As games continue to displace television as a mainstream leisure activity, there has never been a better time to study games and to create solid connections between game developers and academic researchers. Building these connections will not be easy for there exists little common ground, and games are surrounded by supposition and saddled with the contradictory presumptions of harm and triviality. Despite these challenges, it is time to study games.
Aimbot. (2005). Retrieved July 12, 2005, from http://en.wikipedia.org/wiki/Aimbot
2.
Anderson, C. (2003). Violent video games: Myths, facts, and unanswered questions. Retrieved July 12, 2005, from http://www.apa.org/science/psa/sb-anderson.html
3.
Au, W. J. (2004). The nine souls of Wilde Cunningham. Retrieved July 12, 2005, from http://secondlife.blogs.com/nwn/2004/12/the_nine_souls_.html
4.
Barlow, J. P. (1996). A declaration of the independence of cyberspace. Retrieved July 12, 2005, from http://homes.eff.org/barlow/Declaration-Final.html
5.
Bartle, R. (2004). Designing virtual worlds. Indianapolis, IN: New Riders Publishing.
6.
Bartle, R. (2005). Contradictions. Retrieved July 12, 2005, from http://terranova.blogs.com/terra_nova/2005/06/contradictions_.html
7.
Brahe, T. (2005). The mainstream is coming, the mainstream is coming. Retrieved July 12, 2005, from http://www.escapistmagazine.com/issue/1/4
8.
Castronova, E., (2001). Virtual worlds. Retrieved July 12, 2005, from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=294828
9.
Counter-Strike(2005). Retrieved July 12, 2005, from http://en.wikipedia.org/wiki/Counter-Strike
10.
Essential facts about the computer and video game industry. (n.d.). Retrieved July 12, 2005, from http://www.theesa.com/files/2005Essential%20Facts.pdf
11.
History of cheating in Counter-Strike.(2005). Retrieved July 12, 2005, from http://en.wikipedia.org/wiki/History_of_cheating_in_Counter-Strike
12.
Hunter, D., & Lastowka, F. G. (2004). Amateur-to-amateur.Retrieved July 12, 2005, from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=601808
13.
Johnson, S. (2005). Everything bad is good for you. New York: Penguin.
14.
Lessig, L. (2003). Creators in Second Life. Retrieved July 12, 2005, from http://www.lessig.org/blog/archives/001577.shtml
15.
North, D. C. (1993). Prize lectureRetrieved July 12, 2005, from http://nobelprize.org/economics/laureates/1993/north-lecture.html
16.
Ondrejka, C. (2004). Escaping the gilded cage. Retrieved July 12, 2005, from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=538362
17.
Pseudonymity. (2005). Retrieved July 13, 2005, from http://en.wikipedia.org/wiki/Pseudonymity
18.
Robinson, E. (2005). Why crunch mode doesn't work: 6 lessons. Retrieved July 12, 2005, from http://www.igda.org/articles/erobinson_crunch.php
19.
Sakey, M. (2005). There are no words (yet): The desperately incomplete language of gaming. Retrieved July 12, 2005, from http://www.igda.org/articles/msakey_language.php
20.
Too many bugs to mention, but “dupe” bugs can be the most damaging. (n.d.). Retrieved July 12, 2005, from http://www.netipedia.com/index.php/Duping
21.
Wargaming. (2005). Retrieved July 12, 2005, from http://en.wikipedia.org/wiki/Wargaming
22.
Williams, D. (2005). Virtual violence. Retrieved July 12, 2005, from http://terranova.blogs.com/terra_nova/2005/06/virtual_violenc.html
23.
Williams, D., & Skoric, M. (2005). Internet fantasy violence: A test of aggression in an online game. Communication Monographs, 22, 217-233.
24.
Yee, N. (2005). MMORPG hours vs. TV hours. Retrieved July 12, 2005, from http://www.nickyee.com/daedalus/archives/000891.php