Disruption and deception in crowdsourcing: Towards a crowdsourcing risk framework

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This paper discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality, integrity, and availability of the crowdsourcing efforts’ service, stakeholders, and data. From these examples, we derive an organizing framework of risk types associated with disruption and deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional placement of false information, hacking attempts, DDoS attacks, botnet attacks, privacy violation attempts, and data breaches. Finally, we discuss example controls that can assist in identifying and mitigating disruption and deception risks in crowdsourcing.

Cite

CITATION STYLE

APA

Onuchowska, A., & de Vreede, G. J. (2018). Disruption and deception in crowdsourcing: Towards a crowdsourcing risk framework. In Proceedings of the Annual Hawaii International Conference on System Sciences (Vol. 2018-January, pp. 3966–3975). IEEE Computer Society. https://doi.org/10.24251/hicss.2018.498

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free