Browse Definitions :
Definition

pervasive gaming

Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device. Gameplay may take place across multiple devices or range through (pervade) the real world. Pervasive gaming can add interesting dimensionality and increase immersion in games, sometimes to the point of blurring the lines between game content and the physical world.

Generally, pervasive gaming refers to games that range through the real world. However, the term has also been used to describe games that depend on non-standard input through pervasive technology, as well as games that play across multiple platforms. In business, the pervasive approach is sometimes used in gamification for training and tasks.

Live action role-playing (LARP or LARPing) was one of the first forms of pervasive gaming. LARPing takes what might previously have been confined to Dungeons and Dragons board games and extends it into the real world, where a dungeon master writes a story, players make their characters and engage in chance and statistic-driven exploration and combat.

As games trended towards the electronic, some games emerged that blended a computer game experience with quest elements in the real world. Recent developments in pervasive gaming include integration with virtual reality (VR), augmented reality (AR) and mixed reality (MR). Pokémon GO was a breakthrough example of AR pervasive gaming.

The term pervasive gaming arose as an offshoot from the notion of pervasive computing. In a 2001 article, Jennica Falk first used the term pervasive to refer to a game environment. In the same year, Jay Schneider and Gerd Kortuem used the full term, pervasive gaming, with a nod to its origin in pervasive computing in an academic paper at the University of Oregon.

This was last updated in June 2018

Continue Reading About pervasive gaming

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • chief risk officer (CRO)

    The chief risk officer (CRO) is the corporate executive tasked with assessing and mitigating significant competitive, regulatory ...

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close