Browse Definitions :
Definition

ghost worker

1. A ghost worker is someone who is on a company's payroll but does not do any actual work. In some cases, a ghost worker is a real person who has died or otherwise left the company, but their personal data remains in the books. In other cases, the worker is entirely fictitious and their addition to the company's payroll constitutes fraud. 

2. Ghost worker is an emerging class of remote freelance workers who make their living by completing microtasks for cloud providers. Many ghost workers end up earning less than their country's minimum hourly wage because they are only paid for the tasks they complete, regardless of long they work. Also, because they work on a freelance basis, ghost workers do not receive employee benefits. 

The use of ghost worker (sometimes spelled ghostworker) in an outsourcing context was coined by Siddharth Suri and Mary L. Gray in their 2019 book, Ghost Work: How to Stop Silicon Valley From Building a New Global Underclass. In their book, Gray and Suri explore the social impact of crowdsourcing the manual work required to support artificial intelligence (AI) programming.

The authors conducted hundreds of in-person interviews and more than 10,000 surveys of microtask workers in the United States and India. They found that such work often involves tasks like captioning a series of photos or transcribing 60 seconds of an audio file. They also examined four major on-demand platform businesses, studied their policy landscape, and performed dozens of experiments to understand API-driven office work and how it shapes the lives and productivity of on-demand workers. Some of the ghost workers interviewed by the researchers were employed through the likes of Amazon's Mechanical Turk. Similar platforms are operated by OneSpace's CrowdSource, Upwork and Fiverr.

This was last updated in June 2019

Continue Reading About ghost worker

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close