Пропуск в контексте

Assessing Player Interaction for a Social Networking Cooperative Educational Game

Cooperative interaction in educational games, designed to stimulate teamwork, joint creativity and knowledge sharing, also carries potential security threats. One of the key dangers is data leakage. Player interaction involves the exchange of information, and in case of insufficient protection of th...

Полное описание

Сохранить в:
Библиографические подробности
Главные авторы: Lapina, M. A., Лапина, М. А., Movzalevskaya, V., Мовзалевская, В.
Формат: Статья
Язык:English
Опубликовано: Springer Science and Business Media Deutschland GmbH 2025
Темы:
Online-ссылка:https://dspace.ncfu.ru/handle/123456789/29638
Метки: Добавить метку
Нет меток, Требуется 1-ая метка записи!
Описание
Краткое описание:Cooperative interaction in educational games, designed to stimulate teamwork, joint creativity and knowledge sharing, also carries potential security threats. One of the key dangers is data leakage. Player interaction involves the exchange of information, and in case of insufficient protection of the system, confidential data, such as personal information, game progress results or individual strategies, may become available to unauthorized persons. This may result in misuse of information, damage to reputation and violation of player privacy. The impact on the game space is also a threat. By interacting, players can change the game world, for example, by entering incorrect data, moving objects to an inappropriate location, or modifying the rules of the game. This can lead to a violation of the balance of the game, incorrect results and a deterioration in the learning effect. Substitution or falsification of game elements is no less dangerous. Attackers can introduce fake elements into the game space, for example, incorrect reviews, changed rules or incorrect data. This can lead to incorrect conclusions, distort learning outcomes, and undermine confidence in the game. In addition, the use of interaction tools can become an object of attack. Attackers can hack and modify tools, such as communication platforms or data storage systems. This can lead to data theft, incorrect operation of tools and malfunction during the game. It is shown that formal descriptions of the choice of a game strategy can exist in a game. Indicators that are essential for cooperative interaction are determined, and examples of their calculation for the case with remote interaction through a social network are given. The article contains information about collaborations, which can be used to assess and choose the direction of development in projects that use game cooperative strategies to implement tasks other than training. The project highlights aspects of cooperative interaction that affect the formation of game strategies in an educational project. Of particular interest are projects in which a social network is the tool and medium of interaction. The objectives of the project are to identify easy-to-use indicators that show the features of cooperative interaction within an educational game.