Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2014 Oct 6;11(99):20140532.
doi: 10.1098/rsif.2014.0532.

Crowdsourcing contest dilemma

Affiliations

Crowdsourcing contest dilemma

Victor Naroditskiy et al. J R Soc Interface. .

Abstract

Crowdsourcing offers unprecedented potential for solving tasks efficiently by tapping into the skills of large groups of people. A salient feature of crowdsourcing--its openness of entry--makes it vulnerable to malicious behaviour. Such behaviour took place in a number of recent popular crowdsourcing competitions. We provide game-theoretic analysis of a fundamental trade-off between the potential for increased productivity and the possibility of being set back by malicious behaviour. Our results show that in crowdsourcing competitions malicious behaviour is the norm, not the anomaly--a result contrary to the conventional wisdom in the area. Counterintuitively, making the attacks more costly does not deter them but leads to a less desirable outcome. These findings have cautionary implications for the design of crowdsourcing competitions.

Keywords: Prisoner's Dilemma; crowdsourcing; game theory.

PubMed Disclaimer

Figures

Figure 1.
Figure 1.
Equilibrium strategies in the second-stage game when both players crowdsource and p1d < p2. (Online version in colour.)
Figure 2.
Figure 2.
Equilibrium strategies. (Online version in colour.)

References

    1. Howe J. 2006. The rise of crowdsourcing. Wired Mag. 14, 1–4.
    1. Hand E, et al. 2010. Citizen science: people power. Nature 466, 685 (10.1038/466685a) - DOI - PubMed
    1. Von Ahn L, Maurer B, McMillen C, Abraham D, Blum M. 2008. reCAPTCHA: human-based character recognition via web security measures. Science 321, 1465–1468. (10.1126/science.1160379) - DOI - PubMed
    1. Von Ahn L. 2006. Games with a purpose. Computer 39, 92–94. (10.1109/MC.2006.196) - DOI
    1. Horowitz D, Kamvar SD. 2010. The anatomy of a large-scale social search engine. In Proc. 19th ACM Int. Conf. on World Wide Web, pp. 431–440. New York, NY: ACM. (10.1145/1772690.1772735) - DOI

Publication types