The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford www.oii.ox.ac.uk.

Slides:



Advertisements
Similar presentations
Chapter 6 Negotiating access and research ethics
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Phase 1 Do No Harm Basic Phase 2 Partners Beneficiaries Diversion Phase 3 Complaints Flexibility Communication Phase 4 Review Building Capacity Good Enough.
Mentor’s Guideposts An Online Mentor’s Guide to eLearning.
Protecting the Privacy of Family Members in Survey and Pedigree Research Jeffrey R. Botkin, MD, MPH University of Utah.
Implementing the Child Outcomes Summary Process: Challenges, strategies, and benefits July, 2011.
Participatory Design for Sustainable Development Matthew Kam Feb 7, 2003.
Computer Supported Cooperative Work (CSCW) and Computer Mediated Communication (CMC)
Ethics in Research The Ethical Standards of the American Psychological Association (2002 Ethics code, to be effective June 1,
THE ETHICAL CONDUCT OF RESEARCH Chapter 4. HISTORY OF ETHICAL PROTECTIONS The Nuremberg Code The Office for Human Research Protections (OHRP), United.
Information and communication technology (ICT) capability Australian Curriculum, F10.
IAEA International Atomic Energy Agency The IAEA Safety Culture Assessment Methodology.
Blackboard Strategies: Using Blackboard Pedagogically.
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
School of Health and Social Care Changing constructions of informed consent: qualitative research & ICTs Mary Boulton, Health & Social Care Tina Miller,
Building a Toolkit of Skills and Resources Sarah Lampe, Rebecca Rapport & Mary Wold Paige Backlund Jarquín.
CHILD FOCUS Belgian Safer Internet Centre How to raise awareness among children, young people and their educators? Example of practice Nadège BASTIENEN.
© Mike Molesworth Online Qualitative Research Mike Molesworth CEMP Learning & Teaching Fellow
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
DE Rubrics Creating Rubrics for Distance Education Courses Kasey Fernandez Master’s candidate University of Hawai’i at Manoa.
November 3, 2010 Dr. Maureen Ellis & Dr. Eric Kisling Business and Information Technologies Education Department College of Education
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Next steps / Summative assessment IL Strategy Workshop Day 3 Session 5.
Social and Professional Issues in IT Roshan Chitrakar.
Can an Authentic Interest for Research Integrity be Fostered? From a Government Driven Promotion to a Voluntary Self- education and Consensus Forming on.
Capacity Building Committee Architecture and Data Committee Meeting Seattle – July 2006.
TRUE PATIENT & PARTNER ENGAGEMENT HOW IS IT DONE?.
Issues in Supervision and Consultation Deborah Smith, PhD Michelle March, PhD Corey, 8e, © 2011, Brooks/ Cole – Cengage Learning.
Chapter 4 Developing and Sustaining a Knowledge Culture
AUTEC Faculty Representative for Design and Creative Technologies Dr Robert Wellington WT 116
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
FINAL PRESENTATION OF ORGANIZATIONAL BEHAVIOUR AND ANALYSIS Prepared for : Dr. S. Kumar Group : Dollar 2 A. R. S. BANDARA - PGIA / 06 / 6317 B. A. G. K.
Happy Wednesday! You will have a little time to put your posters together.
What Institutional Researchers Should Know about the IRB Susan Thompson Senior Research Analyst Office of Institutional Research Presented at the Texas.
Knowledge sharing and creation in a teachers’ professional virtual community Presenter: Che-Yu Lin Advisor: Min-Puu Chen Date: August 5, Lin, F.,
Why to care about research?
Evaluation of Ethics Review Procedures for Research in Egypt Hany Sleem 1 Henry Silverman 2 1 National Hepatology and Tropical Medicine Research Institute,
Cultural Competence Considerations [and other alliterations] in International Research IRB 2 Continuing Education March 10, 2015.
PEDAGOGICAL TOOLS METHODOLOGICAL CRITERIA. The methodological tools should… - be culturally sensitive, - consider age and use the knowledge of old generation.
5-6-1 Unit 6: Ethical considerations After completing this unit, you should be able to: Understand the basic ethical principles of working with.
Co-designing urban infrastructures: cases, opportunities and challenges Liesbeth Huybrechts, Faculty of Architecture and Art UHasselt.
INEE Guidance Note on Conflict Sensitive Education Location, Date, 2013.
A Vision. Connected Confident Lifelong Learners Actively Involved our young people will be …
Sociological Methods. Scientific Method  Sociologists use the scientific method to study society  Definition – systematic, organized series of steps.
GEO Implementation Boards Considerations and Lessons Learned (Document 8) Max Craglia (EC) Co-chair of the Infrastructure Implementation Board (IIB) On.
M6728 Ethics in Research Informed Consent/IRBs Reporting Research Results.
U N I V E R S I T Y O F C A N B E R R A Reconceptualising Student Evaluation of Teaching: An ethical framework for changing times Coralie McCormack Centre.
1 New Enhanced Collaboration Workspace Pilot Initiative for 2006 ITSC Status Update Sally Waselik 02-Dec-2005.
HPTN Ethics Guidance for Research: Community Obligations Africa Regional Working Group Meeting, May 19-23, 2003 Lusaka, Zambia.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
RTI International RTI International is a trade name of Research Triangle Institute. CONFIDENTIAL Chronic Illness in Second Life: Virtual Communities.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Choosing Questions and Planning the Evaluation. What do we mean by choosing questions? Evaluation questions are the questions your evaluation is meant.
Understanding the role of candidates and the Internet Local E-Democracy Symposium Presentation Understanding the role of Candidates and the Internet By.
FROM PRINCIPLE TO PRACTICE: Implementing the Principles for Digital Development Perspectives and Recommendations from the Practitioner Community.
Corey, 8e, ©2011, Brooks/ Cole – Cengage Learning Chapter 9 Issues in Supervision and Consultation.
Social shaping and the flexibility of new technologies as a lesson for project planning Eric T. Meyer discussing the work of the Oxford e-Social Science.
Safeguarding and confidentiality within health and social care volunteering.
Introduction Ms. Binns.  Distinguish between qualitative and quantitative data  Explain strengths and limitations of a qualitative approach to research.
CONDUCTING AN ETHICAL ONLINE STUDY Janet Salmons, PhD Chapter 5.
Activity one What are the difficulties of fostering openness within your research context (10 mins) Using post-its participants will be asked to note.
Chapter 6 Negotiating access and research ethics
Chapter 6 Negotiating access and research ethics
Internet and Research Ethics
Challenges in Implementing Data Sharing Principles
Surveys of Internet Use
Chapter 6 Negotiating access and research ethics
Chapter 6 Negotiating access and research ethics
STRUCTURE OF THE CHAPTER
Presentation transcript:

The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford

New technology, old and new ethics Ethical governance in traditional research settings What’s new? Sensitivity to context Approaches to Internet research –Gathering data directly from individuals –Analyzing Interaction in Virtual Environments –Internet as a Social Science Lab

Gathering data directly from individuals Focus on survey, interviews and focus groups –Benefits and risks –Ensuring confidentiality –Informed consent A balancing act –Protected but not burdened

Benefits and risks Protection of harm online –More difficult to assess the risks and benefits online –More of an issue for interviews and focus groups than surveys? Strategies –Make it clear participants can leave –Prior rapport with participant –Establishing netiquette Protection of harm - researchers & participants

Ensuring anonymity and confidentiality Perceived anonymity of the Internet Considerations when –Transmitting data –Storing data –Interacting with participants Difficulties of direct contact –FAQs –Rewards for participating

Informed consent Difficult in any context but often more so online –Distance between researcher & participant –Challenges anonymity strategies Strategies – discussion –Readability of documents –Using quizzes to check understanding Verifying ability to give informed consent –Recruitment strategy –Verifying identity – e.g. via a credit card

Analyzing Interaction in Virtual Environments Focus on graphical online spaces with avatar interaction Differences in text-only versus voice communication, video- versus virtual, etc. Contexts of use include online gaming, spaces for socializing and collaborating, training online for offline tasks, experimenting in virtual

Research on VEs: Contexts and the role of the Researcher Contact people offline? –Weigh burden on research participant The online social setting: formally public, but respect the conventions for the privacy of the space? –Be sensitive to context Disclose researcher identity? –Online possibilities are different from offline (ID tag) ‘Invasion’ of researchers –Respect social milieu

Research on VEs: Data Capture Tools for capture are more powerful than for capturing offline interactions Anonymous data about populations, but surveillance? Reproducing and anonymizing captured interactions, but possible identification by search?

Research in Online Worlds Maintaining the trust of environments and avatars and the persons ‘behind them’ New possibilities for the study of social interaction in online worlds and VEs –Virtual Milgram as example A balance of deontological and utilitarian research ethics

Large-scale analysis of online domains The Internet as a social science laboratory Capacity to capture traces of social interaction on a global scale Creation of data sets and visualization tools that enable previously invisible social structures to be rendered visible Raises unique set of ethical issues

Private spaces in public places Online forum open to the public: ‘forbidden love’ and ‘the art of forbidden love’(Example thanks to Gustavo Mesch) Participants assume a role, use of nicknames, keeping places of work and home private Need an address and password to contribute; if not a member you can read postings Active people, readership much larger; ability to have private one-to-one messages A kind of support group; meet every 2-3 months in a café etc. Issues of privacy and anonymity very important to the group

Researcher dilemma All stories are public; archived for past two years; a lot of data Contributors do not have a sense of public, they are part of a group; conflict with the concept of ‘open’ What O’Riordan and Bassett (2002) term ‘nested utopic’ spaces This perception relates directly to content analysis; but There are structural issues relating to: –culture, values, role of the community, who sustains it, what is the interaction? What would be harm in this context? Does not involve direct human intervention, so little formal guidance Who has right to structural information?

Contextual integrity Closely related to personal perceptions of privacy New contexts may necessitate different privacy protections Status and interests in data may change over time More difficult to gauge what is ethically appropriate Privacy online closely related to how the Internet is governed

Conclusions Challenges in devising a code of practice in a global context Necessity to represent and incorporate diverse –Disciplines –research methods –cultural practices –institutional governance and; – legal frameworks Research object no longer clearly delineated and protected by national boundaries Convergence of commercial and research interests due to ease of re-use Data are more likely to be reconceptualised in new settings by new actors Is there a boundary to be respected between the online and offline worlds of online social actors? To what extent should we protect from harm for unforeseen consequences?