1,111 research outputs found

    Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security

    Get PDF
    In this paper we describe a pervasive game, Blowtooth, in which players use their mobile phones to hide virtual drugs on nearby airline passengers in real airport check-in queues. After passing through airport security, the player must find and recover their drugs from the innocent bystanders, without them ever realizing they were involved in the game. The game explores the nature of pervasive game playing in environments that are not, generally, regarded as playful or “fun”. This paper describes the game’s design and implementation as well as an evaluation conducted with participants in real airports. It explores the players’ reactions to the game through questionnaire responses and in-game activity. The technologies used in Blowtooth are, intentionally, simple in order for the enjoyment of the game to be reliant more on the physical environment rather than the enabling technologies. We conclude that situating pervasive games in unexpected and challenging environments, such as international airports, may provide interesting and unique gaming experiences for players. In addition, we argue that pervasive games benefit most from using the specific features and nature of interesting real-world environments rather than focusing on the enabling technologies

    Blowtooth: pervasive gaming in unique and challenging environments

    Get PDF
    This paper describes Blowtooth, a Bluetooth implemented pervasive game where players smuggle virtual drugs through real airport security with the help of unknowing bystanders. The game explores the nature of pervasive game playing in environments that are not generally regarded as playful or “fun,” and where people are subject to particularly high levels of intrusive surveillance and monitoring. Six participants who were travelling internationally within a two-week period were recruited to evaluate the game. Findings suggest that creating pervasive games that incorporate the unique features of their context as part of the game may provide enjoyable, novel and thought-provoking experiences for players

    InfoTech Update, Volume 9, Number 6, November/December 2000

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/4983/thumbnail.jp

    39P. Nature and Extent of Identity Crime through Wireless Technology Abuse and its Impact on Individual and Organisational Levels

    Get PDF
    Perpetrator(s) are stealing personal data abusing wireless networks to commit identity fraud and related crimes that is affecting us on individual, organisational and national levels. These threats affect national security also (Smith et al. 2010). There have been instances of identity and data theft crimes involving millions of debit and credit card numbers, which indicate the seriousness of this issue and reinforce the concerns of security professionals. These cases were taken from newspapers and recent research papers related to this field and analysed in this study. The objective of this research paper is to investigate the security weaknesses in the wireless protocols and examine how perpetrators are exploiting the wireless networks. The security limitations found in the commonly used types of wireless networks are also presented. The sharing of information on social networking services such as Facebook and Twitter also pose privacy and security threats. The current study presents guidelines and discusses approaches employed to safeguard and protect wireless networks in organisations. It is a study to create public awareness about the threats and related privacy issues in the use of wireless and hand held communication devices
    corecore