Exploitation in Human Computation Systems

This chapter addresses the sinister counterpoint to the much celebrated positive opportunities of human computation systems. We characterize exploits that target workers, requesters, and a system as a whole. We identify opportunities for malicious users to leverage human computation systems to exploit external populations. Finally, we sketch some preliminary directions towards mitigating these concerns.