Three Types Of Crowdsourcing Information Security

Superior Essays
Background Information Crowdsourcing information security uses the reach of crowdsourcing to tackle problems involving information security and cyber security. To effectively crowdsource a task, especially in information security, three criteria must be met:
• First, the crowdsourcing task must be solvable by a large group.
• Second, the requester must have access to a large group of people that work either collaboratively or independently toward a solution.
• Third, the requester needs to attract these people to engage in a crowdsourcing task via an open call (Hetmank, 2014). The first criteria, defining a task, can be a task of any kind. Common examples include news aggregation, and some forms of social media (Hetmank, 2014). For information
…show more content…
One organization’s solution to one cyber threat may possibly be used to fight another threat another organization else has. Therefore, recognizing one attack source can aid other organizations in both defenses. By helping each other, a community can form a collective defense where each participant shares its knowledge of attack data the benefit of all participants (Imperva, 2013).
Advantages of Crowdsourcing Information Security When used for securing information or disseminating information, crowdsourcing provides many tangible advantages when compared to traditional methods. Of the many, three stand out above all: the potential cost effectiveness, the ability to project a reach of a global range, and the ability to collaborate effectively.
Cost effective Perhaps the most important benefit when crowdsourcing information security is the savings in costs when organized effectively. There is various reason as to why crowdsourcing operations can be more cost effective than traditional work methods. The most important include the easy availability of technology platforms (Hui, 2015), and the ability to meet sensitive work demands (Massolution,
…show more content…
This is due to the fact that some information entered into the databases are inherently sensitive and private, such as social security numbers or medical history (Massolution, 2013). For example, the Pennsylvania Department of Revenue (PA DOR) processes over 10 million tax returns a year and during tax season and suffers from increased workloads during those particular weeks (Massolution, 2013). To combat this problem PA DOR hired Lionbridge technology, a company that employs enterprise crowdsourcing solutions, who came up with an innovative

Related Documents

  • Improved Essays

    The ability for agencies within the Intelligence Community to share information horizontally through the use of Fusion Centers has proven both effective and beneficial to Americans everywhere. In only the last five years, Fusion Centers have been credited with “preventing, protecting against, and responding to criminal and terrorist threats,” (DHS 2015) all across the country. Although they assist with the counter-terrorism fight, it is important to identify that that is not their primary mission. The primary mission of Fusion Centers is to “receive, analyze, gather, produce, and disseminate a broad array of threat-related information and actionable intelligence to appropriate law enforcement and homeland security agencies” (DHS 2015).…

    • 155 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Emergency Managers can train the community in how to alert the proper authorities or implement a local alert system. A system of easily reporting suspicious activity (phone/internet) must be implemented on a local level that can easily initiate a nationwide suspicious activity alert based on key words. These key words such names, addresses, purchases should flag agencies involved in investigating these activities not just at the local level but the state and federal level as well. Information sharing amongst agencies quickly and efficiently is a key aspect in detecting possible terrorist attacks (Lynch, 2016). Detection is only one element of an Emergency Manager’s…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The use of the intelligence method is prominent with the AFP through collecting information and data to produce intelligence. The AFP also employs the use of both strategic and Tactical intelligence in their practices, theoretically being that strategic intelligence uses long-term initiatives, strategies on emerging problems and structures of serious organised crime while tactical intelligence focuses on short-term initiatives, looking closely at criminal groups and activities (Buckley 2013). A practical example is the Specialist Response group that provides tactical strategies through intelligence operational priorities for a diverse range of AFP operations and building missions (AFP 2016). A difference identified through analysing the AFPS initiatives compared to the academic intelligence methods is the AFP’s use of public relations through educating the public with critical matters and receiving information from the public to improve statistics and crime prevention techniques. This is initiated through the AFPs virtual global taskforce for cyber crime, focusing on informing the public on risks and preventative actions (AFP Corporate Plan 2015-2019).…

    • 1017 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    New Media Content Analysis

    • 1634 Words
    • 7 Pages

    This essay examines the way ‘new media’ has affected the relationship between the media consumers and producers and how the audience are becoming the creator of their own media content. Today people tend to rely on social media as their main source of information, and through multiple new media tools such as Facebook, Twitter, Instagram etc. they are not only able to produce but also distribute their content. The essay will discuss how easy access to information, sharing and collaboration has given the freedom for users to create their own media, or their own media interpretation which leads to problems such as ownership and copyrights. However it is unfair to dismiss that freedom to produce enables people to interact and correspond efficiently…

    • 1634 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Tuberculosis Essay

    • 2376 Words
    • 10 Pages

    Ability to make data readily accessible to the public for further research and analysis is importance in determining the trustworthiness of a data source.…

    • 2376 Words
    • 10 Pages
    Superior Essays
  • Improved Essays

    Collective Learning

    • 986 Words
    • 4 Pages

    Collective Learning Technology has brought huge influences on everyone’s lives. The Duke University had brought iPod as an academic device and educational experiment to all the first-year class students. The iPod inverted the traditional role of technology, which has many new functions. Students not only can listen to music, but also use the iPod as an academic device to collaborate with others. This concept can be seen in Project Classroom Makeover, by Cathy Davidson.…

    • 986 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Beginning now and into the not exceptionally deterred, Big Blue has been exhibiting Watson 's examination and learning limits crosswise over different attempts, including social attestation and data security. Subjective security change, for example, Watson for Cybersecurity can change how data security masters guarantee against ambushes by helping them get ready boundless measures of information. IBM Security is right now amidst a year-long research extend working with eight schools to organize Watson to handle cybercrime. Watson needs to take in the "tongue of cybersecurity" to handle what a hazard is, the thing that it does, and what markers are connected. "For the most part we learn by representations," says Nasir Memon, educator of programming building and managing at NYU Tandon School of Engineering.…

    • 1008 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cyber-attacks. With a large amount of hacker groups out there, there needs be just as many hackers that do good rather than bad. So this what I want to do. I want to be the person to help prevent these attacks, or even stop them. Cyber Security experts as basically people that watch data logs, set up security and…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Great Essays

    Introduction In spite of the nebulousness inherent in determining and measuring expertise, crowdsourcing systems in research and practice that seek to acquire distributed knowledge (e.g. citizen science) indicate a preference for expert contributors. To ensure information quality (IQ), consumers – users of data acquired from such crowdsourcing projects – implement gatekeeping strategies that vary in degree of subtleness and intentionality. These gatekeeping strategies stem from the underlying premise of a positive correlation between IQ and contributor’s level of expertise in a given domain. The assumption therefore, is that expertise leads to better contributions and the expert crowd is the better crowd.…

    • 1236 Words
    • 5 Pages
    Great Essays