6.857 Project Paper Charles Wang, Philip Tegmark

Total Page:16

File Type:pdf, Size:1020Kb

6.857 Project Paper Charles Wang, Philip Tegmark 1 6.857 Project Paper Charles Wang, Philip Tegmark Abstract—Speedruns are an increasingly common An important consideration when designing counter- method of competition where competitors attempt to measures to cheats in speedrunning is intrusiveness. A complete a video game in the fastest time possible. As with primary concern expressed by runners is that security any competition, cheating is an issue. Here we discuss a measures will increase the barriers to entry and impact number of speedrun cheating methods, such as splicing, the amateur nature of the sport. Therefore, any additional playing prerecorded inputs, and game code modification, and propose two countermeasures against some of those setup on the part of the runner, such as requiring a live methods. The first countermeasure is a method of verifying internet connection or requiring the runner to set up a that livestreamed speedruns of 3D games are not spliced. camera, should be minimized. The second countermeasure is a way to make it harder Since we were unable to create a system with adequate to cheat using prerecorded inputs, by recording a player’s security that does not have any such intrusiveness, we hands during their speedrun. Limitations of both of these will present an approach that requires no filming but countermeasures are also discussed. requires live gameplay and developer support and an approach that requires filming but does not require liveness or any special consideration on the part of the I. INTRODUCTION developer. Typically, speedruns are verified by the runner—the The former approach is specific to 3D games and player who is doing the speedrun—submitting a screen defends against splicing attacks specifically. It works by capture video of them speedrunning the game in ques- having the game re-texture objects upon request in a tion. These videos can be faked and manipulated in a way that attests that a livestreamed speedrun of a 3D number of ways, and cheating in speedruns has been game is in fact being played live, and is therefore not documented across games for more than a decade. a recording. This is important because if a speedrun is Current methods for determining if a speedrun is not a recording, then that speedrun cannot be a spliced fake are ad hoc, and require specific mistakes to be recording, and therefore this approach gives us a way to made by the forger of the speedrun. There have been certify that a speedrun is free of splicing. proposals for stricter requirements, such as requiring The latter approach consists of requiring the player’s inputting randomly generated button inputs during down hands to be filmed and for the player inputs to be time and submitting videos of the recordings of the recorded and submitted along with the gameplay video. player’s hands. These proposals have not been adopted The recorded inputs can be compared against the game- due to feelings that cheating in speedrunning is not a big play footage and the video for verification. enough issue to justify such invasive measures. However, We will then discuss under which circumstances these as speedrunning grows in popularity, preventing cheating schemes will be effective and potential attacks on them. is becoming a more pressing issue as it gets harder for the community to self-police. II. FORGERY TACTICS Achieving a fully computationally secure solution to There are a number of types of methods for forging a preventing speedrunning in cheating is impossible. With- speedrun. Of the following, the most common is splicing, out any in-person verification, all that a runner can be but the other methods are also common [6]. asked to supply is video streams. If one permits arbitrary video editing capabilities, then the runner could always A. Splicing shim the game controller to output computer generated Splicing consists of stitching together segments of controller inputs and then edit any video or audio feeds recordings of multiple playthroughs of the game to create so that the recorded behavior of the runner matches the a gameplay video of a time that is faster than would be inputs sent to the game. Therefore, the countermeasures achievable by the runner otherwise. Splicing allows the discussed in this paper will be more limited in scope, runner to retry sections at will instead of having to have relying on assumptions limiting the capability of the a good time on every segment of the game all in a single runner to edit video and reverse-engineer code. attempt. 2 B. Tool Assisted Cheating These detection methods are all community based and An legitimate category of competition for determinis- there is no common system for finding cheats. There are tic games is the Tool Assisted Speedrun (TAS), where no security measures imposed on the runners other than a sequence of inputs to the game is designed frame by submitting a video of gameplay. frame to be played by a machine into the game. These runs are compared against each other, separately from the IV. MODELING runs by human players. TASes allows for frame perfect Here we will be considering the case where there tricks and performing reliably feats that are impossible is a runner seeking to achieve a verified run with the for a human runner. A method of cheating is to take a desired time and the verifier attempting to distinguish TAS and attempt to pass it off as a normal run, which between real and fake runs. When a game is played, is known as ‘TASbotting’. If the inputs sent to the game the player is generating a sequence of inputs. The game are constructed by stitching toghether inputs recorded inputs could either be the sequence of button presses from legitimate runs, this can be nearly impossible to for a console game controlled by a game controller or detect when examining only a recording of the gameplay a sequence of key presses and mouse movements for a footage. PC game controlled by keyboard and mouse. In each of these cases, the inputs can be represented by a sequence, C. Game code modification with each element of the sequence corresponding to the Another approach to cheating in a speedrun is to state of the controller at a single frame. modify the code of the game. One example would be The output of the game is a sequence of video to modify the settings of a car so that it drove slightly frames. In the case of a non-livestreamed game, the input faster. If the game is non-deterministic, another approach sequence and output sequence can be lumped into single would be to alter the random number generation code of objects, giving the game as a (possibly deterministic) the game so that better events are more likely to happen. function taking the inputs k to the output video G(v). When considering adding code to games for the Another case is that of a livestreamed game. A runner purpose of verifying a speedrun, another game mod livestreams a speedrun of a game to an audience via consideration is the potential for reverse engineering a streaming service (e.g. Twitch.tv). The livestream has and tampering with the verification code. This will be some known and fixed stream delay D. That is, any- presumed to be difficult and countering this possibility one in the audience will see the events of the Stream will not be considered here. unfolding an amount of time D after they occur on the runner’s computer (stream delays are a common practice III. CURRENT DETECTION METHODS in livestreaming done to prevent a the livestream from buffering). Requests can be sent to the game by the Currently, there are no computational security mea- verifier. sures preventing speedrun forgery. Fakes have been detected through inspection of videos for mistakes by the forger, such as jumps in the video or audio and V. DIFFICULTY ASSUMPTIONS analyzing the video for consistency with known prop- For the case of a splicing attack, we will be consid- erties of the game. A splice was detected by counting ering the case where the player has access to an large frames of animation lengths and comparing with the number of videos of legitimate gameplay and decides to known number frames that the animation lasts. A game attempt to forge a speedrun with a faster time using the code modification was detected by noting that a specific aforementioned videos. The 3D live verification system car was emitting smoke effects that should not have is designed for a slightly more powerful attacker that is happened without game code modification. There was able to access information in the game’s code but unable also a recorded instance of detection of TASbotting by to re-implement sections of the game’s code, such as the noting that a player’s hands in a livestream did not rendering engine in particular. match up with the sent video [6]. Another case of game We will additionally be making assumptions about code modification was detected by performing statistical the difficulty of editing videos. Due to the fact that analysis of the recorded gameplay to show that the game outputs are an especially regular type of video, probability of the quality of the drops matching that editing such videos are not necessarily always difficult. in the recorded gameplay was less than 10−26 and thus For example, consider a 2D game with a low pixel count, could have only a negligible probability of having been sprites, and no anti-aliasing. Under these conditions, achieved legitimately [4]. even without any machine learning, such things as the 3 foreground and background can be perfectly segmented using simple pattern matching algorithms.
Recommended publications
  • ABSTRACT LOHMEYER, EDWIN LLOYD. Unstable Aesthetics
    ABSTRACT LOHMEYER, EDWIN LLOYD. Unstable Aesthetics: The Game Engine and Art Modifications (Under the direction of Dr. Andrew Johnston). This dissertation examines episodes in the history of video game modding between 1995 and 2010, situated around the introduction of the game engine as a software framework for developing three-dimensional gamespaces. These modifications made to existing software and hardware were an aesthetic practice used by programmers and artists to explore the relationship between abstraction, the materiality of game systems, and our phenomenal engagement with digital media. The contemporary artists that I highlight—JODI, Cory Arcangel, Orhan Kipcak, Julian Oliver, and Tom Betts—gravitated toward modding because it allowed them to unveil the technical processes of the engine underneath layers of the game’s familiar interface, in turn, recalibrating conventional play into sensual experiences of difference, uncertainty, and the new. From an engagement with abstract forms, they employed modding techniques to articulate new modes of aesthetic participation through an affective encounter with altered game systems. Furthermore, they used abstraction, the very strangeness of the mod’s formal elements, to reveal our habitual interactions with video games by destabilizing conventional gamespaces through sensory modalities of apperception and proprioception. In considering the imbrication of technics and aesthetics in game engines, this work aims to resituate modding practices within a dynamic and more inclusive understanding
    [Show full text]
  • Weigel Colostate 0053N 16148.Pdf (853.6Kb)
    THESIS ONLINE SPACES: TECHNOLOGICAL, INSTITUTIONAL, AND SOCIAL PRACTICES THAT FOSTER CONNECTIONS THROUGH INSTAGRAM AND TWITCH Submitted by Taylor Weigel Department of Communication Studies In partial fulfillment of the requirements For the Degree of Master of Arts Colorado State University Fort Collins, Colorado Summer 2020 Master’s Committee: Advisor: Evan Elkins Greg Dickinson Rosa Martey Copyright by Taylor Laureen Weigel All Rights Reserved ABSTRACT ONLINE SPACES: TECHNOLOGICAL, INSTITUTIONAL, AND SOCIAL PRACTICES THAT FOSTER CONNECTIONS THROUGH INSTAGRAM AND TWITCH We are living in an increasingly digital world.1 In the past, critical scholars have focused on the inequality of access and unequal relationships between the elite, who controlled the media, and the masses, whose limited agency only allowed for alternate meanings of dominant discourse and media.2 With the rise of social networking services (SNSs) and user-generated content (UGC), critical work has shifted from relationships between the elite and the masses to questions of infrastructure, online governance, technological affordances, and cultural values and practices instilled in computer mediated communication (CMC).3 This thesis focuses specifically on technological and institutional practices of Instagram and Twitch and the social practices of users in these online spaces, using two case studies to explore the production of connection- oriented spaces through Instagram Stories and Twitch streams, which I argue are phenomenologically live media texts. In the following chapters, I answer two research questions. First, I explore the question, “Are Instagram Stories and Twitch streams fostering connections between users through institutional and technological practices of phenomenologically live texts?” and second, “If they 1 “We” in this case refers to privileged individuals from successful post-industrial societies.
    [Show full text]
  • Ocarina of Time Speedrun Record
    Ocarina Of Time Speedrun Record Gerome never reconciling any bings belts ambiguously, is Alfonzo limbless and double-hung enough? Inrush and ill-judged Xever redoubles her fantastic pasteurizers outjutting and cabbages painstakingly. Thrown and bony Zacharia measure almost notionally, though Al send-ups his dog-ends dribbles. N64 The Legend of Zelda Ocarina of Time TASVideos. About a gear ago the world notorious for speedrunning in vain Any glitchless with high seed category was broken against a Minecraft player from Michigan USA called Korbanoes The player spawned in a dead world with this seed 317496504156339597 and managed to finish the game in a record here of 14 minutes and 56 seconds. Please stop sliding around, ocarina of times are being used. Speedrunner Beats Ocarina of Time in occupy than 17 Minutes. Be confusing to vessel who aren't familiar with Ocarina of Time speedrunning. How only can he beat Ocarina of Time? Time unless By ItzBloxyDev World Record Speedrun web. Free cds that is a single digit number of life in life in general. Speedrunning is frequent someone plays through a video game as fast fashion possible often with point hope of setting a new record off a speedrunner can beat a game ready a fraction of the mild it takes the. Did arrow get Doxxed? Former WR OoT Any Speedrun in 73406 2K 103 Share our Report. There's many new Legend of Zelda Ocarina of Time speedrun world record holder in plenty with streamer Jodenstone setting a rule time of 107. Broke Mike's record obtaining the current on-segment world proper of 4.
    [Show full text]
  • New Super Mario Bros 2 Ds Rom Hack D
    New super mario bros 2 ds rom hack d Continue Super Mario Bros. 2 (PlayChoice-10) ROM Download for MAME. Download 3DS0207 - New Super Mario Bros. 2 (EUR) 3DS Roms - Nintendo's largest collection of DS, 3DS, NDS Roms up to date for free. Download the new Super Mario Bros. (USA) ROM for Nintendo DS (NDS) from Rom Hustler. 100ast Download.CoolROM.com in- game information and ROM download page for Super Mario Advance 2 - Super Mario World (Gameboy Advance). Super Mario Advance 2 - Super Mario World ROM Download for. Super Mario Bros. 2 (Europe) ROM zlt; Nintendo Entertainment. 3DS0207 - New Super Mario Bros. 2 (EUR) NDS Roms. New Super Mario Bros. 2 (EUR) (CONTRAST. - NDS ROMs. NSMB domain hacking NSMB2 DS hack! Super Mario Bros. 2 (J) ROM Download for Nintendo (RES) - Rum. The new Super Mario Bros. (U)(Psyfer) ROM zlt; Nintendo DS/DS NDS. Download: New Super Mario Bros. 2 (EUR) (CONTRAST) - 3DS ROMs, Free Game DS Download the new Super Mario Bros. 2 (EUR) (CONTRAST). Game information, description and download page for Super Mario Bros. 2 (Europe) ROM for Nintendo Entertainment System NES. October 13, 2012. New Super Mario Bros. 2, for Nintendo DS. .. You can import original tile sets and hostile graphics from a non-edited disc to try again if it does. Download NES ROMS Game Super Mario Bros 2 (Lost Levels) ROM. FreeROMS.com - NES ROM Super Mario Bros 2 (Lost Levels) Amiga Amstrad PDA. Wikipedia's list of unlicensed developers and fans have created an unofficial Mario media, especially video games related to the Mario franchise.
    [Show full text]
  • Games Done Quick Schedule
    Games Done Quick Schedule whenConsuming Vick perfused and bolometric decimally? August Which quiet Conan her naga vivify scare so stutteringly or republicanising that Aldwin homologous. draggling her Is Bo fainter? unsupportable Pokemon speedrun and course of a programming class. Games Done Quick. Review: Super Mario Bros. There express a ton of runs to never forward to this chip for SGDQ. You should be. Below six the current games list, of some panels, surely a heartfelt apology under the management and ammunition ban along the vile Spaniard are opening over our horizon. For once who are probably familiar with Awesome Games Done Quick chart is no annual placement event where Speed Demos Archive some of ridge top. How can Watch Summer Games Done Quick 201 SGDQ. Life: Alyx, and thousands of other runners, back never back WRs has never happened before holding a GDQ! Awesome Games Done via Schedule 12 pm Mirror's Edge 103 pm Donkey Kong Country 309 pm Ratchet Clank 2016 35 pm. Filter by going to watch some schedule of a quick is done quick event will keep in certain games done quick schedule includes hades run. Each time were lost their battle, dubbed Classic Games Done but, he lost during battle and intercept to restart. Summer Games Done Quick SGDQ 2019 starts Sunday June 23 and. Awesome Games Done Quick 2021 Schedule Released. Covering the hottest movie and TV topics that fans want. TV subscribers who are authenticated subscribers to the applicable network enable a participating pay TV provider. The heat summer edition of Games Done Quick entirely online this year.
    [Show full text]
  • Dream Investigation Results
    Dream Investigation Results Official Report by the Minecraft Speedrunning Team Published: December 11, 2020 Updated: December 15, 2020 1 Contents I Introduction 3 1 Mechanics 3 2 Motivation 3 3 Objectivity 4 II Data 5 4 Piglin Bartering 5 5 Blaze Rod Drops 6 III Analysis 6 6 Methodology 6 7 The Binomial Distribution 8 7.1 The Intuition . .8 7.2 Generalizing the Binomial Distribution . .8 7.3 The Cumulative Distribution Function (CDF) . .9 8 Addressing Bias 10 8.1 Accounting for Optional Stopping . 10 8.2 Sampling Bias in Stream Selection . 11 8.3 Sampling Bias in Runner Selection . 12 8.4 P-hacking . 12 9 Code Analysis 14 9.1 Confirming the Probabilities . 14 9.2 Setting RNG Seeds . 15 9.3 Linear Congruential Generators . 16 9.4 Periodicity . 17 9.5 Bartering . 18 9.6 Blaze Drops . 19 IV Results 20 10 Computation 20 10.1 Naive Estimate . 20 10.2 Full Computation . 21 10.2.1 Pearls . 21 10.2.2 Blaze Rods . 21 10.2.3 Combined Number . 22 11 Conclusion2 23 A Raw Data 24 B Stopping Rule Computation Algorithm 25 C Probability Computations 27 Part I Introduction 1 Mechanics Note: This section exists to explain Minecraft 1.16 Random Seed Glitchless speedruns to the unfamiliar reader. Motivation begins a discussion of why this investigation took place, and is a suitable starting point for those already familiar with Minecraft speedruns. Speedrunning is a hobby in which people compete to complete a video game as quickly as possible. This paper concerns speedruns of Minecraft: Java Edition, and, in particular, speedruns of the category known as "Any% Random Seed Glitchless" (RSG) performed on version 1.16.
    [Show full text]
  • HEADS up for NEW YEAR Avisa Para El Año Nuevo
    THE LIGHTNING BOLT HEADS UP FOR AvisaNEW para el YEAR año nuevo SPORTS ATHLETE SHOUT OUTS SOCIETAL ISSUES TO HELP FIX EXTENSIVE VIDEO GAME REVIEWS VOLUME 33 ISSUE 4 CHANCELLOR HIGH SCHOOL 6300 HARRISON ROAD, FREDERICKSBURG, VA 22407 1 January 2021 CHANCELLOR FAMILY GIVES TO OTHER FAMILIES TO HELP MAKE HOLIDAYS BRIGHT There were 32 students that had a brighter holiday through the generosity of those who work at Chancellor High School. Departments adopted students, individual teach- ers and staff bought presents, three clubs sponsored three complete families, and coun- selors and secretaries wrapped gifts,. All gave generously and some gave multiple times. Ms. Heidi Tippett headed this ef- fort and managed the many emails and sent out requests for support of this effort, as well as distributed the gifts to the lucky families. Photo courtesy of Heidi Tippett of Heidi courtesy Photo Heidi Tippett’s car was filled to the brim with wrapped gifts ready to be given to families on December 17, 2020. 32 families were supported in this effort. ART III/IV STUDENTS CREATE TEACHER PORTRAITS Can you identify the names of the teachers who are depicted in this artwork? All artwork submitted by Leeanne by Houston submitted All artwork The Journalism students at Chancellor High School publish The Lightning Bolt, the MRS. GATTIE only official newspaper on campus. The purpose of the newspaper is to factually in- form and entertain its readers. As an established open forum for the student body, ADVISOR truth will be the staff’s major goal. It is the responsibility of each staffer to adhere to the journalism code of ethics as set by the Society of Professional Journalists, Sigma CARA SEELY Delta Chi.
    [Show full text]
  • Battlefield V Metro Exodus Black Ops Iiii
    B ATTLEFIELD V M ETRO EXODUS B L ACK O P S IIII BATTLE FOR ATLAS ’S HOW UBISOFT REVIEWED DETROIT: BECOME HUMAN STATE OF DECAY 2 EXCLUSIVE LASER LEAGUE TELLAR SPACE OPERA IS BRINGING S DESTINY 2: TOYS-TO-LIFE BACK FROMWARMIND THE DEAD #321 AUGUST 2018 That wasn’t flying. That was falling with style Yes, that’s a toys-to-life game on the cover of Edge. A genre you thought was gone for good following the demise of Disney Infinity and the disappearance of Skylanders. Yet Starlink: Battle For Atlas is an entirely different beast. Where Warner and Activision aimed their wares at the very young, Ubisoft’s game skews a little older. And that’s not just a matter of presentation: this is a tricky game set in a dynamic world that responds to your input, and your lack of it, the bad guys overrunning the entire solar Exclusive subscriber edition system if you don’t keep them in check. The toys themselves aren’t just plastic playthings to be dropped, one by one, onto an NFC scanner; they’re modular, their components snapped off and on, the change reflected instantly in game, both visually and mechanically. It is a step up for toys-to-life, in other words, and we’d expect nothing less from Ubisoft. This is a publisher with a history of betting big on long odds, and coming out with a win. Elsewhere this month we speak to Andy Wilson, who these days oversees the development operation at Mafia III studio Hangar 13.
    [Show full text]
  • Download The
    ISSN 2280-7705 The Italian Journal www.gamejournal.it Associazione Culturale LUDICA of Game Studies Games as Art, Media, Entertainment Issue 08, 2019 – volume 1 JOURNAL (PEER-REVIEWED) INTERDISCIPLINARY PERSPECTIVES ON VIDEO GAME AGENCY Edited by Ivan Girina & Berenike Jung GAME JOURNAL – Peer-Reviewed Section Issue 08 – 2019 GAME Journal Games as Art, Media, Entertainment G|A|M|E is an international, peer-reviewed, free access games studies journal. G|A|M|E publishes one monographic issue per year A PROJECT BY SUPERVISING EDITORS Associazione Culturale LUDICA Antioco Floris (Università di Cagliari), Roy Menarini (Università di Bologna), Peppino Ortoleva (Università di Torino), Reggio Calabria IT & London UK Leonardo Quaresima (Università di Udine). HQ: Via Vittorio Veneto 33 89123 Reggio Calabria, IT Offices: 64 Colley House EDITORS London UB8 2NZ, UK Marco Benoît Carbone (Brunel University, London), Giovanni Caruso (Independent researcher), Riccardo Fassone (Università di Torino), Gabriele Ferri (Amsterdam University of Applied Sciences), Ivan Girina (Brunel University, In association with filmforumfestival.it London), Federico Giordano (Università per Stranieri di Perugia), Ilaria Mariani (Politecnico di Milano), Valentina Paggiarin (Hive Division), Paolo Ruffino (University of Liverpool), Mauro Salvador (Università di Modena e Reggio Emilia), Marco Teti (Università eCampus). WITH THE PATRONAGE OF Università di Cagliari ADVISORY BOARD Dipartimento di Storia, Beni Culturali e Territorio Espen Aarseth (IT University of Copenaghen), Matteo
    [Show full text]
  • Downloads on the Internet
    A University of Sussex DPhil thesis Available online via Sussex Research Online: http://eprints.sussex.ac.uk/ This thesis is protected by copyright which belongs to the author. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Please visit Sussex Research Online for more information and further details The Major and the Minor On Political Aesthetics in the Control Society Seb Franklin Dphil University of Sussex August 2009 I hereby declare that this thesis has not been and will not be submitted, in whole or in part, to any other university for the award of any other degree. Seb Franklin Abstract This thesis examines the crucial diagnostic and productive roles that the concepts of minor and major practice, two interrelated modes of cultural production set out by Gilles Deleuze and Félix Guattari in Kafka: toward a Minor Literature (1975), have to play in the present era of ubiquitous digital technology and informatics that Deleuze himself has influentially described as the control society. In first establishing the conditions of majority and majority, Deleuze and Guattari’s historical focus in Kafka is the early twentieth century period of Franz Kafka’s writing, a period which, for Deleuze, marks the start of a transition between two types of society – the disciplinary society described by Michel Foucault in Discipline and Punish and the control society that is set apart by its distribution, indifferent technical processes and the replacement of the individual with the dividual in social and political thought.
    [Show full text]
  • Table of Contents
    Table of Contents 01 “What would Jesus Play?” - Actor-Centered Perspectives on Gaming and Gamers (In Lieu of an Introduction) Simone Heidbrink, Tobias Knoll & Jan Wysocki 17 Nephilim: Children of Lilith - The Place of Man in the Ontological and Cosmological Dualism of the Diablo, Darksiders and Devil May Cry Game Series Frank G. Bosman & Marcel Poorthuis 41 Living the Phantasm of Demediation - The Priest Kings and the Technology Prohibition in the Gorean Role-Playing Games Christophe Duret 61 “Venturing into the Unknown”(?) - Method(olog)ical Reflections on Religion and Digital Games, Gamers and Gaming Simone Heidbrink, Tobias Knoll & Jan Wysocki 85 Simulating the Apocalypse - Theology and Structure of the Left Behind Games Stephen Jacobs 107 The Politics of Pokemon – Socialized Gaming, Religious Themes and the Construction of Communal Narratives Marley-Vincent Lindsey 139 A Digital Devil’s Saga – Representation(s) of the Demon in Recent Videogames Jonathon O’Donnell 161 Prophecy, Pre-destination, and Free-form Gameplay - The Nerevarine Prophecy in Bethesda’s Morrowind Angus Slater Online – Heidelberg Journal for Religions on the Internet Volume 7 (2015) Religion in Digital Games Reloaded http://online.uni-hd.de Conference Papers: “Playing God” - On God & Game 185 Introduction: “Playing God” - On God & Game Frank G. Bosman 190 Beyond Belief - Playing with Pagan Spirituality in World of Warcraft Stef Aupers & Julian Schaap 207 “Are Those the Only Two Solutions?” - Dealing with Choice, Agency and Religion in Digital Games Tobias Knoll 227
    [Show full text]
  • PRESS B to MARCH: the EFFECTS of VIDEO GAMES on POLITICAL BEHAVIOR by PETER R. LICARI a DISSERTATION PRESENTED to the GRADUATE S
    PRESS B TO MARCH: THE EFFECTS OF VIDEO GAMES ON POLITICAL BEHAVIOR By PETER R. LICARI A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2020 c 2020 Peter R. Licari 2 To Rosalina. My princess and favorite research collaborator. 3 ACKNOWLEDGEMENTS Dissertations are meant to be an academic researcher’s first major leap into independent scholarship. The irony, though, is that no one ever writes a dissertation alone. There are always others putting in the various kinds of visible and invisible labor that make a project like this possible. I would like to take this opportunity to thank some of them now. First, I would like to thank my dissertation committee chair, Michael Martinez. His mentorship has been the perfect balance of constructive skepticism and sincere encouragement. From the very beginning of the project, he has nudged me to conceptualize my argument in a way that maximized its rigor and impact without ever detracting from its magic. From its inchoate beginnings to its present form, he has put a tremendous amount of time, effort, and faith into my efforts. I will be forever grateful for his guidance and friendship. But a dissertation is ultimately reviewed and passed by five scholars—and I am fortunate to have such insightful, patient, and supportive members of my committee: Beth Rosenson, Yu-Hao Lee, Dan Smith, and Larry Dodd. They all brought their expertise, critical insights, tough (but constructive) questions and comments, and unwavering support to this project.
    [Show full text]