[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Weaving Privacy and Power: On the Privacy Practices of Labor Organizers in the U.S. Technology Industry

Published: 11 November 2022 Publication History

Abstract

We investigate the privacy practices of labor organizers in the computing technology industry and explore the changes in these practices as a response to remote work. Our study is situated at the intersection of two pivotal shifts in workplace dynamics: (a) the increase in online workplace communications due to remote work, and (b) the resurgence of the labor movement and an increase in collective action in workplaces-especially in the tech industry, where this phenomenon has been dubbed the tech worker movement. The shift of work-related communications to online digital platforms in response to an increase in remote work is creating new opportunities for and risks to the privacy of workers. These risks are especially significant for organizers of collective action, with several well-publicized instances of retaliation against labor organizers by companies. Through a series of qualitative interviews with 29 tech workers involved in collective action, we investigate how labor organizers assess and mitigate risks to privacy while engaging in these actions. Among the most common risks that organizers experienced are retaliation from their employer, lateral worker conflict, emotional burnout, and the possibility of information about the collective effort leaking to management. Depending on the nature and source of the risk, organizers use a blend of digital security practices and community-based mechanisms. We find that digital security practices are more relevant when the threat comes from management, while community management and moderation are central to protecting organizers from lateral worker conflict. Since labor organizing is a collective rather than individual project, individual privacy and collective privacy are intertwined, sometimes in conflict and often mutually constitutive. Notions of privacy that solely center individuals are often incompatible with the needs of organizers, who noted that safety in numbers could only be achieved when workers presented a united front to management. Based on our interviews, we identify key topics for future research, such as the growing prevalence of surveillance software and the needs of international and gig worker organizers.We conclude with design recommendations that can help create safer, more secure and more private tools to better address the risks that organizers face.

References

[1]
[n. d.]. About Us - Tech Workers Union Local 1010. https://www.techworkersunion-1010.org/about-us
[2]
[n. d.]. Contract Worker Disparity Project. https://techequitycollaborative.org/contract-worker-disparity-project/
[3]
[n. d.]. CryptPad: Collaboration suite, encrypted and open-source. https://cryptpad.fr/what-is-cryptpad.html
[4]
[n. d.]. Digital Worker Inquiry: Data, Solidarity, Leverage. https://digitalworkerinquiry.com/
[5]
[n. d.]. Students Pledge #NoTechForICE | Mijente. https://web.archive.org/web/20211109102156/https://action.mijente. net/efforts/students-pledge-notechforice/lookup/new
[6]
2015. Pew Research Center Demographic Questions. https://assets.pewresearch.org/wp-content/uploads/sites/12/ 2015/03/Demographic-Questions-Web-and-Mail-English-3--20--2015.pdf
[7]
2019. Campaign to Organize Digital Employees (CODE-CWA). https://www.code-cwa.org/
[8]
Antonio Aloisi and Valerio De Stefano. [n. d.]. Essential jobs, remote work and digital surveillance: addressing the COVID-19 pandemic panopticon. International Labour Review n/a, n/a ([n. d.]). https://doi.org/10.1111/ilr.12219
[9]
Marc Andreessen. 2011. Why software is eating the world. Wall Street Journal 20, 2011 (2011), C2.
[10]
Miriyam Aouragh, Seda Gurses, Jara Rocha, and Femke Snelting. 2015. Let's First Get Things Done! On Division of Labour and Technopolitical Practices of Delegation in Times of Crisis. The Fibreculture Journal 26 (Dec. 2015), 209--238. https://doi.org/10.15307/fcj.26.196.2015
[11]
Kirstie Ball. 2021. Electronic Monitoring and Surveillance in the Workplace. Technical Report. Joint Research Centre (Seville site).
[12]
Richard Barbrook and Andy Cameron. 1996. The Californian ideology. Science as Culture 6, 1 (Jan. 1996), 44--72. https://doi.org/10.1080/09505439609526455
[13]
Johana Bhuiyan, Sam Dean, and Suhauna Hussain. 2020. Black and brown tech workers share their experiences of racism on the job. https://www.latimes.com/business/technology/story/2020-06--24/diversity-in-tech-tech-workerstell-their-story Section: Technology.
[14]
Geoffrey C Bowker, Stefan Timmermans, and Susan Leigh Star. 1996. Infrastructure and organizational transformation: Classifying nurses' work. In Information technology and changes in organizational work. Springer, 344--370.
[15]
Erik Brynjolfsson, John J Horton, Adam Ozimek, Daniel Rock, Garima Sharma, and Hong-Yi TuYe. 2020. COVID-19 and remote work: an early look at US data. Technical Report. National Bureau of Economic Research.
[16]
Joy Buolamwini and Timnit Gebru. 2018. Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. In Proceedings of the 1st Conference on Fairness, Accountability and Transparency. PMLR, 77--91. https: //proceedings.mlr.press/v81/buolamwini18a.html ISSN: 2640--3498.
[17]
Marion Crain and Ken Matheny. 2001. Labor's Identity Crisis. California Law Review 89, 6 (Dec. 2001), 1767. https://doi.org/10.2307/3481249
[18]
Bennett Cyphers and Karen Gullo. 2020. Inside the Invasive, Secretive "Bossware" Tracking Workers. https: //www.eff.org/deeplinks/2020/06/inside-invasive-secretive-bossware-tracking-workers
[19]
Hannah Denham. 2019. ?No Tech for ICE': Protesters demand Amazon cut ties with federal immigration enforcement. Washington Post (July 2019). https://www.washingtonpost.com/business/2019/07/12/no-tech-ice-protesters-demandamazon-cut-ties-with-federal-immigration-enforcement/
[20]
Alison DeNisco-Rayome. 2019. Transgender employees in tech: Why this "progressive" industry has more work to do to achieve true gender inclusivity. https://www.zdnet.com/article/transgender-employees-in-tech-why-thisprogressive-industry-has-more-work-to-do-to-achieve-true-gender-inclusivity/
[21]
Paul Dourish and Ken Anderson. 2006. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3 (2006), 319--342. Publisher: Taylor & Francis.
[22]
Pelle Ehn. 1988. Work-oriented design of computer artifacts. Ph. D. Dissertation. Arbetslivscentrum.
[23]
Elizabeth Anne Watkins, PhD. 2021. Are you a tech worker who has experience with collective action related to your workplace within the last 2 years? Our research team would love to interview you for a study (for $!) on the security needs of organizers in the tech industry! Contact info & more details - (1/3). https://twitter.com/watkins_welcome/ status/1461071104672296965
[24]
Richard Florida. 2017. Tech Made Cities Too Expensive. Here's How to Fix It. Wired (April 2017). https://www.wired. com/2017/04/how-to-save-the-middle-class/ Section: tags.
[25]
Electronic Frontier Foundation. 2014. Your Security Plan. https://ssd.eff.org/en/module/your-security-plan
[26]
Susan Fowler. 2017. Reflecting on one very, very strange year at Uber. https://www.susanjfowler.com/blog/2017/2/19/ reflecting-on-one-very-strange-year-at-uber
[27]
Sarah E Fox, Vera Khovanskaya, Clara Crivellaro, Niloufar Salehi, Lynn Dombrowski, Chinmay Kulkarni, Lilly Irani, and Jodi Forlizzi. 2020. Worker-Centered Design: Expanding HCI Methods for Supporting Labor. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.
[28]
Karen Hao. 2021. She risked everything to expose Facebook. Now she's telling her story. https://www.technologyreview. com/2021/07/29/1030260/facebook-whistleblower-sophie-zhang-global-political-manipulation/
[29]
Sandra G Harding. 2004. The feminist standpoint theory reader: Intellectual and political controversies. Psychology Press.
[30]
Sam Havron, Diana Freed, Rahul Chatterjee, Damon McCoy, Nicola Dell, and Thomas Ristenpart. 2019. Clinical Computer Security for Victims of Intimate Partner Violence. 105--122. https://www.usenix.org/conference/usenixsecurity19/ presentation/havron
[31]
Herbert Hill. 1996. The problem of race in American labor history. Reviews in American History 24, 2 (1996), 189--208. Publisher: JSTOR.
[32]
Mike Isaac. 2017. How Uber Deceives the Authorities Worldwide. The New York Times (March 2017). https: //www.nytimes.com/2017/03/03/technology/uber-greyball-program-evade-authorities.html
[33]
Vera Khovanskaya, Lynn Dombrowski, Jeffrey Rzeszotarski, and Phoebe Sengers. 2019. The Tools of Management: Adapting Historical Union Tactics to Platform-Mediated Labor. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--22.
[34]
Vera Khovanskaya, Phoebe Sengers, and Lynn Dombrowski. 2020. Bottom-Up Organizing with Tools from On High: Understanding the Data Practices of Labor Organizers. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu HI USA, 1--13. https://doi.org/10.1145/3313831.3376185
[35]
Ian Kullgren, Brian Eckhouse, and Deena Shanker. 2021. U.S. Labor Unions Are Having a Moment. Time (Oct. 2021). https://time.com/6107676/labor-unions/
[36]
Gordon Lafer and Lola Loustaunau. 2020. Fear at work: An inside account of how employers threaten, intimidate, and harass workers to stop them from exercising their right to collective bargaining. Technical Report. Economic Policy Institute. https://www.epi.org/publication/fear-at-work-how-employers-scare-workers-out-of-unionizing/
[37]
Ada Lerner, Eric Zeng, and Franziska Roesner. 2017. Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. In 2017 IEEE European Symposium on Security and Privacy (EuroS P). 385--400. https: //doi.org/10.1109/EuroSP.2017.41
[38]
Karen Levy and Solon Barocas. 2018. Privacy at the Margins| refractive surveillance: Monitoring customers to manage workers. International Journal of Communication 12 (2018), 23.
[39]
John Logan. 2006. The union avoidance industry in the United States. British Journal of Industrial Relations 44, 4 (2006), 651--675. Publisher: Wiley Online Library.
[40]
Elizabeth Lopatto. 2020. Susan Fowler on life after Uber: "I'm always looking over my shoulder". https://www.theverge. com/2020/2/19/21142081/susan-fowler-uber-whistleblower-interview-silicon-valley-discrimination-harassment
[41]
M.J. Masoodi, Nour Abdelaal, Stephanie Tran, Yuan Stevens, Sam Andrey, and Karim Bardeesy. 2021. Workplace Surveillance and Remote Work: Exploring the Impacts and Implications Amidst Covid-19 in Canada. Technical Report. Ryerson University, Cybersecure Policy Exchange. https://www.cybersecurepolicy.ca/workplace-surveillance
[42]
Jane F. McAlevey. 2016. No Shortcuts: Organizing for Power in the New Gilded Age. Oxford University Press. GoogleBooks-ID: UAsBDQAAQBAJ.
[43]
Allison McDonald, Catherine Barwulor, Michelle L. Mazurek, Florian Schaub, and Elissa M. Redmiles. 2021. "It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 375--392. https://www.usenix.org/conference/ usenixsecurity21/presentation/mcdonald
[44]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 1--23. https://doi.org/10.1145/3359174
[45]
Susan E. McGregor, Polina Charters, Tobin Holliday, and Franziska Roesner. 2015. Investigating the Computer Security Practices and Needs of Journalists. 399--414. https://www.usenix.org/conference/usenixsecurity15/technicalsessions/presentation/mcgregor
[46]
Susan E. McGregor, Elizabeth Anne Watkins, and Kelly Caine. 2017. Would You Slack That? The Impact of Security and Privacy on Cooperative Newsroom Work. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (Dec. 2017), 75:1--75:22. https://doi.org/10.1145/3134710
[47]
G. Daryl Nord, Tipton F. McCubbins, and Jeretta Horn Nord. 2006. E-monitoring in the workplace: privacy, legislation, and surveillance software. Commun. ACM 49, 8 (Aug. 2006), 72--77. https://doi.org/10.1145/1145287.1145290
[48]
Kentrell Owens, Camille Cobb, and Lorrie Cranor. 2021. ?You Gotta Watch What You Say": Surveillance of Communication with Incarcerated People. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Number 62. Association for Computing Machinery, New York, NY, USA, 1--18. https://doi.org/10.1145/ 3411764.3445055
[49]
Scott Pelley. 2021. Whistleblower: Facebook is misleading the public on progress against hate speech, violence, misinformation. https://www.cbsnews.com/news/facebook-whistleblower-frances-haugen-misinformation-public60-minutes-2021--10-03/
[50]
Rida Qadri. 2021. Platform workers as infrastructures of global technologies. Interactions 28, 4 (2021), 32--35. Publisher: ACM New York, NY, USA.
[51]
Noopur Raval. 2021. Interrupting invisibility in a global world. Interactions 28, 4 (2021), 27--31. Publisher: ACM New York, NY, USA.
[52]
Johnny Saldaña. 2021. The coding manual for qualitative researchers. SAGE.
[53]
Niloufar Salehi, Lilly C. Irani, Michael S. Bernstein, Ali Alkhatib, Eva Ogbe, Kristy Milland, and Clickhappier. 2015. We Are Dynamo: Overcoming Stalling and Friction in Collective Action for Crowd Workers. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). Association for Computing Machinery, New York, NY, USA, 1621--1630. https://doi.org/10.1145/2702123.2702508
[54]
Nithya Sambasivan. 2021. Seeing like a dataset from the global south. Interactions 28, 4 (2021), 76--78. Publisher: ACM New York, NY, USA.
[55]
M. A. Sasse and I. Flechais. 2005. Usable Security: Why Do We Need It? How Do We Get It? In In: Cranor, LF and Garfinkel, S, (eds.) Security and Usability: Designing secure systems that people can use. (13 - 30). O'Reilly: Sebastopol, US. (2005), L. F. Cranor and S. Garfinkel (Eds.). O'Reilly, Sebastopol, US, 13--30. http://shop.oreilly.com/product/9780596008277.do
[56]
Jessica Silver-Greenberg and Rachel Abrams. 2020. Fired in a Pandemic ?Because We Tried to Start a Union,' Workers Say. The New York Times (April 2020). https://www.nytimes.com/2020/04/28/business/coronavirus-unions-layoffs.html
[57]
Lucy Simko, Ada Lerner, Samia Ibtasam, Franziska Roesner, and Tadayoshi Kohno. 2018. Computer Security and Privacy for Refugees in the United States. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, 409--423. https://doi.org/10.1109/SP.2018.00023
[58]
D. K. Smetters and Nathan Good. 2009. How users use access control. In Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09). Association for Computing Machinery, New York, NY, USA, 1--12. https: //doi.org/10.1145/1572532.1572552
[59]
Susan Leigh Star and Anselm Strauss. 1999. Layers of silence, arenas of voice: The ecology of visible and invisible work. Computer supported cooperative work (CSCW) 8, 1 (1999), 9--30.
[60]
Ben Tarnoff. [n. d.]. The Making of the Tech Worker Movement. https://logicmag.io/the-making-of-the-tech-workermovement/full-text/
[61]
Ben Tarnoff, Clarissa Redwine, JS Tan, Kristen Sheets, Natalia Nedzhvetskaya, and Sarvesh Rajasekaran. 2020. About. https://collectiveaction.tech/about/
[62]
Iddo Tavory and Stefan Timmermans. 2014. Abductive analysis: Theorizing qualitative research. University of Chicago Press.
[63]
Daisuke Wakabayashi and Katie Benner. 2018. How Google Protected Andy Rubin, the ?Father of Android'. The New York Times (Oct. 2018). https://www.nytimes.com/2018/10/25/technology/google-sexual-harassment-andy-rubin.html
[64]
Alma Whitten and J Doug Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX security symposium, Vol. 348. 169--184.
[65]
Erin Woo. 2021. A Tech Whistle-Blower Helps Others Speak Out. The New York Times (Nov. 2021). https://www. nytimes.com/2021/11/24/technology/pinterest-whistle-blower-ifeoma-ozoma.html
[66]
Longqi Yang, David Holtz, Sonia Jaffe, Siddharth Suri, Shilpi Sinha, Jeffrey Weston, Connor Joyce, Neha Shah, Kevin Sherman, Brent Hecht, and Jaime Teevan. 2021. The effects of remote work on collaboration among information workers. Nature Human Behaviour (Sept. 2021), 1--12. https://doi.org/10.1038/s41562-021-01196--4 Bandiera_abtest: a Cg_type: Nature Research Journals Primary_atype: Research Publisher: Nature Publishing Group Subject_term: Business and management Subject_term_id: business-and-management.
[67]
Amy X Zhang, Grant Hugh, and Michael S Bernstein. 2020. PolicyKit: Building Governance in Online Communities. In Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology. 365--378.

Cited By

View all
  • (2024)Drinking Chai with Your (AI) Programming Partner: Value Tensions in the Tokenization of Future Human-AI Collaborative WorkProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663390(1-15)Online publication date: 25-Jun-2024
  • (2024)Autonomy, Affect, and Reframing: Unpacking the Data Practices of Grassroots Climate Justice ActivistsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661585(3016-3028)Online publication date: 1-Jul-2024
  • (2024)Networks of care in digital domestic labour economiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642200(1-16)Online publication date: 11-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
CSCW
November 2022
8205 pages
EISSN:2573-0142
DOI:10.1145/3571154
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2022
Published in PACMHCI Volume 6, Issue CSCW2

Check for updates

Author Tags

  1. collective action
  2. labor organizing
  3. privacy
  4. unionization

Qualifiers

  • Research-article

Funding Sources

  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)279
  • Downloads (Last 6 weeks)26
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Drinking Chai with Your (AI) Programming Partner: Value Tensions in the Tokenization of Future Human-AI Collaborative WorkProceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work10.1145/3663384.3663390(1-15)Online publication date: 25-Jun-2024
  • (2024)Autonomy, Affect, and Reframing: Unpacking the Data Practices of Grassroots Climate Justice ActivistsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661585(3016-3028)Online publication date: 1-Jul-2024
  • (2024)Networks of care in digital domestic labour economiesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642200(1-16)Online publication date: 11-May-2024
  • (2023)Augmented Datasheets for Speech Datasets and Ethical Decision-MakingProceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency10.1145/3593013.3594049(881-904)Online publication date: 12-Jun-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media