From Rule-Breaking to ROM-Hacking: Theorizing the Computer Game-as-Commodity
نویسنده
چکیده
This paper develops a theory of the game as a commodity form by looking at the unique practices of console hackers and videogame emulation communities. This theory argues for the necessity of understanding a game's system of rules in relation to the material conditions and constraints of the media within which it is constructed and distributed. After deriving the computer game-as-commodity from a combination of institutional and material restrictions and protections on the free-play of the execution of game rules, I provide an account of emulation and ROM-hacking communities as a cultural critique and playful resistance of such commodification within the rigid legal and technological infrastructures of autonomous, executable, and copyrighted machine code. Rather than asking whether videogame emulation is “right or wrong” in the abstract, I examine the legal, economic, and aesthetic implications of emulation practices, asking what the efforts of the emulation and ROM-hacking community have to contribute to the study of console videogames. Finally, I argue that analyzing and embracing the efforts of a variety of practices within the emulation and ROM-hacking communities is helpful and essential to both mapping past struggles and tracing future paradigms of the computer game's contradictory status as a commodity to be consumed and an algorithm to be uncovered. Author
منابع مشابه
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack
Defcon’s Capture the Flag (CtF) game is the largest open computer security hacking game. This year’s CtF hat rules that made it particularly difficult to be a successful defender. We entered an Immunix server, comprised of five years of IA&S, OASIS, FTN, and CHATS technologies, to see whether this system could survive sustained attack from determined experts. We describe our experience survivin...
متن کاملA Study of the Correlation between Computer Games and Adolescent Behavioral Problems
Background: Today, due to developing communicative technologies, computer games and other audio-visual media as social phenomena, are very attractive and have a great effect on children and adolescents. The increasing popularity of these games among children and adolescents results in the public uncertainties about plausible harmful effects of these games. This study aimed to investigate the co...
متن کاملProposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)
This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...
متن کاملProposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)
This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...
متن کاملProposing Operational Technology Based Procedure (OTBP) using Round Robin Scheduling Algorithm (RRSA)
This paper presents a review along with the analysis of different types of cyber hacking attacks and proposes a new methodology for reducing the attacks during client-server communication by providing a secure channel. The designed methodology is termed as an "OTBP-Using RRSA" (Operational Technology Based Procedure-using Round Robin Scheduling Algorithm) and its working is based on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007