Privacy in Crowdsourcing: a Review of the Threats and Challenges

被引:0
|
作者
Huichuan Xia
Brian McKernan
机构
[1] School of Information Studies,School of Information Studies
[2] Syracuse University,undefined
[3] Syracuse University,undefined
关键词
Crowdsourcing; Privacy threats; Privacy challenges; Privacy protection; Amazon Mechanical Turk (MTurk);
D O I
暂无
中图分类号
学科分类号
摘要
Crowdsourcing platforms such as Amazon Mechanical Turk (MTurk) are popular and widely used in both academic and non-academic realms, but privacy threats and challenges in crowdsourcing have not been extensively reviewed. To help push the field forward in important new directions, this paper first reviews the privacy threats in different types of crowdsourcing based on Solove’s taxonomy of privacy and Brabham’s typology of crowdsourcing. Then, the paper explores the privacy challenges associated with the characteristics of crowdsourcing task, platform, requesters, and crowd workers. These privacy challenges are discussed and categorized into both theoretical and practical challenges. Based on the review and discussion, this paper proposes a set of strategies to better understand and address many of the privacy threats and challenges in crowdsourcing. Finally, the paper concludes by suggesting research implications for the future work.
引用
收藏
页码:263 / 301
页数:38
相关论文
共 50 条
  • [21] Threats Against Information Privacy and Security in Social Networks: A Review
    Al-Charchafchi, Ahmed
    Manickam, Selvakumar
    Alqattan, Zakaria N. M.
    [J]. ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 358 - 372
  • [22] Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions
    Qu, Kaiqian
    J., Ye
    X., Li
    S., Guo
    [J]. IEEE Internet of Things Magazine, 7 (04): : 52 - 58
  • [23] Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions
    Khadam, Umair
    Iqbal, Muhammad Munwar
    Alruily, Meshrif
    Al Ghamdi, Mohammed A.
    Ramzan, Muhammad
    Almotiri, Sultan H.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [24] Threats to privacy protection
    Barash, Carol Isaacson
    [J]. SCIENCE, 2007, 318 (5852) : 913 - 914
  • [25] Location Privacy for Crowdsourcing Applications
    Boutsis, Ioannis
    Kalogeraki, Vana
    [J]. UBICOMP'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2016, : 694 - 705
  • [26] Preserving worker privacy in crowdsourcing
    Hiroshi Kajino
    Hiromi Arai
    Hisashi Kashima
    [J]. Data Mining and Knowledge Discovery, 2014, 28 : 1314 - 1335
  • [27] Preserving worker privacy in crowdsourcing
    Kajino, Hiroshi
    Arai, Hiromi
    Kashima, Hisashi
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2014, 28 (5-6) : 1314 - 1335
  • [28] Security Threats and Challenges to IoT and its Applications: A Review
    Anwar, Raja Waseem
    Zainal, Anazida
    Abdullah, Tariq
    Iqbal, Saleem
    [J]. 2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 301 - 305
  • [29] A review of the major threats and challenges to global bat conservation
    Frick, Winifred F.
    Kingston, Tigga
    Flanders, Jon
    [J]. ANNALS OF THE NEW YORK ACADEMY OF SCIENCES, 2020, 1469 (01) : 5 - 25
  • [30] A Review on Big Data: Privacy and Security Challenges
    Goel, Parth
    Patel, Radhika
    Garg, Dweepna
    Ganatra, Amit
    [J]. ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC), 2021, : 705 - 709