![]() The first question in the survey inquired about the number of bullets the users have used. Over 28 percent of the respondents were female, and the 67.1 percent of the participants were in their 20’s and 32.9 percent were in their 30’s. The participants consisted of 100 students who received graduate degrees or a college degree. As mentioned in the previous section, we conducted a survey after the experiment. The fences that were installed within Map2 served as the access control, as shown in Figure 3. By adjusting the brightness within the settings, we were able to apply an aspect of natural surveillance to the Map2, as the brighter environment acted as a natural surveillance to the participants. Map1 had a low exposure setting in comparison to Map2. In our study, we consider the two principles, natural surveillance and access control, from CPTED. The CPTED is finally applied as a control measure. The ‘risk assessment’ assess and quantifies the risk. Then the risk analysis is the next step, which consists of ‘identification of the assets’, ‘asset value’, vulnerability evaluation’, ‘threat evaluation’. The first step is ‘determining the scope’ of the risk management. Using the Risk Management Model we proposed a risk management procedure that consists of a five-step process. The model is able to measure the risk by factoring in the probable frequency and probable magnitude of future loss. The FAIR model, a risk analysis model, was used in our study to compare the threat and risk between to the two different maps. The participants were asked to select more than one answer, and they were asked to fill out the answers for both Map1 and Map2. We asked the participants to select the words or phrases that best associated with their experiences. ![]() The respondents were asked to recall the situations from the first and second gameplay. We assured the participants that there are no right or wrong answers to ensure that the participants honestly answered the questions. The questionnaire survey consisted of questions that pertained to the different maps. We conducted a questionnaire survey to analyze the participants response. The participants were given a brief description of the experiment, and a detailed explanation of the control setting was provided prior to the experiment. The goal of the experiment was to demonstrate the potential relationship between the natural surveillance and user’s behavior. The players participating in the game used the same firearm, MF-577. We used two laptops with the identical model, LG14Z95, specifications, and settings. We carried out an experiment with a total of 100 graduate students from the School of Information Security, Korea University, Republic of Korea. As mentioned in the aforementioned section, Natural Surveillance has been proven to reduce crime rates. By applying contrasting settings to the two different maps, we aimed to observe if the components from Natural Surveillance and Access Control would change the user’s behavior. To apply the CPTED method to the second map, Map2, we added fences to the environment. Based on Map1 We changed the exposure rate and altered the environment to create a second map, Map2. The first map, Map1, is the default map provided by AssaultCube. Using AssaultCube, an open-source FPS game, we designed two maps for our experiment. This paper aims to measure the risk by applying the Risk Management model to the online game environments. The results of our study discusses how to determine the criminogenic designs and capacity in the cyberspace realm. We found that the corollaries of the mophology in the virtual environment effects the distribution of crime. Our study investigates how spatial syntax and territorial demarcation may translate in the cyberspace realm. ![]() ![]() Based on the two experiments, we were able to critically evaluate the contributions of CPTED through a multi-component analysis. Furthermore, we adopted the lme4 package for R to estimate the mixed effect of the 6,242,880 observations retrieved from Kaggle. For the experiment, we utilized the Factor Analysis of Information Risk (FAIR) to quantitatively analyze the risk. We conducted an experiment with (n-sample: 100) graduate students. Our study employs Crime Prevention through Environmental Design (CPTED) as a risk control measure and utilizes two principles: Access Control and Natural Surveillance. ![]() The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |