Abstract
I report on a study into enhancing communication privacy in virtual worlds. That study used steganography as guiding idea. Its approach could easily be adapted to work for further virtual worlds. Liability and cost issues, however, might make the related providers oppose to inhabitants of their world practice it. I try to conceptualize the underlying problem in terms of systems development. Then I raise the question if these aspects of computerized systems need to be considered more careful and to be addressed by software processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Artz, D.: Digital steganography: hiding data within data. IEEE Internet Computing, p. 75 (May-June 2001)
Bergmair, R., Katzenbeisser, S.: Content-aware steganography: about lazy prisoners and narrow-minded wardens. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 109–123. Springer, Heidelberg (2007)
Chen, M., Zhang, R., Niu, X., Yang, Y.: Analysis of current steganography tools: classification & features. In: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), doi:0-7695-2745-0/06
Chen, Z., Huang, L., Yu, Z., Zhao, X., Zheng, X.: Effective linguistic steganography detection. In: IEEE 8th International Conference on Computer and Information Technology Workshops (2008), doi:10.1109/CIT
Chen, Z., Huang, L., Yu, Z., Li, L., Yang, W.: A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words. In: The Third International Conference on Availability, Reliability and Security (2008), doi:10.1109/ARES.2008.61
Craver, S., Li, E., Yu, J., Atakli, I.: A supraliminal channel in a videoconferencing application. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 283–293. Springer, Heidelberg (2008)
CSL: CyberScience Laboratory functional analysis of StegAlyzer ASTM Version 3.0, www.cybersciencelab.com (accessed on April 3, 2009)
Hirschheim, R., Klein, H., Lyytinen, K.: Information systems development and data modeling, conceptual and philosophical foundations. Cambridge University Press (1995)
IC3:. 2008 Internet crime report. US Internet Crime Complaint Center (2008), http://www.nw3c.org/
Johnson, N., Jajodia, S.: Exploring steganography: seeing the unseen, pp. 26–34. IEEE Computer (February 1998)
Kaschek, R., Schewe, K.-D., Wallace, C., Matthews, C.: Story boarding for Web-based information systems. In: Taniar, D., Wenny Rahayu, J. (eds.) Web Information Systems, ch. I, pp. 1–33. IDEA Group Publishing Inc., Hershey (2004)
Lucena, N.B., Pease, J., Yadollahpour, P., Chapin, S.J.: Syntax and semantics-preserving application-layer protocol steganography. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 164–179. Springer, Heidelberg (2004)
Schmeh, K.: Das rätselhafteste Buch der Welt. Telepolis (February 19, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaschek, R. (2013). Are Anti-goals Needed in Systems Design?. In: Mayr, H.C., Kop, C., Liddle, S., Ginige, A. (eds) Information Systems: Methods, Models, and Applications. UNISCON 2012. Lecture Notes in Business Information Processing, vol 137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38370-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-38370-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38369-4
Online ISBN: 978-3-642-38370-0
eBook Packages: Computer ScienceComputer Science (R0)