Figure 1 - uploaded by Ponnurangam Kumaraguru
Content may be subject to copyright.
3: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. The list of customers of the company along with with their phone numbers and email addresses was exposed.

3: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. The list of customers of the company along with with their phone numbers and email addresses was exposed.

Source publication
Thesis
Full-text available
Crowdsourcing is the practice of getting information or input for a task or project from a number of people by floating out the task at hand to a pool of people who are usually not full-time employees. Use of Crowdsourcing to get work done is on the rise due to the benefits that it offers. Trends and surveys show that the conventional workforce is...

Contexts in source publication

Context 1
... The records of the customer of a company 1 A dataset of 65,499 tasks pertaining to Software Development extracted from a leading Crowdsourcing Platform. The dataset cannot be shared due to data sharing policy Figure 1.1: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...
Context 2
... name, email, and phone numbers were exposed with an option to change them. Figure 1.2: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...
Context 3
... list of customers of the company along with with their phone numbers and email addresses was exposed. Figure 1.4: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...
Context 4
... The records of the customer of a company 1 A dataset of 65,499 tasks pertaining to Software Development extracted from a leading Crowdsourcing Platform. The dataset cannot be shared due to data sharing policy Figure 1.1: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...
Context 5
... name, email, and phone numbers were exposed with an option to change them. Figure 1.2: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...
Context 6
... list of customers of the company along with with their phone numbers and email addresses was exposed. Figure 1.4: Example of exposed details of a company accessed on a third party website using a vulnerability found in a task description. ...