Web-collaborative filtering: recommending music by crawling the Web
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Why Information Security is Hard-An Economic Perspective
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Applying collaborative filtering techniques to movie search for better ranking and browsing
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Communications of the ACM
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Financial Cryptography and Data Security
Bookmark hierarchies and collaborative recommendation
AAAI'06 proceedings of the 21st national conference on Artificial intelligence - Volume 2
Mitigating Inadvertent Insider Threats with Incentives
Financial Cryptography and Data Security
Show me the money: characterizing spam-advertised revenue
SEC'11 Proceedings of the 20th USENIX conference on Security
The decreasing marginal value of evaluation network size
ACM SIGCAS Computers and Society
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Peer production and crowdsourcing have been widely implemented to create various types of goods and services. Although successful examples such as Linux and Wikipedia have been established in other domains, experts have paid little attention to peer-produced systems in computer security beyond collaborative recommender and intrusion detection systems. In this paper we present a new approach for security system design targeting a set of non-technical, self-organized communities. We argue that unlike many current security implementations (which suffer from low rates of adoption), individuals would have greater incentives to participate in a security community characterized by peer production. A specific design framework for peer production and crowd-sourcing are introduced. One high-level security scenario (on mitigation of insider threats) is then provided as an example implementation. Defeating the insider threat was chosen as an example implementation because it has been framed as a strictly (and inherently) firm-produced good. We argue that use of peer production and crowd-sourcing will increase network security in the aggregate.