Abstract
While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This article discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality, integrity, and availability of the crowdsourcing efforts’ service, stakeholders, and data. From these examples, the authors derive an organizing framework of risk types associated with disruption and deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional placement of false information, hacking attempts, DDoS attacks, botnet attacks, privacy violation attempts, and data breaches. Finally, the authors discuss example controls that can assist in identifying and mitigating disruption and deception risks in crowdsourcing.
| Original language | English |
|---|---|
| Title of host publication | Crowdsourcing |
| Subtitle of host publication | Concepts, Methodologies, Tools, and Applications: Volumes 1-3 |
| Pages | 215-235 |
| Number of pages | 21 |
| Volume | 1-1 |
| ISBN (Electronic) | 9781522583639 |
| DOIs | |
| State | Published - 1 Jan 2019 |