SlideShare ist ein Scribd-Unternehmen logo
1 von 28
New Media, New Ethics:                                           
How Social Media-based Research Demands New Attention
to Research Ethics




                                            Michael Zimmer, PhD
                   Assistant Professor, School of Information Studies
                    Director, Center for Information Policy Research
                                  University of Wisconsin-Milwaukee

                                             zimmerm@uwm.edu
                                           www.michaelzimmer.org
Outline
 What is Social Media (Internet) research?

 What ethical concerns arise in social media
  research?
   Selected cases

 Conceptual gaps in our ethical frameworks

 Closing the gaps for researchers & IRBs
What does Social Media Research look like?

 Using Social Media tools to engage in (traditional)
   research
    Online survey & data-collection tools
    Subject recruitment via email, social media
    Storing, processing, sharing data in the cloud

 Using Social Media as the site for your research
   Interviewing/observing subjects in chat rooms,
     virtual worlds, online games
   Collecting/merging data from online profiles,
     feeds, newsgroups, blogs, archives, activity logs
Conceptual Gaps & Policy Vacuums
 Computer technology transforms “many of our
  human activities and social institutions,” and will
  “leave us with policy and conceptual vacuums
  about how to use computer technology”
 “Often, either no policies for conduct in these
  situations exist or existing policies seem
  inadequate. A central task of Computer Ethics is
  to determine what we should do in such cases,
  that is, formulate policies to guide our actions.”
                      Jim Moor, “What is Computer Ethics?”
Ethical Concerns
 The growing use of social media tools,
  platforms & environments illuminate particular
  ethical concerns for researchers:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects
Illuminating Cases
1. Research on Tor network

2. Archiving of public Twitter streams

3. Harvesting Facebook profile information

4. Capturing teen email & text messaging
   traffic
Research on Tor Network
 Computer science researchers increasingly
  interested in network traffic on the Tor
  anonymity network
      What kind of traffic is on this network?
      What kind of users?
      How secure is it?
      Or, just capture Tor data as convenience sample
 But users of Tor are intentionally seeking
  additional privacy and anonymity
   Research often not even vetted by IRBs

   Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
Archiving Twitter Streams
 Is it ethical for researchers to follow and
      systematically capture public Twitter streams
      without first obtaining specific, informed
      consent by the subjects?
       Are tweets publications (texts), or utterances?
       What are users’ expectations to how their
        tweets are being found & used?
       What if a user later changes her privacy
        settings, or deletes tweets, etc

http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
LOC Archiving of Tweets
     Library of Congress will archive all public tweets
       6 month delay, restricted access to researchers only

     Open questions:
       Can users opt-out from being in permanent archive?
       Can users delete tweets from archive?
       Will geolocational and other profile data be included?
       What about a public tweet that is re-tweeting a
           private one?
          Did users ever expect their tweets to become
           permanent part of LOC’s archives?


http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
Pete Warden Facebook Dataset
 Exploited flaw in Facebook’s architecture to
  access and harvest publicly-viewable profile
  information of 215 million users




        http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
Pete Warden Facebook Dataset
      Planned to release entire dataset – with all
           personal information intact – to academic
           community
            Would it be acceptable to use this dataset?
            Users knew (?) data was public, but did they
                 expect it to be harvested by bots, aggregated,
                 and made available as raw data?
      Under threat of lawsuit from Facebook,
           Warden destroyed the data
http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
T3 Facebook Project
       Harvard-based Tastes, Ties, and Time (T3)
            research project sought to understand social
            network dynamics of large groups of students
       Worked with Facebook & an “anonymous”
            university to harvest the Facebook profiles of
            an entire cohort of college freshmen
             Repeated each year for their 4-year tenure

       NSF mandated release of data, first wave in
            Sept 2008
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
“Anonymity” of the T3 Dataset
                 “All the data is cleaned so you can’t connect
                            anyone to an identity”

         But dataset had unique cases (based on
              codebook)
         If we could identify the source university,
              individuals could potentially be identified
               Took me minimal effort to discern the source was
                    Harvard
         The anonymity (and privacy) of subjects in the
              study might be in jeopardy….
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
Good-Faith Efforts to Protect Subject
                                                    Privacy
      1. Only those data that were accessible by default
             by each RA were collected
      2. Removing/encoding of “identifying” information

      3. Tastes & interests (“cultural footprints”) will only
             be released after “substantial delay”
      4. To download, must agree to “Terms and
             Conditions of Use” statement
      5. Reviewed & approved by Harvard’s IRB
Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
T3 Facebook Project




        Chronicle of Higher Education
                         July 10, 2011
The Blackberry Project
 Ongoing longitudinal study examining teen
  behavior and sociability
   Recruited 281 third and fourth graders in 2003

 Gave them free Blackberries and unlimited plans
  in 2009
 Content of all text messages, e-mail messages,
  and instant messages was saved to a secure
  server owned by the researchers
 Consent is renewed, but concerns over undue
  influence, parental respect for youth privacy, etc
Illuminating Cases
1. Research on Tor network

2. Archiving of public Twitter streams

3. Harvesting Facebook profile information

4. Capturing teen email & text messaging
   traffic
Ethical Concerns Conceptual Gaps
 The growing use of social media tools,
  platforms & environments illuminate particular
  ethical concerns for researchers:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects

 And present us new conceptual gaps on how to
  apply existing research ethics policies
Conceptual Gap: Privacy
           Presumption that because subjects make information
                available on a blog, Facebook, or Twitter, they don’t have
                an expectation of privacy
                 Researchers/IRBs might assume everything is always
                  public, and was meant to be
                 Assumes no harm could come to subjects if data is already
                  “public”
           New ethical problems…
             Ignores contextual nature of sharing
             Fails to recognize the strict dichotomy of public/private
              doesn’t apply in the 2.0 world
             Need to track if ToS/architecture have changed, or if users
              even understand what is available to researchers


Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
Conceptual Gap: Anonymity vs.
                                                 Identifiability
      Presumption that stripping names & other
           obvious identifiers provides sufficient anonymity
            Assumes only PII allows re-identification

      New ethical problems…
        Ignores how anything can potentially identifiable
         information and become the “missing link” to re-
         identify an entire dataset
        “Anonymous” datasets are not achievable and
         provides false sense of protection
          But how can we share data safely?
Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
Conceptual Gap: Consent
 Presumption that because something is shared or
   available without a password, the subject is consenting
   to it being harvested for research
    Assumes no harm can come from use of data already
       shared with friends or other contextually-bound
       circles
 New ethical problems…
   Must recognize that a user making something public
      online comes with a set of assumptions/expectations
      about who can access and how
       Does anything outside this need specific consent?
    Must recognize how research methods might allow
      un-anticipated access to “restricted” data
Conceptual Gap: Harm
 Presumption that “harm” means risk of physical or
   tangible impact on subject
    Researchers often imply “data is already public, so
      what harm could possibly happen”
 New ethical problems
   Must move beyond the concept of harm as requiring
      a tangible consequence
       Protecting from harm is more than protecting from
         hackers, spammers, identity thieves, etc
    Consider dignity/autonomy theories of harm
      Must a “wrong” occur for there to be damage to the
       subject?
      Do subjects deserve control over the use of their data
       streams?
Conceptual Gap: Human Subjects
      Researchers (esp. CompSci) often interact only
            with datasets, objects, or avatars, thus feel a
            conceptual distance from an actual human
             Often don’t consider what they do as “human
                  subject” research
      New ethical problems
        Must bridge this (artificial) distance between
         researcher and the actual human subject
        Also consider other stakeholders within the
         complex arrangement of information
         intermediaries
Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical
Analysis in Computer Security Research”
Ethical Concerns Conceptual Gaps
 The growing use of social media tools,
  platforms & environments illuminate particular
  ethical concerns for researchers:
   Privacy
   Anonymity vs. Identifiability
   Consent
   Harm & Human subjects

 And present us new conceptual gaps on how to
  apply existing research ethics policies
Conceptual Gaps  Policy Vacuums
 Researchers & IRBs are trying to do the right thing
   when faced with research projects relying on Internet
   tools and spaces
 But the fluidity and complexity of Internet tools and
   environments creates significant conceptual gaps
 Leaving researchers & IRBs with considerable policy
   vacuums
    How should researchers deal with using Internet
      tools in their projects?
    How should IRBs review them?
 And how can we still ensure research still gets done…
Removing the gaps, filling the vacuums
 Scholarship
   Buchanan & Ess studying how IRBs deal with
     Internet research
    Exploring new dimensions of Internet research
     ethics by Markham; Soghoian; Carpenter & Dittrich;
     and others (cited within)
 Resources
   “Internet Research Ethics Digital Library, Resource
     Center and Commons” www.InternetResearchEthics.org
    “Ethical decision-making and Internet research:
     Recommendations from the AoIR Ethics Working
     Committee”
Removing the gaps, filling the vacuums

 Education & outreach
   Growing focus at PRIM&R and related events
   Engage disciplinary conferences (ACM, ICA,
    SOUPS, etc)
 Policy guidance
   Advising SACHRP on “The Internet in Human
    Subjects Research”
     Require Internet Research Ethics training for
       all IRBs? For researchers?
New Media, New Ethics:                                           
How Social Media-based Research Demands New Attention
to Research Ethics




                                            Michael Zimmer, PhD
                   Assistant Professor, School of Information Studies
                    Director, Center for Information Policy Research
                                  University of Wisconsin-Milwaukee

                                             zimmerm@uwm.edu
                                           www.michaelzimmer.org

Weitere ähnliche Inhalte

Was ist angesagt?

Why people use social networking sites
Why people use social networking sitesWhy people use social networking sites
Why people use social networking sitesPetter Bae Brandtzæg
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesmatarid
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesnincher
 
Social Networking, Online Communities and Clinical Research
Social Networking, Online Communities and Clinical ResearchSocial Networking, Online Communities and Clinical Research
Social Networking, Online Communities and Clinical ResearchColleen Young
 
Richard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaRichard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaUX People
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Bex Lewis
 
Trends, Network and Critical Thinking 2 Understanding Local Networks
Trends, Network and Critical Thinking 2 Understanding Local NetworksTrends, Network and Critical Thinking 2 Understanding Local Networks
Trends, Network and Critical Thinking 2 Understanding Local NetworksEman Bustamante
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0Weiai Wayne Xu
 
HATICE'S New Media Study Case
HATICE'S New Media Study CaseHATICE'S New Media Study Case
HATICE'S New Media Study Casetesnim91
 
Research Paper on Social Media As A News And Information Source
Research Paper on Social Media As A News And Information SourceResearch Paper on Social Media As A News And Information Source
Research Paper on Social Media As A News And Information SourceHonikaSharma
 
Social Media Mogul Session1
Social Media Mogul Session1Social Media Mogul Session1
Social Media Mogul Session1Jennifer Texada
 
071031 Social media primer
071031   Social media primer071031   Social media primer
071031 Social media primerGed Carroll
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Can't Live Without It! --- The 'Audience-Media Relationship
Can't Live Without It! --- The 'Audience-Media RelationshipCan't Live Without It! --- The 'Audience-Media Relationship
Can't Live Without It! --- The 'Audience-Media RelationshipM. Ichsan Rasyid
 
New Media, Social Media Background and 1st Principals
New Media, Social Media Background and 1st PrincipalsNew Media, Social Media Background and 1st Principals
New Media, Social Media Background and 1st PrincipalsMatt holland
 
Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2adrianaemoran
 
Advanced Law presentation
Advanced Law presentationAdvanced Law presentation
Advanced Law presentationAlexis Smith
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 

Was ist angesagt? (20)

Why people use social networking sites
Why people use social networking sitesWhy people use social networking sites
Why people use social networking sites
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Social Networking, Online Communities and Clinical Research
Social Networking, Online Communities and Clinical ResearchSocial Networking, Online Communities and Clinical Research
Social Networking, Online Communities and Clinical Research
 
Richard Apps: The influence of Social Media
Richard Apps: The influence of Social MediaRichard Apps: The influence of Social Media
Richard Apps: The influence of Social Media
 
Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013Youth & Social Media, Oasis College 2013
Youth & Social Media, Oasis College 2013
 
Work cathy 2012v2
Work cathy 2012v2Work cathy 2012v2
Work cathy 2012v2
 
Trends, Network and Critical Thinking 2 Understanding Local Networks
Trends, Network and Critical Thinking 2 Understanding Local NetworksTrends, Network and Critical Thinking 2 Understanding Local Networks
Trends, Network and Critical Thinking 2 Understanding Local Networks
 
When Religion Meets New Media
When Religion Meets New MediaWhen Religion Meets New Media
When Religion Meets New Media
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0
 
HATICE'S New Media Study Case
HATICE'S New Media Study CaseHATICE'S New Media Study Case
HATICE'S New Media Study Case
 
Research Paper on Social Media As A News And Information Source
Research Paper on Social Media As A News And Information SourceResearch Paper on Social Media As A News And Information Source
Research Paper on Social Media As A News And Information Source
 
Social Media Mogul Session1
Social Media Mogul Session1Social Media Mogul Session1
Social Media Mogul Session1
 
071031 Social media primer
071031   Social media primer071031   Social media primer
071031 Social media primer
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Can't Live Without It! --- The 'Audience-Media Relationship
Can't Live Without It! --- The 'Audience-Media RelationshipCan't Live Without It! --- The 'Audience-Media Relationship
Can't Live Without It! --- The 'Audience-Media Relationship
 
New Media, Social Media Background and 1st Principals
New Media, Social Media Background and 1st PrincipalsNew Media, Social Media Background and 1st Principals
New Media, Social Media Background and 1st Principals
 
Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2Social media, Group 1, Chapter 2
Social media, Group 1, Chapter 2
 
Advanced Law presentation
Advanced Law presentationAdvanced Law presentation
Advanced Law presentation
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 

Ähnlich wie New Media, New Ethics - ICA 2012

Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 EraMichael Zimmer
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative ResearchLisa Blenkinsop
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for ResearchersRichard Hall
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Big data in social sciences and IT developments (ethics considerations)
Big data in social sciences and IT developments (ethics considerations)Big data in social sciences and IT developments (ethics considerations)
Big data in social sciences and IT developments (ethics considerations)Efthimios Tambouris
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsMichael Zimmer
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"summersocialwebshop
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13Eric Meyer
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchNele Heise
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonPaul Simon
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 

Ähnlich wie New Media, New Ethics - ICA 2012 (20)

Research Ethics in the 2.0 Era
Research Ethics in the 2.0 EraResearch Ethics in the 2.0 Era
Research Ethics in the 2.0 Era
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Is the Age of privacy over?  Facebook, Privacy and Qualitative ResearchIs the Age of privacy over?  Facebook, Privacy and Qualitative Research
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Social Media for Researchers
Social Media for ResearchersSocial Media for Researchers
Social Media for Researchers
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Big data in social sciences and IT developments (ethics considerations)
Big data in social sciences and IT developments (ethics considerations)Big data in social sciences and IT developments (ethics considerations)
Big data in social sciences and IT developments (ethics considerations)
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy VacuumsEthics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
Ethics in Library Research Data Services: Conceptual Gaps & Policy Vacuums
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Exploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social NetworksExploring Users’ Information Behavior in Social Networks
Exploring Users’ Information Behavior in Social Networks
 
Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"Elizabeth Churchill, "Data by Design"
Elizabeth Churchill, "Data by Design"
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 
Meyer Big Data SDP13
Meyer Big Data SDP13Meyer Big Data SDP13
Meyer Big Data SDP13
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish ExampleBlogs: Public, Private, and the "Intimsphere" - A Danish Example
Blogs: Public, Private, and the "Intimsphere" - A Danish Example
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online Research
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 

Mehr von Michael Zimmer

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaMichael Zimmer
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookMichael Zimmer
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Michael Zimmer
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsMichael Zimmer
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectMichael Zimmer
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Michael Zimmer
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaksMichael Zimmer
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries ifMichael Zimmer
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slidesMichael Zimmer
 

Mehr von Michael Zimmer (18)

Sparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular MediaSparking Privacy Conversations through Popular Media
Sparking Privacy Conversations through Popular Media
 
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on FacebookPrivacy and Control in Mark Zuckerberg’s Discourse on Facebook
Privacy and Control in Mark Zuckerberg’s Discourse on Facebook
 
Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?Is Library User Privacy still Paramount in the 2.0 Era?
Is Library User Privacy still Paramount in the 2.0 Era?
 
Privacy Awareness & Conversation through Films
Privacy Awareness & Conversation through FilmsPrivacy Awareness & Conversation through Films
Privacy Awareness & Conversation through Films
 
Values Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in ActionValues Interventions: Ethics Scholarship in Action
Values Interventions: Ethics Scholarship in Action
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
The ethical (re)design of the Google Books project
The ethical (re)design of the Google Books projectThe ethical (re)design of the Google Books project
The ethical (re)design of the Google Books project
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011Promoting Ethical Literacy in Youth - ALA 2011
Promoting Ethical Literacy in Youth - ALA 2011
 
Information Ethics & WikiLeaks
Information Ethics & WikiLeaksInformation Ethics & WikiLeaks
Information Ethics & WikiLeaks
 
Cpw webinar 2011-mz
Cpw webinar 2011-mzCpw webinar 2011-mz
Cpw webinar 2011-mz
 
Latham public libraries if
Latham public libraries ifLatham public libraries if
Latham public libraries if
 
Zimmer wikileaks
Zimmer wikileaksZimmer wikileaks
Zimmer wikileaks
 
Zimmer laws of social networking slides
Zimmer laws of social networking slidesZimmer laws of social networking slides
Zimmer laws of social networking slides
 
A2K4 Workshop Slides
A2K4 Workshop SlidesA2K4 Workshop Slides
A2K4 Workshop Slides
 
Zimmer CSCW 2010
Zimmer CSCW 2010Zimmer CSCW 2010
Zimmer CSCW 2010
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

New Media, New Ethics - ICA 2012

  • 1. New Media, New Ethics:  How Social Media-based Research Demands New Attention to Research Ethics Michael Zimmer, PhD Assistant Professor, School of Information Studies Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org
  • 2. Outline  What is Social Media (Internet) research?  What ethical concerns arise in social media research?  Selected cases  Conceptual gaps in our ethical frameworks  Closing the gaps for researchers & IRBs
  • 3. What does Social Media Research look like?  Using Social Media tools to engage in (traditional) research  Online survey & data-collection tools  Subject recruitment via email, social media  Storing, processing, sharing data in the cloud  Using Social Media as the site for your research  Interviewing/observing subjects in chat rooms, virtual worlds, online games  Collecting/merging data from online profiles, feeds, newsgroups, blogs, archives, activity logs
  • 4. Conceptual Gaps & Policy Vacuums  Computer technology transforms “many of our human activities and social institutions,” and will “leave us with policy and conceptual vacuums about how to use computer technology”  “Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of Computer Ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions.” Jim Moor, “What is Computer Ethics?”
  • 5. Ethical Concerns  The growing use of social media tools, platforms & environments illuminate particular ethical concerns for researchers:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects
  • 6. Illuminating Cases 1. Research on Tor network 2. Archiving of public Twitter streams 3. Harvesting Facebook profile information 4. Capturing teen email & text messaging traffic
  • 7. Research on Tor Network  Computer science researchers increasingly interested in network traffic on the Tor anonymity network  What kind of traffic is on this network?  What kind of users?  How secure is it?  Or, just capture Tor data as convenience sample  But users of Tor are intentionally seeking additional privacy and anonymity  Research often not even vetted by IRBs Soghoain, C. (2011) “Enforced Community Standards For Research on Users of the Tor Anonymity Network”
  • 8. Archiving Twitter Streams  Is it ethical for researchers to follow and systematically capture public Twitter streams without first obtaining specific, informed consent by the subjects?  Are tweets publications (texts), or utterances?  What are users’ expectations to how their tweets are being found & used?  What if a user later changes her privacy settings, or deletes tweets, etc http://michaelzimmer.org/2010/02/12/is-it-ethical-to-harvest-public-twitter-accounts-without-consent/
  • 9. LOC Archiving of Tweets  Library of Congress will archive all public tweets  6 month delay, restricted access to researchers only  Open questions:  Can users opt-out from being in permanent archive?  Can users delete tweets from archive?  Will geolocational and other profile data be included?  What about a public tweet that is re-tweeting a private one?  Did users ever expect their tweets to become permanent part of LOC’s archives? http://michaelzimmer.org/2010/04/14/open-questions-about-library-of-congress-archiving-twitter-streams/
  • 10. Pete Warden Facebook Dataset  Exploited flaw in Facebook’s architecture to access and harvest publicly-viewable profile information of 215 million users http://petewarden.typepad.com/searchbrowser/2010/02/how-to-split-up-the-us.html
  • 11. Pete Warden Facebook Dataset  Planned to release entire dataset – with all personal information intact – to academic community  Would it be acceptable to use this dataset?  Users knew (?) data was public, but did they expect it to be harvested by bots, aggregated, and made available as raw data?  Under threat of lawsuit from Facebook, Warden destroyed the data http://michaelzimmer.org/2010/02/12/why-pete-warden-should-not-release-profile-data-on-215-million-facebook-users/
  • 12. T3 Facebook Project  Harvard-based Tastes, Ties, and Time (T3) research project sought to understand social network dynamics of large groups of students  Worked with Facebook & an “anonymous” university to harvest the Facebook profiles of an entire cohort of college freshmen  Repeated each year for their 4-year tenure  NSF mandated release of data, first wave in Sept 2008 Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 13. “Anonymity” of the T3 Dataset “All the data is cleaned so you can’t connect anyone to an identity”  But dataset had unique cases (based on codebook)  If we could identify the source university, individuals could potentially be identified  Took me minimal effort to discern the source was Harvard  The anonymity (and privacy) of subjects in the study might be in jeopardy…. Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 14. Good-Faith Efforts to Protect Subject Privacy 1. Only those data that were accessible by default by each RA were collected 2. Removing/encoding of “identifying” information 3. Tastes & interests (“cultural footprints”) will only be released after “substantial delay” 4. To download, must agree to “Terms and Conditions of Use” statement 5. Reviewed & approved by Harvard’s IRB Zimmer, M. 2010. “But the data is already public”: On the ethics of research in Facebook. Ethics & Information Technology.
  • 15. T3 Facebook Project Chronicle of Higher Education July 10, 2011
  • 16. The Blackberry Project  Ongoing longitudinal study examining teen behavior and sociability  Recruited 281 third and fourth graders in 2003  Gave them free Blackberries and unlimited plans in 2009  Content of all text messages, e-mail messages, and instant messages was saved to a secure server owned by the researchers  Consent is renewed, but concerns over undue influence, parental respect for youth privacy, etc
  • 17. Illuminating Cases 1. Research on Tor network 2. Archiving of public Twitter streams 3. Harvesting Facebook profile information 4. Capturing teen email & text messaging traffic
  • 18. Ethical Concerns Conceptual Gaps  The growing use of social media tools, platforms & environments illuminate particular ethical concerns for researchers:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  And present us new conceptual gaps on how to apply existing research ethics policies
  • 19. Conceptual Gap: Privacy  Presumption that because subjects make information available on a blog, Facebook, or Twitter, they don’t have an expectation of privacy  Researchers/IRBs might assume everything is always public, and was meant to be  Assumes no harm could come to subjects if data is already “public”  New ethical problems…  Ignores contextual nature of sharing  Fails to recognize the strict dichotomy of public/private doesn’t apply in the 2.0 world  Need to track if ToS/architecture have changed, or if users even understand what is available to researchers Nissenbaum, H. 2011. “Privacy in Context: Technology, Policy, and the Integrity of Social Life”
  • 20. Conceptual Gap: Anonymity vs. Identifiability  Presumption that stripping names & other obvious identifiers provides sufficient anonymity  Assumes only PII allows re-identification  New ethical problems…  Ignores how anything can potentially identifiable information and become the “missing link” to re- identify an entire dataset  “Anonymous” datasets are not achievable and provides false sense of protection  But how can we share data safely? Ohm, P. “Broken promises of privacy: Responding to the surprising failure of anonymization.” UCLA Law Review
  • 21. Conceptual Gap: Consent  Presumption that because something is shared or available without a password, the subject is consenting to it being harvested for research  Assumes no harm can come from use of data already shared with friends or other contextually-bound circles  New ethical problems…  Must recognize that a user making something public online comes with a set of assumptions/expectations about who can access and how  Does anything outside this need specific consent?  Must recognize how research methods might allow un-anticipated access to “restricted” data
  • 22. Conceptual Gap: Harm  Presumption that “harm” means risk of physical or tangible impact on subject  Researchers often imply “data is already public, so what harm could possibly happen”  New ethical problems  Must move beyond the concept of harm as requiring a tangible consequence  Protecting from harm is more than protecting from hackers, spammers, identity thieves, etc  Consider dignity/autonomy theories of harm  Must a “wrong” occur for there to be damage to the subject?  Do subjects deserve control over the use of their data streams?
  • 23. Conceptual Gap: Human Subjects  Researchers (esp. CompSci) often interact only with datasets, objects, or avatars, thus feel a conceptual distance from an actual human  Often don’t consider what they do as “human subject” research  New ethical problems  Must bridge this (artificial) distance between researcher and the actual human subject  Also consider other stakeholders within the complex arrangement of information intermediaries Carpenter, K & Dittrich, D. “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research”
  • 24. Ethical Concerns Conceptual Gaps  The growing use of social media tools, platforms & environments illuminate particular ethical concerns for researchers:  Privacy  Anonymity vs. Identifiability  Consent  Harm & Human subjects  And present us new conceptual gaps on how to apply existing research ethics policies
  • 25. Conceptual Gaps  Policy Vacuums  Researchers & IRBs are trying to do the right thing when faced with research projects relying on Internet tools and spaces  But the fluidity and complexity of Internet tools and environments creates significant conceptual gaps  Leaving researchers & IRBs with considerable policy vacuums  How should researchers deal with using Internet tools in their projects?  How should IRBs review them?  And how can we still ensure research still gets done…
  • 26. Removing the gaps, filling the vacuums  Scholarship  Buchanan & Ess studying how IRBs deal with Internet research  Exploring new dimensions of Internet research ethics by Markham; Soghoian; Carpenter & Dittrich; and others (cited within)  Resources  “Internet Research Ethics Digital Library, Resource Center and Commons” www.InternetResearchEthics.org  “Ethical decision-making and Internet research: Recommendations from the AoIR Ethics Working Committee”
  • 27. Removing the gaps, filling the vacuums  Education & outreach  Growing focus at PRIM&R and related events  Engage disciplinary conferences (ACM, ICA, SOUPS, etc)  Policy guidance  Advising SACHRP on “The Internet in Human Subjects Research”  Require Internet Research Ethics training for all IRBs? For researchers?
  • 28. New Media, New Ethics:  How Social Media-based Research Demands New Attention to Research Ethics Michael Zimmer, PhD Assistant Professor, School of Information Studies Director, Center for Information Policy Research University of Wisconsin-Milwaukee zimmerm@uwm.edu www.michaelzimmer.org