skip to main content
10.1145/1822348.1822363acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfdgConference Proceedingsconference-collections
research-article

What went wrong: a taxonomy of video game bugs

Published:19 June 2010Publication History

ABSTRACT

Video games are complex, emergent systems that are difficult to design and test. This difficulty invariably leads to failures being present in the game, negatively impacting the play experience of some. We present a taxonomy of possible failures, divided into temporal and non-temporal failures. The taxonomy can guide the thinking of designers and testers alike, helping them expose bugs in the game. This will lead to games being better tested and designed, with fewer failures when released.

References

  1. Common vunerabilities and exposures. http://cve.mitre.org/.Google ScholarGoogle Scholar
  2. Video game failure archive. http://www.zenetproject.com/taxonomy.Google ScholarGoogle Scholar
  3. Avižienis, A., Laprie, J. C., Randell, B., and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1, 1 (January 2004), 11--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bainbridge, W. A., and Bainbridge, W. S. Creative uses of software errors: Glitches and cheats. Social Science Computer Review 25, 1 (February 2007), 61--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Beizer, B. Software Testing Techniques, 2 ed. Van Nostrand Reinhold, 1990, pp. 33--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hind, C., and Bell, D. Setting the bar: Establishing bug criteria to save time, money, and sanity. January 2007.Google ScholarGoogle Scholar
  7. IGN. Fact or Fiction: The 10 Biggest Rumors on GameCube, August 2003. http://cube.ign.com/articles/432/432558p3.html.Google ScholarGoogle Scholar
  8. Killough, L. Doom level history. http://www.rome.ro/lee_killough/history/doomqna.shtml.Google ScholarGoogle Scholar
  9. Lewis, C. Zenet: Generating and enforcing real-time temporal invariants. In Proceedings of International Conference of Software Engineering (ICSE 2010) (May 2010). To be published. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lough, D. L. A taxonomy of computer attacks with applications to wireless networks. PhD thesis, Virginia Polytechnic Institute and State University, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. McElroy, J. See Tiger Woods actually make the Jesus Shot, August 2008. http://bit.ly/joystiq-jesusshot.Google ScholarGoogle Scholar
  12. Newsgaming. September 12th {online}. http://www.newsgaming.com/games/index12.htm.Google ScholarGoogle Scholar
  13. Salen, K., and Zimmerman, E. Rules of Play. MIT Press, 2004, pp. 350--353.Google ScholarGoogle Scholar
  14. Starr, K. Testing video games can't possibly be harder than an afternoon with Xbox, right? Seattle Weekly (July 2007).Google ScholarGoogle Scholar
  15. Tschang, F. T. Videogames as interactive experiential products and their manner of development. International Journal of Innovation Management 9, 01 (2005), 103--131.Google ScholarGoogle ScholarCross RefCross Ref
  16. Vijayaraghavan, G., and Kaner, C. Bug taxnonomies: Use them to generate better tests. In STAR EAST (May 2003).Google ScholarGoogle Scholar

Index Terms

  1. What went wrong: a taxonomy of video game bugs

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          FDG '10: Proceedings of the Fifth International Conference on the Foundations of Digital Games
          June 2010
          306 pages
          ISBN:9781605589374
          DOI:10.1145/1822348

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 19 June 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate152of415submissions,37%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader