Paper Type

Master's Thesis


College of Computing, Engineering & Construction

Degree Name

Master of Science (MS)


Construction Management

NACO controlled Corporate Body

University of North Florida. Construction Management

First Advisor

Dr. Vamsi Sai Kalasapudi

Second Advisor

Dr. Bharadwaj R.K. Mantha

Third Advisor

Dr. Kevin Pfeil

Department Chair

Dr. Dan Koo

College Dean

Dr. William Klostermeyer


Augmented Reality (AR) applications and the digitization of Architecture, Engineering, and Construction (AEC) industry processes, such as the online building permit process (BPP), have introduced new developments that simplifies tasks, and enhanced data accessibility for stakeholders. This created a digital landscape where sensitive information and critical processes are intertwined, making them vulnerable to cyber-attacks. Existing studies and frameworks on a) AR adoption doesn’t provide essential information (e.g., material availability and costs from different suppliers) and AR features to cater to the diverse needs of different stakeholders. b) threat modeling requires a domain and context specific need investigation, process exploration, critical asset mapping, and subsequent adoption.

This thesis addresses these gaps to comprehensively understand the influence of a specific technology (AR applications on the home remodeling market in the current context) and investigate the critical need for robust cybersecurity measures in the context of online BPP. Adopting a multi-faceted approach, the study aims to a) conduct user market research and identify unique value propositions of AR-based applications b) assess potential threats and vulnerabilities of the online building permit process (BPP) followed by the building inspection division in the city of Jacksonville’s (COJ). To achieve these, a) questionnaire surveys were distributed to diverse stakeholders such as homeowners, contractors, realtors, and suppliers. b) focused interviews were conducted to determine the need for cybersecurity investigation and an existing threat modeling framework was applied to further analyze the online BPP process. Two of the major outcomes are a) almost all of the 15 surveyed participants raised concerns of final outcome visualization before completion and apprehension about their ability to execute the task correctly b) preliminary threat models that emphasize the who (are the potential malicious actors), why (would they intend to perform such actions), where (are the avenues of attacks), what (are the implications), and how (can these be avoided or countered) of the existing COJ’s BPP. The findings therefore directly contribute to the importance of innovative solutions that prioritize both technological advancements and data protection within the evolving AEC landscape.