Game Modding – Literature search

Slides:



Advertisements
Similar presentations
Technology, Feedback, Action!: The impact of learning technology upon students' engagement with their feedback Stuart Hepplestone
Advertisements

AuthorAID Workshop on Research Writing Nepal March 2011.
Stages in Integrating technology Elaine Hoter. Stage 1: Awareness 1 I am aware that technology exists but have not used it – perhaps I’ve even avoiding.
Time Capsule. It can tell us the time we live in.
The Impact of Information Technology Material Weaknesses on Corporate Governance: Evidence from Executive and Director Turnover, and IT Governance Changes.
100 Most Common Words.
Media Radio Production Evaluation Charlotte Price.
4.2 MARKETING – PRICE IB BUSINESS & MANAGEMENT A COURSE COMPANION P
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Physics: Frightful, but fun. 3 November 2004 Working seminar CSSME, University of Leeds Carl Angell.
”Non-participation and witdrawal from online self-help groups” TTeC
Today, It’s All About the Web COE Faculty and Friends Fall, 2002 © Lynne Wolters, Assistant Professor Educational Technology, Concordia University.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Statway What worked well and what we’re improving Mary Parker Austin Community College austincc.edu Joint Math Meetings Jan. 12, 2013
Unit 1 – Improving Productivity By Joe Burridge. 1.1Why did you use a computer? What other systems / resources could you have used? I used a computer.
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? In my PowerPoint I used a computer.
ICOLIS 2007 AN ATTEMPT TO MAP INFORMATION LITERACY SKILLS VIA CITATION ANALYSIS OF FINAL YEAR PROJECT REPORTS N.N. Edzan Library and Information Science.
Stage-426-Feb-991 Ways to Excel as a Stage-4 Student Professor Clark Thomborson Computer Science Department Auckland University.
Music Magazine Evaluation By Fiyinfoluwa Ogedengbe.
Unit 1 – Improving Productivity Dylan Wakelam Instructions ~ 100 words per box.
Rational. Genre The music genre(s) I chose to focus on for my magazine is a mix of R&B/pop I chose these genres because music within these categorizes.
Human Centric Computing (COMP106) Assignment 2 PROPOSAL 23.
Listen and learn!. * “READ THE BOOKS. I don't understand why some kids think they can take a test on a book they have never read. That is actually crazy,
Evaluating Sources Ms. Rhian James ARW. Today's Objectives: 1. Learn how to find sources of information for your academic papers 2. Learn to judge whether.
Antar Abdellah.  Writing is a process NOT a product  You need to go through the experience of writing to produce real valuable pieces  Copying or quoting.
Class Forum: Documentary by Lucretia Massey-Mckerdy.
Searching for sources: Creating a bank of information.
Research Introduction to the concept of incorporating sources into your own work.
Vince Graziano English Librarian
How to become a Software Testing Expert?. There are many best reasons to end up a software testing expert so allows get began. Initially trendy talk “who's.
Goal Setting: Strategic Planning
Created By Benjaman Green
Quirky, Not Quacky Quantum Computing for Librarians
Conference for High-Impact Research
Proceed to Slide 2 to begin
COMPUTER ENGINEERING.
Software Engineering Experimentation
Security Is a Game Tiffany Bao
The How and Where of Finding Information
Keeping safe and private on the internet
Nintendo commercial By samuel.
Bioshock Mod GDD My game design document for my Bioshock mod project called Bioshock Fates.
Mihnea Pop AICE Media Studies
Writing a Research Abstract
Writing for Academic Journals
The Three Little Pigs Lesson
Are my Sources Reliable?
Best SEO Technique for Blog By: BloggerBlogger. Promoting could be the best and the direct way to produce yourself and your website popular. Lots of folks.
Science Fair Project Due:
E-Learning --Game-based Leaning Dr. Yuan Yuan
Getting your research noticed
An Efficient method to recommend research papers and highly influential authors. VIRAJITHA KARNATAPU.
Using Note Cards for Your Research Paper
VIVA Questions and Answers
Target Setting for Student Progress
I have no idea what I am doing.
Software Engineering Experimentation
What Are They? Who Needs ‘em? An Example: Scoring in Tennis
Find a seat and wait quietly for class to start
Introduction to Teaching with the
--Game-based Learning
The of and to in is you that it he for was.
Title of Project Joseph Hallahan Computer Systems Lab
About me..
OPINIONS GIVING ASKING / CLARIFYING DISAGREE AGREE
Research Methods Designing a research project: Getting started.
Videogame Development
WRITING EVIDENCE-BASED CLAIMS
I have the question But what next?.
Presentation transcript:

Game Modding – Literature search Researching Creative Industries

Playful Play with Games, M Engeli This article discusses the modding of Unreal Tournament put into a learning process. I found this interesting because that is what the second year of my college course was, creating our own worlds with UDK (Unreal Developer Kit). UDK is essentially a Modify engine for unreal tournament however people create they’re own games, in the developer kit, which actually are released and sold. My query was that then surely those games are just commercially released mods. This article was dated at 2005 and game developer kits such as UDK would have only been used properly in education for maybe 2 or 3 years. And then there are other developer engines such as cry engine which is only used in higher education.

Explorations in Player Motivations: Game Mods This was another fascinating article I came across and it explored the reasons why people feel they need to mod. They author began by stating the needs people want so they can be fully satisfied.

Explorations in Player Motivations: Game Mods This is the research that went into this article. It has taken 160 game mods across 16 different catogories and they measured the amount of downloads each mod had and then calculated the results in to a table.

When the Game Is Not Enough: Motivations and Practices Among Computer Game Modding Culture When looking at this article after the previous article I found them to be quite similar. They each aim to discover why game modders do what they do. The main differences is that this article looks into players who want more from their games with gameplay when the previous article look at what the players do to fulfil their needs. Discovered this off SHU library catalogue.

Not just a dollhouse: what The Sims2 can teach us about women's IT learning This article is about women’s learning in IT through modding and design through the game The Sims 2. I had previous knowledge from college about how The Sims is a game that has attracted attention from the female audience. The Sims is an original game because of how the players create their own things. That got me thinking about how the games have started to become mod engines themselves. E.g. Little Big Planet, Far Cry 2, Modnation and many more.

Harnessing the hackers: The emergence and exploitation of Outlaw Innovation What caught my eye with this article was ‘Hacking and Outlaws’ I found it to be interesting because it talks about hackers as being outlaws. Real and fictional outlaws have always made a name of themselves. This could imply that hackers and modders break the rules to get their names known. (whether it be their real name or their online ID.) At the start it mentions how what the hackers do can be valuable. This paper was dated at 2008 and it can show how times have changed especially recently how hacks can destroy games

Bibliography M Engeli, Proceedings of DiGRA, 2005, Playful Play with Games: http://digra.org:8080/Plone/dl/db/06276.54243.pdf B Bostan, Proceedings of GAMEON-ASIA, 2010, Explorations in Player Motivations: Game Mods: http://www.silentblade.com/presentations/Bostan_Kaplancali_2010.pdf O Sotamaa, Games and Culture, 2010: When the Game Is Not Enough: Motivations and Practices Among Computer Game Modding Culture: http://gac.sagepub.com/content/5/3/239.short Elisabeth R. Hayes, (Professor, Mary Lou College of Education, Arizona State University, Tempe, Arizona, USA), Elizabeth M. King, (Research associate, University of Wisconsin-Madison, Madison, Wisconsin, USA), Emerald Group Publishing Limited, 2000, Not just a dollhouse: what The Sims2 can teach us about women's IT learning: http://www.emeraldinsight.com/journals.htm?articleid=1771031&show=abstract Stephen Flowers, Centre for Research in Innovation Management (CENTRIM), 2008, Harnessing the hackers: The emergence and exploitation of Outlaw Innovation: http://www.sciencedirect.com/science/article/pii/S0048733307002132