skip to main content
10.1145/1837885.1837896acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Mutually reinforcing systems

Published:25 July 2010Publication History

ABSTRACT

This paper demonstrates strategies for designing mobile games with by-products in order to allow the acquisition of specific data. A mobile game with by-products called EyeSpy and a photo website called Realise will be used as examples to demonstrate these strategies. The Realise website allows users to browse geographically tagged photos and make specific requests for new ones. In the EyeSpy game, players use mobile phones to tag geographic positions with photos and text. EyeSpy players can earn points from validating each others' tags by visiting tag locations and attempting to 'confirm' them. If players go to the correct location, both the player confirming the tag and the player who created it will gain points. This creates game content for EyeSpy and provides more refined results for the Realise website. In this way, both the systems mutually reinforce each other.

References

  1. M. Bell, S. Reeves, B. Brown, S. Sherwood, D. MacMillan, J. Ferguson, and M. Chalmers. Eyespy: Supporting navigation through play. In CHI 2009, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Brown and M. Chalmers. Tourism and mobile technology. In ECSCW 2003: Proceedings of the eigth european conference on computer supported cooperative work, pages 335--355, Helsinki, Finland, 2003. Dordrecht: Kluwer Academic Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. von Ahn and L. Dabbish. Labeling images with a computer game. In CHI '04: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 319--326, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mutually reinforcing systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      HCOMP '10: Proceedings of the ACM SIGKDD Workshop on Human Computation
      July 2010
      95 pages
      ISBN:9781450302227
      DOI:10.1145/1837885

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 July 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader