Rogue people: on adversarial crowdsourcing in the context of cyber security

Journal of Information, Communication and Ethics in Society 19 (1):87-103 (2021)
  Copy   BIBTEX

Abstract

Purpose Over the past decade, many research works in various disciplines have benefited from the endless ocean of people and their potentials as an effective problem-solving strategy and computational model. But nothing interesting is ever completely one-sided. Therefore, when it comes to leveraging people's power, as the dark side of crowdsourcing, there are some possible threats that have not been considered as should be, such as recruiting black hat crowdworkers for organizing targeted adversarial intentions. The purpose of this paper is to draw more attention to this critical issue through investigation of its different aspects. Design/methodology/approach To delve into details of such malicious intentions, the related literature and previous researches have been studied. Then, four major typologies for adversarial crowdsourced attacks as well as some real-world scenarios are discussed and delineated. Finally, possible future threats are introduced. Findings Despite many works on adversarial crowdsourcing, there are only a few specific research studies devoted to considering the issue in the context of cyber security. In this regard, the proposed typologies for such human-mediated attacks can shed light on the way of identifying and confronting such threats. Originality/value To the best of the authors' knowledge, this the first work in which the titular topic is investigated in detail. Due to popularity and efficiency of leveraging crowds' intelligence and efforts in a wide range of application domains, it is most likely that adversarial human-driven intentions gain more attention. In this regard, it is anticipated that the present research study can serve as a roadmap for proposing defensive mechanisms to cope with such diverse threats.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The ethical use of crowdsourcing.Susan Standing & Craig Standing - 2017 - Business Ethics: A European Review 27 (1):72-80.
Directions of realization of state policy in the field of cyber security.G. Chetverik - 2012 - Epistemological studies in Philosophy, Social and Political Sciences 1 (22):241-246.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.Marwan Albahar - 2019 - Science and Engineering Ethics 25 (4):993-1006.
Against Adversarial Discussion.Maarten Steenhagen - 2016 - Collingwood and British Idealism Studies 22 (1):87-112.
Justifying Cyber-intelligence?Ross W. Bellaby - 2016 - Journal of Military Ethics 15 (4):299-319.
Dignity and Freedom through Human Security.V. Balamdal - 2014 - Eubios Journal of Asian and International Bioethics 24 (1):18-20.

Analytics

Added to PP
2020-07-22

Downloads
16 (#883,649)

6 months
8 (#342,364)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

The original sin of crowd work for human subjects research.Huichuan Xia - 2022 - Journal of Information, Communication and Ethics in Society 20 (3):374-387.

Add more citations

References found in this work

No references found.

Add more references