Feeds

Combat games disrespect war laws, report claims

Virtual troops should play by the same rules real ones do

7 Elements of Radically Simple OS Migration

Videogames should respect the real-world rules governing wars, a report has concluded, following research into how many videogames break them.

A study of 20 titles, including many from the Call of Duty and Tom Clancy series, carried out by Pro Juvenile – an organisation which aims to protect kids from unlimited videogame violence - and Trial, which fights to prevent people who commit war crimes getting away with it, found that most of the games contained “elements that violate... international standards”.

The two bodies used specialists in international humanitarian law to identify videogame violations, the most frequent being a disregard for “the legal principles of distinction and proportionality” – dropping 1000 bombs on crowded town just to kill one sniper, for example.

Intentionally directing attacks against civilians and religious buildings are two other war law no-nos that often appeared in the 20 videogames, the organisations claimed. Cruel, inhuman or degrading treatment, and/or torture cropped up frequently too.

Some of the 20 titles examined did, however, “incorporate rules that encourage the gamer to respect human rights and international humanitarian law”.

Pro Juvenile and Trial are particularly worried about the alleged violations within videogames because war games – unlike books or films - require the player to take an active role. Many are increasingly used by the military as training tools, the report added.

Both bodies called for videogame developers to avoid creating in-game situations that lead to violations of recognised laws regulating armed conflicts.

“It would mean a wasted opportunity if the virtual space transmitted the illusion of impunity for unlimited violence in armed conflicts,” the report concluded.

The full report Playing by the Rules: Applying International Humanitarian Law to Video and Computer Games is available to view online (PDF) now. ®

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?