{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:25:25Z","timestamp":1761157525693,"version":"3.41.0"},"reference-count":96,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T00:00:00Z","timestamp":1681430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Through intensive research on datasets, benchmarks, and models, the computer-vision community has taken great strides to identify the societal biases intrinsic to these technologies. Less is known about the last mile of the computer-vision machine-learning pipeline: on-the-ground integration into the real world. In this paper, I\u00a0analyze facial verification technology (FVT) through its use as account verification in ride-hail work. Using a sociotechnical framework combined with empirical qualitative research methods, including interviews and analysis of an online community of workers, this research is a deep dive into recognition technologies at the level of local practice.\u00a0Findings reveal the high-stakes articulation labor demanded of workers to be recognized by these systems, including maintaining multiple mobile devices, repeatedly uploading requisite images, spending time and resources visiting customer-service centers, and making physical changes to their bodies and environments. These strategies constitute repairs to the failures of computer vision in dynamic environments and are required to successfully engage in the sociotechnical interaction protocols demanded by FVT. Drawing on Erving Goffman's terminology around social interaction rituals, I term these cognitive and behavioral negotiations \"face work.\" Drivers' dynamic, responsive, and ad-hoc attempts to become machine-readable have significant implications for relations between identity and power in spaces of security and work, as well as for the integration of machine-learning systems into safety-critical infrastructures. Ultimately, this research emphasizes the crucial role of end users who create and maintain the conditions required for computer vision to produce judgment.<\/jats:p>","DOI":"10.1145\/3579485","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T17:23:07Z","timestamp":1681665787000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Face Work: A Human-Centered Investigation into Facial Verification in Gig Work"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1434-589X","authenticated-orcid":false,"given":"Elizabeth Anne","family":"Watkins","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v35i4.2513"},{"key":"e_1_2_1_2_1","first-page":"38","volume-title":"In\u00a0Ethnographic Praxis in Industry Conference Proceedings\u00a0(Vol.","author":"Anderson K.","year":"2019","unstructured":"Anderson, K., Bezaitis, M., Disalvo, C. and Faulkner, S., 2019, November. AI Among Us: Agency in a World of Cameras and Recognition Systems. In\u00a0Ethnographic Praxis in Industry Conference Proceedings\u00a0(Vol. 2019, No. 1, pp. 38--64)"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"e_1_2_1_4_1","volume-title":"D.","author":"Bajaj N.","year":"2017","unstructured":"Bajaj,\u00a0N., Sachdeva, S. and\u00a0Kovalev, D. 2017. Engineering Safety with Uber's Real-Time ID Check. Accessed at https:\/\/eng.uber.com\/real-time-id-check\/"},{"volume-title":"In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--12)","author":"Beede E.","key":"e_1_2_1_5_1","unstructured":"Beede, E., Baylor, E., Hersch, F., Iurchenko, A., Wilcox, L., Ruamviboonsuk, P. and Vardoulakis, L.M. 2020. A Human-Centered Evaluation of a Deep Learning System Deployed in Clinics for the Detection of Diabetic Retinopathy. In\u00a0Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--12)."},{"key":"e_1_2_1_6_1","unstructured":"Bhattacharya A. 2016. Uber Will Make Drivers in China Take Selfies to Prove It's Really Them. The Verge. https:\/\/www.theverge.com\/platform\/amp\/2016\/4\/21\/11478010\/uber-facial-recognition-selfie-check-china"},{"volume-title":"Proceedings of the 2018 Chi conference on human factors in computing systems (pp. 1--14)","author":"Binns R.","key":"e_1_2_1_7_1","unstructured":"Binns, R., Van Kleek, M., Veale, M., Lyngs, U., Zhao, J. and Shadbolt, N., 2018, April. 'It's Reducing a Human Being to a Percentage' Perceptions of Justice in Algorithmic Decisions. In Proceedings of the 2018 Chi conference on human factors in computing systems (pp. 1--14)."},{"volume-title":"In\u00a02021 IEEE Winter Conference on Applications of Computer Vision (WACV)\u00a0(pp. 1536--1546)","author":"Birhane A.","key":"e_1_2_1_8_1","unstructured":"Birhane, A. and Prabhu, V.U., 2021, January. Large image datasets: A pyrrhic win for computer vision? In\u00a02021 IEEE Winter Conference on Applications of Computer Vision (WACV)\u00a0(pp. 1536--1546). IEEE."},{"key":"e_1_2_1_9_1","first-page":"2589","volume-title":"Managing visibility on YouTube through algorithmic gossip.\u00a0New media & society,\u00a021(11--12)","author":"Bishop S.","unstructured":"Bishop, S., 2019. Managing visibility on YouTube through algorithmic gossip.\u00a0New media & society,\u00a021(11--12), pp.2589--2606."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Bowker G. and Star S.L. 1999. Sorting things out.\u00a0Classification and its consequences \u00a04.","DOI":"10.7551\/mitpress\/6352.001.0001"},{"key":"e_1_2_1_11_1","unstructured":"Brewster T. 2018. We broke into a bunch of Android phones with a 3D-printed head. Forbes. from https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/12\/13\/we-broke-into-a-bunch-of-android-phones-with-a-3d-printed-head\/'sh=5f5dca961330"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Brostoff S. and Sasse M.A. 2000. Are Passfaces more usable than passwords? A field trial investigation. In People and computers XIV-usability or else! (pp. 405--424). Springer London.","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1154086"},{"volume-title":"Conference on fairness, accountability and transparency (pp. 77--91)","author":"Buolamwini J.","key":"e_1_2_1_14_1","unstructured":"Buolamwini, J. and Gebru, T. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency (pp. 77--91)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"e_1_2_1_16_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction, 3(CSCW)","author":"Cai C.J.","unstructured":"Cai, C.J., Winter, S., Steiner, D., Wilcox, L. and Terry, M. 2019. Hello AI\": Uncovering the Onboarding Needs of Medical Practitioners for Human-AI Collaborative Decision-Making. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), pp.1--24."},{"key":"e_1_2_1_17_1","first-page":"209","volume-title":"Robots as legal metaphors.\u00a0Harv. JL & Tech.,\u00a030","author":"Calo R.","unstructured":"Calo, R., 2016. Robots as legal metaphors.\u00a0Harv. JL & Tech.,\u00a030, p.209"},{"key":"e_1_2_1_18_1","unstructured":"Cameron L.D. 2018. Making out while driving: control coordination and its consequences in algorithmic work.\u00a0University of Michigan."},{"volume-title":"In\u00a0Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--5).","author":"Cameron L.","key":"e_1_2_1_19_1","unstructured":"Cameron, L., Christin, A., Ann DeVito, M., R. Dillahunt, T., Elish, M., Gray, M., Qadri, R., Raval, N., Valentine, M. and Anne Watkins, E., 2021, May. This Seems to Work\": Designing Technological Systems with The Algorithmic Imaginations of Those Who Labor. In\u00a0Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--5)."},{"key":"e_1_2_1_20_1","volume-title":"Homo Varians: Diverse Earner Behaviors in the Platform Economy.","author":"Cansoy M.","year":"2020","unstructured":"Cansoy, M., Ladegaard, S.E.I., Schor, J.B. and Hall, M. 2020. Homo Varians: Diverse Earner Behaviors in the Platform Economy."},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Caplan R. and Gillespie T. 2020. Tiered governance and demonetization: the shifting terms of labor and compensation in the platform economy.\u00a0Social Media+ Society \u00a06(2) p.2056305120936636.","DOI":"10.1177\/2056305120936636"},{"volume-title":"In\u00a0Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques\u00a0(pp. 243--252)","author":"Chalmers M.","key":"e_1_2_1_22_1","unstructured":"Chalmers, M. and Galani, A., 2004, August. Seamful interweaving: heterogeneity in the theory and design of interactive systems. In\u00a0Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques\u00a0(pp. 243--252)."},{"key":"e_1_2_1_23_1","first-page":"897","volume-title":"The ethnographer and the algorithm: beyond the black box.\u00a0Theory and Society,\u00a049(5)","author":"Christin A.","unstructured":"Christin, A., 2020. The ethnographer and the algorithm: beyond the black box.\u00a0Theory and Society,\u00a049(5), pp.897--918."},{"key":"e_1_2_1_24_1","unstructured":"Collins H.M. 1997. RAT-Tale: Sociology's contribution to understanding human and machine cognition. In\u00a0Expertise in context: human and machine\u00a0(pp. 293--311)"},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 120)","author":"DeVito M.A.","key":"e_1_2_1_25_1","unstructured":"DeVito, M.A., Birnholtz, J., Hancock, J.T., French, M. and Liu, S. 2018. How people form folk theories of social media feeds and what it means for how we study self-presentation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 120). ACM."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302316"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503727"},{"key":"e_1_2_1_28_1","volume-title":"Repairing Innovation: A Study of Integrating AI in Clinical Care.\u00a0Data and Society.","author":"Elish M.","year":"2020","unstructured":"Elish, M. and Watkins, E.A., 2020. Repairing Innovation: A Study of Integrating AI in Clinical Care.\u00a0Data and Society."},{"volume-title":"June. What People Think AI Should Infer From Faces. In\u00a02022 ACM Conference on Fairness, Accountability, and Transparency\u00a0(pp. 128--141)","author":"Engelmann S.","key":"e_1_2_1_29_1","unstructured":"Engelmann, S., Ullstein, C., Papakyriakopoulos, O. and Grossklags, J., 2022, June. What People Think AI Should Infer From Faces. In\u00a02022 ACM Conference on Fairness, Accountability, and Transparency\u00a0(pp. 128--141)."},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Gebru T. Morgenstern J. Vecchione B. Vaughan J.W. Wallach H. Iii H.D. and Crawford K. 2021. Datasheets for datasets.\u00a0Communications of the ACM \u00a064(12) pp.86--92.","DOI":"10.1145\/3458723"},{"key":"e_1_2_1_31_1","unstructured":"Geuss M. 2014. Politician's fingerprint reproduced using photos of her hands. Ars Technica. https:\/\/arstechnica.com\/information-technology\/2014\/12\/politicians-fingerprint-reproduced-using-photos-of-her-hands\/"},{"volume-title":"Essays in face-to-face behavior","author":"Goffman E.","key":"e_1_2_1_32_1","unstructured":"Goffman, E. 1967.\u00a0Interaction ritual: Essays in face-to-face behavior. Aldine Publishing."},{"key":"e_1_2_1_33_1","volume-title":"Work: How to Stop Silicon Valley from Building a New Global Underclass. Houghton Mifflin Harcourt.\u00a0","author":"Gray M.L.","year":"2019","unstructured":"Gray, M.L. and Suri, S. 2019.\u00a0Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass. Houghton Mifflin Harcourt.\u00a0"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819942"},{"volume-title":"In\u00a0Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency\u00a0(pp. 19--31)","author":"Green B.","key":"e_1_2_1_35_1","unstructured":"Green, B. and Viljoen, S. 2020. Algorithmic realism: expanding the boundaries of algorithmic thought. In\u00a0Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency\u00a0(pp. 19--31)."},{"key":"e_1_2_1_36_1","unstructured":"Greenberg Andy. 2017. Watch a 10-Year-Old's Face Unlock His Mom's iPhone X. WIRED. https:\/\/www.wired.com\/story\/10-year-old-face-id-unlocks-mothers-iphone-x\/"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Hansen L. and Nissenbaum H. 2009. Digital disaster cyber security and the Copenhagen School.\u00a0International studies quarterly \u00a053(4) pp.1155--1175.","DOI":"10.1111\/j.1468-2478.2009.00572.x"},{"key":"e_1_2_1_38_1","first-page":"575","volume-title":"Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist studies, 14(3)","author":"Haraway D.","unstructured":"Haraway, D. 1988. Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist studies, 14(3), pp.575--599."},{"key":"e_1_2_1_39_1","unstructured":"Healy J. 2019. They Thought it was Their Uber. But the Driver was a Predator. The New York Times. https:\/\/www.nytimes.com\/2019\/04\/04\/us\/fake-uber-driver-assaults.html"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Hargittai E. Gruber J. Djukaric T. Fuchs J. and Brombach L. 2020. Black box measures? How to study people's algorithm skills.\u00a0Information Communication & Society \u00a023(5) pp.764--775.","DOI":"10.1080\/1369118X.2020.1713846"},{"key":"e_1_2_1_41_1","unstructured":"Hill K. 2020.\u00a0Another Arrest and Jail Time Due to a Bad Facial Recognition Match. The New York Times. https:\/\/www.nytimes.com\/2020\/12\/29\/technology\/facial-recognition-misidentify-jail.html"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1027\/1864-1105\/a000062"},{"key":"e_1_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Irani Lilly C. and Silberman M.S. 2013. ?Turkopticon: Interrupting Worker Invisibility in Amazon Mechanical Turk.\" Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","DOI":"10.1145\/2470654.2470742"},{"key":"e_1_2_1_44_1","first-page":"221","volume-title":"Essays on communication, materiality, and society","author":"Jackson S.J.","unstructured":"Jackson, S.J., 2014. 11 Rethinking Repair.\u00a0Media technologies: Essays on communication, materiality, and society, pp.221--39."},{"volume-title":"In\u00a0International Conference on Information\u00a0(pp. 578--589)","author":"Jarrahi M.H.","key":"e_1_2_1_45_1","unstructured":"Jarrahi, M.H. and Sutherland, W., 2019, March. Algorithmic management and algorithmic competencies: Understanding and appropriating algorithms in gig work. In\u00a0International Conference on Information\u00a0(pp. 578--589). Springer, Cham."},{"volume-title":"In\u00a0CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--18)","author":"Kaur H.","key":"e_1_2_1_46_1","unstructured":"Kaur, H., McDuff, D., Williams, A.C., Teevan, J. and Iqbal, S.T., 2022, April. I Didn't Know I Looked Angry\": Characterizing Observed Emotion and Reported Affect at Work. In\u00a0CHI Conference on Human Factors in Computing Systems\u00a0(pp. 1--18)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Kellogg K.C. Valentine M.A. and Christin A. 2020. Algorithms at work: The new contested terrain of control.\u00a0Academy of Management Annals \u00a014(1) pp.366--410.","DOI":"10.5465\/annals.2018.0174"},{"key":"e_1_2_1_48_1","first-page":"1","volume-title":"The misgendering machines: Trans\/HCI implications of automatic gender recognition.\u00a0Proceedings of the ACM on human-computer interaction,\u00a02(CSCW)","author":"Keyes O.","unstructured":"Keyes, O., 2018. The misgendering machines: Trans\/HCI implications of automatic gender recognition.\u00a0Proceedings of the ACM on human-computer interaction,\u00a02(CSCW), pp.1--22."},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1--10)","author":"Kulesza T.","key":"e_1_2_1_49_1","unstructured":"Kulesza, T., Stumpf, S., Burnett, M. and Kwan, I. 2012. Tell me more? The effects of mental model soundness on personalizing an intelligent agent. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 1--10)."},{"key":"e_1_2_1_50_1","first-page":"205395171875668","volume-title":"Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management.\u00a0Big Data & Society,\u00a05(1)","author":"Lee M.K.","unstructured":"Lee, M.K., 2018. Understanding perception of algorithmic decisions: Fairness, trust, and emotion in response to algorithmic management.\u00a0Big Data & Society,\u00a05(1), p.2053951718756684."},{"volume-title":"Algorithms that divide and unite: Delocalisation, identity and collective action in ?microwork'. In\u00a0Space, place and global digital work\u00a0(pp. 53--80)","author":"Lehdonvirta V.","key":"e_1_2_1_51_1","unstructured":"Lehdonvirta, V. 2016. Algorithms that divide and unite: Delocalisation, identity and collective action in ?microwork'. In\u00a0Space, place and global digital work\u00a0(pp. 53--80). Palgrave Macmillan, London."},{"key":"e_1_2_1_52_1","first-page":"123","volume-title":"The role of digital communities in organizing gig workers.\u00a0Industrial Relations: A Journal of Economy and Society,\u00a059(1)","author":"Maffie M.D.","unstructured":"Maffie, M.D., 2020. The role of digital communities in organizing gig workers.\u00a0Industrial Relations: A Journal of Economy and Society,\u00a059(1), pp.123--149."},{"key":"e_1_2_1_53_1","volume-title":"Science and Society in the Age of Machine Intelligence. Diss","author":"Moss D.","year":"2021","unstructured":"Moss, Emanuel D.\u00a0The Objective Function: Science and Society in the Age of Machine Intelligence. Diss. CUNY Graduate Center, 2021."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773059"},{"key":"e_1_2_1_55_1","unstructured":"Mental Models.\" People and AI Guidebook. Google. https:\/\/pair.withgoogle.com\/chapter\/People%20+%20AI%20Guidebook%20-%20Mental%20Models.pdf"},{"key":"e_1_2_1_56_1","first-page":"30","article-title":"Automated Anti-Blackness: Facial Recognition in Brooklyn","volume":"20","author":"Nkonde M.","year":"2019","unstructured":"Nkonde, M. 2019. Automated Anti-Blackness: Facial Recognition in Brooklyn, New York. Kennedy School Review, 20, pp.30--36.","journal-title":"New York. Kennedy School Review"},{"key":"e_1_2_1_57_1","unstructured":"North A. 2019. It's not just passengers being assaulted in Ubers. Drivers are at risk too.\" Accessed at https:\/\/www.vox.com\/2019\/12\/7\/20998646\/uber-safety-report-sexual-assault-lyft-cases"},{"key":"e_1_2_1_58_1","article-title":"Uber's Dirty Little Secret: Shared Driver Accounts","author":"Olson P.","year":"2019","unstructured":"Olson, P. and Neeleman, S. 2019. Uber's Dirty Little Secret: Shared Driver Accounts.\" The Wall Street Journal. https:\/\/www.wsj.com\/articles\/ubers-dirty-little-secret-shared-driver-accounts-11574883278","journal-title":"The Wall Street Journal. https:\/\/www.wsj.com\/articles\/ubers-dirty-little-secret-shared-driver-accounts-11574883278"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/196734.196745"},{"key":"e_1_2_1_60_1","first-page":"821","volume-title":"Beyond Instrumentalism: A Substantivist Perspective on Law, Technology, and the Digital Persona.\u00a0Mich. St. L. Rev.","author":"Pasquale F.","year":"2018","unstructured":"Pasquale, F. and Cockfield, A.J., 2018. Beyond Instrumentalism: A Substantivist Perspective on Law, Technology, and the Digital Persona.\u00a0Mich. St. L. Rev., p.821."},{"key":"e_1_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Pinch T.J. and Bijker W.E. 1984. The social construction of facts and artefacts: Or how the sociology of science and the sociology of technology might benefit each other. Social studies of science 14(3) pp.399--441.","DOI":"10.1177\/030631284014003004"},{"key":"e_1_2_1_62_1","volume-title":"How Digital Platforms Engender New Forms of Worker Solidarity in Jakarta. In\u00a0Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society\u00a0(pp. 144--144)","author":"Qadri R.","year":"2020","unstructured":"Qadri, R., 2020, February. Algorithmized but not Atomized? How Digital Platforms Engender New Forms of Worker Solidarity in Jakarta. In\u00a0Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society\u00a0(pp. 144--144)."},{"key":"e_1_2_1_63_1","first-page":"1","volume-title":"Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1--13)","author":"Rader E.","unstructured":"Rader, E., Cotter, K. and Cho, J. 2018. Explanations as mechanisms for supporting algorithmic transparency. In Proceedings of the 2018 CHI conference on human factors in computing systems (pp. 1--13) Interaction, 3(CSCW), pp.1--26"},{"key":"e_1_2_1_64_1","volume-title":"About Face: A Survey of Facial Recognition Evaluation.\u00a0arXiv preprint arXiv:2102.00813.","author":"Raji I.D.","year":"2021","unstructured":"Raji, I.D. and Fried, G., 2021. About Face: A Survey of Facial Recognition Evaluation.\u00a0arXiv preprint arXiv:2102.00813."},{"key":"e_1_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Rao U. and Greenleaf G. 2013. Subverting ID from above and below: The uncertain shaping of India's new instrument of e-governance.\u00a0Surveillance & Society.","DOI":"10.24908\/ss.v11i3.4496"},{"key":"e_1_2_1_66_1","volume-title":"A","author":"Rosenblat","year":"2018","unstructured":"Rosenblat, A 2018b. Uberland: How Algorithms Are Rewriting the Rules of Work. Oakland, CA: University of California Press."},{"key":"e_1_2_1_67_1","first-page":"1689","volume-title":"The algorithm at work? Explanation and repair in the enactment of similarity in art data.\u00a0Information","author":"Sachs S.E.","unstructured":"Sachs, S.E., 2020. The algorithm at work? Explanation and repair in the enactment of similarity in art data.\u00a0Information, Communication & Society,\u00a023(11), pp.1689--1705."},{"key":"e_1_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Scheuerman M.K. Hanna A. and Denton E. 2021. Do datasets have politics? Disciplinary values in computer vision dataset development.\u00a0Proceedings of the ACM on Human-Computer Interaction \u00a05(CSCW2) pp.1--37.","DOI":"10.1145\/3476058"},{"key":"e_1_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Scheuerman M.K. Paul J.M. and Brubaker J.R. 2019. How computers see gender: An evaluation of gender classification in commercial facial analysis services.\u00a0Proceedings of the ACM on Human-Computer Interaction \u00a03(CSCW) pp.1--33.","DOI":"10.1145\/3359246"},{"key":"e_1_2_1_70_1","first-page":"45","volume-title":"Taking cscw seriously: Supporting articulation work","author":"Schmidt K.","year":"1992","unstructured":"Schmidt, K., 2008. Taking cscw seriously: Supporting articulation work (1992). In\u00a0Cooperative Work and Coordinative Practices\u00a0(pp. 45--71). Springer, London."},{"volume-title":"Proceedings of the Conference on Fairness, Accountability, and Transparency (pp. 59--68)","author":"Selbst A.D.","key":"e_1_2_1_71_1","unstructured":"Selbst, A.D., Boyd, D., Friedler, S.A., Venkatasubramanian, S. and Vertesi, J. 2019. Fairness and abstraction in sociotechnical systems. In Proceedings of the Conference on Fairness, Accountability, and Transparency (pp. 59--68)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Shen H. DeVos A. Eslami M. and Holstein K. 2021. Everyday algorithm auditing: Understanding the power of everyday users in surfacing harmful algorithmic behaviors.\u00a0arXiv preprint arXiv:2105.02980.","DOI":"10.1145\/3479577"},{"volume-title":"In\u00a0Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 4776--4824)","author":"Singh R.","key":"e_1_2_1_73_1","unstructured":"Singh, R. and Jackson, S.J., 2017, May. From margins to seams: Imbrication, inclusion, and torque in the Aadhaar Identification Project. In\u00a0Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems\u00a0(pp. 4776--4824)."},{"key":"e_1_2_1_74_1","first-page":"1","volume-title":"Infrastructure: Low-resolution Citizens and the Aadhaar Identification Project.\u00a0Proceedings of the ACM on Human-Computer Interaction,\u00a05(CSCW2)","author":"Singh R.","year":"2021","unstructured":"Singh, R. and Jackson, S., 2021. Seeing Like an Infrastructure: Low-resolution Citizens and the Aadhaar Identification Project.\u00a0Proceedings of the ACM on Human-Computer Interaction,\u00a05(CSCW2), pp.1--26."},{"key":"e_1_2_1_75_1","unstructured":"Springer A. and Whittaker S. 2018. ?I had a solid theory before but it's falling apart\": Polarizing Effects of Algorithmic Transparency. arXiv preprint arXiv:1811.02163."},{"key":"e_1_2_1_76_1","first-page":"163","volume-title":"The articulation of project work: An organizational process.\u00a0Sociological Quarterly,\u00a029(2)","author":"Strauss A.","unstructured":"Strauss, A., 1988. The articulation of project work: An organizational process.\u00a0Sociological Quarterly,\u00a029(2), pp.163--178."},{"volume-title":"Supporting articulation work.\" In Computerization and Controversy:\u00a0Value Conflicts and Social Choices. Rob Kling and Morgan Kaufmann (eds)","author":"Suchman L.","key":"e_1_2_1_77_1","unstructured":"Suchman, L. 1996. Supporting articulation work.\" In Computerization and Controversy:\u00a0Value Conflicts and Social Choices. Rob Kling and Morgan Kaufmann (eds). Academic Press."},{"volume-title":"Human-machine reconfigurations: Plans and situated actions","author":"Suchman L.","key":"e_1_2_1_78_1","unstructured":"Suchman, L. 2007. Human-machine reconfigurations: Plans and situated actions. Cambridge university press."},{"key":"e_1_2_1_79_1","unstructured":"Sullivan J. 2016.\u00a0Selfies and Security | Uber Newsroom. Uber Newsroom. Available at: https:\/\/www.uber.com\/newsroom\/securityselfies"},{"key":"e_1_2_1_80_1","unstructured":"Svirsky Dan. 2021. Promoting Safety and Fairness with Real-Time ID Check. Medium. https:\/\/medium.com\/uber-under-the-hood\/promoting-safety-and-fairness-with-real-time-id-check-8a190fdb3b45"},{"key":"e_1_2_1_81_1","doi-asserted-by":"crossref","unstructured":"Tavory I. and Timmermans S. 2014.\u00a0Abductive analysis: Theorizing qualitative research. University of Chicago Press.","DOI":"10.7208\/chicago\/9780226180458.001.0001"},{"key":"e_1_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Ticona J. and Mateescu A. 2018. Trusted strangers: Carework platforms' cultural entrepreneurship in the on-demand economy.\u00a0New Media & Society \u00a020(11) pp.4384--4404.","DOI":"10.1177\/1461444818773727"},{"key":"e_1_2_1_83_1","unstructured":"Trist E.L. 1981.\u00a0The evolution of socio-technical systems\u00a0(Vol. 2). Toronto: Ontario Quality of Working Life Centre."},{"key":"e_1_2_1_84_1","unstructured":"Uber's US Safety Report. 2019.\u00a0https:\/\/www.uber.com\/us\/en\/about\/reports\/us-safety-report\/"},{"key":"e_1_2_1_85_1","first-page":"264","volume-title":"Technology, & Human Values,\u00a039(2)","author":"Vertesi J.","unstructured":"Vertesi, J., 2014. Seamful spaces: Heterogeneous infrastructures in interaction.\u00a0Science, Technology, & Human Values,\u00a039(2), pp.264--284."},{"key":"e_1_2_1_86_1","unstructured":"Watkins E.A. 2020. The Tension Between Information Justice and Security: Perceptions of Facial Recognition Targeting. Workshop on Transparency and Explanation in Smart Systems (TExSS). Joint proceedings of the workshops of the ACM Conference on Intelligent User Interfaces (IUI)."},{"key":"e_1_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Watkins E.A. 2020 October. Took a pic and got declined vexed and perplexed: facial recognition in algorithmic management. In\u00a0Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing\u00a0(pp. 177--182).","DOI":"10.1145\/3406865.3418383"},{"key":"e_1_2_1_88_1","first-page":"1567","volume-title":"Have you learned your lesson?\" Communities of practice under algorithmic competition.\u00a0New Media & Society,\u00a024(7)","author":"Watkins E.A.","unstructured":"Watkins, E.A., 2022. Have you learned your lesson?\" Communities of practice under algorithmic competition.\u00a0New Media & Society,\u00a024(7), pp.1567--1590."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_2_1_90_1","doi-asserted-by":"crossref","unstructured":"Webb E. and Weick K.E. 1979. Unobtrusive measures in organizational theory: A reminder.\u00a0Administrative Science Quarterly \u00a024(4) pp.650--659.","DOI":"10.2307\/2392370"},{"key":"e_1_2_1_91_1","unstructured":"Whittaker Meredith. 2020. The folk tradecraft of workers observing and assessing opaque algorithmic management systems then modifying their behavior in response is both heartbreaking and impressive \"people's research.\" Twitter. Available at https:\/\/twitter.com\/mer__edith\/status\/1300878248059056134."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1111\/irj.12103"},{"key":"e_1_2_1_93_1","first-page":"493","volume-title":"Beyond mobilisation at McDonald's: Towards networked organising.\u00a0Capital & Class,\u00a044(4)","author":"Wood A.","unstructured":"Wood, A., 2020. Beyond mobilisation at McDonald's: Towards networked organising.\u00a0Capital & Class,\u00a044(4), pp.493--502."},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Wood A.J. Lehdonvirta V. and Graham M. 2018. Workers of the Internet unite? Online freelancer organisation among remote gig economy workers in six Asian and African countries.\u00a0New Technology Work and Employment \u00a033(2) pp.95--112.","DOI":"10.1111\/ntwe.12112"},{"volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1--14)","author":"Woodruff A.","key":"e_1_2_1_95_1","unstructured":"Woodruff, A., Fox, S.E., Rousso Schindler, S. and Warshaw, J., 2018, April. A qualitative exploration of perceptions of algorithmic fairness. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1--14)."},{"key":"e_1_2_1_96_1","doi-asserted-by":"crossref","unstructured":"Wu E.Y. Pedersen E. and Salehi N. 2019. Agent gatekeeper drug dealer: How content creators craft algorithmic personas.\u00a0Proceedings of the ACM on Human-Computer Interaction \u00a03(CSCW) pp. 1--27.","DOI":"10.1145\/3359321"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:24Z","timestamp":1750182684000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":96,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579485"],"URL":"https:\/\/doi.org\/10.1145\/3579485","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}