Faculty Research Working Papers Series
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Theft in the Digital: Can You Steal Virtual Property?
Theft in the Digital: Can you Steal Virtual Property? Wayne Rumbles* I. Introduction This article explores issues arising around the theft of virtual property. It first explains a number of perhaps counter intuitive concepts vital to the understanding of the importance of extending ‘real world’ criminal law and criminal liability to conduct inside virtual worlds such as World of Warcraft or Second Life. This article focuses on theft of virtual property and explores how other jurisdictions are developing responses to this issue. It then develops an analysis of the operation of ‘real world’ New Zealand criminal law rules around theft, in the context of the evolution of virtual property. II. Understanding Virtual Worlds At first glance the virtual world universe, with its multitude of virtual realms, may seem like nothing but a place for virtual play, a place to which our teenage sons and daughters disappear when they should be cleaning their room. Online multiplayer computer simulated environments have come along way since Habitat was launched in 1988, on the Commodore 64 platform running through the online service QuantumLink.1 Today these worlds are interactive 3D or 2D virtual environments, which provide social spaces accessed via the Internet and accommodate millions of human users. Users interact in this world through avatars, which are computer generated representations, and acquire virtual property of one sort or another through their avatars. The number, complexity and diversity of these worlds continue to develop at a steadily increasing pace. There are still many uncertainties in the development of virtual worlds, however what is certain is that they will continue to grow and absorb aspects of our social interaction on the web. -
Incommensurate Wor(L)Ds: Epistemic Rhetoric and Faceted Classification Of
Incommensurate Wor(l)ds: Epistemic Rhetoric and Faceted Classification of Communication Mechanics in Virtual Worlds by Sarah Smith-Robbins A Dissertation Submitted to the Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Dissertation Advisor: Dr. Rai Peterson Ball State University Muncie, IN March 28, 2011 Table of Contents Table of Contents ..................................................................................................................................... ii List of Tables ........................................................................................................................................... vi List of Figures ......................................................................................................................................... vii Abstract .................................................................................................................................................. ix Acknowledgements ................................................................................................................................. xi Chapter 1: Incommensurate Terms, Incommensurate Practices ............................................................... 1 Purpose of the Study ................................................................................................................................... 3 Significance of the Study ............................................................................................................................ -
(12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy Et Al
US007945856B2 (12) United States Patent (10) Patent No.: US 7,945,856 B2 Leahy et al. (45) Date of Patent: May 17, 2011 (54) SYSTEMAND METHOD FOR ENABLING (56) References Cited USERS TO INTERACT IN A VIRTUAL SPACE U.S. PATENT DOCUMENTS (75) Inventors: Dave Leahy, Oakland, CA (US); Judith 4.414,621 A 11/1983 Bown et al. Challinger, Santa Cruz, CA (US); B. 4,441,162 A 4, 1984 Lillie 4493,021 A 1/1985 Agrawal et al. Thomas Adler, San Francisco, CA (US); 4,503,499 A 3, 1985 Mason et al. S. Mitra Ardon, San Francisco, CA 4,531,184 A 7/1985 Wigan et al. (US) 4,551,720 A 11/1985 Levin 4,555,781 A 1 1/1985 Baldry et al. (73) Assignee: Worlds.com, Inc., Brookline, MA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this FOREIGN PATENT DOCUMENTS patent is extended or adjusted under 35 CA 2242626 C 10, 2002 U.S.C. 154(b) by 0 days. (Continued) (21) Appl. No.: 12/353,218 OTHER PUBLICATIONS Andrew Reese et al., Kesami Air Warrior, http://www. (22) Filed: Jan. 13, 2009 atarimagazines.com/startv3n2/kesamiwarrior.html, Jan. 12, 2009. (Under 37 CFR 1.47) (Continued) (65) Prior Publication Data Primary Examiner — Kevin M Nguyen US 2009/0228.809 A1 Sep. 10, 2009 (74) Attorney, Agent, or Firm — Anatoly S. Weiser, Esq.; Acuity Law Group Related U.S. Application Data (57) ABSTRACT (63) Continuation of application No. 1 1/591.878, filed on The present invention provides a highly scalable architecture Nov. -
Using the MMORPG 'Runescape' to Engage Korean
Using the MMORPG ‘RuneScape’ to Engage Korean EFL (English as a Foreign Language) Young Learners in Learning Vocabulary and Reading Skills Kwengnam Kim Submitted in accordance with the requirements for the degree of Doctor of Philosophy The University of Leeds School of Education October 2015 -I- INTELLECTUAL PROPERTY The candidate confirms that the work submitted is her own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. © 2015 The University of Leeds and Kwengnam Kim The right of Kwengnam Kim to be identified as Author of this work has been asserted by her in accordance with the Copyright, Designs and Patents Act 1988. -II- DECLARATION OF AUTHORSHIP The work conducted during the development of this PhD thesis has led to a number of presentations and a guest talk. Papers and extended abstracts from the presentations and a guest talk have been generated and a paper has been published in the BAAL conference' proceedings. A list of the papers arising from this study is presented below. Kim, K. (2012) ‘MMORPG RuneScape and Korean Children’s Vocabulary and Reading Skills’. Paper as Guest Talk is presented at CRELL Seminar in University of Roehampton, London, UK, 31st, October 2012. Kim, K. (2012) ‘Online role-playing game and Korean children’s English vocabulary and reading skills’. Paper is presented in AsiaCALL 2012 (11th International Conference of Computer Assisted Language Learning), in Ho Chi Minh City, Vietnam, 16th-18th, November 2012. -
Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse. -
Cyber-Synchronicity: the Concurrence of the Virtual
Cyber-Synchronicity: The Concurrence of the Virtual and the Material via Text-Based Virtual Reality A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Jeffrey S. Smith March 2010 © 2010 Jeffrey S. Smith. All Rights Reserved. This dissertation titled Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality by JEFFREY S. SMITH has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Joseph W. Slade III Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT SMITH, JEFFREY S., Ph.D., March 2010, Mass Communication Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality (384 pp.) Director of Dissertation: Joseph W. Slade III This dissertation investigates the experiences of participants in a text-based virtual reality known as a Multi-User Domain, or MUD. Through in-depth electronic interviews, staff members and players of Aurealan Realms MUD were queried regarding the impact of their participation in the MUD on their perceived sense of self, community, and culture. Second, the interviews were subjected to a qualitative thematic analysis through which the nature of the participant’s phenomenological lived experience is explored with a specific eye toward any significant over or interconnection between each participant’s virtual and material experiences. An extended analysis of the experiences of respondents, combined with supporting material from other academic investigators, provides a map with which to chart the synchronous and synonymous relationship between a participant’s perceived sense of material identity, community, and culture, and her perceived sense of virtual identity, community, and culture. -
Rubicite Breastplate, Priced to Move Cheap
Burke, Rubicite Breastplate Rubicite Breastplate Priced to Move, Cheap: How Virtual Economies Become Real Simulations Timothy Burke Department of History Swarthmore College June 2002 Almost everyone was unhappy, the d00dz and the carebears, the role-players and dedicated powergamers, and almost everyone was expressing their anger on websites and bulletin boards. It was patch day in the computer game Asheron’s Call, an eagerly anticipated monthly event, when new content, new events, new tools and tricks, were introduced by the game’s designers. A big nerf had come down from on high. There had been no warning. Nerfing was a way of life over at the other big multiplayer games, but supposedly not in Asheron’s Call. This time, the fabled Greater Shadow armor, the ultimate in personal protection, was now far less desirable than it had been the day before the patch. The rare crystal shards used to forge the armor, which had become an unofficial currency, were greatly reduced in value, while anyone who already possessed the earlier, more powerful version of the armor found themselves far wealthier than they had been the day before. Asheron’s Call was one of three major commercial “persistent world” massively multiplayer computer games available in the spring of 2001, the others being Everquest and Ultima Online. (Since that time, a number of other games in this genre have appeared, with more on the way.) In these games, tens of thousands of players within a shared virtual environment control alternate personas, characters who retain their abilities 1 Burke, Rubicite Breastplate and possessions from session to session and who can acquire additional skills or objects over time. -
CS 592: Security Practicum
CS 592: Security Practicum Lecture 2 On-line PC games and their cheats Popular on-line PC games • FPS (First-person shooters) – You control a gun/crosshair – You shoot and kill other players doing the same • MMORPG (Massively multi-player on-line role- playing games) – You control an avatar – You kill other avatars to gain loot and power • RTS (Real-time strategy) – You control an army – You go head-to-head against another player’s army Popular FPS games • Half-Life/Counter-Strike (1/2), Battlefield (2 & 2142) • Wolfenstein: Enemy Territory, Call of Duty (1/2) Popular MMORPG games • World of Warcraft, Lineage (1 & 2) • Runescape, Final Fantasy XI, EverQuest (1 & 2) Popular RTS games • Warcraft 3/Starcraft, Age of Empires • Warhammer 40000, Command & Conquer 3 Cheats • Achilles heel of the PC gaming platform (besides crappy integrated graphics cards) – Must be fixed to compete with consoles – Causes legitimate, paying players to quit – Creates bad word-of-mouth to discourage new players – Wrecks virtual economies in MMORPGs Types of cheats • Information exposure – Wallhacks (OGC), Maphacks (Warcraft 3), Chest hacks (showEQ) • Automation – Aimbot (OGC), Troop command macros (Warcraft 3), Auto-looting (WoW QuickLoot), AFK bots • Protocol – Reset cheat (Half-Life), Unit fabrication (Warcraft 3), Item duping (MMO), Speed hack (Half-Life), Hit point hack (Diablo), Disconnect cheat • Game bugs – Game-specific coding errors that lead to unintended behavior Information exposure cheats • Server or peer sends complete information to other client -
Henry Jenkins Convergence Culture Where Old and New Media
Henry Jenkins Convergence Culture Where Old and New Media Collide n New York University Press • NewYork and London Skenovano pro studijni ucely NEW YORK UNIVERSITY PRESS New York and London www.nyupress. org © 2006 by New York University All rights reserved Library of Congress Cataloging-in-Publication Data Jenkins, Henry, 1958- Convergence culture : where old and new media collide / Henry Jenkins, p. cm. Includes bibliographical references and index. ISBN-13: 978-0-8147-4281-5 (cloth : alk. paper) ISBN-10: 0-8147-4281-5 (cloth : alk. paper) 1. Mass media and culture—United States. 2. Popular culture—United States. I. Title. P94.65.U6J46 2006 302.230973—dc22 2006007358 New York University Press books are printed on acid-free paper, and their binding materials are chosen for strength and durability. Manufactured in the United States of America c 15 14 13 12 11 p 10 987654321 Skenovano pro studijni ucely Contents Acknowledgments vii Introduction: "Worship at the Altar of Convergence": A New Paradigm for Understanding Media Change 1 1 Spoiling Survivor: The Anatomy of a Knowledge Community 25 2 Buying into American Idol: How We are Being Sold on Reality TV 59 3 Searching for the Origami Unicorn: The Matrix and Transmedia Storytelling 93 4 Quentin Tarantino's Star Wars? Grassroots Creativity Meets the Media Industry 131 5 Why Heather Can Write: Media Literacy and the Harry Potter Wars 169 6 Photoshop for Democracy: The New Relationship between Politics and Popular Culture 206 Conclusion: Democratizing Television? The Politics of Participation 240 Notes 261 Glossary 279 Index 295 About the Author 308 V Skenovano pro studijni ucely Acknowledgments Writing this book has been an epic journey, helped along by many hands. -
Downloads Achieved, Cookies Distributed, and Pages Viewed) Provide What Seems Like the Sole Quantifier for Success Or Failure
THE AUTHORITY OF LAW IN TIMES OF CYBERSPACE Viktor Mayer-SchOnberger* As the Internet grows ever more pervasive, the debate continues over what ought to be the proper relationship between existing law and this new virtual realm called "cyberspace." In this Article, Professor Mayer-Schonberger examines the question from a post- modern perspective and presents his arguments in a unique format comprised of a four-act play to better convey the emotional aspects of the debate and its potential for variable outcomes. The acts are set around only two characters: "authority of law," which represents "the law" and all its attendant social processes, and "cyberspace," which represents both the physical and communicative structures of that realm. Each of the four acts represents a different view of the relationshipbetween "the law" and "cyberspace." Act One depicts a struggle between law and cyberspace that arises from the view that cyberspace is either a sleazy, ruleless place in need of cleaning up, or an extension of the real world. In both cases, law must triumph and subjugate cyberspace so that safety is restoredor to prevent unfairnessfrom the uneven applicationof rules between the real and virtual worlds. The charactersagain do battle in Act Two, but this time cyberspace is the victor, vanquishing law and replacing it with a regulatory framework dictated by the information infrastructure. In Act Three, law and cyberspace coexist, not by cooperating, but by de-coupling from each other. Both retain authority in its own area, with cyberspace existing outside the law, either lawless or open for self-regulation. The last act, Act Four, represents the author's view of the true nature of the relationshipbetween the two characters. -
Player, Pirate Or Conducer? a Consideration of the Rights of Online Gamers
ARTICLE PLAYER,PIRATE OR CONDUCER? A CONSIDERATION OF THE RIGHTS OF ONLINE GAMERS MIA GARLICK I. INTRODUCTION.................................................................. 423 II. BACKGROUND ................................................................. 426 A. KEY FEATURES OF ONLINE GAMES ............................ 427 B. AGAMER’S RIGHT OF OUT-OF-GAME TRADING?......... 428 C. AGAMER’S RIGHT OF IN-GAME TECHNICAL ADVANCEMENT?......................................................... 431 D. A GAMER’S RIGHTS OF CREATIVE GAME-RELATED EXPRESSION? ............................................................ 434 III. AN INITIAL REVIEW OF LIKELY LEGAL RIGHTS IN ONLINE GAMES............................................................................ 435 A. WHO OWNS THE GAME? .............................................. 436 B. DO GAMERS HAVE RIGHTS TO IN-GAME ELEMENTS? .... 442 C. DO GAMERS CREATE DERIVATIVE WORKS?................ 444 1. SALE OF IN-GAME ITEMS - TOO COMMERCIAL? ...... 449 2. USE OF ‘CHEATS’MAY NOT INFRINGE. .................. 450 3. CREATIVE FAN EXPRESSION –ASPECTRUM OF INFRINGEMENT LIKELIHOOD?.............................. 452 IV. THE CHALLENGES GAMER RIGHTS POSE. ....................... 454 A. THE PROBLEM OF THE ORIGINAL AUTHOR. ................ 455 B. THE DERIVATIVE WORKS PARADOX............................ 458 C. THE PROBLEM OF CULTURAL SIGNIFICATION OF COPYRIGHTED MATERIALS. ....................................... 461 V. CONCLUSION .................................................................. 462 © 2005 YALE -
[Thesis Title Goes Here]
REAL ECONOMICS IN VIRTUAL WORLDS: A MASSIVELY MULTIPLAYER ONLINE GAME CASE STUDY, RUNESCAPE A Thesis Presented to the Academic Faculty by Tanla E. Bilir In Partial Fulfillment of the Requirements for the Degree Digital Media in the School of Literature, Communication, and Culture Georgia Institute of Technology December 2009 COPYRIGHT BY TANLA E. BILIR REAL ECONOMICS IN VIRTUAL WORLDS: A MASSIVELY MULTIPLAYER ONLINE GAME CASE STUDY, RUNESCAPE Approved by: Dr. Celia Pearce, Advisor Dr. Kenneth Knoespel School of Literature, Communication, and School of Literature, Communication, and Culture Culture Georgia Institute of Technology Georgia Institute of Technology Dr. Rebecca Burnett Dr. Ellen Yi-Luen Do School of Literature, Communication, and College of Architecture & College of Culture Computing Georgia Institute of Technology Georgia Institute of Technology Date Approved: July 14, 2009 ACKNOWLEDGEMENTS This thesis has been a wonderful journey. I consider myself lucky finding an opportunity to combine my background in economics with my passion for gaming. This work would not have been possible without the following individuals. First of all, I would like to thank my thesis committee members, Dr. Celia Pearce, Dr. Rebecca Burnett, Dr. Kenneth Knoespel, and Dr. Ellen Yi-Luen Do for their supervision and invaluable comments. Dr. Pearce has been an inspiration to me with her successful work in virtual worlds and multiplayer games. During my thesis progress, she always helped me with prompt feedbacks and practical solutions. I am also proud of being a member of her Mermaids research team for two years. I am deeply grateful to Dr. Knoespel for supporting me through my entire program of study.