Advertisement

Introduction to Security and Policy Section

  • Dan Thomsen
Chapter

Abstract

The rewards and rules of human collaboration systems shape the behavior of the human participants, often leading to behaviors the human computation system designers never envisioned. Most software designers make the mistake of assuming that people will follow the intent of the rules they set up in the program. But, as the rising wave of cyber-crime shows this people do what they can get away with. People will do anything they can to achieve rewards, and sometimes the reward means breaking the system for the joy of figuring out how to solve a puzzle.

Keywords

Security Mechanism Malicious User Core Assumption Password Authentication Reduce Development Time 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.SIFT, LLCMinneapolisUSA

Personalised recommendations