{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:42:55Z","timestamp":1776109375770,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290605.3300512","type":"proceedings-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T17:36:58Z","timestamp":1556559418000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Privacy, Power, and Invisible Labor on Amazon Mechanical Turk"],"prefix":"10.1145","author":[{"given":"Shruti","family":"Sannon","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Dan","family":"Cosley","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025974"},{"key":"e_1_3_2_1_2_1","volume-title":"Privacy by Design in Law, Policy and Practice. A white paper for regulators, decision-makers and policy-makers","author":"Cavoukian Ann","year":"2011","unstructured":"Ann Cavoukian . 2011. Privacy by Design in Law, Policy and Practice. A white paper for regulators, decision-makers and policy-makers ( 2011 ). Ann Cavoukian. 2011. Privacy by Design in Law, Policy and Practice. A white paper for regulators, decision-makers and policy-makers (2011)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Kathy Charmaz. 2001. Qualitative Interviewing and Grounded Theory Analysis. 675--694.  Kathy Charmaz. 2001. Qualitative Interviewing and Grounded Theory Analysis. 675--694.","DOI":"10.4135\/9781412973588.n39"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837889"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159661"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741685"},{"key":"e_1_3_2_1_8_1","first-page":"143","article-title":"Working the Crowd: Employment and Labor Law in the Crowdsourcing Industry","author":"Felstiner Alek","year":"2011","unstructured":"Alek Felstiner . 2011 . Working the Crowd: Employment and Labor Law in the Crowdsourcing Industry . Berkeley J. Emp. & Lab. L. 32 (2011), 143 . Alek Felstiner. 2011. Working the Crowd: Employment and Labor Law in the Crowdsourcing Industry. Berkeley J. Emp. & Lab. L. 32 (2011), 143.","journal-title":"Berkeley J. Emp. & Lab."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631819"},{"key":"e_1_3_2_1_10_1","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Theory","author":"Glaser Barney G","year":"1967","unstructured":"Barney G Glaser and Anselm L Strauss . 1967. The Discovery of Grounded Theory: Strategies for Qualitative Theory . New Brunswick : Aldine Transaction ( 1967 ). Barney G Glaser and Anselm L Strauss. 1967. The Discovery of Grounded Theory: Strategies for Qualitative Theory. New Brunswick: Aldine Transaction (1967)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819942"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174023"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470742"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2537148.2537150"},{"key":"e_1_3_2_1_15_1","volume-title":"Privacy Attitudes of Mechanical Turk Workers and the US Public. In Symposium on Usable Privacy and Security (SOUPS)","volume":"4","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy Attitudes of Mechanical Turk Workers and the US Public. In Symposium on Usable Privacy and Security (SOUPS) , Vol. 4 . 1. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the US Public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"More than Fun and Money: Worker Motivation in Crowdsourcing -- A Study on Mechanical Turk","volume":"11","author":"Kaufmann Nicolas","year":"2011","unstructured":"Nicolas Kaufmann , Thimo Schulze , and Daniel Veit . 2011 . More than Fun and Money: Worker Motivation in Crowdsourcing -- A Study on Mechanical Turk . In AMCIS , Vol. 11. 1 -- 11 . Nicolas Kaufmann, Thimo Schulze, and Daniel Veit. 2011. More than Fun and Money: Worker Motivation in Crowdsourcing -- A Study on Mechanical Turk. In AMCIS, Vol. 11. 1--11.","journal-title":"AMCIS"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702594"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531733"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Matthew Lease Jessica Hullman Jeffrey Bigham Michael Bernstein Juho Kim Walter Lasecki Saeideh Bakhshi Tanushree Mitra and Robert Miller. 2013. Mechanical Turk is not Anonymous. (2013).  Matthew Lease Jessica Hullman Jeffrey Bigham Michael Bernstein Juho Kim Walter Lasecki Saeideh Bakhshi Tanushree Mitra and Robert Miller. 2013. Mechanical Turk is not Anonymous. (2013).","DOI":"10.2139\/ssrn.2228728"},{"key":"e_1_3_2_1_21_1","unstructured":"J Lofland D Snow L Anderson and LH Lofland. 2006. Analyzing Social Settings: A Guide to Qualitative Observation and Analysis. Wadsworth\/Thomson Learning.  J Lofland D Snow L Anderson and LH Lofland. 2006. Analyzing Social Settings: A Guide to Qualitative Observation and Analysis. Wadsworth\/Thomson Learning."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531663"},{"key":"e_1_3_2_1_24_1","first-page":"9","article-title":"Understanding Privacy at the Margins -- Introduction","volume":"12","author":"Marwick Alice E","year":"2018","unstructured":"Alice E Marwick and danah boyd. 2018 . Understanding Privacy at the Margins -- Introduction . International Journal of Communication 12 (2018), 9 . Alice E Marwick and danah boyd. 2018. Understanding Privacy at the Margins -- Introduction. International Journal of Communication 12 (2018), 9.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858539"},{"key":"e_1_3_2_1_26_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as Contextual Integrity . Washington Law Review 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79 (2004), 119.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_27_1","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio Sandra","unstructured":"Sandra Petronio . 2012. Boundaries of Privacy: Dialectics of Disclosure . SUNY Press . Sandra Petronio. 2012. Boundaries of Privacy: Dialectics of Disclosure. SUNY Press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188511"},{"key":"e_1_3_2_1_30_1","volume-title":"Digital labor: The Internet as Playground and Factory","author":"Scholz Trebor","unstructured":"Trebor Scholz . 2012. Digital labor: The Internet as Playground and Factory . Routledge . Trebor Scholz. 2012. Digital labor: The Internet as Playground and Factory. Routledge."},{"key":"e_1_3_2_1_31_1","volume-title":"Gig work, online selling and home sharing","author":"Smith Aaron","year":"2016","unstructured":"Aaron Smith . 2016. Gig work, online selling and home sharing . Pew Research Center 17 ( 2016 ). Aaron Smith. 2016. Gig work, online selling and home sharing. Pew Research Center 17 (2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"Internet Users' Information Privacyprotective Responses: A Taxonomy and a Nomological Model. MIS Quarterly","author":"Son Jai-Yeol","year":"2008","unstructured":"Jai-Yeol Son and Sung S Kim . 2008. Internet Users' Information Privacyprotective Responses: A Taxonomy and a Nomological Model. MIS Quarterly ( 2008 ), 503--529. Jai-Yeol Son and Sung S Kim. 2008. Internet Users' Information Privacyprotective Responses: A Taxonomy and a Nomological Model. MIS Quarterly (2008), 503--529."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008651105359"},{"key":"e_1_3_2_1_34_1","volume-title":"Data Privacy Working Paper 3.","author":"Sweeney Latanya","year":"2000","unstructured":"Latanya Sweeney . 2000. Simple demographics often identify people uniquely. Carnegie Mellon , Data Privacy Working Paper 3. Pittsburgh ( 2000 ), 1--34. Latanya Sweeney. 2000. Simple demographics often identify people uniquely. Carnegie Mellon, Data Privacy Working Paper 3. Pittsburgh (2000), 1--34."},{"key":"e_1_3_2_1_35_1","unstructured":"Amazon Mechanical Turk. 2018. Acceptable Use Policy. (2018). https: \/\/www.mturk.com\/worker\/acceptable-use-policy  Amazon Mechanical Turk. 2018. Acceptable Use Policy. (2018). https: \/\/www.mturk.com\/worker\/acceptable-use-policy"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134748"},{"key":"e_1_3_2_1_37_1","volume-title":"Tobias Hossfeld, Judith Redi, and Alessandro Bozzon.","author":"Yang Jie","year":"2018","unstructured":"Jie Yang , Carlo van der Valk , Tobias Hossfeld, Judith Redi, and Alessandro Bozzon. 2018 . How do Crowdworker Communities and Microtask Markets Influence Each Other? A Data-driven Study on Amazon Mechanical Turk. Technical Report. Universit\u00e9 de Fribourg . Jie Yang, Carlo van der Valk, Tobias Hossfeld, Judith Redi, and Alessandro Bozzon. 2018. How do Crowdworker Communities and Microtask Markets Influence Each Other? A Data-driven Study on Amazon Mechanical Turk. Technical Report. Universit\u00e9 de Fribourg."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883036"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","location":"Glasgow Scotland Uk","acronym":"CHI '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290605.3300512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:32Z","timestamp":1750204412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":38,"alternative-id":["10.1145\/3290605.3300512","10.1145\/3290605"],"URL":"https:\/\/doi.org\/10.1145\/3290605.3300512","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}