{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:53:01Z","timestamp":1767649981622,"version":"3.41.2"},"reference-count":10,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002,4,1]]},"abstract":"<jats:p>The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Although computer game development often utilizes cutting edge technology in computer graphics, artificial intelligence, human computer interaction and programming, game providers (developers or operators) do not pay much attention to security techniques. In this paper, we look into security failures that have happened or might happen in online games, and discuss some key security issues that have to concern online game providers. Specifically, we look into various kinds of online cheating, and introduce security techniques to deal with cheating prevention, though meanwhile other security issues are also discussed.<\/jats:p>","DOI":"10.1108\/02640470210424455","type":"journal-article","created":{"date-parts":[[2002,7,28]],"date-time":"2002-07-28T19:02:19Z","timestamp":1027882939000},"page":"125-133","source":"Crossref","is-referenced-by-count":54,"title":["Security issues in online games"],"prefix":"10.1108","volume":"20","author":[{"given":"Jianxin","family":"Jeff Yan","sequence":"first","affiliation":[]},{"given":"Hyun\u2010Jin","family":"Choi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031619454206000_B1","unstructured":"Anderson, R. (1999), \u201cHow to cheat at the lottery\u201d, Proceedings Of Annual Computer Security Applications Conference."},{"key":"key2022031619454206000_B2","unstructured":"Anderson, R. (2001), Security Engineering, Wiley, New York, NY."},{"key":"key2022031619454206000_B3","doi-asserted-by":"crossref","unstructured":"Ben\u2010Or, M., Goldreich, O., Micali, S. and Rivest, R. (1990), \u201cA fair protocol for contract signing\u201d, IEEE Trans. on Information Theory, Vol. 36, pp. 40\u20106.","DOI":"10.1109\/18.50372"},{"key":"key2022031619454206000_B4","unstructured":"Chosun Ilbo (2001), \u201cRayegard system developer is punished\u201d, news article published on June 27, available at: www.chosun.com\/w21data\/html\/news\/200106\/200106270431.html."},{"key":"key2022031619454206000_B5","unstructured":"Greenhill, R. (1997), \u201cDiablo, and online multiplayer game\u2019s future\u201d, GamesDomain Review, available at: www.gamesdomain.com\/gdreview\/depart\/jun97\/diablo.html."},{"key":"key2022031619454206000_B6","unstructured":"Hankyoreh (2001), \u201cOnline cheating is ubiquitous\u201d, news article published on May 9, available at: www.hani.co.kr\/section\u2010005100025\/2001\/05\/005100025200105091907004.html."},{"key":"key2022031619454206000_B7","unstructured":"Pritchard, M. (2001), \u201cHow to hurt the hackers: the scoop on Internet cheating and how you can combat it\u201d, Information Security Bulletin, February."},{"key":"key2022031619454206000_B8","doi-asserted-by":"crossref","unstructured":"Yan, J.J. (2001), \u201cA note on proactive password checking\u201d, ACM New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, September.","DOI":"10.1145\/508171.508194"},{"key":"key2022031619454206000_B9","unstructured":"Yan, J.J., Early, S. and Anderson, R. (2000b), \u201cThe XenoService \u2013 a distributed defeat for distributed denial of service\u201d, Proceedings of Information Survivability Workshop 2000, IEEE computer society, Boston, MA, available at: www.cl.cam.ac.uk\/ftp\/users\/rja14\/xeno.pdf"},{"key":"key2022031619454206000_B10","unstructured":"Yan, J.J., Blackwell, A., Anderson, R. and Grant, A. (2000a), \u201cThe memorability and security of passwords \u2013 some empirical results\u201d, Technical Report No. 500, Computer Laboratory, University of Cambridge, Cambridge, available at: www.ftp.cl.cam.ac.uk\/ftp\/users\/rja14\/tr500.pdf"}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02640470210424455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640470210424455\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640470210424455\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:55Z","timestamp":1753400455000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/20\/2\/125-133\/90242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4,1]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,4,1]]}},"alternative-id":["10.1108\/02640470210424455"],"URL":"https:\/\/doi.org\/10.1108\/02640470210424455","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2002,4,1]]}}}