You are on page 1of 19

2

The Ethics of Internet


Research
Rebecca Eynon, Jenny Fry and
Ralph Schroeder

Abstract and some guidelines for researchers have been


The ethics, and ethical governance, of online established (Ess and the AoIR ethics working
research have been much debated, and a number group, 2002). Yet there is still considerable
of professional organizations have promulgated debate about the ethics of Internet research –
guidelines for researchers considering conduct- not least because the Internet is still in a
ing their research online. This chapter offers
an overview of the current position, suggesting
formative phase and new phenomena continue
relevant considerations in respect of different to emerge. In this chapter, we cannot hope
kinds of project, and highlighting some of the to cover all of the issues in research ethics;
challenges and dilemmas that online researchers that would require a whole book by now.
face. The chapter is oriented to three principal Instead, we will discuss some of the major
approaches to gathering Internet-based data: use
of online methods to gather data directly from
issues that have been debated – as well as
individuals, analyzing online interaction within some that have only recently come to the fore –
virtual environments, and large-scale analysis of and give some indication of how to go about
online domains. Amongst issues covered are those addressing them.
relating to data protection and regulation, data Ethics and research methods are closely
intrusion, and issues raised by norms of privacy and
interrelated. One of the challenges to develop-
to what extent information on the Internet can be
regarded as intentionally ‘public’. The discussion ing a coherent approach to ethical dilemmas
is grounded in the ethical regulatory framework in Internet research is that as the Internet
developed in offline research, noting commonalities evolves as a space for social interaction
and differences. and information dissemination, the methods
necessary to capture and document such
This chapter will consider some of the main activities are also emergent and novel.
ethical issues that researchers are likely to Consequently, consideration of ethical issues
encounter in Internet-related research. These in a context-independent manner, divorced
issues have been discussed now for some time, from matters of research design, methods,
24 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

and conceptual frameworks, would be limited Professional bodies such as the Australian
in scope and usefulness. In this chapter, Research Council, the Economic and
therefore, we discuss novel ethical dilemmas Social Research Council (ESRC), and the
for Internet researchers in the context of Social Research Association (SRA) in the UK
three predominant approaches to gathering have been involved in the development of
Internet-based data: use of online methods ethical guidelines. There are also committees
to gather data directly from individuals, set up that are responsible for governing
analyzing online interaction within virtual research on an institutional level. The names
environments, and large-scale analysis of used for these groups vary; common terms
online domains. include ethical review committees/ethics
The online methods used to gather data committees (UK), Institutional Review
directly from individuals that are discussed in Boards (US), or Human Subjects Review
this chapter include surveys, interviews, and Boards (AU). Both these mechanisms for
focus groups. In these cases researchers use external research governance (e.g. beyond
online tools to ask participants for responses that of the individual researcher or research
to particular questions or issues. The study group) have historical roots in the ‘human
of online interaction in virtual environments subjects research model’. Three ethical
includes various research methods, such as concepts are at the core of institutional and
participant observation and logging and visu- professional research governance based on
alizing the interaction between participants. the ‘human subjects model’: confidentiality,
Large-scale analysis of online domains is still anonymity, and informed consent. These are
quite novel and involves capture and analysis derived from the basic human right to privacy,
of digital traces that people leave online, though these rights are interpreted differently
such as patterns of their search behavior, in different jurisdictions (for example, the
text analysis of e-mail corpora, and hyper- EU and the US; see Reidenberg, 2000).
links. The techniques employed in large-scale The beginnings of formal guidelines for
analyses rely heavily on indirect observation, the human subjects model can be traced
with the data being de-contextualized from its back to the Nuremberg Code in 1949 in
sources and the analysis often combined with response to ‘research’ conducted by Nazi
powerful visualization tools. doctors. Yet while there were initiatives
highlighting ethical principles to researchers
(e.g. the National Institute of Health Clinical
NEW TECHNOLOGY, OLD AND Guidelines in 1961 and the Helsinki Dec-
NEW ETHICS laration by the World Medical Association,
developed for the medical community in
June 1969), it was not until the 1970s,
Ethical governance in traditional
after Henry Beecher’s critique of the treat-
research settings
ment of human subjects by researchers
Before going into the specific issues relating after World War II (Beecher, 1966), and
to the three main approaches that we have the controversy of the Tuskegee syphilis
identified, it is useful to take a step back study, that more formalized guidelines were
and reflect on how ethical issues relating to published. In 1974 such guidelines were
Internet research might differ from research published by the National Commission for the
in traditional settings. Many ethical guide- Protection of Human Subjects of Biomedical
lines and regulations are well established and Behavioral Research.1 The regulations
in (offline) social research. Reviewing these stipulated that Institutional Review Boards
provisions here is important given that, thus (IRBs) were required to determine, in each
far, the governance of Internet research has research proposal reviewed, that the potential
been heavily influenced by them (Basset and risks to subjects were outweighed by the
O’Riordan, 2002). benefits, the rights of subjects were protected
THE ETHICS OF INTERNET RESEARCH 25

adequately, and informed consent would be contributing to public policy and debate,
appropriately obtained (Reilly, 1998: 682– along with researchers’ rights and interests in
683). In 1991 a uniform set of regulations, pursuing knowledge. This is a recurring issue
the Federal Policy for the Protection of in relation to the ethics of Internet research
Human Subjects, was adopted more widely; and closely related to considerations of ‘harm’
and today’s IRBs are governed by these to research participants (see Ess, 2006 for a
regulations. However, it is important to note more detailed discussion of Utilitarian and
that these regulations come from the medical Deontological frameworks).
sciences and are therefore not necessarily As the above discussion of research gov-
cognate with the social sciences. This human ernance illustrates, there is a blurring of the
subjects research model is widely used in boundary between ethical and legal consid-
discussions of online research ethics, although erations and provisions. Ess makes a useful
the suitability of applying this model in some distinction (2002: 5) between institutional
online contexts has been questioned (Basset or legal requirements as against the ethical
and O’Riordan, 2002). requirements that can go beyond these. In
Institutional governance of research (the addition to the requirements set by Research
interrelationship between legal and ethical Ethics Committees and professional bodies,
interventions) not only varies between insti- as already mentioned, there are also laws
tutions, but also from country to country. regarding privacy and data protection that
These range from close intervention, which govern research in different countries. In
in extreme cases can hinder the progress of Internet research, however, the institutional
research, to minimal guidance which relies and legal context may be uncertain because
on the self-policing of researchers – as is research participants may be online in any
the situation in the Netherlands, for example. geographical context. The global reach of the
Differentiation in institutional/professional Internet may thus, as Ess (2006) suggests,
ethical rules and guidelines illustrates a entail that researchers take heed of contexts
tension between external (structural) gov- which go beyond their own jurisdictions. This
ernance and the freedom of self-regulation also applies to considerations over and above
among individual researchers. Such institu- these institutional and legal requirements,
tional provisions do not necessarily exempt such as what we might do as individual
researchers from further ethical obligations researchers out of a sense of fairness. Here,
and responsibilities. as well, it is necessary to think ‘globally,’
Researchers have different relations with as values such as privacy may be culturally
research participants and data provided specific and what is considered an appropriate
by them, depending on the method and balance between privacy and freedom of
approaches they use. For example, it is not expression will vary between cultures (Fry,
uncommon for ethnographers to develop a 2006).
trust relationship with the people that inhabit
the communities they observe, and they often
New ethics for new settings?
come to perceive themselves as custodians of
the data they gather. Ethical practices are also Why should online research require separate
shaped by personal ethical frameworks, as or additional treatment? Indeed, this ‘meta-
well as researchers’ cultural and professional issue’ has itself been a major debate which
ones. As Ess (2006) argues, any emphases runs through the various individual topics in
on the rights of research participants must be Internet research ethics. Walther (2002), for
considered further alongside other important example, has argued that many of the features
rights and values – including (deontological) of Internet research are similar to those
emphases on the importance of knowledge found in other media or in existing offline
developed through research, and (more util- research. Walther’s arguments are directed
itarian) emphases on research knowledge as against those, and Frankel and Siang (1999)
26 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

in particular, who argue the opposite; namely, context-dependence, which entails respecting
that new rules are required for this novel people’s values or expectations in different
setting because, to give just one example, settings. A few examples (in addition to those
people may misrepresent their identity online provided in the AoIR guidelines) will suffice:
(to which Walther replies, among other points,
that they can also do this offline). • Bloggers: the aim in this case is to disseminate the
Despite continuing disagreements in this blogger’s views, but should everything, including
debate, Ess argues (2002) that there has sensitive personal information contained in a blog,
recently been a convergence on the view that be disseminated via research?
research ethics for online settings are not • Search: from a legal point of view, the release of
special and can be derived from the ethics for information by a search provider in anonymized
offline settings. We shall encounter a number form may not pose a problem, but clearly
those who search don’t expect to be potentially
of instances below. At the same time, we
identified in relation to their search behavior.
shall also argue that in some cases there • Online games: the context here may be play, but
are special considerations that are needed for even though these environments are public, is it
online research, such as the changed nature of appropriate to reveal players’ names in research
disclosure and informed consent. The reason publications?
for the debate, however, deserves to be spelled • Chatrooms: though a chatroom space may be
out and has to do with the role of the Internet public, the participants may feel they are part
in society. of a trusted community and use the space to
It is true to say that Internet technol- communicate intimate details of their lives. Should
ogy is increasingly becoming ‘domesticated’ consideration be given to reproducing the content
(Silverstone et al., 1992) or part of our verbatim in research communications and to what
extent should social structures be protected from
everyday lives. In the early days of the Internet
being disclosed or ‘invaded’ by researchers?
there were many concerns raised about, for
example, identity fraud, or the authenticity
of online relationships, and the like (see, Internet research ethics thus need to be
for example, Baym, 2006; Wallace, 1999). tailored to different contexts. It may not be
Nowadays these – what can with hindsight be sufficient, for example, to stay within the
seen as ‘moral panics’ – have waned, partly strictures of copyright law (the institutional
because the technology has become more and legal requirements mentioned in the
commonplace and many concerns have been previous section) or to simply adopt the rule of
addressed in various ways. Yet this should ‘fair use’as with offline publications (Walther,
not lead us to overlook what is genuinely 2002; but see the discussion by Ess, 2002: 3) in
new with this technology and its implications order to be fair in an ethical sense to research
for novel forms of identity, community, and participants.
interaction online. As Ess (2006) argues, there
may be different requirements in research
when dealing with online identities from APPROACHES TO INTERNET
the traditional human subjects model in RESEARCH
research.
The Internet has emerged as a major data
resource for social science research. Not only
Sensitivity to context
is it a lens through which to observe our
Apart from the fact that online research must subjects of research and how they construct
be sensitive to the offline context in which it their identities and communities online, but it
is taking place, online research must also be can also be a tool for gathering and analyzing
sensitive to different online contexts, since the social science data on a large scale. The
Internet is many things to many people. The uptake of Internet research for quantitative
AoIR guidelines place an emphasis on this studies in disciplines as diverse as information
THE ETHICS OF INTERNET RESEARCH 27

science, political science, and geography, chapter on interviews by O’Connor et al., and
together with its deployment in the emergent the Internet survey section in this Handbook.
area of e-Social Science, means that the We next address the key ethical considerations
Internet is increasingly taking the form of a of these online methods.
laboratory for the social sciences, in much the
same way as astronomers might use a virtual Benefits and risks of online research
observatory to understand the mysteries of It is primarily the investigators’ responsibility
the night sky. An issue that unites these quite to ensure, as far as they are able, that
different approaches is the question of what participants will not come to harm by
constitutes a private act on the Internet and taking part in any study. In the social
how researchers might deal with the issue of sciences, psychological and physical harm to
‘privacy in public.’ Nissenbaum (1998) has participants may be caused, for example, by
highlighted that there is a lack of guidance for research that evokes bad memories or reduces
social science researchers in terms of dealing a person’s sense of pride or dignity, or by
with this issue. Consequently, confidentiality, cases where the anonymity of the participant
anonymity, disclosure, and informed consent, is not maintained as originally agreed (Bier
concepts at the core of ethical governance in et al., 1996). Trying to ensure harm is not
the social sciences, are cast into uncertainty caused by the study is particularly challenging
when it comes to research online. as there may well be unintended consequences
The following sections deal with the par- of research unforeseen by the researcher. As
ticular ethical issues that arise in using online Rees states, ‘The ethical problems which will
methods to gather data directly from indi- be encountered in a project cannot, or certainly
viduals, analyzing online interaction within cannot always, be foreseen and prepared for
virtual environments, and large-scale analysis at the start, even if some topics and methods
of the online domain. These methods need can be seen in advance to carry greater risks
not be seen as mutually exclusive. Indeed, than others’ (1991: 147).
a researcher studying an online discussion Regardless of whether research is online
forum may wish to interview individual or offline a balance must be struck between
participants, either online or offline, as part the potential and significance of harm to the
of a virtual ethnography. Conversely, they participant and to the benefits of the research
may wish to combine observation embedded to the individual and society more generally.
within a particular setting with a large-scale Online research is not intrinsically more likely
mapping exercise of hyperlinks to understand to be harmful than face-to-face methods, yet
the relative social position of a particular it does pose different challenges (Kraut et al.,
forum or person in cyberspace. 2004). In online research it is more difficult
to assess the risk of participants coming to
Use of online methods to gather harm, as fewer studies have been conducted
that researchers can learn from; and it is harder
data directly from individuals
to judge individuals’ reactions to the research
Whilst the Internet might be considered to (e.g. if a person is getting distressed by an
afford a rich resource for observation of interview question or if a participant feels
research participants, covertly or otherwise, insulted or harassed by other group members
using traditional social science methods such in an online discussion) (Bier et al., 1996;
as interviews and surveys in the online envi- Mann and Stewart, 2000). Strategies to try
ronment has recently become very popular. to address these issues include building a
Online versions of these traditional social good rapport with participants, establishing
science methods raise slightly different ethical ‘netiquette’ in group discussions (Mann and
challenges to the face-to-face context (Mann, Stewart, 2000), and providing participants
2003). For a detailed discussion of how with an easy way to leave the study (Hewson
to conduct interviews and surveys see the et al., 2003; Nosek et al., 2002).
28 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

A second issue is the potential of harm commonly in place in universities (Fox et al.,
to the researchers. Given the anonymity of 2003). Password-protecting computer direc-
the Internet, researchers can come across or tories, saving personal data and experimental
receive distressing information of numerous data separately (Kraut et al., 2004), encrypting
kinds. What a researcher does with such the files so no one else can read them, or
information has ethical, and in some cases coding the data in a way that reduces the
legal, implications for the researcher (see likelihood of people being able to trace the
Stern, 2003). It is important for researchers data to a specific individual (Pittenger, 2003),
to anticipate and assess these risks prior to are all possible strategies.
beginning the study as far as is possible, to The issue of ensuring confidentiality
reduce the potential of harm to themselves and whilst interacting with the participants may
their research participants. arise at various points throughout the
research. Participants may wish to contact the
Ensuring confidentiality researchers up to and including the debriefing
Harm can also be caused due to breaches stage at the end of the study, yet directly
of confidentiality and anonymity caused by emailing the researchers may compromise
the misuse of storing or using the data (Fox anonymity in a number of ways. Firstly, e-mail
et al., 2003). Researchers have a responsibility addresses are often identifiable as they can
to ensure the confidentiality of data and contain names, geographical location, and
the privacy of participants at all stages of organizational affiliation. While people can
the process: during all interactions with the make use of anonymous e-mail services to
participants and when the data is transmitted cover their identity, these are not 100 percent
and stored (Nosek et al., 2002). In general, effective; and tend to promise ‘best efforts’
the extent to which a researcher should be as opposed to true anonymity. Secondly, a
concerned about confidentiality depends on copy of all e-mails is retained on the server
the nature of the data being collected. If the of the sending account, any transmitting
data is not controversial, or if anonymity can server and on the destination server and these
be ensured, then this is less of a concern copies are frequently retained on back up
compared to controversial research topics tapes for a number of years. These issues
or research where it is necessary to obtain can be particularly problematic when certain
personal information (Kraut et al., 2004). activities are carried out online. For example,
Given that the perceived anonymity of the if verifiable names and addresses or signed
Internet may encourage people to discuss agreements are required to fulfill informed
topics or disclose more details than they consent procedures (see section below) and/or
would be willing to in face-to-face situations if participants are rewarded for the research
(Meho, 2006), researchers need to ensure in the form of prizes or payment and
that participants’ perceptions of anonymity personal details are required for tax purposes.
are met, or if not, made explicit to the E-mail should be reduced to a minimum
participant (see section on informed consent with offline methods or alternative web-
below). based methods utilized where appropriate.
In terms of securely transmitting data, For example, setting up a discussion thread
potential solutions include: the use of encryp- on the research website or other appropriate
tion and secure socket layer (SSL) protocols, site for participants to ask questions (Fox
use of data labels that are meaningless to et al., 2003), and, when offering prizes for
anyone but the researcher, and the separate participating in the research (a technique
transmission of personal data and experimen- that in itself raises ethical questions), main-
tal data (Nosek et al., 2002). In terms of data taining anonymity by purchasing online gift
storage, the data needs to be protected from certificates and then providing the certificate
other people accessing it or tampering with it; number to the participant (Kraut et al.,
this can be an issue in the networked systems 2004).
THE ETHICS OF INTERNET RESEARCH 29

Informed consent Using quizzes to check understanding can


Individuals who choose to participate in any be another means; though this extra burden
research project must do so on the basis on the participants increases the risk of
of informed consent, where the individual dropout (Varnhagen et al., 2005). Despite
understands what the goal of the research these challenges the advantage of online
is and what they are agreeing to do, the consent, as compared to face-to-face consent,
potential risks (e.g. limits to confidentiality) is that participants are likely to feel less
and benefits of taking part (e.g. incentives), pressure to enter into and remain in the study
and have details of alternative options that and are therefore more likely to enter and
may benefit them. Participants must have participate in the research freely.
the option to ask anything they wish and A second important issue is verifying the
understand that participation is voluntary participant’s ability to give informed consent
and that they can withdraw at any time (Kraut et al., 2004). Verifying the ability
(Anderson, 1998). In practice, gaining truly of an individual to give informed consent
informed consent is not straightforward in is harder in online environments, as it is
any context. The nature of informed consent more difficult to know whether or not the
changes throughout the research process and online sample includes ‘vulnerable groups’
thus needs to be constantly renegotiated (e.g. (e.g. young people,2 the elderly, or people with
Bier at al., 1996; Sin, 2005). Further, it is mental health issues), and because the extent
difficult to ascertain if informed consent is to which individuals are able or competent to
truly given by the participant; for example, give informed consent varies widely and this
problems and misunderstandings arise when is more difficult to judge online. To reduce
potential participants do not read documents the chances of a vulnerable group (e.g. young
carefully or fail to ask for clarification from people) being part of a research project this
the researcher (see Varnhagen et al., 2005). can be addressed, to some extent, by the
In face-to-face contexts it is potentially recruitment strategy utilized. For example,
easier to ensure that the participant is sending specific invitations to known adult
fully informed about the study compared participants to access a password-controlled
to online environments. For example, the site (Pittenger, 2003), or designing advertising
researcher can discuss the research with the materials that are unlikely to attract or interest
participant, assess whether the individual young people when employing a more ‘broad
fully understands the implications of the brush’ strategy (Nosek et al., 2002) may help.
research and evaluate whether they are freely Other options include asking for information
entering into the study. Owing to the distance that only adults would have, such as credit-
between the researcher and the participant in card information, though such activities
online settings, this is more difficult. It is can increase dropout (Kraut et al., 2004).
harder to determine whether the participant In practice, verifying identity is really an issue
truly understands what they are consenting only in research involving controversial topics
to, and it may take more time to gain and/or where the study presents higher risks
consent, as it may require more discussions to potential participants (Pittenger, 2003).
via e-mail to ensure the participants fully Indeed, whether one should try and obtain
understand the implications of participating. online consent for high-risk studies at all is
This e-mail exchange may put participants open to question (Kraut et al., 2004).
off clarifying or asking all the questions they The issues considered in this section
wish about the research (Mann and Stewart, have included protecting participants from
2000). To try and ensure participants are truly harm, ensuring confidentiality, and informed
informed in online settings, techniques of consent. These are all areas that also need to be
increasing the readability of the document addressed in face-to-face environments; but
can be used (e.g. reducing the amount of the use of the Internet poses slightly different
text, use of subheadings, and use of colour). challenges to these more traditional contexts.3
30 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

It is a balancing act for researchers to ensure virtual setting? In this case it is useful to ask
that participants are protected, but at the same why such a move from studying the subject
time not placing unnecessary and excessive online to offline is deemed to be necessary.
burdens on participants in terms of complet- There can be three main reasons for this.
ing informed consent procedures, ensuring One reason is to validate the information that
security, etc. (Kraut et al., 2004). While it has been obtained online; the second is to
is impossible to predict all eventualities in embed the subject’s online behavior in the
online research, it is useful to always pilot context of their real-world social setting; and
test instruments and consent forms, as what the third is to obtain more in-depth knowledge
works in one context with one group may of the subject, such as their motivations or
not work and/or may well produce different the significance they attach to certain events.
ethical questions in another situation (Meho, As to the first of these, the question can
2006). The next section explores the ethical then be raised of why it should be necessary
considerations when analyzing interaction in to think that face-to-face questioning should
virtual environments. provide more valid answers (as Walther 2002
points out). In the second case, it may be
awkward to engage with people offline if one
Analyzing interaction in virtual
has only previously dealt with them online
environments (for example, Taylor, 2006: 1–19). This also
To address the many questions raised by applies to the third case, although it may be,
online environments, we can take as an for example, that the subject can be contacted
example online virtual worlds. These include without co-presence, by means such as the
social spaces where people, in the form of telephone or e-mail. One dilemma in all these
avatar representations of themselves, interact cases is similar to contacting people offline
with each other online in the virtual setting who have previously been encountered or
for various purposes (see the chapter by contacted by other means: what kind of burden
Schroeder and Bailenson in this Handbook). may be imposed on the research subject?
These purposes include gaming, socializ- Some of the issues arising in this case have
ing, and collaborating. The best known been dealt with in the previous section.
are Massively Multiplayer Online Games
(MMOGs, sometimes also known as Role- Online social settings
playing Games or MMORPGs) where, apart Virtual spaces in which people interact online
from socializing, people typically engage as avatars can be treated as social worlds,
in elaborate rule-following interactions to regardless of whether they are primarily used
achieve ever higher levels in the game. All for socializing, collaborating, or gaming. To
of these online spaces include visual repre- appreciate this point, we can leave to one
sentations of people (again, avatars), most side for the moment the offline ‘frame’ of this
use text communication (and also sometimes interaction, such as the legal issues attendant
voice), and they have sophisticated social upon the use of the software and other legal
conventions and online social institutions of rules which govern use of the Internet, as well
their own (Schroeder, 2007). [Note: Online as the other offline consequences of online
virtual environments also include purely text- behavior such as ‘addiction.’ We can also
based online environments such as MUDs leave to one side the question of whether these
and MOOs. The focus in this section is on online environments constitute ‘communities’
graphical environments.] or not – in online virtual environments people
who regularly interact as avatars clearly see
Online and offline themselves as social groups just as people
For online virtual worlds, one question is: do in any other social setting with regular
under what circumstances can – and should – and bounded interaction. These social settings
the researcher contact the subject outside the are perhaps most often akin to ‘third places’
THE ETHICS OF INTERNET RESEARCH 31

(public parks, coffee shops, street corners, not available in offline research: namely, to
and the like): places that are neither public attach an identifier tag to your avatar that
nor private but in between, as in Oldenburg’s identifies you as a researcher and provides
(1989) work. details of the research project – but only when
Against this background, online social others choose to click on this information.
spaces clearly exemplify the imperative Clearly, it will often be good practice –
discussed earlier: to be sensitive to the values beyond legal requirements – to identify
and aims of people in different online settings. yourself as a researcher in the case of
Again, this sensitivity to context will involve ethnographic or participant observation in a
treating different virtual worlds in different virtual environment. There may be a trade-
ways – for example, whether they are small off in this case between the advantages of
private encounters or the movements of large- covert observation which does not disturb the
scale populations. Or again, there may be environment, and revealing one’s identity as
occasions or whole worlds in which people a researcher – which ensures transparency,
interacting online are behaving in a public but may also lead to changed behavior on the
way; as in a public meeting or in a virtual part of the subjects (for a particularly strik-
world that is open to all for, say, commercial or ing example, where the researcher became
educational purposes. It may also be, however, ‘stalked’ among other things, see Hudson-
that certain spaces within a virtual world, such Smith, 2002). Anecdotally there have been
as an online church (Schroeder et al., 1998), a number of cases when many researchers
although formally public, include interactions descended on an online environment and there
that should be treated as private – such as when was resentment against their presence. The
personal details are revealed, or if a whole well-established rule in anthropology – to
online world is expressly designed to provide leave the field so that future researchers are
a private forum for interaction among a group not disadvantaged – must be an important
that would be difficult in an offline setting (or consideration.
in another virtual setting).
Research ethics then requires treating Studies of online populations
online interactions in virtual worlds with Another set of issues revolves around gather-
the same sensitivity that other, offline social ing powerful data gained from the surveillance
settings are treated. For participant observa- of online populations. Even if online virtual
tion or fieldwork there have been extensive worlds are prima facie public spaces, it is
debates in anthropology about the role of nevertheless important to be sensitive to the
the observer – and these will provide some social context – just as public spaces in the
guidance. And in special cases, it may also physical world need to be treated as such.
be that online virtual worlds need to be Yet there is also a difference between the
treated as sensitive fieldwork, for example, virtual and the physical: in online worlds,
where vulnerable groups such as children are whole scenes or even worlds can be recorded
involved (Lee, 1993). and later reproduced for research purposes. In
the physical world too, of course, people can
The role of the observer be covertly recorded (as with closed-circuit
One issue that arises online is disclosing your television cameras), but in online worlds the
identity as a researcher. There is a balance possibilities of recording, reproducing, and
to be struck between revealing that you are analyzing interactions, especially covertly, are
a researcher and engaging in unobtrusive more powerful.
observation. There is also a difference here In quantitative, anonymized studies of
from real-world observation, since it is easy to online environments for gaming, collaborat-
hide completely – or lurk – in the online world. ing, and socializing, just as in the offline
Note that in online virtual environments there world, population data for the most part do
is furthermore a technical possibility that is not raise ethical concerns. Note an important
32 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

difference, however: namely, that in an online may involve guessing what the intentions
virtual world all the interactions between and values of the person ‘behind’ the avatar
avatars can be captured. In other words, this might be.
is the equivalent of being constantly under It is not so much, then, that the boundary
surveillance, as in George Orwell’s novel between online and offline should be aban-
1984 or in ‘reality’ television programmes, doned, as some have argued (Taylor, 2006:
where participants are constantly under the 153). Rather, here, as in relation to the other
gaze of the camera. This raises novel ethical issues discussed in this section, researchers
issues, since people using these environments will need to weigh the same ethical consid-
do not necessarily expect to have all their erations as they always do in dealing with
behavior recorded. human subjects, and to adapt them to the novel
To give an example: Penumarthy and technological possibilities and constraints of
Borner (2006) analyzed where people moved online virtual worlds. They will continue to
and when they focused their attention in an face the choice mentioned earlier: between
online virtual world for education. This kind Kantian duty-based or ‘deontological’ ethics,
of recording of behavior is unlikely to be with their absolute respect for the individual’s
objectionable. If, however, they had counted aims, as against the calculation of conse-
the number of times that avatars had engaged quentialist or utilitarian ethics, which weighs
in particularly unsavory behavior, even in a the balance of harms and benefits. In the
public place, users might reasonably object case of online worlds, can researchers violate
to this kind of surveillance. There is a fine the privacy of people’s online behavior?
line then between when data, for example, Do the benefits of disseminating research
about a large online game is aggregated results about online populations outweigh
to reveal patterns about behavior without the harms of disclosure? Should researchers
violating participants’ sense that they are seek consent from those they observe and
under surveillance – and the opposite. The report on?
same applies, of course, to the analysis of
small-scale groups, which can be analyzed The uses and limits of virtual environments
down to the granularity of the finest details for experimental research
of interaction (Schroeder et al., 2006). It can be mentioned, finally, that despite
However, online worlds also have novel the various tricky ethical issues that have
possibilities for presenting research findings been discussed, online virtual worlds – as
in anonymous ways. It is possible, for exam- Schroeder and Bailenson point out in their
ple, to blur the names of avatars which are contribution to the Handbook – offer many
next to their text bubbles (see, for an example, novel opportunities for social research that are
Brown and Bell, 2006: 229). Or again, it is not available in offline settings. They include,
possible to record and reproduce the gestures as we have seen, some possibilities that are not
of an avatar and yet anonymize their identity available in online research that gathers data
by changing parts of their appearance from directly from individuals. Yet at the same time,
which they could be identified. Researchers there are limits to using virtual environments
thus also have a range of choices that differ to do research that cannot be done in face-
from those in the physical world. to-face or physical settings. These limits have
The wider context is that even if the online recently been highlighted in a replay of the
world is formally a public space, researchers Milgram experiments in an immersive, Cave-
will nevertheless want to maintain the trust type environment by Slater and colleagues
of those whose online behavior they are (Slater et al., 2006).
studying. This includes not disregarding the What Slater and colleagues did was to
sense of privacy that, for example, people’s investigate the responses of participants to
avatar representations may have in the settings inflicting pain on a virtual character (an
of particular online worlds – even if this avatar) and to see how far they would
THE ETHICS OF INTERNET RESEARCH 33

go in administering ‘painful shocks’ to this In fact, some participants stopped adminis-


character. This was a reconstruction of the tering the ‘painful shocks’ and approximately
experiments conducted in the 1960s by half the participants said afterwards that they
Stanley Milgram, who was interested in had wanted to stop the experiment.
the extent to which people obey others The results shed important light on pres-
in authority in inflicting pain or suffering ence, since subjects clearly thought that the
on others. Part of the background to these virtual human’s pain made them respond as
experiments was the Nazi atrocities during if they were in the presence of a real person.
the Second World War. The experiments These are important results for the community
involved research subjects administering ever of virtual environments researchers who study
greater electric shocks to another person, presence, as well as for other researchers.
strapped in a chair in an experimental setting, Yet they also generated considerable debate
when the experimenter told them to do so. about how far this type of research should go.
Milgram found that participants were willing No doubt virtual environments provide many
to continue administering shocks even when excellent opportunities for doing experiments
the person strapped in the chair was screaming that, for various reasons, cannot be carried
with pain. What they did not know, of course, out in the physical world and in face-to-face
was that this person was in fact an actor and interaction. But there is also a range here,
no shocks were being given. some such situations are clearly acceptable:
Milgram’s experiments have become for example, Slater and colleagues have also
regarded as controversial in terms of research conducted experiments about the fear of
ethics in a number of respects: one was public speaking in front of a virtual audience
that subjects were being deceived. A second (Slater and Steed, 2002: 164–8). This is a
was the controversial nature of the findings, good illustration of beneficial research, since
perhaps most of all because they revealed it may cause some participants considerable
some unpleasant facts about human nature. anxiety during the experiment but may also
Third, they were regarded as inflicting help them to overcome or alleviate this anxiety
unnecessary mental anguish on the research in real-world circumstances. Yet some such
participants. The experiment by Slater and situations that one can think of are equally
colleagues avoided these shortfalls in several clearly unacceptable; for example, a research
respects: one is that research participants participant brutally killing a virtual human
were not deceived; the second that the merely to see how far they will go.
experiment was not about obedience, but Slater et al.’s ‘virtual Milgram’ thus points
rather about ‘presence’ and the responses to to some limits of this type of research: some
virtual characters; and finally that the person extreme social situations should be studied,
to whom the shocks were administered was a because the distress to participants is not
virtual human and the experiment was carried great and the value of the experiment is.
out in a Cave-type virtual environment. Some extreme social situations should not be
Participants therefore knew that the shocks studied, because the distress to participants is
they were giving could not hurt the virtual too great and is not justified by the benefits
human. of the study. So even if virtual humans are
Slater and colleagues found similar results not real, this does not mean that interacting
to Milgram in terms of the stress levels of with them cannot cause undue distress to
participants, though with ‘lesser intensity’ of the real participants interacting with them –
the responses – an important replication, since even when they know that this cannot be the
doing this experiment with ‘real’ recipients case. Put briefly: just because it’s virtual does
of pain is no longer acceptable (2006: e39). not mean that any type of research can be
Participants felt increasingly uncomfortable done with human participants, and even if the
about the experiment and responded to the virtual humans are not real, that does not mean
virtual character as if it were highly real. that ‘anything goes.’ Virtual environments
34 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

are useful because certain experiments can for these emergent novel approaches; rather,
be done that cannot be done in the physical it lays out the territory in terms of potential
world and with people interacting face to face. issues and the multiple factors that may impact
Others cannot be done because they will, for on Internet research more broadly conceived
example, be too realistic. Where to draw the than in terms of single projects.
line will be an ongoing debate in the years
to come. Triangulation of datasets and third-party
reuse
Large-scale analysis of online Advancements in the development of
domains resources and tools available on the Internet
make the triangulation and third-party reuse
The trend towards exploiting the Internet as of data much more likely. While a standalone
a social science laboratory has been intrin- dataset may preserve anonymity and
sically tied to the increasing sophistication privacy, new capabilities for aggregating and
and stability of Internet technologies, such combining data could jeopardize such ethical
as search engines and archives. The capacity integrity by enabling profiles of individuals
of these tools to record traces of social to be constructed through triangulation.
interaction on a global scale – of how The following case-scenario taken from
individuals and communities consume and McKee and Porter (in press) illustrates the
contribute to the Internet through automated way in which ethical issues related to the
code, such as Internet cookies (enabling the direct gathering of data from individuals,
unique identification of browsers and users’ the analysis of interaction in online virtual
hypertext pathways) and server log files environments, and the large-scale analysis of
(recording search terms, date and times of online domains might converge in a single
requests) and their application within social study, regardless of which of these is the
science research – raises a unique set of ethical primary method:
issues. Recent developments in Internet-based
analytic tools and resources have increased the A researcher decides to conduct a critical discourse
ability of social scientists to delve deeply into analysis of messages posted in discussion forums
the structure of online social worlds. Projects geared towards teenagers. Because the discussion
such as VOSON (Virtual Observatory for the forums are publicly available to anyone with access
to the Internet, he decides that he does not need
Study of Online Networks) are combining to seek permission from the individuals to research
traces of social interaction as captured by and use their online posts. He does, however, use
Internet archives with visualization tools pseudonyms when he refers to and quotes from
to render social structures visible in ways their posts in his work. When he publishes his
not previously possible. At the same time, research in a print-based, peer-reviewed journal, he
includes many direct quotations that, when entered
developments in e-Social Science (some of into a search engine, could immediately provide the
which are described in this volume) are using URL to individuals’ posts and thus explicitly reveal
the Internet to combine data and tools in their identity (McKee and Porter, in press).
novel ways, leading to new tools, techniques,
and digital records that incorporate multiple The tracking capabilities built into the very
forms of data from across a diverse range of infrastructure of the Internet itself, and tools
data sources. As Thelwall and Stuart (2006) being developed to exploit the gathering and
point out, the AoIR ethical guidelines focus aggregation of fine-grained data on a large
mainly on issues related to observational scale, mean that the role of researcher as
research in the analyis of interaction in online custodian and gatekeeper of personal data
environments, and do not address issues becomes radically altered. Tools that enable
of automatic data collection and large-scale data to be easily reused by third parties and
analysis of online domains. This section does recontextualized in novel ways undermine
not attempt to produce a set of guidelines the notion of ‘context’, for example, the
THE ETHICS OF INTERNET RESEARCH 35

norms, values, and beliefs of groups within about how we use the Internet. These data are
online social settings (see earlier section), as recorded for unspecified periods of time and
a heuristic for developing ethical practices unspecified uses. The data they hold is subject
that are socially and culturally appropriate. to legal jurisdiction and inAugust 2005 the US
Reuse and the emergent practice of data Government subpoenaed American Internet
profiling by third parties reduces choice for search-engine companies to provide lists of
both researcher and research participant in all URLs indexed in their search engines as of
terms of how data is represented and how 31 July 2005, and all search term queries used
it travels through media and across actors. between 1 June 2005 and 31 July 2005. The
The researcher, therefore, may no longer be case came to media attention because whilst
able to foresee all of the consequences and America Online, Microsoft, and Yahoo! are
potential harm of their research, which has alleged to have complied with this request,
implications for ‘informed consent’ where it Google resisted on the grounds that it was an
is deemed appropriate in large-scale studies. undue infringement of their users’ privacy. In
This distancing of data from its context of the ensuing court case Google was required
creation and creator serves to make the issue to submit to a less onerous request. Google
of what constitutes a private act online, and was also caught up in another controversy
whether the ‘human subjects model’ is the when it entered into the Chinese Internet
most appropriate one for Internet research, search-engine market. High-tech companies
all the more pressing. Bassett and O’Riordan such as CISCO, Microsoft, and Yahoo! had
(2002) argue that choice about privacy already been operating in China and providing
embodied in the use of spatial metaphors in e-mail and blogging services. Internet search-
online social settings, such as ‘going to a engine companies operate under national
chat room,’ has evoked the ‘human subjects legal jurisdictions and when the Chinese
model’ on the Internet, but that the invocation Government ordered Yahoo! to hand over blog
of such language does not necessarily indicate data, the files subsequently contributed to the
its appropriateness. Rather, they argue, a sentencing of alleged cyberdissident Shi Tao
humanities model of research governance to prison for ten years. As a result of this
might be more appropriate, whereby texts and related outcomes Google has decided not
produced in a chatroom are treated as to provide e-mail or blogging services within
creative works and thus protected under China, on the grounds that they cannot provide
intellectual property rights legislation, such data that they do not have.
as Copyright, rather than as representing These two cases illustrate the extent to
human beings that need protecting under which the Internet is being governed by
social science ethical governance, such as commercial interests. This raises the question
informed consent. of the extent to which Internet researchers
Furthermore, the vast quantities of social should be concerned with the collection and
science data being generated by the Internet use of potentially harmful data – given
are of significant commercial value. Conse- that we cannot anticipate all the ways in
quently, social science data generated and which it might be reused and by whom. In
used by academic researchers may travel terms of research excellence, social scientists
beyond the professional boundaries of the have always been encouraged to consider
social science disciplines and into the private only collecting sufficient data to satisfy the
sector, whose practices in relation to ethical immediate objectives of their research, but
considerations are by and large governed by with the Internet the capabilities for collecting
legal jurisdiction, rather than ethical codes and storing data are so vast that the practicality
of practice. The recent Google case in the or desirability of maintaining such practices in
US is a case in point (Fry, 2006). Internet the context of new technologies, methods, and
search-engine companies like Google, Yahoo! techniques (such as webometrics) is brought
and MSN collect billions of ‘data fossils’ into question.
36 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

Transition from the private to public sphere situation changed as Enron’s Outlook e-mail
online database was seized by the Federal Energy
Maintaining contextual integrity of data is Regulatory Commission (FERC), as part of
closely related to personal perceptions of an investigation of the 2000–2001 energy
privacy. New contexts may necessitate differ- crises in the western United States, and
ent privacy protections. Status and interests released online for public scrutiny. The
in data may change over time. For example, database contained nearly 1.6 million e-mails,
data that may originate as academic could tasks, and calendar entries written during
become a training tool and then be of the period 2000–2002 by 176 former Enron
commercial interest. The issue of privacy in executives and employees from the power-
public in relation to research participants has trading operations.
not been addressed in a systematic manner This e-mail corpus was made public
and more often than not surfaces as a result in an uncensored form for two weeks.
of highly publicized media events, rather It was not anonymized and is reported
than within the framework of developing to have contained confidential information
ethical codes of practice for research. As such as social security numbers and salary
Nissenbaum (1998) argues, practices of public scales. The corpus was removed from the
surveillance fall outside the scope of predom- Internet following complaints from Enron’s
inant theoretical approaches to privacy, which employees, and confidential information was
have concerned themselves mainly with two removed using automated text extraction.
aspects of privacy: (1) maintaining privacy Content of the database includes ninety-two
against intrusion into the intimate, private percent of Enron’s staff e-mails, and messages
realms of individuals, and (2) protecting the are identifiable according to senders and
privacy of individuals against intrusion by recipients’ names. The database is hosted by
agents of government (Nissenbaum, 1998). the private company Lockheed Martin and
Nissenbaum argues that normative theories of was made available for third party reuse.
privacy ought to be concerned with privacy Several academic institutions and private
in public, that contemporary experience with companies have purchased and modified the
information technology offers compelling database, making it available in more user-
reasons to expect that theory will provide friendly and searchable forms. For instance,
a means of understanding the problem of users can conduct a search based on e-mail
privacy in public, as well as a means for genre, for example, humour, sexist, breaching
adjudicating it. trade secrets, and sender’s or recipient’s name.
Recent cases such as the release of the At http://www.cs.cmu.edu/∼enron/ users are
Enron and AOL e-mail databases illustrate urged to ‘Please be sensitive to the privacy of
Nissenbaum’s point (op. cit.). Data gathered the people involved (and remember that many
in the private sphere, such as company of these people were certainly not involved
archives of e-mail interactions, are being in any of the actions which precipitated the
added to this ever-growing corpus of publicly investigation).’
available data (for a different perspective on In terms of institutional governance, an aca-
this debate see Janetzko’s chapter in this demic study of social interaction based on this
Handbook). E-mail datasets are a rich source dataset would be exempt from ethical review,
of data for Internet researchers and have as it does not involve direct intervention with
been used to study a range of topics, from human subjects. The potential harm, however,
online humour to social network analysis. arising from the unintended consequences of
Typically, researchers gain access to the releasing such datasets could be great. Where
e-mail of research participants based upon does a lack of institutional or professional
trust and full disclosure about the nature governance in the face of potential harm
of the research intentions and provisions leave the social science researcher in terms
for confidentiality. In 2003, however, this of ethical responsibilities? One difficulty is
THE ETHICS OF INTERNET RESEARCH 37

that in the absence of governance, such as It is debatable as to whether or not


an ethical review committee, it is hard for legal statutes alone are sufficient to protect
researchers to assess the balance between individuals from harm, for example, relying
potential benefit and harm. Is it the respon- on data protection law to guide the boundaries
sibility of the researcher reusing a publicly of a study. Nevertheless, there is a school
available dataset to contact persons named of thought in the application of novel
for informed consent, or do we abandon technologies to social science that is on the
such research if it is not possible to acquire side of pushing the boundaries until there is
informed consent? Do we treat it as public a legal intervention. This can be problematic,
information, on the grounds that it is available given that in many cases the technology and its
in the public domain, even though it may capability for triangulating and reprocessing
contain sensitive information? This brings data is so novel that often legal intervention
into question the extent to which we as is lagging behind. Therefore, practice is often
researchers can respect context and intentions pushing the boundaries of ethical frameworks
online. and legal interventions.

Moving beyond text-based data Overlaps in ethical and legal interventions


Whilst shared commercial and academic This chapter has highlighted that norms,
interest in social science data is not new, ethical frameworks, and legal statutes are
as with market research for example, the lagging behind not only technical devel-
capabilities for triangulation and reprocessing opments related to the Internet, but also
are. In the offline world ethical issues mainly social developments in the visibility and
relate to text-based data; in the online world penetration of Internet-generated data, such
image and video data are becoming more as the use of e-mails, search terms, and
prevalent and therefore protecting anonymity blogs as legal evidence. These socio-technical
and privacy is more challenging. developments raise a series of questions about
This raises two fundamental and related where the boundary is between private and
questions. How should data be treated that has public on the Internet, who has the possibility
been captured in offline public spaces? And to delimit the boundaries, and what the ethical
where are the legal boundaries of informed responsibilities and duties of social science
consent? Legal protections are not neces- researchers are amidst such ambiguity.
sarily catching up with ethical dilemmas, As Thelwall and Stuart (2006) point out,
with many researchers at the technological some techniques, such as web crawling, are
cutting edge ‘fudging it’ based on pre- inherently illegal in their mechanisms. Web
existing codes of practice. It is necessary crawling is illegal because crawlers make
to deal with multiple settings, for example, permanent copies of copyrighted material
domestic, educational, work, and public, with without the owner’s permission. This has
no core set of conventions. For example, been an issue for the Internet Archive
what are the different ethical considerations (http://www.archive.org/index.php) and from
between videoing children in the classroom a legal perspective the issue has been
and videoing them in public spaces? Some negotiated by implementing an opt-out policy.
technological solutions are possible. In a There are also technical solutions, such as
classroom setting, for example, parental the robots.txt protocol (Thelwall and Stuart,
consent for one child, but not another, could 2006). These legal and technical solutions
be resolved by different anonymization levels do not, however, address issues of privacy
when either representing or accessing the data. when it comes to the potential triangulation
However, even though there are technical of datasets and third-party reuse. If we adopt
solutions, such as pixeling out of faces, people a humanities approach to ethical governance
can still be recognized by other physical on the Internet and see a text produced
features. in a chatroom as an artistic work, rather
38 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

than representing a ‘human subject’, then research subject, research participant, artist
copyright becomes an issue (Bassett and (Bruckman, 2002), or author (Bassett and
O’Riordan, 2002). In this way an ethical O’Riordan, 2002). There is also a potential
issue is leveraged into a legal issue for convergence between research and com-
which there appears to be a solution through mercial data on the Internet. Development
a set of conventions. Such leveraging is of aggregator tools and services such as
likely to become more and more prevalent in BlogPulse have led to the informatization
the ethical governance of Internet research. of data, whereby data acquires additional
Copyright is also bound to become much more value beyond the immediate research context.
of an issue with the proliferation of user- Consequently, the potential for third-party
generated content. This is an area in which reuse is much greater than in the offline
institutions should recognize that researchers world. In the context of e-Social Science, data
will need some training and support. The sharing and reuse are institutional imperatives
implications of such ethical ‘leveraging’ also with many funding bodies now mandating
mean that, increasingly, the boundary between the submission of datasets to data archives
legal and ethical issues will become blurred, and repositories upon the completion of
and continuation of this distinction in the funding. There is, furthermore, an impetus
development of ethical codes of practice or within e-Social Science to make data publicly
guidelines may not be the most effective available through the Internet (using grids
strategy. or online repositories). This would entail the
development of practices and techniques to
anonymize highly sensitive data, with some
CONCLUSIONS data being easier to anonymize than others.
Progress has already been made in preserving
One of the key challenges in devising a code confidentiality within quantitative Internet-
of practice for Internet Research Ethics is in its based datasets, but qualitative data is much
global reach and the necessity to respect and more challenging. In the UK the Qualidata ini-
incorporate diverse cultural practices, ethical tiative (http://www.esds.ac.uk/qualidata/) is
governance, and legal frameworks. What’s looking into how these issues can be resolved.
different about Internet-based research in The context of social interactions in online
contrast to research in the offline world worlds is also important to bear in mind. If we
is that the research object is no longer take the position that traces of interaction on
clearly delineated by national boundaries and the Internet are public and should be treated
protected by national research governance. as such, for example, participants have no
The emergence of virtual methods such rights to privacy considerations, how do we
as virtual ethnography, text-mining, and address the issue that online bodies and forms
webometrics across disciplines as dispersed of expression have offline instantiations? To
as media and cultural studies, sociology, what extent do we need to protect these from
political science, and linguistics also brings an harm? As tools for tracing social structures
interdisciplinary focus to bear on the Internet become more sophisticated, so too do our
as an object of study and challenges existing capabilities for triangulating data and getting
instruments of research governance that have a more holistic view of participants lives. So
traditionally been focused along disciplinary that, whereas participants may choose to draw
dimensions. a boundary between their online and offline
At the same time, the online world affords worlds, and may in fact be online in order
new modes of human interaction, and related to escape the strictures of the offline world,
ethical practices are shaped by the researchers’ the technologies currently being developed
objectification of those being researched, for do not necessarily respect such boundaries.
example, whether individuals participating So the question for us as social scientists is
in an online chatroom are perceived as to what lengths we should go to discover
THE ETHICS OF INTERNET RESEARCH 39

people’s intentions. This, of course, means and regulations that differ from country to country.
that we must disclose ourselves as researchers, Gaining informed consent for those under 18 in offline
which could alter the kind of results we were and online research creates special problems for any
researcher. See, for example, Wiles et al. (2005) for a
hoping to obtain. In the context of e-Social discussion of the UK context.
Science research, participants may be, but 3 For further discussion about some of the issues
are not necessarily, already in the Internet raised here in relation to ensuring confidentiality and
domain. We cannot therefore simply assume informed consent see the 2007 report ‘Dilemmas of
Privacy and Surveillance: Challenges of Technological
that they have chosen to be online, or what
Change’ by The Royal Academy of Engineering.
their intentions are in being there. Again
this raises the question of whether ‘public
in everyday life’ is equivalent to ‘public
REFERENCES
on the Internet.’ All the while, the ‘human
subjects’research model remains in place and, Ackland, R., O’Neil M., Standish, R. and Buchhorn, M.
as Bassett and O’Riordan (2002) have argued, (2006) ‘VOSON: A Web Services Approach for
what is required now is the trying and testing Facilitating Research into Online Networks’. Paper
of different models of research governance. presented at the Second International Conference
The issues that we have raised in this on e-Social Science, 28–30 June 2006, University of
chapter go beyond responsibilities towards Manchester.
a particular set of research participants and Anderson, G. (1998) Fundamentals of Educational
have implications for social, political, and Research, second edition. London: Falmer Press.
ethical aspects of social science research. Basset, E. and O’Riordan, K. (2002) ‘Ethics of Internet
research: contesting the human subjects research
A significant proportion of the world will
model’. Ethics and Information Technology, 4 (3):
not be represented in online research and
233–47.
researchers need to ask whether this is Baym, Nancy (2006) ‘Interpersonal Life Online’, in Leah
ethical. Certain groups are likely to be under- Lievrouw and Sonia Livingstone (eds) The Handbook
represented and are therefore less likely to of New Media (updated student edition). London:
gain benefits from participating. Such an Sage. pp. 35–54.
emphasis on the interests of the information- Beecher, H. (1966) ‘Ethics and clinical research’, New
rich may reinforce existing societal divisions England Journal of Medicine, 274: 1354–60.
(Mann, 2003). Researchers have an ethical Bier, M., Sherblom, S. and Gallo, M. (1996) ‘Ethical
responsibility to ensure that the research issues in a study of Internet use: uncertainty,
they carry out is of high quality, and that responsibility, and the spirit of research relationships’,
Ethics and Behaviour, 6 (2): 141–51.
conclusions drawn from it can be inferred
Brown, Barry and Bell, Marek (2006) ‘Play and
from the data collected (Pittenger, 2003).
sociability in there: some lessons from online games
Finally, one obvious strategy to adopt under for collaborative virtual environments’. In Ralph
conditions with yet-to-emerge norms that Schroeder and Ann-Sofie Axelsson (eds) Avatars
have been sketched here is to be explicit about at Work and Play: Collaboration and Interaction
the ethical decisions that are made, so that in Shared Virtual Environments. London: Springer.
others can learn from and debate the issues pp. 227–45.
that arise when reporting findings. Bruckman, A. (2002) ‘Studying the amateur artist:
a perspective on disguising data collected in human
subjects research on the Internet’. Ethics and
Information Technology, 4 (3): 217–31.
NOTES Ess, C. (2002) ‘Introduction to Special Issue on Internet
research ethics’, Ethics and Information Technology,
1 The report, ‘Ethical Principles and Guidelines
4 (3): 177–88.
for the Protection of Human Subjects of Research’
(commonly known as the Belmont Report) is
Ess, C. (2006) ‘Ethics and the use of the Internet in
available online at: http://ohsr.od.nih.gov/guidelines/ social science research’. In Adam Joinson, Katelyn
belmont.html <accessed 12 Dec 2006>. McKenna, Tom Postmes and Ulf-Dietrich Reips (eds)
2 Acquiring informed consent for participation in Oxford Handbook of Internet Psychology. Oxford and
research by children is subject to legal frameworks New York: Oxford University Press. pp. 487–503.
40 THE SAGE HANDBOOK OF ONLINE RESEARCH METHODS

Ess, C. and the AoIR ethics working group (2002). research’. Washington, DC: Department of Health,
‘Ethical decision-making and Internet research’: Education, and Welfare. Available at http://www.hhs.
Recommendations from the AoIR ethics working gov/ohrp/humansubjects/guidance/belmont.htm
committee. Available online: www.aoir.org/reports/ NIH (1961) Handbook on the Utilization of Normal
ethics.pdf Volunteers in the Clinical Center. Bethesda: NIH.
Fox, J., Murray, C. and Warm, A. (2003) ‘Conducting Nissenbaum, H. (1998) ‘Protecting privacy in an
research using Web-based questionnaires: practical, information age: the problem of privacy in public’,
methodological, and ethical considerations’, Interna- Law and Philosophy, 17: 559–96.
tional Journal of Social Research Methodology, 6 (2): Nosek, B., Banaji, M. and Greenwald, A. (2002)
167–80. ‘E-research: ethics, security, design and control in
Frankel, M. and Siang, S. (1999) ‘Ethical and Legal psychological research on the Internet’, Journal of
Aspects of Human Subjects Research’. Available Social Issues, 58 (1): 161–76.
online: http://www.aaas.org/spp/sfrl/projects/intres/ Nuremberg Code (1949) Trials of war criminals before
main.htm. the Nuremberg military tribunals under control council
Fry, J. (2006) ‘Editorial: Google’s privacy responsibilities law no. 10, vol. 2. Washington, DC: U.S. Government
at home and abroad’, Journal of Librarianship and Printing Office.
Information Science, 38 (3): 135–39. Oldenburg, R. (1989) The Great Good Place. New York:
Hewson, C., Yule, P., Laurent, D. and Vogel, C. (2003) Marlowe and Company.
Internet Research Methods: A Practical Guide for the Penumarthy, Shashikant and Borner, Katy (2006) ‘Anal-
Social and Behavioural Sciences. London: Sage. ysis and visualization of social diffusion patterns in
Hudson-Smith, Andrew (2002) ‘30 days in active- three-dimensional virtual worlds’, in Ralph Schroeder
worlds – community, design and terrorism in a virtual and Ann-Sofie Axelsson (eds) Avatars at Work and
world’, in Ralph Schroeder (ed) The Social Life of Play: Collaboration and Interaction in Shared Virtual
Avatars: Presence and Interaction in Shared Virtual Environments. London: Springer. pp. 39–61.
Environments. London: Springer. pp. 77–89. Pittenger, D. (2003) ‘Internet research: an opportunity
Keller, H.E. and Lee, S. (2003) ‘Ethical issues surrounding to revisit classic ethical problems in behavioural
human participants research using the Internet’, research’, Ethics and Behaviour, 13 (1): 45–60.
Ethics and Behaviour, 13 (3): 211–19. Rees, T. (1991) ‘Ethical issues’. in G. Allan and C. Skinner
Kraut, R., Olson, J., Banaji, M., Bruckmann, A., Cohen, J. (eds) Handbook for Research Students in the Social
and Couper, M. (2004) ‘Psychological research online: Sciences. NY: The Falmer Press. pp. 140–52.
report of the board of scientific affairs’ advisory group Reidenberg, J.R. (2000) ‘Resolving conflicting interna-
on the conduct of research on the Internet’, American tional data privacy rules in cyberspace’, Stanford Law
Psychologist, (59) 2: 105–17. Review, 52 (5): 1315–71.
Lee, R. (1993) Doing Research on Sensitive Topics. Reilly, P. (1998) ‘Rethinking risks to human subjects
London: Sage. in genetic research’, American Journal of Human
Mann, C. (2003) ‘Generating data online: ethical Genetics, 63: 682–85.
concerns and challenges for the C21 researcher’, Schroeder, R. (2007) ‘An overview of ethical and social
in M. Thorseth (ed) Applied Ethics in Internet issues in shared virtual environments’, Futures: The
Research. Trondheim: NTNU Publications Series No.1. Journal of Forecasting, Planning and Policy, 39 (6):
pp. 31–49. 704–17.
Mann, C. and Stewart, F. (2000) Internet Communi- Schroeder, R., Heldal, I. and Tromp, J. (2006) ‘The
cation and Qualitative Research: A Handbook for usability of collaborative virtual environments and
Researching Online. London: Sage. methods for the analysis of interaction’, Presence:
McKee, H. and Porter, J.E. (in press) ‘The ethics of digital Journal of Teleoperators and Virtual Environments,
writing research: a rhetorical approach’. College 15 (6): 655–67.
Composition and Communication. Schroeder, R., Lee, R.M. and Heather, N. (1998). ‘The
Meho, L. (2006) ‘E-mail interviewing in qualitative sacred and the virtual: religion in multi-user virtual
research: a methodological discussion’, Journal of reality’, Journal of Computer-Mediated Communica-
the American Society for Information Science and tion, 4 (2). Available online at http://www.ascusc.org/
Technology, 57 (10): 1284–95. jcmc/vol4/issue2/schroeder.html
National Commission for the Protection of Human Silverstone, R., Hirsch, E. and Morley, D. (1992)
Subjects of Biomedical and Behavioral Research ‘Information and communication technologies and
(1979) ‘The Belmont report: ethical principles and the moral economy of the household’, in Roger
guidelines for the protection of human subjects of Silverstone and Eric Hirsch (eds) Consuming
THE ETHICS OF INTERNET RESEARCH 41

Technologies: Media and Information in Domestic Walther, J.B., Gay, G. and Hancock, J.T. (2005) ‘How do
Spaces. London: Routledge. pp. 15–31. communication and technology researchers study the
Sin, C. (2005) ‘Seeking informed consent: reflections on Internet?’, Journal of Communication, 55: 632–57.
research practice’, Sociology, 39 (2): 277–294. Wiles, R., Heath, S., Crow, G. and Charles, V. (2005)
Slater, M., Antley, A., Davison, A., Swapp, D., Guger, C. Informed Consent in Social Research: A Literature
et al. (2006) ‘A virtual reprise of the Stanley Milgram Review. NCRM Methods Review Papers NCRM/001.
obedience experiments’, PLoS ONE, 1 (1): e39. Available at: http://www.ncrm.ac.uk/publications/
Doi:10.1371/journal.pone.0000039. methodsreview/MethodsReviewPaperNCRM-001.pdf.
Slater, M. and Steed, A. (2002) ‘Meeting people virtually: World Medical Association Declaration of Helsinki
experiments in shared virtual environments’, in (1964) Ethical Principles for Medical Research Involv-
R. Schroeder (ed.) The Social Life of Avatars: Presence ing Human Subjects. Available at: http://www.wma.
and Interaction in Shared Virtual Environments. net/e/policy/pdf/17c.pdf
London: Springer. pp. 146–71. Wouters, P., Hellsten, I. and Leydesdorff, L. (2004)
Stern, S. (2003) ‘Encountering distressing information Internet Time and the Reliability of Search Engines.
in online research: a consideration of legal and Available at: http://www.firstmonday.org/issues/
ethical responsibilities’, New Media and Society, 5 (2): issue9_10/wouters/. Accessed 12 September 2006.
249–66.
Taylor, T.L. (2006) Play between Worlds: Exploring
Online Game Culture. Cambridge, MA: MIT Press. FURTHER READING
Thelwall, M. and Stuart, D. (2006, to appear) ‘Web
crawling ethics revisited: cost, privacy and denial Schroeder (2007) has mapped the ethical and legal
of service’, Journal of the American Society for issues in relation to the study of shared virtual
Information Science and Technology. environments. Ess (2006) provides a valuable overview
The Royal Academy of Engineering (2007) Dilemmas of of ethical issues in social science uses of the Internet.
Privacy and Surveillance: Challenges of Technological An introduction to how the Internet is studied as a
Change. Available at: http://www.raeng.org.uk/ communication technology from a variety of disciplinary
policy/reports/default.htm. perspectives can be found in Walther, Gay and Hancock
Varnhagen, C., Gushta, M., Daniels, J., Peters, T., (2005). Varnhagen and colleagues (2005) provide an
Parmar, N., Law, D., Hirsch, R., Takach, B. and interesting discussion of informed online consent based
Johnson, T. (2005) ‘How informed is online consent?’, on empirical work. A thought-provoking discussion
Ethics and Behaviour, (15) 1: 37–48. about protecting privacy in public is provided by
Wallace, P. (1999) The Psychology of the Internet. Nissenbaum (1998). A useful overview of the security
Cambridge: Cambridge University Press. issues to consider when carrying out research online
Walther, J. (2002) ‘Research ethics in Internet-enabled is given by Nosek and colleagues (2002); and Stern
research: human subjects issues and methodological (2003) highlights the important legal and ethical issues
myopia’, Ethics and Information Technology, 4 (3): that arise when encountering distressing information
205–16. online.

You might also like