Browse Definitions :
Definition

pervasive gaming

Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device. Gameplay may take place across multiple devices or range through (pervade) the real world. Pervasive gaming can add interesting dimensionality and increase immersion in games, sometimes to the point of blurring the lines between game content and the physical world.

Generally, pervasive gaming refers to games that range through the real world. However, the term has also been used to describe games that depend on non-standard input through pervasive technology, as well as games that play across multiple platforms. In business, the pervasive approach is sometimes used in gamification for training and tasks.

Live action role-playing (LARP or LARPing) was one of the first forms of pervasive gaming. LARPing takes what might previously have been confined to Dungeons and Dragons board games and extends it into the real world, where a dungeon master writes a story, players make their characters and engage in chance and statistic-driven exploration and combat.

As games trended towards the electronic, some games emerged that blended a computer game experience with quest elements in the real world. Recent developments in pervasive gaming include integration with virtual reality (VR), augmented reality (AR) and mixed reality (MR). Pokémon GO was a breakthrough example of AR pervasive gaming.

The term pervasive gaming arose as an offshoot from the notion of pervasive computing. In a 2001 article, Jennica Falk first used the term pervasive to refer to a game environment. In the same year, Jay Schneider and Gerd Kortuem used the full term, pervasive gaming, with a nod to its origin in pervasive computing in an academic paper at the University of Oregon.

This was last updated in June 2018

Continue Reading About pervasive gaming

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close