Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective
Immersive virtual reality (VR) that utilizes head-mounted displays (HMD) is one of the key
emerging technologies of the 21st century and has drawn keen attention from consumers …
emerging technologies of the 21st century and has drawn keen attention from consumers …
Skin electronics: next‐generation device platform for virtual and augmented reality
Virtual reality (VR) and augmented reality (AR) are overcoming the physical limits of real‐life
using advances in devices and software. In particular, the recent restrictions in transportation …
using advances in devices and software. In particular, the recent restrictions in transportation …
Virtual reality as an empirical research tool—Exploring user experience in a real building and a corresponding virtual model
Virtual reality (VR) allows for highly-detailed observations, accurate behavior
measurements, and systematic environmental manipulations under controlled laboratory …
measurements, and systematic environmental manipulations under controlled laboratory …
Increasing accountability through user-interface design artifacts
Access-policy violations are a growing problem with substantial costs for organizations.
Although training programs and sanctions have been suggested as a means of reducing …
Although training programs and sanctions have been suggested as a means of reducing …
Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies
Organisations increasingly rely on information and related systems, which are also a source
of risk. Unfortunately, employees represent the greatest risk to organisational information …
of risk. Unfortunately, employees represent the greatest risk to organisational information …
Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …
internal security threats and promote compliance with information security policies. Yet …
Using accountability to reduce access policy violations in information systems
Access policy violations by organizational insiders are a major security concern for
organizations because these violations commonly result in fraud, unauthorized disclosure …
organizations because these violations commonly result in fraud, unauthorized disclosure …
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
Increased deregulation and globalization have encouraged organizations to expand the
cultural diversity of their employees. Integrating each employee into an organization's …
cultural diversity of their employees. Integrating each employee into an organization's …
Investigating the effectiveness of virtual reality for culture learning
People who are to live, study and work abroad will face more challenges in the new cultural
environment and suffer more acculturative stress. Virtual Reality (VR), by which an …
environment and suffer more acculturative stress. Virtual Reality (VR), by which an …
Group navigation for guided tours in distributed virtual environments
Group navigation can be an invaluable tool for performing guided tours in distributed virtual
environments. Related work suggests that group navigation techniques should be …
environments. Related work suggests that group navigation techniques should be …