SlideShare une entreprise Scribd logo
1  sur  23
Michael Zimmer, PhD
Assistant Professor, School of Information Studies
Director, Center for Information Policy Research
University of Wisconsin-Milwaukee
www.MichaelZimmer.org
 Emergence of new technologies and technological environments
often lead to CONCEPTUAL GAPS in how we think about ethical
problems, and POLICY VACUUMS on how we can address them
 Computer technology transforms “many of our human activities and
social institutions,” and will “leave us with policy and conceptual
vacuums about how to use computer technology”
 “Often, either no policies for conduct in these situations exist or
existing policies seem inadequate”
 Jim Moor (1985). “What is Computer Ethics?”
Michael Zimmer | ALISE IE Webinar | August 30, 2016 2
 As ETHICISTS, we’re faced with new conceptual gaps in how we
think about some of the most fundamental principles of
research ethics, like privacy, consent, and harm
 As PRACTIONERS, we’re faced with new policy vacuums about
how we are to help researchers obtain, store, and share
datasets
Michael Zimmer | ALISE IE Webinar | August 30, 2016 3
Michael Zimmer | ALISE IE Webinar | August 30, 2016 4
 In 2006, AOL released over 20 million search queries from
658,000 of its users to the public in an attempt to support
academic research on search engine usage
 Despite AOL’s attempts to anonymize the data, individual users
remained identifiable based solely on their search histories
 which included search terms matching users’ names, social security
numbers, addresses, phone numbers, and other personally
identifiable information.
 Upon being identified by The New York Times based solely on
her search terms in the AOL database, a Georgia woman
exclaimed, “My goodness it’s my whole personal life…I had no
idea somebody was looking over my shoulder”
Michael Zimmer | ALISE IE Webinar | August 30, 2016 5
 Harvard-based “Tastes, Ties, and Time” (T3) research project
sought to understand social network dynamics of large groups of
students
 Worked with Facebook & an “anonymous” university to harvest
the Facebook profiles of an entire cohort of college freshmen
 Repeated each year for their 4-year tenure
 NSF mandated release of data, first wave in Sept 2008
“All the data is cleaned so you can’t
connect anyone to an identity”
Michael Zimmer | ALISE IE Webinar | August 30, 2016 6
 But dataset had unique cases and codes, making identifying the
“anonymous” university trivial
 Took me minimal effort to discern the source was Harvard,
and thus the anonymity (and privacy) of subjects in the study is
jeopardized
Michael Zimmer | ALISE IE Webinar | August 30, 2016 7
 Deal announced in 2010 that U.S. Library of Congress will archive
all public tweets
 At the time of the announcement, this meant 50 million new tweets per
day, with a historical archive of approximately 170 billion tweets
 6 month delay for new Tweets, restricted access to researchers only
 Open questions:
 Can users opt-out from being in permanent archive?
 Can users delete tweets from archive?
 Will geolocational and other metadata be included?
 What about a public tweet that is re-tweeting a private one?
 Did users ever expect their tweets to become permanent part of LOC’s
archives?
 6 years later, archive still not available
 Danish student researcher publicly released a dataset of nearly
70,000 users of the online dating site OkCupid, including
usernames, age, gender, location, what kind of relationship (or
sex) they’re interested in, personality traits, and answers to
thousands of profiling questions used by the site
Michael Zimmer | ALISE IE Webinar | August 30, 2016 9
Michael Zimmer | ALISE IE Webinar | August 30, 2016 10
 As ETHICISTS, we’re faced with new conceptual gaps in how we
think about some of the most fundamental principles of
research ethics, like privacy, consent, and harm
 As PRACTIONERS, we’re faced with new policy vacuums about
how we are to help researchers obtain, store, and share
datasets
Michael Zimmer | ALISE IE Webinar | August 30, 2016 11
 Presumption that because subjects make information available
on a OkCupid, Facebook, or Twitter, they don’t have an
expectation of privacy
 Researchers/IRBs might assume everything is always public, and was
meant to be
 Assumes no harm could come to subjects if data is already “public”
 New ethical problems…
 Need to track if ToS/architecture have changed, or if users even
understand what is available to researchers
 Ignores contextual nature of sharing
 Fails to recognize the strict dichotomy of public/private doesn’t
apply in a world of social & big data sets
 Presumption that because something is shared or available
within a community, the subject is consenting to it being
harvested for research
 Assumes users understand Terms of Service that might mention
“research”
 Assumes no harm can come from use of data already shared with
friends or other contextually-bound circles
 New ethical problems…
 Must recognize that a user making something public online comes
with a set of assumptions/expectations about who can access and
under what conditions
 Must recognize how research methods might allow un-anticipated
access to “restricted” data
 Users might not understand the technical conditions that enable
access to their data, nor the legal complexities of ToS agreements
 Presumption that “harm” means risk of physical or tangible
impact on subject
 Researchers often imply “data is already public, so what harm could
possibly happen”
 New ethical problems
 Must move beyond the concept of harm as requiring a tangible
consequence
 Protecting from harm is more than protecting from hackers, spammers,
identity thieves, etc
 Consider dignity/autonomy theories of harm
 Must a “wrong” occur for there to be damage to the subject?
 Do subjects deserve control over the use of their data streams?
 As ETHICISTS, we’re faced with new conceptual gaps in how we
think about some of the most fundamental principles of
research ethics, like privacy, consent, and harm
Michael Zimmer | ALISE IE Webinar | August 30, 2016 15
Michael Zimmer | ALISE IE Webinar | August 30, 2016 16
“With the appearance of big data,
open data, and particularly research
data curation on many libraries’
radar screens, data service has
become a critically important topic
for academic libraries”
 As ETHICISTS, we’re faced with new conceptual gaps in how we
think about some of the most fundamental principles of
research ethics, like privacy, consent, and harm
 As PRACTIONERS, we’re faced with new policy vacuums about
how we are to help researchers obtain, store, and share
datasets
Michael Zimmer | ALISE IE Webinar | August 30, 2016 17
 Data librarians might be tasked with assisting in obtaining data
sets for big data research
 Searching repositories for existing data sets shared by others
 Assisting with tools that scrape and collect data online
 New challenges:
 How do you confirm the provenance of data collected by others?
 Should a data librarian help locate controversial datasets?
 Can you use data that was later pulled from public accessibility?
 Data that was hacked or stolen?
 Can we ensure research subjects when scraping data with ad hoc
scraping tools?
 Should a data librarian require proof of IRB approval before assisting?
Michael Zimmer | ALISE IE Webinar | August 30, 2016 18
 Data librarians commonly asked to help with storing and
archiving research data
 Maintain institutional data repository
 Assist with drafting data management plans
 New challenges:
 Should library policy require de-identification of data prior to
storing?
 What kind of security must be in place? Simple access controls, or
full data encryption?
 Should any data be destroyed, rather than stored? How soon, and in
what way?
Michael Zimmer | ALISE IE Webinar | August 30, 2016 19
 Data librarians might act as gatekeepers for making institutional
data sets available to others
 New challenges:
 What kind of access policies should be in place? What kind of
limitations might be reasonable?
 Should data be “scrubbed” or de-identified prior to making it
publically available?
 How do we ensure secondary use is aligned with justification for the
initial collection of data?
Michael Zimmer | ALISE IE Webinar | August 30, 2016 20
 As ETHICISTS, we’re faced with new conceptual gaps in how we
think about some of the most fundamental principles of
research ethics, like privacy, consent, and harm
 As PRACTIONERS, we’re faced with new policy vacuums about
how we are to help researchers obtain, store, and share
datasets
Michael Zimmer | ALISE IE Webinar | August 30, 2016 21
 Buchanan, E. and C. Ess (2009). Internet Research Ethics and the Institutional
Review Board: Current Practices and Issues. Computers and Society, 39(3): 43–
49.
 Buchanan, E. and M. Zimmer (2016, Fall) "Internet Research Ethics", The
Stanford Encyclopedia of Philosophy
http://plato.stanford.edu/archives/fall2016/entries/ethics-internet-research/
 Markham, A., and Buchanan, E. (2012). Ethical Decision-Making and Internet
Research: Recommendations from the AoIR Ethics Working Committee
(Version 2.0). Association of Internet Researchers.
http://aoir.org/reports/ethics2.pdf
 Secretary’s Advisory Committee to the Office for Human Research Protections
(SACHRP), “Considerations and Recommendations Concerning Internet
Research and Human Subjects Research Regulations, with Revisions”
http://www.hhs.gov/ohrp/sites/default/files/ohrp/sachrp/mtgings/2013%20Mar
ch%20Mtg/internet_research.pdf
 Zimmer, M. (2010). “But the data is already public”: On the ethics of research
in Facebook. Ethics and Information Technology, 12(4), 313–325.
 Zimmer, M, and K. Kinder-Kurlanda (eds.) (forthcoming). Internet Research
Ethics for the Social Age: New Challenges, Cases, and Contexts. New York:
Peter Lang Publishing
Michael Zimmer | ALISE IE Webinar | August 30, 2016 22
Michael Zimmer, PhD
Assistant Professor, School of Information Studies
Director, Center for Information Policy Research
University of Wisconsin-Milwaukee
www.MichaelZimmer.org

Contenu connexe

Similaire à Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums

Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxrosiecabaniss
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
 
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the Beholder
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the BeholderMichael Edson @ Potomac Forum: Relevance is in the Eyes of the Beholder
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the BeholderMichael Edson
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
Ethics, Openness & the Future of Education
Ethics, Openness & the Future of EducationEthics, Openness & the Future of Education
Ethics, Openness & the Future of EducationOER Hub
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningRobert Farrow
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
Librarians & altmetrics: Tools, tips and use cases
Librarians & altmetrics: Tools, tips and use casesLibrarians & altmetrics: Tools, tips and use cases
Librarians & altmetrics: Tools, tips and use casesLibrary_Connect
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchNele Heise
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...The Higher Education Academy
 
Filter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speechFilter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speechSabina Cisek
 

Similaire à Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums (20)

Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the Beholder
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the BeholderMichael Edson @ Potomac Forum: Relevance is in the Eyes of the Beholder
Michael Edson @ Potomac Forum: Relevance is in the Eyes of the Beholder
 
code of etchics
code of etchicscode of etchics
code of etchics
 
From byte to mind
From byte to mindFrom byte to mind
From byte to mind
 
NISO Webinar: New Perspectives on Assessment How Altmetrics Measure Scholarly...
NISO Webinar: New Perspectives on Assessment How Altmetrics Measure Scholarly...NISO Webinar: New Perspectives on Assessment How Altmetrics Measure Scholarly...
NISO Webinar: New Perspectives on Assessment How Altmetrics Measure Scholarly...
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Ethics, Openness & the Future of Education
Ethics, Openness & the Future of EducationEthics, Openness & the Future of Education
Ethics, Openness & the Future of Education
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of Learning
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Librarians & altmetrics: Tools, tips and use cases
Librarians & altmetrics: Tools, tips and use casesLibrarians & altmetrics: Tools, tips and use cases
Librarians & altmetrics: Tools, tips and use cases
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online Research
 
Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
Filter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speechFilter bubble and information behaviour, ISIC 2018, keynote speech
Filter bubble and information behaviour, ISIC 2018, keynote speech
 

Plus de Michael Zimmer

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 

Plus de Michael Zimmer (20)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Dernier

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 

Dernier (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 

Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums

  • 1. Michael Zimmer, PhD Assistant Professor, School of Information Studies Director, Center for Information Policy Research University of Wisconsin-Milwaukee www.MichaelZimmer.org
  • 2.  Emergence of new technologies and technological environments often lead to CONCEPTUAL GAPS in how we think about ethical problems, and POLICY VACUUMS on how we can address them  Computer technology transforms “many of our human activities and social institutions,” and will “leave us with policy and conceptual vacuums about how to use computer technology”  “Often, either no policies for conduct in these situations exist or existing policies seem inadequate”  Jim Moor (1985). “What is Computer Ethics?” Michael Zimmer | ALISE IE Webinar | August 30, 2016 2
  • 3.  As ETHICISTS, we’re faced with new conceptual gaps in how we think about some of the most fundamental principles of research ethics, like privacy, consent, and harm  As PRACTIONERS, we’re faced with new policy vacuums about how we are to help researchers obtain, store, and share datasets Michael Zimmer | ALISE IE Webinar | August 30, 2016 3
  • 4. Michael Zimmer | ALISE IE Webinar | August 30, 2016 4
  • 5.  In 2006, AOL released over 20 million search queries from 658,000 of its users to the public in an attempt to support academic research on search engine usage  Despite AOL’s attempts to anonymize the data, individual users remained identifiable based solely on their search histories  which included search terms matching users’ names, social security numbers, addresses, phone numbers, and other personally identifiable information.  Upon being identified by The New York Times based solely on her search terms in the AOL database, a Georgia woman exclaimed, “My goodness it’s my whole personal life…I had no idea somebody was looking over my shoulder” Michael Zimmer | ALISE IE Webinar | August 30, 2016 5
  • 6.  Harvard-based “Tastes, Ties, and Time” (T3) research project sought to understand social network dynamics of large groups of students  Worked with Facebook & an “anonymous” university to harvest the Facebook profiles of an entire cohort of college freshmen  Repeated each year for their 4-year tenure  NSF mandated release of data, first wave in Sept 2008 “All the data is cleaned so you can’t connect anyone to an identity” Michael Zimmer | ALISE IE Webinar | August 30, 2016 6
  • 7.  But dataset had unique cases and codes, making identifying the “anonymous” university trivial  Took me minimal effort to discern the source was Harvard, and thus the anonymity (and privacy) of subjects in the study is jeopardized Michael Zimmer | ALISE IE Webinar | August 30, 2016 7
  • 8.  Deal announced in 2010 that U.S. Library of Congress will archive all public tweets  At the time of the announcement, this meant 50 million new tweets per day, with a historical archive of approximately 170 billion tweets  6 month delay for new Tweets, restricted access to researchers only  Open questions:  Can users opt-out from being in permanent archive?  Can users delete tweets from archive?  Will geolocational and other metadata be included?  What about a public tweet that is re-tweeting a private one?  Did users ever expect their tweets to become permanent part of LOC’s archives?  6 years later, archive still not available
  • 9.  Danish student researcher publicly released a dataset of nearly 70,000 users of the online dating site OkCupid, including usernames, age, gender, location, what kind of relationship (or sex) they’re interested in, personality traits, and answers to thousands of profiling questions used by the site Michael Zimmer | ALISE IE Webinar | August 30, 2016 9
  • 10. Michael Zimmer | ALISE IE Webinar | August 30, 2016 10
  • 11.  As ETHICISTS, we’re faced with new conceptual gaps in how we think about some of the most fundamental principles of research ethics, like privacy, consent, and harm  As PRACTIONERS, we’re faced with new policy vacuums about how we are to help researchers obtain, store, and share datasets Michael Zimmer | ALISE IE Webinar | August 30, 2016 11
  • 12.  Presumption that because subjects make information available on a OkCupid, Facebook, or Twitter, they don’t have an expectation of privacy  Researchers/IRBs might assume everything is always public, and was meant to be  Assumes no harm could come to subjects if data is already “public”  New ethical problems…  Need to track if ToS/architecture have changed, or if users even understand what is available to researchers  Ignores contextual nature of sharing  Fails to recognize the strict dichotomy of public/private doesn’t apply in a world of social & big data sets
  • 13.  Presumption that because something is shared or available within a community, the subject is consenting to it being harvested for research  Assumes users understand Terms of Service that might mention “research”  Assumes no harm can come from use of data already shared with friends or other contextually-bound circles  New ethical problems…  Must recognize that a user making something public online comes with a set of assumptions/expectations about who can access and under what conditions  Must recognize how research methods might allow un-anticipated access to “restricted” data  Users might not understand the technical conditions that enable access to their data, nor the legal complexities of ToS agreements
  • 14.  Presumption that “harm” means risk of physical or tangible impact on subject  Researchers often imply “data is already public, so what harm could possibly happen”  New ethical problems  Must move beyond the concept of harm as requiring a tangible consequence  Protecting from harm is more than protecting from hackers, spammers, identity thieves, etc  Consider dignity/autonomy theories of harm  Must a “wrong” occur for there to be damage to the subject?  Do subjects deserve control over the use of their data streams?
  • 15.  As ETHICISTS, we’re faced with new conceptual gaps in how we think about some of the most fundamental principles of research ethics, like privacy, consent, and harm Michael Zimmer | ALISE IE Webinar | August 30, 2016 15
  • 16. Michael Zimmer | ALISE IE Webinar | August 30, 2016 16 “With the appearance of big data, open data, and particularly research data curation on many libraries’ radar screens, data service has become a critically important topic for academic libraries”
  • 17.  As ETHICISTS, we’re faced with new conceptual gaps in how we think about some of the most fundamental principles of research ethics, like privacy, consent, and harm  As PRACTIONERS, we’re faced with new policy vacuums about how we are to help researchers obtain, store, and share datasets Michael Zimmer | ALISE IE Webinar | August 30, 2016 17
  • 18.  Data librarians might be tasked with assisting in obtaining data sets for big data research  Searching repositories for existing data sets shared by others  Assisting with tools that scrape and collect data online  New challenges:  How do you confirm the provenance of data collected by others?  Should a data librarian help locate controversial datasets?  Can you use data that was later pulled from public accessibility?  Data that was hacked or stolen?  Can we ensure research subjects when scraping data with ad hoc scraping tools?  Should a data librarian require proof of IRB approval before assisting? Michael Zimmer | ALISE IE Webinar | August 30, 2016 18
  • 19.  Data librarians commonly asked to help with storing and archiving research data  Maintain institutional data repository  Assist with drafting data management plans  New challenges:  Should library policy require de-identification of data prior to storing?  What kind of security must be in place? Simple access controls, or full data encryption?  Should any data be destroyed, rather than stored? How soon, and in what way? Michael Zimmer | ALISE IE Webinar | August 30, 2016 19
  • 20.  Data librarians might act as gatekeepers for making institutional data sets available to others  New challenges:  What kind of access policies should be in place? What kind of limitations might be reasonable?  Should data be “scrubbed” or de-identified prior to making it publically available?  How do we ensure secondary use is aligned with justification for the initial collection of data? Michael Zimmer | ALISE IE Webinar | August 30, 2016 20
  • 21.  As ETHICISTS, we’re faced with new conceptual gaps in how we think about some of the most fundamental principles of research ethics, like privacy, consent, and harm  As PRACTIONERS, we’re faced with new policy vacuums about how we are to help researchers obtain, store, and share datasets Michael Zimmer | ALISE IE Webinar | August 30, 2016 21
  • 22.  Buchanan, E. and C. Ess (2009). Internet Research Ethics and the Institutional Review Board: Current Practices and Issues. Computers and Society, 39(3): 43– 49.  Buchanan, E. and M. Zimmer (2016, Fall) "Internet Research Ethics", The Stanford Encyclopedia of Philosophy http://plato.stanford.edu/archives/fall2016/entries/ethics-internet-research/  Markham, A., and Buchanan, E. (2012). Ethical Decision-Making and Internet Research: Recommendations from the AoIR Ethics Working Committee (Version 2.0). Association of Internet Researchers. http://aoir.org/reports/ethics2.pdf  Secretary’s Advisory Committee to the Office for Human Research Protections (SACHRP), “Considerations and Recommendations Concerning Internet Research and Human Subjects Research Regulations, with Revisions” http://www.hhs.gov/ohrp/sites/default/files/ohrp/sachrp/mtgings/2013%20Mar ch%20Mtg/internet_research.pdf  Zimmer, M. (2010). “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313–325.  Zimmer, M, and K. Kinder-Kurlanda (eds.) (forthcoming). Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts. New York: Peter Lang Publishing Michael Zimmer | ALISE IE Webinar | August 30, 2016 22
  • 23. Michael Zimmer, PhD Assistant Professor, School of Information Studies Director, Center for Information Policy Research University of Wisconsin-Milwaukee www.MichaelZimmer.org

Notes de l'éditeur

  1. Researchers are hoping to advance our understanding of a phenomenon by making publicly available large datasets of user information they considered already in the public domain