{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:32:50Z","timestamp":1776115970475,"version":"3.50.1"},"reference-count":107,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Supported Coop Work"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s10606-020-09374-0","type":"journal-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T10:03:26Z","timestamp":1580724206000},"page":"263-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Privacy in Crowdsourcing: a Review of the Threats and Challenges"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0838-7452","authenticated-orcid":false,"given":"Huichuan","family":"Xia","sequence":"first","affiliation":[]},{"given":"Brian","family":"McKernan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"9374_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, Alessandro (2004, May). Privacy in electronic commerce and the economics of immediate gratification. In EC 2004. Proceedings of the 5th ACM Conference on Electronic Commerce, New York, USA, 17\u201320 May 2004. New York: ACM Press, pp. 21\u201329.","DOI":"10.1145\/988772.988777"},{"issue":"6221","key":"9374_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, Alessandro; Laura Brandimarte; and George Loewenstein. (2015). Privacy and human behavior in the age of information. Science, vol. 347, no. 6221, pp. 509\u2013514.","journal-title":"Science"},{"key":"9374_CR3","unstructured":"Allen, Anita L. (1988). Uneasy access: Privacy for women in a free society. Rowman & Littlefield."},{"key":"9374_CR4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2637485","volume-title":"The rising of on-demand work, a case study research on a set of online platforms and apps","author":"A Aloisi","year":"2015","unstructured":"Aloisi, A. (2015, July). Commoditized workers. The rising of on-demand work, a case study research on a set of online platforms and apps. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssrn.2637485."},{"key":"9374_CR5","volume-title":"The environment and social behavior: Privacy, personal space, territory, and crowding","author":"I Altman","year":"1975","unstructured":"Altman, Irwin (1975). The environment and social behavior: Privacy, personal space, territory, and crowding. Monterey, California: Brooks\/Cole Publishing Company."},{"issue":"4","key":"9374_CR6","first-page":"479","volume":"2","author":"M Andrejevic","year":"2005","unstructured":"Andrejevic, Mark (2005). The work of watching one another: Lateral surveillance, risk, and governance. Surveillance & Society, vol. 2, no. 4, pp. 479\u2013497.","journal-title":"Surveillance & Society"},{"key":"9374_CR7","unstructured":"APEC Privacy Framework (2005). Asia Pacific Economic Cooperation Secretariat. Retrieved from https:\/\/www.apec.org\/Publications\/2005\/12\/APEC-Privacy-Framework"},{"key":"9374_CR8","doi-asserted-by":"crossref","unstructured":"Bakken, David E.; R Rarameswaran; Douglas M. Blough; Andy A. Franz; and Ty J. Palmer (2004). Data obfuscation: Anonymity and desensitization of usable data sets. IEEE Security & Privacy, vol. 2, no. 6, pp. 34\u201341.","DOI":"10.1109\/MSP.2004.97"},{"key":"9374_CR9","doi-asserted-by":"crossref","unstructured":"B\u00e9langer, France; and Robert E Crossler (2011). Privacy in the digital age: A review of information privacy research in information systems. MIS Quarterly, vol. 35, no. 4, pp. 1017\u20131042.","DOI":"10.2307\/41409971"},{"key":"9374_CR10","unstructured":"Bennett, James and Stan Lanning (2007). The Netflix Prize. In: KDD 2007. Proceedings of KDD cup and workshop, San Jose, California, USA, 12 August 2007."},{"key":"9374_CR11","doi-asserted-by":"crossref","unstructured":"Bergvall-K\u00e5reborn, Birgitta; and Debra Howcrof (2014). Amazon mechanical Turk and the commodification of labour. New Technology, Work and Employment, vol. 29, no. 3, pp. 213\u2013223.","DOI":"10.1111\/ntwe.12038"},{"key":"9374_CR12","unstructured":"Bigham, Jeffrey P; Chandrika Jayant; Hanjie Ji; Greg Little; Andrew Miller; Robert C Miller; Robin Miller; Aubrey Tatarowicz; Brandyn White; and Samuel White (2010). VizWiz: Nearly real-time answers to visual questions. In: UIST 2010. Proceedings of the 23nd annual ACM symposium on user Interface software and technology, New York City, NY, USA, 3\u20136 October 2010. New York: ACM Press, pp. 333\u2013342."},{"key":"9374_CR13","doi-asserted-by":"crossref","unstructured":"Brabham, Daren C. (2013). Crowdsourcing. Cambridge, Massachusetts: MIT Press.","DOI":"10.7551\/mitpress\/9693.001.0001"},{"key":"9374_CR14","unstructured":"Cavoukian, Ann; and Jeff Jonas (2012). Privacy by design in the age of big data. Information and Privacy Commissioner of Ontario, Canada."},{"key":"9374_CR15","doi-asserted-by":"crossref","unstructured":"Cavoukian, Ann; Scott Taylor; and Martin E Abrams (2010). Privacy by design: Essential for organizational accountability and strong business practices. Identity in the Information Society, vol. 3, no. 2, pp. 405\u2013413.","DOI":"10.1007\/s12394-010-0053-z"},{"key":"9374_CR16","unstructured":"Chang, Lennon Y. C.; and Andy K. H. Leung (2015). An Introduction to Cyber Crowdsourcing (Human Flesh Search) in the Greater China Region. In R.G. Smith, R.C.C Cheung, L.Y.C. Lau (eds.): Cybercrime Risks and Responses. Palgrave Macmillan\u2019s Studies in Cybercrime and Cybersecurity. London, UK: Palgrave Macmillan, pp. 240\u2013252."},{"key":"9374_CR17","doi-asserted-by":"crossref","unstructured":"Chao, Chian-Hsueng (2011). Reconceptualizing the mechanism of internet human flesh search: A review of the literature. In: ASONAM 2011. International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan, 25\u201327 July 2011. IEEE, pp. 650\u2013655.","DOI":"10.1109\/ASONAM.2011.98"},{"issue":"5","key":"9374_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2012.70","volume":"16","author":"G Chatzimilioudis","year":"2012","unstructured":"Chatzimilioudis, Georgios; Andreas Konstantinidis; Christos Laoudias; and Demetrios Zeinalipour-Yazti (2012). Crowdsourcing with smartphones. IEEE Internet Computing, vol. 16, no. 5, pp. 36\u201344.","journal-title":"IEEE Internet Computing"},{"key":"9374_CR19","doi-asserted-by":"crossref","unstructured":"Chon, Yohan; Nicholas D. Lane; Fan Li; Hojung Cha; and Feng Zhao (2012). Automatically characterizing places with opportunistic crowdsensing using smartphones. In: Ubicomp 2012. Proceedings of the 2012 ACM Conference on Ubiquitous Computing, Pittsburgh, Pennsylvania, 5\u20138 September 2012. New York: ACM Press, pp. 481\u2013490.","DOI":"10.1145\/2370216.2370288"},{"key":"9374_CR20","doi-asserted-by":"crossref","unstructured":"Christin, Delphine; Andreas Reinhardt; Salil S. Kanhere; and Matthias Hollick (2011). A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software, vol. 84, no. 11, pp. 1928\u20131946.","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"9374_CR21","doi-asserted-by":"crossref","unstructured":"Cranor, Lorrie Faith (2004). I didn\u2019t buy it for myself. In C.M. Karat, J.O. Blom, and J. Karat (eds.): Designing Personalized User Experiences in eCommerce. Springer Netherlands, pp. 57\u201373.","DOI":"10.1007\/1-4020-2148-8_5"},{"key":"9374_CR22","first-page":"273","volume":"10","author":"LF Cranor","year":"2012","unstructured":"Cranor, Lorrie Faith (2012). Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, vol. 10, pp. 273\u2013307.","journal-title":"Journal on Telecommunications and High Technology Law"},{"key":"9374_CR23","unstructured":"D\u2019Acquisto, Giuseppe; Josep Domingo-Ferrer; Panayiotis Kikiras; Vicen\u00e7 Torra; Yves-Alexandre de Montjoye; and Athena Bourka (2015) Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. ArXiv, abs\/1512.06000."},{"key":"9374_CR24","unstructured":"Davies, Harry (2015). Ted Cruz using firm that harvested data on millions of unwitting Facebook users. The\u00a0Guardian. Retrieved from:\u00a0https:\/\/www.theguardian.com\/us-news\/2015\/dec\/11\/senator-ted-cruz-president-campaign-facebook-user-data."},{"key":"9374_CR25","first-page":"471","volume":"37","author":"V De Stefano","year":"2015","unstructured":"De Stefano, Valerio (2015). The rise of the just-in-time workforce: On-demand work, crowdwork, and labor protection in the gig-economy. Comparative Labor Law & Policy Journal, vol. 37, pp. 471.","journal-title":"Comparative Labor Law & Policy Journal"},{"key":"9374_CR26","doi-asserted-by":"crossref","unstructured":"Diffie, Whitfield; and Martin E. Hellman (1979). Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, vol. 67, no. 3, pp. 397\u2013427.","DOI":"10.1109\/PROC.1979.11256"},{"issue":"1","key":"9374_CR27","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish, Paul (2004). What we talk about when we talk about context. Personal and ubiquitous computing, vol. 8, no. 1, pp. 19\u201330.","journal-title":"Personal and ubiquitous computing"},{"key":"9374_CR28","doi-asserted-by":"crossref","unstructured":"Durward, David; Ivo Blohm; and Jan Marco Leimeister (2016, July). Is there PAPA in crowd work? - A literature review on ethical dimensions in crowdsourcing. In: UIC 2016. International IEEE Conferences on Ubiquitous Intelligence & Computing, Toulouse, France, 31 Jan 2016. IEEE, pp. 823\u2013832.","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0131"},{"key":"9374_CR29","doi-asserted-by":"publisher","unstructured":"Dwork, Cynthia (2011). Differential privacy. In: Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (ICALP\u201906), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. Part II. Springer-Verlag, Berlin, Heidelberg, pp. 1\u201312. https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"issue":"1","key":"9374_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/libri-2014-0001","volume":"64","author":"S Ellis","year":"2014","unstructured":"Ellis, Sally (2014). A history of collaboration, a future in crowdsourcing: positive impacts of cooperation on British Librarianship. Libri: The International Journal of Libraries and Information Studies, vol. 64, no. 1, pp. 1\u201310.","journal-title":"Libri: The International Journal of Libraries and Information Studies"},{"key":"9374_CR31","doi-asserted-by":"crossref","unstructured":"Estell\u00e9s-Arolas, Enrique; and Fernando Gonz\u00e1lez-Ladr\u00f3n-De-Guevara (2012). Towards an integrated crowdsourcing definition. Journal of Information Science, vol. 38, no. 2, pp. 189\u2013200.","DOI":"10.1177\/0165551512437638"},{"key":"9374_CR32","doi-asserted-by":"crossref","unstructured":"Forte, Andrea; and Cliff Lampe (2013). Defining, understanding, and supporting open collaboration: Lessons from the literature. American Behavioral Scientist, vol. 57, no. 5, pp. 535\u2013547.","DOI":"10.1177\/0002764212469362"},{"key":"9374_CR33","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-1-4899-7637-6_19","volume-title":"Recommender Systems Handbook","author":"A Friedman","year":"2015","unstructured":"Friedman, Arik; Bart P. Knijnenburg; Kris Vanhecke; Luc Martens; and Shlomo Berkovsky (2015). Privacy aspects of recommender systems. In Recommender Systems Handbook Springer, Boston, MA, pp. 649\u2013688."},{"key":"9374_CR34","unstructured":"Geiger, David; Stefan Seedorf; Thimo Schulze; Robert C Nickerson; and Martin Schader (2011). Managing the crowd: Towards a aaxonomy of crowdsourcing processes. In AMCIS 2011. Proceedings of Americas Conference on Information Systems, Detroit, Michigan, USA, 4\u20137 August 2011, pp. 430\u2013441."},{"key":"9374_CR35","unstructured":"Geiger, David; Michael Rosemann; Erwin Fielt; and Martin Schader (2012). Crowdsourcing information systems-definition, typology, and design, In: ICIS 2012. Proceedings of International Conference on Information Systems, Orlando, Florida, USA, 16\u201319 December 2012."},{"key":"9374_CR36","unstructured":"Gentry, C.; and D. Boneh (2009). A fully homomorphic encryption scheme. Ph.D. Dissertation. Stanford University, Stanford, CA, USA. Advisor(s) Dan Boneh. AAI3382729."},{"key":"9374_CR37","doi-asserted-by":"crossref","unstructured":"Gibbs, Jennifer L.; Nicole B Ellison; and Chih-Hui Lai (2011). First comes love, then comes Google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research, vol. 38, no. 1, pp. 70\u2013100.","DOI":"10.1177\/0093650210377091"},{"key":"9374_CR38","unstructured":"G\u00fcrses, Seda; Carmela Troncoso; and Claudia Diaz (2011). Engineering privacy by design. Computers, Privacy & Data Protection, vol. 14, no. 3, pp. 25."},{"issue":"10","key":"9374_CR39","first-page":"377","volume":"1","author":"B Halder","year":"2014","unstructured":"Halder, Buddhadeb (2014). Evolution of crowdsourcing: potential data protection, privacy and security concerns under the new media age. Revista Democracia Digital e Governo Eletr\u00f4nico, vol. 1, no. 10, pp. 377\u2013393.","journal-title":"Revista Democracia Digital e Governo Eletr\u00f4nico"},{"key":"9374_CR40","unstructured":"Harris, Christopher G (2011, October). Dirty deeds done dirt cheap: A darker side to crowdsourcing. In: PASSAT 2011. IEEE Third International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA, 9\u201311 Oct. 2011. IEEE, pp. 1314\u20131317."},{"issue":"6","key":"9374_CR41","first-page":"1","volume":"14","author":"J Howe","year":"2006","unstructured":"Howe, Jeff (2006). The rise of crowdsourcing. Wired Magazine, vol. 14, no. 6, pp. 1\u20134.","journal-title":"Wired Magazine"},{"key":"9374_CR42","volume-title":"Crowdsourcing: how the power of the crowd is driving the future of business","author":"J Howe","year":"2008","unstructured":"Howe, Jeff (2008). Crowdsourcing: how the power of the crowd is driving the future of business. New York: Random House."},{"key":"9374_CR43","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2016.08.004","volume":"102","author":"Y Huang","year":"2017","unstructured":"Huang, Yun; Alain Shema; and Huichuan Xia (2017). A proposed genome of mobile and situated crowdsourcing and its design implications for encouraging contributions. International Journal of Human-Computer Studies (IJHCS), vol. 102, pp. 69\u201380.","journal-title":"International Journal of Human-Computer Studies (IJHCS)"},{"issue":"3","key":"9374_CR44","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.dss.2010.08.009","volume":"50","author":"SL Humpherys","year":"2011","unstructured":"Humpherys, Sean L; Kevin C. Moffitt; Mary B. Burns; Judee K. Burgoon; and William F. Felix (2011). Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems (DSS), vol. 50, no. 3, pp. 585\u2013594.","journal-title":"Decision Support Systems (DSS)"},{"key":"9374_CR45","doi-asserted-by":"crossref","unstructured":"Iachello, Giovanni and Gregory D. Abowd (2005). Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In: CHI 2005. Proceedings of the SIGCHI Conference on Human factors in Computing Systems, Portland, Oregon, USA, 2\u20137 April 2005. New York: ACM Press, pp. 91\u2013100.","DOI":"10.1145\/1054972.1054986"},{"key":"9374_CR46","doi-asserted-by":"crossref","unstructured":"Irani, Lilly C.; and M. Silberman (2013). Turkopticon: interrupting worker invisibility in amazon mechanical turk. In: CHI 2013. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 27 April \u2013 2 May 2013. New York: ACM Press, pp. 611\u2013620.","DOI":"10.1145\/2470654.2470742"},{"key":"9374_CR47","doi-asserted-by":"crossref","unstructured":"Joinson, Adam N; Ulf-Dietrich Reips; Tom Buchanan; and Carina B. Paine Schofield (2010). Privacy, trust, and self-disclosure online. Human\u2013Computer Interaction, vol. 25, no. 1, pp. 1\u201324.","DOI":"10.1080\/07370020903586662"},{"key":"9374_CR48","doi-asserted-by":"crossref","unstructured":"Kandappu, Thivya; Arik Friedman; Vijay Sivaraman; and Roksana Boreli (2014). Loki: a privacy-conscious platform for crowdsourced surveys. In: COMSNETS 2014. International Conference on Communication Systems and Networks, Bangalore, India, 6\u201310 Jan. 2014. IEEE, pp. 1\u20138.","DOI":"10.1109\/COMSNETS.2014.6734877"},{"key":"9374_CR49","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-08470-1_4","volume-title":"Privacy in a Digital, Networked World","author":"T Kandappu","year":"2015","unstructured":"Kandappu, Thivya; Arik Friedman; Vijay Sivaraman; and Roksana Boreli (2015). Privacy in Crowdsourced Platforms. In S. Zeadally and M. Badra (eds.): Privacy in a Digital, Networked World. New York: Springer, pp. 57\u201384."},{"key":"9374_CR50","doi-asserted-by":"crossref","unstructured":"Kittur, Aniket; Jeffrey V. Nickerson; Michael Bernstein; Elizabeth Gerber; Aaron Shaw; John Zimmerman; Matt Lease; and John Horton (2013). The future of crowd work. In: CSCW 2013. Proceedings of Computer-Supported Cooperative Work and Social Computing, San Antonio, Texas, USA, 23\u201327 February 2013. New York: ACM Press, pp. 1301\u20131318.","DOI":"10.1145\/2441776.2441923"},{"key":"9374_CR51","unstructured":"Kuek, Siou Chew; Cecilia Paradi-Guilford; Toks Fayomi; Saori Imaizumi; Panos Ipeirotis; Patricia Pina; and Manpreet Singh\u00a0(2015). The global opportunity in online outsourcing.\u00a0Washington, DC:\u00a0World Bank. (Report Number ACS14228). https:\/\/openknowledge.worldbank.org\/handle\/10986\/22284"},{"key":"9374_CR52","unstructured":"Lasecki, Walter S; Jaime Teevan; and Ece Kamar (2014). Information extraction and manipulation threats in crowdpowered systems. In: CSCW 2014. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, Baltimore, Maryland, USA, 15\u201319 February 2014. New York: ACM Press, pp. 248\u2013256."},{"key":"9374_CR53","doi-asserted-by":"crossref","unstructured":"Lasecki, Walter S; Mitchell Gordon; Winnie Leung; Ellen Lim; Jeffrey P. Bigham; and Steven P. Dow (2015). Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding. In: CHI 2015. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea, 18\u201323 April 2015. New York: ACM Press, pp. 1945\u20131954.","DOI":"10.1145\/2702123.2702605"},{"key":"9374_CR54","doi-asserted-by":"crossref","unstructured":"Laufer, Robert S.; and Maxine Wolfe (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, vol. 33, no. 3, pp. 22\u201342.","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"9374_CR55","volume-title":"Mechanical turk is not anonymous. SSRN Electronic Journal","author":"M Lease","year":"2013","unstructured":"Lease, Matthew; Jessica Hullman; Jeffrey P. Bigham; Michael S. Bernstein; Juho Kim; Walter Lasecki; Saeideh Bakhshi; Tanushree Mitra; and Robert C. Miller (2013). Mechanical turk is not anonymous. SSRN Electronic Journal. Retrieved from https:\/\/ssrn.com\/abstract=2228728"},{"key":"9374_CR56","unstructured":"Lee, Kyumin; Steve Webb; and Hancheng Ge (2014). The dark side of micro-task marketplaces: Characterizing Fiverr and automatically detecting crowdturfing in Fiverr and Twitter. In: ICWSM 2014. Proceedings of AAAI Conference on Weblogs and Social Media, Ann Arbor, Michigan, 1\u20134 June. AAAI Press."},{"key":"9374_CR57","unstructured":"Leon, Pedro Giovanni; Blas\u00e9 Ur; Yang Wang; Manya Sleeper; Rebecca Balebako; Richard Shay; Lujo Bauer; Mihai Christodorescu; and Lorrie Faith Cranor (2013). What matters to users? factors that affect users\u2019 willingness to share information with online advertisers. In: SOUPS 2013. Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, 24\u201326 July 2013. New York: ACM Press, pp. 7\u201326."},{"key":"9374_CR58","doi-asserted-by":"crossref","unstructured":"Malhotra, Naresh K.; Sung S. Kim; and James Agarwal (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, vol. 15, no. 4, pp. 336\u2013355.","DOI":"10.1287\/isre.1040.0032"},{"key":"9374_CR59","doi-asserted-by":"crossref","unstructured":"Margulis, Stephen T. (2003). On the status and contribution of Westin\u2019s and Altman\u2019s theories of privacy. Journal of Social Issues, vol. 59, no. 2, pp. 411\u2013429.","DOI":"10.1111\/1540-4560.00071"},{"key":"9374_CR60","doi-asserted-by":"crossref","unstructured":"Mayer, Roger C.; James H. Davis; and F. David Schoorman (1995). An integrative model of organizational trust. Academy of Management Review, vol. 20, no. 3, pp. 709\u2013734.","DOI":"10.5465\/amr.1995.9508080335"},{"key":"9374_CR61","unstructured":"Miller, Author Raphael (1971). The Assault on Privacy: Computers, Data Banks, and Dossiers, Ann Arbor: University of Michigan Press."},{"key":"9374_CR62","doi-asserted-by":"crossref","unstructured":"Nakatsu, Robbie T.; Elissa B. Grossman; and Charalambos L. Iacovou (2014). A taxonomy of crowdsourcing based on task complexity. Journal of Information Science (JIS), vol. 40, no. 6, pp. 823\u2013834.","DOI":"10.1177\/0165551514550140"},{"key":"9374_CR63","doi-asserted-by":"publisher","unstructured":"Narayanan, Arvind; and Vitaly Shmatikov (2008, May). Robust de-anonymization of large sparse datasets. In: IEEE 2008 Symposium on Security and Privacy, Washington, DC, USA, IEEE, pp. 111\u2013125. https:\/\/doi.org\/10.1109\/SP.2008.33","DOI":"10.1109\/SP.2008.33"},{"key":"9374_CR64","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, Helen (2004). Privacy as contextual integrity. Washington Law Review, vol. 79, pp. 119\u2013158.","journal-title":"Washington Law Review"},{"key":"9374_CR65","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, Helen (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, California: Stanford University Press."},{"issue":"4","key":"9374_CR66","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, Helen (2011). A contextual approach to privacy online. Daedalus, vol. 140, no. 4, pp. 32\u201348.","journal-title":"Daedalus"},{"issue":"16","key":"9374_CR67","first-page":"1","volume":"9","author":"X Pan","year":"2010","unstructured":"Pan, Xiaoyan (2010). Hunt by the Crowd: an exploratory qualitative analysis on cyber surveillance in China. Global Media Journal, vol. 9, no. 16, pp. 1\u201319.","journal-title":"Global Media Journal"},{"key":"9374_CR68","unstructured":"Parent, William A. (1983). Recent work on the concept of privacy. American Philosophical Quarterly, vol. 20, no. 4, pp. 341\u2013355."},{"issue":"4","key":"9374_CR69","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3758\/s13428-013-0434-y","volume":"46","author":"E Peer","year":"2014","unstructured":"Peer, Eyal; Joachim Vosgerau; and Alessandro Acquisti (2014). Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior Research Methods, vol. 46, no. 4, pp. 1023\u20131031.","journal-title":"Behavior Research Methods"},{"issue":"3","key":"9374_CR70","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1756-2589.2010.00052.x","volume":"2","author":"S Petronio","year":"2010","unstructured":"Petronio, Sandra (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, vol. 2, no. 3, pp. 175\u2013196.","journal-title":"Journal of Family Theory & Review"},{"key":"9374_CR71","unstructured":"Pfitzmann, Andreas; and Marit Hansen (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. Technical Report, TU Dresden. Retrieved from http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34."},{"key":"9374_CR72","doi-asserted-by":"crossref","unstructured":"Rachuri, Kiran K.; Mirco Musolesi; Cecilia Mascolo; Peter J. Rentfrow; Chris Longworth; and Andrius Aucinas (2010). EmotionSense: a mobile phone based adaptive platform for experimental social psychology research. In: Ubicomp 2010. Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, Denmark, 26\u201329 Sep. 2010. New York: ACM Press, pp. 281\u2013290.","DOI":"10.1145\/1864349.1864393"},{"key":"9374_CR73","doi-asserted-by":"crossref","unstructured":"Salehi, Niloufar; Lilly C. Irani; Michael S. Bernstein; Ali Alkhatib; Eva Ogbe; and Kristy Milland (2015). We are dynamo: Overcoming stalling and friction in collective action for crowd workers. In: CHI 2015. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea, 18\u201323 April 2015. New York: ACM Press, pp. 1621\u20131630.","DOI":"10.1145\/2702123.2702508"},{"key":"9374_CR74","unstructured":"Sannon, Shruti; and Dan Cosley (2019). Privacy, Power, and Invisible Labor on Amazon Mechanical Turk. In: CHI 2019. Proceedings of the 37th Annual ACM Conference on Human Factors in Computing Systems, Glasgow, Scotland UK, 4\u20139 May 2019. New York: ACM Press."},{"key":"9374_CR75","doi-asserted-by":"crossref","unstructured":"Sannon, Shruti; Natalya N. Bazarova; and Dan Cosley (2018). Privacy lies: understanding how, when, and why people lie to protect their privacy in multiple online contexts. In:\u00a0CHI 2018. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montr\u00e9al, Canada, 21-26 April 2018.\u00a0New York: ACM Press, pp. 52-65","DOI":"10.1145\/3173574.3173626"},{"key":"9374_CR76","doi-asserted-by":"crossref","unstructured":"Santos, Marcelo; and Faure Antoine (2018). Affordance is Power: Contradictions Between Communicational and Technical Dimensions of WhatsApp\u2019s End-to-End Encryption. Social Media\u2009+\u2009Society. vol. 4, no. 3, pp. 1\u201316.","DOI":"10.1177\/2056305118795876"},{"key":"9374_CR77","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical dimensions of privacy: An anthology","author":"FD Schoeman","year":"1984","unstructured":"Schoeman, Ferdinand David (1984). Philosophical dimensions of privacy: An anthology. Cambridge, UK: Cambridge University Press."},{"key":"9374_CR78","doi-asserted-by":"crossref","unstructured":"Schofield, Carina B. Paine; and Adam N. Joinson (2008). Privacy, trust, and disclosure online. In A. Barak (ed.): Psychological aspects of cyberspace: Theory, research, and applications, Cambridge, UK: Cambridge University Press, pp. 13\u201331.","DOI":"10.1017\/CBO9780511813740.003"},{"key":"9374_CR79","unstructured":"Schulze, Thimo; Stefan Seedorf; David Geiger, Nicolas Kaufmann, and Martin Schader (2011). Exploring task properties in crowdsourcing\u2013An empirical study on Mechanical Turk. In: ECIS 2011. Proceedings of the 19th European Conference on Information Systems, Helsinki, Finland, 9\u201311 January 2011."},{"key":"9374_CR80","doi-asserted-by":"crossref","unstructured":"Shen, Yao; Liusheng Huang; Lu Li; Xiaorong Lu; Shaowei Wang; and Wei Yang (2015). Towards preserving worker location privacy in spatial crowdsourcing. In Global Communications Conference (GLOBECOM), San Diego, California, 6\u201310 December 2015. IEEE, pp. 1\u20136.","DOI":"10.1109\/GLOCOM.2015.7416965"},{"key":"9374_CR81","unstructured":"Silberman, M. and Lilly C. Irani (2015). Operating an Employer Reputation System: Lessons from Turkopticon, 2008\u20132015. Comparative Labor Law & Policy Journal, vol. 37, pp. 505\u2013542."},{"key":"9374_CR82","doi-asserted-by":"crossref","unstructured":"Silberman, M.; Lilly C. Irani; and Joel Ross (2010). Ethics and tactics of professional crowdwork. XRDS: Crossroads, The ACM Magazine for Students, vol. 17, no. 2, pp. 39\u201343.","DOI":"10.1145\/1869086.1869100"},{"key":"9374_CR83","unstructured":"Simmel, Arnold. (1971). Privacy is not an isolated freedom. In J.R Pennock and J.W. Chapman (eds.): Privacy and Personality. New York, Routledge. pp. 71\u201387."},{"key":"9374_CR84","unstructured":"Singel, Ryan (2009). Netflix spilled your Brokeback Mountain secret, lawsuit claims. Wired. Retrieved from:\u00a0https:\/\/www.wired.com\/2009\/12\/netflix-privacy-lawsuit\/."},{"issue":"4","key":"9374_CR85","doi-asserted-by":"publisher","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith, H Jeff; Tamara Dinev; and Heng Xu (2011). Information privacy research: an interdisciplinary review. MIS quarterly, vol. 35, no. 4, pp. 989\u20131016.","journal-title":"MIS quarterly"},{"key":"9374_CR86","unstructured":"Solove, Daniel J. (2005). A taxonomy of privacy. University of Pennsylvania Law Review, vol. 154, no. pp. 477."},{"key":"9374_CR87","unstructured":"Solove, Daniel J. (2008). Understanding privacy. Cambridge, Massachusetts: Harvard University Press."},{"key":"9374_CR88","unstructured":"Solove, Daniel J. (2012). Introduction: Privacy self-management and the consent dilemma. Harvard Law Review, vol. 126, pp. 1880\u20131903."},{"issue":"7","key":"9374_CR89","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2209249.2209263","volume":"55","author":"S Spiekermann","year":"2012","unstructured":"Spiekermann, Sarah (2012). The challenges of privacy by design. Communications of the ACM, vol. 55, no. 7, pp. 38\u201340.","journal-title":"Communications of the ACM"},{"key":"9374_CR90","volume-title":"The wisdom of crowds","author":"J Surowiecki","year":"2005","unstructured":"Surowiecki, James (2005). The wisdom of crowds. New York: Anchor Books."},{"key":"9374_CR91","unstructured":"Tene, Omer; and Jules Polonetsky (2012). To track or do not track: advancing transparency and individual control in online behavioral advertising. Minnesota Journal of Law Science & Technology, vol. 13, pp. 281."},{"issue":"5","key":"9374_CR92","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1080\/1369118X.2013.808359","volume":"17","author":"D Trottier","year":"2014","unstructured":"Trottier, Daniel (2014). Crowdsourcing CCTV surveillance on the Internet. Information, Communication & Society, 17, 5, pp. 609\u2013626.","journal-title":"Information, Communication & Society"},{"key":"9374_CR93","doi-asserted-by":"crossref","unstructured":"Tsikerdekis, Michail; and Sherali Zeadally (2014). Online deception in social media. Communications of the ACM, vol.57, no. 9, pp. 72\u201380.","DOI":"10.1145\/2629612"},{"key":"9374_CR94","unstructured":"USACM (2006). USACM Policy Recommendations on Privacy. Technical Report. U.S. Public Policy Committee of the Association for Computing Machinery. Retrieved from: https:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/usacm\/privacy-and-security\/privacy-overview\/ftcprivacyresponsefinal.pdf"},{"key":"9374_CR95","doi-asserted-by":"crossref","unstructured":"Varshney, Lav R.; Aditya Vempaty; and Pramod K. Varshney (2014). Assuring privacy and reliability in crowdsourcing with coding. In: ITA 2014. Information Theory and Applications Workshop, 2014, San Diego, CA, USA, 9\u201314 Feb. 2014. IEEE, pp. 1\u20136.","DOI":"10.1109\/ITA.2014.6804213"},{"key":"9374_CR96","unstructured":"Wang, Yang; Gregory Norcie; Saranga Komanduri; Alessandro Acquisti; Pedro Giovanni Leon; and Lorrie Faith Cranor (2011). I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In: SOUPS 2011 Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, USA, 20\u201322 July 2011. ACM, pp. 10."},{"key":"9374_CR97","doi-asserted-by":"crossref","unstructured":"Wang, Tianyi; Gang Wang; Xing Li; Haitao Zheng; and Ben. Y. Zhao (2013a). Characterizing and detecting malicious crowdsourcing. ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 537\u2013538.","DOI":"10.1145\/2534169.2491719"},{"key":"9374_CR98","unstructured":"Wang, Yang; Yun Huang; and Claudia Louis (2013b). Respecting user privacy in mobile crowdsourcing. ASEScience, vol. 2, no. 2, pp. 39\u201350."},{"key":"9374_CR99","doi-asserted-by":"crossref","unstructured":"Wang, Yang; Huichuan Xia; and Yun Huang (2016a). Examining American and Chinese Internet users\u2019 contextual privacy preferences of behavioral advertising. In: CSCW 2016. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, San Francisco, California, USA, 27 February \u2013 2 March 2016. New York: ACM Press, pp. 539\u2013552.","DOI":"10.1145\/2818048.2819941"},{"key":"9374_CR100","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1515\/popets-2016-0022","volume":"3","author":"Y Wang","year":"2016","unstructured":"Wang, Yang; Huichuan Xia; Yaxing Yao; and Yun Huang (2016b). Flying eyes and hidden controllers: A qualitative study of people\u2019s privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies 2016, vol. 3, pp. 172\u2013190.","journal-title":"Proceedings on Privacy Enhancing Technologies 2016"},{"key":"9374_CR101","doi-asserted-by":"crossref","unstructured":"Wang, Yingjie; Zhipeng Cai; Guisheng Yin; Yang Gao; Xiangrong Tong; and Guanying Wu (2016c). An incentive mechanism with privacy protection in mobile crowdsourcing systems. Computer Networks, vol. 102, pp. 157\u2013171.","DOI":"10.1016\/j.comnet.2016.03.016"},{"key":"9374_CR102","doi-asserted-by":"crossref","unstructured":"Warren, Samuel D. and Louis D. Brandeis (1890). The right to privacy. Harvard law review, pp. 193\u2013220.","DOI":"10.2307\/1321160"},{"key":"9374_CR103","unstructured":"Weinstein, Wendy L. (1971). The private and the free: A conceptual inquiry. Privacy: Nomos XIII, pp. 624\u2013692."},{"key":"9374_CR104","unstructured":"Westin, Alan F. (1968). Privacy and freedom. Washington and Lee Law Review, vol. 25, no. 1, pp. 166."},{"key":"9374_CR105","doi-asserted-by":"crossref","unstructured":"Xia, Huichuan; Yang Wang; Yun Huang; and Shah Anuj (2017a). \u201cOur Privacy Needs To Be Protected At All Costs\u201d: Crowd Workers\u2019 Privacy Experiences on Mechanical Turk. In: CSCW 2017. Proceedings of ACM Human-Computer Interaction, vol. 1, no. 2.","DOI":"10.1145\/3134748"},{"key":"9374_CR106","unstructured":"Xia, Huichuan; Yun Huang; and Yang Wang (2017b). Victim privacy in crowdsourcing based public safety reporting: A case study of LiveSafe. In: SOUPS 2017 Proceedings of the 9th Symposium on Usable Privacy and Security the Inclusive Privacy Workshop."},{"key":"9374_CR107","doi-asserted-by":"crossref","unstructured":"Zook, Matthew; Mark Graham; Taylor Shelton; and Sean Gorman (2010). Volunteered geographic information and crowdsourcing disaster relief: a case study of the Haitian earthquake. World Medical & Health Policy, vol. 2, no. 2, pp. 7\u201333.","DOI":"10.2202\/1948-4682.1069"}],"container-title":["Computer Supported Cooperative Work (CSCW)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-020-09374-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10606-020-09374-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10606-020-09374-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T00:02:01Z","timestamp":1722384121000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10606-020-09374-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,3]]},"references-count":107,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["9374"],"URL":"https:\/\/doi.org\/10.1007\/s10606-020-09374-0","relation":{},"ISSN":["0925-9724","1573-7551"],"issn-type":[{"value":"0925-9724","type":"print"},{"value":"1573-7551","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,3]]},"assertion":[{"value":"3 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}