SlideShare una empresa de Scribd logo
1 de 30
Understanding Malicious Behavior in
Crowdsourcing Platforms
The Case of Online Surveys
Ujwal Gadiraju, Ricardo Kawase,
Stefan Dietze and Gianluca Demartini
Outline
● Motivation
● Background
● Research Challenges
● Methodology
● Results
● Conclusions
Crowdsourcing - Some remarkable outcomes
Crowdsourcing gone Awry
Example: Sochi Winter Olympics 2014 Mascot
Zoich, the Psychedelic Frog by Egor Zhgun
The Case of Mountain Dew’s Dub the Dew Campaign
Apple flavored Mountain Dew : What to call it?
Challenges
➢ Quality Control Mechanisms
○ Diverse pool of crowd workers
○ Wide range of behavior
○ Various motivations
Malicious Workers
“workers with ulterior motives, who either simply sabotage a task, or
provide poor responses in an attempt to quickly attain task
completion for monetary gains”
➢ Typically adopted solution to
prevent/flag malicious activity :
Gold-Standard Questions
➢ Flourishing Crowdsourcing
markets, advances in malicious
activity
Need to understand workers behavior
and types of malicious activity.
Background
A Taxonomy of Microtasks on the Web.
Ujwal Gadiraju, Ricardo Kawase and Stefan Dietze.
In Proceedings of the 25th ACM Conference on
Hypertext and Social Media. 2014.
Taxonomy of Microtasks
Information
Finding
Verification &
Validation
Interpretation
& Analysis
Content
Creation
Surveys
Content
Access
➢ We focus on analyzing the malicious
behavior of workers in SURVEYS
○ Subjective nature
○ Open-ended questions
○ Gold-standards are not easily
applicable
Research Questions
Do untrustworthy workers adopt different methods
to complete tasks, and exhibit different kinds of behavior?
Can behavioral patterns of malicious workers in the
crowd be identified and quantified?
How can task administrators benefit from the prior
knowledge of plausible worker behavior?
RQ#1
RQ#2
RQ#3
Survey Design
➢ CrowdFlower Platform to deploy survey
➢ Survey questions
○ Demographics
○ Educational & general background
➢ 34 Questions in total
○ Open-ended
○ Multiple Choice
○ Likert-type
➢ Responses from 1000 crowd workers
○ Monetary Compensation per worker :
0.2 USD
➢ Questions regarding previous tasks that were successfully
completed
➢ 2 Attention-check questions
○ Engage workers
○ Gold-standard to separate Trustworthy/Untrustworthy
workers (we found 568 trustworthy, 432 untrustworthy)
Analyzing Malicious behavior in the Crowd
Based on the following aspects, we investigate the
behavioral patterns of crowd workers.
I. eligibility of a worker to participate in a task
II. conformation to the pre-set rules
III.satisfying expected requirements fully
Ineligible
Workers (IW)
Fast Deceivers
(FD)
Rule Breakers
(RB)
Smart
Deceivers (SD)
Gold Standard
Preys (GSP)
Instruction: Please attempt this microtask ONLY IF you
have successfully completed 5 microtasks previously.
Response: ‘this is my first task’
eg: Copy-pasting same text in response to multiple questions, entering
gibberish, etc.
Response: ‘What’s your task?’ , ‘adasd’, ‘fgfgf gsd ljlkj’
Instruction: Identify 5 keywords that represent this task
(separated by commas).
Response: ‘survey, tasks, history’ , ‘previous task yellow’
Instruction: Identify 5 keywords that represent this task
(separated by commas).
Response: ‘one, two, three, four, five’
These workers abide by the instructions and provide valid
responses, but stumble at the gold-standard questions!
Behavioral Patterns
Observations
We manually annotated each response from
the 1000 workers.
➢ 568 workers passed the gold-standard:
Trustworthy workers (TW)
➢ 432 workers failed to pass the gold-
standard: Untrustworthy workers
(UW)
➢ 335 trustworthy workers gave perfect
responses: Elite workers
➢ 665 non-elite workers (233 TW, 432 UT)
were manually classified into the different
classes according to their behavioral
patterns.
Distribution of Workers
Measuring the Maliciousness of workers
Acceptability: “The acceptability of a response can be assessed based on the
extent to which a response meets the priorly stated expectations.”
E.g.
Instruction: Please attempt this microtask ONLY IF you have
successfully completed 5 microtasks previously.
Response: ‘survey, tasks, history’ ⇒ ‘0’
Response: ‘previous, job, finding, authors, books’ ⇒ ‘1’
where, n is the total number of responses from a worker and Ari represents
the acceptability of response ‘i’
We consider
open-ended
questions.
Degree of maliciousness of trustworthy (TW) and untrustworthy workers (UW) and
their average task completion time (r=0.51).
Tipping Point
“the first point at which a worker begins to exhibit malicious
behavior after having provided an acceptable response”
Task Design Guidelines
➢ Using the ‘Tipping Point’ for early detection of malicious activity.
➢ Using ‘Malicious Intent’ as a measure to discard unreliable responses
from workers and improve the quality of results.
Ineligible
Workers
Pre-screening to tackle Ineligible Workers (IW).
Fast
Deceivers
Rule
Breakers
Smart
Deceivers
Stringent and persistent validators and monitoring worker progress to
tackle Fast Deceivers (FD) and Rule Breakers (RB).
Psychometric approaches to tackle Smart Deceivers (SD).
Post-processing to accommodate fair responses from Gold-standard
Preys (GSP).
Gold Standard
Preys
Contributions & Future Work
Identified different types of malicious behavior exhibited by crowd
workers.
RQ#1
RQ#2
RQ#3
Measuring ‘maliciousness’ of workers to quantify their behavioral
traits, and ‘tipping point’ to further understand worker behavior.
This understanding helps requesters in effective task design,
ensures adequate utilization of the crowdsourcing platform(s).
Guidelines for efficient design of Surveys by limiting malicious
activity.
In the near future,
(i) we will develop automatic methods to identify, classify
workers according to their behavior,
(ii) investigate malicious activity in other tasks within the
taxonomy.
Contact Details :
gadiraju@l3s.de
http://www.L3S.de
Task Completion Time vs Worker Maliciousness
Ineligible
Workers
Fast Deceivers Rule Breakers Smart Deceivers Gold-Standard
Preys
Where are the workers from?
Beyond the Tipping Point
● Is the tipping point a true indicator of further malicious
activity?
Flow of Malicious Behavior
TitleDescription Keywords
Title
Keywords
- General
Description
● Inter-rater agreement between the experts (according to
Krippendorf’s Alpha) : 0.89
Workers Classification
● 73 untrustworthy workers and 93 trustworthy workers
were classified into 2 different classes, while the rest
were uniquely classified.
● Inter-rater agreement between the experts (according to
Krippendorf’s Alpha) : 0.94
Acceptability of Responses
Survey Design: Precautions
❏ Engaging participants -> Humor-evoking Questions
❏ Clear instructions to avoid bias

Más contenido relacionado

Destacado

ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALS
ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALSANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALS
ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALSAnthea Missy
 
Nf2 mecánica de trabajo con cámaras eng.
Nf2 mecánica de trabajo con cámaras eng.Nf2 mecánica de trabajo con cámaras eng.
Nf2 mecánica de trabajo con cámaras eng.Miguel García Serrano
 
Protected areas & sfari map real size
Protected areas & sfari map real sizeProtected areas & sfari map real size
Protected areas & sfari map real sizeEgypt Tourism Board
 
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATO
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATOCUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATO
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATOMacarena Martos Bautista
 
AHK Iran - Jubiläumsbroschüre_opt
AHK Iran - Jubiläumsbroschüre_optAHK Iran - Jubiläumsbroschüre_opt
AHK Iran - Jubiläumsbroschüre_optKhashayar Nivipour
 
Modelos de procesos de Software
Modelos de procesos de SoftwareModelos de procesos de Software
Modelos de procesos de SoftwareRaúl Galván
 
Produccion y direccion de tele raymond bravo
Produccion y direccion de tele raymond bravoProduccion y direccion de tele raymond bravo
Produccion y direccion de tele raymond bravorokogirl98
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in EducationSalina Saharudin
 
Test - Tema 6 La piel. Higiene del Paciente. higiene total y parcial
Test - Tema 6   La piel. Higiene del Paciente. higiene total y parcialTest - Tema 6   La piel. Higiene del Paciente. higiene total y parcial
Test - Tema 6 La piel. Higiene del Paciente. higiene total y parcialGesain Auxiliar de Enfermeria
 
Distributed Systems: How to connect your real-time applications
Distributed Systems: How to connect your real-time applicationsDistributed Systems: How to connect your real-time applications
Distributed Systems: How to connect your real-time applicationsJaime Martin Losa
 
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...Oliver Schmitt
 

Destacado (16)

Retail
RetailRetail
Retail
 
Quiero montar centro sanitario
Quiero montar centro sanitarioQuiero montar centro sanitario
Quiero montar centro sanitario
 
ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALS
ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALSANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALS
ANTHEA MISSY PORTFOLIO 2016 PART 1/2 - STREET ART GRAFFITI MURALS
 
Nf2 mecánica de trabajo con cámaras eng.
Nf2 mecánica de trabajo con cámaras eng.Nf2 mecánica de trabajo con cámaras eng.
Nf2 mecánica de trabajo con cámaras eng.
 
Protected areas & sfari map real size
Protected areas & sfari map real sizeProtected areas & sfari map real size
Protected areas & sfari map real size
 
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATO
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATOCUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATO
CUADERNO DE ORIENTACIÓN PARA INSTITUTOS DE SECUNDARIA Y BACHILLERATO
 
AHK Iran - Jubiläumsbroschüre_opt
AHK Iran - Jubiläumsbroschüre_optAHK Iran - Jubiläumsbroschüre_opt
AHK Iran - Jubiläumsbroschüre_opt
 
Marco curricular Alhem
Marco curricular  AlhemMarco curricular  Alhem
Marco curricular Alhem
 
Modelos de procesos de Software
Modelos de procesos de SoftwareModelos de procesos de Software
Modelos de procesos de Software
 
Produccion y direccion de tele raymond bravo
Produccion y direccion de tele raymond bravoProduccion y direccion de tele raymond bravo
Produccion y direccion de tele raymond bravo
 
Guia informatica
Guia informaticaGuia informatica
Guia informatica
 
Chapter 3 The Role of Multimedia in Education
Chapter 3   The Role of Multimedia in EducationChapter 3   The Role of Multimedia in Education
Chapter 3 The Role of Multimedia in Education
 
Test - Tema 6 La piel. Higiene del Paciente. higiene total y parcial
Test - Tema 6   La piel. Higiene del Paciente. higiene total y parcialTest - Tema 6   La piel. Higiene del Paciente. higiene total y parcial
Test - Tema 6 La piel. Higiene del Paciente. higiene total y parcial
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Distributed Systems: How to connect your real-time applications
Distributed Systems: How to connect your real-time applicationsDistributed Systems: How to connect your real-time applications
Distributed Systems: How to connect your real-time applications
 
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...
Evolution im Handel: wie der stationäre Handel vom eigenen Online-Shop profit...
 

Similar a Understanding Malicious Behavior in Crowdsourcing Platforms - The Case of Online Surveys

Behavioral Science for Data Scientists
Behavioral Science for Data ScientistsBehavioral Science for Data Scientists
Behavioral Science for Data ScientistsStephen Wendel
 
Lean Principles Everyone Should Use (Final)
Lean Principles Everyone Should Use (Final)Lean Principles Everyone Should Use (Final)
Lean Principles Everyone Should Use (Final)Todd Mills
 
Organizational behaviour OB Chapter 1
Organizational behaviour OB Chapter 1Organizational behaviour OB Chapter 1
Organizational behaviour OB Chapter 1Shariq Ch
 
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)Kelsey Anderson Foley
 
the difference between competence and competency
the difference between competence and competency   the difference between competence and competency
the difference between competence and competency Najeebhemat Malikzia
 
Human Resource Planning Ethics in Human Resource Management
Human Resource Planning Ethics in Human Resource ManagementHuman Resource Planning Ethics in Human Resource Management
Human Resource Planning Ethics in Human Resource Managementsarikakhandekar2
 
Behaviourally based questions
Behaviourally based questionsBehaviourally based questions
Behaviourally based questionsSteve Ng
 
Human Resource Management
Human Resource Management Human Resource Management
Human Resource Management Jayesh Sharma
 
Dz human performance fenoc july 2015rev1
Dz human performance fenoc july 2015rev1Dz human performance fenoc july 2015rev1
Dz human performance fenoc july 2015rev1Jon Ellison
 
Unit iii ppt job analysis & recruitment
Unit iii ppt  job analysis & recruitmentUnit iii ppt  job analysis & recruitment
Unit iii ppt job analysis & recruitmentisha_slides
 
Cracking The Cognitive Assessment Code
Cracking The Cognitive Assessment CodeCracking The Cognitive Assessment Code
Cracking The Cognitive Assessment CodeWorkforce Group
 
Did you mean crowdsourcing for recommender systems?
Did you mean crowdsourcing for recommender systems?Did you mean crowdsourcing for recommender systems?
Did you mean crowdsourcing for recommender systems?oralonso
 
Job analysis powerpoint CHAPTER 6 ito ung report nmin
Job analysis powerpoint CHAPTER 6 ito ung report nminJob analysis powerpoint CHAPTER 6 ito ung report nmin
Job analysis powerpoint CHAPTER 6 ito ung report nminGia Lara
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...Simone Onofri
 

Similar a Understanding Malicious Behavior in Crowdsourcing Platforms - The Case of Online Surveys (20)

Behavioral Science for Data Scientists
Behavioral Science for Data ScientistsBehavioral Science for Data Scientists
Behavioral Science for Data Scientists
 
Final employee selection
Final employee selectionFinal employee selection
Final employee selection
 
Lean Principles Everyone Should Use (Final)
Lean Principles Everyone Should Use (Final)Lean Principles Everyone Should Use (Final)
Lean Principles Everyone Should Use (Final)
 
Soft Skills, Hard Benefits
Soft Skills, Hard BenefitsSoft Skills, Hard Benefits
Soft Skills, Hard Benefits
 
Organizational behaviour OB Chapter 1
Organizational behaviour OB Chapter 1Organizational behaviour OB Chapter 1
Organizational behaviour OB Chapter 1
 
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
The Tragedy of Bias in Technical Hiring in Five Acts (Grace Hopper 2014)
 
the difference between competence and competency
the difference between competence and competency   the difference between competence and competency
the difference between competence and competency
 
MAUD DESIGN
MAUD DESIGNMAUD DESIGN
MAUD DESIGN
 
Human Resource Planning Ethics in Human Resource Management
Human Resource Planning Ethics in Human Resource ManagementHuman Resource Planning Ethics in Human Resource Management
Human Resource Planning Ethics in Human Resource Management
 
Behaviourally based questions
Behaviourally based questionsBehaviourally based questions
Behaviourally based questions
 
Human Resource Management
Human Resource Management Human Resource Management
Human Resource Management
 
Dz human performance fenoc july 2015rev1
Dz human performance fenoc july 2015rev1Dz human performance fenoc july 2015rev1
Dz human performance fenoc july 2015rev1
 
Unit iii ppt job analysis & recruitment
Unit iii ppt  job analysis & recruitmentUnit iii ppt  job analysis & recruitment
Unit iii ppt job analysis & recruitment
 
Cracking The Cognitive Assessment Code
Cracking The Cognitive Assessment CodeCracking The Cognitive Assessment Code
Cracking The Cognitive Assessment Code
 
Did you mean crowdsourcing for recommender systems?
Did you mean crowdsourcing for recommender systems?Did you mean crowdsourcing for recommender systems?
Did you mean crowdsourcing for recommender systems?
 
Productive and Non-productive Behavior
Productive and Non-productive BehaviorProductive and Non-productive Behavior
Productive and Non-productive Behavior
 
Job analysis powerpoint CHAPTER 6 ito ung report nmin
Job analysis powerpoint CHAPTER 6 ito ung report nminJob analysis powerpoint CHAPTER 6 ito ung report nmin
Job analysis powerpoint CHAPTER 6 ito ung report nmin
 
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...OWASP AppSec EU 2016 - Security Project Management -  How to be Agile in Secu...
OWASP AppSec EU 2016 - Security Project Management - How to be Agile in Secu...
 
Motivaton
MotivatonMotivaton
Motivaton
 
Motivaton
MotivatonMotivaton
Motivaton
 

Último

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Último (20)

Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Understanding Malicious Behavior in Crowdsourcing Platforms - The Case of Online Surveys

  • 1. Understanding Malicious Behavior in Crowdsourcing Platforms The Case of Online Surveys Ujwal Gadiraju, Ricardo Kawase, Stefan Dietze and Gianluca Demartini
  • 2. Outline ● Motivation ● Background ● Research Challenges ● Methodology ● Results ● Conclusions
  • 3. Crowdsourcing - Some remarkable outcomes
  • 4. Crowdsourcing gone Awry Example: Sochi Winter Olympics 2014 Mascot
  • 5. Zoich, the Psychedelic Frog by Egor Zhgun
  • 6. The Case of Mountain Dew’s Dub the Dew Campaign
  • 7. Apple flavored Mountain Dew : What to call it?
  • 8. Challenges ➢ Quality Control Mechanisms ○ Diverse pool of crowd workers ○ Wide range of behavior ○ Various motivations
  • 9. Malicious Workers “workers with ulterior motives, who either simply sabotage a task, or provide poor responses in an attempt to quickly attain task completion for monetary gains” ➢ Typically adopted solution to prevent/flag malicious activity : Gold-Standard Questions ➢ Flourishing Crowdsourcing markets, advances in malicious activity Need to understand workers behavior and types of malicious activity.
  • 10. Background A Taxonomy of Microtasks on the Web. Ujwal Gadiraju, Ricardo Kawase and Stefan Dietze. In Proceedings of the 25th ACM Conference on Hypertext and Social Media. 2014. Taxonomy of Microtasks Information Finding Verification & Validation Interpretation & Analysis Content Creation Surveys Content Access ➢ We focus on analyzing the malicious behavior of workers in SURVEYS ○ Subjective nature ○ Open-ended questions ○ Gold-standards are not easily applicable
  • 11. Research Questions Do untrustworthy workers adopt different methods to complete tasks, and exhibit different kinds of behavior? Can behavioral patterns of malicious workers in the crowd be identified and quantified? How can task administrators benefit from the prior knowledge of plausible worker behavior? RQ#1 RQ#2 RQ#3
  • 12. Survey Design ➢ CrowdFlower Platform to deploy survey ➢ Survey questions ○ Demographics ○ Educational & general background ➢ 34 Questions in total ○ Open-ended ○ Multiple Choice ○ Likert-type ➢ Responses from 1000 crowd workers ○ Monetary Compensation per worker : 0.2 USD
  • 13. ➢ Questions regarding previous tasks that were successfully completed ➢ 2 Attention-check questions ○ Engage workers ○ Gold-standard to separate Trustworthy/Untrustworthy workers (we found 568 trustworthy, 432 untrustworthy)
  • 14. Analyzing Malicious behavior in the Crowd Based on the following aspects, we investigate the behavioral patterns of crowd workers. I. eligibility of a worker to participate in a task II. conformation to the pre-set rules III.satisfying expected requirements fully
  • 15. Ineligible Workers (IW) Fast Deceivers (FD) Rule Breakers (RB) Smart Deceivers (SD) Gold Standard Preys (GSP) Instruction: Please attempt this microtask ONLY IF you have successfully completed 5 microtasks previously. Response: ‘this is my first task’ eg: Copy-pasting same text in response to multiple questions, entering gibberish, etc. Response: ‘What’s your task?’ , ‘adasd’, ‘fgfgf gsd ljlkj’ Instruction: Identify 5 keywords that represent this task (separated by commas). Response: ‘survey, tasks, history’ , ‘previous task yellow’ Instruction: Identify 5 keywords that represent this task (separated by commas). Response: ‘one, two, three, four, five’ These workers abide by the instructions and provide valid responses, but stumble at the gold-standard questions! Behavioral Patterns
  • 16. Observations We manually annotated each response from the 1000 workers. ➢ 568 workers passed the gold-standard: Trustworthy workers (TW) ➢ 432 workers failed to pass the gold- standard: Untrustworthy workers (UW) ➢ 335 trustworthy workers gave perfect responses: Elite workers ➢ 665 non-elite workers (233 TW, 432 UT) were manually classified into the different classes according to their behavioral patterns.
  • 18. Measuring the Maliciousness of workers Acceptability: “The acceptability of a response can be assessed based on the extent to which a response meets the priorly stated expectations.” E.g. Instruction: Please attempt this microtask ONLY IF you have successfully completed 5 microtasks previously. Response: ‘survey, tasks, history’ ⇒ ‘0’ Response: ‘previous, job, finding, authors, books’ ⇒ ‘1’ where, n is the total number of responses from a worker and Ari represents the acceptability of response ‘i’ We consider open-ended questions.
  • 19. Degree of maliciousness of trustworthy (TW) and untrustworthy workers (UW) and their average task completion time (r=0.51).
  • 20. Tipping Point “the first point at which a worker begins to exhibit malicious behavior after having provided an acceptable response”
  • 21. Task Design Guidelines ➢ Using the ‘Tipping Point’ for early detection of malicious activity. ➢ Using ‘Malicious Intent’ as a measure to discard unreliable responses from workers and improve the quality of results. Ineligible Workers Pre-screening to tackle Ineligible Workers (IW). Fast Deceivers Rule Breakers Smart Deceivers Stringent and persistent validators and monitoring worker progress to tackle Fast Deceivers (FD) and Rule Breakers (RB). Psychometric approaches to tackle Smart Deceivers (SD). Post-processing to accommodate fair responses from Gold-standard Preys (GSP). Gold Standard Preys
  • 22. Contributions & Future Work Identified different types of malicious behavior exhibited by crowd workers. RQ#1 RQ#2 RQ#3 Measuring ‘maliciousness’ of workers to quantify their behavioral traits, and ‘tipping point’ to further understand worker behavior. This understanding helps requesters in effective task design, ensures adequate utilization of the crowdsourcing platform(s). Guidelines for efficient design of Surveys by limiting malicious activity. In the near future, (i) we will develop automatic methods to identify, classify workers according to their behavior, (ii) investigate malicious activity in other tasks within the taxonomy.
  • 23.
  • 25. Task Completion Time vs Worker Maliciousness Ineligible Workers Fast Deceivers Rule Breakers Smart Deceivers Gold-Standard Preys
  • 26. Where are the workers from?
  • 27. Beyond the Tipping Point ● Is the tipping point a true indicator of further malicious activity?
  • 28. Flow of Malicious Behavior TitleDescription Keywords Title Keywords - General Description
  • 29. ● Inter-rater agreement between the experts (according to Krippendorf’s Alpha) : 0.89 Workers Classification ● 73 untrustworthy workers and 93 trustworthy workers were classified into 2 different classes, while the rest were uniquely classified. ● Inter-rater agreement between the experts (according to Krippendorf’s Alpha) : 0.94 Acceptability of Responses
  • 30. Survey Design: Precautions ❏ Engaging participants -> Humor-evoking Questions ❏ Clear instructions to avoid bias

Notas del editor

  1. Lead on to Malicious Workers.