Exploring Metaverse: Affordances and Risks for Potential Users

Xueqi Bao, Minghuan Shou, Jie Yu

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Metaverse is a post-reality universe, a permanent and persistent multi-user environment that combines physical reality and digital virtuality. These technologies realize seamless embodied user communication in real-time and dynamic interactions with digital objects, shape users' perceptions of reality and can be widely utilized for various applications. However, it is still in an infant stage, and a minimal amount is known about why and whether users will adopt such fully immersive technology. The purpose of this article is to develop a theoretical model and validate it by a survey to examine what affordances and challenges affect metaverse adoption. Our study potentially contributes to the literature on IS adoption research, and to practitioners on what needs to pay special attention to when designing metaverse.

Original languageEnglish
Title of host publicationInternational Conference on Information Systems, ICIS 2022
Subtitle of host publication"Digitization for the Next Generation"
PublisherAssociation for Information Systems
ISBN (Electronic)9781713893615
Publication statusPublished - 2022
Event43rd International Conference on Information Systems: Digitization for the Next Generation, ICIS 2022 - Copenhagen, Denmark
Duration: 9 Dec 202214 Dec 2022

Publication series

NameInternational Conference on Information Systems, ICIS 2022: "Digitization for the Next Generation"

Conference

Conference43rd International Conference on Information Systems: Digitization for the Next Generation, ICIS 2022
Country/TerritoryDenmark
CityCopenhagen
Period9/12/2214/12/22

Keywords

  • affordance
  • immersion
  • Metaverse
  • perceived risk

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Exploring Metaverse: Affordances and Risks for Potential Users'. Together they form a unique fingerprint.

Cite this