From Rule-Breaking to ROM-Hacking: Theorizing the Computer Game-as-Commodity

نویسنده

  • Will Jordan
چکیده

This paper develops a theory of the game as a commodity form by looking at the unique practices of console hackers and videogame emulation communities. This theory argues for the necessity of understanding a game's system of rules in relation to the material conditions and constraints of the media within which it is constructed and distributed. After deriving the computer game-as-commodity from a combination of institutional and material restrictions and protections on the free-play of the execution of game rules, I provide an account of emulation and ROM-hacking communities as a cultural critique and playful resistance of such commodification within the rigid legal and technological infrastructures of autonomous, executable, and copyrighted machine code. Rather than asking whether videogame emulation is “right or wrong” in the abstract, I examine the legal, economic, and aesthetic implications of emulation practices, asking what the efforts of the emulation and ROM-hacking community have to contribute to the study of console videogames. Finally, I argue that analyzing and embracing the efforts of a variety of practices within the emulation and ROM-hacking communities is helpful and essential to both mapping past struggles and tracing future paradigms of the computer game's contradictory status as a commodity to be consumed and an algorithm to be uncovered. Author

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack

Defcon’s Capture the Flag (CtF) game is the largest open computer security hacking game. This year’s CtF hat rules that made it particularly difficult to be a successful defender. We entered an Immunix server, comprised of five years of IA&S, OASIS, FTN, and CHATS technologies, to see whether this system could survive sustained attack from determined experts. We describe our experience survivin...

متن کامل

A Study of the Correlation between Computer Games and Adolescent Behavioral Problems

Background: Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the co...

متن کامل

Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)

This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...

متن کامل

Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)

This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...

متن کامل

Proposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)

This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007