{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T22:17:00Z","timestamp":1673907420647},"reference-count":75,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"abstract":"While crowdsourcing has become increasingly popular among organizations, it also has become increasingly susceptible to unethical and malicious activities. This article discusses recent examples of disruptive and deceptive efforts on crowdsourcing sites, which impacted the confidentiality, integrity, and availability of the crowdsourcing efforts' service, stakeholders, and data. From these examples, the authors derive an organizing framework of risk types associated with disruption and deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional placement of false information, hacking attempts, DDoS attacks, botnet attacks, privacy violation attempts, and data breaches. Finally, the authors discuss example controls that can assist in identifying and mitigating disruption and deception risks in crowdsourcing.<\/jats:p>","DOI":"10.4018\/ijec.2017100102","type":"journal-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T19:00:03Z","timestamp":1538161203000},"page":"23-41","source":"Crossref","is-referenced-by-count":2,"title":["Disruption and Deception in Crowdsourcing"],"prefix":"10.4018","volume":"13","author":[{"given":"Agnieszka","family":"Onuchowska","sequence":"first","affiliation":[{"name":"University of South Florida, Tampa, USA"}]},{"given":"Gert-Jan","family":"de Vreede","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, USA"}]}],"member":"2432","reference":[{"key":"IJeC.2017100102-0","doi-asserted-by":"crossref","unstructured":"Abhinav, K., Dwarakanath, A., & Singh, P. (2015). Trustworthiness in crowdsourcing (Doctoral dissertation).","DOI":"10.1145\/2889160.2889225"},{"key":"IJeC.2017100102-1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1992.tb01093.x"},{"key":"IJeC.2017100102-2","author":"R. L.Akers","year":"2009","journal-title":"Social Learning and Social Structure: A General Theory of Crime and Deviance"},{"key":"IJeC.2017100102-3","unstructured":"Biersdorfer, J. D. (2016). How Waze Tries to Keep Its Crowd Honest. New York Times. Retrieved from http:\/\/nyti.ms\/2cLlTkY"},{"key":"IJeC.2017100102-4","unstructured":"Bode, K. (2015). Miami Cops Flood Waze With Bogus Speed Trap Data, Don\u2019t Understand How Crowd Sourcing Works. Tech Dirt. Retrieved from https:\/\/www.techdirt.com\/articles\/20150209-\/12580529961\/miami-cops-flood-waze-with-bogus-speed-trap-data-dont-understand-how-crowd-sourcing-works.shtml"},{"key":"IJeC.2017100102-5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00382936"},{"key":"IJeC.2017100102-6","first-page":"15","article-title":"Collaborative innovation in the public sector.","volume":"11","author":"B.Bommert","year":"2010","journal-title":"International Public Management Review"},{"key":"IJeC.2017100102-7","first-page":"45","article-title":"Decisions 2.0: The power of collective intelligence.","volume":"50","author":"E.Bonabeau","year":"2009","journal-title":"Sloan Management Review"},{"key":"IJeC.2017100102-8","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084420"},{"key":"IJeC.2017100102-9","unstructured":"Buchanan, M. (2013). The Web\u2019s Failed Hunt for the Boston Bomber. The New Yorker. Retrieved from http:\/\/www.newyorker.com\/tech\/elements\/the-webs-failed-hunt-for-the-boston-bomber"},{"key":"IJeC.2017100102-10","doi-asserted-by":"publisher","DOI":"10.1177\/0011128712437915"},{"key":"IJeC.2017100102-11","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0082-4"},{"key":"IJeC.2017100102-12","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080202"},{"key":"IJeC.2017100102-13","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"IJeC.2017100102-14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.145"},{"key":"IJeC.2017100102-15","unstructured":"Crosbie, J. (2017). NYT, Reddit, Kickstarter are all suffering a DDoS attack right now. Inverse. Retrieved from https:\/\/www.inverse.com\/article\/33520-new-york-times-reddit-ddos-attack"},{"key":"IJeC.2017100102-16","unstructured":"Dewey, C. (2014). The many problems with SketchFactor, the new crime crowdsourcing app that some are calling racist. The Washington Post. Retrieved from washingtonpost.com\/news\/the-intersect\/wp\/2014\/-08\/12\/the-many-problems-with-sketchfactor-the-new-crime-crowdsour-cing-app-that-some-are-calling-racist\/?utm_term=.61c78f9b0d8e"},{"key":"IJeC.2017100102-17","doi-asserted-by":"crossref","unstructured":"Dwarakanath, A., Shrikanth, N. C., Abhinav, K., & Kass, A. (2016, May). Trustworthiness in enterprise crowdsourcing: a taxonomy & evidence from data. In IEEE\/ACM International Conference on Software Engineering Companion (ICSE-C) (pp. 41-50). IEEE.","DOI":"10.1145\/2889160.2889225"},{"key":"IJeC.2017100102-18","unstructured":"Edwards, J. (2010). PatientsLikeMe Is More Villain Than Victim in Patient Data \u201cScraping\u201d Scandal. CBS News. Retrieved from http:\/\/www.cbsnews.com\/news\/-patientslikeme-is-more-villain-than-victim-in-patient-data-scraping-scandal\/"},{"key":"IJeC.2017100102-19","first-page":"233","article-title":"Uncovering crowdsourced manipulation of online reviews.","author":"A.Fayazi","year":"2015","journal-title":"Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval"},{"key":"IJeC.2017100102-20","unstructured":"Floren, C. (2012). The Advantages and Disadvantages of Using Crowdsourcing to Improve Your Ecommerce Business. Myecommerce. Retrieved from http:\/\/myecommerce.biz\/blog\/2012\/-07\/the-advantages-and-disadvantages-of-using-crowd-sourcing-to-improve-your-ecommerce-business\/"},{"key":"IJeC.2017100102-21","unstructured":"Fonds Professionell. (2015). Robert Shiller: Crowdfunding oder Crowdphishing? Retrieved from http:\/\/www.fondsprofessionell.de\/news\/maerkte\/headline\/robert-shiller-crowdfunding-oder-crowdphishing-122059\/"},{"key":"IJeC.2017100102-22","unstructured":"Franceschi-Bicchierai, L. (2015). Crowdfunding Site Patreon Gets Hacked. Motherboard. Retrieved from https:\/\/motherboard.vice.com\/en_us\/article\/crowdfunding-site-patreon-gets-hacked"},{"key":"IJeC.2017100102-23","unstructured":"Fuller, J. (2012). Die Gefahren des Crowdsourcing. Harvard Business Manager. Retrieved from http:\/\/www.harvardbusinessmanager.de\/blogs\/a-840963.html"},{"key":"IJeC.2017100102-24","author":"R.Goolsby","year":"2013","journal-title":"On cybersecurity, crowdsourcing, and social cyber-attack"},{"key":"IJeC.2017100102-25","doi-asserted-by":"crossref","author":"M. R.Gottfredson","year":"1990","journal-title":"A general theory of crime","DOI":"10.1515\/9781503621794"},{"key":"IJeC.2017100102-26","doi-asserted-by":"publisher","DOI":"10.2307\/25148742"},{"key":"IJeC.2017100102-27","doi-asserted-by":"crossref","unstructured":"Harris, C. G. (2011, October). Dirty deeds done dirt cheap: a darker side to crowdsourcing. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom) (pp. 1314-1317). IEEE.","DOI":"10.1109\/PASSAT\/SocialCom.2011.89"},{"key":"IJeC.2017100102-28","unstructured":"Harris, M. (2015). How A Lone Hacker Shredded the Myth of Crowdsourcing. Backchannel. Retrieved from backchannel.com\/how-a-lone-hacker-shred-ded-the-myth-of-crowdsourcing-d9d0534f1731#.vkn21poy6"},{"key":"IJeC.2017100102-29","first-page":"827","article-title":"Investor and Market Protection in the Crowdfunding Era: Disclosing to and for the Crowd.","volume":"38","author":"J. M.Heminway","year":"2013","journal-title":"Vermont Law Review"},{"key":"IJeC.2017100102-30","unstructured":"Hendrix, S. (2016). Traffic-weary homeowners and Waze are at war, again. Guess who\u2019s winning? Washington Post. Retrieved from www.washington-post.com\/local\/traffic-weary-homeowners-and-waze-are-at-war-again-guess-whos-winning\/2016\/06\/05\/c466d-f46-299d-11e6-b989-4e5479715b54_story.html?utm_term=.442e5763ecb2"},{"key":"IJeC.2017100102-31","author":"T. J.Holt","year":"2016","journal-title":"Cybercrime in Progress: Theory and prevention of technology-enables offenses"},{"key":"IJeC.2017100102-32","doi-asserted-by":"crossref","unstructured":"Holt, T. J., Burruss, G. W., & Bossler, A. M. (2016). Assessing the macro-level correlates of malware infections using a routine activities framework. International journal of offender therapy and comparative criminology.","DOI":"10.1177\/0306624X16679162"},{"key":"IJeC.2017100102-33","unstructured":"Howe, J. (2006). The rise of Crowdsourcing. Wired Magazine, 14."},{"key":"IJeC.2017100102-34","unstructured":"Howe, J. (2006). Crowdsourcing: A Definition. Retrieved from Crowd-sourcing.typepad.com\/cs\/2006\/06\/crowdsourcing_a.html"},{"key":"IJeC.2017100102-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.181"},{"key":"IJeC.2017100102-36","unstructured":"Kaplan, D. (2013). Reddit site downed by DDoS attacks. Retrieved from https:\/\/www.scmagazine.com\/reddit-site-downed-by-ddos-attacks\/article\/543507\/"},{"key":"IJeC.2017100102-37","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741674"},{"key":"IJeC.2017100102-38","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-016-9401-5"},{"key":"IJeC.2017100102-39","unstructured":"Lamere, P. (2009). Inside the precision hack. Music Machinery. Retrieved from https:\/\/musicmachinery.com\/2009\/04\/15\/inside-the-precision-hack"},{"key":"IJeC.2017100102-40","first-page":"248","article-title":"Information extraction and manipulation threats in crowd-powered systems.","author":"W. S.Lasecki","year":"2014","journal-title":"Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing"},{"key":"IJeC.2017100102-41","article-title":"The cost of asking crowd workers to behave maliciously.","author":"W. S.Lasecki","year":"2015","journal-title":"Proc. the AAMAS Workshop on Human-Agent Interaction Design and Models"},{"key":"IJeC.2017100102-42","unstructured":"Linesh, J. (2014). Kickstarter's Breach and the Dark Side of Crowdsourcing. LineshJose.Com. Retrieved from https:\/\/lineshjose.com\/blog\/kickstarters-breach-and-the-dark-side-of-crowdsourcing\/"},{"key":"IJeC.2017100102-43","unstructured":"Lionbridge. (2013). The Crowd in the Cloud: Exploring the Future of Outsourcing White Paper. Retrieved from http:\/\/www.lionbridge.com\/files\/2012\/11\/-Lionbridge-White-Paper_The-Crowd-in-the-Cloud-final.pdf"},{"key":"IJeC.2017100102-44","unstructured":"Liu, B., Chen, L., Zhu, X., Zhang, Y., Zhang, C., & Qiu, W. (2017). Protecting Location Privacy in Spatial Crowdsourcing using Encrypted Data. In The 20th International Conference on Extending Database Technology (EDBT) (pp. 478\u2013481). EDBT."},{"key":"IJeC.2017100102-45","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052594"},{"key":"IJeC.2017100102-46","unstructured":"Medina, D. A. (2014). Crowdsourcing Competitions Encourage Malicious Behavior, Study Finds. Next-gov.com. Retrieved from www.next-gov.com\/big-data\/2014\/09\/crowdsourcing-competitions-encourage-malicious-behavior-study-finds\/93410\/"},{"key":"IJeC.2017100102-47","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2014.0532"},{"key":"IJeC.2017100102-48","unstructured":"BBC News. (2014). Kickstarter crowdfunding website hacked. Retrieved from http:\/\/www.bbc.com\/news\/business-26222113"},{"key":"IJeC.2017100102-49","unstructured":"BBC News. (2015). Crowdfunding site Patreon hacked data leaked. Retrieved from http:\/\/www.bbc.com\/news-\/technology-34423932"},{"key":"IJeC.2017100102-50","unstructured":"Niller, E. (2016). DoS Attack Crashes Website Monitoring North Korea\u2019s Nuclear Test Site. WIRED. Retrieved from https:\/\/www.wired.com\/2016\/09\/dos-attack-crashes-website-monitoring-north-koreas-nuclear-test-site\/"},{"key":"IJeC.2017100102-51","unstructured":"Oh, I. (2014). This NYPD Idea Backfired Horribly On Twitter. Huffington Post. Retrieved from https:\/\/www.huffingtonpost.com\/2014\/04\/22\/mynypd-nypd-twitter_n_5193523.html"},{"key":"IJeC.2017100102-52","unstructured":"Paganini, P. (2014, June 23). Largest DDoS attack hit PopVote, Hong Kong Democracy voting site. Security Affairs. Retrieved from securityaffairs.co\/wordpress\/26030\/cyber-crime\/popvote-largest-ddos-attack.html"},{"key":"IJeC.2017100102-53","doi-asserted-by":"publisher","DOI":"10.1177\/0044118X10366951"},{"key":"IJeC.2017100102-54","doi-asserted-by":"crossref","unstructured":"Pedersen, J., Kocsis, D., Tripathi, A., Tarrell, A., Weerakoon, A., Tahmasbi, N., . . . de Vreede, G. J. (2013, January). Conceptual foundations of crowdsourcing: A review of IS research. In 2013 46th Hawaii International Conference on System Sciences (HICSS) (pp. 579-588). IEEE.","DOI":"10.1109\/HICSS.2013.143"},{"key":"IJeC.2017100102-55","unstructured":"Pescatore, J. (2013). How DDoS Detection and Mitigation Can Fight Advanced Targeted Attacks [whitepaper]. SANS. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/ddos-detection-mitigation-fight-advanced-targeted-attacks-35000"},{"key":"IJeC.2017100102-56","unstructured":"Roberts, E. (n.d.). How Automatic Voting Bots Manipulate Online Polls. Distil Networks. Retrieved from https:\/\/resources.distilnetworks.com\/all-blog-posts\/how-to-manipulate-an-online-poll-with-a-bot"},{"key":"IJeC.2017100102-57","article-title":"Mountain Dew\u2019s \u2018Dub the Dew\u2019 Online Poll Goes Horribly Wrong.","author":"E.Rosenfeld","year":"2012, August 14","journal-title":"Time"},{"key":"IJeC.2017100102-58","unstructured":"Shelly, K. (2016). Four Crowdsourcing Pitfalls and How to Avoid Them. Jovoto. Retrieved from https:\/\/www.jovoto.com\/blog\/business\/four-crowdsourcing-pitfalls\/"},{"key":"IJeC.2017100102-59","unstructured":"Shiller, R. (2017). Crowdfunding needs good regulation to flourish. The Guardian. Retrieved from https:\/\/www.theguardian.com\/business\/2015\/nov\/20\/crowdfunding-needs-good-regulation-to-flourish"},{"key":"IJeC.2017100102-60","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0013-1"},{"key":"IJeC.2017100102-61","unstructured":"Sterling, T. (2017). Dutch voting guide sites offline in apparent cyber attack. Reuters. Retrieved from http:\/\/www.reuters.com\/article\/us-netherlands-election-cyber-idUSKBN16M1C6"},{"key":"IJeC.2017100102-62","unstructured":"The Washington Post. (2014). SketchFactor controversy showcases challenges of crowdsourcing. Retrieved from washingtonpost.com\/opinions\/sketchfactor-controversy-show-cases-challenges-of-crowdsourcing\/2014\/08\/20\/18348bea-2311-11e4-958c-268a320a60ce_story.html?utm_term=.408c547b40fe"},{"key":"IJeC.2017100102-63","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741136"},{"key":"IJeC.2017100102-64","unstructured":"Tufnell, N. (2014). Students hack Waze, send in army of traffic bots. Wired. Retrieved from http:\/\/www.wired.co.uk\/article\/waze-hacked-fake-traffic-jam"},{"key":"IJeC.2017100102-65","unstructured":"Usitalo, O. (2015). I\u2019m Not Lovin\u2019 It: McDonald\u2019s #McHorrorStories. Retrieved from http:\/\/oustrategicsocialmedia.com\/2015\/02\/16\/im-not-lovin-it-mcdonalds-mchorrorstories\/"},{"key":"IJeC.2017100102-66","unstructured":"van Rheenen, E. (2016). 15 Polls Hijacked by the Internet. Mentalfloss. Retrieved from mentalfloss.com\/article\/52524\/15-polls-hijacked-internet"},{"key":"IJeC.2017100102-67","unstructured":"VanPutte, M. A. (2011). Challenges in Securing Crowdsourcing Solutions."},{"key":"IJeC.2017100102-68","first-page":"1","article-title":"You Are How You Click: Clickstream Analysis for Sybil Detection.","volume":"Vol. 9","author":"G.Wang","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"IJeC.2017100102-69","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2906388.2906420","article-title":"Defending against sybil devices in crowdsourced mapping services.","author":"G.Wang","year":"2016","journal-title":"Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services"},{"key":"IJeC.2017100102-70","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187928"},{"key":"IJeC.2017100102-71","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491719"},{"key":"IJeC.2017100102-72","unstructured":"Watts, N. (2017). Crowdsourcing Lessons From Boaty McBoatface. Ogilvy.com. Retrieved from http:\/\/www.ogilvy.com\/topics\/topics-pr\/5-crowdsourcing-lessons-from-boaty-mcboatface\/"},{"key":"IJeC.2017100102-73","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2011.14504801135"},{"key":"IJeC.2017100102-74","doi-asserted-by":"publisher","DOI":"10.4018\/ijec.2015100102"}],"container-title":["International Journal of e-Collaboration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T11:54:30Z","timestamp":1651838070000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJeC.2017100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":75,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijec.2017100102","relation":{},"ISSN":["1548-3673","1548-3681"],"issn-type":[{"value":"1548-3673","type":"print"},{"value":"1548-3681","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}