[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3195836.3195862acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
short-paper

Crowdsourcing security: opportunities and challenges

Published: 27 May 2018 Publication History

Abstract

With improved digital literacy and cheaper data connections, crowdsourcing has become more prevalent. Crowdsourcing tasks such as image tagging, language translation, etc. have contributors with varied skill level. Question and answers, software development/testing and product design are more serious tasks and require expert contributions. With increasing security threats, crowdsourcing in 'security' domain is seen as an upcoming trend. In the survey, opportunities and challenges in crowdsourcing security are analyzed based on a survey conducted with 229 participants. The results provide insights on motivation, quality mechanisms and improvement areas for increased participation. 'Question and Answers' that includes information sharing and 'software development and testing' that includes Bug Bounty are identified as top crowdsourcing tasks by security specialists although they are concerned about security and privacy of information. Among quality attributes analyzed, contributor 'credibility' is identified as a key area of improvement for increased participation in crowdsourcing.

References

[1]
Alient Vault. 2017 (accessed 19-Mar-2018). Open Threat Exchange. https://www.alienvault.com/.
[2]
Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid Reza Motahari-Nezhad, Elisa Bertino, and Schahram Dustdar. 2013. Quality Control in Crowdsourcing Systems: Issues and Directions. IEEE Internet Computing 17, 2 (2013), 76--81.
[3]
Yuxiang Chris Zhao and Qinghua Zhu. 2014. Effects of Extrinsic and Intrinsic Motivation on Participation in Crowdsourcing Contest: A Perspective of Self-Determination Theory. Online Information Review 38, 7 (2014), 896--917.
[4]
Enrique Estellés-Arolas and Fernando González-Ladrón-de Guevara. 2012. Towards an Integrated Crowdsourcing Definition. Journal of Information science 38, 2 (2012), 189--200.
[5]
Facebook. 2017 (accessed 19-Mar-2018). Threat Exchange. https://developers.facebook.com/products/threat-exchange.
[6]
Samuel Greengard. 2011. Following the Crowd. Commun. ACM 54, 2 (2011), 20--22.
[7]
Lars Hetmank. 2013. Components and Functions of Crowdsourcing Systems - A Systematic Literature Review. Wirtschaftsinformatik 4 (2013).
[8]
Mokter Hossain and Ilkka Kauranen. 2015. Crowdsourcing: A Comprehensive Literature Review. Strategic Outsourcing: An International Journal 8, 1 (2015), 2--22.
[9]
Jeff Howe. 2006. The Rise of Crowdsourcing. Wired magazine 14, 6 (2006), 1--4.
[10]
Nicolas Kaufmann, Thimo Schulze, and Daniel Veit. 2011. More than fun and money. Worker Motivation in Crowdsourcing - A Study on Mechanical Turk. In AMCIS, Vol. 11. 1--11.
[11]
Ritu Khare, Benjamin M Good, Robert Leaman, Andrew I Su, and Zhiyong Lu. 2015. Crowdsourcing in Biomedicine: Challenges and Opportunities. Briefings in Bioinformatics 17, 1 (2015), 23--32.
[12]
Axel Korthaus and Wei Dai. 2012. Crowdsourcing in Heterogeneous Networked Environments-Opportunities and Challenges. In 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 483--488.
[13]
Pavel Kucherbaev, Florian Daniel, Stefano Tranquillini, and Maurizio Marchese. 2016. Crowdsourcing Processes: A survey of Approaches and Opportunities. IEEE Internet Computing 20, 2 (2016), 50--56.
[14]
R Maiolini and R Naggi. 2011. Crowdsourcing and SMEs: Opportunities and Challenges. In Information Technology and Innovation Trends in Organizations. Springer, 399--406.
[15]
Ethan Seltzer and Dillon Mahmoudi. 2013. Citizen Participation, Open innovation, and Crowdsourcing : Challenges and Opportunities for Planning. CPL bibliography 28, 1 (2013), 3--18.
[16]
Chun How Tan, Eugene Agichtein, Panos Ipeirotis, and Evgeniy Gabrilovich. 2014. Trust, but Verify: Predicting Contribution Quality for Knowledge Base Construction and Curation. In Proceedings of the 7th ACM international conference on Web search and Data Mining. ACM, 553--562.
[17]
Alexander Van Deursen and Jan Van Dijk. 2011. Internet Skills and the Digital Divide. New media & society 13, 6 (2011), 893--911.
[18]
Maja Vukovic and Claudio Bartolini. 2010. Towards a Research Agenda for Enterprise Crowdsourcing. Leveraging Applications of Formal methods, Verification, and Validation (2010), 425--434.
[19]
Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, and Ben Y Zhao. 2013. Wisdom in the Social Crowd: an Analysis of Quora. In Proceedings of the 22nd international conference on World Wide Web. ACM, 1341--1352.
[20]
Jing Wang and Panagiotis Ipeirotis. 2013. A Framework for Quality Assurance in Crowdsourcing. (2013).
[21]
Yaoqi Lai. 2017 (accessed 19-Mar-2018). Creative Crowdsourcing Leader eYeka Releases 2017 Industry Report and Welcomes The Age of Ideation. http://tinyurl.com/eYeka2017.
[22]
Han Yu, Zhiqi Shen, Chunyan Miao, and Bo An. 2012. Challenges and Opportunities for Trust Management in Crowdsourcing. In Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology-Volume 02. IEEE Computer Society, 486--493.
[23]
Yuxiang Zhao and Qinghua Zhu. 2014. Evaluation on Crowdsourcing Research: Current status and Future Direction. Information Systems Frontiers 16, 3 (2014), 417--434.

Cited By

View all
  • (2023)Exploring the inhibitors for competitive AI software development through cloud driven transformationAnnals of Operations Research10.1007/s10479-023-05619-5342:1(355-397)Online publication date: 18-Oct-2023
  • (2022)A Road Map Toward Crowdsourcing Actors, Platforms and Applications, a Review-Based StudyProceedings of International Conference on Information Technology and Applications10.1007/978-981-16-7618-5_31(355-364)Online publication date: 21-Apr-2022
  • (2022)Developing a Gamified Peer-Reviewed Bug Bounty ProgrammeHCI International 2022 Posters10.1007/978-3-031-06394-7_65(514-522)Online publication date: 16-Jun-2022
  • Show More Cited By

Index Terms

  1. Crowdsourcing security: opportunities and challenges

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHASE '18: Proceedings of the 11th International Workshop on Cooperative and Human Aspects of Software Engineering
    May 2018
    136 pages
    ISBN:9781450357258
    DOI:10.1145/3195836
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 May 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. challenges
    2. crowdsourcing
    3. opportunities
    4. security

    Qualifiers

    • Short-paper

    Conference

    ICSE '18
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 47 of 70 submissions, 67%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Exploring the inhibitors for competitive AI software development through cloud driven transformationAnnals of Operations Research10.1007/s10479-023-05619-5342:1(355-397)Online publication date: 18-Oct-2023
    • (2022)A Road Map Toward Crowdsourcing Actors, Platforms and Applications, a Review-Based StudyProceedings of International Conference on Information Technology and Applications10.1007/978-981-16-7618-5_31(355-364)Online publication date: 21-Apr-2022
    • (2022)Developing a Gamified Peer-Reviewed Bug Bounty ProgrammeHCI International 2022 Posters10.1007/978-3-031-06394-7_65(514-522)Online publication date: 16-Jun-2022
    • (2021)Crowdsourcing usage, task assignment methods, and crowdsourcing platforms: A systematic literature reviewJournal of Software: Evolution and Process10.1002/smr.2368Online publication date: 30-Jun-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media