Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Meaning of Video Games: Gaming and Textual Strategies

Buy

The Meaning of Video Games takes a textual studies approach to an increasingly important form of expression in today’s culture. It begins by assuming that video games are meaningful–not just as sociological or economic or cultural evidence, but in their own right, as cultural expressions worthy of scholarly attention. In this way, this book makes a contribution to the study of video games, but it also aims to enrich textual studies.

Early video game studies scholars were quick to point out that a game should never be reduced to merely its "story" or narrative content and they rightly insist on the importance of studying games as games. But here Steven E. Jones demonstrates that textual studies–which grows historically out of ancient questions of textual recension, multiple versions, production, reproduction, and reception–can fruitfully be applied to the study of video games. Citing specific examples such as Myst and Lost, Katamari Damacy, Halo, Façade, Nintendo’s Wii, and Will Wright’s Spore, the book explores the ways in which textual studies concepts–authorial intention, textual variability and performance, the paratext, publishing history and the social text–can shed light on video games as more than formal systems. It treats video games as cultural forms of expression that are received as they are played, out in the world, where their meanings get made.

(HTML tags aren't allowed.)

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Case Study Research in Software Engineering: Guidelines and Examples
Case Study Research in Software Engineering: Guidelines and Examples

Based on their own experiences of in-depth case studies of softwareprojects in international corporations, in this book theauthors present detailed practical guidelines on the preparation,conduct, design and reporting of case studies of softwareengineering.  This is the first software engineering specificbook on the case study...

Beginning Android Tablet Programming
Beginning Android Tablet Programming

Beginning Android Tablet Programming starts off by showing how to get your system ready for Android tablet programming. You won't need any previous Android experience, because you'll learn all about the basic structure of an Android program and how the Android operating system works—and then you'll learn how to...


The Facts on File Algebra Handbook (Science Handbook)
The Facts on File Algebra Handbook (Science Handbook)
The mathematics that we teach and learn today includes concepts and ideas that once were pondered only by the most brilliant men and women of ancient, and not so ancient, times. Numbers such as 1,000, for example, or two, or zero, were at one time considered very abstract ideas. There was a time when a quantity more than two or three was simply...
Microsoft Office Access 2007: The Complete Reference
Microsoft Office Access 2007: The Complete Reference
The Ultimate Microsoft Office Access 2007 Resource

Build a highly responsive a database so you can track, report, and share information and make more informed decisions. This comprehensive resource shows you how to design and develop custom Access 2007 databases--even if you have little or no programming experience. You'll...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy