Skip to main content

Advertisement

Log in

Risks and uncertainties in virtual worlds: an educators’ perspective

  • Published:
Journal of Computing in Higher Education Aims and scope Submit manuscript

Abstract

Virtual worlds present tremendous advantages to cyberlearning. For example, in virtual worlds users can socialize with others, build objects and share them, customize parts of the world and hold lectures, do experiments, or share data. However, virtual worlds pose a wide range of security, privacy, and safety concerns. This may lead educators to become (or not) apprehensive of the virtual worlds in using and adapting them as learning technologies. This study examined how educators perceive risks and uncertainties in virtual worlds. We also investigated how educators’ level of use of virtual worlds influences their risk perception level. Our results indicate a divergence between risk perception and reality in the virtual worlds. We use the seminal risk perception model developed by Fischhoff and his colleagues, and our revision to this model to explain these results. Finally, we discuss implications of our research for education management, and make recommendations to educators and policy makers who consider using virtual worlds as a learning technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Antonacci, D., DiBartolo, E. N., Fritsch, K., McMullen, B., & Murch-Shafer, R. (2008). The power of virtual worlds in education: A second life primer and resource for exploring the potential of virtual worlds to impact teaching and learning. Angel Learning.

  • Anwar, M., & Greer, J. (2011). Facilitating Trust in Privacy-preserving E-learning Environments. IEEE Transactions on Learning Technologies, published online = .

  • Arakji, R. Y., & Lang, K. R. (2007). The virtual cathedral and the virtual bazaar. The Database for Advances in Information Systems, 38(4), 33–39.

    Article  Google Scholar 

  • Balkin, J., & Noveck, B. (2006). State of play: Law, games, and virtual worlds. New York, NY: NYU Press.

    Google Scholar 

  • Bray, D. A., & Konsynsky, B. R. (2007). Virtual worlds: Multi-disciplinary research opportunities. The Data Base for Advances in Information Systems, 38(4), 17–25.

    Article  Google Scholar 

  • Camerer, C., Lowestien, G., & Prelec, D. (2005). Neuroeconomics: How neuroscience can inform economics. Journal of Economic Literature, Vol. XLIII 9–64.

  • Cross, D., Shaw, T., Hearn, L., Epstein, M., Monks, H., Lester, L., et al. (2009). Australian covert bullying prevalence study (ACBPS). Perth: Child Health Promotion Research Centre, Edith Cowan University.

    Google Scholar 

  • D’Ovidio, R., & Doyle, J. (2003). A study on cyberstalking understanding investigative hurdles. Law Enforcement Bulletin, 72(3), 10–21.

    Google Scholar 

  • Dickey, M. D. (2005). Three-dimensional virtual worlds and distance learning: Two case studies of active worlds as a medium for distance education. British Journal of Educational Technology, 36(3), 439–451.

    Article  Google Scholar 

  • Elliott, J. (2008). Help—somebody robbed my second life avatar. Journal of Virtual Worlds Research, 1(1), 1–11.

    Google Scholar 

  • ENISA (2010). Virtual worlds, real money; Security and Privacy in massively-multiplayer online games and social and corporate virtual worlds. European network and information security agency.

  • Farahmand, F., Atallah, M., & Konsysnski, B. (2008). Incentives and Perceptions of Information Security Risks. Twenty Ninth International Conference on Information Systems, ICIS 2008, Paris, p. 16.

  • Farahmand, F., & Spafford, E. H. (2013) Understanding insiders: An analysis of risk- taking behavior. Information Systems Frontiers, Springer Publications, pp. 11, to appear.

  • Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., & Combs, B. (1978). How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Science, 9(2), 127–152.

    Article  Google Scholar 

  • Fishhoff, B. (2006). The psychological perception of risk. The McGraw-Hill Homeland Security Hanbook, pp. 463–493.

  • Gartner (2007a). Corporate use of virtual worlds needs careful evaluation. Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=511370.

  • Gartner (2007b). Five virtual world security fears. Retrieved from http://www.businessweek.com/globalbiz/content/aug2007/gb2007089_070863.htm?chan=globalbiz_europe+index+page_top+stories.

  • Gartner (2009). “Gartner Says 80 Percent of Active Internet Users Will Have A “Second Life” in the Virtual World by the End of 2011,” Gartner Group, Retrieved from http://www.gartner.com/it/page.jsp?id=503861.

  • Gredler, M. E. (2003). Games and simulations and their relationships to learning. Handbook of research for educational communications and technology (2nd ed., pp. 571–581). Mahwah, NJ: Lawrence Erlbaum Associates.

  • Harris, A. L. & Rea, A. (2009). Web 2.0 and virtual world technologies: A growing impact on IS Education. Journal of Information Systems Education, 20(2), 137–144.

    Google Scholar 

  • Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 1–29, 129–156.

    Google Scholar 

  • Holfeld, B., & Grabe, M. (2012). An examination of the history, prevalence, characteristics, and reporting of cyberbullying in the United States. In Q. Li, D. Cross, & P. K. Smith (Eds.), Cyberbullying in the global playground: Research from international perspectives (pp. 117–142). Malden, MA: Wiley-Blackwell.

    Chapter  Google Scholar 

  • Karat, J., Karat, C. M., Bertino, E., Li, N., Ni, Q., Brodie, C., et al. (2009). A policy framework for security and privacy management. IBM Journal of Research and Development, 53(2), 242–255.

    Article  Google Scholar 

  • Kirschner, P., & Selinger, M. (2003). The state of affairs of teacher education with respect to information and communications technology. Technology, Pedagogy and Education, 12(1), 5–12.

    Article  Google Scholar 

  • Kluge, S., & Riley, L. (2008). Teaching in virtual worlds: Opportunities and challenges. Issues in Informing Science and Information Technology, 5, 127–135.

    Google Scholar 

  • Knight, F. H. (1921). Risk, uncertainty and profit. Gloucester, UK: Dodo press.

    Google Scholar 

  • Lee, C. Y. (2009). Understanding security threats in virtual worlds. In Proceedings of the fifteenth Americas conference on information systems. San Francisco, CA: Association for Information Systems.

  • Lenhart, A., Madden, M., Macgill, A. R., & Smith, A. (2007). Teens and social media. Pew Internet & American Life Project.

  • NSF (2008). Fostering learning in the networked world: The cyberlearning opportunity and challenge. Report of the NSF Task Force on Cyberlearning, National Science Foundation, 2008.

  • Schneier, B. (2008). The psychology of security. http://www.schneier.com/essay-155.html.

  • Slator, B. M., Juell, P., McClean, P. E., Saini-Eidukatc, B., Schwertc, D. P., Whited, A. R., et al. (1999). Virtual environments for education. Journal of Network and Computer Applications, 22, 161–174.

    Article  Google Scholar 

  • Slovic, P., & Peters, E. (2006). Risk perception and affect. Current Directions in Psychological Sciences, 15(6), 322–325.

    Article  Google Scholar 

  • Smith, P., Mahdavi, J., Carvalho, M., & Tippett, N. (2006). An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief, Brief No: RBX03-06.

  • Stross, C. (2007). Halting state. New York: Ace Books.

  • Vinge, V. (1981). True names. Retrieved from http://www.facstaff.bucknell.edu/rickard/TRUENAMES.pdf.

  • Williams, M. (2004) Understanding king punisher and his order: Vandalism in a virtual reality community—motives, meanings and possible solutions. Internet Journal of Criminology.

  • Yee, N. (2001). Everquest survey. Retrieved from http://www.nickyee.com/eqt/report.html.

Download references

Acknowledgments

Portions of this work were supported by the National Science Foundation under Grant No. 1230507, and CERIAS at Purdue University. The authors wish to thank Dr. Johannes Strobel for his contribution to survey development and distribution, and Dr. Melissa Dark for her comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fariborz Farahmand.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Farahmand, F., Yadav, A. & Spafford, E.H. Risks and uncertainties in virtual worlds: an educators’ perspective. J Comput High Educ 25, 49–67 (2013). https://doi.org/10.1007/s12528-013-9067-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12528-013-9067-5

Keywords

Navigation