References
- ASF's Metaverse Roadmap. https://www.metaverseroadmap.org/overview/.
- Y. J. Oh, "The metaverse is coming again," AI Future Strategy Center, 2021.
- Statista. XR/AR/VR/MR market size 2021-2028. https://www.statista.com/statistics/591181/global - augmentedvirtual-reality-market-size/.
- ZDNET Korea. https://zdnet.co.kr/view/?no=20211217135045.
- Korean Government's Brief of Policy. https://www.korea.kr/news/policyNewsView.do? newsId=156523436.
- Perkins Coie LLP, "2020 Augmented and Virtual Reality Survey Report," 2020.
- Ministry of Science and ICT, "'21 cyber threat analysis and '22 forecast analysis," Dec 2021.
- J. H. Yoon and G. E. Kim, "The Outlook and Innovation Strategy for the Metaverse Virtual World Ecosystem," STEPI Insight, No. 284, pp. 1-53, Dec 2021.
- K. M. Shon, "Matrix world metaverse created by web 2.0 and online games," ETRI CEO Information, No. 47, 2006.
- S. K. Kim, "Metaverse-Digital Earth, the world of floating things", PlanB Design, 2020
- N. Huq, R. Reyes, and P. Lin et al., "METAVERSE OR METAWORSE? Cybersecurity Threats Against the Internet of Experiences," Trend Micro Research, 2022.
- S. Yoo, "A Study on AI Business Ecosystem," The Journal of The Institute of Internet, Broadcasting and Communication (JIIBC), Vol. 20, No. 2, pp. 21-27, Apr 2020. DOI: https://doi.org/10.7236/JIIBC.2020.20.2.21
- K. S. Min, K. Y. Kim, and J. S. Park et al., "Forecast and analysis of cyber security threats, Metaverse, NFTs," KISA Insight, Vol. 4, 2022.
- Akamai, "Security Trends to Address now our way to the Metaverse," CEO Insights, Dec 2021.
- S. Y. Jeong, C. H. Seo, and J. M. Jo et al., "Security threat analysis in Metaverse, an extended virtual reality," Journal of Information Security, Vol. 31, No. 6, pp. 47-57, Dec 2021.
- H. S. Na and D. S. Choi, "Review of metaverse security threats and countermeasures," Journal of Information Security, Vol. 32, No. 4, pp. 19-32, Aug 2022.
- J. H. Lee, H. R. Jeong, and K. W. Park, "Derivation of metaverse platform threat vector through metaverse infringement response case analysis," Journal of Information Security, Vol. 32, No. 4, pp. 33-40, Aug 2022.
- S. Y. Jeong, C. H. Seo, and J. M. Jo et al., "Current status of ID management technology according to the evolution of the metaverse," Journal of Information Security Society, Vol. 32, No. 4, pp. 49-59, Aug 2022.
- D. H. Lee, "Attribute-level Privacy Protection Mechanism for a Secure Metaverse Environment," Journal of the Korean Society of Information Technology (JKIIT), Vol. 20, No. 9, pp. 1-11, Sep 2022. DOI: https://doi.org/10.14801/jkiit.2022.20.9.1
- S. W. Hong and J. P. Park, "A Security Model for information Security and Personal information Security in the metaverse environment," Journal of the Korean Society of Industrial Science and Technology (JKAIS), Vol. 23, No. 9, pp. 32-38, Sep 2022. DOI: https://doi.org/10.5762/KAIS.2022.23.9.32
- D. H. Lee and N. J. Park, "Eye Tracking Obfuscation Method to Improve Metaverse Security," Journal of the Society for Next Generation Convergence Technology (JNCTA), Vol. 6, No. 11, pp. 2086-2095, Nov 2022. DOI: https://doi.org/10.33097/JNCTA.2022.06.11.2086
- W. B. Kim, Y. J. Cho and, D. M. Shin, "A Technique for Proof of Ownership of Metaverse Works without Providing Source Data," Journal of the Korea Software Appraisal Society, Vol. 18, No. 2, pp. 37-46, Dec
- D. E. Jo, "A Study on the Metaverse Framework Security Service Model," Journal of Platform Technology (JPT), Vol. 10, No. 4, pp. 82-90, Dec 2022. DOI: https://doi.org/10.23023/JPT.2022.10.4.082
- Y. S. Shim, "A Study on Utilization Methods and Problems according to Metaverse Platform Analysis," Journal of the Convergence on Culture Technology (JCCT), Vol. 8, No. 6, pp. 855-860, Nov 2022. DOI: https://doi.org/10.17703/JCCT.2022.8.6.855