Browse Definitions :
Definition

ghost worker

Contributor(s): Kevin Ferguson

1. A ghost worker is someone who is on a company's payroll but does not do any actual work. In some cases, a ghost worker is a real person who has died or otherwise left the company, but their personal data remains in the books. In other cases, the worker is entirely fictitious and their addition to the company's payroll constitutes fraud. 

2. Ghost worker is an emerging class of remote freelance workers who make their living by completing microtasks for cloud providers. Many ghost workers end up earning less than their country's minimum hourly wage because they are only paid for the tasks they complete, regardless of long they work. Also, because they work on a freelance basis, ghost workers do not receive employee benefits. 

The use of ghost worker (sometimes spelled ghostworker) in an outsourcing context was coined by Siddharth Suri and Mary L. Gray in their 2019 book, Ghost Work: How to Stop Silicon Valley From Building a New Global Underclass. In their book, Gray and Suri explore the social impact of crowdsourcing the manual work required to support artificial intelligence (AI) programming.

The authors conducted hundreds of in-person interviews and more than 10,000 surveys of microtask workers in the United States and India. They found that such work often involves tasks like captioning a series of photos or transcribing 60 seconds of an audio file. They also examined four major on-demand platform businesses, studied their policy landscape, and performed dozens of experiments to understand API-driven office work and how it shapes the lives and productivity of on-demand workers. Some of the ghost workers interviewed by the researchers were employed through the likes of Amazon's Mechanical Turk. Similar platforms are operated by OneSpace's CrowdSource, Upwork and Fiverr.

This was last updated in June 2019

Continue Reading About ghost worker

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close