Ethics considerations for Corpus Linguistics studies using internet resources Ansgar Koene, Svenja Adolphs, Elvira Perez, Christopher J. Carter, Ramona.

Slides:



Advertisements
Similar presentations
Chapter 6 Negotiating access and research ethics
Advertisements

Ethical Considerations
Public Relation.  While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
Our Digital World Second Edition
Human Studies Program Office of Research Compliance Vice Chancellor for Research and Graduate Education CTE DCS IRB Series – Event 3 December 1,2014 Denise.
SANTA ROSA DISTRICT SCHOOLS , Internet, and Social Media Acceptable Use and Risk Policy 1.
FARMINGTON AREA PUBLIC SCHOOLS SUMMER TECHNOLOGY ACADEMY AUGUST 18TH, 2010 Web 2.0 Tools.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Chapter 3 Preparing and Evaluating a Research Plan Gay and Airasian
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
Fuschia M. Sirois A Research Ethics Board Educational Seminar Web-based Research & Surveys.
Ethics in Business Research
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Social Networking in Education Presented by Justin R. Clark.
A centre of expertise in digital information managementwww.ukoln.ac.uk Twitter: #or2012 OR 2012: Working With Text Workshop Can We Mine JISCMail Lists?
MEDIA INFLUENCES. WEBSITE RELIABILITY No one should assume that information on the Internet is accurate, timely, clear, and important. Many of us have.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Ethics of personalized information filtering Ansgar Koene, Elvira Perez, Christopher J. Carter, Ramona Statache, Svenja Adolphs, Claire O’Malley, Tom Rodden,
Citizen centric approaches to Social Media analysis (CaSMa) Ansgar Koene Derek McAuley, Tom Rodden, Claire O’Malley, Svenja Adolphs, Elvira Perez Vellejos,
Direct and Online Marketing: The New Marketing Model
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Why Use Social Media for Rotary? Peter Borner The Rotary Club of Towcester.
Moffatt Thomas Z Group PR SOCIAL MEDIA... “THE BALANCING ACT” Julia Zunich and Paul D. McFarlane April 12, 2011.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Why We Create Metadata and How it is Useful Bruce Godfrey University of Idaho Library INSIDE Idaho
Stephanie Muchai ARTICLE 19 KENYA Presentation for: “Bloggers Responsible And Ethical Use Of Online Freedom In The Election Period”
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Chapter 2. Section 1  Forming a research question  Constructs = things that can be assumed are there but cannot be seen directly (aggression, anxiety)
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
A bad case of content reuse Validator Website to Validate License Violations Validator – Only requires the URI of the site to check for a license violation.
Open Government, Social Media, and Information Policy: Constraints and Barriers John Carlo Bertot Professor and Director Center for Library & Information.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Making Sense of the Social World 4th Edition
SURVEY RESEARCH AND TYPES OF INFORMATION GATHERED.
DOC Web Policies & Best Practices Jennifer Hammond NOAA Research WebShop 2002 August 7, 2002.
UK LOCKSS Alliance: Investigation into Private LOCKSS Networks Adam Rusbridge EDINA, University of Edinburgh.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Case Studies: Puzzles in Human Research Kevin L. Nellis, M.S., M.T. (A.S.C.P.) Program Analyst, Program for Research Integrity Development and Education.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Communications Technology and Change Tutorial Week 4 Smart Technology Google By Jessica Hickey u
Data Protection: Workplace, Health and Safety. Employers’ responsibilities Employer obliged to provide safe place of work. Health and Safety Act 2004.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
Digital Strategies for Health Communications: Patient Community Websites Alice Miller, July 2015.
Ethical considerations for online mental health communication research By Elvira Perez Vallejos The Ethics of Online Research Methods.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Sarah Manuel Final Presentation MCO435-Social Media.
Use of Social Networks, Electronic and Online Communications by Diocesan Employees and Volunteers Staff Training for Policy Diocese of Kansas City.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Social Media August 2014.
Chapter 6 Negotiating access and research ethics
Internet and Research Ethics
Topic 5: Online Communities Press F5 to view!
Nina Barakzai November 2017
Digital Citizenship Parent Workshop Digital Footprints
Chapter 6 Negotiating access and research ethics
Practical Guidance on the Use of Social Media for Recruitment
Direct and Online Marketing: The New Marketing Model
Direct and Online Marketing: The New Marketing Model
Chapter 6 Negotiating access and research ethics
Take notes on your own paper
Office of Research Integrity and Protections
STRUCTURE OF THE CHAPTER
E-safety Presentation
Presentation transcript:

Ethics considerations for Corpus Linguistics studies using internet resources Ansgar Koene, Svenja Adolphs, Elvira Perez, Christopher J. Carter, Ramona Statache, Claire O’Malley, Tom Rodden, and Derek McAuley HORIZON Digital Economy Research, University of Nottingham

Rising popularity of public and semi-public online communication channels: Written form: Blogs (late 1990s); Wikipedia (2001); Facebook (2004); Reddit (2005); Twitter (2006) Spoken form: Podcasts (2004); YouTube (2005) Low effort and cost of data collection Unobtrusive ‘behind the scenes’ data collection using application programme interfaces (APIs) or web scraping techniques (e.g. Twitter; Blogs) Growing appeal of the Web as source of corpus data

Section 2.9 ‘Internet research’: In the case of an open-access site, where contributions are publicly archived, and informants might reasonably be expected to regard their contributions as public, individual consent may not be required. In other cases it normally would be required. OK easy, unless a site blocks access (e.g. password required), no consent is needed from observed public. … Or is it? BAAL Recommendations on Good Practice in Applied Linguistics (2006)

Online data collection is often undetectable to the public (i.e. covert) unless they are explicitly informed about it. Section 2.5 ‘covert research’: Observation in public places is a particularly problematic issue. If observations or recordings are made of the public at large, it is not possible to gain informed consent from everyone. However, post-hoc consent should be negotiated if the researcher is challenged by a member of the public. Unless explicitly informed about the data collection, the public has no chance to challenge and demand post-hoc consent. BAAL Recommendations on Good Practice in Applied Linguistics (2006)

Section 2.5 ‘covert research’ (concluding part): A useful criterion by which to judge the acceptability of research is to anticipate or elicit, post hoc, the reaction of informants when they are told about the precise objectives of the study. If anger or other strong reactions are likely or expressed, then such data collection is inappropriate. Researchers should, at the end of the data collection period, post a message about the research, offering some form of ‘opt-out’ procedure for any participant who wishes to do so. BAAL Recommendations on Good Practice in Applied Linguistics (2006)

When is online information ‘public’ and can be “freely quoted and analyzed […] without consent”? [Bruckman, 2002] It is officially, publicly archived No password is required for access No site policy prohibits it The topic is not highly sensitive. With Google-caching, retweeting, ‘Like’ buttons etc. what is the true meaning of “officially, publicly archived”? Software defaults settings produce publicly accessible archives without users formulating a conscious decision (e.g. Blogs) Public – Private distinction

“… where contributions are publicly archived, and informants might reasonably be expected to regard their contributions as public, individual consent may not be required.” [section 2.9, BAAL Recommendations on Good Practice in Applied Linguistics] It is not always easy to determine which online spaces people perceive as 'private' or 'public‘. Participants may consider their publicly accessible internet activity to be private despite agreeing to the site User License Agreements. Communication may have been private when it was first conducted, even if it is now publicly available. Public – Private expectation

Public/Private: People may operate in public spaces but maintain strong perceptions or expectations of privacy. The substance of their communication may be public, but the context in which it appears implies restrictions on how that information is -- or ought to be -- used. Social, academic, or regulatory delineations of public and private as a clearly recognizable binary no longer holds in everyday practice. AoIR Ethics Working Committee (version 2.0)

Communication on the Internet has characteristics that are different from communication in other channels (Boyd, 2008): Persistence: postings on the Internet are automatically registered and stored; Replicability: content in digital form can be duplicated without cost; Invisible audiences: we do not know who sees our postings. Searchability: content in the networked public sphere is very easily accessible by conducting a search. People therefore do not have an intuitive sense about the level of privacy that they should expect from internet communication Factors affecting user behaviour and expectations of privacy

Consent was given when the “Terms and Conditions” of the site were click-signed. T&Cs are rarely read T&Cs are too vague and incomprehensible to gain true informed consent (Luger, 2013) Having other people read your conversation is different from having your past conversations made into a corpus for analysis. In a climate where ethically questionable social media anlytics for commercial and security gain are increasing, academia has a responsibility to enter into the discussion of what constitutes good, ethical conduct. Responsibility when dealing with online communication

Purpose: obtain first-hand data concerning conditions under which participants would be willing to consent to having their data used for research purposes Targeted at a wide cross-section of the population How do conditions for consent change as function of: Participant demographics The type of social network platform The type of organization doing the study The type of question being studied Questionnaire study regarding conditions for consent

‘Respect for the autonomy and dignity of persons’, e.g. privacy, is not the only factor determining ethics of data collection or analysis. Scientific value Social responsibility Maximizing benefits and minimizing harm Research conducted to prevent socially unacceptable behaviour, e.g. bullying, may require using data from perpetrators without their consent. The greater good

There is no binary divide between private and public. Expectations of privacy differ from official site policy. The ‘public’ nature of a platform does not provide a carte-blanch for accessing the data hosted on it. Maximize transparency of research as much as possible. If opt-in is not possible, opt-out should be offered. If contacting all subjects is not possible, at least contact some to get a sense of the subjective response to the study and methods. Conclusions

Thank you for your attention Project blog: Consent survey: