TY - JOUR
T1 - Disruption and deception in crowdsourcing
AU - Onuchowska, Agnieszka
AU - De Vreede, Gert Jan
N1 - Publisher Copyright:
Copyright © 2017, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
PY - 2017/10/1
Y1 - 2017/10/1
N2 - While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This article discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality, integrity, and availability of the crowdsourcing efforts' service, stakeholders, and data. From these examples, the authors derive an organizing framework of risk types associated with disruption and deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional placement of false information, hacking attempts, DDoS attacks, botnet attacks, privacy violation attempts, and data breaches. Finally, the authors discuss example controls that can assist in identifying and mitigating disruption and deception risks in crowdsourcing.
AB - While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This article discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality, integrity, and availability of the crowdsourcing efforts' service, stakeholders, and data. From these examples, the authors derive an organizing framework of risk types associated with disruption and deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional placement of false information, hacking attempts, DDoS attacks, botnet attacks, privacy violation attempts, and data breaches. Finally, the authors discuss example controls that can assist in identifying and mitigating disruption and deception risks in crowdsourcing.
KW - Confidentiality-Integrity-Availability (CIA)
KW - Controls Crowdsourcing
KW - Cybersecurity
KW - Deception
KW - Disruption
KW - Online Pranks
KW - Open Innovation
KW - Risks
KW - Threats
UR - http://www.scopus.com/inward/record.url?scp=85054341896&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85054341896&partnerID=8YFLogxK
U2 - 10.4018/IJeC.2017100102
DO - 10.4018/IJeC.2017100102
M3 - Article
AN - SCOPUS:85054341896
SN - 1548-3673
VL - 13
SP - 23
EP - 41
JO - International Journals of e-Collaboration
JF - International Journals of e-Collaboration
IS - 4
ER -