Browse Definitions :
Reference

Podcast: Understanding crowdsourcing



powered by ODEO

Crowdsourcing is the act of taking a function traditionally performed by an employee and outsourcing it to an undefined, generally large group of people using information technology. Crowdsourcing relies on a combination of distributed networks, inexpensive digital tools of production and people who create content, rate other people's work or solve problems in their spare time. To learn more about this buzzword, WhatIs.com's Alex Howard went right to the source and interviewed Jeff Howe, the writer who coined the term (in concert with editor Mark Robinson) and published this article exploring the crowdsourcing phenomenon in Wired Magazine .

When you listen to the podcast, you'll learn the answers to the following questions:

  • Where does the term "crowdsourcing" come from?
  • How does crowdsourcing work?
  • What are some real-life case studies of the phenomenon? How is Amazon's Mechanical Turk is an excellent example.of crowdsourcing?
  • What are the five new rules for this new labor pool?
  • How is crowdsourcing affecting the stock photo industry, corporate R&D, newspapers and advertising?
  • How is Second Life a pure example of crowdsourcing?
  • Where doesn't crowdsourcing work? Are fair labor concerns and protection of intellectual property at issue?


Use the Flash player above or click on the MP3 link below to listen on your PC or download to your favorite portable media player. After you listen, visit Jeff's crowdsourcing blog for updates on where and how crowdsourcing is being used, including more information about AssignmentZero .

Download the MP3 | Help with Listening | Subscribe | Contact Us | What is RSS ? | What is podcasting ?

This was last updated in April 2007

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential ...

  • incident response

    Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also ...

  • Federal Information Security Management Act (FISMA)

    The Federal Information Security Management Act (FISMA) is United States legislation that defines a framework of guidelines and ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close