Developing Social Identity Models of Players from Game Telemetry Data
نویسندگان
چکیده
In this paper, we present an approach to modeling aspects of the identities of videogame players by data mining game telemetry information on in-game player performance and customization preferences. Our model demonstrates that such data can be used to reveal aspects of the identities players express by their social networking profile information. We tested our model on players of the multiplayer first-person shooter videogame Team Fortress 2. It was able to significantly explain the variances of the players’ number of friends (35.1%), number of uploaded screenshots (49.6%), and number of uploaded videos (39.2%) of their profiles on the gaming social network Steam. Our results revealed several findings, such as criteria indicating how players customized avatars differently according to notions of aesthetics and practicality, and how these notions contributed to predicting their number of friends on their social networking profiles. Responses evaluated from a conducted survey reaffirmed several of these findings.
منابع مشابه
Developing Computational Models of Players' Identities and Values from Videogame Avatars
Videogame avatars, while technically virtual identities, also often reflect the aspects of players’ identities and values in the physical, social, and cultural world of the player outside of the game (i.e., the “real world”). These aspects of real world identity include phenomena such as social group categorization and stereotyping. In this paper, we present AIRvatar, an Artificial Intelligence...
متن کاملA comparison of methods for player clustering via behavioral telemetry
The analysis of user behavior in digital games has been aided by the introduction of user telemetry in game development, which provides unprecedented access to quantitative data on user behavior from the installed game clients of the entire population of players. Player behavior telemetry datasets can be exceptionally complex, with features recorded for a varying population of users over a temp...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملImpact of triplet interference exercises between exercise scheduling methods (random-variable-intensive) in skill development and scoring accuracy for futsal players
Objective: This study aimed to Prepare an educational program based on the overlap and the integration of the random exercise method with the variable exercise method and the intensive exercise method adapted to the capabilities of the research sample and Recognize the effect of the educational program on developing the skill performance and scoring accuracy of the research sample in the futsal...
متن کاملPro ling in Games: Understanding Behavior from Telemetry
The availability of large scale game behavioral data has led to a tremendous amount of attention to business intelligence in game development and -research. The analysis of player behavior has rapidly emerged to become an integrated component of game development, and is used to address a range of challenges such as improving game design, manage monetization, predict behavior, recommend games, d...
متن کامل