Understanding Crowdturfing : The Different Ethical Logics Behind the Clandestine Industry of Deception
Rinta-Kahila, T., & Soliman, W. (2017). Understanding Crowdturfing : The Different Ethical Logics Behind the Clandestine Industry of Deception. In ECIS 2017 : Proceedings of the 25th European Conference on Information Systems, Guimarães, Portugal, June 5-10, 2017 (pp. 1934-1949). European Conference on Information Systems. http://aisel.aisnet.org/ecis2017_rp/124
Päivämäärä
2017Tekijänoikeudet
© the Authors, 2017.
Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represents a form of cyber-deception in which workers are paid to express a false digital impression. While such behavior may not be punishable under the jurisdiction of formal law, its consequences are destructive to the cohesion and trustworthiness of online information. The conceptual work at hand examines the current literature on the topic, and lays the foundation for a theoretical framework that explains crowdturfing behavior. We discuss crowdturfing through three ethical normative approaches: traditional philosophical ethics, business ethics, and codified rules. We apply these lenses to an illustrative example of an online platform orchestrating the trade of paid book reviews on Amazon. The study contributes to theory by explaining the ethical logic behind crowdturfing from the perspectives of the key actors involved in the business. We argue that while crowdturfing cannot stand a critical examination through the deontological, stakeholder, or social contract perspectives, leaning on the teleological logic, the stockholder theory, or certain levels of codified rules can enable the actors involved in the business to operate with clean conscience. An increased understanding of the behavior can help both victim platforms and the Internet community at large to combat this hidden industry.
...
Julkaisija
European Conference on Information SystemsEmojulkaisun ISBN
978-989-20-7655-3Konferenssi
Kuuluu julkaisuun
ECIS 2017 : Proceedings of the 25th European Conference on Information Systems, Guimarães, Portugal, June 5-10, 2017Asiasanat
Alkuperäislähde
http://aisel.aisnet.org/ecis2017_rp/124Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/27211376
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
The Impact of Operational Technology Requirements in Maritime Industries
Simola, Jussi; Paavola, Jarkko; Satopää, Piia; Vanharanta, Jani (Academic Conferences International Ltd, 2024)The maritime ecosystem and industry require more efficient and coordinated cybersecurity governance. No common cybersecurity mechanism in the maritime sector may steer the whole supply chain management, for example, in the ... -
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
Terziyan, Vagan; Gryshko, Svitlana; Golovianko, Mariia (Elsevier, 2021)Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for ... -
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
Simola, Jussi; Savola, Reijo; Frantti, Tapio; Takala, Arttu; Lehkonen, Riku (Academic Conferences International, 2023)Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. ... -
Organizational Learning from Cybersecurity Performance : Effects on Cybersecurity Investment Decisions
Shaikh, Faheem Ahmed; Siponen, Mikko (Springer, 2023)IS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance ... -
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.