Rogue people: on adversarial crowdsourcing in the context of cyber security

Journal of Information, Communication and Ethics in Society 19 (1):87-103 (2021)
  Copy   BIBTEX

Abstract

Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects. Design/methodology/approach To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced. Findings Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies for such human-mediated attacks can shed light on the way of identifying and confronting such threats. Originality/value To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 94,045

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Threats to Information Security of Ukrainian Society Under the Conditions of “Hybrid War”.Володимир Вікторович Чалапко - 2020 - Вісник Нюу Імені Ярослава Мудрого: Серія: Філософія, Філософія Права, Політологія, Соціологія 1 (44):168-179.
Developing a theory-based information security management framework for human service organizations.Sameera Mubarak - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):254-271.

Analytics

Added to PP
2020-07-22

Downloads
18 (#828,658)

6 months
9 (#436,380)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

The original sin of crowd work for human subjects research.Huichuan Xia - 2022 - Journal of Information, Communication and Ethics in Society 20 (3):374-387.

Add more citations

References found in this work

No references found.

Add more references