Are Gamers Really a Threat?

In: Social Issues

Submitted By ADPStudios
Words 1977
Pages 8
Drew Perry
1 December 2014
Are Gamers Really a Threat? Within the last fifteen years, the video game industry has grown exponentially and is now arguably one of the most robust industries in the entertainment world. Video game sales have more than quadrupled in this time as well, which accounts for this multibillion dollar industry. Inside this enormous industry, hundreds of genres span the base of the industry but a few genres make up the core. Within this core are game categories, such as FPS (First Person Shooters), which have some aspect of violence to it. The popularity of these violent video games has risen greatly within the last 5 years. In 2008, from the age group 12-17 in the United States, 97% of them played video games, and 10 of the top 20 best-selling video games in the United States contained violence ( These violent video games are attributed to the cause of increase in school shootings as well as increases in domestic and youth violence. Critics of these violent video games argue that the because the violence is encouraged to do well in the game through reward, that the player becomes desensitized towards the violence and will teach children that violence is an acceptable way to resolve conflicts ( Video game advocates claim that the research is deeply flawed because there has been no link between video game violence and that of social violence. Many argue that the game actually relieves anger and aggression in a safe outlet (, as well as it keeps kids occupied and off the streets and out of danger.
With all the new consoles and mobile platforms, as well as the price being in a stable and affordable state, it is now very easy for a younger child or teen to get involved playing these violent video games, some being rated by the Entertainment Software Rating Board (ESRB) as intended for Mature (+17)…...

Similar Documents

Gamer Division Classification

...Guadalupe Vasquez Lea Clarkson English 1301 3 April 2013 Gameboy I’ve been a gamer all my life. -Tiger Woods The term gamer refers to a person that has spent amount of time playing video games or purchasing anything related to video games. One does not have to play video games every second of every your, just have a passion for the games. There are different levels of gamers. Similar to the military, gamers are categorized by rank. The better you are the higher you are in rank. Rank is determined by experience, knowledge, and attitude. There are many gamer ranks, but I will use three of my favorite; the Noob, Pro, and Specialist. Let’s begin at the bottom of the totem pole. The Noob, also known as the rookie, is often picked on because lack of skills and knowledge. He is always the first one to die, or the reason the team loses. He does not have much experience due to the lack of gameplay and hand eye coordination. Most Noobs will spend countless hours a week playing and continuously losing. His collection of games and video game accessories are very limited. Most Noobs will only have one gaming console, typically the latest and greatest. The Noob will only buy the most popular game on the market and once it loses its popularity, off to GameStop he goes. He will trade it in for the next big thing. This is one of the many reasons he will never get any better, he does not put in the time to learn a game; rookie mistake...

Words: 803 - Pages: 4

Spectrum of Gamers

...Nicolas Huitron Mrs. Eason English 101 7 Oct. 2013 Spectrum of Gamers It’s a normal evening in my bedroom as I just sat down in my chair and getting ready to play a game of League of Legends. Armed with my mouse and keyboard as I hit the play button to queue for a game, other players doing the same. But no matter where you are playing, you will find the same three types of gamers to play with or against. These gamers fall into many different categories but they can be classified according to how they play the game, such as the toxic gamer, the friendly gamer and the unskilled gamer. The toxic gamers are the worst kind of gamers to play with. They play like the name implies--angry, foul, and irritable. These kinds of player make the team at risk to lose because of their cursing, bickering and calling other players names. Playing with these kinds of players can be a horrible experience as you become a target of their rage. Many players in this group are usually of the younger range of video game players. My friend Connor is this type of player. His anger at the unskilled players in League of Legends causes him to fuss about at the team. He gets mad at any sight of an error and causes him to be even more spiteful. These jerks of the game community usually leave everyone in the game in a bad mood and other players wonder how they are not banned from playing. However, the friendly gamer is the complete opposite. This player usually is care-free and is not too worried......

Words: 502 - Pages: 3


...As a gamer in World of Warcraft, the excitement of playing with other individuals around the world and never leaving the comfort of home can be exciting. To do this it requires a client, server and network in between. The client is your computer. The server is the machine that you connect to when you play. World of Warcraft has over 5 million clients. As the client logs into the server and begins play, the actions of the input devices used such as voice, mouse and keyboard are converted into ones and zeroes ( binary) as that is the only way that information in understood in both a computer and network. Due to so many clients MMORPGs require lots of servers. The world server is where the game takes place. Sometimes, a world server is really several servers .Other servers that MMORPGs require are, a login server allows players to log in to the game and access the game world, chat server relays all the text players use to communicate with one another, voice server does the same for voice traffic and a web server allows players to access their account information. (Wilson, 1998-2013) Game play is essentially an interaction between the client and the server. The data generated by your actions must then be put in some standard format, Your data will go through several switches, routers, gateways and other machines on the internet before it reaches its destination. You might be running Windows on your machine, but these other machines that route your data to its......

Words: 485 - Pages: 2

Security Threats

...In 2011 Symantec listed the most significant attacks of 2010; these were targeted attacks, social networking, attack kits, mobile threats, zero-day and rootkits. These targeted attacks are exactly what it says, they target what they are designed to hit, whether it is a company (small or large), and individual or a specific machine. [ (Symantec, 2011) ] Symantec recorded over 3 billion malware attacks but yet Stuxnet stands out more than the others. However, lets us not forget Hydraq. Each one was highly sophisticated and was tailored for specific targets. Although Hydraq was old-fashioned, what made it stand out was what and whom it stole. Of course targeted attacks didn’t begin until 2010, and it won’t end. Once inside, the attack attempts to avoid detection until its objective is met. [ (Symantec, 2011) ] In 2010, the volume and sophistication of malicious activity increased, the Stuxnet worm became the first with the ability to affect physical devices while attempting exploits for an unprecedented number of zero-day vulnerabilities simultaneously. Although unlikely to become commonplace, Stuxnet does show what a skilled group of organized attackers can accomplish. [ (Symantec, 2011) ] Although providing a look at the security threats that are out there on the internet that us as users face on a daily basis, unless we know what we are dealing with, there is no way to defend against it. This is why it is important that we keep our software updated to help prevent......

Words: 340 - Pages: 2

Not Really

...geared up and blown by bards numerically. At this point bards have two things: mobility and utility. Everyone seems to complain about bard mobility like it's too much but similar reactions could be thrown at summoner mobility; once their dots are up a good majority of the summoners damage is taken care, and they can ruin2 while they need to move. Summoners suffer a minimal damage loss as a result of mobility, but nobody seems to complain about them like they do about bards.As someone who raids at a fairly decent level, with two bards in the group, I can attest that we didn't opt for a second bard because of the mobility, it was the utility. A second bard gives your healers an (arguable) bottomless manapool, and allows your caster dps to really flex (battle voice foe's requiem) during periods where high raid damage is necessary. All the mobility in the world is going to make the dreadnaughts in turn 4 die faster. You might say that Bard utility is overpowered, but I would insist that you take a look at the broad spectrum. 99 out of 100 raids are coming in with 2 bards or 2 caster dps. You can adequately clear all five turns with either a 2 bard or 2 caster dps setup. The same cannot be said for melee, they need to be brought up in overall raid value so that taking one isn't a decision you begrudgingly make because you want/need the limit break. You might argue the necessity of having a bard, about how no group is clearing through coils without at least one bard,......

Words: 724 - Pages: 3

It Gamer

...remote access communications commonly used through the public Internet (i.e., remote access via Internet) 10. Which domain within a typical IT infrastructure is the weakest link? From am access control perspective, why is the User Domain the greatest risk? 11. True or False. It is a best practice to enable both a host-based IP stateful firewall in servers and workstation along with a perimeter, network-based IP stateful firewall for a layered security solution. 12. What types of physical access controls can be implemented to authenticate a physical human prior to allowing entrance into a data center or telecommunications wiring closet? 13. Which of the seven domains of a typical IT infrastructure represents the greatest risk or threat from the outside world and attackers? 14. True of False. It is a best practice to enable an organization-wide Access Control Policy Definition that encompasses all seven domains of a typical IT infrastructure and is properly aligned to a Data Classification Standard. 15. True or False. Organizations that implement an Acceptable Use Policy (AUP) can address access controls within this policy definition....

Words: 376 - Pages: 2

Secutiry Threats

...Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly classified into outside and inside threats. Organization may be exposed to viruses and worms as a result of employees not following certain practices or procedures. Intruders are also a big security threat—they hack into large networks to steal private information like social security numbers or credit card account information. Closely related to the intruder security threats are the “Insiders” who are more dangerous in many respects than outside intruders. Insiders have the access and knowledge necessary to cause immediate damage to an organization. Most security is designed to protect against outside intruders and thus lies at the boundary between the organization and the rest of the world (Conklin & White). The various techniques an attacker might employ to access file systems are, Trojan horse programs which are a common way for intruders to trick you (sometimes referred to as "social engineering") into installing "back door" programs. These can allow intruders easy access to your computer without your knowledge, change......

Words: 452 - Pages: 2


...Threats of new entrants The threats of new entrants could recognized low due to several fact: The size of economies of scale and its main competitors,are very large. They have strong market power and capital to maintain their value. For the company, it has more than million servers located around the world to provide searching services to customers and obtain information from customers. Therefore, they understand the customer’s habits. Its main competitors are also not lag behind to improving their searching engines servers. It have high brand loyalty of users and it is famous that one of the strongest brand recognitions in the world. However, the switching cost is low. For users, other search engines were literally one click away. The barrier of entry is high so that if a new entrant would like to earner internet industry and would get successfully, it needs to have Sufficient of capital and technology that provide a better searching engine, and also must overcome the brand loyalty. Threats of exiting rivalry The threats of exiting rivalry have two parts, searching engines and advertising. For searching engines, the threats of exiting rivalry are low. The company have obviously competitive advantage. Its searching engines provide the best searching result and the fastest searching speed in the industry. But the good performance of searching engines is in order to acquire more advertisement that place at its website. It is not a only way for advertiser to place......

Words: 495 - Pages: 2

Eight Threats

...8 Threats to Portfolio Performance The last decade has been a challenge for many investors, especially those investing for the long term and retirement. Given declines in global stock markets, many investors have seen little to no real growth in their portfolios over this period. For example, $10,000 invested in the S&P 500 Market Index in 2000, was worth just $10,456 at the end of 2010. And this does not take into account inflation, investment fees and taxes.1 This White Paper explains why investors’ portfolios may underperform in both bear and bull markets and incur substantial costs in the process. It also details the impact this chronic underperformance can have on achieving long-term financial goals. Threat 1: The Expenses of Active Management Most us would like to beat the market, but as we’ll explore in this whitepaper, even many professional money managers have had a hard time performing better than the market. To understand why, it is helpful to begin with some definitions. Active investors (and active money managers) attempt to out- perform stock market rates of return by actively trading individual stocks and/or engaging in market timing — deciding when to be in and out of the market. Those investors who simply purchase “the market” through index or asset class mutual funds are called passive or “market” investors. Active mutual fund managers are typically compared to a benchmark index. For example, large cap mutual funds are often compared to the...

Words: 3636 - Pages: 15

Abortion Really ?

...Abortion Really? XXXXXXX English March XX, 2010 Richard Kamerman Abortion really? What is one of the most controversial issues in the United States today? If one of the top answers is abortion, then that is correct. Many women and their partners are often brought to this crossroad when choosing to end an unwanted pregnancy. These same individuals fail to completely realize the ramifications that follow once this procedure is done. Even though the procedure is considered relatively quick and easy, abortion must not be allowed because aborting a child is inhumane and can cause health and psychological side effects. An abortion, in general, is a procedure or operation performed to a woman that terminates a pregnancy prematurely by a perceived “quick and easy procedure”. Women who opt to do abort can have this procedure done in a one days’ time. They have the option of having a “Medical Abortion” or a “Suction Abortion”. A medical abortion is a non-surgical procedure and is also commonly referenced to as “taking the pill”. Most women prefer this method as it is quick, easy, and discreet since it can be done either at a medical clinic or if they choose to in the privacy of their home. A suction abortion is the other option or actual medical invasion procedure that can be done. According to the Pregnancy Advisory Service (2010) para. 1-4 “This procedure takes approximately fifteen to twenty minutes. A doctor or physician will take......

Words: 811 - Pages: 4


...conventionally extended from white middle class men to white middle class women and consists of behaviour such as opening doors for women, helping them on with their coats, walking on the outside on the pavement, giving up a place on the bus, and so on. [vi] This form of behaviour is anachronistic for many people in Britain, and the display of care for others within the public sphere is something which the Campaign for Courtesy, a pressure group which tries to encourage others to be more courteous, feels has deteriorated over the last twenty years (Gregory, 2000a).[vii] Even when courtesy was more accepted as a general standard of behaviour during the 1950s -1970s, it was characterised as a set of values which was contested or under threat because of the behaviour of certain groups or classes. Courtesy is generally subsumed in most people's accounts under the general heading of politeness, especially for many older people; one book on etiquette from the 1970s states: `Politeness between the sexes is particularly important. Both men and women err greatly in their behaviour towards one another. The attitude of many men is "they wanted equality, and they've got it", and this is their excuse for letting a door slam in a woman's face or failing to walk on the outside of the pavement when they are together, or paying any of the usual forms of courtesy. Women on the other hand, often adopt a rude and militant attitude towards men, and their behaviour when courtesy is shown......

Words: 14049 - Pages: 57

Is It Really Worth It?

...Argumentative Essay: Is it really worth it? LABR 1F90 Haseeb Mohammad 5591979 T.A – Nathan Cecckin March 25, 2016 “I do not support raising the minimum wage, and the reason is as follows. When the minimum wage is raised, workers are priced out of the market. That is the economic reality that seems, at least so far, to be missing from this discussion.” as John Sununu states, raising minimum wage is not a great decision. The minimum wage rate must not increase for the reason that this will put many firms out of business, and will also lower the employment rate. Assuming firms are employing resources at maximum efficiency, increasing the labor wages will cause immense damage. An increase in minimum wage will not help our economic system become efficient; in order to allow our economy to run smoothly there mustn’t be an increase in labor wages. Increasing wage rates will increase the unemployment rate resulting in an increase in inflation allowing an increase in poverty, increasing the minimum wage rate will also increase the expenses for businesses, and lastly it will also affect a majority of high school students. If the industries suppliers’ prices increase along with the wages many industries will start to go bankrupt because of the decrease in demand for the industries’ products, resulting in a decrease of employment for low skilled workers, or young people just as Niels Veldhuis & Sylvia LeRoy explain in their academic journal, “Specifically, he......

Words: 1437 - Pages: 6

Threat Ranking

...Implementing the WWF Project & Programme Standards Step 1.4 Define: Threat Ranking July 2007 Step 1.4 Threat Ranking Contents What Is a Threat Ranking?................................................................................................... 1 Why Is Threat Ranking Important? ..................................................................................... 1 When To Use Threat Rankings ............................................................................................ 1 How To Do a Threat Ranking ............................................................................................... 1 1. Determine the criteria for ranking .................................................................................................2 2. Apply the threat ranking................................................................................................................3 3. Sum up your threats across all targets to get an overall ranking for the site ...............................4 4. Classify each threat ......................................................................................................................4 Other Methods for Threat Ranking...................................................................................... 6 References............................................................................................................................. 6 Annex 1: Other Methods for Threat Ranking......

Words: 4482 - Pages: 18


...20 THREATS 1 Since this is a pioneering, people might find it unusual to use a toothpaste in a chewable form. 2 Another challenge would be convincing the traditional toothbrush users to buy the product. 3 The biggest competitor would be the chewing gum companies. 4 There is a high potential that consumers will not use this product as a substitute product for toothpaste. 5 Possibility of slow market growth. 6 Possibility of product being a “fad” in the market. 7 The challenge of being universally accepted in the marketplace. 8 Once it enters the market, it can be easily duplicated. 9 There could be a low customer demand. 10 It would be difficult to penetrate the competitive market. 11 Doctors may still recommend toothpaste as the number one solution for oral treatment. 12 The need to have the positioning of product in the minds of the consumers would be hard to achieve. 13 Mouthwash companies can also be seen as one of the competitors. 14 Customers might not find the same satisfaction they get from tooth brushing. 15 The changing needs of the consumers are inevitable. 16 As a developing company, it requires a huge amount of effort to market the product. 17 The increasing number of counterfeits. 18 There could be a seldom buying in this product since people are used to brushing teeth. 19 Consumers especially generation X may perceived that it may cause cavity because of being a gum type. 20 It may be difficult for the company to achieve its desired...

Words: 267 - Pages: 2

Cyber Threats

...TOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place. These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be talked about in Therefore, these cyber threats will be assessed, to give you an idea of what they can do to your company or life, and the proper response on how to mitigate them.   TOP FIVE CYBER SECURITY THREATS FOR 2012 With cyber security becoming an issue in todays corporate society the corporate world is looking into all of the threats to mitigate the leaking of sensitive information to the public. This has come to light with hactivists conducting large-scale exploits to infiltrate law enforcement agencies and major companies and steal sensitive data that could embarrass or damage certain organizations (Wansley, 2012). In this paper the top five cyber security threats for 2012 will be assessed and talked about to help control, mitigate,...

Words: 931 - Pages: 4