Openly accessible

Virtual world security inspection

Patterson, Nicholas C. and Hobbs, Michael 2012, Virtual world security inspection, Journal of networks, vol. 7, no. 6, Special Issue : Data and security issues in web services, pp. 895-907.

Attached Files
Name Description MIMEType Size Downloads
patterson-virtualworldsecurity-2012.pdf Published version application/pdf 734.92KB 91

Title Virtual world security inspection
Author(s) Patterson, Nicholas C.ORCID iD for Patterson, Nicholas C.
Hobbs, MichaelORCID iD for Hobbs, Michael
Journal name Journal of networks
Volume number 7
Issue number 6
Season Special Issue : Data and security issues in web services
Start page 895
End page 907
Total pages 13
Publisher Academy Publisher
Place of publication Oulu, Finland
Publication date 2012-07-01
ISSN 1796-2056
Keyword(s) virtual worlds
virtual property theft
real money trading
software inspection
Summary Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.
Language eng
Field of Research 100605 Performance Evaluation; Testing and Simulation of Reliability
080303 Computer System Security
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2012, Academy Publisher
Free to Read? Yes
Persistent URL

Document type: Journal Article
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 416 Abstract Views, 105 File Downloads  -  Detailed Statistics
Created: Tue, 17 Jan 2012, 06:32:12 EST by Nicholas Charles Patterson

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact