Submit your paper : editorIJETjournal@gmail.com Paper Title : Metaverse: An Amalgamation of Digital Technology and Social Media ISSN : 2395-1303 Year of Publication : 2022 10.5281/zenodo.7607149 MLA Style: - Taran Singh Bharati Metaverse: An Amalgamation of Digital Technology and Social Media , Volume 8 - Issue 6 November - December 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: - Taran Singh Bharati Metaverse: An Amalgamation of Digital Technology and Social Media , Volume 8 - Issue 6 November - December 2022 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract Today digital technology is a very powerful tool for doing common works i.e. social media, e-shopping, e- trading, fund transferring, and for communication to the connected people. The technology is used by the people of the society for the purposes. It depends on the persons for what they use it for the benefit and for defaming the other. This is a special innovation which is serving the people conveniently at low price to fulfill the requirements. Despite of a very useful medium in the society, the same tool is being misused by some ones destructively in the society. This paper insights you how people use the medium for and how they cheat people. This paper also lets you learn about the Metaverse, a bundle of technology to let the people explore the environment and enjoy and its security, privacy, applications, how to counter measure the losses. Reference [1] Roberts T, Marchais G. Assessing the role of social media and digital technology in violence reporting. Contemporary Readings in Law & Social Justice. 2018 Jul 1;10 (2). [2.] Coyne SM, Rogers AA, Zurcher JD, Stockdale L, Booth M. Does time spent using social media impact mental health?: An eight year longitudinal study. Computers in Human Behavior. 2020 Mar 1; 104: 106160. [3.] Liu Y, Tse WK, Kwok PY, Chiu YH. Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process. Information. 2022 May 31; 13(6):280. [4.] Chen Z, Wu J, Gan W, Qi Z. Metaverse security and privacy: An overview. arXiv preprint arXiv:2211.14948. 2022 Nov 27. [5.] Wang Y, Su Z, Zhang N, Xing R, Liu D, Luan TH, Shen X. A survey on metaverse: Fundamentals, security, and privacy. IEEE Communications Surveys & Tutorials. 2022 Sep 7. [6.] Zulfahmi M, Elsandi A, Apriliansyah A, Anggreainy MS, Iskandar K, Karim S. Privacy protection strategies on social media. Procedia Computer Science. 2023 Jan 1; 216:471-8. [7.] Grace TL. The Effects of Age on Users’ Attitudes Toward Security and Privacy in a Social Media Environment: A Quantitative Study (Doctoral dissertation, Capella University). [8.] Cengiz AB, Kalem G, Boluk PS. The Effect of Social Media User Behaviors on Security and Privacy Threats. IEEE Access. 2022 May 30. [9.] Yankson B, Delgado EC, Al-Jabri A, Gitin N, Davidson S. Social Media Privacy Using EDEE Security Model. International Conference on Cyber Warfare and Security 2022 Mar 2 (Vol. 17, No. 1, pp. 366-374). Academic Conferences International Limited. [10.] Bharati, T.S.; Kumar, R., (March, 2015) "Secure intrusion detection system for mobile adhoc networks," in Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on , vol., no., pp.1257-1261, 11-13 March 2015, ISSN 0973-7529; ISBN 978-93-80544-14-4 [11.] Bharati, Taran Singh. "Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager." International Journal of Computer Applications vol. 111 issue 10, pp. 33-35, ( Feb, 2015), New York, USA, ISSN 0975 887, IF 0.704 [12.] Taran Singh Bharati , R. Kumar (Dec, 2015) . Intrusion Detection System ForManet Using Machine Learning And State Transition Analysis. International Journal of Computer Engineering & Technology (IJCET).Volume:6,Issue:12, Pages:1-8.ISSN Print: 0976 6367, ISSN Online 0976 6375, IF 8.9958, Sr No. in UGC-list: 45405 [13.] Bharati, T. S., & R. Kumar. (April, 2016). Enhanced Key Management for Mobile Adhoc Networks, International Journal of Engineering Science and Computing (IJESC), vol. 6, issue 4, pp.4184--4187, ISSN 2321 3361, IF: 5.611 [14.] Taran Singh Bharati, “Agents to secure MANETs”, International Journal of Advance Engineering and Research Development ( IJAERD) , Vol.: 4, Issue: 11, pp. 1267-1272, Nov, 2017, ISSN(o): 2348 4470, IISN (p): 2348 6406, IF: 4.72 [15.] Bharati T.S. (July-Aug, 2018). MANETs and Its’ Security. International Journal of Computer Networks and Wireless Communication (IJCNWC), vol. 8 issue 4, pp. 166-171, ISSN 2250 3501, IF:.765,Sr No. in UGC-list:63076 [16.] Bharati T.S. (Jun, 2019). Trust Based Security of MANETs. International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol.8 issue 8 ,ISSN 2278 3075, pp. 792-795, IF:5.54, Scopus [17.] Bharati T.S. (Jun, 2019). Security and Privacy of Internet of Things. International Journal of Innovative Technology and Exploring Engineering(IJITEE) , 8(8), ISSN 2278 3075, pp 2740-2743, IF: 5.54, Scopus [18.] Bharati T.S. (Aug, 2019). Security Enhancement and Privacy Preserving of Big Data. International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol.8 issue 10, ISSN 2278 3075, pp 1754-1758, IF: 5.54, Scopus [19.] Bharati T.S. (Oct, 2019). Internet of Things (IoT): A Critical Review. International Journal of Scientific & Technology Research (IJSTR), vol.8 issue 9, ISSN 2277 8616, pp 227-232, IF: 7.11, Scopus. [20.] Bharati T.S. (Feb, 2020). Challenges, issues, Security and Privacy of Big Data. International Journal of Scientific & Technology Research (IJSTR), vol.9 issue 2, ISSN 2277 8616, pp 1482-1486, IF: 7.11, Scopus. [21.] Bharati, T. S. (Dec, 2021). Blockchain Technology: Architecture, Enabling Technologies, Security and Privacy. Journal of Xidian University (Scopus Indexed), Vol.15, issue.12, pp. 23-53, ISSN: 10012400, IF: 5.4, Scopus, Doi: https://doi.org/10.37896/jxu15.12/004. [22.] Park SM, Kim YG. A Metaverse: Taxonomy, components, applications, and open challenges. Ieee Access. 2022 Jan 4;10:4209-51. [23.] Njoku JN, Nwakanma CI, Amaizu GC, Kim DS. Prospects and challenges of Metaverse application in data‐driven intelligent transportation systems. IET Intelligent Transport Systems. 2022 Aug 6. [24.] Sun J, Gan W, Chao HC, Yu PS. Metaverse: Survey, applications, security, and opportunities. arXiv preprint arXiv:2210.07990. 2022 Oct 14. [25.] Zhu H. MetaAID: A Flexible Framework for Developing Metaverse Applications via AI Technology and Human Editing. arXiv preprint arXiv:2204.01614. 2022 Apr 4. [26.] Kye B, Han N, Kim E, Park Y, Jo S. Educational applications of metaverse: possibilities and limitations. Journal of Educational Evaluation for Health Professions. 2021 Dec 13;18. [27.] Cai Y, Llorca J, Tulino AM, Molisch AF. Compute-and data-intensive networks: The key to the Metaverse. arXiv preprint arXiv:2204.02001. 2022 Apr 5. Keywords — Digital technology, social sites, online trading, security, malfunctioning, cheating, privacy |