Meet the Team

Amanda
Goldsmith

Website Designer, Creator
& Researcher

Edwin
Lee

Researcher & Writer

Dominic
Ombati

Researcher & Writer

Greeshma
Elachitaya

Project Manager, Researcher & Writer

Methodology

This flowchart serves as a step-by-step guide to show our overall approach and perspectives used throughout the research process.

Citations

  1. Ravenscraft, Eric. “What Is the Metaverse, Exactly?” Wired, 25 Apr. 2022, www.wired.com/story/what-is-the-metaverse/.
  2. Mark van Rijmenam. (2022). Step into the Metaverse. John Wiley & Sons.
  3. Mathews, M. (2023, January 19). Reaping The Benefits Of The Healthcare Metaverse | BCG. Boston Consulting Group. Retrieved from https://www.bcg.com/publications/2023/reaping-the-benefits-of-the-healthcare-metaverse
  4. Long, M., & Swinnerton, M. (2022, February 9). Redefining Physical Therapy Through the Metaverse: Immergo Labs Makes Waves With Their First Demo at APTA CSM 2022 — Santa Cruz Works. Santa Cruz Works. Retrieved from https://www.santacruzworks.org/news/redefining-physical-therapy-immergo
  5. Privacy and Security Concerns in Telehealth | Journal of Ethics | American Medical Association. (n.d.). AMA Journal of Ethics. Retrieved from https://journalofethics.ama-assn.org/article/privacy-and-security-concerns-telehealth/2014-12
  6. Mandl KD, Perakslis ED. “HIPAA and the leak of “Deidentified” EHR Data.” The New England Journal of Medicine, 2021, https://www.nejm.org/doi/10.1056/NEJMp2102616.
  7. Office for Civil Rights. (2009, September 14). Breach Notification Rule. HHS.gov. https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html
  8. Savastano M, Hovsto A, Pharow P, Blobel B. Identity-management factors in e-health and telemedicine applications. Journal of Telemedicine and Telecare. 2008;14(7):386-388. doi:10.1258/jtt.2008.007014
  9. HIPAA Training Requirements - Updated for 2023. (n.d.). The HIPAA Journal. Retrieved from https://www.hipaajournal.com/hipaa-training-requirements/
  10. Notice of Privacy Practices. (n.d.). HHS.gov. Retrieved from https://www.hhs.gov/hipaa/for-individuals/notice-privacy-practices/index.html
  11. Yang, D., Zhou J., Chen, R., et al. (2022) Expert consensus on the metaverse in medicine, Clinical eHealth, Volume 5, Pages 1-9, ISSN 2588-9141, DOI https://doi.org/10.1016/j.ceh.2022.02.001.
  12. Privacy and Security Concerns in Telehealth | Journal of Ethics | American Medical Association. (n.d.). AMA Journal of Ethics. Retrieved from https://journalofethics.ama-assn.org/article/privacy-and-security-concerns-telehealth/2014-12
  13. Harris, K. (2021, August 19). Hacking medical devices: Managing and bolstering MedTech cybersecurity defenses. Hologram.io. Retrieved from https://www.hologram.io/blog/medical-device-hacking/
  14. Jaret, P. (2018, November 12). Exposing vulnerabilities: How hackers could target your medical devices. AAMC. Retrieved from https://www.aamc.org/news-insights/exposing-vulnerabilities-how-hackers-could-target-your-medical-devices
  15. AR Security & VR Security. (n.d.). Kaspersky. Retrieved from https://usa.kaspersky.com/resource-center/threats/security-and-privacy-risks-of-ar-and-vr
  16. Haney, J. M., Furman, S. M., & Acar, Y. (2020, July 23). Smart Home Security and Privacy Mitigations: Consumer Perceptions, Practices, and Challenges. National Institute of Standards and Technology. Retrieved from https://www.nist.gov/publications/smart-home-security-and-privacy-mitigations-consumer-perceptions-practices-and
  17. Savastano M, Hovsto A, Pharow P, Blobel B. Identity-management factors in e-health and telemedicine applications. Journal of Telemedicine and Telecare. 2008;14(7):386-388. doi:10.1258/jtt.2008.007014
  18. Vaidya, A. (2021, November 18). 75% of Doctors Worry Telehealth Blocks Visibility Into Addiction Issues. mHealthIntelligence. Retrieved from https://mhealthintelligence.com/news/75-of-doctors-worry-telehealth-blocks-visibility-into-addiction-issues
  19. Zaidan, B.B. and Zaidan, A.A. and Mat Kiah, M.L. (2011) Impact of data privacy and confidentiality on developing telemedicine applications: a review participates opinion and expert concerns. International Journal of Pharmacology, 7 (3). pp. 382-387. ISSN 1811-7775, DOI https://doi.org/10.3923/ijp.2011.382.387.[1] 
  20. Criss, D. (2019, October 2). Software vulnerabilities in some medical devices could leave them susceptible to hackers, FDA warns. CNN. Retrieved from https://www.cnn.com/2019/10/02/health/fda-medical-devices-hackers-trnd/index.html
  21. FSMB. (n.d.). Telemedicine Policies Board by Board Overview. Federation of State Medical Boards. Retrieved from https://www.fsmb.org/siteassets/advocacy/key-issues/telemedicine_policies_by_state.pdf
  22. FSMB. (n.d.). Telemedicine Policies Board by Board Overview. Federation of State Medical Boards. Retrieved from https://www.fsmb.org/siteassets/advocacy/key-issues/telemedicine_policies_by_state.pdf
  23. Sitaru, S., Kaczmarczyk, R., & Zink, A. (2022). Nonfungible tokens (NFTs) in dermatology and health care: A guide for health care professionals. JEADV Clinical Practice, 2(1), 32–37. https://doi.org/10.1002/jvc2.95
  24. Basu, T. (2022, February 4). The metaverse has a groping problem already. MIT Technology Review. https://www.technologyreview.com/2021/12/16/1042516/the-metaverse-has-a-groping-problem/
  25. Moore, M., Nakano, T., Enomoto, A., & Suda, T. (2012). Anonymity and roles associated with aggressive posts in an online forum. Computers in Human Behavior, 28(3), 861–867. https://doi.org/10.1016/j.chb.2011.12.005
  26. Patrick, W. L. (2023, January 11). Sexual Assault in the Metaverse: Virtual Reality, Real Trauma. Psychology Today. https://www.psychologytoday.com/us/blog/why-bad-looks-good/202301/sexual-assault-in-the-metaverse-virtual-reality-real-trauma
  27. RCW 7.105.900, Civil Protection Orders - Findings 2021 c215 Reg. (Washington. 2021). https://app.leg.wa.gov/RCW/default.aspx?cite=7.105.900
  28. Online Dating Safety Act, H.R. 8946, 117th Cong. (2022). https://www.congress.gov/bill/117th-congress/house-bill/8946/text/ih?overview=closed&format=xml
  29. Culliford, E. (2022, February 4). Facebook owner Meta adds tool to guard against harassment in metaverse. Reuters. https://www.reuters.com/technology/facebook-owner-meta-adds-tool-guard-against-harassment-metaverse-2022-02-04/
  30. TechCrunch is part of the Yahoo family of brands. (2021, December 23). https://techcrunch.com/2021/12/23/social-media-and-dating-apps-have-a-serious-identity-problem/
  31. 12 O.S. 1450, Catfishing Liability Act of 2016 - False Identities on Social Media - Civil Remedies. (Oklahoma. 2016). https://www.oscn.net/applications/oscn/deliverdocument.asp?id=478079
  32. Iovine, A. (2021, October 29). Tinder to make ID verification available worldwide. Mashable. https://mashable.com/article/tinder-id-verification-feature
  33. Goldman, J. (2022). Digital Identity in the Metaverse. The New Stack. https://thenewstack.io/digital-identity-in-the-metaverse/
  34. Kumar, N. (2022, February 17). Six Unaddressed Legal Concerns For The Metaverse. Forbes. https://www.forbes.com/sites/forbestechcouncil/2022/02/17/six-unaddressed-legal-concerns-for-the-metaverse/?sh=289d5c037a94
  35. Vig, S. (2022). Intellectual property rights and the metaverse: An Indian perspective. The Journal of World Intellectual Property, 25(3), 753–766. https://doi.org/10.1111/jwip.12249
  36. Singh, J., & Singh, P. (2021). Distributed Ownership Model for Non‐Fungible Tokens. Wiley Online Library, 307–321. https://doi.org/10.1002/9781119752134.ch22
  37. Goutay, P., & Wittek, N. (2021). NFTs: Key U.S. Legal Considerations for an Emerging Asset Class. Jones Day Publisher. https://www.jonesday.com/en/insights/2021/04/nfts-key-us-legal-considerations-for-an-emerging-asset-class
  38. O’Driscoll, Aimee. “Best VPNs for Gambling: How to Access Betting Websites Abroad.” Comparitech, 12 Mar. 2018, www.comparitech.com/blog/vpn-privacy/vpn-gambling-abroad/.
  39. 10 Countries Where Gambling Is Illegal – Sports Ecyclopedia. (n.d.). https://sportsecyclopedia.com/tank/10-countries-where-gambling-is-illegal/
  40. Kukard, G. (2020, May 27). Bypass Geo-Blocking: 4 Ways to Access Websites. Surfshark. https://surfshark.com/blog/geo-blocking
  41. Dixon, S. (2023, March 9). Facebook fake account deletion per quarter 2019 | Statista. Statista; Statista. https://www.statista.com/statistics/1013474/facebook-fake-account-removal-quarter/
  42. Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013, May 21). Teens, Social Media, and Privacy. Pew Research Center: Internet, Science & Tech; Pew Research Center. https://www.pewresearch.org/internet/2013/05/21/teens-social-media-and-privacy/
  43. Mark van Rijmenam. (2022). Step into the Metaverse. John Wiley & Sons.
  44. TransUnion. (2022). 2022 Global Digital Fraud Trends Report. Contently. https://content.transunion.com/v/2022-global-digital-fraud-trends-report
  45. Vanderford, R. (2022, August 29). As Online Gambling Grows, So Does the Financial Crime Risk. Wall Street Journal. https://www.wsj.com/articles/as-online-gambling-grows-so-does-the-financial-crime-risk-11661765402
  46. Inc, R. (2019, April 25). 4 Major Challenges facing Fraud Detection; Ways to Resolve Them using Machine Learning. Medium. https://medium.com/razorthink-ai/4-major-challenges-facing-fraud-detection-ways-to-resolve-them-using-machine-learning-cf6ed1b176dd
  47. “Privacy Risk Management.” AICPA, us.aicpa.org/interestareas/informationtechnology/resources/privacy-risk-management.
  48. Editor, CSRC Content. “Masquerading - Glossary | CSRC.” Csrc.nist.gov, csrc.nist.gov/glossary/term/masquerading.
  49. ‌Keller, N. (2018, February 1). Identify. NIST. https://www.nist.gov/cyberframework/identify
  50. Leenes, R., Fischer-Huebner, S., Duquenoy, P., Zuccato, A., & Martucci, L. (2007). Privacy in the metaverse : Regulating a complex social construct in a virtual world. Springer, 95–112. https://doi.org/10.1007/978-0-387-79026-8_

Website created with Webflow and all images provided by IconScout