Last Line of Defence Cyber Security of Industrial Control Sys- Tems

Total Page:16

File Type:pdf, Size:1020Kb

Last Line of Defence Cyber Security of Industrial Control Sys- Tems Last line of defence Cyber security of industrial control sys- tems M. Luchs Delft University of Technology LASTLINEOFDEFENCE CYBER SECURITY OF INDUSTRIAL CONTROL SYSTEMS by M. Luchs in partial fulfillment of the requirements for the degree of Master of Science in Offshore and Dredging Engineering at the Delft University of Technology, to be defended publicly on Wednesday October 26th, 2016 at 14:00 PM. Supervisor: dr. ir. C. Doerr Thesis committee: Prof. dr. C. van Rhee, TU Delft dr. ir. S. A. Miedema, TU Delft Ir. F.van der Heijden, Heerema Fabrication Group An electronic version of this thesis is available at http://repository.tudelft.nl/. PREFACE Before you lies the thesis "Last line of defence: Cyber security of industrial control systems". This work in- vestigates the state of cyber security within the offshore and dredging industry, the result of which has led to the proposal of a novel intrusion detection system for industrial control systems. It is written to complete the graduation requirements of the MSc program Offshore and Dredging Engineering at the Delft University of Technology. The project has been undertaken in collaboration with Heerema Fabrication Group whom where looking to increase their awareness on cyber security. Investigating the state of cyber security within the offshore and dredging industry has led to the research question, which was formulated together with my supervisor from the TU-Delft, Christian Doerr. The work has proven challenging at times, in part because the subject is fairly unexplored terrain, and also my missing of a background in cyber security and computer networks. Nonethe- less it has provided me with many avenues for growth and learning, especially since both the TU-Delft as HFG provided me the option to freely explore and thus gain insights broader then in one area of focus alone. Ad- ditionally both Mr. Doerr and my advisor from HFG, Mr. van der Heijden, were always available to provide valuable feedback and insight, and were willing to assist me when hitting roadblocks or I lost traction. I would like to thank Frank van der Heijden, my supervisor at Heerema Fabrication Group for the support and many opportunities granted to me while working on-site in Zwijndrecht. Significant gratitude and appreci- ation also go towards Christian Doerr, my supervisor at the TU Delft, for his excellent advice and guidance during this process. For without his counsel this work would not exist in its current shape or form. I also wish to thank all those whom responded to my many questions, or helped me along my path while conducting this work. To other collegues as both HFG and TUD: Thank you for all the pleasant cooperation. Then there are some others whom I want to specifically mention. To my family: Thank you for your believing in me, your love and support has served me well, as always. Charlie Wolters, thank your for a listening ear, your kind words, and loving hugs. You provided a safe harbour whenever I felt lost. As for who helped me re- view my work and provided significant and valuable feedback on my work: Robbie Luchs, Erwin Junge, Nikol Guljelmovi´c, and Sander Dragt. I am thankful and indebted for your efforts! I hope you enjoy your reading. M. Luchs Delft, October 16, 2016 iii ABSTRACT The world is rapidly embracing networked technology and transitioning into one of hyperconnectivity, a term first coined by social scientists Anabel Quan-Haase and Barry Wellman. Increased connectivity provides ben- efits such as automation and, remote access and control of networks and equipment, thereby decreasing op- erational costs. Maritime and offshore companies are increasingly automating their vessels and platforms to reduce the required workers on-board and centralise platform control. With this tight coupling of complex ICT and industrial control systems however comes an increase in risks. These risks are further increased due to the application of security controls. Where in mechanical and struc- tural engineering the focus lies on failure (e.g. safety factors), this is not necessarily the case for ICT related systems, which are often only verified to be working as specified and expected. Unexpected behaviour is not taken into consideration. Thus, while most vessels and platforms depend on automated systems, it seems lit- tle is being done to protect them from cyber incidents and attacks. The impact of security breaches on these systems can be disastrous due to the potential for physical damage to people and planet. This is especially true within the oil and gas industries. For example a fire at the Piper Alpha production platform in the North Sea in 1988, caused by an oil and gas leak, resulted in the loss of 169 lives. While computer viruses or worms might not directly injure people, or destroy equipment, automated control systems can. This work thus focusses on the area where mechanical systems meet automation systems, a field called in- dustrial control systems. An investigation into the current state of cyber security within the dredging industry has been conducted, which was followed by a threat analysis on industrial control systems. These systems operate at the heart of the dredging industry. This has revealed that malicious software can cause physical damage to equipment and injury to people. In an effort to improve the current state and help prevent cyber incidents from occurring the following research question has been formulated: Can adversaries operating on Control System infrastructures be detected by an Intrusion Detection System which is monitoring the physical state? To answers this question a novel intrusion detection system is designed which takes advantage of the physical state of the processes. This new concept deviates from other systems in that they obtain information from the network, as opposed to the physical process, where the data cannot necessarily be trusted. Additionally, when malicious events or cyber incidents occur within or behind the controller (PLC), the control net- work does not necessarily contain the required information de- tailing ongoing attacks. Looking at the physical system then allows for malicious attacks and cyber incidents to be detected by observing anomalous and unexpected be- haviour of the monitored physical process. This enables the detection of advanced malicious threats which would be missed otherwise. The required information on the physical state of the process is obtained on the last line, between the controller and field devices. v CONTENTS 1 Introduction 1 1.1 Focus on industrial control systems................................2 1.2 Aim, Research Questions and Approach..............................2 1.3 Intended Audience........................................3 1.4 Thesis Outline..........................................3 2 Preliminary topics 5 2.1 Understanding the Cyber Security Landscape...........................5 2.1.1 Malicious actors......................................5 2.1.2 Motives driving actors...................................6 2.1.3 Common Attack Methods.................................7 2.1.4 Consequences of security incidents............................8 2.2 Understanding Industrial Control Systems............................9 2.2.1 Control systems...................................... 10 2.2.2 Components........................................ 10 2.2.3 Architecture........................................ 11 2.2.4 Communication Protocols................................. 12 2.2.5 Users............................................ 13 2.2.6 Differences between ICT and ICS systems......................... 13 2.3 Challenges securing Industrial Control Systems.......................... 14 2.3.1 Traditional ICT solutions not always applicable...................... 14 2.3.2 Legacy systems....................................... 14 2.3.3 Patching and updating................................... 15 2.3.4 Control Protocols..................................... 15 2.3.5 Commercial Off The Shelve hardware and software.................... 15 2.3.6 Malware.......................................... 16 3 Cyber security in offshore and dredging 17 3.1 Cyber incidents are on the rise.................................. 18 3.2 Cyber Security Awareness..................................... 19 3.3 Industrial Control Systems.................................... 20 3.4 Cyber security vulnerabilities and incidents............................ 22 3.4.1 Offshore and dredging related............................... 22 3.4.2 Industrial control system related.............................. 24 3.5 Discussion and Recommendations................................ 25 3.5.1 Recommendations..................................... 25 3.5.2 Security initiatives..................................... 26 4 Malicious software 27 4.1 Background............................................ 27 4.2 Documented malware incidents................................. 29 4.2.1 Conficker......................................... 29 4.2.2 Stuxnet........................................... 30 4.3 Impact on industrial control systems............................... 34 4.4 Obtaining malware........................................ 36 4.4.1 Control flow........................................ 37 4.4.2 Exports........................................... 38 4.4.3 Implementation...................................... 39 vii viii CONTENTS 4.5 Malware as a service....................................... 39 4.6 Conclusion............................................ 43 4.6.1 Recommendations....................................
Recommended publications
  • What Motivates the Authors of Video Game Walkthroughs and Faqs? a Study of Six Gamefaqs Contributors Michael Hughes Trinity University, [email protected]
    Trinity University Digital Commons @ Trinity Library Faculty Research Coates Library 1-1-2018 What Motivates the Authors of Video Game Walkthroughs and FAQs? A Study of Six GameFAQs Contributors Michael Hughes Trinity University, [email protected] Follow this and additional works at: https://digitalcommons.trinity.edu/lib_faculty Part of the Library and Information Science Commons Repository Citation Hughes, M.J. (2018). What motivates the authors of video game walkthroughs and FAQs? A study of six GameFAQs contributors. First Monday, 23(1), 1-13. doi: 10.5210/fm.v23i1.7925 This Article is brought to you for free and open access by the Coates Library at Digital Commons @ Trinity. It has been accepted for inclusion in Library Faculty Research by an authorized administrator of Digital Commons @ Trinity. For more information, please contact [email protected]. First Monday, Volume 23, Number 1 - 1 January 2018 Walkthroughs, also known as FAQs or strategy guides, are player-authored documents that provide step-by-step instructions on how to play and what to do in order to finish a given video game. Exegetical in their length and detail, walkthroughs require hours of exacting labor to complete. Yet authors are rarely compensated for work that markedly differs from other kinds of fan creativity. To understand their motivations, I interviewed six veteran GameFAQs authors, then inductively analyzed the transcripts. Open coding surfaced five themes attributable to each participant. Together, these themes constitute a shifting mix of motivations, including altruism, community belonging, self-expression, and recognition — primarily in the form of feedback and appreciation but also from compensation.
    [Show full text]
  • Download a PDF Version of the Official
    “To Open Minds, To Educate Intelligence, To Inform Decisions” The International Academic Forum provides new perspectives to the thought-leaders and decision-makers of today and tomorrow by offering constructive environments for dialogue and interchange at the intersections of nation, culture, and discipline. Headquartered in Nagoya, Japan, and registered as a Non-Profit Organization 一般社( 団法人) , IAFOR is an independent think tank committed to the deeper understanding of contemporary geo-political transformation, particularly in the Asia Pacific Region. INTERNATIONAL INTERCULTURAL INTERDISCIPLINARY iafor The Executive Council of the International Advisory Board Mr Mitsumasa Aoyama Professor June Henton Professor Baden Offord Director, The Yufuku Gallery, Tokyo, Japan Dean, College of Human Sciences, Auburn University, Professor of Cultural Studies and Human Rights & Co- USA Director of the Centre for Peace and Social Justice Southern Cross University, Australia Lord Charles Bruce Professor Michael Hudson Lord Lieutenant of Fife President of The Institute for the Study of Long-Term Professor Frank S. Ravitch Chairman of the Patrons of the National Galleries of Economic Trends (ISLET) Professor of Law & Walter H. Stowers Chair in Law Scotland Distinguished Research Professor of Economics, The and Religion, Michigan State University College of Law Trustee of the Historic Scotland Foundation, UK University of Missouri, Kansas City Professor Richard Roth Professor Donald E. Hall Professor Koichi Iwabuchi Senior Associate Dean, Medill School of Journalism, Herbert J. and Ann L. Siegel Dean Professor of Media and Cultural Studies & Director of Northwestern University, Qatar Lehigh University, USA the Monash Asia Institute, Monash University, Australia Former Jackson Distinguished Professor of English Professor Monty P.
    [Show full text]
  • Virtual Parentalism Joshua A.T
    Washington and Lee Law Review Volume 66 | Issue 3 Article 11 Summer 6-1-2009 Virtual Parentalism Joshua A.T. Fairfield Washington and Lee University School of Law, [email protected] Follow this and additional works at: https://scholarlycommons.law.wlu.edu/wlulr Part of the Family Law Commons, and the Internet Law Commons Recommended Citation Joshua A.T. Fairfield, Virtual Parentalism, 66 Wash. & Lee L. Rev. 1215 (2009), https://scholarlycommons.law.wlu.edu/wlulr/vol66/iss3/11 This Article is brought to you for free and open access by the Washington and Lee Law Review at Washington & Lee University School of Law Scholarly Commons. It has been accepted for inclusion in Washington and Lee Law Review by an authorized editor of Washington & Lee University School of Law Scholarly Commons. For more information, please contact [email protected]. Virtual Parentalism Joshua A.T. Fairfield* Abstract Parents,not laws, ultimately protect children both online and offline. If legislationplaces adults at legal risk because of the presence of children in virtualworlds, adults will exit those worlds, and children will be isolated into separatespaces. This will not improve safetyfor children. Instead,this Article suggests that Congressenact measuresthat encouragefiltering technology and parentaltools that will both protect children in virtualworlds, andprotectfree speech online. Table of Contents I. Introduction ................................................................................ 12 16 II. Parentalism and Cyberbalkanization ..........................................
    [Show full text]
  • Art Games: Performativity and Interactivity a Thesis Presented to the Faculty of the College of Fine Arts of Ohio University In
    Art Games: Performativity and Interactivity A thesis presented to the faculty of the College of Fine Arts of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Sarah M. Grabner May 2018 © 2018 Sarah M. Grabner. All Rights Reserved. 2 This thesis titled Art Games: Performativity and Interactivity by SARAH M. GRABNER has been approved for the School of Art + Design and the College of Fine Arts by Jennie Klein Professor of Art History Matthew R. Shaftel Dean, College of Fine Arts 3 Abstract GRABNER, SARAH M., M.A., May 2018, Art History Art Games: Performativity and Interactivity Director of Thesis: Jennie Klein This research’s intention is to define and classify what art games are and how these three particular games rely on the audience to activate the artworks, thus making the audience’s interactions essential to complete the artworks. Technology has always impacted the art world and shaped the media that artists experiment with and use. Today, there are many artists who use games as their method for conveying their ideas and messages. This paper will examine how three artists use gaming structures to critique historical and social topics through the audience’s interactions with the artworks’ gaming structures. The three case studies about Pippin Barr’s The Artist is Present, Tale of Tales’ The Path and Wafaa Bilal’s performance Domestic Tension will examine how these artworks exemplify and use the elements of the particular genre of games, art games. Through looking at research done on digital space and the case studies this paper will address how these artworks create a shift from the focus of the artwork being on the creator or artist to how the interactions and performance of the audience complete the works.
    [Show full text]
  • The Future Past: Intertextuality in Contemporary Dystopian Video Games
    The Future Past: Intertextuality in Contemporary Dystopian Video Games By Matthew Warren CUNY Baccalaureate for Unique and Interdisciplinary Studies Submitted to: Timothy Portlock, Advisor Hunter College Lee Quinby, Director Macaulay Honors College Thesis Colloquium 9 May 2012 Contents I. Introduction: Designing Digital Spaces II. Theoretical Framework a. Intertextuality in the visual design of video games and other media b. Examining the established visual iconography of dystopian setting II. Textual Evidence a. Retrofuturism and the Decay of Civilization in Bioshock and Fallout b. Innocence, Iteration, and Nostalgia in Team Fortress and Limbo III. Conclusion 2 “Games help those in a polarized world take a position and play out the consequences.” The Twelve Propositions from a Critical Play Perspective Mary Flanagan, 2009 3 Designing Digital Spaces In everyday life, physical space serves a primary role in orientation — it is a “container or framework where things exist” (Mark 1991) and as a concept, it can be viewed through the lense of a multitude of disciplines that often overlap, including physics, architecture, geography, and theatre. We see the function of space in visual media — in film, where the concept of physical setting can be highly choreographed and largely an unchanging variable that comprises a final static shot, and in video games, where space can be implemented in a far more complex, less linear manner that underlines participation and system-level response. The artistry behind the fields of production design and visual design, in film and in video games respectively, are exemplified in works that engage the viewer or player in a profound or novel manner.
    [Show full text]
  • VIDEO GAME SUBCULTURES Playing at the Periphery of Mainstream Culture Edited by Marco Benoît Carbone & Paolo Ruffino
    ISSN 2280-7705 www.gamejournal.it Published by LUDICA Issue 03, 2014 – volume 1: JOURNAL (PEER-REVIEWED) VIDEO GAME SUBCULTURES Playing at the periphery of mainstream culture Edited by Marco Benoît Carbone & Paolo Ruffino GAME JOURNAL – Peer Reviewed Section Issue 03 – 2014 GAME Journal A PROJECT BY SUPERVISING EDITORS Antioco Floris (Università di Cagliari), Roy Menarini (Università di Bologna), Peppino Ortoleva (Università di Torino), Leonardo Quaresima (Università di Udine). EDITORS WITH THE PATRONAGE OF Marco Benoît Carbone (University College London), Giovanni Caruso (Università di Udine), Riccardo Fassone (Università di Torino), Gabriele Ferri (Indiana University), Adam Gallimore (University of Warwick), Ivan Girina (University of Warwick), Federico Giordano (Università per Stranieri di Perugia), Dipartimento di Storia, Beni Culturali e Territorio Valentina Paggiarin, Justin Pickard, Paolo Ruffino (Goldsmiths, University of London), Mauro Salvador (Università Cattolica, Milano), Marco Teti (Università di Ferrara). PARTNERS ADVISORY BOARD Espen Aarseth (IT University of Copenaghen), Matteo Bittanti (California College of the Arts), Jay David Bolter (Georgia Institute of Technology), Gordon C. Calleja (IT University of Copenaghen), Gianni Canova (IULM, Milano), Antonio Catolfi (Università per Stranieri di Perugia), Mia Consalvo (Ohio University), Patrick Coppock (Università di Modena e Reggio Emilia), Ruggero Eugeni (Università Cattolica del Sacro Cuore, Milano), Roy Menarini (Università di Bologna), Enrico Menduni (Università di
    [Show full text]
  • Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use Natalie Marfo
    Brooklyn Journal of Corporate, Financial & Commercial Law Volume 13 | Issue 2 Article 6 5-1-2019 Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use Natalie Marfo Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjcfcl Part of the Computer Law Commons, Entertainment, Arts, and Sports Law Commons, Gaming Law Commons, Intellectual Property Law Commons, Internet Law Commons, and the Other Law Commons Recommended Citation Natalie Marfo, Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use, 13 Brook. J. Corp. Fin. & Com. L. 465 (2019). Available at: https://brooklynworks.brooklaw.edu/bjcfcl/vol13/iss2/6 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of Corporate, Financial & Commercial Law by an authorized editor of BrooklynWorks. PLAYING FAIR: YOUTUBE, NINTENDO, AND THE LOST BALANCE OF ONLINE FAIR USE ABSTRACT Over the past decade, YouTube saw an upsurge in the popularity of “Let’s Play” videos. While positive for YouTube, this uptick was not without controversy. Let’s Play videos use unlicensed copyrighted materials, frustrating copyright holders. YouTube attempted to curb such usages by demonetizing and removing thousands of Let’s Play videos. Let’s Play creators struck back, arguing that the fair use doctrine protects their works. An increasing number of powerful companies, like Nintendo, began exploiting the ambiguity of the fair use doctrine against the genre; forcing potentially legal works to request permission and payment for Let’s Play videos, without a determination of fair use.
    [Show full text]
  • Thomas Wood1 I. Introduction Microtransactions Are Generally
    ______________________________________________________________________________ ______________________________________________________________________________ RIGGING THE GAME: THE LEGALITY OF RANDOM CHANCE PURCHASES (“LOOT BOXES”) UNDER CURRENT MASSACHUSETTS GAMBLING LAW Thomas Wood1 I. Introduction Microtransactions are generally defined as any additional payment made in a video game after the customer makes an original purchase.2 Over time, microtransactions have increased in prominence and are featured today in many free-to-play mobile games.3 However, some video game developers, to the outrage of consumers, have decided to include microtransactions in PC and console games, which already require an upfront $60 retail payment.4 Consumer advocacy groups have increasingly criticized Microtransactions as unfair to 1 J.D. Candidate, Suffolk University Law School, 2020; B.S. in Criminal Justice and minor in Political Science, University of Massachusetts Lowell, 2017. Thomas Wood can be reached at [email protected]. 2 See Eddie Makuch, Microtransactions, Explained: Here's What You Need To Know, GAMESPOT (Nov. 20, 2018), archived at https://perma.cc/TUX6-D9WL (defining microtransactions as “anything you pay extra for in a video game outside of the initial purchase”); see also Microtransaction, URBAN DICTIONARY (Oct. 29, 2018), archived at https://perma.cc/XS7R-Z4TT (describing microtransactions sarcastically as a “method that game companies use to make the consumer’s wallets burn” and “the cancer of modern gaming”). 3 See Mike Williams, The Harsh History of Gaming Microtransactions: From Horse Armor to Loot Boxes, USGAMER (Oct. 11, 2017), archived at https://perma.cc/PEY6-SFL2 (outlining how the loot box model was originally created in Asia through MMOs and free-to-play games); see also Loot Boxes Games, GIANT BOMB (Nov.
    [Show full text]
  • Goose Game (2019) a Viewer
    Digital Media, Society, and Culture Angus A. A. Mol AMS2019 • T.L. van der Linden Ah… The Memories • Iman and Caressa ask Is Fake News Conquering the World? • Zeynep On Podcasts • Liona on The Joker: A Story of Controversy • See also Alejandra on From Joker, With Love • Social Games • Bernardo on Gaming Friends in a Fight Against Solitude • Petra on Socializing in Online Games • Previously by Kevin (in DH2019): My Life Through Video Games DH2019 • Hiba on All is Fair in Love and Cookies • Philippe on a Da Vinci Robot • Sanem on What Color Are Bananas? • Connor has been Playing with Social Media • Kevin L. has been Playing in the Sandbox Video Games and other Digital Playgrounds Video games are ancient… Tennis for Two (Brookhaven, 1958) Nimrod (1951), world’s first The Sumerian Game(1964) videogame-playing computer Check it out (Hamurabi, BASIC version) Check it out Spacewar! (MIT, 1962) … Video Games are now! In the 20th Century, the moving image was the dominant cultural form. While music, architecture, the written word, and many other forms of expression flourished in the last century, the moving image came to dominate. Personal storytelling, news reporting, epic cultural narratives, political propaganda – all were expressed most powerfully through film and video. The rise of the moving image is tightly bound to the rise of information; film and video as media represent linear, non-interactive information that is accessed by Untitled Goose Game (2019) a viewer. The Ludic Century is an era of games. When information is put at play, game-like experiences replace linear media.
    [Show full text]
  • Youtube Marketing: Legality of Sponsorship and Endorsement in Advertising Katrina Wu, University of San Diego
    From the SelectedWorks of Katrina Wu Spring 2016 YouTube Marketing: Legality of Sponsorship and Endorsement in Advertising Katrina Wu, University of San Diego Available at: http://works.bepress.com/katrina_wu/2/ YOUTUBE MARKETING: LEGALITY OF SPONSORSHIP AND ENDORSEMENTS IN ADVERTISING Katrina Wua1 Abstract YouTube endorsement marketing, sometimes referred to as native advertising, is a form of marketing where advertisements are seamlessly incorporated into the video content unlike traditional commercials. This paper categorizes YouTube endorsement marketing into three forms: (1) direct sponsorship where the content creator partners with the sponsor to create videos, (2) affiliated links where the content creator gets a commission resulting from purchases attributable to the content creator, and (3) free product sampling where products are sent to content creators for free to be featured in a video. Examples in each of the three forms of YouTube marketing can be observed across virtually all genres of video, such as beauty/fashion, gaming, culinary, and comedy. There are four major stakeholder interests at play—the YouTube content creators, viewers, YouTube, and the companies—and a close examination upon the interplay of these interests supports this paper’s argument that YouTube marketing is trending and effective but urgently needs transparency. The effectiveness of YouTube marketing is demonstrated through a hypothetical example in the paper involving a cosmetics company providing free product sampling for a YouTube content creator. Calculations in the hypothetical example show impressive return on investment for such marketing maneuver. Companies and YouTube content creators are subject to disclosure requirements under Federal law if the content is an endorsement as defined by the Federal Trade Commission (“FTC”).
    [Show full text]
  • The Controversy of Star Wars: Battlefront 2 and the Influencers That Fueled the Fire
    The controversy of Star Wars: Battlefront 2 and the influencers that fueled the fire By Johan Forsberg JMK, Institution of media studies Bachelor’s thesis 15 points Medie- och kommunikationsvetenskap – kandidatkurs 30 hp Autumn term of 2018 Mentor: Jonas Jonsson Abstract The video game industry is an industry that has lately come to use and abuse the user the collective intelligence of social media. Corporations have come to rely on their communities as a form of free labor; instead of letting paid testers at the company judge the product, they have chosen to let users on social media communities do this for free. In the case of Star Wars: Battlefront 2, gamers even had to pay to play the beta version of the game. The purpose of this thesis was to investigate how the release of the beta unfolded, with the user responses that followed and finally how EA Games chose to respond. Consumers, YouTubers and journalists alike gave the beta version of the game heavy criticism for being exploitative, almost gambling-like in nature. This thesis analyzed the language used in some of the key posts, reviews and videos surrounding the video game. It also analyzed Walt Disney’s impact on the decisions by EA Games. The study concludes that the controversy ultimately failed to damage EA Games in any long- lasting way, as a year later the stock value of the company has grown by 50%. The essay also concludes that EA Games chose to take immediate action not because of criticism from the media, but because of pressure from stakeholder Walt Disney.
    [Show full text]
  • In the Digital Games Medium
    Georgia State University ScholarWorks @ Georgia State University Communication Theses Department of Communication 7-15-2009 L337 Soccer Moms: Conceptions of "Hardcore" and "Casual" in the Digital Games Medium Steven Andrew Boyer Follow this and additional works at: https://scholarworks.gsu.edu/communication_theses Recommended Citation Boyer, Steven Andrew, "L337 Soccer Moms: Conceptions of "Hardcore" and "Casual" in the Digital Games Medium." Thesis, Georgia State University, 2009. https://scholarworks.gsu.edu/communication_theses/53 This Thesis is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Theses by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. L337 SOCCER MOMS CONCEPTIONS OF “HARDCORE” AND “CASUAL” IN THE DIGITAL GAMES MEDIUM by STEVEN BOYER Under the Direction of Ted Friedman ABSTRACT As digital games have become increasingly significant in the entertainment media landscape, the terms “casual” and “hardcore” have become the primary ways to describe gaming audiences, genres, and gameplay. However, these terms are saturated with outdated stereotypes involving gender, age, and class. Focusing on industrial discourse, this thesis examines this dichotomy, emphasizing areas of discontinuity and overlap to question why these terms have become so ubiquitous in gaming discourse and what functions they fulfill for a variety of groups including the industry, advertisers, and audience members. Ultimately, I suggest that these terms need to be replaced in order to move beyond restrictive stereotypes, proposing a new framework for digital games that takes into consideration user motivation, personal investment, and historical specificity.
    [Show full text]