Development and Implementation of the Algorithm Designed to Struggle with Videogame Addiction
Abstract
Game addiction appears to be a widespread disease among young people. Nowadays methods, such as parent control programs, have their own disadvantages. In this work a new method for controlling game activity is researched. It depends on analyzing user’s keyboard input. Research includes experiment in the order to collect information about key pressing dynamics during gaming. It turns out that gamers have their own unique pattern in how they press the keys. The most widespread type of the games are the games using four main buttons to control characters. Such games clearly differ from other types of computer activity such as typing or writing code. The main goal of this work is to develop and implement the algorithm which uses this pattern to detect games and stop computer process which runs the game. Machine learning methods appeared to be good for these purposes. The experiment allowed us to create a big database with input scans. Records are used to train a random forest classifier. Java programming language is used for implementing algorithm as a program product. JNativeHook open library is used for scanning process. At the start, the program creats a random forest classifier and trains it with static data. After this the main cycle of the program starts: every 20 seconds a new scan is performed and analyzed. If the program determines that there is currently game activity, then it will try to detect the game computer process and to stop it. During testing program showed great results for game with described above pattern: it detected the game and stopped its process for ten times in a row without any false effects.
References
2. Hong J.S., et al. The social ecology of the Columbine High School shootings. Children and Youth Services Review. 2011; 33(6):861-868. (In Eng.) doi: https://doi.org/10.1016/j.childyouth.2010.12.005
3. Chadha A., Abbas A., Andreopoulos Y. Video Classification With CNNs: Using the Codec as a Spatio-Temporal Activity Sensor. IEEE Transactions on Circuits and Systems for Video Technology. 2019; 29(2):475-485. (In Eng.) doi: https://doi.org/10.1109/TCSVT.2017.2786999
4. Bryan W.L., Harter N. Studies in the physiology and psychology of the telegraphic language. Psychological Review. 1897; 4(1):27-53. (In Eng.) doi: https://doi.org/10.1037/h0073806
5. Bryan W.L., Harter N. Studies on the telegraphic language: The acquisition of a hierarchy of habits. Psychological Review. 1899; 6(4):345-375. (In Eng.) doi: https://doi.org/10.1037/h0073117
6. Carbonell J.G., Michalski R.S., Mitchel T.M. Machine Learning: A Historical and Methodological Analysis. AI Magazine. 1983; 4(3):69-79. (In Eng.) doi: https://doi.org/10.1609/aimag.v4i3.406
7. Fix E., Hodges Jr. J.L. Discriminatory Analysis. Nonparametric Discrimination: Consistency Properties. Revue Internationale de Statistique = International Statistical Review. 1989; 57(3):238-247. (In Eng.) doi: https://doi.org/10.2307/1403797
8. Breiman L. Random Forests. Machine Learning. 2001; 45(1):5-32. (In Eng.) doi: https://doi.org/10.1023/A:1010933404324
9. Gladwell M. Blink: The Power of Thinking Without Thinking. Back Bay Books; 2007. 296 p. (In Eng.)
10. Hebb D.O. The Organization of Behavior: A Neuropsychological Theory. Psychology Press; 2002. 335 p. (In Eng.)
11. Navarro H., Bennun L. Descriptive examples of the limitations of Artificial Neural Networks applied to the analysis of independent stochastic data. International Journal of Computer Engineering &t Technology. 2014; 5(5):40-42. (In Eng.)
12. Karnan M., Akila M., Krishnaraj N. Biometric personal authentication using keystroke dynamics: A review. Applied Soft Computing. 2011; 11(2):1565-1573. (In Eng.) doi: https://doi.org/10.1016/j.asoc.2010.08.003
13. Karpathy A., Toderici G., Shetty S., Leung T., Sukthankar R., Fei-Fei L. Large-Scale Video Classification with Convolutional Neural Networks. 2014 IEEE Conference on Computer Vision and Pattern Recognition. IEEE Press, Columbus, OH, USA; 2014. p. 1725-1732. (In Eng.) doi: https://doi.org/10.1109/CVPR.2014.223
14. Kia S.M., et al. A Novel Scheme for Intelligent Recognition of Pornographic Images. arXiv:1402.5792v3. 2014. (In Eng.) doi: https://doi.org/10.48550/arXiv.1402.5792
15. Weinstein A.M. Computer and Video Game Addiction ‒ A Comparison between Game Users and Non-Game Users. The American Journal of Drug and Alcohol Abuse. 2010; 36(5):268-276. (In Eng.) doi: https://doi.org/10.3109/00952990.2010.491879
16. McCulloch W.S., Pitts W. A Logical Calculus of the Ideas Immanent in Nervous Activity. Bulletin of Mathematical Biology. 1943; 5:115-133. Available at: https://www.cs.cmu.edu/~./epxing/Class/10715/reading/McCulloch.and.Pitts.pdf (accessed 10.12.2021). (In Eng.)
17. Peacock A., Ke X., Wilkerson M. Typing patterns: A key to user identification. IEEE Security and Privacy. 2004; 2(5):40-47. (In Eng.) doi: https://doi.org/10.1109/MSP.2004.89
18. Durak H.Y., Demi̇rhan E.K., Citil M. Examining various risk factors as the predictors of gifted and non-gifted high school students’ online game addiction. Computers & Education. 2022; 177:104378. (In Eng.) doi: https://doi.org/10.1016/j.compedu.2021.104378
19. Ball C., et al. Gaming the SySTEM: The Relationship Between Video Games and the Digital and STEM Divides. Games and Culture. 2020; 15(5):501-528. (In Eng.) doi: https://doi.org/10.1177/1555412018812513
20. Schölkopf B., Simard P., Smola A., Vapnik V. Prior knowledge in support vector kernels. In: Jordan M., Kearns M., Solla S. (eds.) Proceedings of the 10th International Conference on Neural Information Processing Systems (NIPS'97). Advances in Neural Information Processing Systems. Vol. 10. MIT Press, Cambridge, MA, USA; 1997. p. 640-646. Available at: https://papers.nips.cc/paper/1997/file/01d8bae291b1e4724443375634ccfa0e-Paper.pdf (accessed 10.12.2021). (In Eng.)
21. Sepehr S., Head M. Online Video Game Addiction: A Review and an Information Systems Research Agenda. Proceedings of the 19th Americas Conference on Information Systems, AMCIS 2013 ‒ Hyperconnected World: Anything, Anywhere, Anytime. Chicago, Illinois; 2013. Vol. 4. p. 2590-2600. Available at: https://aisel.aisnet.org/amcis2013/HumanComputerInteraction/GeneralPresentations/3 (accessed 10.12.2021). (In Eng.)
22. Shalev-Shwartz S., Ben-David S. Understanding Machine Learning: From Theory to Algorithms. Cambridge: Cambridge University Press; 2014. 410 p. (In Eng.) doi: https://doi.org/10.1017/CBO9781107298019
23. Vapnik V. The Support Vector Method of Function Estimation. In: Suykens J.A.K., Vandewalle J. (eds.) Nonlinear Modeling. Springer, Boston, MA; 1998. p. 55-85. (In Eng.) doi: https://doi.org/10.1007/978-1-4615-5703-6_3
24. Ng B.D., Wiemer-Hastings P. Addiction to the Internet and Online Gaming. CyberPsychology & Behavior. 2005; 8(2):110-113. (In Eng.) doi: http://doi.org/10.1089/cpb.2005.8.110
25. Wu Z., Yao T., Fu Y., Jiang Y.-G. Deep Learning for Video Classification and Captioning. Frontiers of Multimedia Research. Association for Computing Machinery and Morgan & Claypool; 2017. p. 3-29. (In Eng.) doi: https://doi.org/10.1145/3122865.3122867

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.