Analyzing repetitive action in game based on sequence pattern matching
- 429 Downloads
As games become more popular, procedures which can support the analysis and understanding of players’ behaviors are necessary for success of commercial games. This paper presents a log-based usability evaluation system to analyze user behavior in a gaming environment. We explore the potential of input log data for automated usability evaluation and visualization of player behavior in a game. We traced the keyboard input value and mouse movement of users using a sequence data mining technique in a gaming environment. And we also constructed 3D body meshes for the behavior analysis using Kinect interface. We visualized the data obtained by tracing and automatically searched repetitive patterns in the game and analyzed them. The result obtained from the analysis can be used for user interface optimization, fun evaluation, and the bot-detection field.
KeywordsUsability evaluation Mouse tracking Log data analysis
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (NRF-2012R1A1A1012895).
- 1.Arroyo, E., Selker, T., Wei, W.: Usability tool for analysis of web designs using mouse tracks. In: CHI’06 Extended Abstracts on Human Factors in Computing Systems, p. 484 (2004)Google Scholar
- 2.Atterer, R., Wnuk, M., Schmidt, A.: Knowing the user’s every move—user activity tracking for website usability evaluation and implicit interaction. In: Proceedings of the 15th international conference on World Wide Web (WWW), p. 203 (2006)Google Scholar
- 3.Mueller, F., Lockerd, A.: Cheese: tracking mouse movement activity on websites, a tool for user modeling. In: CHI’01 Extended Abstracts on Human Factors in Computing Systems, p. 279 (2001)Google Scholar
- 4.Isbister, K., Schaffer, N.: Game Usability: Advancing the Player Experience. Morgan Kaufman, Menlo Park (2008)Google Scholar
- 6.Woo, J.Y., Choi, H.J., Kim, H.K.: An automatic and proactive identity theft detection model in MMORPGs. Appl Math Inf Sci 6, 291 (2012)Google Scholar
- 7.Yeung, S., Lui, J., Liu, J., Yan, J.: Detecting cheaters for multiplayer games: theory, design and implementation. In: Proceedings of the Consumer Communications and Networking Conference (CCNC), p. 1178 (2006)Google Scholar
- 8.Kim, J.H., Gunn, D.V., Schuh, E., Phillips, B.C., Pagulayan, R.J., Wixon, D.: Tracking real-time user experience (TRUE): a comprehensive instrumentation solution for complex systems. In: Proceedings of the 26th annual SIGCHI conference on human factors in computing systems, p. 443 (2008)Google Scholar
- 11.Missura, O., Gartner, T.: Player modeling for intelligent difficulty adjustment. In: Proceedings of the 12th International Conference on Discovery Science, p. 197 (2009)Google Scholar
- 12.Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proceedings of the Eleventh International Conference on Data Engineering (ICDE), p. 3 (1995)Google Scholar