Still Logged In: What AR and VR Can Learn from Mmos
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Theft in the Digital: Can You Steal Virtual Property?
Theft in the Digital: Can you Steal Virtual Property? Wayne Rumbles* I. Introduction This article explores issues arising around the theft of virtual property. It first explains a number of perhaps counter intuitive concepts vital to the understanding of the importance of extending ‘real world’ criminal law and criminal liability to conduct inside virtual worlds such as World of Warcraft or Second Life. This article focuses on theft of virtual property and explores how other jurisdictions are developing responses to this issue. It then develops an analysis of the operation of ‘real world’ New Zealand criminal law rules around theft, in the context of the evolution of virtual property. II. Understanding Virtual Worlds At first glance the virtual world universe, with its multitude of virtual realms, may seem like nothing but a place for virtual play, a place to which our teenage sons and daughters disappear when they should be cleaning their room. Online multiplayer computer simulated environments have come along way since Habitat was launched in 1988, on the Commodore 64 platform running through the online service QuantumLink.1 Today these worlds are interactive 3D or 2D virtual environments, which provide social spaces accessed via the Internet and accommodate millions of human users. Users interact in this world through avatars, which are computer generated representations, and acquire virtual property of one sort or another through their avatars. The number, complexity and diversity of these worlds continue to develop at a steadily increasing pace. There are still many uncertainties in the development of virtual worlds, however what is certain is that they will continue to grow and absorb aspects of our social interaction on the web. -
Invisible Labor, Invisible Play: Online Gold Farming and the Boundary Between Jobs and Games
Vanderbilt Journal of Entertainment & Technology Law Volume 18 Issue 3 Issue 3 - Spring 2016 Article 2 2015 Invisible Labor, Invisible Play: Online Gold Farming and the Boundary Between Jobs and Games Julian Dibbell Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Internet Law Commons, and the Labor and Employment Law Commons Recommended Citation Julian Dibbell, Invisible Labor, Invisible Play: Online Gold Farming and the Boundary Between Jobs and Games, 18 Vanderbilt Journal of Entertainment and Technology Law 419 (2021) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol18/iss3/2 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. VANDERBILT JOURNAL OF ENTERTAINMENT & TECHNOLOGY LAW VOLUME 18 SPRING 2016 NUMBER 3 Invisible Labor, Invisible Play: Online Gold Farming and the Boundary Between Jobs and Games Julian Dibbell ABSTRACT When does work become play and play become work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here, this question is applied to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play fantasy massively multiplayer online games (MMOs) that reward them with virtual items that their employers sell for profit to the same games' casual players. -
A Third Age of Avatars Bruce Damer, [email protected] Damer.Com | Digitalspace.Com | Ccon.Org | Biota.Org | Digibarn.Com
A Third Age of Avatars Bruce Damer, [email protected] damer.com | digitalspace.com | ccon.org | biota.org | digibarn.com Ò Started life on a PDP-11 fresh out of high school (1980), programmed graphics, videotext systems, dreamed of self replicating robots on the moon, designed board games, built model space stations. Ò Worked at IBM Research in 1984 (Toronto, New York), introduced to Internet, optical computing. Ò At Elixir Technologies 1987-94, wrote some of first GUI/Windows-Icons Publishing software on the IBM PC platform used 100 countries. Ò Established Contact Consortium in 1995, held first conferences on avatars (Earth to Avatars, Oct 1996) Ò Wrote “Avatars!”in 1997. Hosted and supported 9 conferences until 2003 on various aspects of virtual worlds (AVATARS Conferences, VLearn3D, Digital Biota) Ò Founded DigitalSpace in 1995, produced 3D worlds for government, corporate, university, and industry. Evangelism for Adobe (Atmosphere), NASA (Digital Spaces, open source 3D worlds for design simulation of space exploration) and NIH (learning games for Autism) Ò Established DigibarnComputer Museum (2002) Ò Virtual Worlds Timeline project (2006-2008) to capture and represent the history of the medium Ò The Virtual World, its Origins in Deep Time Ò Text Worlds Ò Graphical Worlds Ò Internet-Connected Worlds Ò The Avatars Cyberconferences Ò Massive Multiplayer Online RPGs Ò Virtual World Platforms Ò Virtual Worlds Timeline Project and Other Research History of Virtual Worlds The Virtual World, its Origins in Deep Time So what is a Virtual World? A place described by words or projected through pictures which creates a space in the imagination real enough that you can feel you are inside of it. -
BAKALÁŘSKÁ PRÁCE Na Téma: Etické Aspekty Aktivit Ve Víceuživatelském Virtuálním Prostředí: Srovnání Uživatelský
Ladislav Zámečník Fakulta humanitních studií Univerzity Karlovy BAKALÁŘSKÁ PRÁCE na téma: Etickéaspekty aktivit vevíceuživatelském virtuálním prostředí: Srovnání uživatelských postojů k danénetiketě Vedoucí práce: PhDr. Daniel Říha, Ph.D. Kralupy nad Vltavou, Praha 2007 1 2 OBSAH PRÁCE Úvod..............................................................................................................................5 Stručné přiblížení zkoumané oblasti .............................................................................5 Cíle bakalářské práce....................................................................................................8 Použité metody..............................................................................................................8 Historie víceuživatelských počítačových her s přehledem jejich charakteristických vlastností.......................................................................................................................9 „Malý“ multi-player ..................................................................................................9 Masivní multi-player a jeho znaky .............................................................................10 Vývoj masivního multi-playeru .................................................................................11 Vybrané etické aspekty MMOG..................................................................................16 Přínosy a nebezpečí vstupu do virtuálního světa pro lidský život mimo něj .......................16 -
Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse. -
Faculty Research Working Papers Series
Faculty Research Working Papers Series Napster's Second Life? - The Regulatory Challenges of Virtual Worlds Viktor Mayer-Schönberger and John Crowley September 2005 RWP05-052 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. Copyright belongs to the author(s). Papers may be downloaded for personal use only. Napster’s Second Life? The Regulatory Challenges of Virtual Worlds+ Viktor Mayer-Schönberger* & John Crowley‡ Imagine a world with millions of people communicating and transacting. Imagine a world just like ours except that is it made entirely of bits, not atoms. Ten years ago, John Perry Barlow imagined such a radical world – cyberspace.1 He saw people interacting without the constraints of national rules. They would be independent from regulatory fiat and unbound by the mandates of Washington, Paris, London, Berlin or Beijing. His vision relied on information traveling a global network at lightning speed, with content living off server farms in nations with little regulation, weak enforcement, or both. In this world of global regulatory arbitrage2, organizations could relocate their servers to jurisdictional safe havens overnight. 3 They might pop up in exotic places like Aruba4 or + We thank Urs Gasser, Raph Koster, David Lazer, Beth Noveck, Cory Ondrejka, and John Palfrey, who have read the manuscript and provided most valuable feedback. We gratefully acknowledge the research assistance of Malte Ziewitz. * Associate Professor of Public Policy, John F. Kennedy School of Government, Harvard University. ‡ Technologist and freelance consultant for the John F. -
Downloads Achieved, Cookies Distributed, and Pages Viewed) Provide What Seems Like the Sole Quantifier for Success Or Failure
THE AUTHORITY OF LAW IN TIMES OF CYBERSPACE Viktor Mayer-SchOnberger* As the Internet grows ever more pervasive, the debate continues over what ought to be the proper relationship between existing law and this new virtual realm called "cyberspace." In this Article, Professor Mayer-Schonberger examines the question from a post- modern perspective and presents his arguments in a unique format comprised of a four-act play to better convey the emotional aspects of the debate and its potential for variable outcomes. The acts are set around only two characters: "authority of law," which represents "the law" and all its attendant social processes, and "cyberspace," which represents both the physical and communicative structures of that realm. Each of the four acts represents a different view of the relationshipbetween "the law" and "cyberspace." Act One depicts a struggle between law and cyberspace that arises from the view that cyberspace is either a sleazy, ruleless place in need of cleaning up, or an extension of the real world. In both cases, law must triumph and subjugate cyberspace so that safety is restoredor to prevent unfairnessfrom the uneven applicationof rules between the real and virtual worlds. The charactersagain do battle in Act Two, but this time cyberspace is the victor, vanquishing law and replacing it with a regulatory framework dictated by the information infrastructure. In Act Three, law and cyberspace coexist, not by cooperating, but by de-coupling from each other. Both retain authority in its own area, with cyberspace existing outside the law, either lawless or open for self-regulation. The last act, Act Four, represents the author's view of the true nature of the relationshipbetween the two characters. -
Metaverse Roadmap Overview, 2007. 2007
A Cross-Industry Public Foresight Project Co-Authors Contributing Authors John Smart, Acceleration Studies Foundation Corey Bridges, Multiverse Jamais Cascio, Open the Future Jochen Hummel, Metaversum Jerry Paffendorf, The Electric Sheep Company James Hursthouse, OGSi Randal Moss, American Cancer Society Lead Reviewers Edward Castronova, Indiana University Richard Marks, Sony Computer Entertainment Alexander Macris, Themis Group Rueben Steiger, Millions of Us LEAD SPONSOR FOUNDING PARTNERS Futuring and Innovation Center Graphic Design: FizBit.com accelerating.org metaverseroadmap.org MVR Summit Attendees Distinguished industry leaders, technologists, analysts, and creatives who provided their insights in various 3D web domains. Bridget C. Agabra Project Manager, Metaverse Roadmap Project Patrick Lincoln Director, Computer Science Department, SRI Janna Anderson Dir. of Pew Internet’s Imagining the Internet; Asst. International Prof. of Communications, Elon University Julian Lombardi Architect, Open Croquet; Assistant VP for Tod Antilla Flash Developer, American Cancer Society Academic Services and Technology Support, Office of Information Technology Wagner James Au Blogger, New World Notes; Author, The Making of Second Life, 2008 Richard Marks Creator of the EyeToy camera interface; Director of Special Projects, Sony CEA R&D Jeremy Bailenson Director, Virtual Human Interaction Lab, Stanford University Bob Moore Sociologist, Palo Alto Research Center (PARC), PlayOn project Betsy Book Director of Product Management, Makena Technologies/There; -
Network Software Architectures for Real-Time Massively-Multiplayer
Network Software Architectures for Real-Time Massively-Multiplayer Online Games Roger Delano Paul McFarlane Degree of Master of Science School of Computer Science McGill University Montreal, Quebec, Canada Feb. 02, 2005 A thesis submitted to McGill University in partial fulfillment of the requirements for the degree of Master of Science. Copyright © 2005 Roger Delano Paul McFarlane. All rights reserved. ACKNOWLEDGMENTS First and foremost, I would like to thank my wife, Abaynesta, for her support and encouragement. Undertaking a full-time graduate degree while maintaining full-time employment and trying to be a full-time husband would have been an impossible challenge without your love, patience, and understanding. I love you. To my supervisor, Dr. Jörg Kienzle, I would like to express my thanks for taking on a student with a research area only somewhat related to your own, Software Fault Tolerance, and granting me the latitude to freely explore massively multiplayer game infrastructure. In the course of pursuing my graduate degree and writing this thesis, I was employed by two supportive organizations. To the management of Zero- Knowledge Systems Inc., most notably co-founders Austin Hill and Hammie Hill, I express my profound gratitude for your support and encouragement to pursue my academic goals. Thank you for allowing me the flexibility of schedule to take on a full-time course load and for your understanding and encouragement when the time came for me to move on to other opportunities. I would also like to thank the management of the Ubi.com group at Ubisoft Entertainment Inc. for recognizing the potential of this graduate student with no direct gaming experience and giving me the opportunity to learn from and contribute to your game projects while completing my thesis. -
Bojin-Diss-Library Copy
Exploring the Notion of ‘Grinding’ in Massively Multiplayer Online Role Playing Gamer Discourse: The Case of Guild Wars by Nis Bojin M.A. (Communication & Culture), York University, 2005 B.A. (Psychology/Classical Studies Double Major), York University, 2000 Dissertation Submitted In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy In the School of Interactive Arts and Technology Faculty of Communication, Art and Technology © Nis Bojin 2013 SIMON FRASER UNIVERSITY Summer 2013 Approval Name: Nis Bojin Degree: Doctor of Philosophy Title of Thesis: Exploring the Notion of ‘Grinding’ in Massively Multiplayer Online Role Player Gamer Discourse Examining Committee: Chair: Halil Erhan Assistant Professor (SFU-SIAT) John Bowes Senior Supervisor Professor, Program Director (SFU- SIAT) Suzanne de Castell Co-Supervisor Professor (University of Ontario Institute of Technology) Jim Bizzocchi Supervisor Associate Professor (SFU-SIAT) Carman Neustaedter Internal Examiner Assistant Professor (SFU-SIAT) Sean Gouglas External Examiner Associate Professor, Department of Anthropology (University of Alberta) Date Defended/Approved: May 29, 2013 ii Partial Copyright License iii Ethics Statement The author, whose name appears on the title page of this work, has obtained, for the research described in this work, either: a. human research ethics approval from the Simon Fraser University Office of Research Ethics, or b. advance approval of the animal care protocol from the University Animal Care Committee of Simon Fraser University; or has conducted the research c. as a co-investigator, collaborator or research assistant in a research project approved in advance, or d. as a member of a course approved in advance for minimal risk human research, by the Office of Research Ethics. -
Gender and Power Issues in On-Line Learning Environments
DOCUMENT RESUME ED 442 972 CE 080 389 AUTHOR Machanic, Mindy TITLE Gender and Power Issues in On-Line Learning Environments. PUB DATE 1998-10-00 NOTE 8p.; Paper presented at the Meeting of the International Conference on the Social Impacts of Technology (1st, St. Louis, Missouri, October 1998). PUB TYPE Opinion Papers (120) Speeches/Meeting Papers (150) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS Adult Education; *Computer Mediated Communication; *Distance Education; *Educational Environment; Females; Higher Education; Internet; *Online Systems; Secondary Education; Sex Fairness; *Sexual Harassment; Virtual Reality; World Wide Web IDENTIFIERS Flaming (Computer Mediated Communication); *Online Courses; Stalking ABSTRACT The Internet (Net) and World Wide Web (WWW) have developed a variety of cultures and communities. Although most early users of the Net (mostly males) were well-intentioned and well-mannered, their social conventions (some blatantly sexist, others in the nature of macho posturing) have continued in many online chat rooms and virtual gaming environments. Women have not always felt welcome or safe in these areas. Gender harassment and invasions of women's online privacy by men has now gone beyond macho posturing and sexist language. Online classrooms now have many of the same problems as the larger world of the Web. Going beyond "flaming" (blasting someone publicly for something said online), stalking is a potential danger for both students and faculty. Flaming that got out of hand and some forms of sexual harassment in online classrooms have been reported. None of the new online learning technologies address the emerging issues of power, gender, and safety in online classrooms. Instructors should set the tone of conversation, set clear limits on what is appropriate behavior in the classroom, make it clear that flaming will not be tolerated, and make textual postings gender-neutral. -
COMS 465: Computer Mediated Communication Plan
COMS 465: Computer Mediated Communication Plan Review Virtual Worlds & Bots Preview Review Avatar “At its core an avatar is a simple thing…It is an interactive, social representation of a user” (Meadows, 2008, p. 23). Identity “For some players the avatar becomes a purposeful projection or idealization of their own identity, while for others, the avatar is an experiment with new identities.” (Nick Yee 2008). 1. Avatar vs. the Real a priori access 1. Avatar vs. the Real a priori access a posteriori access 1. Avatar vs. the Real 1. Avatar vs. the Real "About a year ago, someone calling himself Marshall McLuhan began posting anonymously on a popular mailing list called Zone ([email protected]). Gary Wolf began a correspondence with the poster via a chain of anonymous remailers" (Wolf 1996, 129). 2. Opportunities/Challenges “The upside of incorporeal interaction: a technologically enabled, postmulticultural vision of identity disengaged from gender, ethnicity, and other problematic constructions. Online, users can float free of biological and sociocultural determinants” (Dery, 1994, p. 3). “By virtue of being physically disembodied from the creator, avatars in the theater of the game space may act in antisocial and even pathological ways— ways in which the 'real' person never would— shooting, maiming, and killing in brutal fashion” (Noveck, 2006, pp. 269-270). 2. Opportunities/Challenges 2. Opportunities/Challenges A Rape in Cyberspace An avatar, named Mr. Bungle, took advantage of and sexually abused other avatars in the textbased virtual world of LambdaMOO. Hidden behind the mask of the avatars, users feel free to engage in antisocial and violent behavior.