<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>OAR@UM Collection:</title>
  <link rel="alternate" href="https://www.um.edu.mt/library/oar/handle/123456789/105120" />
  <subtitle />
  <id>https://www.um.edu.mt/library/oar/handle/123456789/105120</id>
  <updated>2026-04-05T10:04:57Z</updated>
  <dc:date>2026-04-05T10:04:57Z</dc:date>
  <entry>
    <title>The jurisdictional game in regulating law enforcement access to data across borders</title>
    <link rel="alternate" href="https://www.um.edu.mt/library/oar/handle/123456789/135064" />
    <author>
      <name />
    </author>
    <id>https://www.um.edu.mt/library/oar/handle/123456789/135064</id>
    <updated>2025-06-18T08:00:43Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: The jurisdictional game in regulating law enforcement access to data across borders
Abstract: This work and its abstract are both under embargo until the restriction is lifted.
Description: Ph.D.(Melit.)</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>New identity management models and their impact on privacy and security</title>
    <link rel="alternate" href="https://www.um.edu.mt/library/oar/handle/123456789/123523" />
    <author>
      <name />
    </author>
    <id>https://www.um.edu.mt/library/oar/handle/123456789/123523</id>
    <updated>2025-12-12T09:29:00Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: New identity management models and their impact on privacy and security
Abstract: Identity Management (IdM) systems are being stridently developed by governments across the&#xD;
globe. National and international governmental institutions see them as a panacea for the&#xD;
many ills plaguing society – by increasing the inclusion of historically marginalized&#xD;
communities, bettering the planned development of society, improving security, and&#xD;
effectively distributing social welfare benefits, services and subsidies. Diametrically opposed&#xD;
to this viewpoint are human rights activists and researchers who see such systems as&#xD;
authoritarian encroachments on fundamental human rights and freedoms by governments&#xD;
whose true purpose is actually the establishment of inescapable surveillance systems.&#xD;
This thesis provides a theoretical model for understanding IdM systems, named the&#xD;
Appropriate Access Model, and shows that the views summarized above only seem&#xD;
contradictory because previous research on IdM systems has been fragmented, based on the&#xD;
perspectives of individual disciplines. The multidisciplinary approach used here, taking into&#xD;
account the history, laws, technology and culture surrounding IdM systems, shows that these&#xD;
views are complementary: IdM systems are quite capable of both extremes, depending on the&#xD;
way they are implemented. The application of Niklas Luhmann’s systems theory to IdM&#xD;
systems provides a method of analysing them by answering three key questions: (i) What are&#xD;
the main historical, legal, technical, and cultural contexts that have influenced identification&#xD;
by public bodies?; (ii) What are the risks associated with identification systems managed by&#xD;
public bodies?; and (iii) How can these contexts and risks be incorporated into policy&#xD;
decisions for existing and future identification systems?&#xD;
The thesis uses the Appropriate Access Model to provide concrete steps and&#xD;
recommendations for the implementation of bespoke national IdM systems as well as the&#xD;
analysis of existing systems at various stages of its lifecycle. These recommendations are&#xD;
based on the envisioned purpose of the system, the way a particular society is organised, and&#xD;
the level of assurance required from such systems - while taking into account attitudes&#xD;
towards IdM systems grounded in cultural values, individual beliefs and trust in government.&#xD;
These steps are aimed at: (1) policymakers who are in the process of designing an IdM system&#xD;
for their society; and (2) scholars and officials who are in either an ex-ante or ex-post process&#xD;
of evaluating an IdM system for its fitness, performance, and impact on society.
Description: Ph.D.(Melit.)</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Immersive realities : an investigation in what makes virtual realities immersive for the users</title>
    <link rel="alternate" href="https://www.um.edu.mt/library/oar/handle/123456789/112789" />
    <author>
      <name />
    </author>
    <id>https://www.um.edu.mt/library/oar/handle/123456789/112789</id>
    <updated>2023-09-01T08:43:18Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: Immersive realities : an investigation in what makes virtual realities immersive for the users
Abstract: This dissertation aims to answer two main questions: What is Immersion? and What is needed to achieve Immersion? This research will answer these questions from a digital game perspective, particularly a virtual reality one. The study follows a grounded theory methodology approach and will gather three main types of data; literature-based data, experimental-based data and project testing data based on Human-Computer Interaction. The literature-based research is divided into three main parts. It will first start by understanding the existing theories of Immersion, particularly Brown’s and Cairn’s theory (2004) and the Flow theory (Pasch et al., 2009). Along with these, in this section, the study evaluates Immersion when compared with Addiction, Space and Presence. It will then continue to investigate how different types of realism intertwines with Immersion. More specifically, it will look into Social realism, Realism in Action/Movement and Realism in Aesthetics. Finally, the research will end the literature-based data by concluding how different mechanics engage and hook the users. With this research and various experiments, a prototype of a virtual reality casual fishing game is developed and tested to generate more data which is used to improve the project and finalize a definition that explains what is meant by Immersion in this scenario. Finally, in the discussion of findings, it will also look into how critical certain elements are to induce immersion. These elements include a narrative/context and realism in general. In the end, it will also create a detailed comparison between the definition generated in this research and the existing theories that are noted in the contextual review.
Description: MFA (Melit.)</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Surveillance in liquid modernity : merging the physical and the virtual space to reflect on surveillance</title>
    <link rel="alternate" href="https://www.um.edu.mt/library/oar/handle/123456789/112788" />
    <author>
      <name />
    </author>
    <id>https://www.um.edu.mt/library/oar/handle/123456789/112788</id>
    <updated>2023-09-01T08:35:57Z</updated>
    <published>2022-01-01T00:00:00Z</published>
    <summary type="text">Title: Surveillance in liquid modernity : merging the physical and the virtual space to reflect on surveillance
Abstract: This research aims to use virtual reality techniques to merge the physical space with the virtual space to generate awareness on surveillance. The outcome of this research is an interactive installation titled ‘Meta-Gallery’, which uses virtual reality as its primary medium. It is suggested that before reading the text, the reader familiarises themselves with an overview of the installation, which can be found here (https://r4k.club/portfolio/meta-gallery/, 3-min video and photos). Nowadays, surveillance technologies can be found in many aspects of one’s personal life but not necessarily made aware of. This research aims to examine and visualise these technologies in Meta-Gallery and increase awareness within the participant about the notion of surveillance. The research is practice-based because its outcome is a physical artwork, and the primary research method used is evaluation, as introduced by Linda Candy (2013). The research method follows a trajectory initiated from theoretical research and then formed into a practice, documented throughout to evaluate each step, found in the methodology chapter. In order to gain participant feedback on Meta-Gallery, a physical exhibition named ‘exhibit-realm’ was held for a week in which the installation was made available to the public. Feedback was collected through recordings or written comments (Appendix B and Appendix C). It was part of the evaluation process to assess whether ‘Meta-Gallery’ was successful in its purpose. Ultimately, the feedback resulted in several participants feeling surveilled and wanting to escape the virtual. Participants communicated their feedback concerning surveillance encounters in their daily lives, demonstrating that Meta-Gallery successfully increased their awareness of the notion of surveillance.
Description: MFA (Melit.)</summary>
    <dc:date>2022-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

