Elizabeth A. Buchanan Associate Professor and Director, Center for Information Policy Research School of Information Studies University of Wisconsin-Milwaukee Principal Investigator Internet Research Ethics Commons elizabeth@internetresearchethics.org Support for this research comes from the National Science Foundation. Presentation to the Secretary’s Advisory Committee on Human Research Protections, July 2010 Internet Research Ethics and IRBs How Does the Internet Fit In To Research? Internet as a TOOL FOR research or… Internet as a MEDIUM/LOCALE OF research TOOL=search engines, databases, catalogs, etc… MEDIUM/LOCALE=chat rooms, MUDs, MOOs, newsgroups, home pages, MMORPGs, blogs, skype, tweeting, online course software, etc Cases to Consider We had a researcher using the website "Gay Bombay" to study gay Indian men's attitudes, and the board was worried that since homosexuality is illegal in India, would participation get the respondents in trouble somehow? (Transborder issues, risk, consent) A student wishes to analyze blog postings as part of her Master’s thesis. Must she seek IRB review? If she does not, might she face journals who will not publish her work because it was not approved? A researcher wanted to use a public list archive, but—in order to post, membership was required. Must he gain consent? (No longer fits the “public park” analogy?) Can a researcher use mechanical turks ( to complete research related tasks, eg, survey responses without IRB oversight? Is aggregated facebook data really anonymous? (Zimmer, 2009/2010) (Interesting reinterpretation: Virtual Milgram) Emergence of IRE Awareness… (and Some Confusion!) 1999, Frankel and Siang report 2002, AoIR “Ethical Decision Making…” (Watch for 2010 revision!) 2003, Buchanan, Readings in Virtual Research Ethics; Chen and Hall, Online Social Research Scattered literature across disciplines IRBs facing new lexicon and challenges in their charge to protect human subjects A redefinition of what counts as a “human subject” (avatars, turks, etc) The Relationships Regulations/Regulatory Boards (Policy) Research Participants/Online Norms/ Self-Community Generated Ethical Frameworks Researchers/Disciplinary Practices/ Professional Ethics The Issues Identities/PII Ownership (Formal/ Informal) Anonymity/ Pseudonymity Security Privacy Ethics Recruitment Trolling P/O Consent Representation/ Subjectivity/ Objectivity Methodology Risk/Harm Ideology So Now What? What was missing from the literature: Empirical research on the state of internet research within IRBs: What we were reviewing and how? How were we dealing with all of those pressing issues? And—how were we preparing ourselves? Buchanan and Ess received 2006 NSF award: Internet Research Ethics: Discourse, Inquiry, Policy to survey US-based IRBs Exploratory study to examine the state and perceptions of Internet research reviews in US-based IRBs Developed a comprehensive database crossing Carnegie Classificationshttp://www.carnegiefoundation.org/classifications/ index.asp?key=783) Methods Exploratory study to examine the state and perceptions of Internet research reviews in US-based IRBs Developed a comprehensive database crossing Carnegie Classifications (http://www.carnegiefoundation.org/classifications/in dex.asp?key=783) Sent hard copy, mixed method surveys to 750 IRBs across the US Institutional Types B A S IC T rib a l S p e c /B u s S p e c /H e a lth S p e c /M e d B a c /D iv e rs e B a c /A & S -9 9 R U /V H R U /H D R U M a s te r's /S M a s te r's /M M a s te r's /L 2007-08 Data Internet Research: Of Importance or Concern to Board Miss ing 2.0% no 47.6% y es 50.3% Data Reviewing Internet Research Protocols: Checklist, Review Tool, Policy, Guidelines Available y es Miss ing 3.4% under dev elopment 17.0% 4.1% y es : exc ellent 2.0% y es : adequate 1.4% no 72.1% Data Internet Research Protocols: Designated Person to Review Miss ing y es 1.4% 15.0% no 83.7% Data Internet Research Protocols: Regulatory Documents Help in Review (i.e. CRF, OHRP Decision Charts) Miss ing 12.2% y es 45.6% no 42.2% Data HIPPA Laws: Impacts Review of Internet Research Miss ing 10.9% y es 5.4% no 83.7% Data Internet Research Ethics: ANY Research Ethics Issues: Training for Researchers Training for Researchers y es Miss ing 6.8% .7% y es y es : optional 8.8% 4.8% no 23.1% y es : optional 22.4% Miss ing 5.4% no y es : required 38.8% 84.4% y es : required 4.8% Growing Use of Commercial Tools? Buchanan and Ess, 2008, online surveys are the most frequently reviewed type of online research Use of Online Survey Tools: Creating Online Surveys: Researchers Required to Submit Privacy/Use Policies Institution Has a Tool Miss ing Miss ing 5.4% 10.9% unsure 14.3% y es no 51.0% 38.1% no 51.7% y es 28.6% Anonymity/ Confidentiality Distinction between anonymous and confidential “Our first duty as researchers is to honor the promise of confidentiality” (Easter, Davis, & Henderson, 2004). Is there a truly secure online interaction? What type of Internet location/medium is safest? Is an “anonymous” survey possible? How will subjects/participants be protected? Is encryption enough? Can one be anonymous online? One may have a “different” identity (e-betty), but that is still “me.” If e-betty is portrayed in research on an electronic support group for a medical condition, will she be identifiable? If so, at what risk? Revealing Identities How should online participants be identified in research reports given the traceability and trackbackability of online data? Screen names, pseudonyms of screen names? By changing screen names, do you detract from the “reality” or “reputation” of the participant? Text searches can reveal more context than a researcher may in her reporting (potential risk) Allow participants to make this decision? Part of informed consent? Possibilities for Consent: Lawson, 2004 1. consent to having their nickname and communicative text used for data analysis only (no publication of name or text); 2. consent to having either their nickname or text published in an academic work, but never together (i.e., no identifiers); 3. consent to having either their nickname or text published in an academic work, but never together (i.e., no identifiers) and providing they get to see the ‘write up’ prior to publication; 4. consent to having both their nickname and text published in academic work, thereby being credited as the authors of their own words; or 5. consent to having both their nickname and text published in academic work, thereby being credited as the authors of their own words, providing they get to see the ‘write up’ prior to publication (p. 93). Public and Private Spaces Is a particular forum, listserve, chat room, bulletin board, etc considered by its members to be a public space or a private space? What expectations of privacy exist? Members only? Public newsgroups? What sort of methods are being used? This might not be reviewable, eg, discourse analysis? What role does the researcher play in the space? (Observer, participant, member, other?) What is the content of the data? (Sensitive/non-sensitive?) Medical information, eg, Caring Bridge? Sveningsson’s continuum: Non-Sensitive Information ? ? Private Public No ? Sensitive Information Ownership/Stewardship of Data? With f2f research, the researcher, eg, conducts an observation. Writes field notes. Returns a report to the participant when completed. Owns “it.” Versus: A researcher conducts an observation of some newsgroup interactions. A log/transcript is generated. Researcher has a copy. So do the participants. So does the server/administrator of the news group. Who owns “it? How long does e-data last? (“I will destroy the data in 5 years…” may mean nothing in an online context where researchers are not in control) Advise researchers to inform participants/subjects about the longevity and potential risk of data intrusion. Cloud computing Respect for Persons/Autonomy (i) information obtained is recorded in such a manner that human subjects can be identified, directly or through identifiers linked to the subjects; and (ii) any disclosure of the human subjects' responses outside the research could reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects' financial standing, employability, or reputation. Practical challenges in obtaining informed consent (fluidity, changes in group membership, etc) Verification of understanding (the cornerstone of informed consent is understanding!)? Will something from a public space come back to haunt us? Use of archived quotes never intended to be represented in research? Click boxes? Hard copies? Blanket statements necessary (“I understand that online communications may be at greater risk for hacking, intrusions, and other violations. Despite these possibilities, I consent to participate”)? Blogs (don’t meet the definition of human subject as in45cfr46.102f) Are avatars “human subjects”? Recruitment Equity/fair representation in subject pool may not be possible: in our protocols, we may see “unjust” subject selection based on type of site—eg, WoW How does the researcher enter the research space to begin recruiting? Site owners, moderators, gatekeepers are key in some fora What if some in a community consent, others do not? Researchers should have plans for this reality. Research Ethics 2.0 and Beyond Collisions across disciplines (More and more disciplines, CS, Engineering, research IS human subjects; eg, malware, bot research) Negotiating or interrogating Terms of Service—in some cases, we are simply not able to control data, or know where data is, lives, for how long, who has access….OR: Third Party Sites, third party ethics…. Amplify the process of community decision-making—communal consent may become the norm? Blur the boundaries that are essential to more dichotomous models of research ethics (breaking down of binaries) Reinforce Habermasian, Feminist, Communitarian models of ground-up ethics, or, ethics as what’s possible (ethical pluralism) Redefine research (and research ethics) within communities (contextual integrity) Where Might You Go For the Answers to These and Other Pressing Questions???