Born to Run: a Grounded Theory Study of Cheating in the Online Speedrunning Community

Total Page:16

File Type:pdf, Size:1020Kb

Born to Run: a Grounded Theory Study of Cheating in the Online Speedrunning Community The University of Southern Mississippi The Aquila Digital Community Master's Theses Summer 8-2017 Born to Run: A Grounded Theory Study of Cheating in the Online Speedrunning Community Christopher G. Brewer University of Southern Mississippi Follow this and additional works at: https://aquila.usm.edu/masters_theses Part of the Criminology Commons, Social Control, Law, Crime, and Deviance Commons, and the Social Psychology and Interaction Commons Recommended Citation Brewer, Christopher G., "Born to Run: A Grounded Theory Study of Cheating in the Online Speedrunning Community" (2017). Master's Theses. 311. https://aquila.usm.edu/masters_theses/311 This Masters Thesis is brought to you for free and open access by The Aquila Digital Community. It has been accepted for inclusion in Master's Theses by an authorized administrator of The Aquila Digital Community. For more information, please contact [email protected]. BORN TO RUN: A GROUNDED THEORY STUDY OF CHEATING IN THE ONLINE SPEEDRUNNING COMMUNITY by Christopher Glenn Brewer A Thesis Submitted to the Graduate School, the College of Science and Technology, and the School of Criminal Justice at The University of Southern Mississippi in Partial Fulfillment of the Requirements for the Degree of Master of Arts August 2017 BORN TO RUN: A GROUNDED THEORY STUDY OF CHEATING IN THE ONLINE SPEEDRUNNING COMMUNITY by Christopher Glenn Brewer August 2017 Approved by: ________________________________________________ Dr. Joshua Hill, Major Professor Assistant Professor, Criminal Justice ________________________________________________ Dr. Kimberly Chism, Committee Member Assistant Professor, Criminal Justice ________________________________________________ Dr. Laura Gulledge, Committee Member Assistant Professor, Criminal Justice ________________________________________________ Dr. Lisa Nored Chair, Department of Criminal Justice ________________________________________________ Dr. Karen S. Coats Dean of the Graduate School COPYRIGHT BY Christopher Glenn Brewer 2017 Published by the Graduate School ABSTRACT BORN TO RUN: A GROUNDED THEORY STUDY OF CHEATING IN THE ONLINE SPEEDRUNNING COMMUNITY by Christopher Glenn Brewer August 2017 Video games represent a growing genre of media quickly becoming one of the leading forms of entertainment (Jordan, 2014). This popularity has allowed new playstyles to emerge across the video game genre, such as e-Sports and speedrunning. In particular, the speedrunning community has somewhat redefined what it means to “cheat” in a video game by accepting the use of certain software and hardware violations that could be seen as “cheating” to the general gaming community. This paper examined the social construction of cheating in this digital community through the use of grounded theory methods. ii ACKNOWLEDGMENTS The completion of this thesis would not have been possible without the guidance from my committee members: Dr. Joshua Hill, Dr. Kimberly Chism, and Dr. Laura Gulledge. I would like to thank them for their valuable time and unwavering support throughout my graduate experience here at USM. The lessons I have learned from them will undoubtedly follow me into the next chapter of my life. I would like to thank Dr. Dean Bertram for the experiences and training I have been given. I would also like to thank Dr. Lisa Nored and the rest of the department for allowing me to be a part of this great program. Graduate school is definitely a large undertaking. I would like to thank my fellow graduate students for their support as well. The relationships I have developed throughout my time here has helped tremendously in shaping my graduate experience. Lastly, I would like to thank speedrunners GothicLogic, JazzyChoi1991, IHNN, ItsJabo, MikeMint, and EZScape for their valuable and rich descriptions of the speedrunning phenomenon. iii DEDICATION To my mom and my sister, who have been with me from the very beginning, who I can always rely upon in helping me through the difficult times, and who I love very much. iv TABLE OF CONTENTS ABSTRACT ........................................................................................................................ ii ACKNOWLEDGMENTS ................................................................................................. iii DEDICATION ................................................................................................................... iv LIST OF TABLES ........................................................................................................... viii LIST OF ILLUSTRATIONS ............................................................................................. ix LIST OF ABBREVIATIONS ............................................................................................. x CHAPTER I – INTRODUCTION ...................................................................................... 1 CHAPTER II – LITERATURE REVIEW ......................................................................... 5 Cheating in Sports ........................................................................................................... 5 Cheating in Education ................................................................................................... 10 Cheating in Digital Communities ................................................................................. 13 Deviance in Gaming Communities ........................................................................... 14 Motivations for Cheating in Games .......................................................................... 20 CHAPTER III - METHODOLOGY ................................................................................. 23 CHAPTER IV – DATA .................................................................................................... 27 A Reintroduction to Speedrunning ............................................................................... 27 Arguments Against Glitches ..................................................................................... 27 Arguments Against Developer’s Intent .................................................................... 28 Rebuttals ................................................................................................................... 29 v Definitions from the Community .............................................................................. 32 Cheating as Defined in the Speedrunning Community................................................. 33 Hardware ................................................................................................................... 34 Software .................................................................................................................... 35 Code Changes ....................................................................................................... 35 Exploits ................................................................................................................. 38 Hacks..................................................................................................................... 42 Walkthroughs ........................................................................................................ 43 Emulators .............................................................................................................. 44 Splicing ................................................................................................................. 46 How Cheating Comes to be Defined in the Speedrunning Community ....................... 47 Speedrunning Communities ...................................................................................... 47 Rule Creation ............................................................................................................ 49 Initial Phase ........................................................................................................... 49 Decision Phase ...................................................................................................... 50 Final Phase ............................................................................................................ 53 Verification ............................................................................................................... 53 The Essence of Speedrunning ....................................................................................... 55 Trust .......................................................................................................................... 55 Entertainment ............................................................................................................ 57 vi Skill ........................................................................................................................... 58 An Explanation of Cheating in Speedrunning .............................................................. 59 CHAPTER V – CONCLUSION ....................................................................................... 65 Limitations .................................................................................................................... 69 Future Research ............................................................................................................ 70 APPENDIX A – IRB Approval Letter .............................................................................. 72 APPENDIX B – Information Letter .................................................................................. 73 APPENDIX
Recommended publications
  • Security in Online Gaming Bachelor Thesis Information Science
    RADBOUD UNIVERSITY NIJMEGEN Security in online gaming Bachelor Thesis Information Science Rens van Summeren January 26, 2011 Online gaming has gone through an explosive growth in popularity during the last decade, and continues to grow at a great speed. With this growth in popularity and thus in the amount of players, the need for security also becomes increasingly clear. This thesis aims to provide a definition of security in online gaming, as well as security analysis for the various threats with examples and countermeasures. The goal is to help players and game developers assess online gaming security, and inform security experts about existing issues. CONTENTS 1 Introduction ................................................................................................................................... 1 Definition ............................................................................................................................... 1 Preface .................................................................................................................................. 1 2 Online Gaming ............................................................................................................................... 2 2.1 Why Look at the Security of Online Games? ................................................................... 2 2.2 Types of Online Games and Business Models ................................................................. 2 2.3 Massive Multiplayer Online Games ................................................................................
    [Show full text]
  • Comparative Study of Anti-Cheat Methods in Video Games
    Comparative Study of Anti-cheat Methods in Video Games Samuli Lehtonen Master’s thesis UNIVERSITY OF HELSINKI Department of Computer Science Helsinki, March 7, 2020 HELSINGIN YLIOPISTO — HELSINGFORS UNIVERSITET — UNIVERSITY OF HELSINKI Tiedekunta — Fakultet — Faculty Laitos — Institution — Department Faculty of Science Department of Computer Science Tekijä — Författare — Author Samuli Lehtonen Työn nimi — Arbetets titel — Title Comparative Study of Anti-cheat Methods in Video Games Oppiaine — Läroämne — Subject Computer Science Työn laji — Arbetets art — Level Aika — Datum — Month and year Sivumäärä — Sidoantal — Number of pages Master’s thesis March 7, 2020 71 + 48 as appendices Tiivistelmä — Referat — Abstract Online gaming is more popular than ever and many video game companies are reliant on the cash flow generated by online games. If a video game company wants its game to be successful, the game has to be resilient against cheating, the presence of which can ruin an otherwise successful game. Cheating in a video game can bankrupt an entire company as the non-cheating players leave the game because of unscrupulous individuals using cheats to gain an unfair advantage. Cheating can also involve criminal activity where maliciously acquired in-game items are traded against real money online. Commercial cheat programs are sold on online black markets and are available even to players who have no deep technical knowledge. The widespread availability and easy accessibility of cheats compounds the issue. This thesis will categorize different anti-cheat techniques and give a brief history of anti-cheat starting from the early 1980s. The history section describes how the fight against online cheating began and how it has evolved over the years.
    [Show full text]
  • KARELIA University of Applied Sciences Degree Programme in Business Information Technology
    KARELIA University of Applied Sciences Degree Programme In Business Information Technology Elmeri Telimaa Hacking Detection in Unreal Engine 4 Thesis May 2021 THESIS February 2021 Business Information Technology Tikkarinne 9 80200 JOENSUU FINLAND + 358 13 260 600 (switchboard) Author (s) Elmeri Telimaa Title Hacking Detection in Unreal Engine 4 Commissioned by - Abstract The goal of the thesis is to find an integrated tool within Unreal Engine 4 for detecting and combating cheating, that is quick to implement in a project. To achieve this goal, a prototype game was created and speedhacked. A counter for this hack was then implemented. Cheating in online games results in worse experience for the other players playing against the cheater, who then take their business elsewhere. This has a negative impact on both the game developer’s reputation and revenue. The speedhack used manipulates time on a client, making the user move more than intended. The detection method included within Unreal Engine 4 compares the time sent by the client to the time of the server to determine if there is discrepancy in the values. Using these values, we can determine if the client is speedhacking. The used detection method detected the hack and kicked the offending client out of the server. The method is easy to implement in a new project. Language Pages 32 English Appendices 1 Pages of Appendices 1 Keywords Unreal Engine, cheating, online games, speedhack, anti-cheat OPINNÄYTETYÖ Helmikuu 2021 Tietojenkäsittelyn koulutusohjelma Tikkarinne 9 80200 JOENSUU +358 13 260 600 (vaihde) Tekijä(t) Elmeri Telimaa Nimeke Hacking Detection in Unreal Engine 4 Toimeksiantaja - Tiivistelmä Tämän opinnäytetön tavoitteena on löytää Unreal Engine 4-pelimoottoriin integroitu työkalu, jonka avulla voidaan havaita ja estää huijaamista.
    [Show full text]
  • 1 Fully Optimized: the (Post)Human Art of Speedrunning Like Their Cognate Forms of New Media, the Everyday Ubiquity of Video
    Fully Optimized: The (Post)human Art of Speedrunning Item Type Article Authors Hay, Jonathan Citation Hay, J. (2020). Fully Optimized: The (Post)human Art of Speedrunning. Journal of Posthuman Studies: Philosophy, Technology, Media, 4(1), 5 - 24. Publisher Penn State University Press Journal Journal of Posthuman Studies Download date 01/10/2021 15:57:06 Item License https://creativecommons.org/licenses/by-nc-nd/4.0/ Link to Item http://hdl.handle.net/10034/623585 Fully Optimized: The (post)human art of speedrunning Like their cognate forms of new media, the everyday ubiquity of video games in contemporary Western cultures is symptomatic of the always-already “(post)human” (Hayles 1999, 246) character of the mundane lifeworlds of those members of our species who live in such technologically saturated societies. This article therefore takes as its theoretical basis N. Katherine Hayles’ proposal that our species presently inhabits an intermediary stage between being human and posthuman; that we are currently (post)human, engaged in a process of constantly becoming posthuman. In the space of an entirely unremarkable hour, we might very conceivably interface with our mobile phone in order to access and interpret GPS data, stream a newly released album of music, phone a family member who is physically separated from us by many miles, pass time playing a clicker game, and then absentmindedly catch up on breaking news from across the globe. In this context, video games are merely one cultural practice through which we regularly interface with technology, and hence, are merely one constituent aspect of the consummate inundation of technologies into the everyday lives of (post)humans.
    [Show full text]
  • Cheating by Video Game Participants
    Cheating by Video Game Participants J.R. Parker University of Calgary [email protected] Abstract In this paper, I explore the concept of cheating in the medium of the video game. Why do people do it? How does online cheating differ from offline? The existence of cheat codes seems to imply that cheating is rampant and even encouraged - or perhaps it’s just that the codes are poorly named. I also look at criminal activity in games, and at some ways to reduce cheating activities in online games. Introduction The word ‘cheat’ carries with it ancient societal passions. There is deception associated with the word, a lie, but more than that. There is a deliberation about cheating that makes it a worse lie than most, and there is an implication of doing someone harm in order to benefit oneself. Biblical cheats have died for their sin, and card cheats in the old West suffered a similar fate. Technology has changed the manner in which people can cheat, and has created many new ways to do it. So-called computer crime, identity theft, phishing, and other modern ways of cheating are enabled by the prevalent use of digital technology in many areas of society. Of course, the activities listed above are actually crimes; yet non-criminal cheating takes place too. Plagiarism is now very easy because of search engines and the Internet (easier to detect, too!). People misrepresent their identity on the Web with greater frequency, sometimes in self-defense. Cheating at games has traditionally been held in low regard because people that you play with are often friends.
    [Show full text]
  • Ready Player One by Ernest Cline
    Ready Player One by Ernest Cline Chapter 1 Everyone my age remembers where they were and what they were doing when they first heard about the contest. I was sitting in my hideout watching cartoons when the news bulletin broke in on my video feed, announcing that James Halliday had died during the night. I’d heard of Halliday, of course. Everyone had. He was the videogame designer responsible for creating the OASIS, a massively multiplayer online game that had gradually evolved into the globally networked virtual reality most of humanity now used on a daily basis. The unprecedented success of the OASIS had made Halliday one of the wealthiest people in the world. At first, I couldn’t understand why the media was making such a big deal of the billionaire’s death. After all, the people of Planet Earth had other concerns. The ongoing energy crisis. Catastrophic climate change. Widespread famine, poverty, and disease. Half a dozen wars. You know: “dogs and cats living together … mass hysteria!” Normally, the newsfeeds didn’t interrupt everyone’s interactive sitcoms and soap operas unless something really major had happened. Like the outbreak of some new killer virus, or another major city vanishing in a mushroom cloud. Big stuff like that. As famous as he was, Halliday’s death should have warranted only a brief segment on the evening news, so the unwashed masses could shake their heads in envy when the newscasters announced the obscenely large amount of money that would be doled out to the rich man’s heirs. 2 But that was the rub.
    [Show full text]
  • Real Robux Hacks
    Real Robux Hacks Real Robux Hacks CLICK HERE TO ACCESS ROBLOX GENERATOR Chity pozvolyayut podstraivat igru roblox pod vas. Generiruyte resursy robuksy poluchayte btools roblox hack prevoskhodstva za schet aima i vkh. Skachat. Roblox hack items free. 2019 Roblox Jailbreak Hack Exploit For Roblox Btools Noclip. Roblox hack obc 2018. free car jailbreak roblox Roblox Clothes Id Girl List Of Free Items On Roblox General Guide 2021 Slg - This is a list of all active and working roblox promo codes that will get you free clothes and items without having to spend any robux. Original Resolution: 695x695 px - Cute black top w/ brown hair. free roblox dress up how to get free coins on assassin roblox 2017 (Working April 2021) In This Video, I complete a obby that is supposed to give you, so watch until the end to see if it actually works and gives me robux! codes that work, roblox codes, roblox promo codes for free items, free items on roblox, free roblox items 2021, free items roblox, robux roblox... Cheat Engine Icon At Getdrawingscom Free Cheat Engine. Cheat Engine Cheating In Video Games Android Roblox Png. Videos Matching Undetected Cheat Engine For Roblox Download. 3x Strength Saber Simulator Roblox. How To Hack Money In Restaurant City 120909 Web Games. hack for rubux on roblox how to get clothes for free on roblox free robux cards no survey how to get free robux in a ad Generate free easy Robux today with the number one tool for getting free Robux online! Without you guys doing these offers the Robux would go away! A lot of people wonder how they can get free Robux on Roblox! But why is it that so many players want..
    [Show full text]
  • Linux Journal 23 FOSS Project Spotlight: Nitrux, a Linux Distribution with a Focus on Appimages and Atomic Upgrades by Nitrux Latinoamerican S.C
    ModSecurity Globbing Edit PDFs and nginx and Regex with Xournal Since 1994: The original magazine of the Linux community Linux Gaming A Talk with Linux Game Developers | Review: Thrones of Britannia Two Portable DIY Retro Console Projects | Survey of Native Linux Games TASBot the Linux-Powered Robot Plays Games for Charity ISSUE 290 | SEPTEMBER 2018 www.linuxjournal.com SEPTEMBER 2018 CONTENTS ISSUE 290 86 DEEP DIVE: Gaming 87 Crossing Platforms: a Talk with the Developers Building Games for Linux By K.G. Orphanides Games for Linux are booming like never before. The revolution comes courtesy of cross-platform dev tools, passionate programmers and community support. 105 Would You Like to Play a Linux Game? By Marcel Gagné A look at several games native to Linux. 117 Meet TASBot, a Linux-Powered Robot Playing Video Games for Charity By Allan Cecil Can a Linux-powered robot play video games faster than you? Only if he . takes a hint from piano rolls...and the game for Linux in November 2016. Enix. Feral Interactive released and published by Square , developed by Eidos Montréal doesn’t desync. 135 Review: Thrones Shroud of the Avatar Shroud of Britannia Deus Ex: Mankind Divided By Marcel Gagné from from A look at the recent game from the Total War series on the Linux desktop Image from Portalarium’s Portalarium’s Image from thanks to Steam and Feral Interactive. Cover image 2 | September 2018 | http://www.linuxjournal.com CONTENTS 6 Letters UPFRONT 14 Clearing Out /boot By Adam McPartlan 17 VCs Are Investing Big into a New Cryptocurrency: Introducing Handshake By Petros Koutoupis 20 Edit PDFs with Xournal By Kyle Rankin 22 Patreon and Linux Journal 23 FOSS Project Spotlight: Nitrux, a Linux Distribution with a Focus on AppImages and Atomic Upgrades By Nitrux Latinoamerican S.C.
    [Show full text]
  • ESPORTS a Guide for Public Libraries
    ESPORTS A Guide for Public Libraries 1 Contents Introduction…………….….……….………….…………3 Esports 101….……….….……….………….….….…….4 What Are Esports? Why Are Esports a Good Fit for Libraries? Esports & the Public Library……….…….…….………6 Making a Library Team Other Ways Libraries Can Interact with Video Games Partnerships….……………..…….……………….….….9 Local Partners North America Scholastic Esports Federation Technical Requirements…….………..….……….……10 Creating Internet Videos….…………….……….……12 Recording Editing Uploading IP & Privacy Considerations…………….…………….15 IP Considerations for Video Sharing Privacy A Note on ESRB Ratings Glossary………….……….……….……….……………18 Acknowledgements…….……….………..……………28 Further Reading….….……….…..………….……….…29 URLs……..……….….….……….……………………….30 2 Introduction In September 2019, Pottsboro Area Library in Pottsboro, TX, began an esports program funded by a IMLS grant. With ten new gaming computers and a vastly improved internet connection, Pottsboro Library has acted as a staging location for an esports team in association with Pottsboro High School, opening new hours on Saturdays for the team to practice in private. This collaboration also includes the esports club of nearby Austin College, whose students serve as mentors for the library’s club, and the North America Scholastic Esports Federation (NASEF), which has provided information and assistance in setting up the team to play in its high school league. In addition to being used by the team, four of the gaming computers are open for public use, which has attracted younger patrons to the library and provides new options for children and young adults in an area where internet access is otherwise extremely limited. This guide is intended for public libraries that are interested in esports or video games for any reason—to increase participation of young adults in library programming, to encourage technological skills and literacy, to provide a space for young people to gather and practice teamwork, etc.
    [Show full text]
  • Weber Writes 2010 Weber Writes 2010  I 2
    1 Weber Writes 2010 2 Weber Writes 2010 i Table of Contents Foreword .............................................................................................ii Research and Argument .................................................................1 Maryam Ahmad, “France’s War on Religious Garb” .............3 Liz Borg, “When it Comes to Sex and Jr.” ..............................9 Brandi Christensen, “Communism and Civil War”............. 13 Casey Crossley, “Integrity Deficit: The Scarcity of Honor in Cable News” .................................................... 18 Chris Cullen, “The Power of Misconception” .................... 28 Chase Dickinson, “Are Kids on a One-Way Path to Violence?” ............................................................ 35 Melissa Healy, “Lessons from a Lionfish”............................ 39 Feliciana Lopez, “The Low Cost of Always Low Prices” .......................................................... 43 Sarah Lundquist, “Women in the Military: The Army Combat Exclusion” ............................................... 48 Jamie Baer Mercado, “Radical or Rational?” ........................ 57 Olivia Newman, “Science Friction” ...................................... 63 Jason Nightengale, “Cheating and Steroids” ........................ 68 Paulette Padilla, “Grotesque Entertainment: Should It Be Legal?” ........................................................ 76 Dolly Palmer, “The Social and Physiological Separation of Space” ....................................................... 82 Michael Porter, “Are
    [Show full text]
  • Weigel Colostate 0053N 16148.Pdf (853.6Kb)
    THESIS ONLINE SPACES: TECHNOLOGICAL, INSTITUTIONAL, AND SOCIAL PRACTICES THAT FOSTER CONNECTIONS THROUGH INSTAGRAM AND TWITCH Submitted by Taylor Weigel Department of Communication Studies In partial fulfillment of the requirements For the Degree of Master of Arts Colorado State University Fort Collins, Colorado Summer 2020 Master’s Committee: Advisor: Evan Elkins Greg Dickinson Rosa Martey Copyright by Taylor Laureen Weigel All Rights Reserved ABSTRACT ONLINE SPACES: TECHNOLOGICAL, INSTITUTIONAL, AND SOCIAL PRACTICES THAT FOSTER CONNECTIONS THROUGH INSTAGRAM AND TWITCH We are living in an increasingly digital world.1 In the past, critical scholars have focused on the inequality of access and unequal relationships between the elite, who controlled the media, and the masses, whose limited agency only allowed for alternate meanings of dominant discourse and media.2 With the rise of social networking services (SNSs) and user-generated content (UGC), critical work has shifted from relationships between the elite and the masses to questions of infrastructure, online governance, technological affordances, and cultural values and practices instilled in computer mediated communication (CMC).3 This thesis focuses specifically on technological and institutional practices of Instagram and Twitch and the social practices of users in these online spaces, using two case studies to explore the production of connection- oriented spaces through Instagram Stories and Twitch streams, which I argue are phenomenologically live media texts. In the following chapters, I answer two research questions. First, I explore the question, “Are Instagram Stories and Twitch streams fostering connections between users through institutional and technological practices of phenomenologically live texts?” and second, “If they 1 “We” in this case refers to privileged individuals from successful post-industrial societies.
    [Show full text]
  • SEUM: Speedrunners from Hell Think Arcade
    Warp Reference: SEUM: Speedrunners From Hell Think Arcade ----- Context ----- SEUM: Speedrunners from Hell is about a man named Marty who has his beer stolen by Satan. He proceeds to head to hell to get it back. That’s about it really. The game focuses more on gameplay, only incorporating story to give some context as to why the player is running through hell. ----- What Worked Well ----- Short, Simple Levels: Levels were, for the most part, were very lightweight and were designed to be completed in 20 seconds or less. This allowed the game to have 80+ levels in it, and it doesn’t feel exhausting to players to complete them all. In addition, levels that introduced a new power up or mechanic were extremely simple and focused solely on that new element, and allowing other levels to introduce how it mixed with other mechanics. This created a sort of modular design, where each level served a specific purpose. Also, levels were cleverly named to describe what the player was supposed to do, learn, or overcome, which at times served as a hint. Figure 1: A tutorial level 1 8/2/18 Warp Reference: SEUM: Speedrunners From Hell Think Arcade Figure 2: A slightly more complex level Figure 3: More difficult level still confined to a single tower Instant Restart: Levels load incredibly fast in SEUM, and with the press of the ‘R’ key the player instantly restarts the level back to its initial state. There’s no lengthy death sequence, and as soon as the player knows they messed up they can immediately restart and be back in the action in well under a second.
    [Show full text]