Ahmed Abelhakim Hachelaf______Master Program / Research Integrity Spring 2020 Summary of Research Miscondut from Online Training and other Insights The following summary is compiled from: Helene Lake-Bullock, Marianne M. Elliott, MS, CIP Applied Research Ethics, LLC and the University of Kentucky and is part of the Mandatory Research Training required from researchers at Syracuse University and the International University of Virginia Three Main Research Misconduct I want you to pay attention to: FABRICATION "Fabrication is making up data or results and recording or reporting them" (OSTP 2000, p. 4). Fabrication often involves creating fake data to fit a hypothesis. Fabrication could include creating fictional tables, graphs, or figures that are placed in manuscripts, grant applications, or poster presentations. Unfortunately, fabricated data have contaminated the research literature in many fields, including in physics with Jan Hendrik Schön (Reich 2009) and in psychology with Diederik Stapel (Enserink 2012). Schön was employed by Bell Labs, but he was dismissed after an internal committee found that he had committed numerous instances of research misconduct, including fabricating entire data sets. Stapel was a social psychologist and his misconduct included "the manipulation of data and complete fabrication of entire experiments" (Verfaellie and McGwin 2011). FALSIFICATION "Falsification is manipulating research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record" (OSTP 2000, 76260-4). Falsification includes inappropriately manipulating existing results to fit a preferred hypothesis or altering data to make them appear more convincing than they actually are. Falsification can take many forms. For example, it can occur in figures, graphs, and digital images. For example, the animal researcher, Li Chen, was found guilty of falsifying and fabricating data reported in publications and in National Institutes of Health (NIH) grant applications. Chen also falsified figures by reusing and relabeling an image and claiming that it represented different experiments, and falsely reported that the identical image represented several different experimental treatments (Grant 2014). PLAGIARISM "Plagiarism is the appropriation of another person's ideas, processes, results, or words without giving appropriate credit" (OSTP 2000, 76260-4). Plagiarism can appear in a journal article, a conference paper, or many other venues; it occurs when someone else's words or ideas are used, such as in a results or discussion section, without giving proper credit or attribution to the original author. For example, Carleen Basler resigned from the Anthropology and Sociology Department at Amherst College after admitting that her written work contained plagiarized content (Reyes 2012). Basler's papers contained numerous instances of unattributed verbatim quotations. She did not properly reference the work of other scholars. WHY RESEARCH MISCONDUCT OCCURS INDIVIDUAL FACTORS There are a variety of reasons why an individual might engage in research misconduct. Stress and personality traits, such as arrogance or indifference, can be key contributing factors. Self-deception or rationalization of certain behaviors may also influence one's willingness to engage in research misconduct. For example, if researchers convince themselves that a preferred hypothesis is correct and do not collect enough data to support that hypothesis, they may find themselves heading down a path towards research misconduct. Individuals at any career stage may be tempted to engage in research misconduct. For example, a student might feel pressure to get good grades or complete a project on time. A faculty member may feel pressure to publish data and obtain grant funding in order to secure a promotion or tenure. A postdoctoral researcher might engage in research misconduct to obtain results quickly in order to move on to the next career stage. Alternatively, a researcher might pressure a collaborator into committing an act of misconduct. ORGANIZATIONAL FACTORS An organization's stance on the importance of research integrity sets the tone for its students and employees to follow. Conversely, the lack of an ethical climate within an organization can have corrosive effects. If individuals are not held accountable for bad behavior and rules are not enforced, research misconduct can become pervasive within an organization. Moreover, research misconduct is often connected to poor or inadequate mentoring (Anderson et al. 2007). For example, when a senior researcher does not spend enough time reviewing trainees' data or teaching them appropriate research methods, the occurrence of problematic behaviors is more likely. RELATED FACTORS The availability of certain kinds of technology, such as the Internet for acquiring information for writing assignments or software tools to alter digital images, can make research misconduct more common. Unfortunately, the ease with which researchers and others can copy text or manipulate data can create an opportunity to engage in research misconduct. OTHER PROBLEMATIC RESEARCH BEHAVIORS QUESTIONABLE RESEARCH PRACTICES Behaviors that closely border on research misconduct but do not fall under its strict definition are often referred to as questionable research practices (QRPs) (NRC 1992). Examples of QRPs include failing to disclose negative outcomes or stopping research prematurely if a preferred outcome seems to have been achieved. Other examples of QRPs include inappropriate research design and using a flawed statistical analysis to support a hypothesis. Other behaviors that affect research integrity include ignoring or circumventing organizational policies and not properly disclosing conflicts of interest (Martinson et al. 2005). AUTHORSHIP DISPUTES Disagreements about authorship should be referred to the appropriate entities within the organization, such as a research director, or external entities, such as a journal editor. Although authorship disputes can certainly become ethically problematic. THE EFFECTS OF RESEARCH MISCONDUCT ON SOCIETY Society contributes to the advancement of knowledge through public funding of research. When any researcher or research community engages in misconduct or allows it to occur, the public trust is betrayed and its funds squandered. Moreover, valuable resources and time are wasted when other researchers attempt to build on or replicate erroneous research. Society as a whole suffers when researchers conduct fake, deceptive, or otherwise unethical research. What makes this problem more serious is that identifying and determining the impact of a research misconduct case can sometimes take years. For example, if data relating to the side effects of a medication have been manipulated, the public may think or be told the medication is safer than it actually is. Steen (2011) examined about 200 papers in the area of medical research and clinical trials that were retracted due to questionable data; he comments that these retracted papers may have affected the medical care of thousands of patients. Along similar lines, research published by anesthesiologist Scott Reuben altered the way physicians provide pain relief to patients undergoing orthopedic surgery; however, much of his work contained partially or completely fabricated data. An investigation revealed that at least 21 of Reuben's papers were pure fiction (Borrell 2009). STRATEGIES FOR PREVENTING OR MITIGATING RESEARCH MISCONDUCT Policies and guidelines are useful tools. However, factors such as cultural influences and education level can affect perceptions of whether a particular behavior is acceptable or not. Open and ongoing discussions about proper research practices are crucial. For example, it should not be assumed that each member of a multi-national research team has the same understanding about what constitutes plagiarism. Setting the right tone and good mentoring go a long way towards enhancing research integrity. Encouraging mentoring throughout an organization is an effective strategy for preventing misconduct. Other prevention strategies, such as periodically verifying data collection methods, and discussing roles and responsibilities before and during a research project, are also essential. Seeking clarification and advice from trusted colleagues or an ombudsperson when something seems awry can also help avert misconduct. As Steinberg (2002) notes, "The smart move is to incorporate preventive strategies into your everyday business practices so staff and colleagues know what is expected of them and of you." SUMMARY Research misconduct can occur in any field of research. Strategies for preventing, mitigating, and detecting research misconduct are evolving. Organizations must have policies and procedures for handling allegations of research misconduct. Researchers have an obligation to avoid engaging in research misconduct or other behaviors that the research community would condemn and that erode public trust. Quiz: Which type of inappropriate practice most likely occurred if a researcher takes credit for someone else’s idea and does not acknowledge the original source? • Falsification • Plagiarism • Conflict of interest • Fabrication Which of the following is most likely to be considered plagiarism? • Tampering with research equipment. • Intentionally reporting the results of inaccurate statistical tests. • Using materials from a source without proper citation. • Adding extra data points without proper justification Further Insights on Researching Human Subjects (in case you are planning to use classroom research or interviews/ questionnaires/ Observations) ETHICAL PRINCIPLES OF THE BELMONT REPORT RESPECT FOR PERSONS Respect for persons incorporates at least two ethical convictions: first, that individuals should be treated as autonomous agents, and second, that persons with diminished autonomy are entitled to protection. The principle of respect for persons thus divides into two separate moral requirements: the requirement to acknowledge the autonomy and the requirement to protect those with diminished autonomy. AUTONOMY Autonomy means that people must be empowered to make decisions concerning their own actions and well-being. According to the principle of respect for persons, researchers must acknowledge the "considered opinions and choices" of research subjects. In other words, individuals must be given the choice whether to participate in research, and they must be provided sufficient information and possess the mental competence to make that choice. Respect for persons also recognizes that some individuals may not be capable of making decisions or choices that are in their best interest. Individuals with "diminished decision-making capacity" may lack the ability to comprehend study procedures or how participating in a study might adversely affect them. Special care should be taken to protect those with diminished capacity to the point of excluding individuals who are not able to give meaningful consent to participate in research. Children are a class of research subjects with limited autonomy. Typically, a parent or legal guardian must give permission for a child to participate in a study. Researchers also should ask child subjects for their assent by explaining the study in terms they can understand. VOLUNTARINES Voluntariness is an essential component of respect for persons. Research subjects must be free to choose to participate in research. They also must be free to end their participation for any reason, without consequences. Voluntariness means more than offering people the choice to participate in or withdraw from research. Researchers should be aware of situations in which prospective subjects may feel pressured to participate in a study. In situations where a relationship between the researcher and subjects already exists, such as when a volunteer at a homeless shelter decides to conduct research with that population, the lines between voluntariness and undue influence may be blurred. People might be reluctant to decline participation if they have come to know the researcher in another role. Other examples of situations in which researchers may exert undue influence because they are in positions of authority include: employers conducting research with their employees and professors conducting research with their students. INFORMED CONSENT A prospective research subject's autonomy is honored through the process of informed consent. The Office for Human Research Protections (OHRP 2014) offers these guidelines: The informed consent process involves three key features: (1) disclosing to potential research subjects information needed to make an informed decision; (2) facilitating the understanding of what has been disclosed; and (3) promoting the voluntariness of the decision about whether or not to participate in the research. Researchers must provide certain essential points of information, such as the purpose of the research, a description of what the subject will be asked to do, any foreseeable risks of harm, and that the study is voluntary and subjects are free to withdraw at any time. Informed consent also must be comprehensible to prospective subjects. Comprehension is the ability to understand what one is being asked to do, as well as the implications of any risks of harm associated with participating in the research. Comprehension may refer to an individual's mental capacity, but it also relates to the comprehensibility of the informed consent document, or, in the case of oral consent, the script. Researchers should create consent processes that are at an appropriate language level for the subject population. Study information can be presented in a conversational style that is easily understood by a wide range of individuals. In general, an eighth grade reading level or lower is advised. When conducting research in a language other than the researcher's native language, the researcher needs to ensure that translations are accurate and in the appropriate vernacular, and address idiomatic expressions that may not make sense in another language. BENEFICENCE Persons are treated in an ethical manner not only by respecting their decisions and protecting them from harm, but also by making efforts to secure their well-being. Such treatment falls under the principle of beneficence. The term 'beneficence' is often understood to cover acts of kindness or charity that go beyond strict obligation. In this document, beneficence is understood in a stronger sense, as an obligation. Two general rules have been formulated as complementary expression of beneficent actions in this sense: (1) do not harm and (2) maximize possible benefits and minimize possible harms (The National Commission 1979). Most research in the social and behavioral sciences, education, and the humanities, does not provide direct benefit to subjects, and risks of harm tend to be minimal. The most common risks of harm are psychological distress surrounding sensitive research and inadvertent disclosure of private identifiable information. Studies of sexuality, mental health, interpersonal violence, and illegal activities may create feelings of distress as well as risk of embarrassment and reputational harm if private information that would not ordinarily be shared with a stranger or outsider becomes public. Researchers may choose to use pseudonyms in an effort to protect the privacy of subjects, but other bits of information, taken alone or in combination, may be enough to allow for re-identification of subjects. A great deal of research in the social and behavioral sciences, however, involves minimal risk procedures, such as gathering and reporting on aggregate data using surveys and interviews. Some research involves deception, which is permissible, if researchers provide justification for the deception and prepare debriefing procedures for the subjects at the end of the study that describe the deception and explain the scientific rationale for its use. Frequently, it is not the nature of the data collected but what the researcher does with the data that carries the most risk of harm for subjects. Data security and the very notion of privacy have changed dramatically with the explosion of social media, cloud storage, data mining of web-based information, and re-identification techniques. Refraining from collecting subject names is a simple way of reducing risk of harm due to inadvertent disclosure of private identifiable information. As we have seen from the Harvard T3 study, however, that is rarely sufficient as data re-identification has emerged as a growing computer science specialization. Latanya Sweeney (2000), director of the Data Privacy Lab at Harvard University, has demonstrated that 87 percent of Americans can be uniquely identified by only three bits of demographic information: five-digit zip code, gender, and date of birth. Informed Consent There is general consensus on the importance of informed consent in research. Most people have the expectation that they will be treated with respect and as autonomous individuals. They also expect that they have the right to make decisions about what will and will not be done to them and about what personal information they will share with others. However, researchers also are aware that there are circumstances in which obtaining and documenting consent in social and behavioral research may be a complex, and often challenging, process. For instance, potential subjects may be fluent in a language but not literate. Researchers may need to deceive research subjects in order obtain scientifically valid data. Asking subjects to sign consent forms linking them to a study about illegal activities could put them at risk of harm. OVERVIEW OF INFORMED CONSENT Most regulations require researchers to obtain legally effective informed consent from the subject or the subject's legally authorized representative. There are two parts to informed consent. The first is the process of providing information to prospective subjects. The second is documentation that the process took place and is a record of the subjects' agreement to take part in the study. THE PROCESS Informed consent is a process that begins with the recruitment and screening of a subject and continues throughout the subject's involvement in the research. It includes: Providing specific information about the study to subjects in a way that is understandable to them. Answering questions to ensure that subjects understand the research and their role in it. Giving subjects sufficient time to consider their decisions. Obtaining the voluntary agreement of subjects to take part in the study. The agreement is only to enter the study, as subjects may withdraw at any time, decline to answer specific questions, or complete specific tasks at any time during the research. DOCUMENTATION Documentation of consent provides a record that the consent process took place. It generally consists of a consent form signed by the subject or the subject's LAR. In practice, this document often is used as a tool for engaging in the consent process. BASIC ELEMENTS A statement that the study involves research, an explanation of the purposes of the research and the expected duration of the subject's participation, a description of the procedures to be followed, and identification of any procedures which are experimental. A description of any reasonably foreseeable risks or discomforts to the subject. A description of any benefits to the subject or to others, which may reasonably be expected from the research. If there are no direct benefits, the researchers may tell subjects what they hope to learn, how that knowledge will contribute to the field of study or how the knowledge might benefit others if such a case can be made. A disclosure of appropriate alternative procedures or courses of treatment, if any, that might be advantageous to the subject. The description must include a full disclosure of any state-mandated reporting requirements, such as suspicion of child abuse and/or neglect or harm to others, when warranted by the topic under investigation. State requirements vary, so IRBs and researchers must be aware of state-specific information. For research involving more than minimal risk, an explanation as to whether any medical treatments are available if injury occurs and, if so, what they consist of, what compensation will be provided, and where further information may be obtained. An explanation of whom to contact for answers to pertinent questions about the research and research subjects' rights, and whom to contact in the event of a research-related injury to the subject. In some field research, there may not be any way for subjects to call or email anyone about their questions and concerns. Alternative means of communication must be established, such as a local contact on the research team. A statement that participation is voluntary, refusal to participate will involve no penalty or loss of benefits to which the subject is otherwise entitled, and the subject may discontinue participation at any time without penalty or loss of benefits to which the subject is otherwise entitled. Most researchers in the social and behavioral sciences are not in a position to impose penalties. However, specific study-related assurances that there will be no negative consequences associated with choosing not to take part might be appropriate. For example, parents may need to be assured that if they choose not to participate in a school-based, school-approved study their children's grades or placement will not be affected. ADDITIONAL ELEMENTS Depending upon the nature of the research and the risks involved, there may be additional required elements, including: A statement that the particular treatment or procedure may involve risks to the subject (or the embryo or fetus, if the subject is or may become pregnant), which are currently unforeseeable. Anticipated circumstances under which the subject's participation may be terminated by the investigator without regard to the subject's consent. Any additional costs to the subject that may result from participation in the research. The consequences of a subject's decision to withdraw from the research and procedures for orderly termination of participation by the subject. Subjects need to know, for example, how their compensation will be affected if they choose not to complete an interview. Discussion of what happens to data already collected if they withdraw midway through the study also may be addressed in this section. A statement that significant new findings developed during the course of the research which may relate to the subject's willingness to continue participation will be provided to the subject. This requirement applies primarily to biomedical research involving new treatments and procedures, but also may apply to research on experimental behavioral interventions. The approximate number of subjects involved in the study. INCENTIVES Incentives are payments or gifts offered to subjects as reimbursement for their participation. These must be described during the consent process as well as the conditions under which subjects will receive partial or no payment. RECRUITMENT Recruitment is part of the consent process because it begins the process of providing information about the study. All recruitment strategies such as fliers, email messages, newspaper advertisements, phone scripts, and so on must be reviewed and approved by an IRB before they are used. EXCULPATORY LANGUAGE Subjects may not be asked to waive or even appear to waive any of their legal rights. They may not be asked to release a researcher, sponsor, or institution from liability for negligence. Institutions may provide information about how liabilities will be covered. ENSURING COMPREHENSION OF CONSENT INFORMATION Researchers are required to provide information in a manner understandable to the subjects. This requires preparing material in the subjects' language at the appropriate reading level. When a study is complex and/or the reading or educational level of the prospective study population is low, the role of dialog and explanation becomes an even more crucial part of the consent process. ENSURING FREE CHOICE The principle of respect for persons requires that participation in research be truly voluntary, free from coercion or undue influence. Even when a study is innocuous, subjects must be informed that they do not have to take part, and they may choose to stop participating at any time. SETTING AND TIME Researchers should consider ways in which the setting of the consent process might include elements of undue influence. Potential subjects might not feel entirely free to choose whether to take part in a research study if they are: Adolescents whose parents are in the room Adolescents in a group of other adolescents being recruited for the same study Parents who receive a letter from the school principal asking them for permission to enroll their children in a study Athletes recruited by their coach Employees asked to take part by their employer Subjects must be given adequate time to consider whether they wish to take part in a study. This is particularly true if the study procedures involve more than minimal risk or will require subjects to disclose sensitive information. Compensation or incentives to participate may not be so high that they override other considerations for potential subjects. Determining whether incentives are unduly influential depends on the research context and the financial and emotional resources of the subjects. SAFEGUARDS FOR VULNERABLE SUBJECTS DURING CONSENT Most regulations ensure that appropriate safeguards are in place to protect the rights and welfare of subjects likely to be vulnerable to coercion or undue influence. Potentially vulnerable subjects include children, prisoners, pregnant women, mentally disabled persons, or economically or educationally disadvantaged persons. WAIVERS OF DOCUMENTATION Documentation of the consent process is not always required. Note, however, that waivers of documentation are not waivers of the consent process itself. For waivers of consent, see the criteria noted above. Documentation may be waived under two circumstances: The principal risks are those associated with a breach of confidentiality concerning the subject's participation in the research, and the consent document is the only record linking the subject with the research. For example: Research about women who have left abusive partners. Research on the black market capitalist economy in Cuba in which illicit vendors will be interviewed in a safe space. When the requirement for documentation is waived, the IRB may require the researcher to offer the subjects information about the study in writing. Study participation presents minimal risk of harm to the subject and the research involves no procedures requiring consent outside the context of participation in a research study, for example, a telephone survey. SUMMARY Informed consent includes both the process of sharing information and documenting that the process took place. To ensure that potential subjects can truly make informed decisions about whether to take part in research, issues of comprehension, language, and culture need to be considered in addition to the elements of information provided in the regulations. The regulations provide criteria for waiving any or all of the elements of information and the documentation of consent. PRIVACY AND CONFIDENTIALITY "Privacy can be defined in terms of having control over the extent, timing, and circumstances of sharing oneself (physically, behaviorally, or intellectually) with others. Confidentiality pertains to the treatment of information that an individual has disclosed in a relationship of trust and with the expectation that it will not be divulged to others, in ways that are inconsistent with the understanding of the original disclosure without permission." Although privacy and confidentiality are closely related, they are not identical. Privacy is related to methods of gathering information from research subjects; confidentiality refers to the obligations of researchers and institutions to appropriately protect the information disclosed to them. Confidentiality procedures, as described during the informed consent process, allow subjects to decide what measure of control over their personal information they are willing to relinquish to researchers. It is not always the case that identifiable information provided by research participants must be protected from disclosure. Some participants want to be identified and quoted. Some agree to have their photographs, audio, or video recordings published or otherwise made available to the public. CONFIDENTIALITY Researchers provide confidentiality to their subjects by appropriately protecting information the subjects disclose. The potential risk of harm to subjects if identifiable data were inadvertently disclosed is the key factor for determining what kinds of protection are needed. The ideal way to protect research data is not to collect information that could identify subjects, that is, neither direct identifiers such as names or email addresses, nor indirect identifiers such as information that could be used to deduce subjects' identities. If researchers plan to retain individually identifiable data that if inadvertently disclosed could place participants at risk of harm, researchers need to design procedures to protect the data during collection, storage, analysis, and reporting. These procedures could include creating keys linking subjects' names to unique numbers associated with the data, storing encrypted data on secure servers, removing identifiers when data collection is completed, reporting data in aggregate, and creating misleading identifiers in articles or presentations. Consent forms should clearly explain who will have access to identifiable data, both in the present and in the future, and describe any future uses of the data. For example, if researchers want to show video clips of research subjects during conference presentations or use them in a classroom, the subjects must be asked for permission to use their images in those ways. Although privacy and confidentiality deal with different aspects of a study design, how these two issues are handled translate into issues of trust and security for a research participant. Practice Questions: Question 1 Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects’ privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)? In order to eliminate the effect of observation on behavior, a researcher attends a support group and records interactions without informing the attendees. • A researcher asks cocaine users to provide names and contact information of other cocaine users who might qualify for a study. • A researcher, who is a guest, audio-records conversations at a series of private dinner parties to assess gender roles, without informing participants. • A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified. Data are made anonymous by • Destroying all identifiers connected to the data. • Keeping the key linking names to responses in a secure location. • Reporting data in aggregate form in publications resulting from the research. • Requiring all members of the research team to sign confidentiality agreements When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct? • The researcher cannot control what participants repeat about others outside the group. • Using pseudonyms in reports removes the concern about any confidences shared in the group. • If group members know each other confidentiality is not an issue. • If group participants sign confidentiality agreements, the researcher can guarantee confidentiality. A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained , and the researcher adhered to that component. Which of the following statements best characterizes what occurred? • Confidentiality of the data has been breached. • There was neither a violation of privacy nor a breach of confidentiality. • The subjects’ privacy has been violated. • There was both a violation of privacy and a breach of confidentiality. In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information? • Using pseudonyms in research reports. • Using data encryption for stored files. • Securing a Certificate of Confidentiality. • Waiving documentation of consent. INDIVIDUALLY IDENTIFYING INFORMATION Protecting subjects' privacy as well as the confidentiality of identifiable study data requires considering the ways people identify themselves when using the Internet. For example, individuals' Internet identities may be very different from their "real" (or offline) identities. Although researchers may not use a subject's real name, that subject's online username may serve as that subject's Internet identity. In this scenario, a subject's online name is considered a direct identifier. Similarly, if a researcher reports on the features and attributes of an individual's MMORPG character (for example, the character's race, job classification, equipment, weaponry, and ranking), this may indirectly identify the individual. Should researchers afford individuals' online identities the same protections as their offline identities? There are other re-identification methods unique to the Internet. For example, direct quotes taken from a blog post or forum response can be retrieved easily using a simple Google search and thus may reveal the identity of the author. A series of unique data points also may allow subject reidentification, specifically if these data points appear in more than one dataset. In addition, information that may not seem sensitive or identifiable at the time of collection may become sensitive or identifiable, inadvertently, as technological advances help researchers link, combine, and analyze data (Thompson 2012). One unique data point that could, conceivably, be used to re-identify someone is to use an Internet Protocol (IP) address. An IP address is a unique identification number assigned to every computer connected to the Internet, and is used by websites to send and retrieve information. It is said the Internet "runs on IP addresses," which is perhaps the reason why it is quite simple to trace an IP address. In fact, there are several sites that provide users with instructions on how to trace an IP address in a matter of steps. Though it is not always possible to track down a specific individual using an IP address alone, the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule considers IP addresses direct identifiers, as does the European Union (OHRP 2010; HHS 2012b). Some online research service providers, such as the survey toolbuilder Qualtrics, offer researchers the option to be given their data without an IP address as an added measure to protect the confidentiality and privacy of respondents. APPLYING ETHICAL PRINCIPLES TO INTERNET-BASED RESEARCH Respecting the autonomy of subjects and minimizing potential risks of harm to subjects are ethical principles most relevant to internet-based research. 1. HOW CAN RESEARCHERS RESPECT THE AUTONOMY OF SUBJECTS IN INTERNET-BASED RESEARCH? Respecting the autonomy of subjects requires researchers to give prospective subjects adequate information to make an informed decision before agreeing to participate in a study. This is done through the informed consent process, which includes: Providing subjects with the information they need in order to decide whether to take part in a study Documenting that the information was provided and that the subject volunteered to take part in the study The kind of information provided on an online consent form, is identical to the kind of information provided on an offline consent form. This includes most, if not all, of the required elements of informed consent. For example, one would expect the informed consent process to provide the expected duration of the study, the procedures to follow, a description of the extent, if any, to which the confidentiality of subjects' information will be maintained, and the researcher's contact information. A description of the voluntary nature of participation also is important. This means that subjects are allowed to withdraw from the study or skip questions or study-related tasks without negative consequences. Documenting consent online is quite different from documenting consent in person. Documenting consent in person often consists of a signed form that researchers and subjects keep in their possession. The challenge in designing a consent process for online studies is that they usually do not provide an opportunity for the researchers and subjects to directly interact. Fortunately for researchers, the Office for Human Research Protections (OHRP) allows them to obtain an electronic signature as a way to document consent (HHS 2012a). An electronic signature can be an embedded image of a subject's signature, a handwritten signature produced by a tablet computer, or encrypted digital signature (Thompson 2012). Nonetheless, the Common Rule allows IRBs to waive the requirement to document consent from subjects, as long as the study presents no more than minimal risk of harm to subjects and the research does not involve procedures requiring consent outside the context of participation in the study (Protection of Human Subjects 2009). However, waiving the requirement to document consent does not waive the requirement for providing a consent process. One method of providing a consent process is to design an online consent form that includes a "live button" that subjects can click to demonstrate their consent. This version of an online consent form should include a statement to the effect of, "Clicking below indicates that I have read the description of the study and I agree to participate in the study." This way, subjects are actively demonstrating their consent to participate. Note that this process does not produce a signed consent form for subjects or researchers to store as part of their research records. Other methods for securing consent for online studies include obtaining an electronic signature, as noted above, or sending a paper consent form to the subject via mail. Although the latter method produces a signed consent form, it also requires that the researcher collect personally identifiable information about their subjects that may not be necessary (Thompson 2012). Securing consent online also raises issues regarding children. In the U.S., each state determines the age of legal majority, and the age of legal majority differs from country to country. Unfortunately, researchers recruiting via the Internet cannot know where respondents reside or whether respondents are 15 or 51. Researchers may use informal age verification measures, such as asking subjects to provide their age or year of birth, or by stating that subjects must be considered an adult to participate. However, these techniques do not guarantee honest responses or compliance. Researchers could make use of several age verification methods that may prevent minors from participating in research, such as age verification services (AVS). Nonetheless, Internet research experts argue that these products, though robust, are not infallible (Thompson 2012). Thus, in the absence of a foolproof method for determining the ages of Internet users, researchers and IRBs should carefully consider approval of some of the types of online studies endeavored. Another issue related to respecting the autonomy of subjects and internet-based research includes incomplete disclosure, deception, and the complete absence of an informed consent process. The Internet offers researchers compelling opportunities to study behavior unmediated by the presence of an observer. The Internet also provides unique opportunities for observational research in private settings. For example, a researcher can register as a member of a closed group with relative ease to observe interactions among the members, while concealing his or her identity as a researcher, or use public blog posts about a group of individuals' private lives for research purposes without the individuals' consent. An IRB also may approve studies in which the informed consent process is completely waived, if it determines that the waiver is justified. For example, if a researcher wanted to study behavior and interactions among users of online virtual worlds, such as Second Life, the IRB could waive the requirement to obtain consent because consenting might alter the subject's behavior, thus making the consent process impracticable. In these types of studies, researchers "lurk" to collect data. In some instances, researchers may even adopt a false identity or create a fictitious website in order to observe private behavior. Nonetheless, the relative ease of collecting data without consenting subjects calls for more discussion about applying ethical guidelines to research conducted in Internet environments. As discussed earlier, other issues pertaining to respecting the autonomy of subjects include whether researchers bear the responsibility to interpret their subjects' expectations of privacy and how to recognize those expectations. 2. HOW CAN RESEARCHERS MINIMIZE POTENTIAL RISKS OF HARM TO RESEARCH SUBJECTS IN INTERNET-BASED RESEARCH? The greatest risk of harm to subjects taking part in social and behavioral sciences research is the inadvertent disclosure of private identifiable information that could damage their reputations, employability, insurability, or subject them to criminal or civil liability. However, several factors need to be considered when assessing potential risks, and because it may be difficult to determine where online subjects reside, assessing potential risks of harm becomes problematic. But in most internet-based research, the primary risk of harm is loss of confidentiality. Re-identification of Data Re-identification methods are unique to internet-based research. Two examples of re-identifying presumably de-identified datasets are the Harvard University study "Taste, Ties, and Time (T3)" in 2008 and the America Online (AOL) search data leak in 2006. The T3 study was a longitudinal study conducted by a group of researchers at Harvard University and the University of California, Los Angeles. The team was investigating the nature and dynamics of social networks using Facebook data from an entire cohort of undergraduate students at a university in the northeastern U.S. The researchers began collecting data in 2006 and continued data collection through 2009, at one-year intervals for each year of the cohort's college career. The result was a dataset that included "machine-readable files of virtually all the information" from 1,700 students' Facebook profiles (Lewis et al. 2008). Because the project was funded in part by an award from the National Science Foundation (NSF), the researchers were obligated by the terms of the award to share some of their data. In an attempt to protect the privacy of their subjects, the researchers did not identify the institution, removed student names and identification numbers from the dataset, and delayed releasing the cultural interests of subjects, such as movies, books, TV shows, and music. Additionally, the researchers required other researchers to agree to a "terms and conditions for use" that prohibited any attempts to re-identify subjects, disclose any identities that might be inadvertently reidentified, or otherwise compromise the privacy of the subjects. On September 25, 2008, the researchers made the first wave of de-identified data available to the public (Zimmer 2010, 31325). Within days, a researcher from the University of Wisconsin-Milwaukee was able to determine that the data came from Harvard University, and he did so without accessing the full dataset (Zimmer 2010, 313-25; Parry 2011). Although he did not identify individual students, it was clear that the dataset included enough unique indirect identifiers to re-identify the students (Zimmer 2010, 313-25; Parry 2011). In the AOL search data leak of 2006, the Internet service provider, AOL, released a dataset that included the search records of 500,000 of its users. AOL, in good faith, had intended to make the data available to benefit academic researchers. AOL had stripped the names from the data released and provided only what were supposed to be unidentifiable user numbers. However, within days, journalists from the New York Times were able to discover the identity of user number 4417749 by simply investigating the unique search queries, which were notable for various reasons. The company eventually removed the data (Hafner 2006; Jones 2006; Zeller 2006). DATA STORAGE How the data are stored also raises confidentiality issues. As technologies such as cloud computing, for example Dropbox, develop to facilitate research, researchers can expect more challenges. Cloud computing is the storage and delivery of resources, software, and information over an online network, rather than a physical product (Mell and Grance 2011). Resources, software, and information are uploaded to and stored on "cloud servers" in the U.S. and abroad. Users can then access and share these files remotely, and with relative ease. Encrypting data before uploading it to a cloud server is a recommended security measure. Data Mining New technologies are paving the way for careers and professions in data mining. Data mining is a field of computer science that involves methods such artificial intelligence, statistics, database systems management, and data processing to detect patterns from large data sets (Chakrabarti et al. 2006). Academic institutions now offer training to individuals who want to use statistical methods to extract useful information from large, multiple datasets that can be used for research purposes, including marketing (Boston University 2012; Northwestern University 2012). It is important to consider the source of the data before mining it. Unauthorized Access Researchers may use data scraping techniques to collect information from Facebook or public blog posts without consent. This is particularly concerning if email communications, although a popular method to recruit subjects, are not secure and may provide a record of subjects' identities. Similarly, hacking and unauthorized computer access has become an everyday possibility that researchers need to anticipate when conducting research in the digital age. Encrypting data while it is stored on a researcher's server is a recommended security measure. It is for these reasons that researchers should collaborate with information technology (IT) professionals to develop a data security plan. However, even the most careful security procedures used by a researcher can be voided if the subjects' computers are not secure. Describing Risks to Subjects As mentioned in the previous section, the informed consent process should describe the extent, if any, to which the confidentiality of subjects' personally identifiable information will be maintained. It is clear that ensuring the confidentiality of personally identifiable information is challenging in internet-based research. Some internet-based research experts have identified several "best practices" for describing confidentiality protections to subjects. Some of these best practices include an explanation of how data are transmitted from the subject to the researcher, how the researcher will maintain and secure the data, and a discussion to emphasize that there is no way to guarantee absolute confidentiality (Thompson 2012 ; Office for the Protection 2012). SUMMARY Though the Internet has much to offer researchers, researchers using it have several issues to consider before designing an online research study. Some of these issues include user expectations about the privacy of their information, informed consent processes, potential for reidentification of collected data, and that there are no absolute guarantees to ensure the confidentiality of personally identifiable information. Navigating these issues becomes much more intricate and complex when adding the fluid nature of the online world and the rapid development of new Internet technologies into the equation. It is for these reasons that experts in the field of Internet research ethics have described internet-based research as a "moving target." MORE RESOURCES Some helpful resources include: MichaelZimmer.org - the blog of Dr. Michael Zimmer, assistant professor in the School of Information Studies at the University of Wisconsin-Milwaukee, and co-director of the Center for Information Policy Research. MichaelZimmer.org offers relevant commentary on information ethics, privacy, new media, and values in design. The University of California-Berkeley guidance on internet-based research - an eight-page document created by the University of California-Berkeley Institutional Review Board.