Critical Play

by Mary Flanagan

Published 7 August 2009
For many players, games are entertainment, diversion, relaxation, fantasy. But what if certain games were something more than this, providing not only outlets for entertainment but a means for creative expression, instruments for conceptual thinking, or tools for social change? In Critical Play, artist and game designer Mary Flanagan examines alternative games -- games that challenge the accepted norms embedded within the gaming industry -- and argues that games designed by artists and activists are reshaping everyday game culture. Flanagan provides a lively historical context for critical play through twentieth-century art movements, connecting subversive game design to subversive art: her examples of "playing house" include Dadaist puppet shows and The Sims. She looks at artists' alternative computer-based games and explores games for change, considering the way activist concerns -- including worldwide poverty and AIDS -- can be incorporated into game design.
Arguing that this kind of conscious practice -- which now constitutes the avant-garde of the computer game medium -- can inspire new working methods for designers, Flanagan offers a model for designing that will encourage the subversion of popular gaming tropes through new styles of game making, and proposes a theory of alternate game design that focuses on the reworking of contemporary popular game practices.

All games express and embody human values, providing a compelling arena in which we play out beliefs and ideas. "Big ideas" such as justice, equity, honesty, and cooperation -- as well as other kinds of ideas, including violence, exploitation, and greed -- may emerge in games whether designers intend them or not. In this book, Mary Flanagan and Helen Nissenbaum present Values at Play, a theoretical and practical framework for identifying socially recognized moral and political values in digital games. Values at Play can also serve as a guide to designers who seek to implement values in the conception and design of their games.

After developing a theoretical foundation for their proposal, Flanagan and Nissenbaum provide detailed examinations of selected games, demonstrating the many ways in which values are embedded in them. They introduce the Values at Play heuristic, a systematic approach for incorporating values into the game design process. Interspersed among the book's chapters are texts by designers who have put Values at Play into practice by accepting values as a design constraint like any other, offering a real-world perspective on the design challenges involved.

Obfuscation

by Finn Brunton and Helen Nissenbaum

Published 4 September 2015
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should.

With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.

Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.