Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects. Design/methodology/approach To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced. Findings Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies for such human-mediated attacks can shed light on the way of identifying and confronting such threats. Originality/value To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
DOI 10.1108/jices-08-2019-0100
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 59,848
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

The Ethical Use of Crowdsourcing.Susan Standing & Craig Standing - 2018 - Business Ethics: A European Review 27 (1):72-80.
Directions of Realization of State Policy in the Field of Cyber Security.G. Chetverik - 2012 - Epistemological studies in Philosophy, Social and Political Sciences 1 (22):241-246.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
Against Adversarial Discussion.Maarten Steenhagen - 2016 - Collingwood and British Idealism Studies 22 (1):87-112.
Justifying Cyber-Intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
Dignity and Freedom Through Human Security.V. Balamdal - 2014 - Eubios Journal of Asian and International Bioethics 24 (1):18-20.


Added to PP index

Total views
4 ( #1,224,412 of 2,432,833 )

Recent downloads (6 months)
1 ( #464,144 of 2,432,833 )

How can I increase my downloads?


My notes