Browse Definitions :
Definition

pervasive gaming

Pervasive gaming is a type of gaming where playing is not contained within one particular platform or device. Gameplay may take place across multiple devices or range through (pervade) the real world. Pervasive gaming can add interesting dimensionality and increase immersion in games, sometimes to the point of blurring the lines between game content and the physical world.

Generally, pervasive gaming refers to games that range through the real world. However, the term has also been used to describe games that depend on non-standard input through pervasive technology, as well as games that play across multiple platforms. In business, the pervasive approach is sometimes used in gamification for training and tasks.

Live action role-playing (LARP or LARPing) was one of the first forms of pervasive gaming. LARPing takes what might previously have been confined to Dungeons and Dragons board games and extends it into the real world, where a dungeon master writes a story, players make their characters and engage in chance and statistic-driven exploration and combat.

As games trended towards the electronic, some games emerged that blended a computer game experience with quest elements in the real world. Recent developments in pervasive gaming include integration with virtual reality (VR), augmented reality (AR) and mixed reality (MR). Pokémon GO was a breakthrough example of AR pervasive gaming.

The term pervasive gaming arose as an offshoot from the notion of pervasive computing. In a 2001 article, Jennica Falk first used the term pervasive to refer to a game environment. In the same year, Jay Schneider and Gerd Kortuem used the full term, pervasive gaming, with a nod to its origin in pervasive computing in an academic paper at the University of Oregon.

This was last updated in June 2018

Continue Reading About pervasive gaming

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close