SlideShare une entreprise Scribd logo
1  sur  25

Research, the Cloud, and the IRB


                                          PRIM&R Workshop
                                           December 3, 2011

                                           Michael Zimmer, PhD
              Assistant Professor, School of Information Studies
             Co-Director, Center for Information Policy Research
                             University of Wisconsin-Milwaukee

                                         zimmerm@uwm.edu
                                       www.michaelzimmer.org
Agenda
 What is Cloud Computing
 Opportunities for Use in Research
 Ethical Dimensions
   Subject confidentiality & anonymity
   Data privacy & security
   Data ownership & stewardship
   Research integrity & authorship

 What can Researchers and IRBs do?
 What do Researchers and IRBs need?
What is Cloud Computing?




KEXINO (CC BY-NC-ND 2.0) http://www.flickr.com/photos/kexino/4202662815/
What is Cloud Computing?
 On-demand, network-based access to
  computing recourses
 Location independent, flexible, scalable, cost
  effective, little (if any) local support or
  maintenance
 As of September 2008, 69 percent of Americans
  were using webmail services, storing data
  online, or otherwise using software
  programs, such as word processing
  applications, whose functionality is located on
  the web.
3 Layers of Cloud Computing




http://en.wikipedia.org/wiki/File:Cloud_computing.svg (CC BY-SA 3.0)
Application Layer
 “Software as a service”

 Providing productivity applications via the
  Web; no local software needed
Platform Layer
 “Platform as a service”

 Providing application development platforms
  and operating systems via the Web
 Can deploy applications without needing
  your own infrastructure
Infrastructure Layer
 “Infrastructure as a service”

 Provide computing infrastructure on demand

 Outsourcing servers, storage, network
  equipment, processing power, data centers
3 Layers of Cloud Computing




http://en.wikipedia.org/wiki/File:Cloud_computing.svg (CC BY-SA 3.0)
Research Opportunities for Cloud
                             Computing
 Application layer
   Most common and easiest application of cloud
   Data gathering, storage, collaboration

 Platform layer
   Hosted apps for recruitment & surveys

 Infrastructure layer
   Access to increased processing power for large-
     scale research projects
   Some non-traditional uses
Research Opportunities: Applications
 Data gathering using web-based survey
  applications
   SurveyMonkey
   Zoomerang
   Qualtrics

 Typically used “in the wild”, sometimes
  institutionally-bound
Research Opportunities: Applications
 Data storage & sharing using cloud-based
  applications
   Dropbox
   Box.net
   iCloud

 Communication & collaboration using cloud-
  based applications
   Gmail, IM, Skype
   Google Docs, Office Live
   Wikis
Research Opportunities: Platforms
 With skilled programmers, can build custom
  apps to deploy via cloud-based platforms
   Subject recruitment and screening apps on
    Facebook
   Building and deploying test instruments within
    online gaming platforms
   Monitoring and activity tracking apps on mobile
    device platforms
Research Opportunities: Infrastructure
 Leverage cloud-based computing
  infrastructures to handle resource-intensive
  processing tasks
   Clinical trial data storage & processing
   Sharing extremely large databases

 Innovative, non-traditional use of cloud-
  based processing “resources”
   ____@Home (distributed computing)
   FoldIt
   Amazon Mechanical Turk
FoldIt
FoldIt
 Web-based puzzle video game to assist with
  protein folding research
 Leverage millions of gamers to assist in data
  processing
 Players produced an accurate 3D model of
  and AIDS-related enzyme in just ten days
   Researchers had been trying for 15 years
Amazon Mechanical Turk
 Facilitates outsourcing of computational or
  other mundane tasks
 Requesters post “Human Intelligence Tasks”
  offering minimal fees
 Workers select tasks to complete for
  micropayments
Ethical Dimensions
 Subject confidentiality & anonymity

 Data privacy & security

 Data ownership & stewardship

 Research integrity & authorship
Subject Confidentiality & Anonymity
 When recruiting subjects or collecting data
  with cloud-based applications…
   Are IP addresses logged in such a way to allow
    re-identification of subjects
   Using a Facebook app might provide researchers
    access to unnecessary personal information
   Are cloud providers tracking data and usage
    themselves? Delivering ads?
Data Privacy & Security
 Critical concern of any cloud system, takes on
  even more importance when dealing with
  subject data
   Are cloud-based communication and
    collaboration systems using SSL encryption?
   Is data stored on cloud-servers encrypted?
   What is service’s policy regarding 3rd party access
     Advertisers
     Investigative inquiry vs. subpoena vs. warrants?
     Electronic Communication Privacy Act (ECPA)
Data Ownership & Stewardship
 Who owns, and who controls (meta)data in
  the cloud?
   Are you granting the cloud provider any license to
    use your data or activities (for advertising, data
    mining, etc)?
   Can you ensure data remains in the U.S.?
   Can data be destroyed on demand, including
    backups?
   Can you ensure cloud provider won’t hold your
    data “hostage”, or disappear?
Research Integrity & Authorship
 Should researchers rely on cloud-based data
  processing and analysis?
   Must trust (audit?) external/collaborative
    processing platforms
   Ethical to use Mechanical Turk, or otherwise
    outsource mundane tasks?
   Authorship claims?
What can Researchers & IRBs do?
 Read and understand the Terms of Service
   Incorporate in risk analysis

 Include mention of cloud-based services in
  consent forms
   Level of detail?

 Monitor cloud services over life of project
   Have terms or practices changed?

 All this is new, complex, and difficult…
What do Researchers & IRBs need?
 Training in interpreting ToS

 Tools to help make translation between
  federal regulations and ToS, and evaluate
  protocols
 What else?

Contenu connexe

Tendances

Io t technologies_ppt-2
Io t technologies_ppt-2Io t technologies_ppt-2
Io t technologies_ppt-2achakracu
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5John Martin
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approachNam Giang
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloudijtsrd
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Zakaria Hossain
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructureieeechennai
 

Tendances (20)

Io t technologies_ppt-2
Io t technologies_ppt-2Io t technologies_ppt-2
Io t technologies_ppt-2
 
Research data management 1.5
Research data management 1.5Research data management 1.5
Research data management 1.5
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
Developing io t applications in the fog a distributed dataflow approach
Developing io t applications in the fog  a distributed dataflow approachDeveloping io t applications in the fog  a distributed dataflow approach
Developing io t applications in the fog a distributed dataflow approach
 
Study on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in CloudStudy on Secure Cryptographic Techniques in Cloud
Study on Secure Cryptographic Techniques in Cloud
 
B1802041217
B1802041217B1802041217
B1802041217
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Toward a global data infrastructure
Toward a global data infrastructureToward a global data infrastructure
Toward a global data infrastructure
 

En vedette

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 

En vedette (7)

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 

Similaire à Research, the Cloud, and the IRB

A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudJAVVAJI VENKATA RAO
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securityPratik Sharma
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 

Similaire à Research, the Cloud, and the IRB (20)

A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 

Plus de Michael Zimmer

Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 

Plus de Michael Zimmer (14)

Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 

Dernier

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Research, the Cloud, and the IRB

  • 1.  Research, the Cloud, and the IRB PRIM&R Workshop December 3, 2011 Michael Zimmer, PhD Assistant Professor, School of Information Studies Co-Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org
  • 2. Agenda  What is Cloud Computing  Opportunities for Use in Research  Ethical Dimensions  Subject confidentiality & anonymity  Data privacy & security  Data ownership & stewardship  Research integrity & authorship  What can Researchers and IRBs do?  What do Researchers and IRBs need?
  • 3. What is Cloud Computing? KEXINO (CC BY-NC-ND 2.0) http://www.flickr.com/photos/kexino/4202662815/
  • 4. What is Cloud Computing?  On-demand, network-based access to computing recourses  Location independent, flexible, scalable, cost effective, little (if any) local support or maintenance  As of September 2008, 69 percent of Americans were using webmail services, storing data online, or otherwise using software programs, such as word processing applications, whose functionality is located on the web.
  • 5. 3 Layers of Cloud Computing http://en.wikipedia.org/wiki/File:Cloud_computing.svg (CC BY-SA 3.0)
  • 6. Application Layer  “Software as a service”  Providing productivity applications via the Web; no local software needed
  • 7. Platform Layer  “Platform as a service”  Providing application development platforms and operating systems via the Web  Can deploy applications without needing your own infrastructure
  • 8. Infrastructure Layer  “Infrastructure as a service”  Provide computing infrastructure on demand  Outsourcing servers, storage, network equipment, processing power, data centers
  • 9. 3 Layers of Cloud Computing http://en.wikipedia.org/wiki/File:Cloud_computing.svg (CC BY-SA 3.0)
  • 10. Research Opportunities for Cloud Computing  Application layer  Most common and easiest application of cloud  Data gathering, storage, collaboration  Platform layer  Hosted apps for recruitment & surveys  Infrastructure layer  Access to increased processing power for large- scale research projects  Some non-traditional uses
  • 11. Research Opportunities: Applications  Data gathering using web-based survey applications  SurveyMonkey  Zoomerang  Qualtrics  Typically used “in the wild”, sometimes institutionally-bound
  • 12. Research Opportunities: Applications  Data storage & sharing using cloud-based applications  Dropbox  Box.net  iCloud  Communication & collaboration using cloud- based applications  Gmail, IM, Skype  Google Docs, Office Live  Wikis
  • 13. Research Opportunities: Platforms  With skilled programmers, can build custom apps to deploy via cloud-based platforms  Subject recruitment and screening apps on Facebook  Building and deploying test instruments within online gaming platforms  Monitoring and activity tracking apps on mobile device platforms
  • 14. Research Opportunities: Infrastructure  Leverage cloud-based computing infrastructures to handle resource-intensive processing tasks  Clinical trial data storage & processing  Sharing extremely large databases  Innovative, non-traditional use of cloud- based processing “resources”  ____@Home (distributed computing)  FoldIt  Amazon Mechanical Turk
  • 16. FoldIt  Web-based puzzle video game to assist with protein folding research  Leverage millions of gamers to assist in data processing  Players produced an accurate 3D model of and AIDS-related enzyme in just ten days  Researchers had been trying for 15 years
  • 17. Amazon Mechanical Turk  Facilitates outsourcing of computational or other mundane tasks  Requesters post “Human Intelligence Tasks” offering minimal fees  Workers select tasks to complete for micropayments
  • 18.
  • 19. Ethical Dimensions  Subject confidentiality & anonymity  Data privacy & security  Data ownership & stewardship  Research integrity & authorship
  • 20. Subject Confidentiality & Anonymity  When recruiting subjects or collecting data with cloud-based applications…  Are IP addresses logged in such a way to allow re-identification of subjects  Using a Facebook app might provide researchers access to unnecessary personal information  Are cloud providers tracking data and usage themselves? Delivering ads?
  • 21. Data Privacy & Security  Critical concern of any cloud system, takes on even more importance when dealing with subject data  Are cloud-based communication and collaboration systems using SSL encryption?  Is data stored on cloud-servers encrypted?  What is service’s policy regarding 3rd party access  Advertisers  Investigative inquiry vs. subpoena vs. warrants?  Electronic Communication Privacy Act (ECPA)
  • 22. Data Ownership & Stewardship  Who owns, and who controls (meta)data in the cloud?  Are you granting the cloud provider any license to use your data or activities (for advertising, data mining, etc)?  Can you ensure data remains in the U.S.?  Can data be destroyed on demand, including backups?  Can you ensure cloud provider won’t hold your data “hostage”, or disappear?
  • 23. Research Integrity & Authorship  Should researchers rely on cloud-based data processing and analysis?  Must trust (audit?) external/collaborative processing platforms  Ethical to use Mechanical Turk, or otherwise outsource mundane tasks?  Authorship claims?
  • 24. What can Researchers & IRBs do?  Read and understand the Terms of Service  Incorporate in risk analysis  Include mention of cloud-based services in consent forms  Level of detail?  Monitor cloud services over life of project  Have terms or practices changed?  All this is new, complex, and difficult…
  • 25. What do Researchers & IRBs need?  Training in interpreting ToS  Tools to help make translation between federal regulations and ToS, and evaluate protocols  What else?