Inspecting the Foundation of Mystery House
Issue: Vol 6 No. 2 (2019)
Journal: Journal of Contemporary Archaeology
Subject Areas: Archaeology
Computer games are recent artifacts that have had, and continue to have, enormous cultural impact. In this interdisciplinary collaboration between computer science and archaeology, we closely examine one such artifact: the 1980 Apple II game Mystery House, the first graphical adventure. We focus on implementation rather than gameplay, treating the game as a digital artifact. What can we learn about the game and its development process through reverse engineering and analysis of the code, data, and game image? Our exploration includes a technical critique of the code, examining the heretofore uncritical legacy of Ken Williams as a programmer. As game development is a human activity, we place it in a theoretical framework from archaeology, to show how a field used to analyze physical artifacts might adapt to shed new light on digital games.
Open Access Attribution-NonCommercial-NoDerivatives: CC BY-NC-ND
Author: John Aycock, Katie Biittner
Adams, S. 1979. “An Adventure in Small Computer Game Simulation.” Creative Computing 5 (8): 90–97.
Aho, A. V. and J. D. Ullman. 1977. Principles of Compiler Design. Boston: Addison-Wesley.
Altice, N. 2015. I AM ERROR: The Nintendo Family Computer / Entertainment System Platform. Cambridge, MA: MIT Press.
Apple Computer, Inc. 1978a. Applesoft II BASIC Programming Reference Manual. Cupertino: CA: Apple Computer, Inc.
____. 1978b. Programmer’s Aid #1: Installation and Operating Manual (Apple utility programs). Cupertino, CA: Apple Computer, Inc.
Aycock, J. 2016. Retrogame Archeology: Exploring Old Computer Games. New York: Springer. https://doi.org/10.1007/978-3-319-30004-7
____. and A. Reinhard. 2017. “Copy Protection in Jet Set Willy: Developing Methodology for Retrogame Archaeology.” Internet Archaeology 45. https://doi.org/10.11141/ia.45.2
Bailey, G. 2015. “Symmetrical Media Archaeology: Boundary and Context.” Journal of Contemporary Archaeology 2 (1): 41–52. https://doi.org/10.1558/jca.v2i1.27114
Bar-Yosef, O. and P. Van Peer. 2009. “The Chaîne Opératoire Approach in Middle Paleolithic Archaeology.” Current Anthropology 50 (1): 103–131. https://doi.org/10.1086/592234
Berez, J. M., M. S. Blank and P. D. Lebling. 1989. ZIP: Z-Language Interpreter Program. Internal document.
Bishop, B. 1979. “APPLE II Hires Picture Compression.” MICRO – The 6502 Journal 18: 17–24.
Boellstorff, T., B. Nardi, C. Pearce and T. Taylor. 2012. Ethnography and Virtual Worlds: A Handbook of Method. Princeton, NJ: Princeton University Press. https://doi.org/10.2307/j.cttq9s20
Byron, T. 1990. “Roberta’s Bequest.” STart: The ST Monthly 4 (8): 22–26.
Calingaert, P. 1979. Assemblers, Compilers, and Program Translation. Rockville, MD: Computer Science Press.
Copplestone, T. 2017. “Adventures in Archaeological Game Creation.” SAA Archaeological Record 17 (2): 33–39.
Dobres, M.-A. 2000. Technology and Social Agency: Outlining a Practice Framework for Archaeology. Malden, MA: Blackwell.
Donovan, T. 2010. Replay: The History of Video Games. Hove, UK: Yellow Ant.
Espinosa, C. 1979. Apple II Reference Manual. Cupertino, CA: Apple Computer, Inc.
Fuller, M., ed. 2008. Software Studies: A Lexicon. Cambridge, MA: MIT Press. https://doi.org/10.7551/mitpress/9780262062749.001.0001
Glaeser, C. D. 1977. “Novel 8 Bit Multiplication.” Byte 2 (7): 142.
González-Tennant, E. 2016. “Archaeological Walking Simulators.” SAA Archaeological Record 16 (5): 23–28.
Greenfield, P. 1994. “Video Games as Cultural Artifacts.” Journal of Applied Developmental Psychology 15 (1): 3–12. https://doi.org/10.1016/0193-3973(94)90003-5
Gries, D. 1971. Compiler Construction for Digital Computers. New York: Wiley.
Haigh, T. 2015. “The Tears of Donald Knuth.” Communications of the ACM 58 (1): 40–44. https://doi.org/10.1145/2688497
Huhtamo, E. and J. Parikka. 2011. “Introduction.” In Media Archaeology: Approaches, Applications, and Implications, 1–15. Berkeley, CA: University of California Press.
Hyde, R. 1981. LISA: A Professional Assembly Language Development System for Apple Computers (Version 2.5). [Oakhurst, CA]: On-Line Systems.
Ingold, T. 1997. “Eight Themes in the Anthropology of Technology.” Social Analysis 41 (1): 106–138.
International Directory of Company Histories, 2001. “Sierra On-Line, Inc.” In International Directory of Company Histories (41st edition), edited by T. Grant, 361–364. Detroit, MI: St. James Press.
K. M. 2018. The Archaeology of Tomb Raider. Online: https://tombraiderarchaeology.com/
Kirschenbaum, M. G. 2008. Mechanisms: New Media and the Forensic Imagination. Cambridge, MA: MIT Press.
Leff, B. 1981. “Distribution Does Not a Publisher Make.” [Letter to the editor] Softalk 1 (8): 8.
Lemonnier, P. 1992. Elements for an Anthropology of Technology. Anthropological Papers, Museum of Anthropology, University of Michigan 88. Ann Arbor, MI: Museum of Anthropology, University of Michigan.
Lerseth, R. J. 1977. “A Plot is Incomplete Without Characters.” In The Best of Byte, Volume 1, edited by D. H. Ahl and C. T. Helmers Jr, 300–308. Morristown, NJ: Creative Computing Press.
Levy, S. 1984. Hackers: Heroes of the Computer Revolution. New York: Dell.
Loguidice, B., and M. Barton. 2009. Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All Time. Amsterdam: Focal Press.
Mol, A., C. Ariese-Vandemeulebroucke, K. Boom, A. Politopoulos and V. Vandemeulebroucke. 2016. “Video Games in Archaeology: Enjoyable but Trivial?” SAA Archaeological Record 16 (5): 11–15.
Montfort, N. 2003. Twisty Little Passages: An Approach to Interactive Fiction. Cambridge, MA: MIT Press. https://doi.org/10.7551/mitpress/6936.001.0001
Moshenska, G. 2016. “Reverse Engineering and the Archaeology of the Modern World.” Forum Kritische Archäologie 5: 16–28.
Newman, M. Z. 2017. Atari Age: The Emergence of Video Games in America. Cambridge, MA: MIT Press. https://doi.org/10.7551/mitpress/10021.001.0001
On-Line Systems. 1980a. “Apple II Software from On-Line Systems. Advertisement.” MICRO – The 6502 Journal 26: 1.
____. 1980b. “New Apple II / Apple II Plus Software from On-Line Systems. Advertisement.” MICRO – The 6502 Journal 24: 80.
Perry, S. and C. Morgan. 2015. “Materializing Media Archaeologies: The MAD-P Hard Drive Excavation.” Journal of Contemporary Archaeology 2 (1): 94–104. https://doi.org/10.1558/jca.v2i1.27083
Ramsay, M. 2012. Gamers at Work: Stories Behind the Games People Play. New York: Apress. https://doi.org/10.1007/978-1-4302-3352-7
Rawitsch, D. 2017. “Classic Game Postmortem: ‘Oregon Trail’.” Paper presented at the Game Developer’s Conference, San Francisco, CA, 27 February to 3 March.
Renfrew, C. and P. Bahn (2015). Archaeology Essentials (3rd edition). London: Thames and Hudson.
____. 2015c. “Excavating Atari: Where the Media was the Archaeology.” Journal of Contemporary Archaeology 2 (1): 86–93. https://doi.org/10.1558/jca.v2i1.27108
____. 2016b. “Towards Archaeological Tools and Methods for Excavating Virtual Spaces.” SAA Archaeological Record 16 (5): 19–22.
Roux, V. 2016. “Ceramic Manufacture: The chaîne opératoire Approach.” In The Oxford Handbook of Archaeological Ceramic Analysis, edited by A. Hunt, 1–17. Oxford: Oxford University Press.
Sather, J. 1983. Understanding the Apple II. Chatsworth, CA: Quality Software.
Sellet, F. 1993. “Chaîne opératoire; The Concept and its Applications.” Lithic Technology 18 (1–2): 106–112. https://doi.org/10.1080/01977261.1993.11720900
Sillar, B. and M. Tite. 2000. “The Challenge of ‘Technological Choices’ for Material Science Approaches in Archaeology.” Archaeometry 42 (1): 2–20. https://doi.org/10.1111/j.1475-4754.2000.tb00863.x
Sinclair, A. 2000. “Constellations of Knowledge: Human Agency and Material Affordance in Lithic Technology.” In Agency in Archaeology, edited by M.-A. Dobres and J. E. Robb, 196–212. London: Routledge.
Sotamaa, O. 2014. “Artifact.” In The Routledge Companion to Video Game Studies, edited by M. J. P. Wolf and B. Perrone, 3–9. New York: Routledge.
Spafford, E. H. 1989. “The Internet Worm Program: An Analysis.” ACM SIGCOMM Computer Communications Review 19 (1): 17–57. https://doi.org/10.1145/66093.66095
Styhre, A., A. M. Sazczepanska, and B. Remneland-Wihkamn. 2018. “Consecrating Video Games as Cultural Artifacts: Intellectual Legitimization as a Source of Industry Renewal.” Scandinavian Journal of Management 34 (1): 22–28. https://doi.org/10.1016/j.scaman.2017.11.003
Tommervik, A. 1981. “Exec On-Line Systems: Adventures in Programming.” Softalk 1 (6): 4–6.
Tringham, R. and M. Ashley. 2015. “Becoming Archaeological.” Journal of Contemporary Archaeology 2 (1): 29–41. https://doi.org/10.1558/jca.v2i1.27089
Trivette, D. B. 1985. “Inside King’s Quest.” Compute! 7 (2): 136–138.
Watrall, E. 2002. “Interactive Entertainment as Public Archaeology.” SAA Archaeological Record 2 (2): 37–39.
Wexler, J., A. Bevan, C. Bonacchi, A. Keinan-Schoonbaert, D. Pett and N. Wilkin. 2015. “Collective Re-Excavation and Lost Media from the Last Century of British Prehistoric Studies.” Journal of Contemporary Archaeology 2 (1): 126–142. https://doi.org/10.1558/jca.v2i1.27124
Wiegers, K. E. 2002. Peer Reviews in Software: A Practical Guide. Boston: Addison-Wesley.
Worth, D. and P. Lechner. 1981. Beneath Apple DOS. Chatsworth, CA: Quality Software.