Lately, crowdsourcing has become an accepted means of creating resources for tasks that require human intelligence. Information Retrieval and related fields frequently exploit it for system building and evaluation purposes. However, malicious workers often try to maximise their financial gains by producing generic answers rather than actually working on the task. Identifying these individuals is a challenging process into which both crowdsourcing providers and requesters invest significant amounts of time. In this work we aim to identify measures that we can take to make a crowdsourced task more resistant to fraudulent attempts.
,
Workshop on Crowdsourcing for Search and Data Mining
Human-Centered Data Analytics

Eickhoff, C., & de Vries, A. (2011). How Crowdsourcable is Your Task?. In Proceedings of WSDM Workshop on Crowdsourcing for Search and Data Mining 2011.