SlideShare une entreprise Scribd logo
1  sur  10
THE ‘CHEATS’
Constructing the Ideal EVE Online Player
DiGRA 2013 Panel - Atlanta, GA
Darryl Woodford / dp.woodford@qut.edu.au
@dpwoodford
Advantage play
• Term from gambling industry, but similar concepts in
games.
• Humans always seek to optimize.
• Koster (“Theory of Fun”) details how players seek to optimize their
path through games, even when that differs from designer
intention. If the code allows them to do something, they will.
• Gamblers (or some gamblers) seek to maximize profit. If the code
allows them to do something, they will.
Botting in Eve Online
Unattributed composite
EXAMPLE: EVE ONLINE
• EXPLOITS
– An immediate permanent ban of an account may result if:
• Investigation shows that a player has employed the use of an exploit tactic despite a public announcement being
made to alert players they will be banned for using it.
• A player who has been previously warned for exploiting and continues to exploit, whether using the same exploit or
another.
• An account holder guilty of employing “duping” exploits. Players found to have received the benefits of this exploit
may also face reprimand, from removal of the items in question up to, and including, banning of their accounts.
• A player has engaged in activity that intentionally causes others to lose connection, suffer latency issues (lag) or to
crash to desktop (CTD).
• A player renders himself invulnerable through the use of a bug.
• A player has created, distributed or advertised an illegal 3rd party program (i.e. macro or cheat program) that disrupts
game mechanics, is considered unfriendly or gives an unfair advantage by misusing game features in a way for
which they were not intended.
– Severe offences may result in an immediate ban without warning; however, warnings may be given for first time offenses,
followed by account suspensions of varying degree and ultimately a permanent ban if a player:
• Creates a character using a name that is misleading and causes others to believe he is a fair target, such as a non-
player pirate or other NPC entity.
• Is discovered to be employing the use of a third party program to macro illegally. Funds or goods received from the
benefits of macroing are subject to removal from the player’s inventory.
• Is aware of an exploitable bug and fails to report it to Game Masters and/or distributes the information to other
players.
Spamming
http://evenews24.com/wp-content/uploads/2012/03/Screen-shot-2012-03-01-at-10.02.50-PM.png
CHAT INVITE EXPLOIT: CCP RESPONSE
Official Warning From: GM Bunyip
Sent: 2012.10.10 21:16
To: Redacted
Greetings, GM Bunyip here.
This is an official warning that a large number of your alliance members have been caught exploiting the chat invite system to gain an unfair
advantage in PvP.
They have been confirmed as exploiting by sending multiple chat requests to characters in an effort to give themselves an advantage. This incident
occurred on 2012.10.02, from 10:40:00 onwards, in the WV-0R2 system.
Note that exploiting in such a way is against the EULA and Terms of Service, and could ultimately result in action being taken against their
accounts. Additionally, dealing with these incidents takes us a great deal of time – time that could have been better spent helping players with
genuine problems.
We have treated this incident with great lenience. All that has happened at this stage is every individual involved has been warned and had their
account marked for future reference.
Future violations may not be treated with the same lenience. Please inform your alliance to cease this activity at once or risk action being taken
against their accounts.
If you wish to dispute this, do not reply to the EVE mail. Instead, file a petition.
Best regards, GM Bunyip
EVE COMMUNITY
• Unclear:
– Whether something is an exploit if the code allows it.
– Whether something is ‘known’ or ‘unknown’.
– Exactly what the implications of any ambiguous in-game action
will be.
Not everybody agrees
http://evenews24.com/wp-content/uploads/2012/03/Screen-shot-2012-03-01-at-10.02.50-PM.png
ACKNOWLEdGEMENTS
• ARC Centre for Excellence in Creative Industries and
Innovation (CCI) - http://www.cci.edu.au/
• Social Media Research Group, Creative Industries Faculty,
Queensland University of Technology --
http://socialmedia.qut.edu.au
ACKNOWLEdGEMENTS
• ARC Centre for Excellence in Creative Industries and
Innovation (CCI) - http://www.cci.edu.au/
• Social Media Research Group, Creative Industries Faculty,
Queensland University of Technology --
http://socialmedia.qut.edu.au

Contenu connexe

Similaire à Constructing the Ideal EVE Online Player: The Cheats

Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101Martyn Sukys
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of InternetMohit Kanwar
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
GDC 2016 summary by singta (tae park)
GDC 2016 summary by singta (tae park)GDC 2016 summary by singta (tae park)
GDC 2016 summary by singta (tae park)Singta Inc.
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templatesFrankSobotka
 
Developers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crimeDevelopers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crimeEn Masse Entertainment
 
Security team training
Security team trainingSecurity team training
Security team trainingFrankSobotka
 
Breaking down the World of Warcraft Terms of Use Agreement
Breaking down the World of Warcraft Terms of Use Agreement Breaking down the World of Warcraft Terms of Use Agreement
Breaking down the World of Warcraft Terms of Use Agreement CTondut
 
Gambling & Gaming - Dispute Resolution
Gambling & Gaming - Dispute ResolutionGambling & Gaming - Dispute Resolution
Gambling & Gaming - Dispute ResolutionDarryl Woodford
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Kount
 
European and global practices Philipp Vlamminck
European and global practices Philipp VlamminckEuropean and global practices Philipp Vlamminck
European and global practices Philipp VlamminckUIFuture
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security FrameworkDaniel Miessler
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 

Similaire à Constructing the Ideal EVE Online Player: The Cheats (20)

Fraud in igaming 101
Fraud in igaming 101Fraud in igaming 101
Fraud in igaming 101
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Don’t Play with the Law
Don’t Play with the LawDon’t Play with the Law
Don’t Play with the Law
 
GDC 2016 summary by singta (tae park)
GDC 2016 summary by singta (tae park)GDC 2016 summary by singta (tae park)
GDC 2016 summary by singta (tae park)
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templates
 
Eula
EulaEula
Eula
 
En game hacking
En game hackingEn game hacking
En game hacking
 
Developers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crimeDevelopers vs Cybercriminals: Protecting your MMO from online crime
Developers vs Cybercriminals: Protecting your MMO from online crime
 
Security team training
Security team trainingSecurity team training
Security team training
 
Web Security
Web SecurityWeb Security
Web Security
 
Vgl13 t5
Vgl13 t5Vgl13 t5
Vgl13 t5
 
Final Paper
Final PaperFinal Paper
Final Paper
 
Breaking down the World of Warcraft Terms of Use Agreement
Breaking down the World of Warcraft Terms of Use Agreement Breaking down the World of Warcraft Terms of Use Agreement
Breaking down the World of Warcraft Terms of Use Agreement
 
Gambling & Gaming - Dispute Resolution
Gambling & Gaming - Dispute ResolutionGambling & Gaming - Dispute Resolution
Gambling & Gaming - Dispute Resolution
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
European and global practices Philipp Vlamminck
European and global practices Philipp VlamminckEuropean and global practices Philipp Vlamminck
European and global practices Philipp Vlamminck
 
The Game Security Framework
The Game Security FrameworkThe Game Security Framework
The Game Security Framework
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 

Plus de Darryl Woodford

Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ Campaign
Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ CampaignMeasuring The Success of Tourism & Event Queensland’s ‘Instameet’ Campaign
Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ CampaignDarryl Woodford
 
Everyone’s Watching It: The Role of Hype in Television Engagement through So...
Everyone’s Watching It: The Role of Hype in Television Engagement through So...Everyone’s Watching It: The Role of Hype in Television Engagement through So...
Everyone’s Watching It: The Role of Hype in Television Engagement through So...Darryl Woodford
 
Audiencing Through Social Media: A Brief Overview
Audiencing Through Social Media: A Brief OverviewAudiencing Through Social Media: A Brief Overview
Audiencing Through Social Media: A Brief OverviewDarryl Woodford
 
Slicing Big Data: Gambling, Twitter & Time Sensitive Information
Slicing Big Data: Gambling, Twitter & Time Sensitive InformationSlicing Big Data: Gambling, Twitter & Time Sensitive Information
Slicing Big Data: Gambling, Twitter & Time Sensitive InformationDarryl Woodford
 
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & Ethics
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & EthicsIR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & Ethics
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & EthicsDarryl Woodford
 
Regulating Virtual Worlds: Considering Participant-Driven Approaches
Regulating Virtual Worlds: Considering Participant-Driven ApproachesRegulating Virtual Worlds: Considering Participant-Driven Approaches
Regulating Virtual Worlds: Considering Participant-Driven ApproachesDarryl Woodford
 
Regulating Virtual Environments
Regulating Virtual Environments Regulating Virtual Environments
Regulating Virtual Environments Darryl Woodford
 
CCI Winter School Paper Jam Intro
CCI Winter School Paper Jam IntroCCI Winter School Paper Jam Intro
CCI Winter School Paper Jam IntroDarryl Woodford
 
The Fallacy of the Magic Circle
The Fallacy of the Magic CircleThe Fallacy of the Magic Circle
The Fallacy of the Magic CircleDarryl Woodford
 
Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic CircleDarryl Woodford
 
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar Environments
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar EnvironmentsHanging out is Hard to do: Ethnographic Methodology in Non-Avatar Environments
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar EnvironmentsDarryl Woodford
 

Plus de Darryl Woodford (12)

Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ Campaign
Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ CampaignMeasuring The Success of Tourism & Event Queensland’s ‘Instameet’ Campaign
Measuring The Success of Tourism & Event Queensland’s ‘Instameet’ Campaign
 
Introducing telemetrics
Introducing telemetricsIntroducing telemetrics
Introducing telemetrics
 
Everyone’s Watching It: The Role of Hype in Television Engagement through So...
Everyone’s Watching It: The Role of Hype in Television Engagement through So...Everyone’s Watching It: The Role of Hype in Television Engagement through So...
Everyone’s Watching It: The Role of Hype in Television Engagement through So...
 
Audiencing Through Social Media: A Brief Overview
Audiencing Through Social Media: A Brief OverviewAudiencing Through Social Media: A Brief Overview
Audiencing Through Social Media: A Brief Overview
 
Slicing Big Data: Gambling, Twitter & Time Sensitive Information
Slicing Big Data: Gambling, Twitter & Time Sensitive InformationSlicing Big Data: Gambling, Twitter & Time Sensitive Information
Slicing Big Data: Gambling, Twitter & Time Sensitive Information
 
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & Ethics
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & EthicsIR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & Ethics
IR14 Pre-Conference Workshop Lightning Talk: Social Media Methods & Ethics
 
Regulating Virtual Worlds: Considering Participant-Driven Approaches
Regulating Virtual Worlds: Considering Participant-Driven ApproachesRegulating Virtual Worlds: Considering Participant-Driven Approaches
Regulating Virtual Worlds: Considering Participant-Driven Approaches
 
Regulating Virtual Environments
Regulating Virtual Environments Regulating Virtual Environments
Regulating Virtual Environments
 
CCI Winter School Paper Jam Intro
CCI Winter School Paper Jam IntroCCI Winter School Paper Jam Intro
CCI Winter School Paper Jam Intro
 
The Fallacy of the Magic Circle
The Fallacy of the Magic CircleThe Fallacy of the Magic Circle
The Fallacy of the Magic Circle
 
Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic Circle
 
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar Environments
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar EnvironmentsHanging out is Hard to do: Ethnographic Methodology in Non-Avatar Environments
Hanging out is Hard to do: Ethnographic Methodology in Non-Avatar Environments
 

Dernier

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 

Dernier (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 

Constructing the Ideal EVE Online Player: The Cheats

  • 1. THE ‘CHEATS’ Constructing the Ideal EVE Online Player DiGRA 2013 Panel - Atlanta, GA Darryl Woodford / dp.woodford@qut.edu.au @dpwoodford
  • 2. Advantage play • Term from gambling industry, but similar concepts in games. • Humans always seek to optimize. • Koster (“Theory of Fun”) details how players seek to optimize their path through games, even when that differs from designer intention. If the code allows them to do something, they will. • Gamblers (or some gamblers) seek to maximize profit. If the code allows them to do something, they will.
  • 3. Botting in Eve Online Unattributed composite
  • 4. EXAMPLE: EVE ONLINE • EXPLOITS – An immediate permanent ban of an account may result if: • Investigation shows that a player has employed the use of an exploit tactic despite a public announcement being made to alert players they will be banned for using it. • A player who has been previously warned for exploiting and continues to exploit, whether using the same exploit or another. • An account holder guilty of employing “duping” exploits. Players found to have received the benefits of this exploit may also face reprimand, from removal of the items in question up to, and including, banning of their accounts. • A player has engaged in activity that intentionally causes others to lose connection, suffer latency issues (lag) or to crash to desktop (CTD). • A player renders himself invulnerable through the use of a bug. • A player has created, distributed or advertised an illegal 3rd party program (i.e. macro or cheat program) that disrupts game mechanics, is considered unfriendly or gives an unfair advantage by misusing game features in a way for which they were not intended. – Severe offences may result in an immediate ban without warning; however, warnings may be given for first time offenses, followed by account suspensions of varying degree and ultimately a permanent ban if a player: • Creates a character using a name that is misleading and causes others to believe he is a fair target, such as a non- player pirate or other NPC entity. • Is discovered to be employing the use of a third party program to macro illegally. Funds or goods received from the benefits of macroing are subject to removal from the player’s inventory. • Is aware of an exploitable bug and fails to report it to Game Masters and/or distributes the information to other players.
  • 6. CHAT INVITE EXPLOIT: CCP RESPONSE Official Warning From: GM Bunyip Sent: 2012.10.10 21:16 To: Redacted Greetings, GM Bunyip here. This is an official warning that a large number of your alliance members have been caught exploiting the chat invite system to gain an unfair advantage in PvP. They have been confirmed as exploiting by sending multiple chat requests to characters in an effort to give themselves an advantage. This incident occurred on 2012.10.02, from 10:40:00 onwards, in the WV-0R2 system. Note that exploiting in such a way is against the EULA and Terms of Service, and could ultimately result in action being taken against their accounts. Additionally, dealing with these incidents takes us a great deal of time – time that could have been better spent helping players with genuine problems. We have treated this incident with great lenience. All that has happened at this stage is every individual involved has been warned and had their account marked for future reference. Future violations may not be treated with the same lenience. Please inform your alliance to cease this activity at once or risk action being taken against their accounts. If you wish to dispute this, do not reply to the EVE mail. Instead, file a petition. Best regards, GM Bunyip
  • 7. EVE COMMUNITY • Unclear: – Whether something is an exploit if the code allows it. – Whether something is ‘known’ or ‘unknown’. – Exactly what the implications of any ambiguous in-game action will be.
  • 9. ACKNOWLEdGEMENTS • ARC Centre for Excellence in Creative Industries and Innovation (CCI) - http://www.cci.edu.au/ • Social Media Research Group, Creative Industries Faculty, Queensland University of Technology -- http://socialmedia.qut.edu.au
  • 10. ACKNOWLEdGEMENTS • ARC Centre for Excellence in Creative Industries and Innovation (CCI) - http://www.cci.edu.au/ • Social Media Research Group, Creative Industries Faculty, Queensland University of Technology -- http://socialmedia.qut.edu.au