{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:24:21Z","timestamp":1759962261267,"version":"3.41.0"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T00:00:00Z","timestamp":1512518400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1464347"],"award-info":[{"award-number":["CNS-1464347"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2017,12,6]]},"abstract":"<jats:p>Crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) are widely used by organizations, researchers, and individuals to outsource a broad range of tasks to crowd workers. Prior research has shown that crowdsourcing can pose privacy risks (e.g., de-anonymization) to crowd workers. However, little is known about the specific privacy issues crowd workers have experienced and how they perceive the state of privacy in crowdsourcing. In this paper, we present results from an online survey of 435 MTurk crowd workers from the US, India, and other countries and areas. Our respondents reported different types of privacy concerns (e.g., data aggregation, profiling, scams), experiences of privacy losses (e.g., phishing, malware, stalking, targeted ads), and privacy expectations on MTurk (e.g., screening tasks). Respondents from multiple countries and areas reported experiences with the same privacy issues, suggesting that these problems may be endemic to the whole MTurk platform. We discuss challenges, high-level principles and concrete suggestions in protecting crowd workers'; privacy on MTurk and in crowdsourcing more broadly.<\/jats:p>","DOI":"10.1145\/3134748","type":"journal-article","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T21:23:15Z","timestamp":1512595395000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["\"Our Privacy Needs to be Protected at All Costs\""],"prefix":"10.1145","volume":"1","author":[{"given":"Huichuan","family":"Xia","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse , NY, USA"}]},{"given":"Yun","family":"Huang","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Anuj","family":"Shah","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988777"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2637485"},{"key":"e_1_2_1_3_1","unstructured":"Amazon. 2017. Amazon Mechanical Turk's General Policies. (2017). https:\/\/www.mturk.com\/mturk\/help?helpPage= policies  Amazon. 2017. Amazon Mechanical Turk's General Policies. (2017). https:\/\/www.mturk.com\/mturk\/help?helpPage= policies"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/ntwe.12038"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998305"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540032"},{"volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis Richard E.","key":"e_1_2_1_7_1"},{"volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","year":"2006","author":"Braun Virginia","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.70"},{"volume-title":"Shaping the Future of ICT Research. Methods and Approaches","author":"Crowston Kevin","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741685"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"David Durward Ivo Blohm and Jan Marco Leimeister. 2016. Is There PAPA in Crowd Work?-A Literature Review on Ethical Dimensions in Crowdsourcing. (2016).  David Durward Ivo Blohm and Jan Marco Leimeister. 2016. Is There PAPA in Crowd Work?-A Literature Review on Ethical Dimensions in Crowdsourcing. (2016).","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0131"},{"key":"e_1_2_1_14_1","article-title":"Working the crowd: employment and labor law in the crowdsourcing industry","volume":"32","author":"Felstiner Alek","year":"2011","journal-title":"Berkeley Journal of Employment Labor Law"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"volume-title":"Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress. Federal Trade Commission.","year":"2000","author":"FTC.","key":"e_1_2_1_16_1"},{"volume-title":"Evolution of crowdsourcing: potential data protection, privacy and security concerns under the new media age. Revista Democracia Digital e Governo Eletr\u00f4nico 1, 10","year":"2014","author":"Halder Buddhadeb","key":"e_1_2_1_17_1"},{"volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom). IEEE, 1314--1317","year":"2011","author":"Harris Christopher G.","key":"e_1_2_1_18_1"},{"volume-title":"Ted Cruz using firm that harvested data on millions of unwitting Facebook users. Guardian","year":"2015","author":"Harry Davies","key":"e_1_2_1_19_1"},{"volume-title":"Research in the crowdsourcing age, a case study","year":"2016","author":"Hitlin Paul","key":"e_1_2_1_20_1"},{"volume-title":"The rise of crowdsourcing. Wired magazine 14, 6","year":"2006","author":"Howe Jeff","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470743"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054986"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869086.1869094"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470742"},{"volume-title":"Proceedings of the International Federation of Information Processing (IFIP), International Workshop on Information Systems Security Research. 88--104","year":"2009","author":"Johnston Allen C.","key":"e_1_2_1_26_1"},{"volume-title":"Privacy in a Digital, Networked World","author":"Kandappu Thivya","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2014.6734877"},{"volume-title":"Kiesler","year":"2014","author":"Kang Ruogu","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_13"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_21"},{"key":"e_1_2_1_33_1","first-page":"411","article-title":"Reliability in content analysis: Some common misconceptions","volume":"30","author":"Kripendorff K.","year":"2004","journal-title":"Human Communications Research"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741336"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702605"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531733"},{"volume-title":"Proc. the AAMAS Workshop on Human-Agent Interaction Design and Models.","year":"2015","author":"Lasecki Walter S.","key":"e_1_2_1_37_1"},{"volume-title":"Miller","year":"2013","author":"Lease Matthew","key":"e_1_2_1_38_1"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270406"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581262"},{"key":"e_1_2_1_41_1","unstructured":"Steven Marsh Ian Brown and Fayaz Khaki. 2009. Privacy Engineering Whitepaper: A Report from a Special Interest Group of the Cyber Security KTN. (2009). https:\/\/ssrn.com\/abstract=1763248  Steven Marsh Ian Brown and Fayaz Khaki. 2009. Privacy Engineering Whitepaper: A Report from a Special Interest Group of the Cyber Security KTN. (2009). https:\/\/ssrn.com\/abstract=1763248"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531663"},{"key":"e_1_2_1_43_1","unstructured":"Bran Nicol. 2006. Stalking. Reaktion Books.  Bran Nicol. 2006. Stalking. Reaktion Books."},{"key":"e_1_2_1_44_1","unstructured":"OECD. 1980. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. OECD.  OECD. 1980. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. OECD."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40498-6_33"},{"volume-title":"Screening participants from previous studies on Amazon Mechanical Turk and Qualtrics. Unpublished Manuscript","year":"2012","author":"Peer Eyal","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702174"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753873"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869086.1869100"},{"key":"e_1_2_1_50_1","first-page":"4","article-title":"Information Privacy Research","volume":"35","author":"Smith H. Jeff","year":"2011","journal-title":"An Interdisciplinary Review. MIS Quarterly"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145275"},{"key":"e_1_2_1_56_1","first-page":"39","article-title":"Respecting user privacy in mobile crowdsourcing","volume":"2","author":"Wang Yang","year":"2013","journal-title":"ASEScience"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Yang Wang and Alfred Kobsa. 2009. Privacy-Enhancing Technologies. In Social and Organizational Liabilities in Information Security Manish Gupta and Raj Sharman (Eds.). IGI Global 203--227.  Yang Wang and Alfred Kobsa. 2009. Privacy-Enhancing Technologies. In Social and Organizational Liabilities in Information Security Manish Gupta and Raj Sharman (Eds.). IGI Global 203--227.","DOI":"10.4018\/978-1-60566-132-2.ch013"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9114-8"},{"volume-title":"Brandeis","year":"1890","author":"Warren Samuel D.","key":"e_1_2_1_59_1"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883036"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134748","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:24Z","timestamp":1750212684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134748"}},"subtitle":["Crowd Workers' Privacy Experiences on Amazon Mechanical Turk"],"short-title":[],"issued":{"date-parts":[[2017,12,6]]},"references-count":59,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2017,12,6]]}},"alternative-id":["10.1145\/3134748"],"URL":"https:\/\/doi.org\/10.1145\/3134748","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2017,12,6]]},"assertion":[{"value":"2017-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}