STRUCTURE OF THE CHAPTER

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Ethical Considerations for Doing and Presenting Research Online Sarah Armstrong Senior Research Fellow (Glasgow University)
Copyright © 2004 by Allyn and Bacon Chapter 5: Ethics This multimedia product and its contents are protected under copyright law. The following are prohibited.
Negotiating access and research ethics
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Ethical issues in research What is an ethical issue? How do they arise? What can we do about them? What are the rules and regulations that we must follow.
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
DEFINING ETHICS “Conforming to the standards of conduct of a given profession or group” Agreements shared by researchers about what is proper & improper.
Making Sense of the Social World 4th Edition
DIY Research Data Management Training Kit for Librarians Ethics and copyright Robin Rice, Data Librarian EDINA and Data Library Information Services.
Seoul Foreign School IB Extended Essay Research Ethics.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Privacy and Security Risks in Higher Education
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
HIPAA PRIVACY AND SECURITY AWARENESS.
Human Research Ethics and Obtaining Ethics Approval
Guidelines for data preparation - ESRC Datasets Policy Louise Corti ESDS/UKDA Social Science Data Archives for Social Historians: creating, depositing.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Ethical Issues Lecture 14 th. Summary: Understanding Sampling Choice of sampling techniques depends upon the research question(s) and their objectives.
Privacy and Confidentiality. Definitions n Privacy - having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally,
VISUAL MEDIA IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
Privacy & Confidentiality By Ann Richards, Ph.D. West Virginia University adapted from a presentation by By Joan Sieber California State University, Hayward.
Qualitative data analysis : an introduction Chapter 12. Cyberethnography Carol Grbich.
Lecture 2 Jo Mustone Ethics in Psychological Research.
Introducing Communication Research 2e © 2014 SAGE Publications Chapter Three Ethics: What Are My Responsibilities as a Researcher?
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
CHAPTER 5 ETHICS & PRIVACY.
Internet Research Ethics NZ Internet Research Forum 4 February 2016 Dr Philippa Smith Dr Erika Pearson Institute of Culture, Discourse & CommunicationJournalism,
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Privacy Evaluation Framework Overview TCAB Privacy Subcommittee Meeting February 21, 2014.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 7 Ethics in Nursing Research.
Ethical considerations By Mr Daniel Hansson. Ethical issues An ethical consideration is a consideration of what is acceptable to do in a study. Researchers.
Copyright c 2001 The McGraw-Hill Companies, Inc.1 Chapter 5 Research Ethics All researchers, even students, have a responsibility to conduct ethical research.
Ethics. The branch of philosophy that involves systematizing, defending, and recommending concepts of right and wrong conduct Moral principles that govern.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
CONDUCTING AN ETHICAL ONLINE STUDY Janet Salmons, PhD Chapter 5.
Ethics and Educational Research. The aims of the session  To consider the ethical values that inform educational research  To reflect on our own values.
The ethics of social research MA SBE. The ethics of Social Research The ethics of social (and educational) research has become even more prominent in.
Creating your online identity
Soft Law in China’s regulation of the Internet
Chapter 6 Negotiating access and research ethics
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Chapter 6 Negotiating access and research ethics
Internet and Research Ethics
Legal and ethical issues
CHAPTER 2 Ethics in Psychological Research
Chapter 5 Research Ethics
Privacy and Confidentiality in Research
VISUAL MEDIA IN EDUCATIONAL RESEARCH
© LOUIS COHEN, LAWRENCE MANION AND KEITH MORRISON
Research Ethics Matthew Billington
Tri-Council Policy Statement 2010
Ethical Issues in Social Media Mining
Refuah Community Health Collaborative (RCHC) PPS
Chapter 6 Negotiating access and research ethics
Research Ethics and Integrity Officer
Introduction to safe guarding in psychology
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Internet law Business law.
Data Management Ethical considerations for educational research
The E-Commerce Act and the Right to Privacy
Chapter 6 Negotiating access and research ethics
Reflections on information sharing in health privacy law in New Zealand There are at least five sides to every issue – the patient’s right to medical privacy,
Research methods in sociology
RESEARCH METHODS Lecture 14
USING SECONDARY DATA IN EDUCATIONAL RESEARCH
RESEARCH METHODS Lecture 14
Chapter 21 Successfully Implementing The Information System
Interviewer Research Ethics
Presentation transcript:

ETHICS IN INTERNET RESEARCH © LOUIS COHEN, LAWRENCE MANION, KEITH MORRISON

STRUCTURE OF THE CHAPTER What is Internet research? What are key ethical issues in Internet research? Informed consent Public and private matters Confidentiality and anonymity Ethical codes for Internet research

INTERNET RESEARCH British Psychological Society, 2013 ‘Any research involving the remote acquisition of data from or about human participants using the Internet and its associated technologies’.

INTERNET RESEARCH Association of Internet Researchers, 2012 That which uses the Internet to collect data using an online tool, e.g. through online interviews, surveys, archiving or automated means of data scraping; Studies how people use and access the Internet, e.g. through collecting and observing activities or participating on social network sites, listservs, websites, blogs, games, virtual worlds or other online environments or contexts; That which utilizes or engages in data processing, analysis or storage of datasets, databanks and/or repositories available via the Internet. That which studies software, code and Internet technologies. That which examines the design or structures of systems, interfaces, pages and elements. That which employs visual and textual analysis, semiotic analysis, content analysis or other methods of analysis to study the web and/or Internet-facilitated images, writings and media forms. That which studies large-scale production, use and regulation of the Internet by governments, industries, corporations and military forces.

THREE TYPES OF INTERNET RESEARCHER BEHAVIOUR Active Researcher is a participant, e.g. in an online community Passive The researcher is non‑participant, e.g. studying data and sites on the Internet Online traditional E.g. surveys

KEY ETHICAL ISSUES IN INTERNET RESEARCH Informed consent: How to give information and gain consent Public and private matters: What constitutes ‘public’ and ‘private’? Expectations of privacy Confidentiality, anonymity and non-traceabilty: No longer possible to guarantee complete confidentiality, anonymity, and non-traceability It is important to ensure that permissions, where required, have been given for data to be used.

CHALLENGES IN ETHICAL ELECTRONIC RESEARCH Difficulty in confirming authenticity of online participants. Difficulty in confidentiality and privacy in emails. Online participants may distort their real situation. It can take a long time to establish trust online.

INFORMED CONSENT The researcher may not know who the actual person is who is answering, say, an online survey, and whether the details that they enter are honest and correct. How can informed consent be gained from someone who is unseen and when there are no checks on whether the participant has understood the implications? Does one need consent from minors or their parents in online research? Can participants subsequently have their data withdrawn if they wish to withdraw from the research? How can the researcher trace which participants have given which data online? How easy, possible or realistic is it to obtain informed consent, and, if so, from whom (participants, parents, gatekeepers, etc.)? How do we know that informed consent has really been given when, and for how long (e.g. in archived data), for what (use and, release of data) and on whose behalf?

A TAXONOMY OF PRIVACY (SOLOVE, 2006) Information collection surveillance; interrogation (probing for information) Information processing aggregation (combining data about a person); identification; insecurity (improper access and information leaks); secondary use (information collected for one purpose being used without consent for another purpose); exclusion (failure to inform the person that data on them held by others and failure to involve the person in the use of such data) Information dissemination breach of confidentiality; disclosure (of information that affects how others judge a person’s character), exposure (of, for example, bodily functions, nudity, grief); increased accessibility; blackmail (threat to disclose information); appropriation (use of a person’s identity to serve the purposes or interests of another person); distortion (spreading false or misleading information about a person) Invasion intrusion (into a person’s solitude or tranquility); decisional interference (governmental incursion into a person’s decision on private matters).

ETHICAL CODES FOR INTERNET RESEARCH Principles: Respect for the autonomy and dignity of persons (covering the public/private distinction, confidentiality and anonymity, copyright, valid consent, withdrawal and debriefing); Scientific value (including levels of control); Social responsibility (including disrupting social structures); Maximising benefits and minimizing harm.

GUIDELINES FOR ETHICS ONLINE Do not assume that emails are secure. Ensure that nobody is harmed by the research. Enable participants to correspond in private if they wish. Indicate the steps taken to ensure privacy. Check where the communication comes from. Determine the most suitable online method of requesting and receiving informed consent. The greater the acknowledged publicity of the venue, the less obligation there may be to protect individual privacy, confidentialityand rights to informed consent.

GUIDELINES FOR ETHICS ONLINE The greater the vulnerability of the researcher to the participant, the greater the obligation of the researcher to protect the participant. Indicate clearly how material will be used, whether or how it will be attributed, and whether data will be used verbatim, aggregated or summarized. Work within the framework of legal obligations of data protection and privacy laws. Indicate who has access to the communication, and whether it is private. Consider the possible outcomes to individuals if private data are made public.