Abstract
This chapter addresses the sinister counterpoint to the much celebrated positive opportunities of human computation systems. We characterize exploits that target workers, requesters, and a system as a whole. We identify opportunities for malicious users to leverage human computation systems to exploit external populations. Finally, we sketch some preliminary directions towards mitigating these concerns.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
BBC (2013) Vietnam admits deploying bloggers to support government. http://www.bbc.co.uk/news/world-asia-20982985, Jan 2013
FEMA (2012) Hurricane sandy: rumor control. http://www.fema.gov/hurricane-sandy-rumor-control
Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. In: IMC, Melbourne
Gizmodo (2012) How a fake erotic fiction ebook hit the top 5 of itunes. http://gizmodo.com/5933169/how-a-fake-crowdsourced-erotic-ebook-hit-the-top-5-of-itunes, Aug 2012
Guardian T (2011) Revealed: US spy operation that manipulates social media. http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks, Mar 2011
Irani L, Silberman MS (2013) Turkopticon: interrupting worker invisibility in amazon mechanical turk. In: ACM SIGCHI conference on human factors in computing systems, Paris
Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100
Lease et al. M (2013) Mechanical turk is not anonymous
Lee K, Kamath K, Caverlee J (2013a) Combating threats to collective attention in social media: an evaluation. In: ICWSM, Cambridge
Lee K, Tamilarasan P, Caverlee J (2013b) Crowdturfers, campaigns, and social media: tracking and revealing crowdsourced manipulation of social media. In: 7th international AAAI conference on weblogs and social media (ICWSM), Cambridge
Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing p2p reputation systems. Comput Netw Int J Comput Telecommun Netw 50(4):472–484
Meier P (2012) What was novel about social media use during hurricane sandy? http://irevolution.net/2012/10/31/hurricane-sandy/
Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45–48
Ross J, Irani L, Silberman MS, Zaldivar A, Tomlinson B (2010) Who are the crowdworkers? Shifting demographics in mechanical turk. In: CHI’10 extended abstracts on human factors in computing systems, CHI EA’10, New York, pp 2863–2872. ACM
Tang JC, Cebrian M, Giacobe NA, Kim H-W, Kim T, Wickert DB (2011) Reflecting on the darpa red balloon challenge. Commun ACM 54(4):78–85
Venetis P, Garcia-Molina H (2012) Quality control for comparison microtasks. In: CrowdKDD 2012, Beijing
Wang G, Wilson C, Zhao X, Zhu Y, Mohanlal M, Zheng H, Zhao BY (2012) Serf and turf: crowdturfing for fun and profit. In: WWW, Lyon
Wired (2010) The chinese online ‘water army’. http://www.wired.com/beyond_the_beyond/2010/06/the-chinese-online-water-army/, June 2010
Xia T, Zhang C, Xie J, Li T (2012) Real-time quality control for crowdsourcing relevance evaluation. In: Network infrastructure and digital content (IC-NIDC), Beijing
Zittrain J (2009) Work the new digital sweatshops. Newsweek
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Caverlee, J. (2013). Exploitation in Human Computation Systems. In: Michelucci, P. (eds) Handbook of Human Computation. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8806-4_68
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8806-4_68
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8805-7
Online ISBN: 978-1-4614-8806-4
eBook Packages: Computer ScienceComputer Science (R0)