skip to main content
research-article

Cheating in Online Games: A Social Network Perspective

Published:01 May 2014Publication History
Skip Abstract Section

Abstract

Online gaming is a multi-billion dollar industry that entertains a large, global population. One unfortunate phenomenon, however, poisons the competition and spoils the fun: cheating. The costs of cheating span from industry-supported expenditures to detect and limit it, to victims’ monetary losses due to cyber crime.

This article studies cheaters in the Steam Community, an online social network built on top of the world’s dominant digital game delivery platform. We collected information about more than 12 million gamers connected in a global social network, of which more than 700 thousand have their profiles flagged as cheaters. We also observed timing information of the cheater flags, as well as the dynamics of the cheaters’ social neighborhoods.

We discovered that cheaters are well embedded in the social and interaction networks: their network position is largely indistinguishable from that of fair players. Moreover, we noticed that the number of cheaters is not correlated with the geographical, real-world population density, or with the local popularity of the Steam Community. Also, we observed a social penalty involved with being labeled as a cheater: cheaters lose friends immediately after the cheating label is publicly applied.

Most importantly, we observed that cheating behavior spreads through a social mechanism: the number of cheater friends of a fair player is correlated with the likelihood of her becoming a cheater in the future. This allows us to propose ideas for limiting cheating contagion.

Skip Supplemental Material Section

Supplemental Material

References

  1. Ahmad, M., Keegan, B., Sullivan, S., Williams, D., Srivastava, J., and Contractor, N. 2011. Illicit bits: Detecting and analyzing contraband networks in massively multiplayer online games. In Proceedings of the IEEE 3rd International Conference on Social Computing (SocCom’11). IEEE, 127--134.Google ScholarGoogle Scholar
  2. APB Reloaded Dev Blog. 2011. http://goo.gl/m9klr.Google ScholarGoogle Scholar
  3. Ariely, D. 2012. The (Honest) Truth About Dishonesty: How We Lie to Everyone---Especially Ourselves. Harper.Google ScholarGoogle Scholar
  4. Balint, M., Posea, V., Dimitriu, A., and Iosup, A. 2011. An analysis of social gaming networks in online and face-to-face bridge communities. In Proceedings of the 3rd International Workshop on Large-Scale System and Application Performance. ACM, 35--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Blackburn, J. and Iamnitchi, A. 2013. Relationships under the microscope with interaction-backed social networks. In Proceeding of the 1st International Conference on Internet Science.Google ScholarGoogle Scholar
  6. Blackburn, J., Simha, R., Kourtellis, N., Zuo, X., Ripeanu, M., Skvoretz, J., and Iamnitchi, A. 2012. Branded with a scarlet “C”: Cheaters in a gaming social network. In Proceedings of the 21st International Conference on World Wide Web. ACM, 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Carrell, S., Malmstrom, F., and West, J. 2008. Peer effects in academic cheating. J. Human Resources 43, 1, 173--207.Google ScholarGoogle Scholar
  8. Chambers, C., Feng, W.-C., Sahu, S., Saha, D., and Brandt, D. 2010. Characterizing online games. IEEE/ACM Trans. Netw. 18, 3, 899--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Claypool, M., LaPoint, D., and Winslow, J. 2003. Network analysis of counter-strike and Starcraft. In Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference. 261--268.Google ScholarGoogle Scholar
  10. Consalvo, M. 2007. Cheating: Gaining Advantage in Videogames. 1st Ed. MIT Press. Cambridge, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Cross, T. 2011. All the world’s a game. http://www.economist.com/node/21541164.Google ScholarGoogle Scholar
  12. Deterding, S., Sicart, M., Nacke, L., O’Hara, K., and Dixon, D. 2011. Gamification. Using game-design elements in non-gaming contexts. In Proceedings of the Extended Abstracts on Human Factors in Computing Systems (CHI EA’11). ACM, 2425--2428. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ducheneaut, N., Yee, N., Nickell, E., and Moore, R. J. 2007. The life and death of online gaming communities: A look at guilds in world of warcraft. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Duh, H. B.-L. and Chen, V. H. H. 2009. Cheating behaviors in online gaming. Online Commun. Social Comput. 5621, 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dumitrica, D. D. 2011. An exploration of cheating in a virtual gaming world. J. Gam. Virt. Worlds 3, 1, 21--36.Google ScholarGoogle ScholarCross RefCross Ref
  16. Feng, W., Chang, F., Feng, W., and Walpole, J. 2005. A traffic characterization of popular on-line games. IEEE/ACM Trans. Netw. 13, 488--500. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Feng, W.-C., Chang, F., Feng, W.-c., and Walpole, J. 2002. Provisioning on-line games: A traffic analysis of a busy counter-strike server. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment. ACM, 151--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Feng, W.-C. and Feng, W.-c. 2003. On the geographic distribution of on-line game servers and players. In Proceedings of the 2nd Workshop on Network and System Support for Games (NetGames’03). ACM, 173--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fitocracy, Inc. 2012. Fitocracy. http://www.fitocracy.com.Google ScholarGoogle Scholar
  20. Foursquare Labs, Inc. 2012. Foursquare. http://www.foursquare.com.Google ScholarGoogle Scholar
  21. Fritsch, T., Voigt, B., and Schiller, J. 2006. Distribution of online hardcore player behavior: (how hardcore are you?). In Proceedings of 5th ACM SIGCOMM Workshop on Network and System Support for Games. ACM, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gartner. 2011. Gartner says by 2015, more than 50 percent of organizations that manage innovation processes will gamify those processes. http://www.gartner.com/newsroom/id/1629214.Google ScholarGoogle Scholar
  23. Giles, J. 2010. Inside the race to hack the kinect. New Scientist 208, 2789, 22--23.Google ScholarGoogle Scholar
  24. Gino, F., Ayal, S., and Ariely, D. 2009. Contagion and differentiation in unethical behavior: The effect of one bad apple on the barrel. Psych. Sci. 20, 3, 393--398.Google ScholarGoogle ScholarCross RefCross Ref
  25. Glas, R. 2011. Breaking reality: Exploring pervasive cheating in Foursquare. In Proceedings of DiGRA 2011, 1--15.Google ScholarGoogle Scholar
  26. Gross, T., D’Lima, C. J. D., and Blasius, B. 2006. Epidemic dynamics on an adaptive network. Phys. Rev. Lett. 96, 208701.Google ScholarGoogle ScholarCross RefCross Ref
  27. Halotags. 2012. Halotags Halo 3 & Halo 4 MLG level 50 accounts for sale. http://www.halotags.com.Google ScholarGoogle Scholar
  28. Hamari, J. and Lehdonvirta, V. 2010. Game design as marketing: How game mechanics create demand for virtual goods. Int. J. Bus. Sci. Appl. Man. 5, 1, 14--29.Google ScholarGoogle Scholar
  29. He, W., Liu, X., and Ren, M. 2011. Location cheating: A security challenge to location-based social network services. In Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS). IEEE, 740--749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Herbrich, R., Minka, T., and Graepel, T. 2007. Trueskill: A Bayesian skill rating system. Adv. Neural Inf. Proc. Syst. 19, 569.Google ScholarGoogle Scholar
  31. Hothorn, T., Hornik, K., van de Wiel, M. A., and Zeileis, A. 2008. Implementing a class of permutation tests: The coin package. J. Stat. Softw. 28, 8, 1--23.Google ScholarGoogle ScholarCross RefCross Ref
  32. Huizinga, J. 1950. Home Ludens: A Study of the Play-Element in Culture. Beacon Press, Boston, MA.Google ScholarGoogle Scholar
  33. Keegan, B., Ahmed, M., Williams, D., Srivastava, J., and Contractor, N. 2010. Dark gold: Statistical properties of clandestine networks in massively multiplayer online games. In Proceedings of the IEEE 2nd International Conference on Social Computing (SocialCom). 201--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Kourtellis, N., Alahakoon, T., Simha, R., Iamnitchi, A., and Tripathi, R. 2012. Identifying high betweenness centrality nodes in large social networks. Social Netw. Anal. Mining, 1--16.Google ScholarGoogle Scholar
  35. Ku, Y., Chen, Y., Wu, K., and Chiu, C. 2007. An empirical analysis of online gaming crime characteristics from 2002 to 2004. In Proceedings of PAISI 07. 34--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Kulik, B. W., O’Fallon, M. J., and Salimath, M. S. 2008. Do competitive environments lead to the rise and spread of unethical behavior? Parallels from Enron. J. Bus. Ethics 83, 4, 703--723.Google ScholarGoogle ScholarCross RefCross Ref
  37. Kushner, D. 2010. Steamed: Valve software battles video-game cheaters. http://goo.gl/wWgq6n.Google ScholarGoogle Scholar
  38. Landers, R. and Callan, R. 2011. Casual social games as serious games: The psychology of gamification in undergraduate education and employee training. Serious Games and Edutainment Applications, 399--423.Google ScholarGoogle Scholar
  39. Lin, R. and Zhu, X. 2012. Leveraging social media for preventive care-a gamification system and insights. Stud. Health Tech. Informat. 180, 838.Google ScholarGoogle Scholar
  40. Longini, I. M., Nizam, A., Xu, S., Ungchusak, K., Hanshaoworakul, W., Cummings, D. A. T., and Halloran, M. E. 2005. Containing pandemic influenza at the source. Science 309, 5737, 1083--1087.Google ScholarGoogle Scholar
  41. Mason, W. and Clauset, A. 2013. Friends FTW! Friendship and competition in Halo: Reach. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. 375--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Nazir, A., Raza, S., Chuah, C.-N., and Schipper, B. 2010. Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications. In Proceedings of the 3rd Workshop on Online Social Networks (WOSN’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Onnela, J.-P., Saramäki, J., Hyvönen, J., Szabó, G., Lazer, D., Kaski, K., Kertész, J., and Barabási, A.-L. 2007. Structure and tie strengths in mobile communication networks. Proc. Nat. Acad. Sci. 104, 18, 7332--7336.Google ScholarGoogle ScholarCross RefCross Ref
  44. Parfit, D. 1984. Reasons and Persons. Oxford University Press.Google ScholarGoogle Scholar
  45. Pelechrinis, K., Krishnamurthy, P., and Zhang, K. 2012. Gaming the game: Honeypot venues against cheaters in location-based social networks. arXiv.Google ScholarGoogle Scholar
  46. Re-logic. 2011. Terraria. http://store.steampowered.com/app/105600/.Google ScholarGoogle Scholar
  47. Rettinger, D. and Kramer, Y. 2009. Situational and personal causes of student cheating. Res. High. Educat. 50, 293--313.Google ScholarGoogle ScholarCross RefCross Ref
  48. Ruan, Z., Tang, M., and Liu, Z. 2012. Epidemic spreading with information-driven vaccination. Phys. Rev. E 86, 036117.Google ScholarGoogle ScholarCross RefCross Ref
  49. Scellato, S., Mascolo, C., Musolesi, M., and Latora, V. 2010. Distance matters: Geo-social metrics for online social networks. In Proceedings of the 3rd Workshop on Online Social Networks (WOSN’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sekhon, J. S. 2011. Multivariate and propensity score matching software with automated balance optimization: The matching package for r. J. Stat. Softw. 42, 7, 1--52.Google ScholarGoogle ScholarCross RefCross Ref
  51. Senior, T. 2011. Steam controls up to 70% of the PC download market and is “tremendously profitable”. http://goo.gl/MjgA3.Google ScholarGoogle Scholar
  52. Staudt, S. 2011. Steam condenser. https://github.com/koraktor/steam-condenser.Google ScholarGoogle Scholar
  53. Szell, M. and Thurner, S. 2010. Measuring social dynamics in a massive multiplayer online game. Social Netw. 32, 313--329.Google ScholarGoogle ScholarCross RefCross Ref
  54. Thom, J., Millen, D., and DiMicco, J. 2012. Removing gamification from an enterprise SNS. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). ACM, 1067--1070. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Trendy Entertainment. 2011. Dungeon Defenders. http://store.steampowered.com/app/65800/.Google ScholarGoogle Scholar
  56. Valve. 2012a. The international - dota 2. http://www.dota2.com/international.Google ScholarGoogle Scholar
  57. Valve. 2012b. Steam community update now live. http://store.steampowered.com/news/8788/.Google ScholarGoogle Scholar
  58. Wei, X., Yang, J., Adamic, L., Araújo, R., and Rekhi, M. 2010. Diffusion dynamics of games on online social networks. In Proceedings of the 3rd Workshop on Online Social Networks (WOSN’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Werbach, K. and Hunter, D. 2012. For the Win: How Game Thinking Can Revolutionize Your Business. Wharton Digital Press.Google ScholarGoogle Scholar
  60. Wilson, C., Boe, B., Sala, A., Puttaswamy, K. P. N., and Zhao, B. Y. 2009. User interactions in social networks and their implications. In Proceedings of the 4th European Conference on Computer Systems. ACM, 205--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Xu, Y., Cao, X., Sellen, A., Herbrich, R., and Graepel, T. 2011. Sociable killers: understanding social relationships in an online first-person shooter game. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’11). ACM, 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cheating in Online Games: A Social Network Perspective

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 13, Issue 3
          May 2014
          97 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/2630790
          • Editor:
          • Munindar P. Singh
          Issue’s Table of Contents

          Copyright © 2014 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 2014
          • Accepted: 1 December 2013
          • Revised: 1 November 2013
          • Received: 1 February 2013
          Published in toit Volume 13, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!