SlideShare ist ein Scribd-Unternehmen logo
1 von 28

Research Ethics in the 2.0 Era:
Conceptual Gaps for Ethicists, Researchers, IRBs

                                              PRIM&R Plenary Panel
                              “Would Margaret Mead Have Blogged?
                            How Social Media has Changed Research”
                                                  December 2, 2011

                                                      Michael Zimmer, PhD
                         Assistant Professor, School of Information Studies
                        Co-Director, Center for Information Policy Research
                                        University of Wisconsin-Milwaukee

                                                    zimmerm@uwm.edu
                                                  www.michaelzimmer.org
Agenda
 What are the Ethical Issues related to
  Internet Research?
   Selected cases

 Conceptual gaps

 Closing the gaps for researchers & IRBs
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Illuminating Cases
1. Sensitive blogs & confidentiality
2. Research on Tor network
3. Harvesting & archiving of “public” Twitter
   streams
4. Pete Warden’s harvesting (and proposed
   release) of public Facebook profiles
5. Tastes, Ties, and Time (T3) Facebook data
   release
Sensitive Blogs & Confidentiality
 Research on personal health blogs
   Content analysis of 40-50 blogs
   Online interview with 10 bloggers

 Subjects will choose their own
  pseudonym, but researcher plans to use real
  name of blogs and URL
   Must subjects consent to use of real blog
    name, even if publicly visible?
   Could pseudonyms be linked back to blogs?
Research on Tor Network
 Computer science researchers increasingly
  interested in network traffic on the Tor
  anonymity network
   What kind of traffic is on this network?
   What kind of users?
   Or, just capture Tor data as convenience sample

 But users of Tor are intentionally seeking
  additional privacy and anonymity
   Often not even vetted by IRBs
   Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
Harvesting Public Twitter Streams
    Is it ethical for researchers to follow and
        systematically capture public Twitter streams
        without first obtaining specific, informed
        consent by the subjects?
         Are tweets publications (texts), or utterances?
         What are users’ expectations to how their
          tweets are being found & used?
         What if a user later changes her privacy settings,
          or deletes tweets, etc

http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
LOC Archiving of Public Tweets
        Library of Congress will archive all public tweets
          6 month delay, restricted access to researchers only

        Open questions:
          Can users opt-out from being in permanent archive?
          Can users delete tweets from archive?
          Will geolocational and other profile data be
           included?
          What about a public tweet that is re-tweeting a
           private one?
          Did users ever expect their tweets to become
           permanent part of LOC’s archives?
http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
Pete Warden Facebook Dataset
 Exploited flaw in Facebook’s architecture to
  access and harvest publicly-viewable profile
  information of 215 million users




       http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
Pete Warden Facebook Dataset
         Planned to release entire dataset – with all
              personal information intact – to academic
              community
               Would it be acceptable to use this dataset?
               Users knew (?) data was public, but did they
                    expect it to be harvested by
                    bots, aggregated, and made available as raw
                    data?

         Under threat of lawsuit from
              Facebook, Warden destroyed the data
http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
T3 Facebook Project
          Harvard-based Tastes, Ties, and Time (T3)
               research project sought to understand social
               network dynamics of large groups of students
          Worked with Facebook & an “anonymous”
               university to harvest the Facebook profiles of an
               entire cohort of college freshmen
                Repeated each year for their 4-year tenure
                Co-mingled with other University data
                 (housing, major, etc)
                Coded for race, gender, political views, cultural
                 tastes, etc
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
T3 Data Release
          As an NSF-funded project, the dataset was
               made publicly available
                First phase released September 25, 2008
                One year of data (n=1,640)
                Prospective users must submit application to
                 gain access to dataset
                Detailed codebook available for anyone to access




Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
“Anonymity” of the T3 Dataset
                 “All the data is cleaned so you can’t connect
                            anyone to an identity”

         But dataset had unique cases (based on
              codebook)
         If we could identify the source university,
              individuals could potentially be identified
               Took me minimal effort to discern the source was
                    Harvard
         The anonymity (and privacy) of subjects in the
              study might be in jeopardy….
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
Good-Faith Efforts to Protect Subject
                                                    Privacy
         1. Only those data that were accessible by default
                by each RA were collected
         2. Removing/encoding of “identifying” information

         3. Tastes & interests (“cultural footprints”) will only
                be released after “substantial delay”
         4. To download, must agree to “Terms and
                Conditions of Use” statement
         5. Reviewed & approved by Harvard’s IRB
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
T3 Facebook Project




        Chronicle of Higher Education
                         July 10, 2011
Illuminating Cases
1. Sensitive blogs & confidentiality
2. Research on Tor network
3. Harvesting & archiving of “public” Twitter
   streams
4. Pete Warden’s harvesting (and proposed
   release) of public Facebook profiles
5. Tastes, Ties, and Time (T3) Facebook data
   release
What conceptual gaps about research ethics emerge?
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Conceptual Gap: Privacy
           Presumption that because subjects make information
                available on a blog, Facebook, or Twitter, they don’t
                have an expectation of privacy
                 Researchers/IRBs might assume everything is always
                  public, and was meant to be
                 Assumes no harm could come to subjects if data is
                  already “public”
           New ethical problems…
             Ignores contextual nature of sharing
             Fails to recognize the strict dichotomy of public/private
              doesn’t apply in the 2.0 world
             Need to track if ToS/architecture have changed, or if
              users even understand what is available to researchers

Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
Conceptual Gap: Anonymity vs.
                                                 Identifiability
         Presumption that stripping names & other
              obvious identifiers provides sufficient anonymity
               Assumes only PII allows re-identification

         New ethical problems…
           Ignores how anything can potentially identifiable
            information and become the “missing link” to re-
            identify an entire dataset
           “Anonymous” datasets are not achievable and
            provides false sense of protection
             But how can we share data safely?
Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
Conceptual Gap: Consent
 Presumption that because something is shared
   or available without a password, the subject is
   consenting to it being harvested for research
    Assumes no harm can come from use of data already
      shared with friends or other contextually-bound
      circles
 New ethical problems…
   Must recognize that a user making something public
    online comes with a set of
    assumptions/expectations about who can access
    and how
     Does anything outside this need specific consent?
   Must recognize how research methods might allow
    un-anticipated access to “restricted” data
Conceptual Gap: Harm
 Presumption that “harm” means risk of physical or
   tangible impact on subject
    Researchers often imply “data is already public, so what
      harm could possibly happen”
 New ethical problems
   Must move beyond the concept of harm as requiring a
    tangible consequence
     Protecting from harm is more than protecting from
       hackers, spammers, identity thieves, etc
   Consider dignity/autonomy theories of harm
     Must a “wrong” occur for there to be damage to the
       subject?
     Do subjects deserve control over the use of their data
       streams?
Conceptual Gap: Human Subjects
          Researchers (esp. CompSci) often interact only
               with datasets, objects, or avatars, thus feel a
               conceptual distance from an actual human
                Often don’t consider what they do as “human
                     subject” research

          New ethical problems
            Must bridge this (artificial) distance between
             researcher and the actual human subject
            Also consider other stakeholders within the complex
             arrangement of information intermediaries
Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical
Analysis in Computer Security Research”
Conceptual Gap: Honesty & Integrity
          Presumption that we must never falsify research
               data
                Tends to privilege positivist, quantitative research
                Presumes any sensitive data can easily be scrubbed
                     without impacting results
          New ethical problems…
            Scrubbing data completely can destroy valuable
             research results, yet concerns of privacy and
             identifiability persist
            Need to consider the ethics of fabrication
              Composite profiles, constructed quotes, fuzzy
                data

Markham, A. “Fabrication as Ethical Practice: Qualitative Inquiry in Ambiguous Internet Contexts”
Ethical Concerns
 The growing use of internet tools, platforms
  & environments in research creates
  conceptual gaps in our current understanding
  of / approaches to key ethical issues:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
   Honesty & Research integrity
Conceptual Gaps  Policy Vacuums
 Researchers & IRBs are trying to do the right thing
   when faced with research projects relying on Internet
   tools and spaces
 But the fluidity and complexity of Internet tools and
   environments creates significant conceptual gaps
 Leaving researchers & IRBs with considerable policy
   vacuums
    How should researchers deal with using Internet tools in
     their projects?
    How should IRBs review them?

 And how can we still ensure research still gets done…
Removing the gaps, filling the vacuums
 Scholarship
   Buchanan & Ess studying how IRBs deal with
     Internet research
   Exploring new dimensions of Internet research
     ethics by Markham; Soghoian; Carpenter & Dittrich;
     and others (cited within)
 Resources
   “Internet Research Ethics Digital Library, Resource
    Center and Commons”
      http://www.InternetResearchEthics.org
    “Ethical decision-making and Internet research:
      Recommendations from the AoIR Ethics Working
      Committee”
Removing the gaps, filling the vacuums

 Education & outreach
   Growing focus at PRIM&R and related events
   Engage disciplinary conferences (ACM, ICA, etc)

 Policy guidance
   Advising SACHRP on “The Internet in Human
    Subjects Research”
     Require Internet Research Ethics training for
       all IRBs?

Research Ethics in the 2.0 Era:
Conceptual Gaps for Ethicists, Researchers, IRBs

                                              PRIM&R Plenary Panel
                              “Would Margaret Mead Have Blogged?
                            How Social Media has Changed Research”
                                                  December 2, 2011

                                                      Michael Zimmer, PhD
                         Assistant Professor, School of Information Studies
                        Co-Director, Center for Information Policy Research
                                        University of Wisconsin-Milwaukee

                                                    zimmerm@uwm.edu
                                                  www.michaelzimmer.org

Weitere ähnliche Inhalte

Was ist angesagt?

Weller pleasures+perils social media
Weller pleasures+perils social mediaWeller pleasures+perils social media
Weller pleasures+perils social mediaKatrin Weller
 
Dissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationDissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationPetter Bae Brandtzæg
 
The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09Elizabeth Brown
 
Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...berniehogan
 
The Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationThe Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationDarshan Patel
 
User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.Lynn Connaway
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Scholarly Social Machines
Scholarly Social MachinesScholarly Social Machines
Scholarly Social MachinesDavid De Roure
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Antonio Pintus
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningRobert Farrow
 
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Digital Methods Initiative
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveysValerie Irvine
 

Was ist angesagt? (20)

Presentation Com546
Presentation Com546Presentation Com546
Presentation Com546
 
Weller pleasures+perils social media
Weller pleasures+perils social mediaWeller pleasures+perils social media
Weller pleasures+perils social media
 
Etica e Informatica
Etica e InformaticaEtica e Informatica
Etica e Informatica
 
Dissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research disseminationDissemination 2.0 - the role of social media in research dissemination
Dissemination 2.0 - the role of social media in research dissemination
 
The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09The Chemist's Toolkit 10 9 09
The Chemist's Toolkit 10 9 09
 
Huang
HuangHuang
Huang
 
Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...Ethical challenges for online social science research: Networks, rentals and ...
Ethical challenges for online social science research: Networks, rentals and ...
 
The Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff InvestigationThe Daily Illini- Chief of Staff Investigation
The Daily Illini- Chief of Staff Investigation
 
User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.User-centered research for developing programs & articulating value.
User-centered research for developing programs & articulating value.
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
The Internet, Science, and Transformations of Knowledge (Ralph Schroeder)
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Scholarly Social Machines
Scholarly Social MachinesScholarly Social Machines
Scholarly Social Machines
 
Owade
OwadeOwade
Owade
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011Paraimpu: a social tool for the Web of Things @ WoT2011
Paraimpu: a social tool for the Web of Things @ WoT2011
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Ethics, Openness and the Future of Learning
Ethics, Openness and the Future of LearningEthics, Openness and the Future of Learning
Ethics, Openness and the Future of Learning
 
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_Rogers digitalmethodsaftersocialmedia nov2013_optimized_
Rogers digitalmethodsaftersocialmedia nov2013_optimized_
 
Edmedia2011 online.surveys
Edmedia2011 online.surveysEdmedia2011 online.surveys
Edmedia2011 online.surveys
 

Ähnlich wie Research Ethics in the 2.0 Era

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative ResearchLisa Blenkinsop
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13Eric Meyer
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"summersocialwebshop
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for ResearchersRichard Hall
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesKrisKasianovitz
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social mediaFarida Vis
 
Research with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsResearch with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsToronto Metropolitan University
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationUniversity of Maryland
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 

Ähnlich wie Research Ethics in the 2.0 Era (20)

New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for Researchers
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish ExampleBlogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
 
Exploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social NetworksExploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social Networks
 
The evolution of research on social media
The evolution of research on social mediaThe evolution of research on social media
The evolution of research on social media
 
Research with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical ConsiderationsResearch with Social Media Data: Stewardship & Ethical Considerations
Research with Social Media Data: Stewardship & Ethical Considerations
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Summer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social ParticipationSummer Social Webshop: Technology-Mediated Social Participation
Summer Social Webshop: Technology-Mediated Social Participation
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 

Mehr von Michael Zimmer

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 

Mehr von Michael Zimmer (18)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Kürzlich hochgeladen

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Kürzlich hochgeladen (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Research Ethics in the 2.0 Era

  • 1.  Research Ethics in the 2.0 Era: Conceptual Gaps for Ethicists, Researchers, IRBs PRIM&R Plenary Panel “Would Margaret Mead Have Blogged? How Social Media has Changed Research” December 2, 2011 Michael Zimmer, PhD Assistant Professor, School of Information Studies Co-Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org
  • 2. Agenda  What are the Ethical Issues related to Internet Research?  Selected cases  Conceptual gaps  Closing the gaps for researchers & IRBs
  • 3. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 4. Illuminating Cases 1. Sensitive blogs & confidentiality 2. Research on Tor network 3. Harvesting & archiving of “public” Twitter streams 4. Pete Warden’s harvesting (and proposed release) of public Facebook profiles 5. Tastes, Ties, and Time (T3) Facebook data release
  • 5. Sensitive Blogs & Confidentiality  Research on personal health blogs  Content analysis of 40-50 blogs  Online interview with 10 bloggers  Subjects will choose their own pseudonym, but researcher plans to use real name of blogs and URL  Must subjects consent to use of real blog name, even if publicly visible?  Could pseudonyms be linked back to blogs?
  • 6. Research on Tor Network  Computer science researchers increasingly interested in network traffic on the Tor anonymity network  What kind of traffic is on this network?  What kind of users?  Or, just capture Tor data as convenience sample  But users of Tor are intentionally seeking additional privacy and anonymity  Often not even vetted by IRBs Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
  • 7. Harvesting Public Twitter Streams  Is it ethical for researchers to follow and systematically capture public Twitter streams without first obtaining specific, informed consent by the subjects?  Are tweets publications (texts), or utterances?  What are users’ expectations to how their tweets are being found & used?  What if a user later changes her privacy settings, or deletes tweets, etc http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
  • 8. LOC Archiving of Public Tweets  Library of Congress will archive all public tweets  6 month delay, restricted access to researchers only  Open questions:  Can users opt-out from being in permanent archive?  Can users delete tweets from archive?  Will geolocational and other profile data be included?  What about a public tweet that is re-tweeting a private one?  Did users ever expect their tweets to become permanent part of LOC’s archives? http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
  • 9. Pete Warden Facebook Dataset  Exploited flaw in Facebook’s architecture to access and harvest publicly-viewable profile information of 215 million users http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
  • 10. Pete Warden Facebook Dataset  Planned to release entire dataset – with all personal information intact – to academic community  Would it be acceptable to use this dataset?  Users knew (?) data was public, but did they expect it to be harvested by bots, aggregated, and made available as raw data?  Under threat of lawsuit from Facebook, Warden destroyed the data http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
  • 11. T3 Facebook Project  Harvard-based Tastes, Ties, and Time (T3) research project sought to understand social network dynamics of large groups of students  Worked with Facebook & an “anonymous” university to harvest the Facebook profiles of an entire cohort of college freshmen  Repeated each year for their 4-year tenure  Co-mingled with other University data (housing, major, etc)  Coded for race, gender, political views, cultural tastes, etc Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 12. T3 Data Release  As an NSF-funded project, the dataset was made publicly available  First phase released September 25, 2008  One year of data (n=1,640)  Prospective users must submit application to gain access to dataset  Detailed codebook available for anyone to access Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 13. “Anonymity” of the T3 Dataset “All the data is cleaned so you can’t connect anyone to an identity”  But dataset had unique cases (based on codebook)  If we could identify the source university, individuals could potentially be identified  Took me minimal effort to discern the source was Harvard  The anonymity (and privacy) of subjects in the study might be in jeopardy…. Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 14. Good-Faith Efforts to Protect Subject Privacy 1. Only those data that were accessible by default by each RA were collected 2. Removing/encoding of “identifying” information 3. Tastes & interests (“cultural footprints”) will only be released after “substantial delay” 4. To download, must agree to “Terms and Conditions of Use” statement 5. Reviewed & approved by Harvard’s IRB Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 15. T3 Facebook Project Chronicle of Higher Education July 10, 2011
  • 16. Illuminating Cases 1. Sensitive blogs & confidentiality 2. Research on Tor network 3. Harvesting & archiving of “public” Twitter streams 4. Pete Warden’s harvesting (and proposed release) of public Facebook profiles 5. Tastes, Ties, and Time (T3) Facebook data release What conceptual gaps about research ethics emerge?
  • 17. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 18. Conceptual Gap: Privacy  Presumption that because subjects make information available on a blog, Facebook, or Twitter, they don’t have an expectation of privacy  Researchers/IRBs might assume everything is always public, and was meant to be  Assumes no harm could come to subjects if data is already “public”  New ethical problems…  Ignores contextual nature of sharing  Fails to recognize the strict dichotomy of public/private doesn’t apply in the 2.0 world  Need to track if ToS/architecture have changed, or if users even understand what is available to researchers Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
  • 19. Conceptual Gap: Anonymity vs. Identifiability  Presumption that stripping names & other obvious identifiers provides sufficient anonymity  Assumes only PII allows re-identification  New ethical problems…  Ignores how anything can potentially identifiable information and become the “missing link” to re- identify an entire dataset  “Anonymous” datasets are not achievable and provides false sense of protection  But how can we share data safely? Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
  • 20. Conceptual Gap: Consent  Presumption that because something is shared or available without a password, the subject is consenting to it being harvested for research  Assumes no harm can come from use of data already shared with friends or other contextually-bound circles  New ethical problems…  Must recognize that a user making something public online comes with a set of assumptions/expectations about who can access and how  Does anything outside this need specific consent?  Must recognize how research methods might allow un-anticipated access to “restricted” data
  • 21. Conceptual Gap: Harm  Presumption that “harm” means risk of physical or tangible impact on subject  Researchers often imply “data is already public, so what harm could possibly happen”  New ethical problems  Must move beyond the concept of harm as requiring a tangible consequence  Protecting from harm is more than protecting from hackers, spammers, identity thieves, etc  Consider dignity/autonomy theories of harm  Must a “wrong” occur for there to be damage to the subject?  Do subjects deserve control over the use of their data streams?
  • 22. Conceptual Gap: Human Subjects  Researchers (esp. CompSci) often interact only with datasets, objects, or avatars, thus feel a conceptual distance from an actual human  Often don’t consider what they do as “human subject” research  New ethical problems  Must bridge this (artificial) distance between researcher and the actual human subject  Also consider other stakeholders within the complex arrangement of information intermediaries Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research”
  • 23. Conceptual Gap: Honesty & Integrity  Presumption that we must never falsify research data  Tends to privilege positivist, quantitative research  Presumes any sensitive data can easily be scrubbed without impacting results  New ethical problems…  Scrubbing data completely can destroy valuable research results, yet concerns of privacy and identifiability persist  Need to consider the ethics of fabrication  Composite profiles, constructed quotes, fuzzy data Markham, A. “Fabrication as Ethical Practice: Qualitative Inquiry in Ambiguous Internet Contexts”
  • 24. Ethical Concerns  The growing use of internet tools, platforms & environments in research creates conceptual gaps in our current understanding of / approaches to key ethical issues:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  Honesty & Research integrity
  • 25. Conceptual Gaps  Policy Vacuums  Researchers & IRBs are trying to do the right thing when faced with research projects relying on Internet tools and spaces  But the fluidity and complexity of Internet tools and environments creates significant conceptual gaps  Leaving researchers & IRBs with considerable policy vacuums  How should researchers deal with using Internet tools in their projects?  How should IRBs review them?  And how can we still ensure research still gets done…
  • 26. Removing the gaps, filling the vacuums  Scholarship  Buchanan & Ess studying how IRBs deal with Internet research  Exploring new dimensions of Internet research ethics by Markham; Soghoian; Carpenter & Dittrich; and others (cited within)  Resources  “Internet Research Ethics Digital Library, Resource Center and Commons” http://www.InternetResearchEthics.org  “Ethical decision-making and Internet research: Recommendations from the AoIR Ethics Working Committee”
  • 27. Removing the gaps, filling the vacuums  Education & outreach  Growing focus at PRIM&R and related events  Engage disciplinary conferences (ACM, ICA, etc)  Policy guidance  Advising SACHRP on “The Internet in Human Subjects Research”  Require Internet Research Ethics training for all IRBs?
  • 28.  Research Ethics in the 2.0 Era: Conceptual Gaps for Ethicists, Researchers, IRBs PRIM&R Plenary Panel “Would Margaret Mead Have Blogged? How Social Media has Changed Research” December 2, 2011 Michael Zimmer, PhD Assistant Professor, School of Information Studies Co-Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org