Skip to main content

2015 | OriginalPaper | Buchkapitel

Weaponized Crowdsourcing: An Emerging Threat and Potential Countermeasures

verfasst von : James Caverlee, Kyumin Lee

Erschienen in: Transparency in Social Media

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The crowdsourcing movement has spawned a host of successful efforts that organize large numbers of globally-distributed participants to tackle a range of tasks, including crisis mapping (e.g., Ushahidi), translation (e.g., Duolingo), and protein folding (e.g., Foldit). Alongside these specialized systems, we have seen the rise of general-purpose crowdsourcing marketplaces like Amazon Mechanical Turk and Crowdflower that aim to connect task requesters with task workers, toward creating new crowdsourcing systems that can intelligently organize large numbers of people. However, these positive opportunities have a sinister counterpart: what we dub “Weaponized Crowdsourcing”. Already we have seen the first glimmers of this ominous new trend—including large-scale “crowdturfing”, wherein masses of cheaply paid shills can be organized to spread malicious URLs in social media (Grier, Thomas, Paxson, & Zhang, 2010; Lee & Kim, 2012), form artificial grassroots campaigns (“astroturf”) (Gao et al., 2010; Lee, Caverlee, Cheng, & Sui, 2013), spread rumor and misinformation (Castillo, Mendoza, & Poblete, 2011; Gupta, Lamba, Kumaraguru, & Joshi, 2013), and manipulate search engines. A recent study finds that 90 % of tasks on many crowdsourcing platforms are for crowdturfing (Wang et al., 2012), and our initial research (Lee, Tamilarasan, & Caverlee, 2013) shows that most malicious tasks in crowdsourcing systems target either online communities (56 %) or search engines (33 %). Unfortunately, little is known about Weaponized Crowdsourcing as it manifests in existing systems, nor what are the ramifications on the design and operation of emerging socio-technical systems. Hence, this chapter shall focus on key research questions related to Weaponized Crowdsourcing as well as outline the potential of building new preventative frameworks for maintaining the information quality and integrity of online communities in the face of this rising challenge.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In WWW. Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In WWW.
Zurück zum Zitat Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010). Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement (IMC). Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010). Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement (IMC).
Zurück zum Zitat Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @spam: The underground on 140 characters or less. In CCS. Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @spam: The underground on 140 characters or less. In CCS.
Zurück zum Zitat Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013). Faking sandy: Characterizing and identifying fake images on twitter during hurricane sandy. In WWW Companion. Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013). Faking sandy: Characterizing and identifying fake images on twitter during hurricane sandy. In WWW Companion.
Zurück zum Zitat Ipeirotis, P. G. (2010). Analyzing the amazon mechanical turk marketplace. In XRDS, (Vol. 17, pp. 16–21). Ipeirotis, P. G. (2010). Analyzing the amazon mechanical turk marketplace. In XRDS, (Vol. 17, pp. 16–21).
Zurück zum Zitat Lee, K., Caverlee, J., Cheng, Z., & Sui, D. Z. (2013). Campaign extraction from social media. ACM Transactions on Intelligent Systems and Technology, 5, 9:1–9:28. Lee, K., Caverlee, J., Cheng, Z., & Sui, D. Z. (2013). Campaign extraction from social media. ACM Transactions on Intelligent Systems and Technology, 5, 9:1–9:28.
Zurück zum Zitat Lee, K., Tamilarasan, P., & Caverlee, J. (2013). Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media. In ICWSM. Lee, K., Tamilarasan, P., & Caverlee, J. (2013). Crowdturfers, campaigns, and social media: Tracking and revealing crowdsourced manipulation of social media. In ICWSM.
Zurück zum Zitat Lee, K., Webb, S., & Ge, H. (2014).The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing. In ICWSM. Lee, K., Webb, S., & Ge, H. (2014).The dark side of micro-task marketplaces: Characterizing fiverr and automatically detecting crowdturfing. In ICWSM.
Zurück zum Zitat Lee, S., & Kim, J. (2012). Warningbird: Detecting suspicious urls in twitter stream. In NDSS. Lee, S., & Kim, J. (2012). Warningbird: Detecting suspicious urls in twitter stream. In NDSS.
Zurück zum Zitat Pennebaker, J., Francis, M., & Booth, R. (2001). Linguistic inquiry and word count. Mahwah: Erlbaum Publishers. Pennebaker, J., Francis, M., & Booth, R. (2001). Linguistic inquiry and word count. Mahwah: Erlbaum Publishers.
Zurück zum Zitat Ross, J., Irani, L., Silberman, M. S., Zaldivar, A., & Tomlinson, B. (2010). Who are the crowdworkers?: shifting demographics in mechanical turk. In CHI Extended Abstracts on Human Factors in Computing Systems. Ross, J., Irani, L., Silberman, M. S., Zaldivar, A., & Tomlinson, B. (2010). Who are the crowdworkers?: shifting demographics in mechanical turk. In CHI Extended Abstracts on Human Factors in Computing Systems.
Zurück zum Zitat Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M. J., Zheng, H., et al. (2013). Social turing tests: Crowdsourcing sybil detection. In NDSS. Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M. J., Zheng, H., et al. (2013). Social turing tests: Crowdsourcing sybil detection. In NDSS.
Zurück zum Zitat Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., et al. (2012). Serf and turf: crowdturfing for fun and profit. In WWW. Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., et al. (2012). Serf and turf: crowdturfing for fun and profit. In WWW.
Zurück zum Zitat Witten, I. H., & Frank, E. (2005). Data mining: Practical machine learning tools and techniques, 2nd ed. New York: Morgan Kaufmann. Witten, I. H., & Frank, E. (2005). Data mining: Practical machine learning tools and techniques, 2nd ed. New York: Morgan Kaufmann.
Metadaten
Titel
Weaponized Crowdsourcing: An Emerging Threat and Potential Countermeasures
verfasst von
James Caverlee
Kyumin Lee
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-18552-1_4