2020
DOI: 10.1177/0047281620977163
|View full text |Cite
|
Sign up to set email alerts
|

Game Design Tactics for Teaching Technical Communication in Online Courses

Abstract: This article describes an interdisciplinary, partially online honors course entitled Video Game Theory and Design. The article reviews the literature surrounding video games and technical communication and then outlines the learning objectives for the course. The authors describe individual and team-produced assignments and suggest game design techniques for motivating students. We explain how we assess different projects, including oral game pitches and the complex technical Game Design Documents that are stu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 30 publications
0
0
0
Order By: Relevance
“…When the confidence level of the item set is greater than or equal to the minimum confidence level, the association rule obtained is a strong association rule [18]. Association rules can include numerical, unidimensional, and single-layer depending on the problem situation, and the Apriori algorithm is the most widely used among numerical rules [19]. The Apriori algorithm is implemented as an iterative algorithm with layer-by-layer search to react to the correlation between transactions, and the implementation flow of this algorithm is shown in Figure 3.1.…”
Section: Introductionmentioning
confidence: 99%
“…When the confidence level of the item set is greater than or equal to the minimum confidence level, the association rule obtained is a strong association rule [18]. Association rules can include numerical, unidimensional, and single-layer depending on the problem situation, and the Apriori algorithm is the most widely used among numerical rules [19]. The Apriori algorithm is implemented as an iterative algorithm with layer-by-layer search to react to the correlation between transactions, and the implementation flow of this algorithm is shown in Figure 3.1.…”
Section: Introductionmentioning
confidence: 99%