SlideShare une entreprise Scribd logo
1  sur  28

Research Ethics in the 2.0 Era:
Conceptual Gaps for Ethicists, Researchers, IRBs

                                              PRIM&R Plenary Panel
                              “Would Margaret Mead Have Blogged?
                            How Social Media has Changed Research”
                                                  December 2, 2011

                                                      Michael Zimmer, PhD
                         Assistant Professor, School of Information Studies
                        Co-Director, Center for Information Policy Research
                                        University of Wisconsin-Milwaukee

                                                    zimmerm@uwm.edu
                                                  www.michaelzimmer.org
Agenda
 What are the Ethical Issues related to
  Internet Research?
   Selected cases

 Conceptual gaps

 Closing the gaps for researchers & IRBs
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Illuminating Cases
1. Sensitive blogs & confidentiality
2. Research on Tor network
3. Harvesting & archiving of “public” Twitter
   streams
4. Pete Warden’s harvesting (and proposed
   release) of public Facebook profiles
5. Tastes, Ties, and Time (T3) Facebook data
   release
Sensitive Blogs & Confidentiality
 Research on personal health blogs
   Content analysis of 40-50 blogs
   Online interview with 10 bloggers

 Subjects will choose their own
  pseudonym, but researcher plans to use real
  name of blogs and URL
   Must subjects consent to use of real blog
    name, even if publicly visible?
   Could pseudonyms be linked back to blogs?
Research on Tor Network
 Computer science researchers increasingly
  interested in network traffic on the Tor
  anonymity network
   What kind of traffic is on this network?
   What kind of users?
   Or, just capture Tor data as convenience sample

 But users of Tor are intentionally seeking
  additional privacy and anonymity
   Often not even vetted by IRBs
   Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
Harvesting Public Twitter Streams
    Is it ethical for researchers to follow and
        systematically capture public Twitter streams
        without first obtaining specific, informed
        consent by the subjects?
         Are tweets publications (texts), or utterances?
         What are users’ expectations to how their
          tweets are being found & used?
         What if a user later changes her privacy settings,
          or deletes tweets, etc

http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
LOC Archiving of Public Tweets
        Library of Congress will archive all public tweets
          6 month delay, restricted access to researchers only

        Open questions:
          Can users opt-out from being in permanent archive?
          Can users delete tweets from archive?
          Will geolocational and other profile data be
           included?
          What about a public tweet that is re-tweeting a
           private one?
          Did users ever expect their tweets to become
           permanent part of LOC’s archives?
http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
Pete Warden Facebook Dataset
 Exploited flaw in Facebook’s architecture to
  access and harvest publicly-viewable profile
  information of 215 million users




       http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
Pete Warden Facebook Dataset
         Planned to release entire dataset – with all
              personal information intact – to academic
              community
               Would it be acceptable to use this dataset?
               Users knew (?) data was public, but did they
                    expect it to be harvested by
                    bots, aggregated, and made available as raw
                    data?

         Under threat of lawsuit from
              Facebook, Warden destroyed the data
http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
T3 Facebook Project
          Harvard-based Tastes, Ties, and Time (T3)
               research project sought to understand social
               network dynamics of large groups of students
          Worked with Facebook & an “anonymous”
               university to harvest the Facebook profiles of an
               entire cohort of college freshmen
                Repeated each year for their 4-year tenure
                Co-mingled with other University data
                 (housing, major, etc)
                Coded for race, gender, political views, cultural
                 tastes, etc
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
T3 Data Release
          As an NSF-funded project, the dataset was
               made publicly available
                First phase released September 25, 2008
                One year of data (n=1,640)
                Prospective users must submit application to
                 gain access to dataset
                Detailed codebook available for anyone to access




Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
“Anonymity” of the T3 Dataset
                 “All the data is cleaned so you can’t connect
                            anyone to an identity”

         But dataset had unique cases (based on
              codebook)
         If we could identify the source university,
              individuals could potentially be identified
               Took me minimal effort to discern the source was
                    Harvard
         The anonymity (and privacy) of subjects in the
              study might be in jeopardy….
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
Good-Faith Efforts to Protect Subject
                                                    Privacy
         1. Only those data that were accessible by default
                by each RA were collected
         2. Removing/encoding of “identifying” information

         3. Tastes & interests (“cultural footprints”) will only
                be released after “substantial delay”
         4. To download, must agree to “Terms and
                Conditions of Use” statement
         5. Reviewed & approved by Harvard’s IRB
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
T3 Facebook Project




        Chronicle of Higher Education
                         July 10, 2011
Illuminating Cases
1. Sensitive blogs & confidentiality
2. Research on Tor network
3. Harvesting & archiving of “public” Twitter
   streams
4. Pete Warden’s harvesting (and proposed
   release) of public Facebook profiles
5. Tastes, Ties, and Time (T3) Facebook data
   release
What conceptual gaps about research ethics emerge?
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Conceptual Gap: Privacy
           Presumption that because subjects make information
                available on a blog, Facebook, or Twitter, they don’t
                have an expectation of privacy
                 Researchers/IRBs might assume everything is always
                  public, and was meant to be
                 Assumes no harm could come to subjects if data is
                  already “public”
           New ethical problems…
             Ignores contextual nature of sharing
             Fails to recognize the strict dichotomy of public/private
              doesn’t apply in the 2.0 world
             Need to track if ToS/architecture have changed, or if
              users even understand what is available to researchers

Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
Conceptual Gap: Anonymity vs.
                                                 Identifiability
         Presumption that stripping names & other
              obvious identifiers provides sufficient anonymity
               Assumes only PII allows re-identification

         New ethical problems…
           Ignores how anything can potentially identifiable
            information and become the “missing link” to re-
            identify an entire dataset
           “Anonymous” datasets are not achievable and
            provides false sense of protection
             But how can we share data safely?
Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
Conceptual Gap: Consent
 Presumption that because something is shared
   or available without a password, the subject is
   consenting to it being harvested for research
    Assumes no harm can come from use of data already
      shared with friends or other contextually-bound
      circles
 New ethical problems…
   Must recognize that a user making something public
    online comes with a set of
    assumptions/expectations about who can access
    and how
     Does anything outside this need specific consent?
   Must recognize how research methods might allow
    un-anticipated access to “restricted” data
Conceptual Gap: Harm
 Presumption that “harm” means risk of physical or
   tangible impact on subject
    Researchers often imply “data is already public, so what
      harm could possibly happen”
 New ethical problems
   Must move beyond the concept of harm as requiring a
    tangible consequence
     Protecting from harm is more than protecting from
       hackers, spammers, identity thieves, etc
   Consider dignity/autonomy theories of harm
     Must a “wrong” occur for there to be damage to the
       subject?
     Do subjects deserve control over the use of their data
       streams?
Conceptual Gap: Human Subjects
          Researchers (esp. CompSci) often interact only
               with datasets, objects, or avatars, thus feel a
               conceptual distance from an actual human
                Often don’t consider what they do as “human
                     subject” research

          New ethical problems
            Must bridge this (artificial) distance between
             researcher and the actual human subject
            Also consider other stakeholders within the complex
             arrangement of information intermediaries
Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical
Analysis in Computer Security Research”
Conceptual Gap: Honesty & Integrity
          Presumption that we must never falsify research
               data
                Tends to privilege positivist, quantitative research
                Presumes any sensitive data can easily be scrubbed
                     without impacting results
          New ethical problems…
            Scrubbing data completely can destroy valuable
             research results, yet concerns of privacy and
             identifiability persist
            Need to consider the ethics of fabrication
              Composite profiles, constructed quotes, fuzzy
                data

Markham, A. “Fabrication as Ethical Practice: Qualitative Inquiry in Ambiguous Internet Contexts”
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Conceptual Gaps  Policy Vacuums
 Researchers & IRBs are trying to do the right thing
   when faced with research projects relying on Internet
   tools and spaces
 But the fluidity and complexity of Internet tools and
   environments creates significant conceptual gaps
 Leaving researchers & IRBs with considerable policy
   vacuums
    How should researchers deal with using Internet tools in
     their projects?
    How should IRBs review them?

 And how can we still ensure research still gets done…
Removing the gaps, filling the vacuums
 Scholarship
   Buchanan & Ess studying how IRBs deal with
     Internet research
   Exploring new dimensions of Internet research
     ethics by Markham; Soghoian; Carpenter & Dittrich;
     and others (cited within)
 Resources
   “Internet Research Ethics Digital Library, Resource
    Center and Commons”
      http://www.InternetResearchEthics.org
    “Ethical decision-making and Internet research:
      Recommendations from the AoIR Ethics Working
      Committee”
Removing the gaps, filling the vacuums

 Education & outreach
   Growing focus at PRIM&R and related events
   Engage disciplinary conferences (ACM, ICA, etc)

 Policy guidance
   Advising SACHRP on “The Internet in Human
    Subjects Research”
     Require Internet Research Ethics training for
       all IRBs?

Research Ethics in the 2.0 Era:
Conceptual Gaps for Ethicists, Researchers, IRBs

                                              PRIM&R Plenary Panel
                              “Would Margaret Mead Have Blogged?
                            How Social Media has Changed Research”
                                                  December 2, 2011

                                                      Michael Zimmer, PhD
                         Assistant Professor, School of Information Studies
                        Co-Director, Center for Information Policy Research
                                        University of Wisconsin-Milwaukee

                                                    zimmerm@uwm.edu
                                                  www.michaelzimmer.org

Contenu connexe

Tendances

Weller pleasures+perils social media
Weller pleasures+perils social mediaWeller pleasures+perils social media
Weller pleasures+perils social mediaKatrin Weller
 
Dissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationDissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationPetter Bae Brandtzæg
 
The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09Elizabeth Brown
 
Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...berniehogan
 
The Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationThe Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationDarshan Patel
 
User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.Lynn Connaway
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Scholarly Social Machines
Scholarly Social MachinesScholarly Social Machines
Scholarly Social MachinesDavid De Roure
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Antonio Pintus
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningRobert Farrow
 
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Digital Methods Initiative
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveysValerie Irvine
 

Tendances (20)

Presentation Com546
Presentation Com546Presentation Com546
Presentation Com546
 
Weller pleasures+perils social media
Weller pleasures+perils social mediaWeller pleasures+perils social media
Weller pleasures+perils social media
 
Etica e Informatica
Etica e InformaticaEtica e Informatica
Etica e Informatica
 
Dissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationDissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research dissemination
 
The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09
 
Huang
HuangHuang
Huang
 
Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...
 
The Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationThe Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff Investigation
 
User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Scholarly Social Machines
Scholarly Social MachinesScholarly Social Machines
Scholarly Social Machines
 
Owade
OwadeOwade
Owade
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of Learning
 
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveys
 

Similaire à Research Ethics in the 2.0 Era

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative ResearchLisa Blenkinsop
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13Eric Meyer
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"summersocialwebshop
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for ResearchersRichard Hall
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesKrisKasianovitz
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social mediaFarida Vis
 
Research with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsResearch with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsToronto Metropolitan University
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationUniversity of Maryland
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 

Similaire à Research Ethics in the 2.0 Era (20)

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for Researchers
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish ExampleBlogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
 
Exploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social NetworksExploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social Networks
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
 
Research with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsResearch with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical Considerations
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social Participation
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 

Plus de Michael Zimmer

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 

Plus de Michael Zimmer (18)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Dernier

JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Research Ethics in the 2.0 Era

  • 1.  Research Ethics in the 2.0 Era: Conceptual Gaps for Ethicists, Researchers, IRBs PRIM&R Plenary Panel “Would Margaret Mead Have Blogged? How Social Media has Changed Research” December 2, 2011 Michael Zimmer, PhD Assistant Professor, School of Information Studies Co-Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org
  • 2. Agenda  What are the Ethical Issues related to Internet Research?  Selected cases  Conceptual gaps  Closing the gaps for researchers & IRBs
  • 3. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 4. Illuminating Cases 1. Sensitive blogs & confidentiality 2. Research on Tor network 3. Harvesting & archiving of “public” Twitter streams 4. Pete Warden’s harvesting (and proposed release) of public Facebook profiles 5. Tastes, Ties, and Time (T3) Facebook data release
  • 5. Sensitive Blogs & Confidentiality  Research on personal health blogs  Content analysis of 40-50 blogs  Online interview with 10 bloggers  Subjects will choose their own pseudonym, but researcher plans to use real name of blogs and URL  Must subjects consent to use of real blog name, even if publicly visible?  Could pseudonyms be linked back to blogs?
  • 6. Research on Tor Network  Computer science researchers increasingly interested in network traffic on the Tor anonymity network  What kind of traffic is on this network?  What kind of users?  Or, just capture Tor data as convenience sample  But users of Tor are intentionally seeking additional privacy and anonymity  Often not even vetted by IRBs Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
  • 7. Harvesting Public Twitter Streams  Is it ethical for researchers to follow and systematically capture public Twitter streams without first obtaining specific, informed consent by the subjects?  Are tweets publications (texts), or utterances?  What are users’ expectations to how their tweets are being found & used?  What if a user later changes her privacy settings, or deletes tweets, etc http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
  • 8. LOC Archiving of Public Tweets  Library of Congress will archive all public tweets  6 month delay, restricted access to researchers only  Open questions:  Can users opt-out from being in permanent archive?  Can users delete tweets from archive?  Will geolocational and other profile data be included?  What about a public tweet that is re-tweeting a private one?  Did users ever expect their tweets to become permanent part of LOC’s archives? http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
  • 9. Pete Warden Facebook Dataset  Exploited flaw in Facebook’s architecture to access and harvest publicly-viewable profile information of 215 million users http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
  • 10. Pete Warden Facebook Dataset  Planned to release entire dataset – with all personal information intact – to academic community  Would it be acceptable to use this dataset?  Users knew (?) data was public, but did they expect it to be harvested by bots, aggregated, and made available as raw data?  Under threat of lawsuit from Facebook, Warden destroyed the data http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
  • 11. T3 Facebook Project  Harvard-based Tastes, Ties, and Time (T3) research project sought to understand social network dynamics of large groups of students  Worked with Facebook & an “anonymous” university to harvest the Facebook profiles of an entire cohort of college freshmen  Repeated each year for their 4-year tenure  Co-mingled with other University data (housing, major, etc)  Coded for race, gender, political views, cultural tastes, etc Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 12. T3 Data Release  As an NSF-funded project, the dataset was made publicly available  First phase released September 25, 2008  One year of data (n=1,640)  Prospective users must submit application to gain access to dataset  Detailed codebook available for anyone to access Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 13. “Anonymity” of the T3 Dataset “All the data is cleaned so you can’t connect anyone to an identity”  But dataset had unique cases (based on codebook)  If we could identify the source university, individuals could potentially be identified  Took me minimal effort to discern the source was Harvard  The anonymity (and privacy) of subjects in the study might be in jeopardy…. Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 14. Good-Faith Efforts to Protect Subject Privacy 1. Only those data that were accessible by default by each RA were collected 2. Removing/encoding of “identifying” information 3. Tastes & interests (“cultural footprints”) will only be released after “substantial delay” 4. To download, must agree to “Terms and Conditions of Use” statement 5. Reviewed & approved by Harvard’s IRB Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 15. T3 Facebook Project Chronicle of Higher Education July 10, 2011
  • 16. Illuminating Cases 1. Sensitive blogs & confidentiality 2. Research on Tor network 3. Harvesting & archiving of “public” Twitter streams 4. Pete Warden’s harvesting (and proposed release) of public Facebook profiles 5. Tastes, Ties, and Time (T3) Facebook data release What conceptual gaps about research ethics emerge?
  • 17. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 18. Conceptual Gap: Privacy  Presumption that because subjects make information available on a blog, Facebook, or Twitter, they don’t have an expectation of privacy  Researchers/IRBs might assume everything is always public, and was meant to be  Assumes no harm could come to subjects if data is already “public”  New ethical problems…  Ignores contextual nature of sharing  Fails to recognize the strict dichotomy of public/private doesn’t apply in the 2.0 world  Need to track if ToS/architecture have changed, or if users even understand what is available to researchers Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
  • 19. Conceptual Gap: Anonymity vs. Identifiability  Presumption that stripping names & other obvious identifiers provides sufficient anonymity  Assumes only PII allows re-identification  New ethical problems…  Ignores how anything can potentially identifiable information and become the “missing link” to re- identify an entire dataset  “Anonymous” datasets are not achievable and provides false sense of protection  But how can we share data safely? Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
  • 20. Conceptual Gap: Consent  Presumption that because something is shared or available without a password, the subject is consenting to it being harvested for research  Assumes no harm can come from use of data already shared with friends or other contextually-bound circles  New ethical problems…  Must recognize that a user making something public online comes with a set of assumptions/expectations about who can access and how  Does anything outside this need specific consent?  Must recognize how research methods might allow un-anticipated access to “restricted” data
  • 21. Conceptual Gap: Harm  Presumption that “harm” means risk of physical or tangible impact on subject  Researchers often imply “data is already public, so what harm could possibly happen”  New ethical problems  Must move beyond the concept of harm as requiring a tangible consequence  Protecting from harm is more than protecting from hackers, spammers, identity thieves, etc  Consider dignity/autonomy theories of harm  Must a “wrong” occur for there to be damage to the subject?  Do subjects deserve control over the use of their data streams?
  • 22. Conceptual Gap: Human Subjects  Researchers (esp. CompSci) often interact only with datasets, objects, or avatars, thus feel a conceptual distance from an actual human  Often don’t consider what they do as “human subject” research  New ethical problems  Must bridge this (artificial) distance between researcher and the actual human subject  Also consider other stakeholders within the complex arrangement of information intermediaries Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research”
  • 23. Conceptual Gap: Honesty & Integrity  Presumption that we must never falsify research data  Tends to privilege positivist, quantitative research  Presumes any sensitive data can easily be scrubbed without impacting results  New ethical problems…  Scrubbing data completely can destroy valuable research results, yet concerns of privacy and identifiability persist  Need to consider the ethics of fabrication  Composite profiles, constructed quotes, fuzzy data Markham, A. “Fabrication as Ethical Practice: Qualitative Inquiry in Ambiguous Internet Contexts”
  • 24. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 25. Conceptual Gaps  Policy Vacuums  Researchers & IRBs are trying to do the right thing when faced with research projects relying on Internet tools and spaces  But the fluidity and complexity of Internet tools and environments creates significant conceptual gaps  Leaving researchers & IRBs with considerable policy vacuums  How should researchers deal with using Internet tools in their projects?  How should IRBs review them?  And how can we still ensure research still gets done…
  • 26. Removing the gaps, filling the vacuums  Scholarship  Buchanan & Ess studying how IRBs deal with Internet research  Exploring new dimensions of Internet research ethics by Markham; Soghoian; Carpenter & Dittrich; and others (cited within)  Resources  “Internet Research Ethics Digital Library, Resource Center and Commons” http://www.InternetResearchEthics.org  “Ethical decision-making and Internet research: Recommendations from the AoIR Ethics Working Committee”
  • 27. Removing the gaps, filling the vacuums  Education & outreach  Growing focus at PRIM&R and related events  Engage disciplinary conferences (ACM, ICA, etc)  Policy guidance  Advising SACHRP on “The Internet in Human Subjects Research”  Require Internet Research Ethics training for all IRBs?
  • 28.  Research Ethics in the 2.0 Era: Conceptual Gaps for Ethicists, Researchers, IRBs PRIM&R Plenary Panel “Would Margaret Mead Have Blogged? How Social Media has Changed Research” December 2, 2011 Michael Zimmer, PhD Assistant Professor, School of Information Studies Co-Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org