Labor platform scams are an opportunity to integrate scholarship about governance across social media and labor platforms. Labor platforms have borrowed governance mechanisms from social media to cultivate trust among users and remove problematic content. However, while these platforms may share governance strategies, labor platforms mediate employment relationships between workers and clients with different amounts of power. Based on a multistakeholder ethnography of carework labor platforms, online careworker forums, and interviews, this study describes scams on carework labor platforms. Labor platforms narrate workers into the role of technology consumers, constricting their own obligations to workers. Workers’ explanations of scams vary, with some contesting and others aligning with platform narratives. Some workers seek support in online forums, which remediate the harm of scams for some but also enroll workers in unpaid labor. These scams challenge the assumption of antagonism between the interests of workers and platform companies and highlight the consumerization of work.
Many have criticized the centralized and unaccountable governance of prominent online social platforms, leading to renewed interest in platform governance that incorporates multiple centers of power. Decentralization of power can arise horizontally, through parallel communities, each with local administration, and vertically, through multiple hierarchies of overlapping jurisdiction. Drawing from literature on federalism and polycentricity in analogous offline institutions, we scrutinize the landscape of existing platforms through the lens of multi-level governance. Our analysis describes how online platforms incorporate varying forms and degrees of decentralized governance. In particular, we propose a framework that characterizes the general design space and the various ways that middle levels of governance vary in how they can interact with a centralized governance system above and end users below. This focus provides a starting point for new lines of inquiry between platform- and community-governance scholarship. By engaging themes of decentralization, hierarchy, power, and responsibility, while discussing concrete examples, we connect designers and theorists of online spaces.
more » « less- PAR ID:
- 10516870
- Publisher / Repository:
- Sage
- Date Published:
- Journal Name:
- Social Media + Society
- Volume:
- 9
- Issue:
- 4
- ISSN:
- 2056-3051
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Abstract Many public services are co‐produced through networks of governmental and non‐governmental organizations that choose to or are obliged to contribute resources, a trend that has been reinforced through decentralization reforms. We utilize original data for 826 organizations across 65 local governance networks to assess how decentralization affects resource contributions while accounting for municipality context, network environment, and organizational attributes. Drawing on a quasi‐experimental design in the context of health sector reform in Honduras, we find that decentralization is associated with a slight reduction in the number of resource ties an organization contributes to other organizations in its network. This association is most prominent where municipal governments, rather than non‐governmental organizations (NGOs) or associations, are lead intermediary organizations under decentralization. Additionally, NGOs contribute more resource ties relative to community associations or public organizations, and consistent with a crowding‐out dynamic, we find that this relationship is attenuated under decentralization. Our results suggest that administrative reforms can influence resource contributing behavior by organizations and the structure of inter‐organizational networks, which are important but underemphasized mechanisms potentially linking decentralization to service delivery outcomes. This is particularly relevant for policymakers working to support network governance for the joint production of public services in under‐resourced settings.
-
The increasing harms caused by hate, harassment, and other forms of abuse online have motivated major platforms to explore hierarchical governance. The idea is to allow communities to have designated members take on moderation and leadership duties; meanwhile, members can still escalate issues to the platform. But these promising approaches have only been explored in plaintext settings where community content is public to the platform. It is unclear how one can realize hierarchical governance in the huge and increasing number of online communities that utilize end-to-end encrypted (E2EE) messaging for privacy. We propose the design of private, hierarchical governance systems. These should enable similar levels of community governance as in plaintext settings, while maintaining cryptographic privacy of content and governance actions not reported to the platform. We design the first such system, taking a layered approach that adds governance logic on top of an encrypted messaging protocol; we show how an extension to the message layer security (MLS) protocol suffices for achieving a rich set of governance policies. Our approach allows developers to rapidly prototype new governance features, taking inspiration from a plaintext system called PolicyKit. We report on an initial prototype encrypted messaging system called MlsGov that supports content-based community and platform moderation, elections of community moderators, votes to remove abusive users, and more.more » « less
-
Traditionally, spectrum allocation has been governed by centralized schemes (e.g., command-and-control). Nonetheless, other mechanisms, such as collaborative enforcement, have proven to be successful in a variety of scenarios. In Collaborative enforcement (i.e., collective action), the stakeholders agree on decision-making arrangements (i.e., access, allocation, and control of the resources) while being involved in monitoring the adherence to the rules as a shared effort. Blockchain is a distributed ledger of records/transactions (i.e., database) that brings many benefits such as decentralization, transparency, immutability, etc. One of the most notable characteristics of blockchain-based platforms is their definition as trust-less environments, as there is no central entity in charge of controlling the network interactions. Instead, trust is a group effort, achieved through repeated interactions, consensus algorithms, and cryptographic tools; therefore, converting blockchain systems into examples of collaborative governance regimes. In this paper, our goal is to analyze a particular application of blockchain and smart contracts for the 1695-1710MHz sharing scenario. In this way, we provide a theoretical analysis of the feasibility and the required characteristics to implement such a system. In addition, through the implementation of a Proof of Concept, we explore how the implementation of a blockchainbased organization can be the motor to build a collaborative governance scheme in the spectrum sharing arrangement of the 1695-1710MHz bandmore » « less
-
Home automation platforms provide a new level of convenience by enabling consumers to automate various aspects of physical objects in their homes. While the convenience is beneficial, security flaws in the platforms or integrated third-party products can have serious consequences for the integrity of a user's physical environment. In this paper we perform a systematic security evaluation of two popular smart home platforms, Google's Nest platform and Philips Hue, that implement home automation "routines" (i.e., trigger-action programs involving apps and devices) via manipulation of state variables in a centralized data store. Our semi-automated analysis examines, among other things, platform access control enforcement, the rigor of non-system enforcement procedures, and the potential for misuse of routines. This analysis results in ten key findings with serious security implications. For instance, we demonstrate the potential for the misuse of smart home routines in the Nest platform to perform a lateral privilege escalation, illustrate how Nest's product review system is ineffective at preventing multiple stages of this attack that it examines, and demonstrate how emerging platforms may fail to provide even bare-minimum security by allowing apps to arbitrarily add/remove other apps from the user's smart home. Our findings draw attention to the unique security challenges of platforms that execute routines via centralized data stores, and highlight the importance of enforcing security by design in emerging home automation platforms.more » « less