Embracing Social Computing: Can it Reduce Security Risks?