Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1837885.1837896acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Mutually reinforcing systems

Published: 25 July 2010 Publication History

Abstract

This paper demonstrates strategies for designing mobile games with by-products in order to allow the acquisition of specific data. A mobile game with by-products called EyeSpy and a photo website called Realise will be used as examples to demonstrate these strategies. The Realise website allows users to browse geographically tagged photos and make specific requests for new ones. In the EyeSpy game, players use mobile phones to tag geographic positions with photos and text. EyeSpy players can earn points from validating each others' tags by visiting tag locations and attempting to 'confirm' them. If players go to the correct location, both the player confirming the tag and the player who created it will gain points. This creates game content for EyeSpy and provides more refined results for the Realise website. In this way, both the systems mutually reinforce each other.

References

[1]
M. Bell, S. Reeves, B. Brown, S. Sherwood, D. MacMillan, J. Ferguson, and M. Chalmers. Eyespy: Supporting navigation through play. In CHI 2009, April 2009.
[2]
B. Brown and M. Chalmers. Tourism and mobile technology. In ECSCW 2003: Proceedings of the eigth european conference on computer supported cooperative work, pages 335--355, Helsinki, Finland, 2003. Dordrecht: Kluwer Academic Press.
[3]
L. von Ahn and L. Dabbish. Labeling images with a computer game. In CHI '04: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 319--326, New York, NY, USA, 2004. ACM Press.

Cited By

View all
  • (2014)Making Arabic PDF books accessible using gamificationProceedings of the 11th Web for All Conference10.1145/2596695.2596712(1-4)Online publication date: 7-Apr-2014
  • (2014)ACCESSProceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 853310.1007/978-3-319-07620-1_17(183-194)Online publication date: 22-Jun-2014

Index Terms

  1. Mutually reinforcing systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HCOMP '10: Proceedings of the ACM SIGKDD Workshop on Human Computation
    July 2010
    95 pages
    ISBN:9781450302227
    DOI:10.1145/1837885
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 July 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. games with by-products
    2. human computation
    3. mobile multiplayer games
    4. mobile photography
    5. mutually reinforcing systems

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    KDD '10
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Making Arabic PDF books accessible using gamificationProceedings of the 11th Web for All Conference10.1145/2596695.2596712(1-4)Online publication date: 7-Apr-2014
    • (2014)ACCESSProceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 853310.1007/978-3-319-07620-1_17(183-194)Online publication date: 22-Jun-2014

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media