Identifying spreaders of malicious behaviors in online games

Youngjoon Ki, Jiyoung Woo, Huy Kang Kim

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    Massively multiplayer online role-playing games (MMORPGs) simulate the real world and require highly complex user interaction. Many human behaviors can be observed in MMORPGs, such as social interactions, economic behaviors, and malicious behaviors. In this study, we primarily focus on malicious behavior, especially cheating using game bots. Bots can be diffused on the social network in an epidemic style. When bots diffuse on the social network, a user's influence on the diffusion process varies owing to different characteristics and network positions. We aim to identify the influentials in the game world and investigate how they differ from normal users. Identifying the influentials in the diffusion of malicious behaviors will enable the game company to act proactively and preventively towards malicious users such as game bot users.

    Original languageEnglish
    Title of host publicationWWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web
    PublisherAssociation for Computing Machinery, Inc
    Pages315-316
    Number of pages2
    ISBN (Electronic)9781450327459
    DOIs
    Publication statusPublished - 2014 Apr 7
    Event23rd International Conference on World Wide Web, WWW 2014 - Seoul, Korea, Republic of
    Duration: 2014 Apr 72014 Apr 11

    Other

    Other23rd International Conference on World Wide Web, WWW 2014
    Country/TerritoryKorea, Republic of
    CitySeoul
    Period14/4/714/4/11

    Keywords

    • Game bot
    • Online game
    • Online social network
    • User influence

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Software

    Fingerprint

    Dive into the research topics of 'Identifying spreaders of malicious behaviors in online games'. Together they form a unique fingerprint.

    Cite this