{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T11:34:46Z","timestamp":1774006486743,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:00:00Z","timestamp":1498348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020 research and innovation programme","award":["643937"],"award-info":[{"award-number":["643937"]}]},{"name":"European Union's Horizon 2020 research and innovation programme","award":["688095"],"award-info":[{"award-number":["688095"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,25]]},"DOI":"10.1145\/3091478.3091517","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T12:17:13Z","timestamp":1499689033000},"page":"273-277","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Web Science Challenges in Researching Bug Bounties"],"prefix":"10.1145","author":[{"given":"Huw","family":"Fryer","sequence":"first","affiliation":[{"name":"University of Southampton, Southampton, United Kingdom"}]},{"given":"Elena","family":"Simperl","sequence":"additional","affiliation":[{"name":"University of Southampton, Southampton, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Exploring Microtask Crowdsourcing as a Means of Fault Localization. arXiv preprint arXiv:1612.03015","author":"Adriano Christian Medeiros","year":"2016","unstructured":"Christian Medeiros Adriano and Andre van der Hoek . 2016. Exploring Microtask Crowdsourcing as a Means of Fault Localization. arXiv preprint arXiv:1612.03015 ( 2016 ). https:\/\/arxiv.org\/abs\/1612.03015 Christian Medeiros Adriano and Andre van der Hoek. 2016. Exploring Microtask Crowdsourcing as a Means of Fault Localization. arXiv preprint arXiv:1612.03015 (2016). https:\/\/arxiv.org\/abs\/1612.03015"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Conference on Security and Management (SAM). 1.","author":"Abdullah","unstructured":"Abdullah M. Algarni and Yashwant K. Malaiya. 2013. Most Successful Vulnerability Discoverers: Motivation and Methods . In Proceedings of the International Conference on Security and Management (SAM). 1. Abdullah M. Algarni and Yashwant K. Malaiya. 2013. Most Successful Vulnerability Discoverers: Motivation and Methods. In Proceedings of the International Conference on Security and Management (SAM). 1."},{"key":"e_1_3_2_1_3_1","volume-title":"The economics of information security and privacy","author":"Anderson Ross","unstructured":"Ross Anderson , Chris Barton , Rainer B\u00f6hme , Richard Clayton , Michel J. G. Van Eeten , Michael Levi , Tyler Moore , and Stefan Savage . 2013. Measuring the cost of cybercrime . In The economics of information security and privacy . Springer , 265--300. Ross Anderson, Chris Barton, Rainer B\u00f6hme, Richard Clayton, Michel J. G. Van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. 2013. Measuring the cost of cybercrime. In The economics of information security and privacy. Springer, 265--300."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791285"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_21"},{"key":"e_1_3_2_1_6_1","volume-title":"The State of Bug Bounty. (June","year":"2016","unstructured":"Bugcrowd. 2016. The State of Bug Bounty. (June 2016 ). Bugcrowd. 2016. The State of Bug Bounty. (June 2016)."},{"key":"e_1_3_2_1_7_1","unstructured":"Bugcrowd. 2017. Defensive Vulnerability Pricing Model. (2017). https:\/\/pages.bugcrowd.com\/whats-a-bug-worth  Bugcrowd. 2017. Defensive Vulnerability Pricing Model. (2017). https:\/\/pages.bugcrowd.com\/whats-a-bug-worth"},{"key":"e_1_3_2_1_8_1","volume-title":"Workshop on Open Source Innovation","author":"Burger-Helmchen Thierry","year":"2010","unstructured":"Thierry Burger-Helmchen and Julien P\u00e9nin . 2010 . The limits of crowdsourcing inventive activities: What do transaction cost theory and the evolutionary theories of the firm teach us . In Workshop on Open Source Innovation , Strasbourg, France. 1--26. Thierry Burger-Helmchen and Julien P\u00e9nin. 2010. The limits of crowdsourcing inventive activities: What do transaction cost theory and the evolutionary theories of the firm teach us. In Workshop on Open Source Innovation, Strasbourg, France. 1--26."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2555805"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36563-8_14"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the workshop on crowdsourcing for search and data mining (CSDM). 11--14","author":"Eickhoff Carsten","year":"2011","unstructured":"Carsten Eickhoff and Arjen de Vries . 2011 . How crowdsourcable is your task . In Proceedings of the workshop on crowdsourcing for search and data mining (CSDM). 11--14 . Carsten Eickhoff and Arjen de Vries. 2011. How crowdsourcable is your task. In Proceedings of the workshop on crowdsourcing for search and data mining (CSDM). 11--14."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512437638"},{"key":"e_1_3_2_1_13_1","volume-title":"Microsoft Says No to Paying Bug Bounties. (July","author":"Fisher Dennis","year":"2010","unstructured":"Dennis Fisher . 2010. Microsoft Says No to Paying Bug Bounties. (July 2010 ). https:\/\/threatpost.com\/microsoft-says-no-paying-bug-bounties-072210\/74249\/ Dennis Fisher. 2010. Microsoft Says No to Paying Bug Bounties. (July 2010). https:\/\/threatpost.com\/microsoft-says-no-paying-bug-bounties-072210\/74249\/"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"e_1_3_2_1_15_1","volume-title":"A manifesto for Web Science. Journal of Web Science","author":"Halford Susan","year":"2010","unstructured":"Susan Halford , Catherine Pope , and Leslie Carr . 2010. A manifesto for Web Science. Journal of Web Science ( 2010 ). Susan Halford, Catherine Pope, and Leslie Carr. 2010. A manifesto for Web Science. Journal of Web Science (2010)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2418812"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683473"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647349"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2013.6614737"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819103"},{"key":"e_1_3_2_1_22_1","volume-title":"Founder of China's largest 'ethical hacking' community arrested. (July","author":"Lin Gene","year":"2016","unstructured":"Gene Lin . 2016. Founder of China's largest 'ethical hacking' community arrested. (July 2016 ). https:\/\/www.hongkongfp.com\/2016\/07\/30\/founder-chinas-largest-ethical-hacking-community-arrested\/ Gene Lin. 2016. Founder of China's largest 'ethical hacking' community arrested. (July 2016). https:\/\/www.hongkongfp.com\/2016\/07\/30\/founder-chinas-largest-ethical-hacking-community-arrested\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"T. Maillart M. Zhao J. Grossklags and J. Chuang. 2016. Given enough eyeballs all bugs are shallow? Revisiting Eric Raymond with bug bounty markets. (2016).  T. Maillart M. Zhao J. Grossklags and J. Chuang. 2016. Given enough eyeballs all bugs are shallow? Revisiting Eric Raymond with bug bounty markets. (2016).","DOI":"10.1093\/cybsec\/tyx008"},{"key":"e_1_3_2_1_24_1","article-title":"A survey of the use of crowdsourcing in software engineering","author":"Mao Ke","year":"2016","unstructured":"Ke Mao , Licia Capra , Mark Harman , and Yue Jia . 2016 . A survey of the use of crowdsourcing in software engineering . Journal of Systems and Software ( Sept. 2016). Ke Mao, Licia Capra, Mark Harman, and Yue Jia. 2016. A survey of the use of crowdsourcing in software engineering. Journal of Systems and Software (Sept. 2016).","journal-title":"Journal of Systems and Software"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809422"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. USENIX Association, Washington DC, 273--288","author":"Finifter Matthew","year":"2013","unstructured":"Matthew Finifter , Devdatta Akhawe , and David Wagner . 2013 . An Empirical Study of Vulnerability Rewards Programs . In Proceedings of the 22nd USENIX Security Symposium. USENIX Association, Washington DC, 273--288 . Matthew Finifter, Devdatta Akhawe, and David Wagner. 2013. An Empirical Study of Vulnerability Rewards Programs. In Proceedings of the 22nd USENIX Security Symposium. USENIX Association, Washington DC, 273--288."},{"key":"e_1_3_2_1_27_1","volume-title":"In Sixth Workshop on the Economics of Information Security.","author":"Miller Charlie","year":"2007","unstructured":"Charlie Miller . 2007 . The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales . In In Sixth Workshop on the Economics of Information Security. Charlie Miller. 2007. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. In In Sixth Workshop on the Economics of Information Security."},{"key":"e_1_3_2_1_28_1","volume-title":"Third Workshop on the Economics of Information Security. 19--26","author":"Ozment Andy","year":"2004","unstructured":"Andy Ozment . 2004 . Bug auctions: Vulnerability markets reconsidered . In Third Workshop on the Economics of Information Security. 19--26 . Andy Ozment. 2004. Bug auctions: Vulnerability markets reconsidered. In Third Workshop on the Economics of Information Security. 19--26."},{"key":"e_1_3_2_1_29_1","unstructured":"Andy Ozment. 2005. The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In WEIS. Citeseer. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.479.7888&rep=rep1&type=pdf  Andy Ozment. 2005. The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. In WEIS. Citeseer. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.479.7888&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_30_1","volume-title":"ICIS 2008 Proceedings","author":"Ransbotham Sam","year":"2008","unstructured":"Sam Ransbotham , Sabyasachi Mitra , and Jon Ramsey . 2008 . Are markets for vulnerabilities effective? ICIS 2008 Proceedings (2008), 24. Sam Ransbotham, Sabyasachi Mitra, and Jon Ramsey. 2008. Are markets for vulnerabilities effective? ICIS 2008 Proceedings (2008), 24."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.17"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70463-4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30058-1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.18352\/lq.9948"},{"key":"e_1_3_2_1_36_1","volume-title":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--4.","author":"Su H. J.","unstructured":"H. J. Su and J. Y. Pan . 2016. Crowdsourcing platform for collaboration management in vulnerability verification . In 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--4. H. J. Su and J. Y. Pan. 2016. Crowdsourcing platform for collaboration management in vulnerability verification. In 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS). 1--4."},{"key":"e_1_3_2_1_37_1","volume-title":"Ruvolo","author":"Whitehill Jacob","year":"2009","unstructured":"Jacob Whitehill , Ting-fan Wu, Jacob Bergsma , Javier R. Movellan , and Paul L . Ruvolo . 2009 . Whose Vote Should Count More: Optimal Integration of Labels from Labelers of Unknown Expertise. In Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta (Eds.). Curran Associates, Inc ., 2035--2043. Jacob Whitehill, Ting-fan Wu, Jacob Bergsma, Javier R. Movellan, and Paul L. Ruvolo. 2009. Whose Vote Should Count More: Optimal Integration of Labels from Labelers of Unknown Expertise. In Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta (Eds.). Curran Associates, Inc., 2035--2043."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663906"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813704"},{"key":"e_1_3_2_1_40_1","unstructured":"Mingyi Zhao Aron Laszka Thomas Maillart and Jens Grossklags. 2016. Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs. (2016). http:\/\/aronlaszka.com\/papers\/zhao2016crowdsourced.pdf  Mingyi Zhao Aron Laszka Thomas Maillart and Jens Grossklags. 2016. Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs. (2016). http:\/\/aronlaszka.com\/papers\/zhao2016crowdsourced.pdf"}],"event":{"name":"WebSci '17: ACM Web Science Conference","location":"Troy New York USA","acronym":"WebSci '17","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 2017 ACM on Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3091478.3091517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:29Z","timestamp":1750217849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3091478.3091517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,25]]},"references-count":39,"alternative-id":["10.1145\/3091478.3091517","10.1145\/3091478"],"URL":"https:\/\/doi.org\/10.1145\/3091478.3091517","relation":{},"subject":[],"published":{"date-parts":[[2017,6,25]]},"assertion":[{"value":"2017-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}