however, there is the possibility of mishandling and malfeasance. When appropriately motivated, people will hide information, corrupt information, send information to the wrong person, or otherwise misuse the information. In a synthetic world, which exists for exchange and manipulation of information, these possibilities for malfeasance could be devastating. Fortunately, we have a substantial history to draw upon because the creation of synthetic worlds predated the creation of the Internet. The first multi-user information interaction environments were developed in the 1970s, long before the Internet caught on as a public phenomenon. These early environments were called MUD s (multi-user dungeons) and almost from the start, security issues were an important consideration. This chapter reviews the history of MUD s, MOO s (MUD s object oriented) and MMOGs (massively multiplayer online games) for important clues about the future of security in virtual spaces. The chapter then provides an overview of areas where security researchers and practitioners should focus their efforts in these areas. As with other contributions to this volume, this chapter begins with a future scenario that highlights possible future security problems in virtual space.

AB - From the time of clay tablets and abacuses, people have always sought new technological methods for supporting the organization and conduct of work. A new possibility in this realm has arisen over recent years in the form of threedimensional immersive environments, or synthetic worlds. In a synthetic world, each user has a representation of the self, called an “avatar,” that can be used to navigate through a realistic 3D environment rendered on a display. Although the idea of using a synthetic world to organize a large-scale work activity might seem like anathema to those whose jobs involve mainly physical resources, consider that more than 99 percent of the information produced by the human race last year was originated in digital form. Many contemporary theories and models of organizations focus primarily on the information management and processing capabilities of the organization and consider the movement of physical materials an important, but secondary concern. In this regard, virtual spaces are plausible as a substrate for functioning organizations. Indeed virtual spaces are, in effect, constructed from information. Whenever information is handled by humans, however, there is the possibility of mishandling and malfeasance. When appropriately motivated, people will hide information, corrupt information, send information to the wrong person, or otherwise misuse the information. In a synthetic world, which exists for exchange and manipulation of information, these possibilities for malfeasance could be devastating. Fortunately, we have a substantial history to draw upon because the creation of synthetic worlds predated the creation of the Internet. The first multi-user information interaction environments were developed in the 1970s, long before the Internet caught on as a public phenomenon. These early environments were called MUD s (multi-user dungeons) and almost from the start, security issues were an important consideration. This chapter reviews the history of MUD s, MOO s (MUD s object oriented) and MMOGs (massively multiplayer online games) for important clues about the future of security in virtual spaces. The chapter then provides an overview of areas where security researchers and practitioners should focus their efforts in these areas. As with other contributions to this volume, this chapter begins with a future scenario that highlights possible future security problems in virtual space.

UR - http://www.scopus.com/inward/record.url?scp=84938068373&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84938068373&partnerID=8YFLogxK

M3 - Chapter

SN - 9780754694304

SN - 9780754677123

SP - 383

EP - 397

BT - Working Through Synthetic Worlds

PB - Ashgate Publishing Ltd

ER -