Role playing game: the challenges of citizen engagement
نویسندگان
چکیده
منابع مشابه
The TViews Table Role-Playing Game
The TViews Table Role-Playing Game (TTRPG) is a digital tabletop role-playing game that runs on the TViews table, bridging the separate worlds of traditional role-playing games with the growing area of massively multiplayer online role-playing games. The TViews table is an interactive tabletop media platform that can track the location of multiple tagged objects in real-time as they are moved a...
متن کاملthe analysis of the role of the speech acts theory in translating and dubbing hollywood films
از محوری ترین اثراتی که یک فیلم سینمایی ایجاد می کند دیالوگ هایی است که هنرپیش گان فیلم میگویند. به زعم یک فیلم ساز, یک شیوه متأثر نمودن مخاطب از اثر منظوره نیروی گفتارهای گوینده, مثل نیروی عاطفی, ترس آور, غم انگیز, هیجان انگیز و غیره, است. این مطالعه به بررسی این مسأله مبادرت کرده است که آیا نیروی فراگفتاری هنرپیش گان به مثابه ی اعمال گفتاری در پنج فیلم هالیوودی در نسخه های دوبله شده باز تولید...
15 صفحه اولEnjoyment or Engagement? Role of Social Interaction in Playing Massively Mulitplayer Online Role-Playing Games (MMORPGS)
Based on data collected through 40 in-depth interviews, it is found that (a) the balance between perceived challenges and skills, and (b) the types of in-game social interactions can both facilitate and impede the enjoyment of game playing. Through these two factors, a conclusive link was also found between game enjoyments and a gamer’s engagement level. Engaged gamers experience optimal enjoym...
متن کاملPlaying Against the Game
Thepaperfirstoutlinesadifferentiationofplay/game-motivationsthatinclude‘negative’attitudes againsttheplay/gameitselflikecheatingorspoilsporting.Thisproblemisofparticularimportance inconcernoflearninggamesbecausetheyarenot‘played’forthemselves–atleastinthefirstplace –butduetoaninstructionalscheme.Sotheyarelikelytoprovokeresistanceamongt...
متن کاملThe Game-Playing Technique
In the game-playing technique, one writes a pseudocode game such that an adversary’s advantage in attacking some cryptographic construction is bounded above by the probability that the game sets a flag bad. This probability is then upper bounded by making stepwise, syntactical refinements to the pseudocode—a chain of games. The approach was first used by Kilian and Rogaway (1996) and has been u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Integrated Care
سال: 2018
ISSN: 1568-4156
DOI: 10.5334/ijic.s2112