skip to main content


Title: Understanding workers, developing effective tasks, and enhancing marketplace dynamics: a study of a large crowdsourcing marketplace
Award ID(s):
1652750
NSF-PAR ID:
10056546
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Proceedings of the VLDB Endowment
Volume:
10
Issue:
7
ISSN:
2150-8097
Page Range / eLocation ID:
829 to 840
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract—Periods of unique economic distress such as the COVID-19 pandemic can be quite difficult for small businesses. Challenges acquiring the supplies necessary to adhere to safety regulations created in the wake of such events can introduce stress on these businesses. This is further exacerbated when supply chains have slowed down, leading to global shortages from most large suppliers. This paper proposes a platform to aid such businesses in procuring COVID-19 related supplies such as Personal Protective Equipment (PPE) from one another, leveraging advanced data acquisition, integration, and Natural Language Processing (NLP) methods. With the pandemic end in sight, the platform described in this paper can be reused for other emergencies such as hurricanes, floods, among others. The proposed platform supports business transactions within a Buyer’s Club (BC), keyword-based sourcing of new businesses to join the platform, and matching products to relevant regulations using greater-than-word length encoding, helping businesses comply with the ever-changing regulatory landscape. Index Terms—COVID-19, Disaster, Natural Language Processing, Data Acquisition, Data Retrieval, User Interfaces 
    more » « less
  2. null (Ed.)
    Data-driven machine learning has become ubiquitous. A marketplace for machine learning models connects data owners and model buyers, and can dramatically facilitate data-driven machine learning applications. In this paper, we take a formal data marketplace perspective and propose the first en D -to-end mod e l m a rketp l ace with diff e rential p r ivacy ( Dealer ) towards answering the following questions: How to formulate data owners' compensation functions and model buyers' price functions? How can the broker determine prices for a set of models to maximize the revenue with arbitrage-free guarantee, and train a set of models with maximum Shapley coverage given a manufacturing budget to remain competitive ? For the former, we propose compensation function for each data owner based on Shapley value and privacy sensitivity, and price function for each model buyer based on Shapley coverage sensitivity and noise sensitivity. Both privacy sensitivity and noise sensitivity are measured by the level of differential privacy. For the latter, we formulate two optimization problems for model pricing and model training, and propose efficient dynamic programming algorithms. Experiment results on the real chess dataset and synthetic datasets justify the design of Dealer and verify the efficiency and effectiveness of the proposed algorithms. 
    more » « less
  3. In Bounty Everything: Hackers and the Making of the Global Bug Marketplace, researchers Ryan Ellis and Yuan Stevens provide a window into the working lives of hackers who participate in “bug bounty” programs—programs that hire hackers to discover and report bugs or other vulnerabilities in their systems. This report illuminates the risks and insecurities for hackers as gig workers, and how bounty programs rely on vulnerable workers to fix their vulnerable systems. Ellis and Stevens’s research offers a historical overview of bounty programs and an analysis of contemporary bug bounty platforms​​—the new intermediaries that now structure the vast majority of bounty work. The report draws directly from interviews with hackers, who recount that bounty programs seem willing to integrate a diverse workforce in their practices, but only on terms that deny them the job security and access enjoyed by core security workforces. These inequities go far beyond the difference experienced by temporary and permanent employees at companies such as Google and Apple, contend the authors. The global bug bounty workforce is doing piecework—they are paid for each bug, and the conditions under which a bug is paid vary greatly from one company to the next. Bounty Everything offers to reimagine how bounty programs can better serve the interests of both computer security and the workers that protect our digital world. Ellis & Stevens argue that if bounty programs are not designed and implemented properly, “this model can ironically perpetuate a world full of bugs that uses a global pool of insecure workers to prop up a business model centered on rapid iteration and perpetual beta.” 
    more » « less