
94% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
SYSTEMATIC REVIEW article
Front. Artif. Intell.
Sec. Machine Learning and Artificial Intelligence
Volume 8 - 2025 | doi: 10.3389/frai.2025.1545144
The final, formatted version of the article will be published soon.
You have multiple emails registered with Frontiers:
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
As one of the most influential trends in recent years, the Metaverse has emerged with numerous solutions across various fields. Despite significant investments and extensive research into Metaverse technologies, a comprehensive and overall understanding of the Metaverse environment and its full potential remains unclear. Based on published standards, previous studies, and proposed frameworks from leading firms, this article introduces a technology tree for the Metaverse that covers all relevant technology areas using a top-down approach to address the research gap. With a systematic literature review strategy, 354 scientific papers, conference proceedings, book chapters, and reports were identified as initial sources, which were reduced to 81 final sources after title, abstract, and full-text screening. The meta-synthesis of the selected sources resulted in developing the Metaverse technology tree, which included seven branches: artificial intelligence, Mirror World, extended reality, network infrastructure, lifelogging, blockchain, and the Internet of Things. The technology tree provides a comprehensive overview and roadmap of Metaverse technologies, guiding future research trajectories.
Keywords: Metaverse, Metaverse technologies, Technology tree, Roadmap, meta-synthesis
Received: 14 Dec 2024; Accepted: 07 Mar 2025.
Copyright: © 2025 Parvin, Saghafi, Ghazinoory, ghazavi and Fatemi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence:
Fatemeh Parvin, Department of Management, Information Technology Management, Tarbiat Modares University, Tehran, Iran
Sepehr Ghazinoory, Department of Industrial management, University of Tehran, Department of Management, Information Technology Management, Tarbiat Modares University, Tehran, Iran
Nafiseh ghazavi, University of Tehran, Tehran, 14174, Tehran, Iran
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.