The document discusses using game theory to analyze video games. It provides background on game theory, explaining that it is the formal study of decision-making where players' choices affect each other. It outlines some key game theory concepts like the prisoner's dilemma, chicken game, and Nash equilibrium. It then discusses how different types of video games like cooperative, semi-cooperative, and competitive games can be modeled using concepts from game theory.
Term: 2017-2018 FALL SEMESTER,
Course Name: DECISION THEORY AND ANALYSIS
Department: Industrial Engineering
University: Sakarya University
Lecturer: Halil İbrahim Demir (hidemir.sakarya.edu.tr)
Presenter: Caner Erden (cerden.sakarya.edu.tr)
This presentation is an attempt to introduce Game Theory in one session. It's suitable for undergraduates. In practice, it's best used as a taster since only a portion of the material can be covered in an hour - topics can be chosen according to the interests of the class.
The main reference source used was 'Games, Theory and Applications' by L.C.Thomas. Further notes available at: http://bit.ly/nW6ULD
Term: 2017-2018 FALL SEMESTER,
Course Name: DECISION THEORY AND ANALYSIS
Department: Industrial Engineering
University: Sakarya University
Lecturer: Halil İbrahim Demir (hidemir.sakarya.edu.tr)
Presenter: Caner Erden (cerden.sakarya.edu.tr)
This presentation is an attempt to introduce Game Theory in one session. It's suitable for undergraduates. In practice, it's best used as a taster since only a portion of the material can be covered in an hour - topics can be chosen according to the interests of the class.
The main reference source used was 'Games, Theory and Applications' by L.C.Thomas. Further notes available at: http://bit.ly/nW6ULD
This is a simple presentation on Game Theory in Network Security. I made it when I was searching for research points for my Master degree. Still searching for other research points. Any suggestions on research points in network security or network architecture? :)
I provide a (very) brief introduction to game theory. I have developed these notes to
provide quick access to some of the basics of game theory; mainly as an aid for students
in courses in which I assumed familiarity with game theory but did not require it as a
prerequisite
Prisoner's Dilemma is a paradox in decision analysis in which two individuals acting in their own best interest pursue a course of action that does not result in the ideal outcome. The typical prisoner's dilemma is set up in such a way that both parties choose to protect themselves at the expense of the other participant. As a result of following a purely logical thought process to help oneself, both participants find themselves in a worse state than if they had cooperated with each other in the decision-making process.
In this session, we will be looking at The Prisoner's Dilemma and how it affects our decision making, group and team dynamics, business decisions. We'll look at real world case studies and nature with a goal of understanding this dilemma better.
eQueue Theory is eQueue’s bread and butter. It describes the theoretical basis on which eQueue exists. It explains how online processes are created and adapted to online society in consideration of the key components of queuing theory.
Powered by eQueue, CheckinLine is based on the fundamentals of eQueue Theory.
This is a simple presentation on Game Theory in Network Security. I made it when I was searching for research points for my Master degree. Still searching for other research points. Any suggestions on research points in network security or network architecture? :)
I provide a (very) brief introduction to game theory. I have developed these notes to
provide quick access to some of the basics of game theory; mainly as an aid for students
in courses in which I assumed familiarity with game theory but did not require it as a
prerequisite
Prisoner's Dilemma is a paradox in decision analysis in which two individuals acting in their own best interest pursue a course of action that does not result in the ideal outcome. The typical prisoner's dilemma is set up in such a way that both parties choose to protect themselves at the expense of the other participant. As a result of following a purely logical thought process to help oneself, both participants find themselves in a worse state than if they had cooperated with each other in the decision-making process.
In this session, we will be looking at The Prisoner's Dilemma and how it affects our decision making, group and team dynamics, business decisions. We'll look at real world case studies and nature with a goal of understanding this dilemma better.
eQueue Theory is eQueue’s bread and butter. It describes the theoretical basis on which eQueue exists. It explains how online processes are created and adapted to online society in consideration of the key components of queuing theory.
Powered by eQueue, CheckinLine is based on the fundamentals of eQueue Theory.
Connecting Ethical Choices in Games to Moral FrameworksGabriel Recchia
Games have moral impact. They can make players more aware of their own values, and even change them... and not always in the ways you might expect. Using Jonathan Livingston Seagull (the board game!) and Glitch as case studies, this presentation covers three aspects of gaming that are critical for game researchers who hope to gain a more complete awareness of the effects a game is having on its players.
Predicting your adversary's behaviour is the holy grail of threat modeling. This talk will explore the problem of adversarial reasoning under uncertainty through the lens of game theory, the study of strategic decision-making among cooperating or conflicting agents. Starting with a thorough grounding in classical two-player games such as the Prisoner's Dilemma and the Stag Hunt, we will also consider the curious patterns that emerge in iterated, round-robin, and societal iterated games.
But as a tool for the real world, game theory seems to put the cart before the horse: how can you choose the proper strategy if you don't necessarily even know what game you're playing? For this, we turn to the relatively young field of probabilistic programming, which enables us to make powerful predictions about adversaries' strategies and behaviour based on observed data.
This talk is intended for a general audience; if you can compare two numbers and know which one is bigger than the other, you have all the mathematical foundations you need.
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...Sherry Jones
Nov. 12, 2015 - This presentation on "Game Design: Creating Psychological Experiences," is created for the Metagame Book Club.
The Metagame Book Club is a free resource for K-12 and college educators and students interested in game-based learning, gamification, and game studies. Join today!
Metagame Book Club
http://bit.ly/metagamebookclub
Disempowerment Fantasies: How taking power away from players can create bette...Valentina Tamer
I've held this talk at Intel® Buzz Workshop Berlin 2018, on February 2nd 2018. The slides were designed as a visual supplement and summary of my talk. If you are interested in this subject matter, feel free to contact me.
-
Video games have often been regarded as power fantasies. Yet many releases contradict this assumption and center gameplay around powerlessness, like the survival horror genre. This talk seeks to deconstruct the role of power in video games, analyze the various mechanics of disempowerment and suggest how actively taking power from the player may serve as a tool for making better games.
Let's Play a Game - Learn Philosophy and Rhetoric via Digital Game-Based Lear...Sherry Jones
This is my workshop presentation on how I employ digital game-based learning methods to teach philosophy and rhetoric courses.
A selection of assignments I have personally designed and implemented are included in this presentation.
Some principles and theories covered are Derridian binary oppositions, Sartrian existentialism, Wittgensteinian seeing-that vs. seeing-as, rhetorical triangle, rhetorical appeals (logos and pathos), Nietzschean eternal recurrence, and more.
Designing for Creativity and Kindness in GamesMirjam Eladhari
Invited talk given at Vaasa Game Days on the 9th of December 2015.
Content:
- Overview, slide 2
- Case Study 1, Pataphysic Institute Prototype. Background for coming research avenues. slide 8
- Games for Co-creation, Games made in C2Learn project, slide 32,
- Case Study 2, 4Scribes. A Story making game making use of computational creativity techniques for aiding narrative coherence. Slide 39
- Case Study 3, Mind Shadows. A game of kindness. Slide 76
- Make Game Design Part of your Life. Tips, tricks & tools for indie devs. Slide 88
The Golden Gamers: A 65+ Library Gaming GroupJohn Pappas
"The Golden Gamers" Equitable and Inclusive Gaming Events for the Elderly presented by John Pappas
Tabletop board gaming is a creative, multi-generational, social and fun activity. While there is a broad swatch of recreational activities for the 65+ crowd, generally gaming is left out. Conversations with the Senior Activities Board of the Upper Darby Libraries confirmed this with traditional video games providing an engaging experience but accessibility tends to be a challenge due to physical determinants (carpal tunnel, poor eyesight, arthritis) and experiential (with a large learning curve required for many video games). Tabletop board games provide an experience that is interactive, social, cognitive and engaging. With concerns over Alzheimer's and social isolation, this is an important subject for many seniors. The Primos Library instituted a series of programs "Tabletop Gaming at the Library" (intergenerational, weekly), The Game Designer's Guild (monthly, intergenerational) and the "Golden Gamers" (65+, Monthly-Weekly dependant upon interest) each providing a gaming experience for burgeoning and experienced gamers of any age.
In this talk, Pappas will discuss the initial planning, marketing, collection development and community engagement elements of the series as well as successes and challenges. A large portion of the talk will be on game selection for this age group including issues such as the level of social interaction inherent in the game, types of games, levels of complexity and iconography.
The Psychology of the Player & Game Character Design and Representation by Sh...Sherry Jones
Dec. 6, 2015 - This presentation explores many psychological theories that can help us understand how players think, and how game characters should be designed.
The Metagame Book Club is a K-12 and College professional development institution that offers free webinars, discussions, live chats, and other interactive activities on the topics of game-based learning, game studies, gamification, and games in general.
Interested in joining us? Visit our website here:
The Metagame Book Club
http://bit.ly/metagamebookclub
Crafting a Meaningful Experience - Principles of Frostpunk's Game Design ProcessJakub Stokalski
Making games is hard - making them to evoke a particular set of emotions and thoughts that differ from the traditional goal of “fun” is even harder. In this talk, delivered at China Indie Game Developers Conference in Shanghai, I described the design philosophy and process behind crafting Frostpunk - and made an argument why I believe making meaningful games is worthwhile.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Advanced Game Theory guest lecture
1. GOALS, REASON, AND DANGEROUS THINGS An über-ludological approach to game analysis unabashedly rooted in economic game theory Advanced Game Theory, Sep 24 2007 JONAS HEIDE SMITH [email_address]
2. “ It helps […] to think of a game’s structure as akin to an economy, or an ecosystem; a complex, interacting system that does not dictate outcomes but guides behavior through the need to achieve a single goal: energy, in the case of ecosystems; money, in the case of economics; victory, in the case of a game.” Costikyan, G. (2002). I Have No Words & I Must Design: Toward a Critical Vocabulary for Games . Paper presented at the Computer Games and Digital Cultures Conference Proceedings, Tampere.
3. Game theory is… “… the formal study of decision-making where several players must make choices that potentially affect the interests of the other players.” An analytical framework (and general form of notation) A design tool An embattled interdisciplinary current A promise for the unification of the social sciences The end of the world
4.
5. AGENDA BITS OF BACKGROUND THE LOGIC OF GAME THEORY TOOLS AND CONCEPTS VIDEO GAME APPLICATIONS
6. For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest “ For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest”
7. For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest “ If it was a matter of hunting a deer, everyone well realized that he must remain faithful to his post; but if a hare happened to pass within reach of one of them, we cannot doubt that he would have gone off in pursuit of it without scruple..." Jean-Jacques Rousseau
8. For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest For that which is common to the greatest number has the least care bestowed upon it. Every one thinks chiefly of his own, hardly at all of the common interest Neumann, J. v., & Morgenstern, O. (1944). Theory of Games and Economic Behaviour . Strong position in economics, mathematics, evolutionary biology, and computer science. Less strong in anthropology, sociology, game studies.
9. AGENDA BITS OF BACKGROUND THE LOGIC OF GAME THEORY TOOLS AND CONCEPTS VIDEO GAME APPLICATIONS
10. ECONOMICS A person will make those choices which are likely to maximize his or her satisfaction (utility) A person does not care about other people’s utility We don’t know people’s preferences a priori (and we should observe behaviour, rather than simply ask)
11. GAME THEORY In many situations one’s best choice depends on the choices of others Your best choice depends on your belief about the other players’ beliefs about your beliefs about… Highlights information , perception , and strategy
12. NIGHT DRIVING Bob Alice Alice is driving down a poorly lit road and hears the sound of an oncoming driver. On which side should she drive? Crashing = 0 satisfaction points Passing safely = 5 satisfaction points
13. NIGHT DRIVING Assumes that Bob and Alice have the same preferences Payoffs represent ranking of outcomes Game theory models social situations as if they were games Bob: 5 points Alice: 5 points Bob: 0 points Alice: 0 point Right Bob: 0 point Alice: 0 points Bob: 5 points Alice: 5 points Left Bob Right Left Alice
14. AGENDA BITS OF BACKGROUND THE LOGIC OF GAME THEORY TOOLS AND CONCEPTS VIDEO GAME APPLICATIONS
15. MODELLING GAMES Strategic form (choices are made simultaneuously) Extended form (can model a game over time, can include bluff etc.) Current Odysseus: 0 points Future Odysseus: 1 point Current Odysseus remains free Current Odysseus has himself tied to mast Future Odysseus ignores sirens Future Odysseus succumbs to song Future Odysseus ignores sirens Future Odysseus succumbs to song (blocked) Current Odysseus: 1 points Future Odysseus: 0 point Current Odysseus: 1 point Future Odysseus: 0 points Current Odysseus: 0 point Future Odysseus: 1 points
16.
17. The most famous of all game theory “games” The object of thousands of studies Models a “social dilemma”; a situation where one is tempted to do something which would lead to disaster if everyone made the same choice PRISONER’S DILEMMA Bob: 1 point Alice: 1 point Bob: 5 points Alice: 0 points Defects Bob: 0 points Alice: 5 points Bob: 3 points Alice: 3 points Cooperates Bob Defects Cooperates Alice
18. CHICKEN GAME First to swerve loses. If no-one swerves, both die. Bob: 0 points Alice: 0 points Bob: 3 points Alice: 1 point Does not swerve Bob: 1 point Alice: 3 points Bob: 2 points Alice: 2 points Swerves Bob Does not swerve Swerves Alice
19. SUM AND CONFLICT Zero-sum games (constant-sum games) : The total outcome is zero (e.g. chess). One players gain is the other player’s loss. Two-player zero-sum games present no incentives for cooperation. With more players, temporary coalitions may form. Non-zero-sum games : The total outcome is not fixed (e.g. the Prisoner’s Dilemma, tournament soccer). The player relationship depends on the specific outcomes.
20. INFORMATION Complete information : All players know everything about the game structure Perfect information : The full history of the game is known to all players. The four information types (traditional games) Incomplete and imperfect information E.g. Risk, Mafia, Mah-Jong, Poker Incomplete but perfect information E.g. Battleship, Master Mind, Monopoly … do not know everything about the game state before the game starts Complete but imperfect information (rare) Complete and perfect information E.g. Chess, Checkers, Parcheesi, Croquet … know everything about the game state before the game starts … are not informed about every change of the game state … are informed about every change of the game state The players…
21. STRATEGY A strategy is a complete plan of action for any possible game situation (could be written down in advance and executed by someone else) Easy to specify in the Prisoner’s Dilemma but very difficult in chess A strictly dominant strategy is one which yields the highest outcome (for a player) regardless of what the other players do
22. EQUILIBRIUM Strategic equilibrium refers to the “solution” of a game: A state which a game will tend towards The Prisoner’s Dilemma has one (unique Nash) equilibrium (defect-defect) No one player can unilaterally change his strategy for a better outcome: ”I can do no better, given that the other player keeps doing what he is doing.”
23. AGENDA BITS OF BACKGROUND THE LOGIC OF GAME THEORY TOOLS AND CONCEPTS VIDEO GAME APPLICATIONS
24. “ The stories in most video games serve the same purpose as calling the über-checker a ‘king.’ It adds interesting shading to the game but the game at its core is unchanged.” (Koster, 2005: p85)
25. “… the dimensions of Lara Croft’s body… are irrelevant to me as a player, because a different-looking body would not make me play differently… When I play, I don’t even see her body, but see through it and past it.” (Aarseth, 2004: p48)
26. PLAYER RELATIONSHIP Competitive games are constant sum games (the total payoff is fixed). In two-player competitive games, no incentives for cooperation exist at all, while for games with more players, such incentives may occur transitorily Semi-cooperative games are non-zero sum games which reward team-work over mutual non-cooperation but provide temptations for individuals to act selfishly. Cooperative games are non-zero sum games which reward players for coordinating their strategies; i.e. they reward team-work and provide no temptation for selfish play.
27. Cooperative game Fire Truck (Atari, 1978) Players’s utility functions are identical (they even have a collective score count). From the perspective of either, hurting the other player means hurting oneself Players will cooperate fully Bob: 1 points Alice: 1 points Bob: 0 points Alice: 0 points Left Bob: 0 points Alice: 0 points Bob: 1 point Alice: 1 point Right Bob Left Right Alice
28. Semi-cooperative game Gauntlet (Atari, 1982) Players have an incentive to cooperate but a temptation to defect Cooperation will be unstable V: 1 points W: 1 points V: 3 points W: 0 points Defect V: 0 points W: 3 points V: 2 points W: 2 point Cooperate Valkyrie Defect Cooperate Wizard
29. Competitive game Spacewar (Russel et al, 1962) Players cannot rely on each other to be peaceful There will be no cooperation Bob: 0,5 points Alice: 0,5 points Bob: 1 points Alice: 0 points Aggressive Bob: 0 points Alice: 1 points Bob: 0,5 point Alice: 0,5 point Peaceful Bob Aggressive Peaceful Alice
31. STRATEGIC DOMINANCE “ A well-designed game shouldn’t contain an option that is never worth using […] A dominated option is worthless. You wasted your time putting it in your game. A dominant option is worse. It means that all the other options are worthless.” (Rollings & Morris, 2004: p62-63)
34. All video games have dominated strategies and that is unproblematic In some games the challenge is choosing between alternatives . In other games the challenge is discovering one’s options or implementing one’s choice . The former should not have dominant strategies, but the latter should not be ignored.
35. From a game theory perspective a video game is an incentive structure inside which players maximize their outcome Game designers assume that players accept the objective game goals Game theory is an excellent tool for testing such assumptions
36. Binmore, K. (1991). Fun and Games: A Text on Game Theory. Lexington-Toronto: D.C. Heath. Smith, J. H. (2006). The games economists play: implications of economic game theory for the study of computer games. Game Studies: The International Journal of Computer Game Research, 6(1). Smith, J. H. (2006). Plans and Purposes: How Videogame Goals Shape Player Behaviour. Unpublished PhD dissertation, IT University of Copenhagen, Copenhagen. Smith, J. H. (Forthcoming). Tragedies of the Ludic Commons. Game Studies.