Privacy in Crowdsourcing: a Review of the Threats and Challenges

Abstract

Crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) are popular and widely used in both academic and non-academic realms, but privacy threats and challenges in crowdsourcing have not been extensively reviewed. To help push the field forward in important new directions, this paper first reviews the privacy threats in different types of crowdsourcing based on Solove’s taxonomy of privacy and Brabham’s typology of crowdsourcing. Then, the paper explores the privacy challenges associated with the characteristics of crowdsourcing task, platform, requesters, and crowd workers. These privacy challenges are discussed and categorized into both theoretical and practical challenges. Based on the review and discussion, this paper proposes a set of strategies to better understand and address many of the privacy threats and challenges in crowdsourcing. Finally, the paper concludes by suggesting research implications for the future work.

This is a preview of subscription content, access via your institution.

References

  1. Acquisti, Alessandro (2004, May). Privacy in electronic commerce and the economics of immediate gratification. In EC 2004. Proceedings of the 5th ACM Conference on Electronic Commerce, New York, USA, 17–20 May 2004. New York: ACM Press, pp. 21–29.

  2. Acquisti, Alessandro; Laura Brandimarte; and George Loewenstein. (2015). Privacy and human behavior in the age of information. Science, vol. 347, no. 6221, pp. 509–514.

    Article  Google Scholar 

  3. Allen, Anita L. (1988). Uneasy access: Privacy for women in a free society. Rowman & Littlefield.

  4. Aloisi, A. (2015, July). Commoditized workers. The rising of on-demand work, a case study research on a set of online platforms and apps. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2637485.

    Google Scholar 

  5. Altman, Irwin (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, California: Brooks/Cole Publishing Company.

    Google Scholar 

  6. Andrejevic, Mark (2005). The work of watching one another: Lateral surveillance, risk, and governance. Surveillance & Society, vol. 2, no. 4, pp. 479–497.

    Google Scholar 

  7. APEC Privacy Framework (2005). Asia Pacific Economic Cooperation Secretariat. Retrieved from https://www.apec.org/Publications/2005/12/APEC-Privacy-Framework

  8. Bakken, David E.; R Rarameswaran; Douglas M. Blough; Andy A. Franz; and Ty J. Palmer (2004). Data obfuscation: Anonymity and desensitization of usable data sets. IEEE Security & Privacy, vol. 2, no. 6, pp. 34–41.

  9. Bélanger, France; and Robert E Crossler (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, vol. 35, no. 4, pp. 1017–1042.

  10. Bennett, James and Stan Lanning (2007). The Netflix Prize. In: KDD 2007. Proceedings of KDD cup and workshop, San Jose, California, USA, 12 August 2007.

  11. Bergvall-Kåreborn, Birgitta; and Debra Howcrof (2014). Amazon mechanical Turk and the commodification of labour. New Technology, Work and Employment, vol. 29, no. 3, pp. 213–223.

  12. Bigham, Jeffrey P; Chandrika Jayant; Hanjie Ji; Greg Little; Andrew Miller; Robert C Miller; Robin Miller; Aubrey Tatarowicz; Brandyn White; and Samuel White (2010). VizWiz: Nearly real-time answers to visual questions. In: UIST 2010. Proceedings of the 23nd annual ACM symposium on user Interface software and technology, New York City, NY, USA, 3–6 October 2010. New York: ACM Press, pp. 333–342.

  13. Brabham, Daren C. (2013). Crowdsourcing. Cambridge, Massachusetts: MIT Press.

  14. Cavoukian, Ann; and Jeff Jonas (2012). Privacy by design in the age of big data. Information and Privacy Commissioner of Ontario, Canada.

  15. Cavoukian, Ann; Scott Taylor; and Martin E Abrams (2010). Privacy by design: Essential for organizational accountability and strong business practices. Identity in the Information Society, vol. 3, no. 2, pp. 405–413.

  16. Chang, Lennon Y. C.; and Andy K. H. Leung (2015). An Introduction to Cyber Crowdsourcing (Human Flesh Search) in the Greater China Region. In R.G. Smith, R.C.C Cheung, L.Y.C. Lau (eds.): Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. London, UK: Palgrave Macmillan, pp. 240–252.

  17. Chao, Chian-Hsueng (2011). Reconceptualizing the mechanism of internet human flesh search: A review of the literature. In: ASONAM 2011. International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan, 2527 July 2011. IEEE, pp. 650–655.

  18. Chatzimilioudis, Georgios; Andreas Konstantinidis; Christos Laoudias; and Demetrios Zeinalipour-Yazti (2012). Crowdsourcing with smartphones. IEEE Internet Computing, vol. 16, no. 5, pp. 36–44.

    Article  Google Scholar 

  19. Chon, Yohan; Nicholas D. Lane; Fan Li; Hojung Cha; and Feng Zhao (2012). Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Ubicomp 2012. Proceedings of the 2012 ACM Conference on Ubiquitous Computing, Pittsburgh, Pennsylvania, 5–8 September 2012. New York: ACM Press, pp. 481–490.

  20. Christin, Delphine; Andreas Reinhardt; Salil S. Kanhere; and Matthias Hollick (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, vol. 84, no. 11, pp. 1928–1946.

  21. Cranor, Lorrie Faith (2004). I didn’t buy it for myself. In C.M. Karat, J.O. Blom, and J. Karat (eds.): Designing Personalized User Experiences in eCommerce. Springer Netherlands, pp. 57–73.

  22. Cranor, Lorrie Faith (2012). Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, vol. 10, pp. 273–307.

    Google Scholar 

  23. D’Acquisto, Giuseppe; Josep Domingo-Ferrer; Panayiotis Kikiras; Vicenç Torra; Yves-Alexandre de Montjoye; and Athena Bourka (2015) Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. ArXiv, abs/1512.06000.

  24. Davies, Harry (2015). Ted Cruz using firm that harvested data on millions of unwitting Facebook users. The Guardian. Retrieved from: https://www.theguardian.com/us-news/2015/dec/11/senator-ted-cruz-president-campaign-facebook-user-data.

  25. De Stefano, Valerio (2015). The rise of the just-in-time workforce: On-demand work, crowdwork, and labor protection in the gig-economy. Comparative Labor Law & Policy Journal, vol. 37, pp. 471.

    Google Scholar 

  26. Diffie, Whitfield; and Martin E. Hellman (1979). Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, vol. 67, no. 3, pp. 397–427.

  27. Dourish, Paul (2004). What we talk about when we talk about context. Personal and ubiquitous computing, vol. 8, no. 1, pp. 19–30.

    Article  Google Scholar 

  28. Durward, David; Ivo Blohm; and Jan Marco Leimeister (2016, July). Is there PAPA in crowd work? - A literature review on ethical dimensions in crowdsourcing. In: UIC 2016. International IEEE Conferences on Ubiquitous Intelligence & Computing, Toulouse, France, 31 Jan 2016. IEEE, pp. 823–832.

  29. Dwork, Cynthia (2011). Differential privacy. In: Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (ICALP’06), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg, pp. 1–12. https://doi.org/10.1007/11787006_1

  30. Ellis, Sally (2014). A history of collaboration, a future in crowdsourcing: positive impacts of cooperation on British Librarianship. Libri: The International Journal of Libraries and Information Studies, vol. 64, no. 1, pp. 1–10.

    MathSciNet  Article  Google Scholar 

  31. Estellés-Arolas, Enrique; and Fernando González-Ladrón-De-Guevara (2012). Towards an integrated crowdsourcing definition. Journal of Information Science, vol. 38, no. 2, pp. 189–200.

  32. Forte, Andrea; and Cliff Lampe (2013). Defining, understanding, and supporting open collaboration: Lessons from the literature. American Behavioral Scientist, vol. 57, no. 5, pp. 535–547.

  33. Friedman, Arik; Bart P. Knijnenburg; Kris Vanhecke; Luc Martens; and Shlomo Berkovsky (2015). Privacy aspects of recommender systems. In Recommender Systems Handbook Springer, Boston, MA, pp. 649–688.

    Google Scholar 

  34. Geiger, David; Stefan Seedorf; Thimo Schulze; Robert C Nickerson; and Martin Schader (2011). Managing the crowd: Towards a aaxonomy of crowdsourcing processes. In AMCIS 2011. Proceedings of Americas Conference on Information Systems, Detroit, Michigan, USA, 4–7 August 2011, pp. 430–441.

  35. Geiger, David; Michael Rosemann; Erwin Fielt; and Martin Schader (2012). Crowdsourcing information systems-definition, typology, and design, In: ICIS 2012. Proceedings of International Conference on Information Systems, Orlando, Florida, USA, 16–19 December 2012.

  36. Gentry, C.; and D. Boneh (2009). A fully homomorphic encryption scheme. Ph.D. Dissertation. Stanford University, Stanford, CA, USA. Advisor(s) Dan Boneh. AAI3382729.

  37. Gibbs, Jennifer L.; Nicole B Ellison; and Chih-Hui Lai (2011). First comes love, then comes Google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research, vol. 38, no. 1, pp. 70–100.

  38. Gürses, Seda; Carmela Troncoso; and Claudia Diaz (2011). Engineering privacy by design. Computers, Privacy & Data Protection, vol. 14, no. 3, pp. 25.

  39. Halder, Buddhadeb (2014). Evolution of crowdsourcing: potential data protection, privacy and security concerns under the new media age. Revista Democracia Digital e Governo Eletrônico, vol. 1, no. 10, pp. 377–393.

    Google Scholar 

  40. Harris, Christopher G (2011, October). Dirty deeds done dirt cheap: A darker side to crowdsourcing. In: PASSAT 2011. IEEE Third International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA, 9–11 Oct. 2011. IEEE, pp. 1314–1317.

  41. Howe, Jeff (2006). The rise of crowdsourcing. Wired Magazine, vol. 14, no. 6, pp. 1–4.

    Google Scholar 

  42. Howe, Jeff (2008). Crowdsourcing: how the power of the crowd is driving the future of business. New York: Random House.

    Google Scholar 

  43. Huang, Yun; Alain Shema; and Huichuan Xia (2017). A proposed genome of mobile and situated crowdsourcing and its design implications for encouraging contributions. International Journal of Human-Computer Studies (IJHCS), vol. 102, pp. 69–80.

    Article  Google Scholar 

  44. Humpherys, Sean L; Kevin C. Moffitt; Mary B. Burns; Judee K. Burgoon; and William F. Felix (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems (DSS), vol. 50, no. 3, pp. 585–594.

    Article  Google Scholar 

  45. Iachello, Giovanni and Gregory D. Abowd (2005). Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In: CHI 2005. Proceedings of the SIGCHI Conference on Human factors in Computing Systems, Portland, Oregon, USA, 2–7 April 2005. New York: ACM Press, pp. 91–100.

  46. Irani, Lilly C.; and M. Silberman (2013). Turkopticon: interrupting worker invisibility in amazon mechanical turk. In: CHI 2013. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 27 April – 2 May 2013. New York: ACM Press, pp. 611–620.

  47. Joinson, Adam N; Ulf-Dietrich Reips; Tom Buchanan; and Carina B. Paine Schofield (2010). Privacy, trust, and self-disclosure online. Human–Computer Interaction, vol. 25, no. 1, pp. 1–24.

  48. Kandappu, Thivya; Arik Friedman; Vijay Sivaraman; and Roksana Boreli (2014). Loki: a privacy-conscious platform for crowdsourced surveys. In: COMSNETS 2014. International Conference on Communication Systems and Networks, Bangalore, India, 610 Jan. 2014. IEEE, pp. 1–8.

  49. Kandappu, Thivya; Arik Friedman; Vijay Sivaraman; and Roksana Boreli (2015). Privacy in Crowdsourced Platforms. In S. Zeadally and M. Badra (eds.): Privacy in a Digital, Networked World. New York: Springer, pp. 57–84.

    Google Scholar 

  50. Kittur, Aniket; Jeffrey V. Nickerson; Michael Bernstein; Elizabeth Gerber; Aaron Shaw; John Zimmerman; Matt Lease; and John Horton (2013). The future of crowd work. In: CSCW 2013. Proceedings of Computer-Supported Cooperative Work and Social Computing, San Antonio, Texas, USA, 23–27 February 2013. New York: ACM Press, pp. 1301–1318.

  51. Kuek, Siou Chew; Cecilia Paradi-Guilford; Toks Fayomi; Saori Imaizumi; Panos Ipeirotis; Patricia Pina; and Manpreet Singh (2015). The global opportunity in online outsourcing. Washington, DC: World Bank. (Report Number ACS14228). https://openknowledge.worldbank.org/handle/10986/22284

  52. Lasecki, Walter S; Jaime Teevan; and Ece Kamar (2014). Information extraction and manipulation threats in crowdpowered systems. In: CSCW 2014. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, Baltimore, Maryland, USA, 15–19 February 2014. New York: ACM Press, pp. 248–256.

  53. Lasecki, Walter S; Mitchell Gordon; Winnie Leung; Ellen Lim; Jeffrey P. Bigham; and Steven P. Dow (2015). Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding. In: CHI 2015. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea, 18–23 April 2015. New York: ACM Press, pp. 1945–1954.

  54. Laufer, Robert S.; and Maxine Wolfe (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, vol. 33, no. 3, pp. 22–42.

  55. Lease, Matthew; Jessica Hullman; Jeffrey P. Bigham; Michael S. Bernstein; Juho Kim; Walter Lasecki; Saeideh Bakhshi; Tanushree Mitra; and Robert C. Miller (2013). Mechanical turk is not anonymous. SSRN Electronic Journal. Retrieved from https://ssrn.com/abstract=2228728

    Google Scholar 

  56. Lee, Kyumin; Steve Webb; and Hancheng Ge (2014). The dark side of micro-task marketplaces: Characterizing Fiverr and automatically detecting crowdturfing in Fiverr and Twitter. In: ICWSM 2014. Proceedings of AAAI Conference on Weblogs and Social Media, Ann Arbor, Michigan, 1–4 June. AAAI Press.

  57. Leon, Pedro Giovanni; Blasé Ur; Yang Wang; Manya Sleeper; Rebecca Balebako; Richard Shay; Lujo Bauer; Mihai Christodorescu; and Lorrie Faith Cranor (2013). What matters to users? factors that affect users’ willingness to share information with online advertisers. In: SOUPS 2013. Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, 24–26 July 2013. New York: ACM Press, pp. 7–26.

  58. Malhotra, Naresh K.; Sung S. Kim; and James Agarwal (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, vol. 15, no. 4, pp. 336–355.

  59. Margulis, Stephen T. (2003). On the status and contribution of Westin’s and Altman’s theories of privacy. Journal of Social Issues, vol. 59, no. 2, pp. 411–429.

  60. Mayer, Roger C.; James H. Davis; and F. David Schoorman (1995). An integrative model of organizational trust. Academy of Management Review, vol. 20, no. 3, pp. 709–734.

  61. Miller, Author Raphael (1971). The Assault on Privacy: Computers, Data Banks, and Dossiers, Ann Arbor: University of Michigan Press.

  62. Nakatsu, Robbie T.; Elissa B. Grossman; and Charalambos L. Iacovou (2014). A taxonomy of crowdsourcing based on task complexity. Journal of Information Science (JIS), vol. 40, no. 6, pp. 823–834.

  63. Narayanan, Arvind; and Vitaly Shmatikov (2008, May). Robust de-anonymization of large sparse datasets. In: IEEE 2008 Symposium on Security and Privacy, Washington, DC, USA, IEEE, pp. 111–125. https://doi.org/10.1109/SP.2008.33

  64. Nissenbaum, Helen (2004). Privacy as contextual integrity. Washington Law Review, vol. 79, pp. 119–158.

    Google Scholar 

  65. Nissenbaum, Helen (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, California: Stanford University Press.

    Google Scholar 

  66. Nissenbaum, Helen (2011). A contextual approach to privacy online. Daedalus, vol. 140, no. 4, pp. 32–48.

    Article  Google Scholar 

  67. Pan, Xiaoyan (2010). Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance in China. Global Media Journal, vol. 9, no. 16, pp. 1–19.

    Google Scholar 

  68. Parent, William A. (1983). Recent work on the concept of privacy. American Philosophical Quarterly, vol. 20, no. 4, pp. 341–355.

  69. Peer, Eyal; Joachim Vosgerau; and Alessandro Acquisti (2014). Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior Research Methods, vol. 46, no. 4, pp. 1023–1031.

    Article  Google Scholar 

  70. Petronio, Sandra (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, vol. 2, no. 3, pp. 175–196.

    Article  Google Scholar 

  71. Pfitzmann, Andreas; and Marit Hansen (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. Technical Report, TU Dresden. Retrieved from http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.

  72. Rachuri, Kiran K.; Mirco Musolesi; Cecilia Mascolo; Peter J. Rentfrow; Chris Longworth; and Andrius Aucinas (2010). EmotionSense: a mobile phone based adaptive platform for experimental social psychology research. In: Ubicomp 2010. Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, Denmark, 26–29 Sep. 2010. New York: ACM Press, pp. 281–290.

  73. Salehi, Niloufar; Lilly C. Irani; Michael S. Bernstein; Ali Alkhatib; Eva Ogbe; and Kristy Milland (2015). We are dynamo: Overcoming stalling and friction in collective action for crowd workers. In: CHI 2015. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea, 18–23 April 2015. New York: ACM Press, pp. 1621–1630.

  74. Sannon, Shruti; and Dan Cosley (2019). Privacy, Power, and Invisible Labor on Amazon Mechanical Turk. In: CHI 2019. Proceedings of the 37th Annual ACM Conference on Human Factors in Computing Systems, Glasgow, Scotland UK, 4–9 May 2019. New York: ACM Press.

  75. Sannon, Shruti; Natalya N. Bazarova; and Dan Cosley (2018). Privacy lies: understanding how, when, and why people lie to protect their privacy in multiple online contexts. In: CHI 2018. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montréal, Canada, 21-26 April 2018. New York: ACM Press, pp. 52-65

  76. Santos, Marcelo; and Faure Antoine (2018). Affordance is Power: Contradictions Between Communicational and Technical Dimensions of WhatsApp’s End-to-End Encryption. Social Media + Society. vol. 4, no. 3, pp. 1–16.

  77. Schoeman, Ferdinand David (1984). Philosophical dimensions of privacy: An anthology. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  78. Schofield, Carina B. Paine; and Adam N. Joinson (2008). Privacy, trust, and disclosure online. In A. Barak (ed.): Psychological aspects of cyberspace: Theory, research, and applications, Cambridge, UK: Cambridge University Press, pp. 13–31.

  79. Schulze, Thimo; Stefan Seedorf; David Geiger, Nicolas Kaufmann, and Martin Schader (2011). Exploring task properties in crowdsourcingAn empirical study on Mechanical Turk. In: ECIS 2011. Proceedings of the 19th European Conference on Information Systems, Helsinki, Finland, 9–11 January 2011.

  80. Shen, Yao; Liusheng Huang; Lu Li; Xiaorong Lu; Shaowei Wang; and Wei Yang (2015). Towards preserving worker location privacy in spatial crowdsourcing. In Global Communications Conference (GLOBECOM), San Diego, California, 6–10 December 2015. IEEE, pp. 1–6.

  81. Silberman, M. and Lilly C. Irani (2015). Operating an Employer Reputation System: Lessons from Turkopticon, 2008–2015. Comparative Labor Law & Policy Journal, vol. 37, pp. 505–542.

  82. Silberman, M.; Lilly C. Irani; and Joel Ross (2010). Ethics and tactics of professional crowdwork. XRDS: Crossroads, The ACM Magazine for Students, vol. 17, no. 2, pp. 39–43.

  83. Simmel, Arnold. (1971). Privacy is not an isolated freedom. In J.R Pennock and J.W. Chapman (eds.): Privacy and Personality. New York, Routledge. pp. 71–87.

  84. Singel, Ryan (2009). Netflix spilled your Brokeback Mountain secret, lawsuit claims. Wired. Retrieved from: https://www.wired.com/2009/12/netflix-privacy-lawsuit/.

  85. Smith, H Jeff; Tamara Dinev; and Heng Xu (2011). Information privacy research: an interdisciplinary review. MIS quarterly, vol. 35, no. 4, pp. 989–1016.

    Article  Google Scholar 

  86. Solove, Daniel J. (2005). A taxonomy of privacy. University of Pennsylvania Law Review, vol. 154, no. pp. 477.

  87. Solove, Daniel J. (2008). Understanding privacy. Cambridge, Massachusetts: Harvard University Press.

  88. Solove, Daniel J. (2012). Introduction: Privacy self-management and the consent dilemma. Harvard Law Review, vol. 126, pp. 1880–1903.

  89. Spiekermann, Sarah (2012). The challenges of privacy by design. Communications of the ACM, vol. 55, no. 7, pp. 38–40.

    Article  Google Scholar 

  90. Surowiecki, James (2005). The wisdom of crowds. New York: Anchor Books.

    Google Scholar 

  91. Tene, Omer; and Jules Polonetsky (2012). To track or do not track: advancing transparency and individual control in online behavioral advertising. Minnesota Journal of Law Science & Technology, vol. 13, pp. 281.

  92. Trottier, Daniel (2014). Crowdsourcing CCTV surveillance on the Internet. Information, Communication & Society, 17, 5, pp. 609–626.

    Article  Google Scholar 

  93. Tsikerdekis, Michail; and Sherali Zeadally (2014). Online deception in social media. Communications of the ACM, vol.57, no. 9, pp. 72–80.

  94. USACM (2006). USACM Policy Recommendations on Privacy. Technical Report. U.S. Public Policy Committee of the Association for Computing Machinery. Retrieved from: https://www.acm.org/binaries/content/assets/public-policy/usacm/privacy-and-security/privacy-overview/ftcprivacyresponsefinal.pdf

  95. Varshney, Lav R.; Aditya Vempaty; and Pramod K. Varshney (2014). Assuring privacy and reliability in crowdsourcing with coding. In: ITA 2014. Information Theory and Applications Workshop, 2014, San Diego, CA, USA, 9–14 Feb. 2014. IEEE, pp. 1–6.

  96. Wang, Yang; Gregory Norcie; Saranga Komanduri; Alessandro Acquisti; Pedro Giovanni Leon; and Lorrie Faith Cranor (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In: SOUPS 2011 Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, 20–22 July 2011. ACM, pp. 10.

  97. Wang, Tianyi; Gang Wang; Xing Li; Haitao Zheng; and Ben. Y. Zhao (2013a). Characterizing and detecting malicious crowdsourcing. ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 537–538.

  98. Wang, Yang; Yun Huang; and Claudia Louis (2013b). Respecting user privacy in mobile crowdsourcing. ASEScience, vol. 2, no. 2, pp. 39–50.

  99. Wang, Yang; Huichuan Xia; and Yun Huang (2016a). Examining American and Chinese Internet users’ contextual privacy preferences of behavioral advertising. In: CSCW 2016. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, San Francisco, California, USA, 27 February – 2 March 2016. New York: ACM Press, pp. 539–552.

  100. Wang, Yang; Huichuan Xia; Yaxing Yao; and Yun Huang (2016b). Flying eyes and hidden controllers: A qualitative study of people’s privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies 2016, vol. 3, pp. 172–190.

    Article  Google Scholar 

  101. Wang, Yingjie; Zhipeng Cai; Guisheng Yin; Yang Gao; Xiangrong Tong; and Guanying Wu (2016c). An incentive mechanism with privacy protection in mobile crowdsourcing systems. Computer Networks, vol. 102, pp. 157–171.

  102. Warren, Samuel D. and Louis D. Brandeis (1890). The right to privacy. Harvard law review, pp. 193–220.

  103. Weinstein, Wendy L. (1971). The private and the free: A conceptual inquiry. Privacy: Nomos XIII, pp. 624–692.

  104. Westin, Alan F. (1968). Privacy and freedom. Washington and Lee Law Review, vol. 25, no. 1, pp. 166.

  105. Xia, Huichuan; Yang Wang; Yun Huang; and Shah Anuj (2017a). “Our Privacy Needs To Be Protected At All Costs”: Crowd Workers’ Privacy Experiences on Mechanical Turk. In: CSCW 2017. Proceedings of ACM Human-Computer Interaction, vol. 1, no. 2.

  106. Xia, Huichuan; Yun Huang; and Yang Wang (2017b). Victim privacy in crowdsourcing based public safety reporting: A case study of LiveSafe. In: SOUPS 2017 Proceedings of the 9th Symposium on Usable Privacy and Security the Inclusive Privacy Workshop.

  107. Zook, Matthew; Mark Graham; Taylor Shelton; and Sean Gorman (2010). Volunteered geographic information and crowdsourcing disaster relief: a case study of the Haitian earthquake. World Medical & Health Policy, vol. 2, no. 2, pp. 7–33.

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Huichuan Xia.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Xia, H., McKernan, B. Privacy in Crowdsourcing: a Review of the Threats and Challenges. Comput Supported Coop Work 29, 263–301 (2020). https://doi.org/10.1007/s10606-020-09374-0

Download citation

Keywords

  • Crowdsourcing
  • Privacy threats
  • Privacy challenges
  • Privacy protection
  • Amazon Mechanical Turk (MTurk)