Abstract
Virtual worlds present tremendous advantages to cyberlearning. For example, in virtual worlds users can socialize with others, build objects and share them, customize parts of the world and hold lectures, do experiments, or share data. However, virtual worlds pose a wide range of security, privacy, and safety concerns. This may lead educators to become (or not) apprehensive of the virtual worlds in using and adapting them as learning technologies. This study examined how educators perceive risks and uncertainties in virtual worlds. We also investigated how educators’ level of use of virtual worlds influences their risk perception level. Our results indicate a divergence between risk perception and reality in the virtual worlds. We use the seminal risk perception model developed by Fischhoff and his colleagues, and our revision to this model to explain these results. Finally, we discuss implications of our research for education management, and make recommendations to educators and policy makers who consider using virtual worlds as a learning technology.
Similar content being viewed by others
References
Antonacci, D., DiBartolo, E. N., Fritsch, K., McMullen, B., & Murch-Shafer, R. (2008). The power of virtual worlds in education: A second life primer and resource for exploring the potential of virtual worlds to impact teaching and learning. Angel Learning.
Anwar, M., & Greer, J. (2011). Facilitating Trust in Privacy-preserving E-learning Environments. IEEE Transactions on Learning Technologies, published online = .
Arakji, R. Y., & Lang, K. R. (2007). The virtual cathedral and the virtual bazaar. The Database for Advances in Information Systems, 38(4), 33–39.
Balkin, J., & Noveck, B. (2006). State of play: Law, games, and virtual worlds. New York, NY: NYU Press.
Bray, D. A., & Konsynsky, B. R. (2007). Virtual worlds: Multi-disciplinary research opportunities. The Data Base for Advances in Information Systems, 38(4), 17–25.
Camerer, C., Lowestien, G., & Prelec, D. (2005). Neuroeconomics: How neuroscience can inform economics. Journal of Economic Literature, Vol. XLIII 9–64.
Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., et al. (2009). Australian covert bullying prevalence study (ACBPS). Perth: Child Health Promotion Research Centre, Edith Cowan University.
D’Ovidio, R., & Doyle, J. (2003). A study on cyberstalking understanding investigative hurdles. Law Enforcement Bulletin, 72(3), 10–21.
Dickey, M. D. (2005). Three-dimensional virtual worlds and distance learning: Two case studies of active worlds as a medium for distance education. British Journal of Educational Technology, 36(3), 439–451.
Elliott, J. (2008). Help—somebody robbed my second life avatar. Journal of Virtual Worlds Research, 1(1), 1–11.
ENISA (2010). Virtual worlds, real money; Security and Privacy in massively-multiplayer online games and social and corporate virtual worlds. European network and information security agency.
Farahmand, F., Atallah, M., & Konsysnski, B. (2008). Incentives and Perceptions of Information Security Risks. Twenty Ninth International Conference on Information Systems, ICIS 2008, Paris, p. 16.
Farahmand, F., & Spafford, E. H. (2013) Understanding insiders: An analysis of risk- taking behavior. Information Systems Frontiers, Springer Publications, pp. 11, to appear.
Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., & Combs, B. (1978). How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Science, 9(2), 127–152.
Fishhoff, B. (2006). The psychological perception of risk. The McGraw-Hill Homeland Security Hanbook, pp. 463–493.
Gartner (2007a). Corporate use of virtual worlds needs careful evaluation. Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=511370.
Gartner (2007b). Five virtual world security fears. Retrieved from http://www.businessweek.com/globalbiz/content/aug2007/gb2007089_070863.htm?chan=globalbiz_europe+index+page_top+stories.
Gartner (2009). “Gartner Says 80 Percent of Active Internet Users Will Have A “Second Life” in the Virtual World by the End of 2011,” Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=503861.
Gredler, M. E. (2003). Games and simulations and their relationships to learning. Handbook of research for educational communications and technology (2nd ed., pp. 571–581). Mahwah, NJ: Lawrence Erlbaum Associates.
Harris, A. L. & Rea, A. (2009). Web 2.0 and virtual world technologies: A growing impact on IS Education. Journal of Information Systems Education, 20(2), 137–144.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29, 129–156.
Holfeld, B., & Grabe, M. (2012). An examination of the history, prevalence, characteristics, and reporting of cyberbullying in the United States. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 117–142). Malden, MA: Wiley-Blackwell.
Karat, J., Karat, C. M., Bertino, E., Li, N., Ni, Q., Brodie, C., et al. (2009). A policy framework for security and privacy management. IBM Journal of Research and Development, 53(2), 242–255.
Kirschner, P., & Selinger, M. (2003). The state of affairs of teacher education with respect to information and communications technology. Technology, Pedagogy and Education, 12(1), 5–12.
Kluge, S., & Riley, L. (2008). Teaching in virtual worlds: Opportunities and challenges. Issues in Informing Science and Information Technology, 5, 127–135.
Knight, F. H. (1921). Risk, uncertainty and profit. Gloucester, UK: Dodo press.
Lee, C. Y. (2009). Understanding security threats in virtual worlds. In Proceedings of the fifteenth Americas conference on information systems. San Francisco, CA: Association for Information Systems.
Lenhart, A., Madden, M., Macgill, A. R., & Smith, A. (2007). Teens and social media. Pew Internet & American Life Project.
NSF (2008). Fostering learning in the networked world: The cyberlearning opportunity and challenge. Report of the NSF Task Force on Cyberlearning, National Science Foundation, 2008.
Schneier, B. (2008). The psychology of security. http://www.schneier.com/essay-155.html.
Slator, B. M., Juell, P., McClean, P. E., Saini-Eidukatc, B., Schwertc, D. P., Whited, A. R., et al. (1999). Virtual environments for education. Journal of Network and Computer Applications, 22, 161–174.
Slovic, P., & Peters, E. (2006). Risk perception and affect. Current Directions in Psychological Sciences, 15(6), 322–325.
Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief, Brief No: RBX03-06.
Stross, C. (2007). Halting state. New York: Ace Books.
Vinge, V. (1981). True names. Retrieved from http://www.facstaff.bucknell.edu/rickard/TRUENAMES.pdf.
Williams, M. (2004) Understanding king punisher and his order: Vandalism in a virtual reality community—motives, meanings and possible solutions. Internet Journal of Criminology.
Yee, N. (2001). Everquest survey. Retrieved from http://www.nickyee.com/eqt/report.html.
Acknowledgments
Portions of this work were supported by the National Science Foundation under Grant No. 1230507, and CERIAS at Purdue University. The authors wish to thank Dr. Johannes Strobel for his contribution to survey development and distribution, and Dr. Melissa Dark for her comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Farahmand, F., Yadav, A. & Spafford, E.H. Risks and uncertainties in virtual worlds: an educators’ perspective. J Comput High Educ 25, 49–67 (2013). https://doi.org/10.1007/s12528-013-9067-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12528-013-9067-5