Skip to main content

2018 | OriginalPaper | Buchkapitel

Crowd Vigilante

Detecting Sabotage in Crowdsourcing

verfasst von : Muneera Bano, Didar Zowghi

Erschienen in: Requirements Engineering for Internet of Things

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Crowdsourcing is a complex and sociotechnical problem solving approach for collaboration of geographically distributed volunteer crowd to contribute to the achievement of a common task. One of the major issues faced by crowdsourced projects is the trustworthiness of the crowd. This paper presents a vision to develop a framework with supporting methods and tools for early detection of the malicious acts of sabotage in crowdsourced projects by utilizing and scaling digital forensic techniques. The idea is to utilize the crowd to build the digital evidence of sabotage with systematic collection and analysis of data from the same crowdsourced project where the threat is situated. The proposed framework aims to improve the security of the crowdsourced projects and their outcomes by building confidence about the trustworthiness of the workers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Maalej, W., Hadeer, N.: Bug report, feature request, or simply praise? On automatically classifying app reviews. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE), pp. 116–125. IEEE (2015) Maalej, W., Hadeer, N.: Bug report, feature request, or simply praise? On automatically classifying app reviews. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE), pp. 116–125. IEEE (2015)
2.
Zurück zum Zitat Carreño, L.V.G., Winbladh, K.: Analysis of user comments: an approach for software requirements evolution. In: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press (2013) Carreño, L.V.G., Winbladh, K.: Analysis of user comments: an approach for software requirements evolution. In: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press (2013)
3.
Zurück zum Zitat Guzman, E., Maalej, W.: How do users like this feature? A fine grained sentiment analysis of app reviews. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE) (2014) Guzman, E., Maalej, W.: How do users like this feature? A fine grained sentiment analysis of app reviews. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE) (2014)
4.
Zurück zum Zitat Brabham, D.C.: Crowdsourcing. MIT Press, Cambridge (2013) Brabham, D.C.: Crowdsourcing. MIT Press, Cambridge (2013)
5.
Zurück zum Zitat Mao, K., Capra, L., Harman, M., Jia, Y.: A survey of the use of crowdsourcing in software engineering. J. Syst. Softw. 126, 57–84 (2017) CrossRef Mao, K., Capra, L., Harman, M., Jia, Y.: A survey of the use of crowdsourcing in software engineering. J. Syst. Softw. 126, 57–84 (2017) CrossRef
6.
Zurück zum Zitat Estellés-Arolas, E., González-Ladrón-de-Guevara, F.: Towards an integrated crowdsourcing definition. J. Inf. Sci. 38(2), 189–200 (2012)CrossRef Estellés-Arolas, E., González-Ladrón-de-Guevara, F.: Towards an integrated crowdsourcing definition. J. Inf. Sci. 38(2), 189–200 (2012)CrossRef
7.
Zurück zum Zitat Gadiraju, U., et al.: Understanding malicious behavior in crowdsourcing platforms: the case of online surveys. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015) Gadiraju, U., et al.: Understanding malicious behavior in crowdsourcing platforms: the case of online surveys. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)
8.
Zurück zum Zitat Dwarakanath, A., et al.: Trustworthiness in enterprise crowdsourcing: a taxonomy & evidence from data. In: Proceedings of the 38th International Conference on Software Engineering Companion. ACM (2016) Dwarakanath, A., et al.: Trustworthiness in enterprise crowdsourcing: a taxonomy & evidence from data. In: Proceedings of the 38th International Conference on Software Engineering Companion. ACM (2016)
9.
Zurück zum Zitat Stefanovitch, N., et al.: Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge. EPJ Data Sci. 3(1), 1–27 (2014)CrossRef Stefanovitch, N., et al.: Error and attack tolerance of collective problem solving: The DARPA Shredder Challenge. EPJ Data Sci. 3(1), 1–27 (2014)CrossRef
10.
Zurück zum Zitat Johnson, C.W.: Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics 57(3), 419–433 (2014)CrossRef Johnson, C.W.: Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures. Ergonomics 57(3), 419–433 (2014)CrossRef
11.
Zurück zum Zitat Raghavan, S.: Digital forensic research: current state of the art. CSI Trans. ICT 1(1), 91–114 (2013)CrossRef Raghavan, S.: Digital forensic research: current state of the art. CSI Trans. ICT 1(1), 91–114 (2013)CrossRef
12.
Zurück zum Zitat Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Investigation 7, S64–S73 (2010)CrossRef Garfinkel, S.L.: Digital forensics research: the next 10 years. Digital Investigation 7, S64–S73 (2010)CrossRef
13.
Zurück zum Zitat Howe, J.: The rise of crowdsourcing. Wired 14(6), 1–4 (2006) Howe, J.: The rise of crowdsourcing. Wired 14(6), 1–4 (2006)
14.
Zurück zum Zitat Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economics, Society and Nations. Little, Brown, New York (2004) Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economics, Society and Nations. Little, Brown, New York (2004)
15.
Zurück zum Zitat Breaux, T.D., Schaub, F.: Scaling requirements extraction to the crowd: experiments with privacy policies. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE) (2014) Breaux, T.D., Schaub, F.: Scaling requirements extraction to the crowd: experiments with privacy policies. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE) (2014)
16.
Zurück zum Zitat Lim, S.L., Quercia, D., Finkelstein, A.: StakeNet: using social networks to analyse the stakeholders of large-scale software projects. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1. ACM (2010) Lim, S.L., Quercia, D., Finkelstein, A.: StakeNet: using social networks to analyse the stakeholders of large-scale software projects. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 1. ACM (2010)
17.
Zurück zum Zitat Lim, S.L., Quercia, D., Finkelstein, A.: StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 2. ACM (2010) Lim, S.L., Quercia, D., Finkelstein, A.: StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis. In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 2. ACM (2010)
18.
Zurück zum Zitat Lesk, M.: The new front line: Estonia under cyberassault. IEEE Secur. Priv. 5(4), 76–79 (2007)CrossRef Lesk, M.: The new front line: Estonia under cyberassault. IEEE Secur. Priv. 5(4), 76–79 (2007)CrossRef
19.
Zurück zum Zitat Compton, D., Hamilton, J.: An examination of the techniques and implications of the crowd-sourced collection of forensic data. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom) (2011) Compton, D., Hamilton, J.: An examination of the techniques and implications of the crowd-sourced collection of forensic data. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom) (2011)
20.
Zurück zum Zitat Ghosh, A., Kale, S., McAfee, P.: Who moderates the moderators?: Crowdsourcing abuse detection in user-generated content. In: Proceedings of the 12th ACM Conference on Electronic Commerce. ACM (2011) Ghosh, A., Kale, S., McAfee, P.: Who moderates the moderators?: Crowdsourcing abuse detection in user-generated content. In: Proceedings of the 12th ACM Conference on Electronic Commerce. ACM (2011)
21.
Zurück zum Zitat Pasquale, L., et al.: Adaptive evidence collection in the cloud using attack scenarios. Comput. Secur. 59, 236–254 (2016)CrossRef Pasquale, L., et al.: Adaptive evidence collection in the cloud using attack scenarios. Comput. Secur. 59, 236–254 (2016)CrossRef
22.
Zurück zum Zitat Maalej, W., et al.: Toward data-driven requirements engineering. IEEE Softw. 33(1), 48–54 (2016)CrossRef Maalej, W., et al.: Toward data-driven requirements engineering. IEEE Softw. 33(1), 48–54 (2016)CrossRef
23.
Zurück zum Zitat Hosseini, M., et al.: Towards crowdsourcing for requirements engineering. In: 20th International Working Conference on Requirements Engineering: Foundations for Software Quality, Empirical Track (2014) Hosseini, M., et al.: Towards crowdsourcing for requirements engineering. In: 20th International Working Conference on Requirements Engineering: Foundations for Software Quality, Empirical Track (2014)
24.
Zurück zum Zitat Snijders, R., et al.: Crowd-centric requirements engineering: a method based on crowdsourcing and gamification. Technical Report Series (UU-CS-2015-004) (2015) Snijders, R., et al.: Crowd-centric requirements engineering: a method based on crowdsourcing and gamification. Technical Report Series (UU-CS-2015-004) (2015)
26.
Zurück zum Zitat Pachidi, S., Spruit, M., Van De Weerd, I.: Understanding users’ behavior with software operation data mining. Comput. Hum. Behav. 30, 583–594 (2014)CrossRef Pachidi, S., Spruit, M., Van De Weerd, I.: Understanding users’ behavior with software operation data mining. Comput. Hum. Behav. 30, 583–594 (2014)CrossRef
Metadaten
Titel
Crowd Vigilante
verfasst von
Muneera Bano
Didar Zowghi
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7796-8_9

Premium Partner