Home > Research > Publications & Outputs > Security design in human computation games

Links

Text available via DOI:

View graph of relations

Security design in human computation games

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date2014
Host publicationSecurity Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
EditorsBruce Christianson, James Malcolm
Place of PublicationBerlin
PublisherSpringer Verlag
Pages142-153
Number of pages12
ISBN (Electronic)9783662459218
ISBN (Print)9783662459201
<mark>Original language</mark>English
Event18th International Workshop Security Protocols - Cambridge, United Kingdom
Duration: 24/03/201026/03/2010

Conference

Conference18th International Workshop Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period24/03/1026/03/10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7061
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Workshop Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period24/03/1026/03/10

Abstract

We consider a binary labelling problem: for some machine learning applications, two types of distinct objects are required to be labeled respectively, before a classifier can be trained. We show that the famous ESP game and variants would not work well on this binary labelling problem. We discuss how to design a new human computation game to solve this problem. It turns out that interesting but subtle security issues emerge in the new game. We introduce novel gaming mechanisms, such as ‘guess disagreement’, which improve the game’s security, usability and productivity simultaneously.