Abstract
This chapter discusses the lessons learned from computer security in the past decades and how it applies to human computation systems for solving unsolved problems. The distributed nature and inherent trust found in collaboration systems will raise particular challenges to the unique assets of problem solving systems. The chapter discusses the problem solving systems must address.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cooper S et al (2010) Predicting protein structures with a multiplayer online game. Nature 466(7307):756–760
Keller B (2011) Dealing with Assange and the WikiLeaks secrets. New York Times
McGonigal J (2011) Reality is broken: why games make us better and how they can change the world. Penguin Pr, New York
Rahwan I et al (2013) Global manhunt pushes the limits of social mobilization. Computer 64:68–75
Thomsen DJ (1995) The sidewinder challenge—results so far. Electron Cipher IEEE Secur Priv Newslett
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Thomsen, D. (2013). Applying Security Lessons Learned to Human Computation Solving Systems. In: Michelucci, P. (eds) Handbook of Human Computation. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8806-4_71
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8806-4_71
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8805-7
Online ISBN: 978-1-4614-8806-4
eBook Packages: Computer ScienceComputer Science (R0)