Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Han, Mee Lan | - |
dc.contributor.author | Kwak, Byung Il | - |
dc.contributor.author | Kim, Huy Kang | - |
dc.date.accessioned | 2022-06-12T06:41:06Z | - |
dc.date.available | 2022-06-12T06:41:06Z | - |
dc.date.created | 2022-06-10 | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/142114 | - |
dc.description.abstract | Recently, despite massively multiplayer online role-playing game (MMORPG) based on the PC implementation environment in mobile games, related fraudulent and illegal activities are still prevalent in response to the extension and diversity of the online gaming market. For game users who enjoy the game as leisure or cultural content, these issues inhibit the game's immersion or cause seceding from the game, thus negatively affecting the overall online gaming industry. This systematic review provides an overview of substantial studies on the occurrence of cheating behavior, countermeasures, and detection methods. We aimed to scrutinize the scope of generable cheating behavior due to the structural characteristics of a stateful game server. Furthermore, we focused on providing the basis for the key mechanisms of online games based on the conceptual attributes of the MMORPG. A comprehensive literature research was conducted, and the classification of countermeasures and detection methods were systematized. The results of the systematic literature review contribute to the current understanding of how to correctly manage detection techniques and methods for cheating behavior in the MMORPG. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | BOT DETECTION | - |
dc.title | Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature Review | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Huy Kang | - |
dc.identifier.doi | 10.1109/ACCESS.2022.3172110 | - |
dc.identifier.scopusid | 2-s2.0-85129605287 | - |
dc.identifier.wosid | 000797411000001 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.10, pp.49050 - 49063 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 10 | - |
dc.citation.startPage | 49050 | - |
dc.citation.endPage | 49063 | - |
dc.type.rims | ART | - |
dc.type.docType | Review | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | BOT DETECTION | - |
dc.subject.keywordAuthor | Games | - |
dc.subject.keywordAuthor | Servers | - |
dc.subject.keywordAuthor | Real-time systems | - |
dc.subject.keywordAuthor | Codes | - |
dc.subject.keywordAuthor | Computer crime | - |
dc.subject.keywordAuthor | Systematics | - |
dc.subject.keywordAuthor | Licenses | - |
dc.subject.keywordAuthor | MMORPG | - |
dc.subject.keywordAuthor | cheating | - |
dc.subject.keywordAuthor | anomaly detection | - |
dc.subject.keywordAuthor | countermeasure | - |
dc.subject.keywordAuthor | detection method | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.