Browse Definitions :
Definition

ghost worker

1. A ghost worker is someone who is on a company's payroll but does not do any actual work. In some cases, a ghost worker is a real person who has died or otherwise left the company, but their personal data remains in the books. In other cases, the worker is entirely fictitious and their addition to the company's payroll constitutes fraud. 

2. Ghost worker is an emerging class of remote freelance workers who make their living by completing microtasks for cloud providers. Many ghost workers end up earning less than their country's minimum hourly wage because they are only paid for the tasks they complete, regardless of long they work. Also, because they work on a freelance basis, ghost workers do not receive employee benefits. 

The use of ghost worker (sometimes spelled ghostworker) in an outsourcing context was coined by Siddharth Suri and Mary L. Gray in their 2019 book, Ghost Work: How to Stop Silicon Valley From Building a New Global Underclass. In their book, Gray and Suri explore the social impact of crowdsourcing the manual work required to support artificial intelligence (AI) programming.

The authors conducted hundreds of in-person interviews and more than 10,000 surveys of microtask workers in the United States and India. They found that such work often involves tasks like captioning a series of photos or transcribing 60 seconds of an audio file. They also examined four major on-demand platform businesses, studied their policy landscape, and performed dozens of experiments to understand API-driven office work and how it shapes the lives and productivity of on-demand workers. Some of the ghost workers interviewed by the researchers were employed through the likes of Amazon's Mechanical Turk. Similar platforms are operated by OneSpace's CrowdSource, Upwork and Fiverr.

This was last updated in June 2019

Continue Reading About ghost worker

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a suite of protocols and algorithms for securing data transmitted over the internet or any ...

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close