Language Selection

English French German Italian Portuguese Spanish

Do games prime brain for violence?

Filed under
Gaming

YOU know that just round the corner is a man who wants to kill you. Your heart is pounding and your hands are sweating - even though this is only a video game. But what is happening in your brain?

A small study of brain activity in video-game veterans suggests that their brains react as if they are treating the violence as real.

More than 90 per cent of American children play video games every day, and half of the top sellers contain extreme violence. There is now strong evidence that people who play violent games tend to be more aggressive. For example, in 2000, Craig Anderson and Karen Dill at Iowa State University in Ames reported data showing that violent-game players were more likely to report high levels of aggression and to have committed assaults or robberies. But finding out whether it is the games that make them violent or the violence that attracts them to the games has proved much harder.

Klaus Mathiak at the University of Aachen in Germany set out to discover what is happening in gamers' brains as they encounter violent situations. He recruited 13 men aged 18 to 26, who played video games for 2 hours every day on average, and asked them to play a violent game while having their brains scanned using magnetic resonance imaging (fMRI). By the time of the experiment, the volunteers were proficient at the game, which required them to navigate a complicated bunker, find and kill terrorists and try to rescue hostages.

Mathiak analysed the game scene by scene and studied how brain activity changed during violent interactions. This meant that he could compare patterns of brain activity immediately before and during fights with activity at less aggressive points in the game.

He found that as violence became imminent, the cognitive parts of the brain became more active. And during a fight, emotional parts of the brain, such as the amygdala and parts of the anterior cingulate cortex, were shut down. This pattern is the same as that seen in subjects who have had brain scans during other simulated violent situations such as imagining an aggressive encounter. It is impossible to scan people's brains during acts of real aggression so Mathiak argues that this is as close as you can get to the real thing. It suggests that video games are a "training for the brain to react with this pattern," he says.

Niels Birbaumer of the University of Tübingen in Germany speculates that playing violent video games regularly would strengthen these circuits in the brain. A regular player confronted with a similar real-life situation, might be more primed for aggression, Birbaumer says.

But Jeffrey Fagan, violence expert at Colombia University in New York says the link between brain activity and violence is complex:"The frontal lobe functions associated with violence have more to do with restraint than the arousal to action."

Source.

More in Tux Machines

Linux and Graphics

Security News

  • Hacking the American College Application Process
    In recent years, foreign students have streamed into American universities, their numbers nearly doubling in the last decade. About half of all international students are coming from Asian countries, many of which have been subject to heavy recruitment from American colleges. Taking advantage of the popularity of an American education, a new industry has sprung up in East Asia, focused on guiding students through the U.S. college application process with SAT preparation courses, English tutors and college essay advisors. But not all college prep companies are playing by the rules. In their investigative series for Reuters, a team of reporters found that foreign companies are increasingly helping students game the U.S. college application process. Some companies have leaked questions from college entrance exams to their students before they take the test. Others have gone so far as to ghostwrite entire college applications and complete coursework for students when they arrive on campus. We spoke with Steve Stecklow, one of the reporters on the team, about what they uncovered.
  • illusive networks' Deceptions Everywhere
    illusive networks' bread and butter is its deception cybersecurity technology called Deceptions Everywhere whose approach is to neutralize targeted attacks and Advanced Persistent Threats by creating a deceptive layer across the entire network. By providing an endless source of false information, illusive networks disrupts and detects attacks with real-time forensics and without disruption to business.
  • Mozila Offers Free Security Scanning Service: Observatory
    With an eye toward helpiing administrators protect their websites and user communities, Mozilla has developed an online scanner that can check if web servers have optimal security settings in place. It's called Observatory and was initially built for in-house use, but it may very well be a difference maker for you. "Observatory by Mozilla is a project designed to help developers, system administrators, and security professionals configure their sites safely and securely," the company reports.

Games for GNU/Linux

Red Hat and Fedora

  • Flatpak Universal Linux Package Supports Local Path References for Git Sources
    Alex Larsson from the Flatpak project has announced the release of a new maintenance update to the universal binary package format for Linux kernel-based operating systems. Flatpak 0.6.9 is now the latest version, and it promises to add many great enhancements, among which we can mention the ability to pass partial references every time a terminal command takes a runtime or application name, as well as a brand new command called build-commit-from. Application developers who want to package their apps and distribute it in the Flatpak format can use the above-mentioned command for creating new commits based on the contents of an existing commit, which can be from another local repository or a remote one.
  • Multiple vulnerabilities in RPM – and a rant
    Last year in November I decided that it might be a good idea to fuzz the parsers of package management tools in Linux distributions. I quickly found a couple of issues in DPKG and RPM. For DPKG the process went very smooth. I reported them to Debian's security team, eight days later fixes and security advisories were published by both Debian and Ubuntu, the main distributions using DPKG. For RPM the process was a bit more difficult.
  • Commvault announces support for Red Hat Virtualisation 4
    Back-up and archive specialist CommVault has announced support for Red Hat Virtualisation 4, the open source company's kernel-based virtual machine powered virtualisation platform. Red Hat Virtualisation 4 is built on the company's enterprise Linux distribution. It provides a centralised management platform for both Linux- and Windows-based workloads.
  • Zacks Assigns Rating To Red Hat, Inc. (NYSE:RHT)
  • GSoC Wrap Up
    GSoC 2016 finished last week and i am writing this blog to list the work done by me in last three months for Fedora. My project was to adjust pagure and write script(s) so that we can have pkgs.fedoraproject.org on a pagure instance.