Internet Research Ethics and Social Media

  • Reference work entry
  • First Online: 02 April 2020
  • Cite this reference work entry

research paper internet ethics

  • Charles Melvin Ess 2  

2894 Accesses

7 Citations

Internet research ethics (IRE) is introduced via a historical overview of its development by the Association of Internet Researchers’ ethics committees (2002, 2012, 2020) and the Norwegian Research Ethics Committees (2003, 2006, [2018] 2019). These overlapping but importantly distinctive guidelines foreground key norms and principles (starting with human autonomy and dignity), ethical frameworks (utilitarianism, deontology, virtue ethics, feminist ethics, care ethics), and prevailing, especially question-oriented approaches to identifying and resolving representative ethical challenges in internet research. Comparing and contrasting these (and other relevant) guidelines further introduce us to additional central elements of assumptions regarding personhood and moral agency (individual vis-à-vis relational); respecting and incorporating diverse national/cultural ethical traditions and norms by way of an ethical pluralism ; the role of dialogical, process approaches and reflective ethical judgment ( phronēsis ); interweaving ethics and methods; and considering ethical challenges characteristic of distinct stages of research. Two challenges evoked by Big Data research techniques are examined, beginning with the possibilities and limitations of informed consent and researchers’ possible use of “gray data” (personal information that is hacked and thus made public and available to researchers). Current and future challenges cluster about protecting both researchers’ and subjects’ privacy – specifically, privacy as now reconceptualized in terms of contextual integrity as appropriate to the more relational selves facilitated especially by social media – in an emerging Internet of Things (IoT).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

research paper internet ethics

Ethics in Digital Research

research paper internet ethics

Ethics of Social Media Research: State of the Debate and Future Challenges

Barad K (2007) Meeting the universe halfway: quantum physics and the entanglement of matter and meaning. Duke University Press, Durham

Google Scholar  

British Psychological Society (2017) Ethics guidelines for internet-mediated research. INF206/04.2017. Leicester. www.bps.org.uk/publications/policy-and-guidelines/research-guidelines-policy-documents/researchguidelines-poli

Buchanan E, Ess C (2008) Internet research ethics: the field and its critical issues. In: Himma K, Tavani H (eds) The handbook of information and computer ethics. Wiley, New York, pp 273–292

Buchanan EA, Zimmer M (2018) Internet research ethics. In: Edward N. Zalta (ed) The Stanford Encyclopedia of Philosophy. https://plato.stanford.edu/archives/win2018/entries/ethics-internet-research/

Ess C (2015) New selves, new research ethics? In: Ingierd H, Fossheim H (eds) Internet research ethics. Cappelen Damm, Oslo, pp 48–76

Ess C (2018) Ethics in HMC: recent developments and case studies. In: Guzman A (ed) Human-machine communication: rethinking communication, technology, and ourselves. Peter Lang, Berlin, pp 237–257

Ess C, Fossheim H (2013) Personal data: changing selves, changing privacy expectations. In: Hildebrandt M, O’Hara K, Waidner M (eds) Digital enlightenment forum yearbook 2013: the value of personal data. Amsterdam, IOS Amsterdam, pp 40–55

Ess C, Hård af Segerstad Y (2019) Everything old is new again: the ethics of digital inquiry and its design. In: Mäkitalo Å, Nicewonger TE, Elam M (eds) Designs for experimentation and inquiry: approaching learning and knowing in digital transformation. Routledge, London, pp 179–196

Chapter   Google Scholar  

Ess C, The Association of Internet Researchers Ethics Working Committee (2002) Ethical decision-making and internet research: recommendations from the AoIR ethics working committee. https://aoir.org/reports/ethics.pdf

European Data Protection Supervisor (2018) Towards a digital ethics. Ethics Advisory Group. https://edps.europa.eu/sites/edp/files/publication/18-01-25_eag_report_en.pdf

Floridi L (2013) Distributed Morality in an Information Society. Sci Eng Ethics 19:727. https://doi.org/10.1007/s11948-012-9413-4

Article   Google Scholar  

Fotopoulou A (forthcoming) Understanding citizen data practices from a feminist perspective: embodiment and the ethics of care. In: Stephansen H, Trere E (eds) Citizen media and practice. Taylor & Francis/Routledge, Oxford

Frankel MS, Siang S (1999) Ethical and Legal Aspects of Human Subjects Research in Cyberspace. A Report of a Workshop, June 10–11. American Association for the Advancement of Science, Washington, DC, p 1999

Franzke A (2019) Feminist research ethics. In: franzke et al Internet research: ethical guidelines 3.0. pp 28–37

franzke a, Bechmann A, Ess C, Zimmer M, The AoIR Ethics Working Group (2020) Internet research: ethical guidelines 3.0

GDPR General Data Protection Regulation, (GDPR) Regulation EU 2016/679. Approved 27 April 2016, implemented May 25 2018. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679 .

Gilligan C (1982) In a different voice: psychological theory and women’s development. Harvard University Press, Cambridge, MA

Goffman E (1959) The presentation of self in everyday life. Penguin Books, London

Hall GJ, Frederick D, Johns MD (2003) “NEED HELP ASAP!!!” A feminist communitarian approach to online research ethics. In: Johns M, Chen SL, Hall J (eds) Online social research: methods, issues, and ethics. Peter Lang, New York, pp 239–252

Hård af Segerstad Y, Kullenberg C, Kasperowski D, Howes C (2017) Studying closed communities on-line: digital methods and ethical considerations beyond informed consent and anonymity. In: Zimmer M, Kinder-Kurlanda K (eds) Internet research ethics for the social age: new challenges, cases, and contexts. Peter Lang, Berlin, pp 213–225

Hjarvard S (2017) Mediatization (Critical theory approaches to media effects). In: International encyclopedia of media effects. Wiley. https://doi.org/10.1002/9781118783764.wbieme0107

Hoffman AL, Jonas A (2017) Recasting justice for internet and online industry research ethics. In: Zimmer M, Kinder-Kurlanda K (eds) Internet research ethics for the social age. Peter Lang, Berlin, pp 3–18

Hongladarom S (2017) internet research ethics in a non-western context. In: Zimmer M, Kinder-Kurlanda K (eds) Internet research ethics for the social age: new challenges, cases, and contexts. Peter Lang, Berlin, pp 151–163

Jackson D, Aldrovandi C, Hayes P (2015) Ethical framework for a disaster management decision support system which harvests social media data on a large scale. In Bellamine Ben Saoud N et al (eds) ISCRAM-med 2015. pp 167–180), LNBIP 233. https://doi.org/10.1007/978-3-319-24399-3_15

King S (1996) Researching internet communities: proposed ethical guidelines for the reporting of results. Inf Soc 12(2):119–128. https://doi.org/10.1080/713856145

Kramer A, Guillory J, Hancock J (2014) Experimental evidence of massive scale emotional contagion through social networks. Proc Natl Acad Sci U S A 111 (24: June 17, 2014) 8788–8790; first published June 2, 2014. https://doi.org/10.1073/pnas.1320040111

Lange, P (2007) Publicly private and privately public: social networking on YouTube. J Comput-Mediat Commun 13 (1: 2007), article 18. https://doi.org/10.1111/j.1083-6101.2007.00400.x

Leurs K (2017) Feminist data studies. Using digital methods for ethical, reflexive and situated socio-cultural research. Fem Rev 115(1):130–154. https://doi.org/10.1057/s41305-017-0043-1

Locatelli E (2020) Corporate data: ethical considerations. In: franzke et al Internet research: ethical guidelines 3.0. pp 45–54

Lomborg S (2012) Negotiating privacy through phatic communication: a case study of the blogging self. Philos Technol 25:415–434. https://doi.org/10.1007/s13347-011-0018-7

Luka ME, Milette M (2018) (Re)framing big data: activating situated knowledges and a feminist ethics of care in social media research. Soc Media Soc 4(2):1–10. https://doi.org/10.1177/2056305118768297

Lupton D (2018) How do data come to matter? Living and becoming with personal data. Big Data & Society (July–December 2018). pp 1–11. https://doi.org/10.1177/2053951718786314

Markham A (2006) Method as ethic, ethic as method. J Inf Ethics 15(2):37–54. https://aoir.org/aoir_ethics_graphic_2016/

Markham A, Buchanan E (2012) Ethical Decision-Making and Internet Research: Recommendations from the AoIR Ethics Working Committee (Version 2.0). http://www.aoir.org/reports/ethics2.pdf

Massanari A (2017) #Gamergate and the fappening: how Reddit’s algorithm, governance, and culture support toxic technocultures. New Media Soc 19(3):329–346. https://doi.org/10.1177/1461444815608807

McKee H, Porter JE (2009) The ethics of internet research: a rhetorical, case-based process. Peter Lang, Berlin

McKee H, Porter J (2010) Rhetorica online: feminist research practices in cyberspace. In: Schell EE, Rawson KJ (eds) Rhetorica in motion: feminist rhetorical methods & methodologies. University of Pittsburgh Press, Pittsburgh, pp 152–170

Mukherjee I (2017) Case study of ethical and privacy concerns in a digital ethnography of South Asian Blogs against intimate partner violence. In: Zimmer M, Kinder-Kurlanda K (eds) Internet research ethics for the social age. Peter Lang, Berlin, pp 203–212

NESH (The [Norwegian] National Committee for Research Ethics in the Social Sciences and the Humanities) ([2018] 2019) A guide to internet research ethics. NESH, Oslo. https://www.etikkom.no/en/ethical-guidelines-for-research/ethical-guidelines-for-internet-research/

Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Palo Alto

OHRP (Office for Human Research Protections) (2018) Subpart A of 45 CFR Part 46: basic HHS policy for protection of human subjects. https://www.hhs.gov/ohrp/sites/default/files/revised-common-rule-reg-text-unofficial-2018-requirements.pdf

Poor N (2017) The ethics of using hacked data: Patreon’s data hack and academic data standards. In: Zimmer M, Kinder-Kurlanda K (eds) Internet research ethics for the social age. Peter Lang, Berlin, pp 278–280

Rambukkana N (2019) The politics of gray data: digital methods, intimate proximity, and research ethics for work on the “Alt-Right”. Qual Inq 25(3):312–323

Rensfeldt AB, Hillman T, Lantz-Andersson A, Lundin M, Peterson L (2019) A “Situated ethics” for researching teacher professionals’ emerging facebook group discussions. In: Mäkitalo A, Nicewonger TE, Elam M (eds) designs for experimentation and inquiry: approaching learning and knowing in digital transformation. Routledge, London, pp 197–213

Simon J (2015) Distributed epistemic responsibility in a hyperconnected era. In: Floridi L (ed) The onlife manifesto: being human in a hyperconnected era. Springer Open, London, pp 145–159

Skarstein V (n.d.) There shall be freedom of expression. https://www.bibalex.org/WSISALEX/3.There%20shall%20be%20freedom%20of%20expression%20by%20Vigdis%20Skarstein.doc

Suomela T, Chee F, Berendt B, Rockwell G (2019) Applying an ethics of care to internet research: Gamergate and digital humanities. Digital Studies/Le champ numérique 9(1). https://www.digitalstudies.org/articles/10.16995/dscn.302/

Taylor C (1989) Sources of the self: the making of the modern identity. Harvard University Press, Cambridge

Taylor L, Floridi L, van der Sloot B (eds) (2017) Group privacy: new challenges of data technologies. Springer, Dordrecht

The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research (1979) The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.html

The [Norwegian] National Committee for Research Ethics in the Social Sciences and the Humanities (NESH) (2006) Forskningsetiske retningslinjer for samfunnsvitenskap, humaniora, juss og teologi [Research ethics guidelines for social sciences, the humanities, law and theology]

Tiidenberg K (2018) Research ethics, vulnerability, and trust on the Internet. In: Hunsinger J, Klastrup L, Allen M (eds) Second international handbook of Internet research. Springer, Dordrecht

Tong R, Williams N (2018) Feminist ethics. In: Zalta EN (ed) The Stanford encyclopedia of philosophy. https://plato.stanford.edu/archives/win2018/entries/feminism-ethics/

Vallor S (2010) Social networking technology and the virtues. Ethics Inf Technol 12:157–170. https://doi.org/10.1007/s10676-009-9202-1

Vallor S (2016) Technology and the virtues: a philosophical guide to a future worth wanting. MIT Press, Cambridge, MA

Book   Google Scholar  

van Schie G, Westra I, Schäfer MT (2016) Get your hands dirty: emerging data practices as challenge for research integrity. In: Schäfer MT, van Ess K (eds) The datafied society: studying culture through data. Amsterdam University Press, Amsterdam, pp 183–200

Walstrom M (2004) Ethics and engagement in communication scholarship: analyzing public, online support groups as researcher/participant-experiencer. In: Buchanan E (ed) Readings in virtual research ethics: issues and controversies. Information Science, Hershey, pp 174–202

Westlund A (2009) Rethinking relational autonomy. Hypatia 24(4: Fall):26–49

Zevenbergen B, Mittelstadt B, Véliz C, Detweiler C, Cath C, Savulescu J, Whittaker M (2015) Philosophy meets internet engineering: Ethics in networked systems research. (GTC workshop outcomes paper). Oxford Internet Institute, University of Oxford. http://ensr.oii.ox.ac.uk/wp-content/uploads/sites/41/2015/09/ENSR-Oxford-Workshop-report.pdf

Zimmer M (2016) OKCupid study reveals the Perils of Big-Data science. Wired Opinion (May 14). https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-data-science/

Download references

Author information

Authors and affiliations.

Department of Media and Communication, University of Oslo, Oslo, Norway

Charles Melvin Ess

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Charles Melvin Ess .

Editor information

Editors and affiliations.

Chatelaillon Plage, France

Ron Iphofen

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Cite this entry.

Ess, C.M. (2020). Internet Research Ethics and Social Media. In: Iphofen, R. (eds) Handbook of Research Ethics and Scientific Integrity. Springer, Cham. https://doi.org/10.1007/978-3-030-16759-2_12

Download citation

DOI : https://doi.org/10.1007/978-3-030-16759-2_12

Published : 02 April 2020

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-16758-5

Online ISBN : 978-3-030-16759-2

eBook Packages : Religion and Philosophy Reference Module Humanities and Social Sciences Reference Module Humanities

Share this entry

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

SEP logo

  • Table of Contents
  • New in this Archive
  • Chronological
  • Editorial Information
  • About the SEP
  • Editorial Board
  • How to Cite the SEP
  • Special Characters
  • Support the SEP
  • PDFs for SEP Friends
  • Make a Donation
  • SEPIA for Libraries
  • Entry Contents

Bibliography

Academic tools.

  • Friends PDF Preview
  • Author and Citation Info
  • Back to Top

Internet Research Ethics

There is little research that is not impacted in some way on or through the Internet. The Internet, as a field, a tool, and a venue, has specific and far reaching ethical issues. Internet research ethics is a subdiscipline that fits across many disciplines, ranging from social sciences, arts and humanities, medical/biomedical, and hard sciences. Extant ethical frameworks, including consequentialism , utilitarianism , deontology , virtue ethics , and feminist ethics have contributed to the ways in which ethical issues in Internet research are considered and evaluated.

Conceptually and historically, Internet research ethics is related to computer and information ethics computer and information ethics ) pdf include--> and includes such ethical issues as participant knowledge and consent, data privacy, security, confidentiality, and integrity of data, intellectual property issues, and community, disciplinary, and professional standards or norms. Throughout the Internet’s evolution, there has been debate whether there are new ethical dilemmas emerging, or if the existing dilemmas are similar to dilemmas in other research realms or despite technological influence (Elgesem 2002; Walther 2002; Ess & AoIR 2002; Marhkam & Buchanan, 2012). These debates are similar to philosophical debates in computer and information ethics. For example, many years ago, James Moor (1985) asked “what is special about computers” in order to understand what, if anything, is unique ethically. Today, the same question applies to Internet research (Ess & AoIR 2002; King 1996).

Yet, as the Internet has evolved into a more social and communicative tool and venue, the ethical issues have shifted from purely data driven to more human-centered. “On-ground” or face-to-face analogies, however, may not be applicable to online research. For example, the concept of the public park has been used as a site where researchers might observe others with little ethical controversy, but online, the concepts of public versus private are much more complex. Thus, some scholars suggest that the specificity of Internet research ethics calls for new regulatory and/or professional and disciplinary guidance. For these reasons, the concept of human subjects research policy and regulation informs this entry, along with disciplinary standards, which will explore the growing areas of ethical and methodological complexity, including personal identifiability, reputational risk and harm, notions of public space and public text, ownership, and longevity of data as they relate to Internet research. Specifically, the emergence of the social web raises issues around subject or participant recruitment practices, tiered informed consent models, and protection of various expectations and forms of privacy in an ever-increasing world of diffused and ubiquitous technologies; anonymity and confidentiality of data in spaces where researchers and their subjects may not fully understand the terms and conditions of those venues or tools; challenges to data integrity as research projects can be outsourced or crowdsourced to online labor marketplaces; and jurisdictional issues as more research is processed, stored, and disseminated via cloud computing or in remote server locales, presenting myriad legal complexities given jurisdictional differences in data laws. Further, the emergence of big data research has grown and has become the next discrete phase of Internet research, following social media and social computing.

As a result, researchers using the Internet as a tool for and/or a space of research—and their research ethics boards (REBs), also known as institutional review boards (IRBs) in the United States or human research ethics committees (HRECs) in other countries such as Australia—have been confronted with a series of new ethical questions: What ethical obligations do researchers have to protect the privacy of subjects engaging in activities in “public” Internet spaces? What are such public spaces? Is there any reasonable expectation of privacy in an era of pervasive and ubiquitous surveillance and data tracking? How is confidentiality or anonymity assured online? How is and should informed consent be obtained online? How should research on minors be conducted, and how do you prove a subject is not a minor? Is deception (pretending to be someone you are not, withholding identifiable information, etc) online a norm or a harm? How is “harm” possible to someone existing in an online space? How identifiable are individuals in large data sets? Do human subjects protections apply to big data? As more industry-sponsored research takes place, what ethical protections exist outside of current regulatory structures?

A growing number of scholars have explored these and related questions (see, for example, Bromseth 2002; Bruckman 2006; Buchanan 2004; Buchanan & Ess 2008; Johns, Chen & Hall 2003; Kitchin 2003, 2008; King 1996; Mann 2003; Markham & Baym 2008; McKee & Porter 2009; Thorseth 2003; Ess 2016; Zimmer & Kinder-Kurlanda, forthcoming), scholarly associations have drafted ethical guidelines for Internet research (Ess & Association of Internet Researchers 2002; Markham, Buchanan, and AoIR, 2012; Kraut et al. 2004), and non-profit scholarly and scientific agencies such as AAAS (Frankel & Siang 1999) have begun to confront the myriad of ethical concerns that Internet research poses to researchers and research ethics boards (REBs).

1. Definitions

2. human subjects research, 3. history and development of ire as a discipline, 4.1 privacy, 4.2 recruitment, 4.3 informed consent, 4.4 cloud computing and research ethics.

  • 4.5 Big Data Research
  • 4.6 Internet Research Ethics and Industry-Conducted Research

5. Research Ethics Boards Guidelines

Other internet resources, related entries.

The commonly accepted definition of Internet research ethics (IRE) has been used by Buchanan and Ess (2008, 2009), Buchanan (2010), and Ess & Association of Internet Researchers (AoIR) (2002):

IRE is defined as the analysis of ethical issues and application of research ethics principles as they pertain to research conducted on and in the Internet. Internet-based research, broadly defined, is research which utilizes the Internet to collect information through an online tool, such as an online survey; studies about how people use the Internet, e.g., through collecting data and/or examining activities in or on any online environments; and/or, uses of online datasets, databases, or repositories.

These examples were broadened in 2012 by the United States Secretary’s Advisory Committee to the Office for Human Research Protections, and included under the umbrella term Internet Research:

  • Research studying information that is already available on or via the Internet without direct interaction with human subjects (harvesting, mining, profiling, scraping, observation or recording of otherwise-existing data sets, chat room interactions, blogs, social media postings, etc.)
  • Research that uses the Internet as a vehicle for recruiting or interacting, directly or indirectly, with subjects (Self-testing websites, survey tools, Amazon Mechanical Turk, etc.)
  • Research about the Internet itself and its effects (use patterns or effects of social media, search engines, email, etc.; evolution of privacy issues; information contagion; etc.)
  • Research about Internet users: what they do, and how the Internet affects individuals and their behaviors Research that utilizes the Internet as an interventional tool, for example, interventions that influence subjects’ behavior
  • Others (emerging and cross-platform types of research and methods, including m-research (mobile))
  • Recruitment in or through Internet locales or tools, for example social media, push technologies

A critical distinction in the definition of Internet research ethics is that between the Internet as a research tool versus a research venue. The distinction between tool and venue plays out across disciplinary and methodological orientations. As a tool, Internet research is enabled by search engines, data aggregators, databases, catalogs, and repositories, while venues include such places or locales as conversation applications (IM/chat rooms, for example), MUDs, MOOs, MMORPGs, (forms of role-playing games, virtual worlds) newsgroups, home pages, blogs, micro-blogging (i.e., Twitter), RSS feeds, crowdsourcing applications, or online course software.

Another way of conceptualizing the distinction between tool and venue comes from Kitchin (2008), who has referred to a distinction in Internet research using the concepts of “engaged web-based research” versus “non-intrusive web-based research:” “Non-intrusive analyses refer to techniques of data collection that do not interrupt the naturally occurring state of the site or cybercommunity, or interfere with premanufactured text. Conversely, engaged analyses reach into the site or community and thus engage the participants of the web source” (p. 15). These two constructs provide researchers with a way of recognizing when considering of human subject protections might need to occur. McKee and Porter (2009), as well as Banks and Eble (2007) provide guidance on the continuum of human-subjects research, noting a distinction between person-based versus text-based. For example, McKee and Porter provide a range of research variables (public/private, topic sensitivity, degree of interaction, and subject vulnerability) which are useful in determining where on the continuum of text-based versus how person-based the research is, and whether or not subjects would need to consent to the research (pp. 87–88).

While conceptually useful for determining human subjects participation, the distinction between tool and venue or engaged versus non-intrusive web-based research is increasingly blurring in the face of social media and their third party applications. Buchanan (2016) has conceptualized three phases or stages of Internet research, and the emergence of social media characterize the second phase, circa 2006-2014. The concept of social media entails “A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content” (Kaplan & Haenlein 2010). A “social network site” is a category of websites with profiles, semi-persistent public commentary on the profile, and a traversable publicly articulated social network displayed in relation to the profile.

This collapse of tool and venue can be traced primarily to the increasing use of third party sites and applications such as Facebook, Google+, or any of the myriad online survey tools where subject or participant recruitment, data collection, data analysis, and data dissemination can all occur in the same space. Gilbert (2009) has specifically argued against the terms of use or end user license agreement stipulations in virtual worlds, noting that such agreements are often “flawed,” as they rely on laws and regulations from a specific locale and attempt to enforce them in a non place-based environment. The terms of “inter-jurisdictional coordination” (p. 3) are inherently challenging. Nonetheless, researchers now make frequent use of data aggregation tools, scraping data from user profiles or transaction logs, harvesting data from Twitter streams, or storing data on cloud servers such as Dropbox, only after agreeing to the terms of service that go along with those sites. The use of such third party applications or tools changes fundamental aspects of research, and are unique characteristics of Internet research at this time. These unique characteristics implicate concepts and practicalities of privacy, consent, ownership, jurisdictional boundaries, and recruitment measures.

A key moment that typified and called attention to many of these concerns emerged with the 2014 Facebook Emotional Contagion study. By virtue of agreeing to Facebook’s Terms of Service, did users consent to participation in research activities? Should there have been a debriefing after the experiment? How thoroughly did a university research ethics board review the study? Should industry-sponsored research undergo internal ethics review? In response to the outcry of the Contagion study, Ok Cupid’s Christian Rudder (2014) defended these sorts of experiments, noting “We noticed recently that people didn’t like it when Facebook ‘experimented’ with their news feed. Even the FTC is getting involved. But guess what, everybody: if you use the Internet, you’re the subject of hundreds of experiments at any given time, on every site. That’s how websites work.”

The phenomenon of the social web forces an ongoing negotiation between researchers and their data sources or human subjects, as seen in the Facebook contagion study and the subsequent reaction to it. Moreover, with the growing use and concentration of mobile devices, the notion of Internet research is expanding with a movement away from a “place-based” Internet to a dispersed reality. Data collection from mobile devices is on the increase. For example, mobile devices enable the use of synchronous data collection and dissemination from non-place based environments. Researchers using cloud-enabled applications can send and receive data to and from participants synchronously. The impact of such research possibilities for epidemiological research (Leibovici et al. 2010) to community-based participatory research (Parras et al. 2011) is staggering for its scientific potential while demanding for the concurrent ethical challenges. Many of these challenges require a careful consideration of traditional notions of human subjects research and how Internet research pushes the boundaries of these notions.

The practical, professional, and theoretical implications of human subjects protections has been covered extensively in scholarly literature, ranging from medical/biomedical to social sciences to computing and technical disciplines (see Beauchamp & Childress 2008; Emanual et al. 2003; Sieber 1992 and forthcoming; Wright 2006). Relevant protections and regulations continue to receive much attention in the face of research ethics violations (see, for example, Skloot 2010, on Henrietta Lacks; the U.S. Government’s admission and apology to the Guatemalan Government for STD testing in the 1940s; and Gaw & Burns 2011, on how lessons from the past might inform current research ethics and conduct).

The history of human subjects protections (Sparks 2002—see Other Internet Resources) grew out of atrocities such as Nazi human experimentation during World War II, which resulted in the Nuremberg Code, in 1947; subsequently followed by the Declaration of Helsinki on Ethical Principles for Medical Research Involving Human Subjects (World Medical Association 1964/2008). In response to the Tuskegee syphilis experiment, an infamous clinical study conducted between 1932 and 1972 by the U.S. Public Health Service studying the natural progression of untreated syphilis in rural African-American men in Alabama under the guise of receiving free health care from the government, the U.S. Department of Health and Human Services put forth a set of basic regulations governing the protection of human subjects (45 C.F.R. § 46), followed by the publication of the “Ethical Principles and Guidelines for the Protection of Human Subjects of Research” by the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, known as the Belmont Report (NCPHSBBR 1979). The Belmont Report identifies three fundamental ethical principles for all human subjects research: Respect for Persons, Beneficence, and Justice.

To ensure consistency across federal agencies in the United States context in human subjects protections, in 1991, the Federal Policy for the Protection of Human Subjects, also known as the “Common Rule” was codified. Similar regulatory frameworks protecting human subjects have emerged across the world, including the Canadian Tri-Council, the Australian Research Council, The European Commission, The Research Council of Norway and its National Committee for Research Ethics in the Social Sciences and Humanities (NESH 2006; NESH 2014), and the U.K.’s NHS National Research Ethics Service and the Research Ethics Framework (REF) of the ESRC (Economic and Social Research Council) General Guidelines, and the Forum for Ethical Review Committees in Asia and the Western Pacific (FERCAP).

To date, the various U.S. regulatory agencies bound by the Common Rule have not issued formal guidance on Internet research. Similarly, few regulatory bodies in other countries have changed or redefined their regulations because of, or in light of, Internet research. However, guidelines for researcher and reviewer considerations have begun to emerge globally. Despite regional and cultural difference, Buchanan (2010) has outlined the similarities in the mission, scope, and intentions the REBs globally, predominantly around shared notions of risk and harm, justice, and respect for persons.

While stopping short of regulatory guidance, many research ethics boards are exploring the ways in which Internet research complicates traditional models of human subjects protections can be, or are, applied. For example, the United States Department of Health and Human Services (DHHS) and the Office for Human Research Protections (OHRP) operate with the following definition of human subjects (45 C.F.R. § 46.102(f) 2009).

Human subject means a living individual about whom an investigator (whether professional or student) conducting research obtains data through intervention or interaction with the individual, or identifiable private information. Intervention includes both physical procedures by which data are gathered (for example, venipuncture) and manipulations of the subject or the subject’s environment that are performed for research purposes. Interaction includes communication or interpersonal contact between investigator and subject. Private information includes information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information which has been provided for specific purposes by an individual and which the individual can reasonably expect will not be made public (for example, a medical record). Private information must be individually identifiable (i.e., the identity of the subject is or may readily be ascertained by the investigator or associated with the information) in order for obtaining the information to constitute research involving human subjects (OHRP, 2008).

Two novel notions entering human subjects discourse include “human non-subjects research” and “human harming research.” Brothers and Clayton (2010) propose human non-subjects as a conceptual category, not as a replacement of regulatory language but as another category for research review considerations. Human non-subjects research is emerging in light of technological advancements and research development which uses deidentified information on humans, for example, genetic data, or discrete variables from a data set, specifically in the contexts of tissue banking or deidentified data in repositories that are used for other research beyond when the samples or data were first collected. An individual may have consented to the original research, say, in a clinical trial, in such cases, reconsent may be impossible, yet the samples may still pose reidentification risks to humans. For instance, as data sets are shared, data may be scrubbed to remove all identifiers, or some identifiers may be kept with the data or the data custodian. Rothstein (2010) agrees, with a clear eye to privacy and risk: “The use of deidentified health information and biological specimens in research creates a range of privacy and other risks to individuals and groups. The current regulatory system, under which privacy protections are afforded identifiable information but no protections apply to deidentified information, needs to be revised” (p. 3). O’Rourke (2007) has provided guidance on the use of human specimens and banking, which could be adapted to other forms of data banking.

Carpenter and Dittrich (2011) and Aycock et al. (2012) refer to the notion of “human-harming research” as a variable in human subjects review in Internet, or more specifically, computer science or information/communication technology (ICT) research. Carpenter and Dittrich encourage

Review boards [to] transition from an informed consent driven review to a risk analysis review that addresses potential harms stemming from research in which a researcher does not directly interact with the at-risk individuals….[The] distance between researcher and affected individual indicates that a paradigm shift is necessary in the research arena. We must transition our idea of research protection from “human subjects research” to “human harming research.” [ 1 ]

Similarly, Aycock et al. (2012) assert that

Researchers and boards must balance presenting risks related to the specific research with risks related to the technologies in use. With computer security research, major issues around risk arise, for society at large especially. The risk may not seem evident to an individual but in the scope of security research, larger populations may be vulnerable. There is a significant difficulty in quantifying risks and benefits, in the traditional sense of research ethics….An aggregation of surfing behaviors collected by a bot presents greater distance between researcher and respondent than an interview done in a virtual world between avatars. This distance leads us to suggest that computer security research focus less concern around human subjects research in the traditional sense and more concern with human harming research. (italics original)

These two conceptual notions are relevant for considering emergent forms of identities or personally identifiable information (PII) such as avatars, virtual beings, bots, textual and graphical information. Within the Code of Federal Regulations (45 C.F.R. § 46.102(f) 2009): New forms of representations are considered human subjects if PII about living individuals is obtained. PII can be obtained by researchers through scraping data sources, profiles or avatars, or other pieces of data made available by the human “behind the avatar or other representation” (Odwazny & Buchanan 2011). Fairfield agrees: “An avatar, for example, does not merely represent a collection of pixels—it represents the identity of the user” (2012, p. 701)

The multiple disciplines already long engaged in human subjects research (medicine, sociology, anthropology, psychology, communication) have established ethical guidelines intended to assist researchers and those charged with ensuring that research on human subjects follows both legal requirements and ethical practices. But with research involving the Internet—where individuals increasingly share personal information on platforms with porous and shifting boundaries, where both the spread and aggregation of data from disparate sources is increasingly the norm, and where web-based services, and their privacy policies and terms of service statements, morph and evolve rapidly—the ethical frameworks and assumptions traditionally used by researchers and REBs are frequently challenged.

At the time of this revision, the Department of Health and Human Services has been working on a revision to the Common Rule. The Notice of Proposed Rule Making includes revisions to categories of research, consent, and data security, among other changes that affect research in the social-behavioral-educational and biomedical realms.

An extensive body of literature has developed since the 1990s around the use of the Internet for research (Jones 1999; Hunsinger, Klastrup & Allen 2010; Consalvo & Ess 2010), with a growing emphasis on the ethical dimensions of Internet research.

A flurry of Internet research, and explicit concern for the ethical issues concurrently at play in it, began in the mid 1990s. In 1996, Storm King recognized the growing use of the Internet as a venue for research. His work explored the American Psychological Association’s guidelines for human subjects research with emergent forms of email, chat, listservs, and virtual communities. With careful attention to risk and benefit to Internet subjects, King offered a cautionary note:

When a field of study is new, the fine points of ethical considerations involved are undefined. As the field matures and results are compiled, researchers often review earlier studies and become concerned because of the apparent disregard for the human subjects involved. (King 1996,119)

The 1996 issue of Information Society dedicated to Internet research is considered a watershed moment, and included much seminal research, still of impact and relevance today (Allen 1996; Boehlefeld 1996; Reid 1996).

Sherry Turkle’s 1997 Life on the Screen: Identity in the Age of the Internet called direct attention to the human element of online game environments. Moving squarely towards person-based versus text-based research, Turkle pushed researchers to consider human subjects implications of Internet research. Similarly, Markham’s Life Online: Researching Real Experience in Virtual Space (1998) highlighted methodological complexities of online ethnographic studies, as did Jacobson’s 1999 methodological treatment of Internet research. The “field” of study changed the dynamics of researcher-researched roles, identity, and representation of participants from virtual spaces. Markham’s work in qualitative online research has been influential across disciplines, as research in nursing, psychology, and medicine has found the potential of this paradigm for online research (Flicker et al. 2004; Esyenbach & Till 2001; Seaboldt & Kupier 1997; Sharf 1996;).

Then, in 1999, the American Association for the Advancement of Science (AAAS), with a contract from the U.S. Office for Protection from Research Risks (now known as the Office for Human Research Protections), convened a workshop, with the goal of assessing the alignment of traditional research ethics concepts to Internet research. The workshop acknowledged

The vast amount of social and behavioral information potentially available on the Internet has made it a prime target for researchers wishing to study the dynamics of human interactions and their consequences in this virtual medium. Researchers can potentially collect data from widely dispersed population sat relatively low cost and in less time than similar efforts in the physical world. As a result, there has been an increase in the number of Internet studies, ranging from surveys to naturalistic observation. (Frankel & Siang 1999)

In the medical/biomedical contexts, Internet research is growing rapidly. Also in 1999, Gunther Eysenbach wrote the first editorial to the newly formed Journal of Medical Internet Research . There were three driving forces behind the inception of this journal, and Eysenbach calls attention to the growing social and interpersonal aspects of the Internet:

First, Internet protocols are used for clinical information and communication. In the future, Internet technology will be the platform for many telemedical applications. Second, the Internet revolutionizes the gathering, access and dissemination of non-clinical information in medicine: Bibliographic and factual databases are now world-wide accessible via graphical user interfaces, epidemiological and public health information can be gathered using the Internet, and increasingly the Internet is used for interactive medical education applications. Third, the Internet plays an important role for consumer health education, health promotion and teleprevention. (As an aside, it should be emphasized that “health education” on the Internet goes beyond the traditional model of health education, where a medical professional teaches the patient: On the Internet, much “health education” is done “consumer-to-consumer” by means of patient self support groups organizing in cyberspace. These patient-to-patient interchanges are becoming an important part of healthcare and are redefining the traditional model of preventive medicine and health promotion).

With scholarly attention growing and with the 1999 AAAS report calling for action, other professional associations took notice and began drafting statements or guidelines, or addendum to their extant professional standards. For example, The Board of Scientific Affairs (BSA) of the American Psychological Association established an Advisory Group on Conducting Research on the Internet in 2001; the American Counseling Association’s 2005 revision to its Code of Ethics; the Association of Internet Researchers (AoIR) Ethics Working Group Guidelines, The National Committee for Research Ethics in the Social Sciences and the Humanities Research Ethics Guidelines for Internet Research, among others, have directed researchers and review boards to the ethics of Internet research, with attention to the most common areas of ethical concern (see Other Internet References for links).

While many researchers focus on traditional research ethics principles, conceptualizations of Internet research ethics depend on disciplinary perspectives. Some disciplines, notably from the arts and humanities, posit that Internet research is more about context and representation than about “human subjects,” suggesting there is no intent, and thus minimal or no harm, to engage in research about actual persons. The debate has continued since the early 2000s. White (2002) argued against extant regulations that favored or privileged specific ideological, disciplinary and cultural prerogatives, which limit the freedoms and creativity of arts and humanities research. For example, she notes that the AAAS report “confuses physical individuals with constructed materials and human subjects with composite cultural works,” again calling attention to the person versus text divide that has permeated Internet research ethics debates. Another example of disciplinary differences comes from the Oral History Association, which acknowledged the growing use of the Internet as a site for research:

Simply put, oral History collects memories and personal commentaries of historical significance through recorded interviews. An oral history interview generally consists of a well-prepared interviewer questioning an interviewee and recording their exchange in audio or video format. Recordings of the interview are transcribed, summarized, or indexed and then placed in a library or archives. These interviews may be used for research or excerpted in a publication, radio or video documentary, museum exhibition, dramatization or other form of public presentation. Recordings, transcripts, catalogs, photographs and related documentary materials can also be posted on the Internet. (Ritchie 2003, 19)

While the American Historical Association (Jones 2008) has argued that such research be “explicitly exempted” from ethical review board oversight, the use of the Internet could complicate such a stance if such data became available in public settings or available “downstream” with potential, unforeseeable risks to reputation, economic standing, or psychological harm, should identification occur.

Under the concept of text rather than human subjects, Internet research rests on arguments of publication and copyright; consider the venue of a blog, which does not meet the definition of human subject as in 45 C.F.R. § 46.102f (2009), as interpreted by most ethical review boards. A researcher need not obtain consent to use text from a blog, as it is generally considered publicly available, textual, published material. This argument of the “public park” analogy that has been generally accepted by researchers is appropriate for some Internet venues and tools, but not all: Context, intent, sensitivity of data, and expectations of Internet participants were identified in 2004 by Sveninngsson as crucial markers in Internet research ethics considerations.

By the mid 2000s, with three major anthologies published, and a growing literature base, there was ample scholarly literature documenting IRE across disciplines and methodologies, and subsequently, there was anecdotal data emerging from the review boards evaluating such research. In search of empirical data regarding the actual review board processes of Internet research from a human subjects perspective, Buchanan and Ess surveyed over 700 United States ethics review boards, and found that boards were primarily concerned with privacy, data security and confidentiality, and ensuring appropriate informed consent and recruitment procedures (Buchanan and Ess 2009; Buchanan and Hvizdak 2009).

In 2008, the Canadian Tri-Council’s Social Sciences and Humanities Research Ethics Special Working Committee: A Working Committee of the Interagency Advisory Panel on Research Ethics was convened (Blackstone et al. 2008) ; and in 2010, a meeting at the Secretary’s Advisory Committee to the Office for Human Research Protections highlighted Internet research (SACHRP 2010). Such prominent professional organizations as the Public Responsibility in Medicine and Research (PRIM&R) and the American Educational Research Association (AERA) have begun featuring Internet research ethics regularly at their conferences and related publications.

Recently, disciplines not traditionally involved in human subjects research have begun their own explorations of IRE. For example, researchers in computer security are actively examining the tenets of research ethics in CS and ICT (Aycock et al. 2012; Dittrich, Bailey, Dietrich 2011; Carpenter & Dittrich 2011; Buchanan et al. 2011). Notably, the U.S. Federal Register requested comments on “The Menlo Report” in January 2012, which calls for a commitment by computer science researchers to the three principles of respect for persons, beneficence, and justice, while also adding a fourth principle on respect for law and public interest (Homeland Security 2011).

4. Key Ethical Issues in Internet Research

Principles of research ethics dictate that researchers must ensure there are adequate provisions to protect the privacy of subjects and to maintain the confidentiality of any data collected. A violation of privacy or breach of confidentiality presents a risk of serious harm to participants, ranging from the exposure of personal or sensitive information, the divulgence of embarrassing or illegal conduct, or the release of data otherwise protected under law.

Research ethics regulations express concern over subject privacy in terms of the level of linkability of data to individuals, and the potential harm disclosure of information could pose. For example, when discussing the possible exemption of certain research from human subject review, federal guidelines require oversight in these circumstances:

(i) information obtained is recorded in such a manner that human subjects can be identified, directly or through identifiers linked to the subjects; and (ii) any disclosure of the human subjects’ responses outside the research could reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects’ financial standing, employability, or reputation (45 C.F.R. § 46.101(b)(2) 2009).

The protection of privacy and confidentiality is typically achieved through a combination of research tactics and practices, including engaging in data collection under controlled or anonymous environments, the scrubbing of data to remove personally identifiable information (PII), or the use of access restrictions and related data security methods.

Compliance with federal guidelines also rests on the definition of what kind of data are considered PII, and therefore triggering special privacy considerations. The National Institutes of Health (NIH), for example, defines PII as follows:

any information about an individual maintained by an agency, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual’s identity, such as their name, SSN, date and place of birth, mother’s maiden name, biometric records, etc., including any other personal information that is linked or linkable to an individual. (NIH 2008)

Typically, examples of identifying pieces of information have included personal characteristics (such as date of birth, place of birth, mother’s maiden name, gender, sexual orientation, and other distinguishing features and biometrics information, such as height, weight, physical appearance, fingerprints, DNA and retinal scans), unique numbers or identifiers assigned to an individual (such as a name, address, phone number, social security number, driver’s license number, financial account numbers), and descriptions of physical location (GIS/GPS log data, electronic bracelet monitoring information).

Internet research introduces new complications to these longstanding definitions and regulatory frameworks intended to protect subject privacy. For example, researchers increasingly are able continue to collect detailed data about individuals from sources such as Facebook, Twitter, blogs or public email archives, and these rich data sets can more easily be processed, compared, and combined with other data (and datasets) available online. In various cases, researchers (and sometimes even amateurs) have been able to re-identify individuals by analyzing and comparing such datasets, using data-fields as benign as one’s zip code (Sweeny 2002), random Web search queries (Barbaro & Zeller 2006), or movie ratings (Narayanan & Shmatikov 2008) as the vital key for reidentification of a presumed anonymous user. Prior to widespread Internet-based data collection and processing, few would have considered one’s movie ratings or zip code as personally-identifiable. Yet, these cases reveal that merely stripping traditional “identifiable” information such as a subject’s name, address, or social security number is no longer sufficient to ensure data remains anonymous (Ohm 2009), and requires the reconsideration of what is considered “personally identifiable information” (Schwartz & Solove 2011). This points to the critical distinction between data which is kept confidential versus data that is truly anonymous. Increasingly, data are rarely completely anonymous, as researchers have routinely demonstrated they can often reidentify individuals hidden in “anonymized” datasets with ease (Ohm 2009). This reality places new pressure on ensuring datasets are kept, at the least, suitably confidential through both physical and computational security measures.

Similarly, new types of data often collected in Internet research might also be used to identify a subject within a previously-assumed anonymous dataset. For example, Internet researchers might also collect Internet Protocol (IP) addresses when conducting online surveys or analyzing transaction logs. An IP address is a unique identifier that is assigned to every device connected to the Internet; in most cases, individual computers are assigned a unique IP address, while in some cases the address is assigned to a larger node or Internet gateway for a collection of computers. Nearly all websites and Internet service providers store activity logs that link activity with IP address, in many cases, eventually to specific computers or users. Current U.S. law does not hold IP addresses to be personally identifiable information, while other countries and regulatory bodies do. For example, the European Data Privacy Act at Article 29, holds that IP addresses do constitute PII. Buchanan et al. (2011), note, however, that under the U.S. Civil Rights Act, for the purposes of the HIPAA Act, [ 2 ] IP addresses are considered a form of PII (45 C.F.R. § 164.514 2002). [ 3 ] There could potentially be a reconsideration by other federal regulatory agencies over IP addresses as PII, and researchers and boards will need to be attentive should such change occur.

A similar complication emerges when we consider the meaning of “private information” within the context of Internet-based research. Federal regulations define “private information” as:

[A]ny information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information that has been provided for specific purposes by an individual and that the individual can reasonably expect will not be made public (for example, a medical record) (45 C.F.R. § 46.102(f) 2009).

This standard definition of “private information” has two key components. First, private information is that which subjects reasonably expect is not normally monitored or collected. Second, private information is that which subjects reasonable expect is not normally publicly available. Conversely, the definition also suggests the opposite is true: if users cannot reasonably expect data isn’t being observed or recorded, or they cannot expect data isn’t publicly available, then the data does not rise to the level of “private information” requiring particular privacy protections. Researchers and REBs have routinely worked with this definition of “private information” to ensure the protection of subject privacy.

These distinctions take on greater weight, however, when considering the data environments and collection practices common with Internet-based research. Researchers interested in collecting or analyzing online actions of subjects—perhaps through the mining of online server logs, the use of tracking cookies, or the scraping of social media profiles and feeds—could argue that subjects do not have a reasonable expectation that such online activities are not routinely monitored since nearly all online transactions and interactions are routinely logged by websites and service providers. Thus, online data trails might not rise to the level of “private information”. However, numerous studies have indicated that average Internet users have incomplete understandings of how their activities are routinely tracked, and the related privacy practices and policies of the sites they visit (Hoofnagle & King 2009; Milne & Culnan 2004; Tsai et al. 2006). Hudson and Bruckman (2005) conducted empirical research on users’ expectations and understandings of privacy, finding that participants’ expectations of privacy within public chatrooms conflicted with what was actually a very public online space. Rosenberg (2010) examined the public/private distinction in the realm of virtual worlds, suggesting researchers must determine what kind of social norms and relations predominate an online space before making assumptions about the “publicness” of information shared within. Thus, it remains unclear whether Internet users truly understand if and when their online activity is regularly monitored and tracked, and what kind of reasonable expectations truly exist. This ambiguity creates new challenges for researchers and REBs when trying to apply the definition of “private information” to ensure subject privacy is properly addressed (Zimmer 2010).

This complexity in addressing subject privacy in Internet research is further compounded with the rise of social networking as a place for the sharing of information, and a site for research. Users increasingly share more and more personal information on platforms like Facebook, MySpace, or Twitter. For researchers, social media platforms provide a rich resource for study, and much of the content is available to be viewed and downloaded with minimal effort. Since much of the information posted to social media sites is publicly viewable, it thus fails to meet the standard regulatory definition of “private information.” Therefore, researchers attempting to collect and analyze social media postings might not treat the data as requiring any particular privacy considerations. Yet, social media platforms represent a complex environment of social interaction where users are often required to place friends, lovers, colleagues, and minor acquaintances within the same singular category of “friends”, where privacy policies and terms of service are not fully understood (Madejski et al. 2011), and where the technical infrastructures fail to truly support privacy projections (Bonneau & Preibush 2009) and regularly change with little notice (Stone 2009; Zimmer 2009, Other Internet Resources). As a result, it is difficult to understand with any certainty what a user’s intention was when posting an item onto a social media platform (Acquisti & Gross 2006). It could be been meant to be visible to only a small circle of friends, but the user failed to completely understand how to adjust the privacy settings accordingly. Or, the information might have previously been restricted to only certain friends, but a change in the technical platform suddenly made the data more visible to all.

Ohm (2010) warns that “the utility and privacy of data are linked, and so long as data is useful, even in the slightest, then it is also potentially reidentifiable” (p. 1751). With the rapid growth of Internet-based research, Ohm’s concern becomes even more dire. The traditional definitions and approaches to understanding the nature of privacy, anonymity, and precisely what kind of information deserves protection becomes strained, forcing researchers and REBs to consider more nuanced theories of privacy (Nissenbaum 2009) and approaches to respecting and projecting subject privacy (Markham 2012; Zimmer 2010).

Depending on the type of Internet research being carried out, recruitment of participants may be done in a number of ways. As with any form of research, the population or participants is selected for specific purposes (i.e., an ethnographic study of a particular group on online game players), or, can be selected from a range of sampling techniques (i.e., a convenience sample gleaned from the users of Amazon’s Mechanical Turk crowdsourcing platform [ 4 ] ). In the U.S. context, a recruitment plan is considered part of the informed consent process, and as such, any recruitment script or posting must be reviewed and approved by an REB prior to posting or beginning solicitation (if the project is human subjects research). Further, selection of participants must be fair, and risks and benefits must be justly distributed. This concept is challenging to apply in Internet contexts, in which populations are often self-selected and can be exclusive, depending on membership and access status, as well as the common disparities of online access based on economic and social variables. Researchers also face recruitment challenges due to online subjects’ potential anonymity, especially as it relates to the frequent use of pseudonyms online, having multiple or alternative identities online, and the general challenges of verifying a subject’s age and demographic information. Moreover, basic ethical principles for approaching and recruiting participants involve protecting their privacy and confidentiality. Internet research can both maximize these protections, as an individual may never be known beyond a screen name or avatar existence; or, conversely, the use of IP addresses, placement of cookies, availability and access to more information than necessary for the research purposes, may minimize the protections of privacy and confidentiality.

Much recruitment is taking place via social media; examples include push technologies, a synchronous approach in which a text or tweet is sent from a researcher to potential participants. Geolocational status through mobile devices and push technology recruitment, in tandem, allow for novel forms of recruitment for such research as in clinical trials. Other methods of pull technologies recruitment include direct email, dedicated web pages, YouTube videos, direct solicitation via “stickies” posted on fora or web sites directing participants to a study site, or data aggregation or scraping data for potential recruitment. Regardless of the means used, researchers must follow the terms of the site—from the specific norms and nuances governing a site or locale to the legal issues in terms of service agreements. For example, early pro-anorexia web sites (see Overbeke 2008) were often treated as sensitive spaces deserving spcicial consideration, and researchers were asked to respect the privacy of the participants and not engage in research (Walstrom 2004). In the gaming context, Reynolds and de Zwart (2010) ask:

Has the researcher disclosed the fact that he or she is engaged in research and is observing/interacting with other players for the purposes of gathering research data? How does the research project impact upon the community and general game play? Is the research project permitted under the Terms of Service?

Colvin and Lanigan (2005, 38) suggest researchers

Seek permission from Web site owners and group moderators before posting recruitment announcements, Then, preface the recruitment announcement with a statement that delineates the permission that has been granted, including the contact person and date received. Identify a concluding date (deadline) for the research study and make every effort to remove recruitment postings, which often become embedded within Web site postings.

Barratt and Lenton (2010), among others, agree:

It is critical, therefore, to form partnerships with online community moderators by not only asking their permission to post the request, but eliciting their feedback and support as well.

Mendelson (2007) and Smith and Leigh (1997) note that recruitment notices need to contain more than the typical flyers or advertisements used for newspaper advertisements. Mentioning the approval of moderators is important for establishing authenticity, and so is providing detailed information about the study and how to contact both the researchers and the appropriate research ethics board.

Given the array of techniques possible for recruitment, the concept of “research spam” requires attention. The Council of American Survey Research warns

Research Organizations should take steps to limit the number of survey invitations sent to targeted respondents by email solicitations or other methods over the Internet so as to avoid harassment and response bias caused by the repeated recruitment and participation by a given pool (or panel) of data subjects. (CASRO 2011, I.B.3)

Ultimately, researchers using Internet recruitment measures must ensure that potential participants are getting enough information in both the recruitment materials and any subsequent consent documents. Researchers must ensure that recruitment methods do not lead to an individual being identified, and if such identification is possible, are there significant risks involved?

As the cornerstone of human subjects protections, informed consent means that participants are voluntarily participating in the research with adequate knowledge of relevant risks and benefits. Providing informed consent typically includes the researcher explaining the purpose of the research, the methods being used, the possible outcomes of the research, as well as associated risks or harms that the participants might face. The process involves providing the recipient clear and understandable explanations of these issues in a concise way, providing sufficient opportunity to consider them and enquire about any aspect of the research prior to granting consent, and ensuring the subject has not been coerced into participating. Gaining consent in traditional research is typically done verbally, either in a face-to-face meeting where the researcher reviews the document, through telephone scripts, through mailed documents, fax, or video, and can be obtained with the assistance of an advocate in the case of vulnerable populations. Most importantly, informed consent was built on the ideal of “process” and the verification of understanding, and thus, requires an ongoing communicative relationship between and among researchers and their participants. The emergence of the Internet as both a tool and a venue for research has introduced challenges to this traditional approach to informed consent.

In most regulatory frameworks, there are instances when informed consent might be waived, or the standard processes of obtaining informed consent might be modified, if approved by a research ethics board. [ 5 ] Various forms of Internet research require different approaches to the consent process. Some standards have emerged, depending on venue (i.e., an online survey platform versus a virtual world island). However, researchers are encouraged to consider waiver of consent and/or documentation, if appropriate, by using the flexibilities of their extant regulations.

Where consent is required but documentation is waived, a “portal” can be used to provide consent information. For example, a researcher may send an email to the participant with a link a separate portal or site information page where information on the project is contained. The participant can read the documentation and click on an “I agree” submission. Rosser et al. (2010) recommend using a “chunked” consent document, whereby individuals can read specific sections, agree, and then continue onwards to completion of the consent form, until reaching the study site.

In addition to portals, researchers will often make use of consent cards or tokens in virtual worlds; this alleviates concerns that unannounced researcher presence is unacceptable, or, that a researcher’s presence is intrusive to the natural flow and movement of a given locale. Hudson and Bruckman (2004, 2005) highlighted the unique challenges in gaining consent in chat rooms, while Lawson (2004) offers an array of consent possibilities for synchronous computer-mediated communication. There are different practical challenges in the consent process in Internet research, given the fluidity and temporal nature of Internet spaces.

If documentation of consent is required, some researchers have utilized alternatives such as electronic signatures, which can range from a simple electronic check box to acknowledge acceptance of the terms to more robust means of validation using encrypted digital signatures, although the validity of electronic signatures vary by jurisdiction.

Regardless of venue, informed consent documents are undergoing a discursive change. While the basic elements of consent remain intact, researchers must now acknowledge with less certainty specific aspects of their data longevity, risks to privacy, confidentiality and anonymity (see Privacy, above ), and access to or ownership of data. Researchers must address and inform participants/subjects about potential risk of data intrusion or misappropriation of data if subsequently made public or available outside of the confines of the original research. Statements should be revised to reflect such realities as cloud storage (see below ) and data sharing.

For example, Aycock et al. (2012, p. 141) describe a continuum of security and access statements used in informed consent documents:

  • “No others will have access to the data.”
  • “Anonymous identifiers will be used during all data collection and analysis and the link to the subject identifiers will be stored in a secure manner.”
  • “Data files that contain summaries of chart reviews and surveys will only have study numbers but no data to identify the subject. The key [linking] subject names and these study identifiers will be kept in a locked file.”
  • “Electronic data will be stored on a password protected and secure computer that will be kept in a locked office. The software ‘File Vault’ will be used to protect all study data loaded to portable laptops, flash drives or other storage media. This will encode all data… using Advanced Encryption Standard with 128-bit keys (AES-128)”

This use of encryption in the last statement may be necessary in research including sensitive data, such as medical, sexual, health, financial, and so on. Barratt and Lenton (2010), in their research on illicit drug use and online forum behaviors, also provide guidance about use of secure transmission and encryption as part of the consent process.

In addition to informing participants about potential risks and employing technological protections, U.S.-based researchers working with sensitive biomedical, behavioral, clinical or other types of research, may choose to obtain a Certificate of Confidentiality from the National Institutes of Health, which protects researchers and institutions from being compelled to disclose information that could identify research subjects in civil, criminal, or other legal demands (NIH 2011). However, these do not protect against release of data outside of the U.S. Given the reality of Internet research itself, which inherently spans borders, new models may be in order to ensure confidentiality of data and protections of data. Models of informed consent for traditional international research are fundamentally challenging due to cultural specificity and norms (Annas 2009; Boga et al. 2011; Krodstad et al. 2010); with Internet research, where researchers may be unaware of the specific location of an individual, consent takes on significantly higher demands. While current standards of practice show that consent models stem from the jurisdiction of the researcher and sponsoring research institution, complications arise in the face of age verification, age of majority/consent, reporting of adverse effects or complaints with the research process, and authentication of identity. Various jurisdictional laws around privacy are relevant for the consent process; a useful tool is Forrester’s Data Privacy Heat Map, which relies on in-depth analyses of the data privacy-related laws and cultures of countries around the world, helping researchers design appropriate approaches to privacy and data protection given the particular context (Forrester 2011).

In addition, as more federal agencies and funding bodies across the globe mandate making research data publicly-available (i.e., NSF, NIH, Wellcome Trust, Research Councils U.K.), the language used in consent documents will change accordingly to represent this intended longevity of data and opportunities for future, unanticipated use. This is not an entirely new concept nor is it specific to Internet research, but it should be noted that new language is required for consent.

Given the ease with which Internet data can flow between and among Internet venues (a Twitter feed can automatically stream to a Facebook page), the changes with which access to data can occur (early “private” newsgroup conversations were made “publicly searchable” when Google bought DejaNews), reuse and access by others is highly possible. Current data sharing mandates must be considered in the consent process. Alignment between a data sharing policy and an informed consent document is imperative. Both should include provisions for appropriate protection of privacy, confidentiality, security, and intellectual property.

There is general agreement in the U.S. that individual consent is not necessary for researchers to use publicly available data sets, under 45 C.F.R. § 46; recommendations were made by The National Human Subjects Protection Advisory Committee (NHRPAC) in 2002 regarding publicly available data sets (see Other Internet Resources). Data use or data restriction agreements are commonly used and set the parameters of use for researchers.

The U.K. Data Archive (2012) provides guidance on consent and data sharing:

Restricting access to data should never be seen as the only way to protect confidentiality. Obtaining appropriate informed consent and anonymising data enable most data to be shared: For confidential data, the Archive, in discussion with the data owner, may impose additional access regulations, which can be: needing specific authorisation from the data owner to access data-placing confidential data under embargo for a given period of time until confidentiality is no longer pertinent providing access to approved researchers only providing secure access to data by enabling remote analysis of confidential data but excluding the ability to download data

Data sharing made public headlines in 2016 when a Danish researcher released a data set comprised of scraped data from nearly 70,000 users of the OkCupid online dating site. The data set was highly reidentifiable and included potentially sensitive information, including usernames, age, gender, geographic location, what kind of relationship (or sex) they’re interested in, personality traits, and answers to thousands of profiling questions used by the site. The researcher claimed the data were public and thus, such sharing and use was unproblematic. Zimmer (2016) was among many privacy and ethics scholars who critiqued this stance.

The Danish researchers did not seek any form of consent or debriefing on the collection and use of the data, nor did they have any ethics oversight. Many researchers and ethics boards are, however, starting to mitigate many of these ethical concerns by including blanket statements in their consent processes, indicating such precautions for research participants. For example,

“I understand that online communications may be at greater risk for hacking, intrusions, and other violations. Despite these possibilities, I consent to participate.”

A more specific example comes from the Canadian context when researchers propose to use specific online survey tools hosted in the United States; REBs commonly recommend the following type language for use in informed consent documents:

Please note that the online survey is hosted by Company ABC which is a web survey company located in the U.S.A. All responses to the survey will be stored and accessed in the U.S.A. This company is subject to U.S. Laws, in particular, to the U.S. Patriot Act/Domestic Security Enhancement Act that allows authorities access to the records that your responses to the questions will be stored and accessed in the U.S.A. The security and private policy for Company ABC can be viewed at http://…/. [ 6 ]

Researchers are also encouraged to review the Terms of Use and Terms of Service of the application that are being used, demonstrating its details to the REB in the application and informing participants of such details in the informed consent form or script.

4.3.1 Minors and Consent

Internet research poses particular challenges to age verification, assent and consent procedures, and appropriate methodological approaches with minors. Age of consent varies across countries, states, communities, and locales of all sorts. For research conducted or supported by U.S. federal agencies bound by the Common Rule, children are “persons who have not attained the legal age for consent to treatments or procedures involved in the research, under the applicable law of the jurisdiction in which the research will be conducted” (45 C.F.R. § 46.402(a) 2009). Goldfarb (2008) provides an exhaustive discussion of age of majority across the U.S. states, with a special focus on clinical research , noting children must be seven or older to assent to participation (see 45 C.F.R. § 46 Subpart D 2009).

Spriggs, from the Australian context, notes that while no formal guidance exists on Internet research and minors under the National Statement , she advises:

Parental consent may be needed when information is potentially identifiable. Identifiable information makes risks to individuals higher and may mean that the safety net of parental consent is preferable. There is also a need to consider whether seeking parental consent would make things worse e.g., by putting a young person from a dysfunctional home at risk or result in disclosure to the researcher of additional identifying information about the identity and location of the young person. Parental consent may be “contrary to the best interests” of the child or young person when it offers no protection or makes matters worse. (Spriggs 2010, 30)

To assist with the consent process, age verification measures can be used. These can range from more technical software applications to less formal knowledge checks embedded in an information sheet or consent document. Multiple confirmation points (asking for age, later asking for year of birth, etc) are practical measures for researchers. Depending on the types of data, sensitivity of data, use of data, researchers and boards will carefully construct the appropriate options for consent, including waiver of consent, waiver of documentation, and/or waiver of parental consent.

Recent developments in cloud computing platforms have led to unique opportunities—and ethical challenges—for researchers. Cloud computing describes the deployment of computing resources via the Internet, providing on-demand, flexible, and scalable computing from remote locations. Examples include web-based email and calendaring services provided by Google or Yahoo, online productivity platforms like Google Docs or Microsoft Office 365, online file storage and sharing platforms like Dropbox or Box.net, and large-scale application development and data processing platforms such as Google Apps, Facebook Developers Platform, and Amazon Web Services.

Alongside businesses and consumers, researchers have begun utilizing cloud computing platforms and services to assist in various tasks, including subject recruitment, data collection and storage, large-scale data processing, as well as communication and collaboration (Allan 2011; Chen et al. 2010; Simmhan et al. 2008; Yogesh et al. 2009).

As reliance on cloud computing increases among researchers, so do the ethical implications. Among the greatest concerns is ensuring data privacy and security with cloud-based services. For researchers sharing datasets online for collaborative processing and analysis, steps must be taken to ensure only authorized personnel have access to the online data, but also that suitable encryption is used for data transfer and storage, and that the cloud service provider maintains sufficient security to prevent breaches. Further, once research data is uploaded to a third-party cloud provider, attention must be paid to the terms of service for the contracted provider to determine what level of access to the data, if any, might be allowed to advertisers, law enforcement, or other external agents.

Alongside the privacy and security concerns, researchers also have an ethical duty of data stewardship which is further complicated when research data is placed in the cloud for storage or processing. Cloud providers might utilize data centers spread across the globe, meaning research data might be located outside the United States, and its legal jurisdictions. Terms of service might grant cloud providers a license to access and use research data for purposes not initially intended or approved of by the subjects involved. Stewardship may require the prompt and complete destruction of research data, a measure complicated if a cloud provider has distributed and backed-up the data across multiple locations.

A more unique application of cloud computing for research involves the crowdsourcing of data analysis and processing functions, that is, leveraging the thousands of users of various online products and services to complete research related tasks remotely. Examples include using a distributed network of video game players to assist in solving protein folding problems (Markoff 2010), and leveraging Amazon’s Mechanical Turk crowdsourcing marketplace platform to assist with large scale data processing and coding functions that cannot be automated (Conley & Tosti-Kharas 2010; Chen et al. 2011). Using cloud-based platforms can raise various critical ethical and methodological issues.

First, new concerns over data privacy and security emerge when research tasks are widely distributed across a global network of users. Researchers must take great care in ensuring sensitive research data isn’t accessible by outsourced labor, or that none of the users providing crowdsourced labor are able to aggregate and store their own copy of the research dataset. Second, crowdsourcing presents ethical concerns over trust and validity of the research process itself. Rather than a local team of research assistants usually under a principle investigator’s supervision and control, crowdsourcing tends to be distributed beyond the direct management or control of the researcher, providing less opportunity to ensure sufficient training for the required tasks. Thus, researchers will need to create additional means of verifying data results to confirm tasks are completed properly and correctly.

Two additional ethical concerns with crowdsourcing involve labor management and authorship. Turks were not originally intended to be research subjects, first and foremost. However, researchers using Mechanical Turks must ensure that the laborers on the other end of the cloud-based relationship are not being exploited, that they are legally eligible to be working for hire, and that the incentives provided are real, meaningful, and appropriate (Scholz 2008; Williams 2010, Other Internet Resources).

Finally, at the end of a successful research project utilizing crowdsourcing, a researcher may be confronted with the ethical challenge of how to properly acknowledge the contributions made by (typically anonymous) laborers. Ethical research requires the fair and accurate description of authorship. Disciplines vary as to how to report relative contributions made by collaborators and research assistants, and this dilemma increases when crowdsourcing is used to assist with the research project.

4.5 Big Data Considerations

Algorithmic processing is a corollary of big data research, and newfound ethical considerations have emerged. From “algorithmic harms” to “predictive analytics,” the power of today’s algorithms exceeds long-standing privacy beliefs and norms. Specifically, the National Science and Technology Council note:

“Analytical algorithms” as algorithms for prioritizing, classifying, filtering, and predicting. Their use can create privacy issues when the information used by algorithms is inappropriate or inaccurate, when incorrect decisions occur, when there is no reasonable means of redress, when an individual’s autonomy is directly related to algorithmic scoring, or when the use of predictive algorithms chills desirable behavior or encourages other privacy harms. (NSTC 2016, p. 18, Other Internet Resources).

While the concept of big data is not new, and the term has been in technical discourses since the 1990s, the public awareness and response to big data research is much more recent. Following the rise of social media-based research, Buchanan (2016) has delineated the emergence of “big data”-based research from 2012 to the present, with no signs of an end point.

Big data research is challenging for research ethcis boards, often presenting what the computer ethicist James Moor would call “conceptual muddles”: the inability to properly conceptualize the ethical values and dilemmas at play in a new technological context. Subject privacy, for example, is typically protected within the context of research ethics through a combination of various tactics and practices, including engaging in data collection under controlled or anonymous environments, limiting the personal information gathered, scrubbing data to remove or obscure personally identifiable information, and using access restrictions and related data security methods to prevent unauthorized access and use of the research data itself. The nature and understanding of privacy become muddled, however, in the context of big data research, and as a result, ensuring it is respected and protected in this new domain becomes challenging.

For example, the determination of what constitutes “private information” – and thus triggering particular privacy concerns – becomes difficult within the context of big data research. Distinctions within the regulatory definition of “private information” – namely, that it only applies to information which subjects reasonably expect is not normally monitored or collected and not normally publicly available – become less clearly applicable when considering the data environments and collection practices that typify big data research, such as the wholesale scraping of Facebook news feed content or public OKCupid accounts.

When considered through the lens of the regulatory definition of “private information,” social media postings are often considered public, especially when users take no visible, affirmative steps to restrict access. As a result, big data researchers might conclude subjects are not deserving of particular privacy consideration. Yet, the social media platforms frequently used for big data research purposes represent a complex environment of socio-technical interactions, where users often fail to understand fully how their social activities might be regularly monitored, harvested, and shared with third parties, where privacy policies and terms of service are not fully understood and change frequently, and where the technical infrastructures and interfaces are designed to make restricting information flows and protecting one’s privacy difficult.

As noted above ) it becomes difficult to confirm a user’s intention when sharing information on a social media platform, and whether users recognize that providing information in a social environment also opens it up for widespread harvesting and use by researchers. This uncertainty in the intent and expectations of users of social media and internet-based platforms – often fueled by the design of the platforms themselves – create numerous conceptual muddles in our ability to properly alleviate potential privacy concerns in big data research.

The conceptual gaps that exist regarding privacy and the definition of personally identifiable information in the context of big data research inevitably lead to similar gaps regarding when informed consent is necessary. Researchers mining Facebook profile information or public Twitter streams, for example, typically argue that no specific consent is necessary due to the fact the information was publicly available. It remains unknown whether users truly understood the technical conditions under which they made information visible on these social media platforms or if they foresaw their data being harvested for research purposes, rather than just appearing onscreen for fleeting glimpses by their friends and followers. In the case of the Facebook emotional contagion experiment (Kramer, Guillory, & Hancock, 2014), the lack of obtaining consent was initially rationalized through the notion that the research appeared to have been carried out under Facebook’s extensive terms of service, whose data use policy, while more than 9,000 words long, does make passing mention to “research.” It was later revealed, however, that the data use policy in effect when the experiment was conducted never mentioned “research” at all (Hill, 2014).

4.6 Internet Research and Industry Ethics

The Facebook emotional contagion experiment, discussed above, is just one example in a larger trend of big data research conducted outside of traditional university-based research ethics oversight mechanisms. Nearly all online companies and platforms analyze data and test theories that often rely on data from individual users. Industry-based data research, once limited to marketing-oriented “A/B testing” of benign changes in interface designs or corporate communication messages, now encompasses information about how users behave online, what they click and read, how they move, eat, and sleep, the content they consume online, and even how they move about their homes. Such research produces inferences about individuals’ tastes and preferences, social relations, communications, movements, and work habits. It implies pervasive testing of products and services that are an integral part of intimate daily life, ranging from connected home products to social networks to smart cars. Except in cases where they are partnering with academic institutions, companies typically do not put internal research activities through a formal ethical review process, since results are typically never shared publicly and the perceived impact on users is minimal.

The growth of industry-based big data research, however, presents new risks to individuals’ privacy, on the one hand, and to organizations’ legal compliance, reputation, and brand, on the other hand. When organizations process personal data outside of their original context, individuals may in some cases greatly benefit, but in other cases may be surprised, outraged, or even harmed. Soliciting consent from affected individuals can be impractical: Organizations might collect data indirectly or based on identifiers that do not directly match individuals’ contact details. Moreover, by definition, some non-contextual uses – including the retention of data for longer than envisaged for purposes of a newly emergent use – may be unforeseen at the time of collection. As Crawford and Schultz (2014) note, “how does one give notice and get consent for innumerable and perhaps even yet-to-be-determined queries that one might run that create ‘personal data’?” (p. 108).

With corporations developing vast “living laboratories” for big data research, research ethics has become a critical component of the design and oversight of these activities. For example, in response to the controversy surrounding the emotional contagion experiment, Facebook developed an internal ethical review process that, according to its facilitators, “leverages the company’s organizational structure, creating multiple training opportunities and research review checkpoints in the existing organizational flow” (Jackman & Kanerva, 2016, p. 444). While such efforts are important and laudable, they remain open for improvement. Hoffmann (2016), for example, has criticized Facebook for launching “an ethics review process that innovates on process but tells us little about the ethical values informing their product development.” In short, while Internet companies like Facebook recognize the need to review the ethics of internal research projects, such efforts remain largely perfunctory and meant for easing public concerns, and not necessarily fully in line with the ethical deliberations that take place in academic settings.

While many researchers and review boards across the world work without formal guidance, many REBs have developed guidelines for Internet research. While many such guidelines exist, the following provide examples for researchers preparing for an REB review, or for boards developing their own policies.

  • Bard College (New York) Suggestions for Internet Research
  • Loyola University Chicago Policy for Online Survey Research Involving Human Participants
  • Penn State Guidelines for Computer- and Internet-Based Research Involving Human Participants
  • Queen’s University (Canada) Exemption Policy re: Research Ethics Review for Projects Involving Digital Data Collection
  • U.K. Data Archive Further Resources
  • University of Connecticut Guidance for Computer and Internet-Based Research Involving Human Participants

Additional resources are found in Other Internet Resources below.

  • 45 C.F.R. § 46, “Protection of Human Subjects” [ available online ].
  • 45 C.F.R. § 164.514, “Other requirements relating to uses and disclosures of protected health information,” [ available online ].
  • Acquisti, A. and R. Gross, 2006, “Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook,” Proceedings of the 6th Workshop on Privacy Enhancing Technologies , 4258: pp. 36–58.
  • Allan, Rob, 2011, “Cloud and Web 2.0 Services for Supporting Research,” 11/11, (November). [ available online ].
  • Allen, C., 1996, “What’s Wrong with the ‘Golden Rule’? Conundrums of Conducting Ethical Research in Cyberspace,” The Information Society , 2(1): 175–187.
  • Annas, George J., 2009, “Globalized Clinical Trials and Informed Consent,” New England Journal of Medicine , 360: 2050–2053.
  • Aycock, J., E. Buchanan, S. Dexter, and D. Dittrich, 2012, “Human Subjects, Agents, or Bots” in Current Issues in Ethics and Computer Security Research , G. Danezis, S. Dietrich, and K. Sako (eds.), FC 2011 Workshops, LNCS, 7126, Springer, Heidelberg, pp. 138–145.
  • Banks, W. and M. Eble, 2007, “Digital Spaces, Online Environments, and Human Participant Research: Interfacing with Institutional Review Boards,” in Digital Writing Research: Technologies, Methodologies, and Ethical Issues , H. McKee and D. DeVoss (eds.), Cresskill, NJ: Hampton Press, pp. 27–47.
  • Barbaro, Michael and Tom Zeller Jr., 2006, “A Face Is Exposed for AOL Searcher No. 4417749,” The New York Times , August 9, 2006, pp. A1.
  • Barratt, M. and S. Lenton, 2010, “Beyond Recruitment? Participatory online research with people who use drugs,” International Journal of Internet Research Ethics , 3(1): 69–86.
  • Beauchamp, T., and J. Childress, 2008, Principles of Biomedical Ethics , Oxford: Oxford University Press.
  • Blackstone, M., L. Given, L. Levy, M. McGinn, P. O’Neill, and T. Palys, 2008, “Extending the Spectrum: The TCPS and Ethical Issues in Internet-Based Research,” Social Sciences and Humanities Research Ethics Special Working Committee: A Working Committee of the Interagency Advisory Panel on Research Ethics (February). [ available online ]
  • Boehlefeld, S.P., 1996, “Doing the Right Thing: Ethical Cyberspace Research,” The Information Society , 12(2): 141–152.
  • Boga M, A. Davies, D. Kamuya, S.M. Kinyanjui, E. Kivaya, et al., 2011, “Strengthening the Informed Consent Process in International Health Research through Community Engagement: The KEMRI-Welcome Trust Research Programme Experience,” PLoS Med , 8(9): e1001089.
  • Bonneau, J. and S. Preibusch, 2009, “The Privacy Jungle: On the Market for Data Protection in Social Networks,” Paper presented at the The Eighth Workshop on the Economics of Information Security (WEIS 2009).
  • Bromseth, Janne C. H., 2002, “Public Places: Public Activities? Methodological Approaches and Ethical Dilemmas in Research on Computer-mediated Communication Contexts,” in Researching ICTs in Context , A. Morrison (ed.), Oslo: University of Oslo, pp. 33–61. [ available online ]
  • Brothers, K. and E. Clayton, 2010, “Human non-subjects research: privacy and compliance,” American Journal of Bioethics , 10(9):15–7.
  • Bruckman, A., 2006, “Teaching Students to Study Online Communities Ethically,” Journal of Information Ethics , 15(2): 82–98.
  • Buchanan, E., 2010, “Internet Research Ethics: Past, Present, Future,” in The Blackwell Handbook of Internet Studies , C. Ess and M. Consalvo, (eds.), Oxford: Oxford University Press.
  • ––– (ed.), 2004, Readings in Virtual Research Ethics: Issues and Controversies , Hershey: Idea Group.
  • Buchanan, E. and C. Ess, 2006, “Internet Research Ethics at a Critical Juncture,” Journal of Information Ethics , 15(2): 14–17.
  • –––, 2008, “Internet Research Ethics: The Field and Its Critical Issues,” in The Handbook of Information and Computer Ethics , H.Tavani and K. E. Himma (eds.), Boston: Wiley.
  • –––, 2009, “Internet Research Ethics and the Institutional Review Board: Current Practices and Issues,” Computers and Society , 39(3): 43–49.
  • –––, 2016, “Ethics in Digital Research,” in The Handbook of Social Practices and Digital Everyday Worlds , M. Nolden., G. Rebane, M. Schreiter (eds.), Springer.
  • Buchanan, E., and E. Hvizdak, 2009, “REBs and Online Surveys: Ethical and Practical Considerations,” Journal of Empirical Research on Human Research Ethics , 4(2): 37–48.
  • Buchanan, E., J. Aycock, S. Dexter, D. Dittrich, and E. Hvizdak, 2011, “Computer Science Security Research And Human Subjects: Emerging Considerations For Research Ethics Boards,” Journal of Empirical Research on Human Research Ethics , 6(2), 71–83.
  • Carpenter, K., and D. Dittrich, 2011, “Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research,” In 1st International Digital Ethics Symposium. Loyola University Chicago Center for Digital Ethics and Policy.
  • [CASRO] Council of American Survey Research, 2011, “CASRO Code of Standards and Ethics for Survey Research,” First adopted 1977 and revised since. [ available online ]
  • Chen, X., G. Wills, L. Gilbert, and D. Bacigalupo, 2010, “Using Cloud for Research: A Technical Review,” JISC Final Report .
  • Chen, J., N. Menezes, J. Bradley, and T.A. North, 2011, “Opportunities for Crowdsourcing Research on Amazon Mechanical Turk,” Human Factors , 5(3).
  • Colvin, J., and J. Lanigan, 2005, “Ethical Issues and Best Practice for Internet Research,” Scholarship , 97(3): 34–39.
  • Conley, C. A., and J. Tosti-Kharas, 2010, “Crowdsourcing Content Analysis for Behavioral Research: Insights from Mechanical Turk,” Academy of Management Conference.
  • Consalvo, M., and C. Ess (eds), 2010, The Blackwell Handbook of Internet Studies , Oxford: Oxford University Press.
  • Crawford, K., & Schultz, J., 2014, “Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms” Boston College Law Review , 55(1), 93-128.
  • Dittrich, D., M. Baily, and S. Dietrich, 2011, “Building an Active Computer Security Ethics Community,” Security and Privacy 9(4): 32–40.
  • Elgesem, Dag, 2002, “What is Special about the Ethical Issues in Online Research?” Ethics and Information Technology , 4(3): 195–203. [ available online ]
  • Emanuel, E., R. Courch, J. Arras, J. Moreno and C. Grady (eds.), 2003, Ethical and Regulatory Aspects of Clinical Research: Readings and Commentary , Johns Hopkins Press.
  • Ess, Charles and the Association of Internet Researchers Ethics Working committee, 2002, “Ethical Decision-Making and Internet Research: Recommendations from the AoIR Ethics Working Committee,” Approved by the AoIR, November 27, 2002. [ available online ]
  • Eysenbach, G., 1999, “Welcome to the Journal of Medical Internet Research,” Journal of Medical Internet , 1(1): e5. [ available online ].
  • Eysenbach, G. and J. Till, 2001, “Ethics Issues in Qualitative Research on Internet Communities,” British Medical Journal , 323: 1103.
  • Fairfield, J., 2012, “Avatar Experimentation: Human Subjects Research in Virtual Worlds,” U.C. Irvine Law Review , 2: 695-772.
  • Flicker, S., D. Haans, and H. Skinner, 2004, “Ethical Dilemmas in Research on Internet Communities,” Qualitative Health Research , 14(1): 124–134.
  • Forrester Research, 2011, Forrester’s Global Data Protection and Privacy Heatmap. [ available online ]
  • Frankel, Mark S., and Siang, Sanyin, 1999, “Ethical and Legal Aspects of Human Subjects Research in Cyberspace,” A Report of a Workshop, June 10–11, 1999, Washington, DC: American Association for the Advancement of Science. [ available online ]
  • Gaw, A., and A. Burns, 2011, On Moral Grounds: Lessons from the History of Research Ethics , SA Press.
  • Gilbert, B., 2009, “Getting to conscionable: Negotiating Virtual World’s End User License Agreements without Getting Externally Regulated,” Journal of International Commercial Law and Technology , 4(4): 238–251.
  • Glickman S.W., S. Galhenage, L. McNair, Z. Barber, K. Patel, K.A. Schulman, and J. McHutchison, 2012, “The Potential Influence of Internet-Based Social Networking on the Conduct of Clinical Research Studies,” Journal of Empirical Research on Human Research Ethics , 7(1): 71–80.
  • Goldfarb, N., 2008, “Age of Consent for Clinical Research,” Journal of Clinical Best Practices , 4(6) June. [ available online ]
  • Hill, K., 2014. “Facebook Added ‘Research’ To User Agreement 4 Months After Emotion Manipulation Study,” Forbes.com. [ available online ]
  • Hoffmann, A. L., 2016, “Facebook has a New Process for Discussing Ethics. But is It Ethical?” The Guardian. [ available online ]
  • Homeland Security Department, 2011, “Submission for Review and Comment: ‘The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research’,” Federal Register: The Daily Journal of the United States Government . [ available online ].
  • Hoofnagle, C. J. and J. King, 2008, “What Californians Understand About Privacy Online,” Research Report from Samuelson Law Technology & Public Policy Clinic, UC Berkeley Law: Berkeley, CA.
  • Hudson, J. M. and A. Bruckman, 2004, “Go Away: Participant Objections to Being Studied and the Ethics of Chatroom Research,” Information Society , 20(2): 127–139.
  • –––, 2005, “Using Empirical Data to Reason about Internet Research Ethics,” Proceedings of the 2005 Ninth European Conference on Computer-Supported Cooperative Work . [ available online ]
  • Hunsinger, J., L. Kastrup, and M. Allen (eds), 2010, International Handbook of Internet Research , New York: Springer.
  • Illingworth, N., 2001, “The Internet Matters: Exploring the Use of the Internet as a Research Tool,” Sociological Research Online , 6(2). [ available online ].
  • Ingierd, I., and Fossheim, H., (eds.), 2015, Internet Research Ethics , Oslo: Cappelen Damm
  • Jackman, M., & Kanerva, L., 2016. “Evolving the IRB: Building Robust Review for Industry Research,” Washington and Lee Law Review Online , 72(3): 442–457.
  • Jacobson, D., 1999, “Doing Research in Cyberspace,” Field Methods , 11(2): 127–145.
  • Johns, M., S.L. Chen, and J. Hall (eds.), 2003, Online Social Research: Methods, Issues, and Ethics , New York: Peter Lang.
  • Jones, Arnita, 2008, “AHA Statement on IRB’s and Oral History Research,” American Historical Association Activities. [ available online ]
  • Jones, S. (ed.), 1999, Doing Internet research: Critical Issues and Methods for Examining the Net , Thousand Oaks, CA: Sage.
  • Kaplan, A. and M. Haenlein, 2010, “Users of the World Unite: The Challenges and Opportunities of Social Media,” Business Horizons , 53(1).
  • King, S., 1996, “Researching Internet Communities: Proposed Ethical Guidelines for the Reporting of Results,” The Information Society , 12(2): 119–128.
  • Kitchin, Heather A., 2003, “The Tri-Council Policy Statement and Research in Cyberspace: Research Ethics, the Internet, and Revising a ‘Living Document,’” Journal of Academic Ethics , 1: 397–418.
  • –––, 2008, Research Ethics and the Internet: Negotiating Canada’s Tri-Council’s Policy , Winnipeg: Fernwood Publishing
  • Kramer, A. D. I., Guillory, J. E., & Hancock, J. T., 2014, “Experimental evidence of massive-scale emotional contagion through social networks” Proceedings of the National Academy of Sciences , 111(24), 8788-8790. [ available online ]
  • Kraut, R., J. Olson, M. Banaji, A. Bruckman, J. Cohen, and M. Cooper, 2004, “Psychological Research Online: Report of Board of Scientific Affairs’ Advisory Group on the Conduct of Research on the Internet,” American Psychologist , 59(4): 1–13.
  • Krodstad, D., S. Diop, A. Diallo, F. Mzayek, J. Keating, O. Koita, and Y. Toure, 2010, “Informed Consent in International Research: The Rationale for Different Approaches,” The American Journal of Tropical Medicine and Hygiene , 83(4): 4743–4747.
  • Lawson, D., 2004, “Blurring the Boundaries: Ethical Considerations for Online Research Using Synchronous CMC Forums,” in Readings in Virtual Research Ethics: Issues and Controversies , E. Buchanan (ed.), Hershey: Idea Group, pp. 80–100.
  • Leibovici, D.G., S. Anand, J. Swan, J. Goulding, G. Hobona, L. Bastin, S. Pawlowicz, M. Jackson, M. and R. James, 2010, “Workflow Issues for Health Mapping ‘Mashups’ of OGC,” University of Nottingham, CGS Technical Report, 2010 DL1.
  • Madejski, M., M. Johnson and S. Bellovin, 2011, “The Failure of Online Social Network Privacy Settings,” Columbia Research Report (CUCS-010-11), 1–20.
  • Mann, C., 2003, “Generating Data Online: Ethical Concerns and Challenges for the C21 Researcher,” in Applied Ethics in Internet Research , M. Thorseth (ed.), Trondheim, Norway: NTNU University Press, pp. 31–49.
  • Markham, A., 1998, Life Online: Researching Real Experience in Virtual Space , Altamira Press.
  • –––, 2012, “Fabrication as Ethical Practice: Qualitative Inquiry in Ambiguous Internet Contexts.” Information, Communication & Society , 15(3): 334–353.
  • Markham, A. and N. K. Baym (eds.), 2008, Internet Inquiry: Conversations about Method , Thousand Oaks, CA: Sage.
  • Markoff, J., 2010, “In a Video Game, Tackling the Complexities of Protein Folding,” New York Times , August 4. [ available online ]
  • McKee, H. A., and J. Porter, 2009, The Ethics of Internet Research: A Rhetorical, Case-based Process , New York: Peter Lang Publishing.
  • Mendelson, Cindy, 2007, “Recruiting Participants for Research from Online Communities,” Computers, Informatics, Nursing , 25(6): 317–323.
  • Milne, G. R. and M. J. Culnan, 2004, “Strategies for Reducing Online Privacy Risks: Why Consumers Read (or don’t read) Online Privacy Notices,” Journal of Interactive Marketing , 18(3): 15–29.
  • Moor, J. H., 1985, “What is Computer Ethics,” Metaphilosophy , 16(4): 266–275.
  • Moore, M. and L. Alexander, 2007, “Deontological Ethics,” The Stanford Encyclopedia of Philosophy (Winter 2007 Edition), Edward N. Zalta (ed.). [ available online ].
  • Narayanan, A., and V. Shmatikov, 2008, “Robust de-anonymization of Large Sparse Datasets,” Proceedings of the 29 th IEEE Symposium on Security and Privacy , Oakland, CA, May 2008, pp. 111–125. [ available online ]
  • [NCPHSBBR] The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1979, “The Belmont Report.” [ available online ]
  • [NESH] The National Committee for Research Ethics in the Social Sciences and the Humanities [Norway], 2006, “Guidelines for Research Ethics in the Social Sciences, Law, and Humanities,” Published September 2006. [ available online ].
  • [NESH] The National Committee for Research Ethics in the Social Sciences and the Humanities [Norway], 2014, “Ethical Guidelines for Internet Research,” Published December 2014. [ available online ].
  • [NIH] National Institutes of Health, 2008, Guide for Identifying Sensitive Information at the NIH, April.
  • [NIH] National Institutes of Health, 2011, Certificates of Confidentiality Kiosk. June 28, 2011. [ available online ]
  • Nissenbaum, Helen, 2009, Privacy in Context: Technology, Policy, and the Integrity of Social Life , Stanford, CA: Stanford University Press.
  • Odwazny, L. and E. Buchanan, 2011, “Ethical and Regulatory Issues in Internet Research.” Advancing Ethical Research Conference, PRIM&R, MD: National Harbor.
  • Ohm, P., 2019, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization”, UCLA Law Review 57:1701–1777.
  • [OHRP] U.S Department of Health and Human Services, 2008, “Office for Human Research Protections,” [ available online ]
  • Oral History Association, 2012, “Oral History”, web site, accessed May 15, 2012. [ available online ]
  • O’Rourke, P., 2007, “Report of the Public Responsibility in Medicine and Research (PRIM&R) Human Tissue/Specimen Banking Working Group.” [available online: Part I and Part II ]
  • Overbeke, G., 2008, “Pro-Anorexia Websites: Content, Impact, and Explanations of Popularity,” Mind Matters: The Wesleyan Journal of Psychology , 3: 49–62. [ available online ]
  • Parras, J., J. Sullivan, R. Guerrero, J. Prochaska, H. Kelley, A. Nolen, and C. Hinojosa, 2011, “Creating Community Networks to Promote Complex Goals such as Environmental Justice,” Panel Presentation from the CEnR Workshop, October 27, 2011.
  • Reid, E., 1996, “Informed Consent in the Study of On-line Communities: A Reflection on the Effects of Computer-mediated Social Research,” The Information Society , 12(2): 169–174.
  • Reynolds, Ren, and Melissa de Zwart, 2010, “The Duty to ‘Play’: Ethics, EULAs and MMOs,” International Journal of Internet Research Ethics , 3(1): 48–68. [ Reynolds & de Zwart 2010 available online ]
  • Ritchie, Donald A. 2003. Doing Oral History: A Practical Guide . New York: Oxford University Press.
  • Rosenberg, A., 2010, “Virtual World Research Ethics and the Private/Public Distinction,” International Journal of Internet Research Ethics , 3(1): 23–37.
  • Rosser, B.R.S., J.M. Oakes, J. Konstan, S. Hooper, K.J. Horvath, G.P. Danilenko, K.R. Nygaard, and D.J. Smolenski, 2010, “Reducing HIV Risk Behavior of MSM Through Persuasive Computing: Results of the Men’s ITernet Study (MINTS-II),” AIDS , 24(13): 2099–2107.
  • Rothstein, M., 2010, “ Is Deidentification Sufficient to Protect Health Privacy in Research?” The American Journal of Bioethics , 10(9): 3–11.
  • Rudder, C., 2014, “We Experiment on Humans!” OkTrends. [ available online ]
  • [SACHRP] Secretary’s Advisory Committee to the Office for Human Research Protections, 2010, SACHRP July 20–21, 2010 Meeting Presentations , U.S. Department of Health and Human Services. [ available online ].
  • Scholz, Trebor, 2008, “Market Ideology and the Myths of Web 2.0,” First Monday , 13(3) 3 March 2008. [ available online ]
  • Schwartz, P. and D. Solove, 2011, “The PII Problem: Privacy and a New Concept of Personally Identifiable Information,” New York University Law Review , 86: 1814.
  • Seaboldt J.A., and R. Kuiper, 1997, “Comparison of Information Obtained from a Usenet Newsgroup and from Drug Information Centers,” American Journal of Health-System Pharmacy , 154:1732–1735.
  • Sharf, B.F., 1996, “Communicating Breast Cancer on-line: Support and Empowerment on the Internet,” Women Health , 26(1):65–84.
  • Sieber, Joan E., 1992, Planning Ethically Responsible Research: A Guide for Students and Internal Review Boards , Thousand Oaks: Sage.
  • –––, 2015, Planning Ethically Responsible Research: A Guide for Students and Internal Review Boards , (second edition) Thousand Oaks: Sage.
  • Simmhan, Y., R. Barga, C. van Ingen, E. Lazowska, and A. Szalay, A., 2008, “On Building Scientific Workflow Systems for Data Management in the Cloud,” Fourth IEEE International Conference on eScience, December 7–12, 2008, Indianapolis, Indiana.
  • Skloot, R., 2010, The Immortal Life of Henrietta Lacks , New York: Crown Publishers.
  • Smith, M. A., and B. Leigh, 1997, “Virtual Subjects: Using the Internet as an Alternative Source of Subjects and Research Environment,” Behavioral Research Methods, Instruments and Computers , 29: 496–505.
  • Spriggs, Merle, 2010, “Understanding Consent in Research Involving Children: The ethical issues.” The Royal Children’s Hospital Melbourne, version 4. available online ]
  • Stone, Brad, 2009, “Facebook Rolls Out New Privacy Settings,” New York Times , December 9. [ available online ]
  • Sveningsson, M., 2004, “Ethics in Internet Ethnography” in Readings in Virtual Research Ethics: Issues and Controversies , E. Buchanan (ed.), Hershey: Idea Group, pp. 45–61.
  • Sweeney, L., 2002, “K-Anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 10(5): 557–570.
  • Thomas, J., 2004, “Reexamining the Ethics of Internet research: Facing the Challenge of Overzealous Oversight,” in Online Social Research: Methods, Issues, and Ethics, M. D. Johns, S. L. Chen, and J. Hall (eds.), New York: Peter Lang, pp. 187–201.
  • Thorseth, M., 2003, “Applied Ethics in Internet Research,” Programme for Applied Ethics, Norwegian University of Science and Technology, Trondheim, Norway.
  • Tsai, J., L. Cranor, A. Acquisti, and C. Fong, 2006, “What’s it to you? A Survey of Online Privacy Concerns and Risks,” NET Institute Working Paper No. 06-29.
  • Turkle, S.,1997, Life on the Screen: Identity in the Age of the Internet , New York: Touchstone.
  • U.K. Data Archive, 2012, Create & Manage Data: Access Control. Accessed May 16, 2012. [ available online ]
  • Walstrom, M., 2004, “Ethics and Engagement in Communication Scholarship: Analyzing Public, Online Support Groups as Researcher/Participant-Experiencer,” in Readings in Virtual Research Ethics: Issues and Controversies , E. Buchanan (ed.), Hershey: Idea Group, pp.174–202.
  • Walther, J., 2002, “Research Ethics in Internet-enabled Research: Human Subjects Issues and Methodological Myopia,” Ethics and Information Technology, 4(3). [ available online ]
  • White, M., 2002, “Representations or People,” Ethics and Information Technology 4(3): 249–266. [ available online ].
  • World Medical Association. 1964/2008. “Declaration of Helsinki: Ethical Principles for Medical Research Involving Human Subjects”, Adopted by the 18 th World Medical Assembly. Amended 1975, 1983, 1989, 1996, 2000, 2002, 2004, 2008. [ available online ]
  • Wright, David R., 2006, “Research Ethics and Computer Science: an Unconsummated Marriage,” Proceeding SIGDOC ’06 Proceedings of the 24th annual ACM International Conference on Design of Communication .
  • Yogesh, S., C. Van Ingen, G. Subramanian, and J. Li, 2009, “Bridging the Gap Between the Gap between the Cloud and an eScience Application Platform”, Microsoft Research Tech Report MSR-TR-2009-2021. [ available online ]
  • Zimmer, Michael, 2010, “But the Data is Already Public: On the Ethics of Research in Facebook,” Ethics & Information Technology , 12(4): 313–325.
  • –––, 2016, “OkCupid Study Reveals the Perils of Big-Data Science,” Wired.com. [ available online ]
  • Zimmer. M, and K. Kinder-Kurlanda (eds.), forthcoming, Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts , New York: Peter Lang Publishing.
How to cite this entry . Preview the PDF version of this entry at the Friends of the SEP Society . Look up this entry topic at the Internet Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers , with links to its database.
  • American Counseling Association: Ethics and Professional Standards , 2005 revision.
  • Association of Internet Researchers Ethics Guidelines
  • Research Ethics Guidelines for Internet Research , The (Norwegian) National Committee for Research Ethics in the Social Sciences and the Humanities, 2003.
  • American Psychological Association: Advisory Group on Conduction Research on the Internet (http://www.apa.org/science/leadership/bsa/internet/)
  • Council of European Social Science Data Archives
  • Current Issues in Research Ethics: Privacy and Confidentiality.
  • Ethical and Legal Aspects of Human Subjects Research in Cyberspace.
  • Forrester Privacy and Data Protection by Country.
  • IJIRE: International Journal of Internet Research Ethics
  • International Journal of Internet Science
  • Journal of Emperical Research on Human Research Ethics
  • Journal of Medical Internet Research
  • Methodspace
  • Recommendations on Public Use Data Files , [NHRPAC] National Human Subjects Protection Advisory Committee, 2002.
  • NSTC (National Science and Technology Council), 2016 (June), “ National Privacy Research Strategy ”
  • Research Ethics Blog
  • Secretary’s Advisory Committee to the Office for Human Research Protections (SACHRP), “ Considerations and Recommendations Concerning Internet Research and Human Subjects Research Regulations, with Revisions ”
  • Secretary’s Advisory Committee to the Office for Human Research Protections (SACHRP), “ Human Subjects Research Implications of ‘Big Data’ Studies ”
  • Sparks, Joel, 2002, Timeline of Laws Related to the Protection of Human Subjects , National Institutes of Health.
  • The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research
  • The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research
  • Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans
  • Williams, George, 2010, “The Ethics of Amazon’s Mechanical Turk,” ProfHacker Blog, The Chronicle of Higher Education, March 1, 2010. [ available online ]
  • U.S. Department of Health and Human Services: Can an electronic signature be used to document consent on parental permission?
  • U.S. Department of Health and Human Services: What are the basic elements of informed consent?
  • Zimmer, Michael, 2009, “Facebook’s Privacy Upgrade is a Downgrade for User Privacy,” MichaelZimmer.org blog, December 10, 2009. [ available online ]

computer and information ethics | ethics, biomedical: clinical research | informed consent | privacy

Copyright © 2016 by Elizabeth A. Buchanan < buchanane @ uwstout . edu > Michael Zimmer < zimmerm @ uwm . edu >

Support SEP

Mirror sites.

View this site from another server:

  • Info about mirror sites

Stanford Center for the Study of Language and Information

The Stanford Encyclopedia of Philosophy is copyright © 2016 by The Metaphysics Research Lab , Center for the Study of Language and Information (CSLI), Stanford University

Library of Congress Catalog Data: ISSN 1095-5054

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here .

Loading metrics

Open Access

Peer-reviewed

Research Article

Ethical issues in using the internet to engage participants in family and child research: A scoping review

Roles Investigation, Methodology, Validation, Visualization, Writing – original draft, Writing – review & editing

* E-mail: [email protected]

Affiliation Judith Lumley Centre, La Trobe University, Melbourne, Victoria, Australia

ORCID logo

Roles Conceptualization, Funding acquisition, Investigation, Methodology, Project administration, Supervision, Validation, Writing – original draft, Writing – review & editing

Affiliations Judith Lumley Centre, La Trobe University, Melbourne, Victoria, Australia, Murdoch Children’s Research Institute, Melbourne, Victoria, Australia, Parenting Research Centre, Melbourne, Victoria, Australia

Roles Investigation, Validation, Writing – review & editing

Roles Investigation, Methodology, Writing – review & editing

Affiliations Judith Lumley Centre, La Trobe University, Melbourne, Victoria, Australia, Murdoch Children’s Research Institute, Melbourne, Victoria, Australia

Roles Investigation, Writing – review & editing

Roles Conceptualization, Funding acquisition, Methodology, Resources, Supervision, Writing – review & editing

Affiliations Judith Lumley Centre, La Trobe University, Melbourne, Victoria, Australia, Murdoch Children’s Research Institute, Melbourne, Victoria, Australia, Queensland University of Technology, Brisbane, Queensland, Australia

Roles Conceptualization, Funding acquisition, Methodology, Writing – review & editing

Affiliation Department of Communications and Media, La Trobe University, Melbourne, Victoria, Australia

Affiliations Australian Research Centre in Sex, Health and Society, La Trobe University, Melbourne, Victoria, Australia, School of Public Health, The University of Queensland, Brisbane, Queensland, Australia

Affiliation La Trobe Law School, La Trobe University, Melbourne, Victoria, Australia

Roles Conceptualization, Funding acquisition, Investigation, Methodology, Project administration, Supervision, Validation, Writing – review & editing

  • Stacey Hokke, 
  • Naomi J. Hackworth, 
  • Nina Quin, 
  • Shannon K. Bennetts, 
  • Hnin Yee Win, 
  • Jan M. Nicholson, 
  • Lawrie Zion, 
  • Jayne Lucke, 
  • Patrick Keyzer, 
  • Sharinne B. Crawford

PLOS

  • Published: September 27, 2018
  • https://doi.org/10.1371/journal.pone.0204572
  • Reader Comments

Table 1

The internet is an increasingly popular tool in family and child research that is argued to pose new ethical challenges, yet few studies have systematically assessed the ethical issues of engaging parents and children in research online. This scoping review aims to identify and integrate evidence on the ethical issues reported when recruiting, retaining and tracing families and children in research online, and to identify ethical guidelines for internet research.

Academic literature was searched using electronic academic databases (Scopus, PsycINFO, Embase, ERIC, CINAHL and Informit) and handsearching reference lists for articles published in English between January 2006 and February 2016. Grey literature was searched using Google to identify relevant ethical guidelines.

Sixty-five academic articles were included after screening 3,537 titles and abstracts and 205 full-text articles. Most articles reported using the internet to recruit participants (88%) with few reporting online retention (12%) or tracing (10%). Forty percent commented on ethical issues; the majority did not discuss ethics beyond general consent or approval procedures. Some ethical concerns were specific to engaging minors online, including parental consent, age verification and children’s vulnerability. Other concerns applied when engaging any research participant online, including privacy and confidentiality, informed consent and disparities in internet access. Five professional guidelines and 10 university guidelines on internet research ethics were identified. Few academic articles (5%) reported using these guidelines.

Conclusions

Engaging families and children in research online introduces unique challenges requiring careful consideration. While researchers regarded themselves as responsible for ensuring research is conducted ethically, lack of use of available guidelines and limited academic literature suggests internet research is occurring without suitable guidance. We recommend broad dissemination of ethical guidelines and encourage researchers to report the methodological and ethical issues of using the internet to engage families and children in research.

Citation: Hokke S, Hackworth NJ, Quin N, Bennetts SK, Win HY, Nicholson JM, et al. (2018) Ethical issues in using the internet to engage participants in family and child research: A scoping review. PLoS ONE 13(9): e0204572. https://doi.org/10.1371/journal.pone.0204572

Editor: Yih-Kuen Jan, University of Illinois at Urbana-Champaign, UNITED STATES

Received: January 3, 2018; Accepted: September 11, 2018; Published: September 27, 2018

Copyright: © 2018 Hokke et al. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Data Availability: All relevant data are within the manuscript and its Supporting Information files.

Funding: This work was funded by La Trobe University through the Transforming Human Societies Research Focus Area Scheme 1, 2015; Associate Pro Vice Chancellor (Research), College of Science, Health & Engineering; and Pro Vice Chancellor (Research). Authors SH, NJH, NQ, SKB, JMN and SBC were supported by the Roberta Holmes Transition to Contemporary Parenthood Program (Australian Communities Foundation, Coronella sub-fund). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

Competing interests: The authors have declared that no competing interests exist.

Introduction

Parents and children in contemporary society are facing new and multiple demands that may affect their wellbeing, and limit parents’ capacity to support their child’s healthy development [ 1 ]. High quality research is key to understanding these changes and to providing a sound evidence base for the development of policies and programs to support families, parents and children. Being able to engage families from diverse backgrounds and in sufficient numbers is critical to the completion, scientific validity and financial viability of such research [ 2 ]. However, a major research challenge is the ability to attract and retain participants over time to assess long-term outcomes [ 3 ], particularly within the context of increasing family time pressure and population mobility.

Engaging participants in research can involve: recruitment (strategies to invite potential participants and enrol them into research); retention (strategies to ensure ongoing participant involvement to reduce attrition); and tracing (strategies to find and re-connect with participants who have been lost to follow-up). Conventional approaches to engage families and children in research (e.g., telephone calls, mail-outs, print media, face-to-face) are not only expensive and labour intensive [ 4 , 5 ], but are increasingly ineffective in the face of contemporary mobile populations and changing communication patterns [ 6 ]. For instance, the use of random digit dialling to recruit participants is less effective as many families now live in households without a fixed telephone [ 7 ]. Recruiting families via address-based sampling is also difficult in the context of increasing residential mobility, which is high among young and socially disadvantaged families (e.g., experiencing poverty, unemployment, relationship breakdown) [ 8 , 9 ] who are often the target of research. Maintaining contact with mobile families can be challenging in longitudinal research, especially if there are lengthy periods between data collection waves or if a prospective follow-up study was not part of the initial research design [ 10 ].

Increasingly, child and family researchers are using online methods to recruit, retain and trace participants [ 6 , 11 – 13 ]. In developed countries, internet access is almost universal among households with children, with most connecting online via mobile or smart phones [ 14 , 15 ]. Children and adolescents have among the highest rates of internet use and frequency of use compared to older age groups, and social media use is ubiquitous among adolescents [ 16 ]. Parents are also increasingly online [ 17 ]. More parents access Facebook on a daily basis than non-parents, with usage tending to increase during the transition to parenthood [ 18 , 19 ].

As a research tool, the internet provides alternative strategies to reach participants where they ‘live’, and presents an ostensibly efficient and cost-effective solution to the challenges associated with conventional methods of participant engagement [ 20 ]. For example, study invitations can be advertised on websites or circulated via email to a large audience quickly and at little expense. Advertisements on social networking sites such as Facebook can be specifically targeted to identify eligible participants based on their personal characteristics or interests. Evidence suggests that child and parent samples can be recruited more efficiently and at a lower cost online than offline, and may result in a sample that is representative of the target population, or which has similar representativeness to studies using offline recruitment methods [ 21 – 23 ]. The internet also has potential to reduce attrition and non-response bias in longitudinal research with children and parents [ 13 , 24 , 25 ]. Posting on study websites or directly messaging participants on social media can maintain contact with study cohorts and send calls-to-action at appropriate times (e.g., for measure completion), while internet search engines and the search features of social networking sites can be used to trace participants who have been lost to follow-up.

Given the ubiquity of the internet and smartphone technology, the public availability of online communities and the potential cost and time efficiencies, it is unsurprising that family and child researchers are increasingly harnessing the internet to engage participants. As with all new research methodologies however, consideration needs to be given to the ethical issues surrounding its use. It has been argued that maintaining privacy and anonymity and obtaining informed consent are more complex in online research than offline research [ 26 ]. As a relatively new research tool, engaging participants online may also present issues that may be novel or less apparent. For example, the internet, and particularly social media, introduce new ways to access data and personal information. This raises questions regarding the ethical appropriateness of accessing digital data or online profiles for research purposes, and how the ethical principles embodied in codes of conduct (e.g., [ 27 ]) are upheld.

Ethical issues may be particularly pertinent in online research with parents and children. Such research may be sensitive in nature and involve vulnerable populations. Communicating with and engaging minors in an online setting can present further challenges, such as how researchers accurately determine a child’s capacity to consent to participate and the process of obtaining parental consent. Within this context, it is imperative that researchers, ethics committees and institutional review boards are aware of the advantages, limitations and ethical challenges of recruiting, retaining or tracing participants online. While discourse on internet and social media research ethics in family and child research is emerging [ 4 , 28 ], this may not be empirically based. In addition, there is a lack of definitive national regulatory guidance on internet research ethics. To date, little research has systematically assessed the ethical issues encountered or considered by those using the internet to engage participants in child and family research. It is unclear what ethical issues are considered by researchers in this setting and whether these ethical concerns differ from those in offline research, or in research not involving children and parents. It is also unclear what ethical guidance family and child researchers follow when recruiting, retaining or tracing participants online.

To address these gaps, a scoping review was conducted. Scoping reviews aim to synthesise and narratively integrate evidence when there is a large and diverse body of literature that has not been comprehensively reviewed [ 29 ]. They aim to map the extent, range and nature of research, and identify key concepts and gaps in the literature to inform future work [ 29 , 30 ]. Scoping reviews differ from systematic reviews, in that they are often broader in focus, include a range of study designs and methodologies, and typically do not appraise study quality. They differ from narrative or literature reviews as they follow rigorous, systematic methods to identify literature and require analytical re-interpretation of evidence [ 30 ].

This review was conducted to gain an understanding of the ethical issues associated with the use of the internet to engage parents, children and families in research, and to identify available resources to support the ethical conduct of family and child researchers in the context of online research. The review aimed to assemble and summarise the ethical concerns and considerations reported in available literature and identify ethical issues unique to using the internet to recruit, retain and trace families and children in research. A systematic search of academic literature was conducted to answer the following research questions: (1) How is the internet used to recruit, retain and trace participants in child and family research?; (2) How are ethical and consent procedures reported?; and (3) What ethical concerns are identified? In addition, a general grey literature search was conducted to determine: (4) What ethical guidelines are available and being used to inform internet research?

A multi-disciplinary research team was established to undertake the review, with expertise in child and family research, public health, psychology, media and communications, and law. The scoping review was conducted according to a 5-stage framework [ 29 – 31 ]: (1) identifying the research questions; (2) identifying the search strategy; (3) study selection; (4) charting the data; and (5) collating, summarising and reporting the results. These steps were applied separately to searches of the academic and grey literatures.

Academic literature search

To address Research Questions 1 to 3 above, academic literature was searched using four categories of keywords: engagement strategy , internet , ethics and focus sample ( Table 1 ). Boolean search operators “AND” and “OR” were used to combine keywords between and within categories. Searches were conducted in the following electronic databases selected to ensure maximum coverage of family, child and internet research: Scopus, PsycINFO, Embase (includes Medline), ERIC, CINAHL and Informit. As the Scopus search generated over 70,000 initial hits, results were refined by applying additional search limits (see S1 File ).

thumbnail

  • PPT PowerPoint slide
  • PNG larger image
  • TIFF original image

https://doi.org/10.1371/journal.pone.0204572.t001

Articles were eligible for inclusion if they were written in English, published between January 2006 and February 2016, and used the internet (e.g., social network sites, websites, email, listserv, blogs, forums, applications, online research participant registries) as a method for recruiting, retaining or tracing families, parents and/or children in research. Studies that used the internet for data collection but not participant engagement were excluded. Studies that used online residential listings were also excluded as these listings are typically used for compiling subsequent mail-out or door-knocking recruitment strategies. Included articles could be original research, reviews, discussion papers, outcomes papers, protocol papers or editorial letters. Books, book chapters and thesis dissertations were excluded. Published conference abstracts were used to search for subsequently published full-text articles, which were included if they met the inclusion criteria.

Upon completion of the search, duplicate articles were removed and search results were screened by title and abstract for eligibility. Articles passing the abstract screen were then retrieved in full-text and further screened for eligibility. Screening of abstracts and full-text articles was undertaken by a primary reviewer (NQ) and confirmed by a second reviewer (SH). Conflicts were resolved by consensus with a third and fourth researcher (NJH, SBC).

Articles were summarised, and characteristics were charted, including: author(s), year of publication, geographic location, article type, study participants, method(s) of participant engagement, type of internet technology used, study approval and consent procedures, ethical considerations and concerns, and authors’ use of ethical guidelines and resources. Methods of participant engagement were defined as follows: recruitment —strategies to initiate contact and invite potential participants; retention— strategies to maintain contact with participants in longitudinal research; and tracing —strategies to find and re-establish contact with participants in longitudinal research who have been lost to follow-up. Reference lists of full-text articles were searched and eligible articles charted. Each article was analysed by a primary reviewer (SH) and extracted data confirmed by a second and third reviewer (NJH, SBC). A narrative account of key findings is presented according to each ethical consideration identified.

Grey literature search

Ethical guidelines and recommendations produced by governments, research institutes or professional associations are documents classified as ‘grey literature’. This term refers to reports, theses, factsheets, websites, policy documents and other information produced by government, academics, business and industry in print and electronic formats. These documents are not controlled by commercial publishing [ 32 ], may not be peer-reviewed and most are not included in academic databases. Grey literature published online can be located through internet searches [ 33 ].

To address Research Question 4, an internet search was conducted to identify guidelines to support researchers’ and human ethics committees’ ethical conduct of internet research. A general internet search was performed with the popular web search engine Google ( www.google.com ) using the following search terms: (ethic*) AND (recommendation* OR guide*) AND (internet OR "social media" OR online) AND (research). The first 100 hits (as sorted for relevance by Google) were screened by title and text and potentially relevant results were viewed. Guidelines were included if they were published from January 2006 to February 2016 and focused on any internet research methods. Information about each resource was charted, including author(s), affiliated institution(s), year of publication, format and purpose, comprehensiveness regarding the research methods raised, and the ethical considerations and recommendations discussed, including ethical issues specific to family and child research.

Summary of search process and results

The search process and results are summarised in Fig 1 . Searching academic databases identified 3,794 abstracts, with 3,537 remaining following the removal of duplicates. Preliminary screening of abstracts identified 205 articles for full-text screening, of which 53 articles met the inclusion criteria. Hand searching reference lists identified 12 additional relevant articles, resulting in a total of 65 academic articles for inclusion in the scoping review (see S2 File ). Five professional guidelines and 10 university guidelines specific to internet research ethics were identified by Google search.

thumbnail

https://doi.org/10.1371/journal.pone.0204572.g001

Academic literature article characteristics

The majority of identified academic articles were published after 2011 ( n = 47, 72%) and originated from the USA ( n = 24, 37%), UK ( n = 12, 18%), Australia ( n = 11, 17%) and the Netherlands ( n = 9, 14%). Most were original research ( n = 58, 89%), including four research protocols (6%) and 10 case studies (15%). The vast majority of original research papers reported using the internet to recruit research participants ( n = 51/58 articles; 88%). Using the internet to retain participants was reported in seven articles (12%; six also used the internet for recruitment) and to trace participants in six articles (10%). Four discussion papers (6%), two systematic reviews (3%) and one letter to the Editor were identified, and these primarily focused on participant recruitment. Overall, one third of the articles addressed or described specific ethical issues of engaging participants online ( n = 26/65, 40%). The remainder reported using the internet as a research tool but did not discuss ethics beyond reporting general consent or ethics approval procedures.

The participant samples for the original research articles were predominantly youths ( n = 20/58, 34%; typically ranging in age from 15–25 years) or adolescents ( n = 13/58, 22%; typically ranging in age from 11–18 years). Six studies used mixed samples of child/adolescent or adolescent/adult participants ( n = 6/58, 10%) and four longitudinal studies ( n = 4/58, 7%) traced children into adulthood. The participant samples for the remainder were parents ( n = 11/58, 19%) or families (e.g., parents and children; n = 4/58, 7%).

How is the internet used to recruit, retain and trace participants in child and family research?

Just over half of the research articles reported using a combination of offline and online methods to engage participants ( n = 32/58; 55%), with 45% ( n = 26/58) using online methods exclusively. As summarised in Table 2 , websites, Facebook and email were the most commonly used internet technologies. The use of websites or email for participant engagement appeared to be stable across the study inclusion period (2006–2016). Studies using social networking sites, such as Facebook, to engage participants were first published in 2011 and were used consistently thereafter.

thumbnail

https://doi.org/10.1371/journal.pone.0204572.t002

For participant recruitment , advertisements and posts on websites were the most commonly used online method ( n = 27/51; 53%). The level of detail provided about the websites used varied considerably (see Table 2 ). Nine articles (18%) named the website, 12 (24%) gave a general description, six (12%) provided no information, and four (8%) created a study-specific website for recruitment. Facebook was the most common social networking site used for participant recruitment ( n = 18/51; 35%). Five articles (10%) reported the use of another social networking site (e.g., Twitter, MySpace) and five (10%) did not name the social networking site used. Email was the next most common online method for recruitment ( n = 14/51; 27%), with invitations sent to members of electronic mailing lists, listservs, research panels and registries. Several studies sought to recruit participants by posting study information on blogs, forums and discussion boards ( n = 10/51, 20%). Less common recruitment methods included: respondent-driven sampling online, where existing participants were asked to invite their friends to participate (via email, Facebook or an unspecified method); dissemination of the study invitation through online social networks (snowballing); and the use of researchers’ own personal online networks.

Few studies reported on the success of using the internet to recruit participants in research compared to offline methods. Of the 25 studies that reported using both offline and online methods, less than a third ( n = 7; 28%) commented on how their sample was sourced or the relative success of each recruitment strategy. Four studies found online methods yielded more enrolled participants than offline methods [ 34 – 37 ] and three studies reported the opposite [ 38 – 40 ]. Recruitment sources and success rates were reported by half of the studies using either a single ( n = 8/18, 44%) or multiple methods of online recruitment ( n = 3/6, 50%).

For the retention of participants in longitudinal research, five studies used email to keep in contact ( n = 5/7, 71%), one used a study website and one became ‘friends’ with participants on Facebook. Four studies ( n = 4/7, 57%) employed both offline (e.g., mail, phone, SMS) and online retention methods [ 34 , 41 – 43 ]. Again, the success of online versus offline methods for retaining participants was poorly reported. Only one study provided details on retention rates using email reminders and a subsequent mail-out to non-responders [ 34 ] and concluded that multiple reminders using online and offline modes of contact improved overall response rates. Two studies reported retention rates of the cohort overall, rather than by the method used to maintain contact [ 41 , 42 ] and one study did not report retention rates, yet remarked that Facebook was a more effective retention tool than email [ 43 ].

Using the internet to trace participants who had been lost to follow-up was reported in six studies. The majority ( n = 5/6; 83%) combined this with offline methods (e.g., electoral roll, mail, phone, school roll). Most commonly, online tracing was done via social networking sites (e.g., Facebook, Myspace, Friends United) using the platform’s messaging feature to send private messages to potential participant matches, identified by the information publicly displayed on their profile. Researchers also traced participants using internet search engines or by posting messages on relevant websites requesting participants to contact them. Half of the six studies using internet tracing reported on the success of this compared to offline tracing methods [ 44 – 46 ]. All three concluded that social networking sites were a valuable tool to trace and reconnect with participants, with Masson et al. [ 44 ] reporting a higher response rate for participants traced via Facebook than those traced using the electoral roll and contacted via post. Conversely, a fourth study commented that social media tracing was less successful than offline methods but did not provide tracing success rates [ 47 ].

How are ethical and consent procedures reported?

The majority of research articles reported obtaining study approval from an ethics committee or institutional review board ( n = 46/58; 79%). Ethical approval was not specifically mentioned in 10 articles (17%). One article stated that the researchers did not seek ethical approval [ 48 ] and another was noted as exempt from ethical review [ 49 ].

Informed consent was obtained online in approximately one third of studies via electronic signature, email or online checkboxes ( n = 19/58, 33%) and one study obtained consent via text message [ 50 ]. Despite the online nature of recruitment, offline methods of informed consent (verbal or post) were also common ( n = 16/58, 28%). ‘Implied consent’ was reported in four studies (7%) [ 35 , 48 , 51 , 52 ] where the researchers regarded that participants had provided consent by the act of participating in online data collection. Some articles did not mention whether ( n = 12/58, 21%) or how ( n = 5/58, 9%) consent was obtained.

Of the 40 studies involving adolescents or children, 12 (30%) stated that parental consent was obtained if participants were younger than 16 or 18 years with eight of these studies also obtaining child assent. Parental consent was waived in nine studies (23%) involving adolescents (aged 11–17 years). Reasons provided related to the anonymous nature of the study, the study’s minimal risk, the perception that parental permission would deter adolescent participation, to prevent participants disclosing sensitive information to their parents (i.e. sexual identity) and national age of consent laws [ 20 , 48 , 52 – 55 ]. Sensitivity of the topic alone (e.g., adolescent mental or sexual health) had little bearing on whether parental consent was sought. Nineteen articles (48%) involving adolescents or children did not discuss parental consent procedures.

Of the six studies that used the internet to trace participants, three had previously obtained consent for follow-up, without specifying the method of contact in this consent [ 46 , 56 , 57 ]. Two studies did not have formal permission to re-contact individuals, likely due to the length of time elapsed (10–50 years) since initial contact [ 44 , 47 ], and one study did not report consent procedures [ 45 ].

What ethical concerns are identified?

Sixty percent of the reviewed articles did not comment on any ethical concerns associated with using the internet to engage participants. The remaining articles ( n = 26/65) discussed one or more ethical considerations. As summarised below, some of these issues were specific to family and child research online (e.g., parental consent, age verification, children’s vulnerability) while others are more broadly applicable (e.g., privacy and confidentiality, disparities in internet access).

Parental consent.

Several articles noted that recruiting children into research online and obtaining parental consent can be ethically complex and logistically difficult [ 36 , 58 – 61 ]. The required dialogue between researcher, child and parent is challenging to achieve in the absence of face-to-face communication [ 36 , 54 ]. Researchers must adequately inform parents, gain their trust, and reassure them that the research is legitimate and reputable [ 60 , 62 ]. This may be facilitated by personally contacting parents or by providing them access to multiple sources of study information (e.g., study websites and social networking profiles) [ 36 ]. One review article suggested utilising video or audio recordings to enable parents and children to provide consent/assent online [ 63 ]. Study authors noted that further information and guidance on best practices of gaining parental consent online are required [ 11 , 54 ].

Obtaining parental consent via post or email for children engaged in research online had several limitations. One study reported that very few children returned signed consent forms by post [ 60 ], possibly due to the inconvenience and cost of this process. There is also limited capacity for researchers to ensure that participants are sufficiently informed [ 59 ], and a risk of parental consent forms being fraudulently signed by young participants or non-parents [ 34 , 59 , 64 ]. One study reported excluding young adolescents (13–16 years) due to concerns that they might fraudulently complete the online parental consent forms themselves [ 34 ]. Given these barriers, Henderson et al. [ 59 ] recommended seeking child and parent consent via telephone. This allows researchers to separately test child and parent speak understanding of the study procedure, risks and benefits, and enables verification of the child’s age with the parent. Amon et al. [ 11 ] alternatively proposed that researchers interested in recruiting young people via social media may benefit from directly targeting parents instead of children.

Several other methods were used to obtain consent for child participation. Boydell et al. [ 62 ] encouraged participants (aged 14–18 years) to discuss the study with their parents and then included a tick box in the online consent form for adolescent participants to declare this. One study performed a mature minor assessment of interested respondents aged under 18 years by telephone [ 20 , 65 , 66 ]. This involved the researcher assessing a participant’s age, schooling, general maturity, and ability to understand the study, to determine their capacity to provide informed consent.

In some studies involving children and adolescents, waiving parental consent was considered a methodological and ethical necessity. For example, Moinian [ 58 ] conducted an ethnographic study of children’s diary entries within an online community to explore the online activities that children engaged in outside of their parents’ knowledge or control—a topic that made “the process of obtaining parents’ consent practically impossible” [ 58 , p. 56]. In other studies, parental consent was waived if parental permission was likely to deter participation [ 54 ], or would put participants at harm. For example, parental permission was waived in two US studies involving gay and bisexual adolescents as young as 13 years [ 52 , 55 ] as it was considered that young people may be placed at risk by disclosing their sexual identity to their parents. Some studies noted that where parental consent was required by law, younger participants were under-represented due to their reluctance to seek parental permission [ 61 , 67 , 68 ] or due to parents not providing consent [ 69 ]. These articles debated the age at which an adolescent should be able to give informed consent without parental permission, although this was not specifically discussed in the context of online research.

Age verification.

Verification of participant identity and age presents challenges in online research [ 53 , 59 , 62 ]. This was of particular concern in studies involving child and adolescent populations, with one article commenting that “attempts can, and arguably should, be made to verify the age of participants [in online research with young people]” [ 62 , p. 13]. Verifying participant age was also pertinent to research with adults, as minors may participate without the knowledge of the investigators [ 64 ].

To verify participant age, researchers may need to directly contact interested participants, examine the age noted on participants’ social networking profiles or employ other age verification tools [ 59 , 62 , 70 ]. While researchers recognised that age misrepresentation is not confined to online research [ 59 , 62 , 71 ], one study argued that online users are inclined to falsify their age [ 70 ]. While the use of online consent procedures requires researchers to trust that participants are who they say they are [ 54 , 64 ], it was acknowledged that postal consent procedures are subject to similar issues [ 59 ].

Participant vulnerability.

A few articles noted that children and young people participating in online research should be “generally regarded as ‘vulnerable subjects’ requiring a heightened sensitivity to issues of gaining informed consent and ensuring confidentiality” [ 72 , p. 554]; issues that were further amplified in the online sphere [ 63 , 72 ]. Children are increasingly online and have greater knowledge, confidence and reliance upon digital technologies than adults [ 63 ]. However, they may not be aware of public and private boundaries and “are reluctant to remain anonymous” online [ 58 , p. 65]. Children openly express themselves on the internet, revealing real names, locations and personal details, and may have different understandings of privacy and the permanence of online content [ 58 , 72 ]. This is ethically challenging as children, more than adults, may freely share sensitive and personal information online without realising that others, including researchers, can access their posts and information [ 72 ].

Henderson et al. [ 72 ] provided further comment on the vulnerability of children in social media-based research and the array of complex ethical issues regarding obtaining informed consent and assuring privacy and confidentiality that may be difficult for adults to grasp, let alone children. As young people are generally disempowered in research, the authors suggest that researchers consult with children across all stages of the study so that they have greater control over the research process. They also suggest, as recommended by Sharkey et al. [ 71 ], that consent of children and young people in social media-based research should be ongoing or phased rather than a one-off occurrence, involving consultation with children at all stages of the research (from design to data collection, analysis and reporting).

Across the articles, there was little discourse on whether online research elevates risk among vulnerable people compared to offline research. One article stressed the importance of considering “whether individuals who choose to engage in internet research may be more vulnerable to safety concerns than their offline counterparts”, as there is some evidence that frequent internet users have poorer mental health than others [ 59 , p. 1120]. Sharkey et al. [ 71 ] asserted that the context and medium of research itself can increase vulnerability. In their case, the online setting, the sensitive topic, the young age of participants, the lack of face-to-face interaction and the need to protect anonymity together created the ‘perfect storm’ of ethical issues, requiring careful consideration of ethical practice and how to maintain anonymity of a high-risk and vulnerable population.

Participant privacy, confidentiality and anonymity.

Participant privacy, confidentiality and anonymity were the most commonly reported ethical concerns. These concerns are applicable to internet research across all disciplines, not just those involving families and children. Articles commented on the complexity of separating public and private domains online, particularly for social networking sites and online communities that encourage users to share information [ 45 , 46 ]. The public nature of these sites was seen to be “inherently at odds with the confidential or anonymous nature of research” [ 63 , p. 62]. While the terms and conditions of social media platforms usually indicate the potential for public disclosure, it is unlikely that users intend or expect their online information to be used by researchers [ 47 , 72 ]. Additionally, confidentiality may be breached by participants inadvertently revealing their association with a study by writing on a comment board, ‘liking’ a study page, or adding a link to a study site on their own profile [ 45 , 54 ]. Researchers are therefore reliant on participants understanding and using privacy settings [ 63 , 72 ] to prevent unintended sharing of personal information and research involvement [ 47 ].

Additional issues concerned the risk of revealing participant identities via website breaches or deductive disclosure, and protecting participant privacy in studies that traced participants. Notably, and of benefit to other researchers, many articles reflected on how they sought to maintain participant confidentiality, privacy and anonymity in research conducted online and offered advice for future research, as discussed below.

Several articles discussed the risk of deductive disclosure of an individual’s identity for research conducted within ‘open’ discussion boards, forums and web pages [ 47 , 58 , 62 , 64 , 71 ]. Using a search engine to trace phrases or quotes from a research report or publication may reveal participants, thus breaching anonymity, confidentiality and privacy. Such risks may be reduced by omitting, anonymising or paraphrasing quotes [ 71 ], albeit potentially at the expense of the integrity of the original post. Researchers expressed concern that data that have been de-identified for reporting may not remain so with future technological developments [ 72 ].

Regarding online tracing, several articles describing the use of social media to trace and re-connect with lost participants questioned whether searching for a participant on social networking sites was a violation of online privacy [ 44 , 47 , 72 ]. One study that traced participants online stated that they only found information about participants from sites that individuals made publicly available [ 44 ]. The authors reasoned that this was essentially no different to finding individuals who list their name in public telephone directories or electoral rolls, since social media users are able to conceal or publicise their profiles. However, they noted that “there are legitimate concerns as to whether some (perhaps more vulnerable) individuals understand the full implications of making their personal details publicly visible” [ 47 , p. 35], potentially to a much larger audience than intended [ 44 , 47 ].

Three articles reported on participants’ experiences of being traced using social media. Two studies found participants were predominantly positive about the experience, although somewhat surprised about being re-contacted via social networking sites [ 44 , 56 ]. Participants perceived Facebook to be a “more secure and private way of being contacted than by telephone or letter” [ 44 , p. 32] and many were friendly and informal when contacted via Facebook. Conversely, one study found participants were cautious about engaging with researchers via social media as they were an older generation who lacked experience and confidence with that medium [ 47 ].

In general, using social media to trace participants was considered a valuable and worthwhile approach. However, authors were mindful that online tracing needs to be undertaken with care to ensure participant privacy and confidentiality. The majority of articles that used social media to trace participants ( n = 4/5) discussed the ethical challenges they encountered when using this method [ 44 – 47 ]. They also provided advice on how to minimise breaches in participant confidentiality and improve study legitimacy, including how to contact participants privately, prevent individuals or researchers inadvertently revealing their involvement in a study and to ensure that a traced participant is a correct match.

Of all reviewed articles, a number emphasised the responsibility of the researcher in protecting online data and participant anonymity, confidentiality and privacy, and how this should be a top priority [ 43 , 59 , 71 , 73 , 74 ]. Authors stressed that researchers must be aware of participants’ expectations about privacy and confidentiality online [ 74 ] and be mindful of participants’ awareness and knowledge (or lack of knowledge) of internet technologies and privacy settings [ 47 ]. One article suggested that researchers have an “ethical duty to call attention to this lack of privacy” and to inform participants if their privacy and anonymity cannot be guaranteed online [ 43 , p. 142]. Baker [ 43 ] used Facebook as a communication tool and source of data in ethnographic research with adolescents and required participants to add the researcher as a contact or ‘friend’. This presented an ethical challenge as all participants would be able to see one another on Facebook. To call attention to this, the consent form used Facebook terminology, explicitly stated that the anonymity and privacy of the participant could not be protected and instructed participants on how they could adjust their Facebook privacy settings to avoid inadvertent sharing of information.

Articles also highlighted that websites and platforms are rapidly changing as new features are developed [ 45 , 54 ]. This requires researchers to be familiar with privacy settings and to keep up to date with changes that could affect their participants [ 44 ]. For example, advertising on social networking sites as a recruitment strategy requires researchers to know and understand how advertising features operate and what personal information is collected from participants interested in participating. While Facebook does not reveal individual user information to the advertiser, researchers may want to consider minimising the amount of information exchanged within such sites and direct interested participants to a secure external website where they have greater control over privacy [ 20 , 54 , 73 ].

Informed consent.

A small number of articles discussed issues regarding informed consent when engaging participants online. Compared to some offline recruitment methods (such as recruiting participants face-to-face or by telephone), researchers have a “lack of immediate and real-time engagement with participants at the time of program enrolment online” [ 54 , p. 1084] which may limit their ability to assess participant comprehension and ensure participants are truly informed [ 54 , 64 ]. These concerns brought into question whether informed consent and implied consent can be trusted in online surveys. While one option is to ask participants to click a button at the beginning of an online survey to acknowledge their agreement and consent before being allowed to proceed, this method relies on participants having a sound understanding of the study and being competent to give informed consent [ 54 , 64 ]. Obtaining verbal consent may be one way to help ensure participants are exposed to consent information prior to enrolment in online research [ 54 , 59 ]. Telephone conversations allow researchers to use back-questioning techniques to help ensure participants have read and understood consent documents and the procedures, risks and benefits of a study.

As the ability to obtain face-to-face and verbal consent in internet research can be challenging, new and multiple strategies to ensure consent is informed are required. This may be particularly relevant if the research is anonymous or involves children and adolescents. One study reported how, during piloting of an online intervention, youth “didn’t express any concerns about why we were asking for sensitive information or what we would be doing with participant data” [ 54 , p. 1086]. The authors concluded that this indicated children and young people are generally not interested in reading formal informed consent materials or may not have the ability to understand these concepts. Alternative, tailored information available in a number of different formats (e.g., audio-clips, images, video or bullet-point summary) and readily accessible throughout the duration of the study (e.g., sent via email, attached to the survey) could be considered [ 54 , 63 , 71 ]. Researchers could also give participants the opportunity to discuss the study online via a study page [ 54 , 71 ]. However, one article did comment that providing extra measures and sources of information may not guarantee understanding, regardless of whether the research is conducted online or face-to-face [ 71 ]. Alternatively, researchers could employ a phased consent approach as reported by Sharkey et al. [ 71 ], where separate consent was taken from participants for study registration, participation and use of direct quotes, in order to increase participants’ understanding of the research and study protocol. The importance of maintaining consent when engaging research participants via social media was also discussed by Henderson et al. [ 72 ]. The authors noted how the dynamic nature of social media, including changes in the people involved in social networks over time, may alter the context of the initial consent. This raises questions regarding the ethical decision-making of researchers in social media-based research, and “whether there should be measures to check that consent continues to be given” [ 72 , p. 551].

Disparities in internet access and sample representativeness.

Some articles expressed concern over the ‘digital divide’, whereby internet-based recruitment strategies may limit the ability of researchers to reach groups disadvantaged by socioeconomic status or education, who lack internet access or digital literacy [ 36 , 54 , 59 , 74 ]. This may introduce bias and limit the representativeness of the study sample [ 60 , 75 ]. Conversely, some researchers argued that the digital divide was not a concern when recruiting young people online, given the high rates at which youth, including disadvantaged youth, use and access the internet [ 52 , 54 , 76 ].

Many articles commented on the representativeness of their online sample, with mixed findings. In some cases, samples recruited online were representative of the target population in terms of socioeconomic status and regional distribution [ 20 , 52 , 66 ] yet not regarding age or gender [ 20 , 66 , 77 ]. Online recruitment methods successfully engaged traditionally hard-to-reach populations such as regional, isolated or stigmatised groups [ 20 , 55 , 74 ] and allowed a broader sample to be recruited compared to offline methods of recruitment [ 55 , 78 ]. Others found online recruitment was associated with under-representation of some populations (e.g., minority groups, low socioeconomic status populations) and over-representation of others (e.g., tertiary educated) [ 20 , 49 , 66 , 79 ], although it was argued that similar sample biases are reported in offline recruitment methods [ 20 , 66 , 78 ]. One study reported similar demographic data for participants traced via Facebook and offline methods [ 46 ].

In most articles, sample representativeness was not addressed as an ethical concern but rather as a methodological limitation of the study design (e.g., [ 75 , 80 ]). However, two articles did highlight the need to justify using the internet to engage research participants [ 54 , 59 ]. They proposed that researchers should consider whether online methods are appropriate to engage and interact with research participants and which method (online or offline) will reach more of the target population. Care should also be taken to ensure that the chosen method of engagement is best for the participant, not the researcher, and to minimise the impact of disparities in internet access on participant inclusion or selection bias.

Incentives.

Three articles discussed the ethical concerns associated with offering incentives in research [ 44 , 62 , 81 ], yet only one focused on incentives in online research. Boydell et al. [ 62 ] aimed to recruit youth to online focus groups and was interested in offering an incentive. The authors were however concerned that requesting personal details from potential participants could compromise anonymity. As available literature provided no guidance on this issue, they opted not to offer an incentive, which they state, might have contributed to their poor online recruitment rates.

Risks to researchers.

Similar to participants, researchers may also be subject to privacy and safety risks when engaging participants online. While several articles reported interacting with participants online, for example via Facebook messaging features or discussion boards, only one study described the potential impact of this on the researcher and how they protected their personal privacy by creating a new Facebook account used solely for contacting participants [ 43 ]. Another study briefly acknowledged that sensitive research on adolescent self-harm may include risks for both participants and researchers, yet did not discuss this further [ 71 ].

What ethical guidelines are available and being used to inform internet research?

Guidance offered by academic articles..

The academic literature search identified a small number of articles offering ethical guidance when engaging research participants online. This is best illustrated in three case studies [ 54 , 59 , 71 ] where the authors list and present solutions to ethical issues encountered when recruiting young people on social networking sites and discussion forums. Other articles also provided ethical guidance by discussing the challenges encountered, the amendments made to study design and the strategies employed when using email in family research [ 74 ], recruiting participants into online focus groups [ 60 , 62 ] and tracing research participants online [ 44 , 47 ]. Several articles called for researchers to publish the methodological and ethical challenges they encounter when engaging research participants online and how these issues can be resolved [ 44 , 59 , 71 , 72 , 74 ], particularly when tracing participants [ 45 , 47 ] and engaging adolescents [ 73 ].

Guidelines and resources cited by academic articles.

Of the 58 research articles identified in the review, only three [ 35 , 37 , 82 ] described following internet-specific ethical guidelines when designing or undertaking their online research: these included professional guidelines produced by the Association of Internet Researchers (AoIR) [ 83 ] and the American Psychological Association (APA) [ 84 ], and practical guidance offered in academic literature [ 71 , 85 ]. Some articles [ 20 , 42 , 54 , 65 , 86 ] reported consulting ethical guidelines produced by their institutional review board [ 56 ], country of origin (e.g., National Statement on Ethical Conduct in Human Research [ 27 ], Belmont Report [ 87 ]) or the World Medical Association [ 88 ]. However, none of these provide specific ethical guidelines on the conduct of internet research. While the Belmont Report clearly precedes internet research, other more recent guidelines do not refer to the internet or online research. A small number of internet-specific ethical guidelines were recommended by articles [ 59 , 64 , 71 ], including professional guidelines published by the AoIR [ 83 , 89 ], APA [ 84 ] and the British Psychological Society (BPS) [ 90 , 91 ]. Other internet-specific ethics resources were also briefly mentioned [ 92 – 96 ].

Available guidelines.

A grey literature search identified a number of guidelines published from January 2006 to February 2016 specific to the ethical conduct of internet research. These included five professional guidelines developed by government bodies, societies and collaborative academic working groups (see Table 3 ) and ten university guidelines (see Table 4 ). Other resources included book chapters and websites.

thumbnail

https://doi.org/10.1371/journal.pone.0204572.t003

thumbnail

https://doi.org/10.1371/journal.pone.0204572.t004

Regarding professional guidelines, the most widely cited ethical guidelines for internet research are those published by the AoIR [ 83 ] and the BPS [ 90 , 97 ]. These offer broad advice to help researchers and research ethics committees make ethical decisions across all forms of internet research. They do not prescribe a code of practice or a ‘rule book’ but instead advocate for a flexible, case-based approach. Both recognise that the guidelines should not be considered as complete and that ethical decision-making will continue to evolve as new online tools are developed and new issues emerge. Produced in the USA, the AoIR guidelines briefly describe ongoing dilemmas in internet-based research before listing a set of guiding questions that should be considered when undertaking or reviewing online research methods. The document provides a basic overview of ethical considerations applicable to all types of internet research. While it does not specifically mention recruiting, retaining or tracing participants, it does raise key ethical concerns applicable to recruitment and outlines particular issues that may arise in online research with minors or vulnerable persons. Many of the ethical considerations listed in the AoIR guidelines are explored in more detail in the BPS guidelines, particularly regarding active recruitment of research participants. The BPS guidelines also provide recommendations and practical advice to guide ethical decision-making. These guidelines do not refer to child-specific ethical issues other than briefly stating that parental consent procedures will likely need to be obtained offline.

The grey literature search identified other professional guidelines not cited by articles identified in the review. Produced in Australia, Clark et al. [ 101 ] provide comprehensive advice for the use of digital data in research. Predominantly focusing on research using ‘big data’ rather than the direct involvement of participants, each issue is discussed in detail with examples and questions for consideration. The document also offers guidance to research ethics committees about ethical review processes. Produced in Norway, The National Committee for Research Ethics in the Social Sciences and the Humanities (NESH) guidelines [ 99 ] provide a brief discussion of ethical issues common to internet research. This does not give explicit guidance on how to overcome these issues but highlights how researchers must keep these issues in mind while continuing to follow general, fundamental ethical principles. The guidelines also include a section on protecting children in online research and emphasise the importance of obtaining parental consent and verifying age. Similar issues are raised in guidelines produced by the USA Secretary’s Advisory Committee on Human Research Protections (SACHRP) [ 98 ], where regulatory and ethical considerations pertaining to internet research are discussed, including online recruitment.

The grey literature search identified several universities, predominantly within the USA and UK, providing publicly accessible guidance on the ethical use of the internet in research. The content of the university guidelines varied widely and included comprehensive guidelines (e.g., [ 96 , 109 ]), general procedures and policies regarding recruitment, data collection and data storage (e.g., [ 104 ]) and resources that reiterate the AoIR guidelines (e.g., [ 102 ]). Guidelines developed by universities were often aimed at researchers and developed by ethics committees and review boards, to provide step-by-step procedural guidance to assist with ethical review processes. The search also identified one guideline produced by a university hospital [ 108 ] providing ethics-based recommendations and protocols for social media-based research, including online tracing. While some guidelines discussed ethical issues specific to online research with children, most did not. Two guidelines from universities in the USA reiterated the Children’s Online Privacy and Protection Act (COPPA), a federal law that requires verifiable parental consent if researchers collect personal information from children under 13 years of age.

Other resources describing the ethical issues of online research were also identified in the search. Several book chapters were identified [ 92 , 94 , 95 , 111 ]. These provide examples of online research methods and discuss common ethical issues, rather than offering procedural guidance. An online entry in the Stanford Encyclopaedia of Philosophy [ 112 ] provides a detailed discussion of key ethical issues in internet research including a verifying age and obtaining consent with minors. Several research ethics blogs and blog posts [ 113 – 115 ] and an online training program [ 93 ] were also found.

This review is the first attempt to identify and integrate literature on the ethics of using the internet to engage participants in family and child research. The review is timely in the context of changing communication patterns, increased social mobility and a research environment with limited funding. Communicating via the internet has rapidly emerged as the ‘new normal’ in everyday life; a development that has extended to the research world. Researchers (and, by extension, ethics committees) have a number of ethical concerns when engaging participants online. Some of these apply when engaging any research participant online, such as protecting participant privacy and confidentiality, obtaining consent and disparities in internet access. Engaging minors online raises additional ethical concerns and considerations, including parental consent, age verification and participant vulnerability. While these issues highlight some overlap between offline and online methods of participant engagement, the ‘visible’, far-reaching and dynamic nature of online platforms, especially social media, can inflate risk and introduce new challenges. Clearly, there are specific nuances of the online environment that the research community should be aware of. However, as highlighted in this review, many research articles do not report the ethical issues associated with engaging research participants online, and few refer to internet-specific ethical guidelines.

The review identified three unique ethical issues to be considered when engaging minors in research online. The first relates to the ethical and practical complexities of obtaining parental consent online. Parental consent serves to respect children’s developing autonomy and to provide for their protection [ 27 ], although in some cases may not be appropriate or protective. Inconsistent approaches and ambiguities in defining an adolescent, a mature minor and minimal risk research have led to extensive debate on the ethics and value of parental consent [ 116 – 118 ]. As recognised in this review, parental consent regulations differ by location, participant age, and research design and context, and are subject to case-by-case interpretation by ethics committees [ 119 , 120 ]. Academic researchers used a variety of methods to record parental consent. Limitations were reported for both offline and online procedures, and many authors noted a lack of guidance on ethical best practice. This was reflected in the grey literature search, which provided no formal guidance on how to document parental consent online. Instead, professional guidelines suggest researchers utilise offline consent procedures [ 90 , 99 ] while one university guideline recommends limiting online research with minors to minimal risk research that qualifies for a waiver of parental consent [ 103 ]. Guidelines on ethical best practice for obtaining parental consent online are clearly needed. In the interim, researchers and ethics committees may seek guidance from literature identified in this review [ 59 ] and elsewhere [ 4 , 121 ].

The second unique issue of verifying participant age was an important yet challenging aspect of engaging minors in research online as young people may misrepresent their age to participate. Articles suggested several strategies to verify age, including directly contacting the participant or their parent. However, depending on the nature and context of the study, this may be inappropriate or unfeasible. Others suggested validating participant age by reviewing social media profiles. This raises further concern for participant privacy and may not be a valid approach if the minor has falsified their age (e.g., Facebook users must be at least 13 years old to create an account). Articles did not explicitly discuss the ethical implications of inadvertently engaging younger or underage participants in research, despite the potential for them to be exposed to sensitive or age-inappropriate content. Guidance on this issue is mixed: one guideline [ 98 ] suggests researchers include fact-checking measures in online research instruments or employ age verification software; others suggest limiting online research with minors to minimal risk research [ 103 ] or to conduct the research offline [ 99 ].

The third issue identified in the review relates to children’s vulnerability in online research. Young people are often referred to as ‘digital natives’: a younger generation born into a ubiquitous digital environment who have used the internet, social media and mobile devices from an early age [ 122 ]. However, young people may also be digitally naïve [ 123 ], openly disclosing personal and potentially sensitive information without apparent concern for their privacy, without understanding or considering the permanence or far-reaching nature of online content, and without intending for their information to be used by others. Internet users are largely unaware of targeted advertising practices and the extent to which their online information and behaviours are collected and used by third parties [ 124 ], including researchers [ 125 ]. Privacy and data use policies are outlined in click-to-agree contracts and in website Terms of Service. Few users read or comprehend these often lengthy and indecipherable agreements and few understand how to protect their privacy online [ 126 ]. Discourse on how these issues apply in research is growing [ 127 ], yet literature exploring whether privacy risks are exacerbated for minors and vulnerable groups online is limited. Due to a lack of maturity, understanding, interest and/or digital literacy, it is possible that children and adolescents are less inclined than adults to read privacy and data use policies and understand how their online information is collected and used. Yet, this demographic group are prolific internet and social media users, and are increasingly encouraged to share their personal information [ 128 ]. This brings into question the appropriateness of researchers using this information to target individuals to participate in research, as is increasingly occurring.

Concerns were also raised about the possibility of participants, potentially those who are young or vulnerable, unwittingly ‘outing’ themselves as research participants online. This may occur due to a lack of knowledge regarding privacy settings, features and the reach of online platforms. While this may be no different to offline research where participants may disclose their participation to others, the audience is much more far-reaching in the online space and individuals may lose control of their information once they ‘release’ it online. These concerns require researchers to be transparent and openly inform prospective participants about potential risks to their privacy, confidentiality and anonymity online, as suggested by articles included in the review [ 43 ] and in recent literature [ 125 , 129 ].

An additional issue that received minimal attention in the review but which warrants further discourse is whether participants, particularly minors, are sufficiently informed in online research. One article noted that adolescents were generally uninterested in reading study information and informed consent materials [ 54 ]; an observation that has been reported by others engaging participants online and offline [ 130 , 131 ]. Children and adolescents may also misunderstand the information that is presented to them, which can be difficult for researchers to detect [ 132 ]. While researchers are advised to spend time with prospective participants and orally explain the research to them [ 133 , 134 ], this is often not possible or practical in online research. That young people are uninterested in consent materials or cannot understand them is ethically problematic in any research setting. These concerns may escalate in online research as parental consent is commonly waived, participants are separated physically and temporally from the researcher, and the immediacy of online platforms may prevent careful consideration of participation.

Despite recruiting participants online, many articles in this review obtained consent via traditional means (e.g., by post, face-to-face). The ongoing reliance on offline consent procedures may reflect concern for participant comprehension in online settings. However, the inability to assess whether participants are truly informed is not confined to online research (e.g., postal surveys), and articles often compared the deficiencies of online consent procedures against an idealised view of the communication than can, but often does not occur in face-to-face consent. Articles suggested several strategies to improve participant comprehension online, including video conferencing and phased consent. Some recognised the advantages of obtaining verbal consent and assessing comprehension via telephone, although we question the viability of this approach with large samples and its utility in anonymous research. Emerging evidence indicates that testing adolescents on their research rights and risks during the online consent process can improve study comprehension [ 135 ]. Further discourse on the effectiveness of alternative online approaches are warranted.

Our review has identified several insights and gaps in the academic literature that are worth noting. Firstly, while researchers have sought new ways to engage participants online, a continued reliance on traditional offline recruitment methods remains. The use of offline and online methods may help overcome technological barriers such as the digital divide but may also reflect uncertainty regarding the effectiveness of solely using the internet. Clear evidence for effectiveness is currently hampered by an absence of, or lack of detail in, reporting the success of recruitment, retention and tracing methods. Reporting ethics approval processes and how consent is obtained online could also be improved. The absence of this information does not ease concerns regarding the validity and credibility of online recruitment and online consent. We encourage researchers to report response metrics and/or recruitment source data as well as consent procedures. Researchers reporting results for internet surveys may wish to refer to Eysenbach’s checklist [ 136 ].

Over half of the articles included in the review did not discuss ethical issues beyond general ethical procedures. The limited discussion of ethical concerns aligns with that reported by Henderson et al. [ 72 ], who reviewed studies using social media to involve children or young people in research. They found articles were similarly silent on ethical issues. It is unclear why ethical issues are not acknowledged or at least not reported. It is possible that researchers view the ethical issues of engaging participants online as similar to offline methods. This has implications for research integrity and participant safety as some issues and risks posed online are different to traditional offline methods. Alternatively, researchers may not expect to comment on ethical issues if their study has received approval by a governing ethics committee, and publication word limits may preclude detailed description of ethical issues. Like Henderson et al. [ 72 ], we do not consider studies that are silent on ethical issues as unethical. Given the increasing use of online methods, the research community will greatly benefit from more detailed documentation of the ethical and methodological issues encountered or considered and the actions taken to address them.

We recognise that many of the ethical concerns identified in this review pertained to online recruitment. Using the internet to retain or trace participants was not as widely used or at least not commonly reported. This could be due to limitations in our search strategy, as articles may not explicitly refer to retention and tracing in their title, abstract or key words. Alternatively, it could reflect the smaller number of longitudinal studies (which require retention and tracing) relative to cross-sectional studies, or that use of the internet in this way is an emerging method not yet in widespread use. Nonetheless, it is surprising that so few retention and tracing studies were identified given the recognised difficulty in maintaining research cohorts in longitudinal research [ 137 , 138 ]. It is unclear whether the internet is not used for this purpose because researchers and/or ethics committees view it as problematic and unethical, or because they are unfamiliar with such methods. Most articles that reported online retention used email to maintain contact with participants, which was not considered to be ethically concerning. Other online retention strategies involving social media have been reported, such as researchers ‘friending’ participants on Facebook [ 139 , 140 ]. While these strategies can be effective at retaining adolescents in research, they raise ethical issues regarding participant confidentiality, the participant-researcher relationship, and potentially accessing information beyond what participants originally consent to. Most tracing studies identified in this review used social media to search for participants lost to follow-up, with many authors providing comment on the ethical and methodological considerations undertaken. Researchers interested in tracing participants via social media in the future will benefit from consulting these articles and other relevant literature [ 25 , 141 ]. Given its effectiveness, tracing participants via social media is likely to become more popular among researchers, but the lack of ethical guidance for this method is concerning.

Lastly, we show that most researchers do not refer to internet-specific ethical guidelines when reporting online recruitment, retention or tracing methods. Previous research has identified a perception from researchers and ethics committee members that there are few guidelines available to inform internet research [ 142 ]. Our review shows internet-specific ethical guidelines are available, yet researchers are largely unaware of them. Existing guidelines provide an overview of common ethical concerns, many of which are identified in this review, that are applicable when recruiting participants online. They do however vary in their content, scope and guidance, which may require researchers and ethics committee members to familiarise themselves with each resource and use the guidelines collectively when planning or reviewing online research. Most guidelines do not specifically comment on actively engaging research participants online, particularly for retaining or tracing participants via social media or for recruiting minors online.

Since conducting our literature searches in early 2016, additional internet-specific guidelines have emerged [ 143 – 147 ]. These guidelines generally focus on social media content as data rather than directly engaging participants online. Guidelines specifically addressing social media recruitment have also been developed [ 125 , 148 ], providing case studies and recommendations for both researchers and ethics committees. Given the dynamic and diverse nature of the internet, the majority of internet-specific ethical guidelines are purposefully broad, flexible and applicable to a range of online research methods. While there is a strong argument for guidelines to remain broad, a more structured procedural guideline that specifically and clearly outlines common methodological and ethical considerations when recruiting, retaining and tracing participants, including children, online will be well received.

Limitations

This review has several limitations. While we searched six academic databases and aimed to be inclusive with terminology, there may be relevant studies and articles that were not captured by the search strategy. For example, articles may describe ethical issues without referring to ‘ethics’ in their title, abstract or key words. Studies using online retention and tracing strategies may also not explicitly report this, as discussed, which may account for the few retention and tracing studies identified. While Facebook is a common research tool, the high proportion of studies using Facebook compared to other social media platforms may be due to this being the only platform specifically named in our search strategy. We recognise articles in other disciplines not included in this review would inform family and child research. We also recognise the limitations of the grey literature search, which was neither exhaustive nor systematic, with results limited to the first 100 hits. Google is not well suited for complex search queries and results are retrieved by popularity; therefore, relevant ethical guidelines may have been missed.

This scoping review provides a comprehensive overview of the ethical issues that arise when engaging participants in family and child research online and the available ethical guidance on online research. It serves as a useful resource for researchers and ethics committee members who are considering the ethical appropriateness of research in this context. All in all, using the internet and social media to recruit, retain and trace participants is possible, but must be harnessed appropriately. This requires researchers and ethics committees to be cognisant of a range of ethical issues, including the unique challenges associated with engaging minors online, and to carefully consider how these issues apply when planning, conducting and reviewing research.

Our review shows that researchers consider themselves primarily responsible for ensuring internet research is conducted ethically, yet it remains unclear to what extent researchers are aware of and appropriately informed of the specific ethical issues associated with engaging research participants online, particularly minors. Ethical guidelines are essential to consistent and high-quality decision-making, yet the lack of reported use of available guidelines and the scarcity of academic literature describing ethical concerns means research and ethical review are potentially occurring without suitable guidance. Increasing the research community’s understanding of the contextual and ethical challenges of engaging participants online is clearly required. This can be achieved by encouraging broad dissemination and use of current guidelines and resources (e.g., [ 83 , 97 , 125 ]) across research institutes and ethics committees. We also encourage researchers to provide more detail in academic articles when reporting on the internet as a research tool, including response metrics, ethical approval and consent procedures, and methodological and ethical considerations, particularly for research with children and adolescents. This review brings the ethical issues and guidelines presented in this review to the attention of the wider research community and promotes further discourse regarding the ethical conduct of recruiting, retaining and tracing participants online in family and child research.

Supporting information

S1 file. additional search limits applied to scopus database..

https://doi.org/10.1371/journal.pone.0204572.s001

S2 File. Academic articles data.

https://doi.org/10.1371/journal.pone.0204572.s002

  • 1. Hayes A, Higgins D. Families, policy and the law: Selected essays on contemporary issues for Australia. Melbourne: Australian Institute of Family Studies; 2014.
  • View Article
  • PubMed/NCBI
  • Google Scholar
  • 7. Blumberg S. J., Luke J. V. Wireless substitution: Early release of estimates from the National Health Interview Survey, January–June 2017. Atlanta, GA: National Center for Health Statistics, 2017.
  • 9. Australian Bureau of Statistics. Moving House. 4102.0—Australian Social Trends, Dec 2010. Canberra: Australian Bureau of Statistics, 2010.
  • 14. Australian Bureau of Statistics. 8146.0—Household Use of Information Technology, Australia, 2014–15 Canberra: Australian Bureau of Statistics; 2016 [cited 23 February 2016]. http://www.abs.gov.au/ausstats/[email protected]/mf/8146.0 .
  • 15. Ryan C, Lewis JM. Computer and internet use in the United States: 2015. American Community Survey Reports, ACS-37. Washington, DC: U.S. Census Bureau, 2017.
  • 16. Australian Communications and Media Authority. Like, post, share: Young Australians’ experience of social media. Canberra: Australian Communications and Media Authority, 2013.
  • 17. Madden M, Cortesi S, Gasser U, Lenhart A, Duggan M. Parents, teens, and online privacy. Washington, DC: Pew Research Center, 2012.
  • 19. Duggan M, Ellison NB, Lampe C, Lenhart A, Madden M. Social media update 2014. Pew Research Center, 2015.
  • 26. Shelley-Egan C. Ethics assessment in different fields: Internet research ethics2015. http://satoriproject.eu/media/2.d.2-Internet-research-ethics.pdf .
  • 27. National Health and Medical Research Council. National statement on ethical conduct in human research 2007 (updated May 2015). Canberra: National Health and Medical Research Council, 2015.
  • 32. DJ Farace, Frantzen J. Work on grey in progress. Sixth International Conference on Grey Literature; 2004; New York: New York Academy of Medicine; 2005.
  • 83. Markham A, Buchanan E. Ethical decision-making and internet research: Recommendations from the AoIR Ethics Working Committee (Version 2.0). USA: Association of Internet Researchers, 2012.
  • 87. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report: Ethical principles and guidelines for the commission for the protection of human subjects of biomedical and behavioral research. Bethesda, MD: United States Department for Health & Human Services, 1979.
  • 88. World Medical Association. WMA Declaration of Helsinki—Ethical principles for medical research involving human subjects. Seoul, Korea: World Medical Association, 2008.
  • 89. Ess C. Ethical decision-making and Internet research: Recommendations from the AoIR ethics working committee. USA: Association of Internet Researchers, 2002.
  • 90. British Psychological Society. Ethics guidelines for internet-mediated research. Leicester: British Psychological Society, 2013.
  • 91. British Psychological Society. Report of the working party on conducting research on the internet: Guidelines for ethical practice in psychological research online. Leicester: British Psychological Society 2007.
  • 92. Eynon R, Fry J, Schroeder R. The ethics of internet research. In: Fielding N, Lee RM, Blank G, editors. The SAGE Handbook of Online Research Methods. London: SAGE 2008.
  • 93. National Centre for Research Methods. Exploring online research methods, incorporating TRI-ORM: ReStore. Economic and Social Research Council, National Centre for Research Methods; 2011 [cited 6 July 2016]. http://www.restore.ac.uk/orm/ethics/ethcontents.htm .
  • 94. Hoerger M, Currell C. Ethical issues in internet research. In: Knapp S, editor. APA handbook of ethics in psychology (Vol 2): Practice, teaching, and research: American Psychological Association; 2012. p. 385–400.
  • 95. Ess CM. Internet research ethics. In: Joinson AN, McKenna KYA, Postmes T, Reips U-D, editors. Oxford Handbook of Internet Psychology. Oxford: Oxford University Press 2007.
  • 96. University of Bedfordshire. Ethical guidelines for the online researcher. University of Bedfordshire: n.d.
  • 97. British Psychological Society. Ethics guidelines for internet-mediated research. Leicester: British Psychological Society, 2017.
  • 98. Secretary’s Advisory Committee on Human Research Protections. Considerations and recommendations concerning internet research and human subjects research regulations, with revisions. United States Department of Health and Human Services, 2013.
  • 99. The Norwegian National Research Ethics Committees. Ethical guidelines for internet research. Norway: National Committee for Research Ethics in the Social Sciences and the Humanities, 2014.
  • 100. Lundh LG, Ess C. Research ethics guidelines for internet research. Norway: National Committee for Research Ethics in the Social Sciences and the Humanities, 2003.
  • 101. Clark K, Duckham M, Guillemin M, Hunter A, McVernon J, O’Keefe C, et al. Guidelines for the ethical use of digital data in human research. Melbourne: Carlton Connect Initiatives Fund, 2015.
  • 102. Brunel University. Guidelines for research on the Internet London: Brunel University; 2014 [cited 6 July 2016]. https://www.brunel.ac.uk/__data/assets/pdf_file/0004/313798/Internet_guidelines.pdf .
  • 103. Florida Atlantic University. Guidelines for computer & internet-based human subjects research Boca Raton, FL: Florida Atlantic University; 2011 [cited 7 July 2016]. https://www.fau.edu/research/docs/policies/research-integrity/irb_guidelines_internet_research.pdf .
  • 104. Pennsylvania State University. Guidelines for computer- and internet-based research involving human participants. University Park, PA: Pennsylvania State University; [cited 6 July 2016]. https://www.research.psu.edu/irb/policies/guideline10 .
  • 105. University of Connecticut. Guidance for data security and internet-based research involving human participants. Storrs, CT: University of Connecticut; 2016 [cited 6 July 2016]. http://research.uconn.edu/irb/researcher-guide/computer-and-internet-based-research-involving-human-particpants/ .
  • 106. University of Rochester. Guideline for computer and internet based research. Rochester, NY: University of Rochester; 2016 [cited 6 July 2016]. https://www.rochester.edu/ohsp/documents/ohsp/pdf/policiesAndGuidance/Guideline_for_Internet_Based_Research.pdf .
  • 107. Queensland University of Technology. Internet and social media Brisbane: Queensland University of Technology; [cited 7 July 2016]. http://www.orei.qut.edu.au/human/guidance/internet.jsp .
  • 108. The Royal Children’s Hospital Melbourne. Social media: Use in research. Melbourne: The Royal Children’s Hospital; 2015 [cited 8 July 2016]. https://www.rch.org.au/uploadedFiles/Main/Content/ethics/Social%20Media%20Guidelines.pdf .
  • 109. University of California Berkeley. Internet-based research. Berkeley, CA: University of California, Berkeley; 2016 [cited 7 July 2016]. http://cphs.berkeley.edu/internet_research.pdf .
  • 110. Webster University. Webster University guidelines for internet research. St. Louis, MO: Webster University; n.d. [cited 6 July 2016]. http://www.webster.edu/irb/policy/recommendations_for_use_of_online_surveys.html .
  • 111. Evans A, Wiggins D, Elford J. Using the internet for qualitative research. In: Willig C, Stainton-Rogers W, editors. The SAGE Handbook of Qualitative Research in Psychology. London: SAGE Publications; 2008.
  • 112. Buchanan EA, Zimmer M. Internet research ethics. California: Stanford University; 2012 [cited 23 February 2016]. http://plato.stanford.edu/entries/ethics-internet-research/ .
  • 113. Schrag ZM. Institutional review blog. News and commentary about institutional review board oversight of the humanities and social sciences 2016 [cited 6 July 2016]. http://www.institutionalreviewblog.com/ .
  • 114. Australasian Human Research Ethics Consultancy Services. Research Ethics Monthly 2016 [cited 7 July 2016]. https://ahrecs.com/blog .
  • 115. Walton N. A call for “new rules” for Internet-based research [Blog post]: Research Ethics Blog; 2014 [cited 2016 7 July]. https://researchethicsblog.com/2014/09/16/a-call-for-new-rules-for-internet-based-research/ .
  • 118. Stablein T, Jacobs SH. Waiving parental consent when researching at-risk youth. The Well-Being, Peer Cultures and Rights of Children. 14: Emerald Group Publishing; 2011. p. 205–26.
  • 119. Kennan D. Understanding the ethical requirement for parental consent when engaging youth in research. In: Bastien S, Holmarsdottir HB, editors. Youth ‘At the Margins’: Critical Perspectives and Experiences of Engaging Youth in Research Worldwide. Rotterdam: SensePublishers; 2015. p. 87–101.
  • 121. Spriggs M. Understanding consent in research involving children: The ethical issues. A handbook for human research ethics committees and researchers. Melbourne: Children’s Bioethics Centre, 2010.
  • 123. James C. Young people, ethics, and the new digital media. Cambridge, Massachusetts MIT Press; 2009.
  • 130. Varnhagen C, Gushta M, Daniels J, C Peters T, Parmar N, Law D, et al. How informed is online informed consent?2005. 37–48 p.
  • 134. Alderson P, Morrow V. The Ethics of Research with Children and Young People: A Practical Handbook. London: SAGE Publications; 2011.
  • 142. Crawford SB, Hokke S, Nicholson JM, Zion L, Lucke JC, Keyzer P, et al. “It’s not black and white”: Public health researchers’ and ethics committees’ perceptions of engaging research participants online. Internet Research. In press.
  • 143. Townsend L, Wallace C. Social media research: A guide to ethics. Aberdeen: University of Aberdeen, 2016.
  • 144. Benton A, Coppersmith G, Dredze M. Ethical research protocols for social media health research. Proceedings of the First Workshop on Ethics in Natural Language Processing; 2017; Valencia, Spain.
  • 145. UK Research Integrity Office. Good practice in research: Internet-mediated research. UK Research Integrity Office, 2016.
  • 146. University of Oxford. Best practice guidance: Internet-based research. Oxford: University of Oxford, 2016.
  • 147. The University of Sheffield. Research ethics policy note no. 14: Research involving social media data. Sheffield: The University of Sheffield, 2016.
  • 148. Harvard Catalyst Regulatory Foundations Ethics & Law Program. The use of social media in recruitment to research: A guide for investigators and IRBs. Harvard Catalyst at Harvard Medical School, 2015.

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Int J Environ Res Public Health

Logo of ijerph

Netiquette: Ethic, Education, and Behavior on Internet—A Systematic Literature Review

Rebeca soler-costa.

1 Department of Education Sciences, University of Zaragoza, 50009 Zaragoza, Spain; se.razinu@relosr (R.S.-C.); se.razinu@iruamm (M.M.-M.)

Pablo Lafarga-Ostáriz

Marta mauri-medrano, antonio-josé moreno-guerrero.

2 Department of Didactics and School Organization, University of Granada, 51001 Ceuta, Spain; se.rgu@oneromja

In this article, an analysis of the existing literature is carried out. It focused on the netiquette (country, date, objectives, methodological design, main variables, sample details, and measurement methods) included in the Web of Science and Scopus databases. This systematic review of the literature has been developed entirely according to the Preferred Reporting Items for Systematic Reviews (PRISMA). The initial search yielded 53 results, of which 18 exceeded the inclusion criteria and were analyzed in detail. These results show that this is a poorly defined line of research, both in theory and in practice. There is a need to update the theoretical framework and an analysis of the empirical proposals, whose samples are supported by students or similar. Knowing, understanding, and analyzing netiquette is a necessity in a society in which information and communication technologies (ICT) have changed the way of socializing and communicating. A new reality in which there is cyber-bullying, digital scams, fake news, and haters on social networks.

1. Introduction

Billions of people have taken an active part in technological development over the past decade. Social networks have been the maximum exponent of a digital revolution that has meant a before and after in terms of how people communicate and collaborate [ 1 ]. A new reality that has been mutating from the original Facebook, YouTube, and Flickr [ 2 ] to become, for example, a relevant strategy in election campaigns [ 3 , 4 , 5 ]. The perfect framework for its expansion has been mobile devices, especially smartphones [ 6 , 7 ]. Both its technical conditions and its rapid incorporation into almost any area of life today [ 8 ] have made it the perfect nexus. In fact, nowadays it is not surprising that applications such as Instagram [ 9 ], or others more associated with instant messaging [ 10 ], are among the most frequented practices when accessing these mobile devices [ 11 ].

The popularity and growth of social networks can be understood by the paradigm shift that brought about their birth, as previously the World Wide Web was based on limited usability. Its appearance meant that users were already able to create, modify, share, and discuss existing content on the Internet [ 12 ]. Consequently, the attractiveness of using these digital media was no longer governed only by the content, but also by the new possibilities of participation they offered [ 13 ]. Although it has not been total, as the digital divide is still present [ 14 , 15 , 16 , 17 ], one of the technological consequences of the second decade of the 21st century has been the easy access to these new opportunities [ 18 ]. Despite cultural differences and resistance [ 19 ], it is clear that the option of being part of and participating in these digital communities [ 20 ] has been reduced to a couple of keystrokes.

This new digital map, which over the years has unlocked new horizons, has altered such basic habits as what to take with you when you leave home: wallet, keys, and smartphone [ 21 ]. This is an everyday action that can be understood in the face of the digital approach to modern life [ 22 ] and which perfectly contextualizes the rise of digital marketing [ 23 ]. Scientific production in this area has developed considerably [ 24 , 25 ] in response to the need to understand, know, and adapt commerce in view of the new forms of relationship and consumption that have emerged as a result of social networks [ 26 , 27 ]. A new ecosystem implies an almost total rethinking of roles [ 28 ], as reflected in the so-called influencers [ 29 ], and of strategies in an environment that is struggling to obtain the greatest dissemination and impact, including for health reasons [ 30 ].

This is an interest that responds to a historical moment in which social networks offer the right possibilities to cover everything from the individual to the social [ 31 ], including work [ 32 ]. Some of the main characteristics that may justify this phenomenon are: being a quick and easy alternative to access a wide range of information [ 33 , 34 ], offering almost instantaneous interaction and communication [ 35 ], opening up business possibilities in global environments and not just local ones [ 36 ], and even serving as a parallel strategy to find out preferences and interests in particular issues [ 37 ]. These applications accompany the new digital habits, especially among the young, whose interest in the more classic media is declining and who are developing new digital skills in areas such as content consumption [ 38 ].

The so-called digital competence (DC) is the theoretical approach to this new panorama specifically in the educational field [ 39 ]. A concept that corroborates the impact of digital technology on personal development [ 40 ], which means that educational institutions must rethink their approach in light of the new needs and demands which this generates [ 41 ]. Since its incorporation in 2006, scientific interest has been increasing and evolving. Approaches have sought to explore key issues such as what the DC is in a changing technological context [ 42 ], particularly in light of legislative frameworks [ 43 ]. The most evaluative orientation has been toward understanding the level of DC in different educational contexts: educational stages [ 44 , 45 ] or agents [ 46 ]. Perspectives that respond to a context where the integration of ICT in schools occurs from the technical [ 47 ] to the methodological [ 48 ], especially during the Covid-19 pandemic [ 49 ].

Digital media can contribute, as in the educational field [ 50 ], but their use can also lead to harm. Recently, problems have emerged such as addiction to smartphones, known as nomophobia [ 51 ], whose relationship with anxiety and stress [ 52 ] shows that ICTs also have a negative side. Cyber-bullying [ 53 , 54 ] is another example of how the use of technology can be negative, similar to the anonymity of social networks as a weapon of hate [ 55 ]. Information, one of the main reasons for the use of networks, is also under scrutiny following the rise of fake news [ 56 ] and the use of user data is also controversial [ 57 ]. At the same time, consumer advocacy is growing [ 58 ], reflected in the presence of cookies on any website and “integrated shopping” in free downloadable applications.

This new framework, with its possibilities and repercussions [ 59 ], gives rise to another approach more related to how they have used: netiquette. The origin of this term, which is based on the link between the words Internet and label [ 60 , 61 ], emerges on the eve of the beginning of the 21st century and the expansion of the digital world. The Internet, as well as promoting access to knowledge or creating new professions, has created the non-face-to-face label. This can be seen in traditional face-to-face customs such as giving condolences, the development of which through social networks, especially Facebook, has become standardized [ 62 ]. A revolution that entails extrapolating civic norms from the face-to-face to the digital in a technologically interconnected world [ 63 ]. Guidelines, which are less or more assimilated, are present in couple relationships [ 64 ] or which guide the use of such essential tools as email [ 65 , 66 ] in work environments [ 67 , 68 , 69 , 70 ].

To talk about ethics or a social label is really to talk about education. It is therefore not surprising that in a context of constant inclusion of ICT in the classroom [ 71 ], netiquette is one of the areas that make up the DC. A key training requirement in current and future teachers whose preparation in the digital field continues to be analyzed [ 72 , 73 ], more so when it is a field in evolution since, above all, social networks are altering and promoting new digital habits in students [ 74 , 75 ]. In the case of the educational field, the pandemic has highlighted the role of ICTs [ 76 ], a reality which means understanding the digital label as part of human development in the 21st century. An approach that has been focused above all on students who have grown up with the digital [ 77 ] but which, in reality, is already inherent to anyone who has access to a mobile device with an Internet connection.

The present study is based on this new paradigm. Access to digital media is already a routine, even an addiction, and it is urgent to understand its new social patterns. In the educational field, especially in training, this idea is becoming increasingly present. This is due, on the one hand, to the progressive integration of ICTs into the teaching-learning processes and, on the other hand, to the impact of these changes in terms of defining what DC is and how to develop it in schools. For this reason, this work focuses on explaining the scientific reality of the term “netiquette” through a review of the literature in the main databases. This is an approach to finding out and understanding the state of research into labels in a universe marked by haters, cyberbullying, and fake news.

This systematic review is based on the analysis of existing literature in the Scopus and Web of Science (WoS) databases of the term netiquette. Its implementation has been developed in accordance with the Preferred Reporting Items for Systematic Reviews (PRISMA) [ 78 ] in order to answer the following questions. The structure of other publications in impact journals [ 79 , 80 , 81 ] has also been taken into consideration in order to follow models of analysis validated by experts. In turn, data from the studies analyzed are included, such as the country of origin, the date of publication, the main objectives, the methodological design, the variables considered, the details of the samples, and their scientific contributions to the area of research.

RQ1 What is the state of scientific production regarding “netiquette”?

RQ2 Has an interest in “netiquette” increased since the emergence of social networks?

RQ3 What is the scientific relationship between “netiquette” and the educational field?

2.1. Search Strategy

During the month of December 2019, a strategy was developed based on the search for articles that include the term “netiquette” in the title and that are part of two relevant scientific databases. Given the nature of this research, this restrictive criterion was chosen because otherwise the inclusion of articles that were not scientifically relevant to the research could be favored. In this sense, both terms were included in the Scopus and WOS search engines (WOS, BCI, BIOSIS, CCC, DIIDW, KJD, MEDLINE, RSCI, SCIELO), two scientific databases commonly used by experts and researchers and from which both JCR and SJR draw their information [ 82 ]. A single search criterion was established, the title of the article having to incorporate one of the two terms. This initial search yielded 53 manuscripts, although the final sample consisted of 18 references.

2.2. Inclosure Criteria

The channeling of the results to the final sample was carried out on the basis of the PRISMA protocol [ 78 ] for carrying out systematic reviews. The main objective was to analyze those articles that really focused on “netiquette,” and so it was established as a search criterion that this term should appear in the title of the articles to be analyzed later. Afterward, those results that were not articles were eliminated, both in WOS (n = 13) and in the SCOPUS database (n = 9). Of the 31 resulting articles, having searched two databases, those that were duplicated and were part of both were eliminated (n = 10). Once they were deleted, the information available on the remaining 21 articles was analyzed to check their eligibility, and they were read in full in cases of doubt about their subject matter. Finally, those whose complete text could not be found on the Internet were eliminated (n = 3), leaving the final sample reduced to 18 articles ( Figure 1 ). Articles included in the title “netiquette” or “netiquettes,” not repeated in the databases and with access to the full text.

An external file that holds a picture, illustration, etc.
Object name is ijerph-18-01212-g001.jpg

Flow diagram of PRISMA Systematic Review about “netiquette.”

All the articles that have been considered for analysis were presented in English (n = 18). A consistent figure considering that more than half (n = 12) have been published from the UK (n = 4) or the US (n = 7). The time span between the oldest and most recent article is 23 years, covering 1995 and 2018. The focus of the articles can be grouped into two main blocks, empirical studies (n = 9) and theoretical approaches (n = 9), as shown in Table A1 and Table A2 respectively. The methodological disparity is clearly noticeable in the quantitative articles, with cases of quantitative (n = 4), mixed (n = 2), and qualitative (n = 1) approaches. ( Appendixe A and Appendixe B ).

3.1. Country

More than half of the articles studied were of Anglo-Saxon origin, specifically from the United Kingdom [ 61 , 64 , 70 , 76 ] and the United States [ 59 , 60 , 65 , 66 , 67 , 68 , 69 , 71 ]. Both cases stand out as they are the only countries that are repeated in terms of place of publication. The remaining (n = 6) come from European countries, such as Germany [ 78 ], Denmark [ 62 ] and Belgium [ 72 ]; from Asia, South Korea [ 54 ] and Jordan [ 74 ]; and from the American continent, Mexico [ 75 ]. Article [ 66 ] should be defined as having double authorship, from the United States and Canada. It should be noted that the United Kingdom [ 61 , 70 ] and the United States [ 59 , 60 , 65 , 66 , 67 , 68 , 69 ] are the only two countries that contribute articles of a theoretical nature, while those with an empirical focus are more spread out around the world.

There is a disparity in the date of publication of articles. With respect to the empirical ones, the oldest is from 2007 [ 72 ] and the most recent from 2018 [ 77 ], with only repetitions in 2017 [ 62 , 74 ]. In fact, all the articles are from the last decade [ 54 , 62 , 64 , 71 , 74 , 75 , 76 , 77 ] except the one from 2007. On the other hand, those theoretical approaches cover the period from 1995 [ 61 ] to 2018 [ 67 ] and there are also repetitions in 2011 [ 59 , 68 ]. By decade of publication, production stands out from 2000 to 2010 [ 65 , 66 , 69 , 70 ], from 2010 to 2020 [ 59 , 67 , 68 ], and from 1990 to 2000 [ 60 , 61 ]. Of the total, only four articles [ 62 , 67 , 74 , 77 ] have been published during the last five years.

On the one hand, the objectives of the empirical articles can be differentiated into those more linked to netiquette in educational contexts [ 54 , 71 , 72 , 74 , 75 , 77 ] and those oriented to more general personal or work environments [ 62 , 64 , 76 ]. In the majority of articles [ 54 , 62 , 64 , 72 , 74 , 75 , 76 , 77 ] the objective is based on knowing habits associated with the label on the net, in some cases, the objective is purely methodological [ 71 ]. As for the theoretical articles, the distinction is less clear. Up to 5 [ 59 , 65 , 66 , 67 , 68 ] focus on exposing or analyzing guidelines related to the correct use of electronic mail and two [ 60 , 61 ] provide more general guidelines for the Internet in its complexity. Only three are developed for specific contexts: hospital workers [ 68 , 69 ] and librarians [ 70 ].

3.4. Methodological Design

Two clear methodological designs can be distinguished: empirical articles [ 54 , 62 , 64 , 71 , 72 , 74 , 75 , 76 , 77 ] and theoretical articles [ 59 , 60 , 61 , 65 , 66 , 67 , 68 , 69 , 70 ]. From the first case, there is a new differentiation: quantitative supported by ad-hoc questionnaires [ 54 , 64 , 74 , 77 ], mixed approaches [ 62 , 72 ], and only qualitative [ 75 ]. One of the articles is purely methodological [ 71 ], so its scientific contribution is different from the rest. In the case of theoretical studies, they can be divided into purely theoretical [ 59 , 65 , 66 , 67 , 68 , 69 , 70 ] and literature reviews [ 60 , 61 ].

3.5. Main Variables

The variables found in the articles analyzed are very diverse. The quantitative variables explore online time and its possible relationship with cyber-bullying [ 54 ] or peer-to-peer tagging [ 64 ], university students’ knowledge of it [ 74 ], or its direct application through interaction with faculty [ 77 ]. In the case of those based on a mixed methodology [ 62 , 72 ], they are based on category analysis (attitude, motivations, unsubstantiated statements, etc.,) and are interspersed with other numerical quantitative variables (questions, number of visits to the forum, number of times they read what is published in the forum, etc.,). The qualitative article [ 75 ], with a socio-historical perspective, is based on categories such as “moral practice,” “communities of practice,” and “netiquette.”

3.6. Sample Details

The samples in half of the articles analyzed [ 54 , 62 , 64 , 71 , 72 , 74 , 75 , 76 , 77 ] are very varied. They range from small groups of 34 secondary school students [ 75 ] to 992 couples [ 64 ] or 2849 students and teachers [ 77 ]. The educational context of the samples is relevant, as more than half [ 54 , 71 , 72 , 74 , 75 , 77 ] of the articles are composed of students or graduates. There are also undefined figures when exposing themselves based on groups [ 76 ] and samples where the only requirement was to have a Facebook account [ 62 ] or to have a partner [ 64 ].

3.7. Measurement

The instruments used in the articles analyzed cover quantitative [ 54 , 64 , 74 , 77 ], mixed [ 62 , 72 ], and qualitative [ 75 , 76 ] perspectives. In this sense, the quantitative instruments have been based on the development of questionnaires designed ad-hoc [ 54 , 64 , 74 , 77 ], the mixed ones have been questionnaires and subsequent coding, and the qualitative ones have employed interviewing and discourse analysis individually or through focus groups. The theoretical articles have not used instruments in their development.

4. Discussion

The last two decades have shown the capacity for technological development and the human ability to incorporate it into daily routines [ 9 , 10 , 11 , 31 , 32 , 35 ]. In the case of the Internet, its birth and evolution have meant a before and after in humanity [ 12 , 13 , 33 , 34 ], and has altered the way people communicate and collaborate [ 1 , 18 ]. Having and using a smartphone [ 21 ], even becoming addicted [ 51 ], or spending time on social networks [ 2 ] are new patterns of behavior in a society where digital skills are becoming essential [ 26 , 27 , 29 , 36 , 38 ]. So much so that in the educational field the relevance of the so-called DC [ 39 , 40 , 41 , 42 , 43 , 50 ] is increasing. In short, it is clear that these years have seen the birth of a new question that goes beyond ethics: how to behave on the Internet [ 20 , 28 , 37 , 38 , 60 , 61 ].

The analysis of the articles compiled through Scopus and Web Of Science, 18 of which finally passed the inclusion criteria set out through the PRISMA analysis process [ 54 , 59 , 60 , 61 , 62 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 74 , 75 , 76 , 77 ], leads to the following inferences. Despite the fact that the included literature covers a significant period of time, with a margin of several decades [ 60 , 61 , 62 , 74 , 77 ], the state of the search remains exploratory. There is a disparity between theoretical and empirical approaches, which accentuates the lack of a clear line of research. E-mail [ 59 , 65 , 66 , 67 , 68 ] and its network label are the main focus of theoretical articles, while in the case of empirical ones the characteristics of the samples are usually linked to educational [ 54 , 71 , 72 , 74 , 75 , 77 ] or training contexts.

In relation to the instruments indicated in the literature analyzed, the disparity in the methodologies and tools used stands out. The quantitative researchers base their analysis on ad-hoc questionnaires [ 54 , 64 , 74 , 77 ] whose scientific criteria are not clear, so it is complex to affirm their validity and that they are reliable. At the same time, the sample sizes are disparate, with figures that are either not very representative [ 62 , 75 ] or fairly representative [ 54 , 64 , 77 ]. On the other hand, methodologies supported by open questions, coded analysis of discussion groups, or field diaries have also been found. On no occasion are the objectives of two or more articles repeated or similar, each of the articles analyzed is supported by unique theoretical frameworks and instruments.

The results presented by the articles researched can be grouped into two aspects. Theoretically, the relevance of the correct use of electronic mail in the digital world is revealed through the presentation of guidelines and guides [ 59 , 65 , 66 , 67 , 68 ]. On the other hand, digital trends are shown, such as cyberbullying [ 54 ], mourning, and commemoration practices on Facebook [ 62 ], and the impact on couple relationships [ 64 ]. In the educational framework, there are complementary ideas such as the lack of knowledge of netiquette on the part of university students [ 74 ] and the improvement in the quality of discussion in forums when guidelines of this type are provided previously [ 72 ].

5. Conclusions

Considering the results found in this work, it is consistent to conclude that netiquette is a field of study that is in its initial phase. The limited production in this line of research is very significant, especially in view of the existence of theoretical articles from more than two decades ago. It is complex to consider that there is a real interest in research in this area. Defining an ethic for a context that changes almost daily is complex, however, it is necessary to understand it if we want to improve the society. The DC [ 39 ] includes netiquette as a training demand, both from students and teachers, and it is understood in reality that it includes digital economic sectors, the rise of cyberbullying [ 54 ], or the establishment of nomophobia [ 51 ].

Different considerations can be made with regard to the starting hypotheses. Scientific production relating to netiquette is still at an early stage, without a defined theoretical basis despite being a term that has existed since before the 21st century. The birth of social networks has indeed increased the interest in netiquette, at least in terms of new habits and specific ethical factors. The works published in the past decade take into account the existence of these new media, a vision that is coherent with how they have become internalized in the routine of billions of people. The selection of students in training, whether current or recent, is a scientific criterion that reinforces the link between education and netiquette. Digital preparation is a fundamental pillar in personal, social, and professional terms. It is therefore inevitable to associate both areas in the present without thinking about the future, something that is set out in the current conception of the DC.

In relation to the limitations of the present study, existing in the studies based on the systematic review, there is a risk of having lost information because of the strategy of selection of the descriptor. Introducing the term netiquette, and its plural, as the only search elements were established in view of its presence in educational and legislative frameworks. Some of the lines of research in this area that are proposed are the creation of new instruments to find out the level of preparation of students, teachers in training, or teachers.

In conclusion, this study presents a number of theoretical and practical implications. The implications in the educational field, after having carried out the analysis, imply the need to revise the digital preparation of all the agents that form part of this field. The theoretical and practical synthesis set out in this work may mean a new scientific stage of an essential issue for the 21st century. Specifically, to cite more specific examples, it can lead to the beginning of a realistic consideration of digital needs, demands, and capacities in everyday tools such as e-mail, social networks, and even others close to home. For this reason, this study not only offers a new line of work to researchers or experts from the scientific community but can also have repercussions for anyone in the world with access to digital devices, with a special interest in the educational context.

Acknowledgments

We acknowledge the researchers of the research group AREA (HUM-672), which belongs to the Ministry of Education and Science of the Junta de Andalucía and is registered in the Department of Didactics and School Organization of the Faculty of Education Sciences of the University of Granada.

Empirical studies.

Ref.CountryDateAim (s)MethodologySample DetailsMain VariablesMeasurementMain FindingsImplications
[ ]South Korea2014To study the relationship between levels of online activity and cyber-bullying behaviorCorrelational.
Random sampling.
1200 teenagersBullying. Cyberbullying. Netiquette. Time online. Type of activities. Use of social networks. Communication with parents.Face-to-face surveyFrequent users of the Internet and social networks are more likely to participate, become victims and witness cyber-bullying.It is necessary to take preventive measures with teenagers to avoid cyberbullying.
[ ]Denmark2017To analyze the rules underlying online mourning and commemoration practices on FacebookMixed. Qualitative, quantitative.166 Danish Facebook usersAttitude. Caring for the deceased. Caring for the bereaved. Taking care of friends. Legitimate practices. Objectionable practices. Mourning. Remembrance. Need for support. Questionable motives. Privacy. Publicity. Ad-hoc questionnaire and coding with NVivo10Findings counter popular perceptions of Facebook as a desired online grief platform.Despite not being the preferred medium, social media are a common means of communication with deep thematic.
[ ]United Kingdom2010To examine whether married couples have similar ideas about network etiquette.Quantitative.992 married couplesNetiquette. Use of the Internet. Specific activities. Supervision. Adaptation of the eHarmonny survey.A netiquette is developed and negotiated consciously or unconsciously in intimate relationships.
[ ]United States2012To present a methodological proposal based on the incorporation of laptops in the classroom.Methodological article356 studentsUse of laptop computer. Qualifications. Distraction Ad-hoc surveyThe majority of the students surveyed consider the accepted methodological policy to be positive. The proposal is based on placing the students who use the laptops in the first rows and there are point sanctions if there is a misuse or invented warning.The incorporation of ICTs in the classroom can be functional and educational, but it is necessary to establish guidelines and consensus for students to understand in this way.
[ ]Belgium2007To investigate whether the type of guideline provided has an effect on the quality of asynchronous group discussion or on participant assessment in the context of a medical course.Experimental. Content analysis. 112 graduate students in biomedical sciences.Number of visits to the discussion forum. Number of times they read what has been published in the forum. Questions. Arguments. Unsubstantiated statements. Discussion groups. The group that received educational guidelines and advice on network etiquette had a higher quality of discussion and evaluation by the participants. There was no impact on the group that only received guidelines on network etiquette. The more information students are provided with, the better they will understand digital formality.
[ ]Jordan2017Study the presence of netiquette practices among university students.Descriptive research.245 university students (125 classroom teachers and 120 special education teachers)Gender. Specialization. Level of study.Ad-hoc questionnaire. Likert type.University students have a consensus on the general rules of netiquette, limited knowledge of them and different levels of implementation, Limited practice of netiquettes related to critical thinking skills. There is a consensus on rules on the Internet, but it’s development and critical capacity needs to be further developed.
[ ]Mexico2015To offer a panorama based on how moral practices develop ah now the rules of netiquette are applied in communities formed by secondary school students in their practices of virtual interaction.Qualitative with a socio-historical perspective. Ethnography. 34 students secondary education.Categories. Moral practice. Communities of practice. Netiquette. Open-ended questionnaire, field journal and an unstructured group interview.Students consider morality and attachment to the family to be positive ideals that can be achieved, but exercise free behavior in virtual interactions.There are discrepancies between knowing and doing on the Internet. Attention should be paid to ensuring that students apply what they know.
[ ]England2011To examine the concept of agreement, how and why it is reached in an online interprofessional group.Qualitative. Discourse analysis.Ten interprofessional discussion groupAgreement. Disagreement. Online communication.Discourse analysis.Students tend to agree with each other’s comments rather than provoke disagreement. In professional contexts, consensus is quickly reached. This is far from the reality in media such as social networks.
[ ]Germany2018To examine the netiquette for Facebook contacts between students and their teachers.Multiple closed answers.2849 participants (2550 students and 299 teachers)Development of SL-Contacts. Netiquette and majority.Ad-hoc questionnaire.Most participants indicated that Facebook should be used only for private matters. The appropriateness of social networking contact between students and teachers depends on individual cases.The use of social networks for educational purposes is not valued. It is recommended to focus on digital tools that are clearly intended for educational purposes.

Theoretical studies.

ReferenceCountryDateAim (s)MethodologyMain Findings
[ ]United States2011Define the concept of a networked label and include guidelines to ensure that electronic communication takes place in an appropriate and polite manner.Theoretical articleDifferent guidelines are set out to encourage written communication via e-mail. Some of them are: to use grammar and punctuation correctly, to avoid excessive use of abbreviations and acronyms, to use emoticons only, not to use the “high priority” option, to use a signature with personal contact information, to use spaces to avoid long messages, to avoid always using capital letters, to enter correctly and include a well-defined subject, to avoid sending sensitive information by e-mail, to avoid writing during other interactions.
[ ]United States1997Attempt to collect and develop standard label guidelines in the context of a global Internet.Literature reviewThe term netiquette has been described for e-mails and Internet use. A collection of authors is made on patterns of behavior on the Internet, specific suggestions, rules of network etiquette for advertising, control of undesirable network etiquette, the influence of Internet services, employees, and governments.
[ ]United Kingdom1995Identify, present and digest some of the main patterns of netiquetteLiterature reviewThe article presents different guidelines contained in different publications based on a total of 20: focus on objective, short and concise messages, edit your quotes, write grammatically correct, consider expressive typography, sign your messages, think where you want to go, mistakes can last forever, know the acronyms, don’t talk to a computer, don’t write in capital letters, try another kind of humor, think before you write, respect intellectual rights, be polite to newcomers, solve the necessary in private, be an ethical user, don’t damage the network, be proud of what you post, there is no rule 20.
[ ]United States2004Present guidelines to alleviate problems in communication through email or phone calls.Theoretical articleIt presents 15 guidelines for personal writing of emails (always include a subject in the message, do not use capital letters, use appropriate language, use emoticons,...) and 11 guidelines for sending emails in distribution lists or groups (publish only what is relevant to the group, ask questions or comments without losing the focus of discussion, give feedback when you can, ask permission before sending large proposals to the organizer or moderator).
[ ]United States/Canada2002Presenting some guidelines for e-mail etiquette.Theoretical articleDifferent issues are presented in relation to e-mail: characteristics (backup, password protection, network and control systems, the threat of viruses, legal implications), risks (visual importance, avoid too much content, include emoticons, be careful with abbreviations), other risks (do not send negative information without notice, indicate response or delivery deadlines, use CC or Bcc) and practices to follow (be brief and concise, include a suitable subject, include a signature at the end, consider quoting a message or writing a new one, don’t send mass mailings, separate your personal mail from the professional one, keep your distribution lists updated, don’t open a mail if you don’t trust the source, don’t forget to say hello and goodbye.
[ ]United States2018To provide the tools to avoid problems in electronic communication through email.Theoretical articleIt provides different guidelines regarding network behavior (basic rules such as using a professional email in a professional context, including subject, being concise, responding quickly, or forwarding emails only with permission). Also what not to do (offensive language, using capital letters, or avoiding emoticons in professional contexts), the negative impact (virtual empathy). It includes netiquette guidelines for an online learning environment, case studies, “the golden rules of netiquette” and the importance of positive communication.
[ ]United States2011Provide a total of 50 rules for network etiquette for e-mail. Intended for employees in medical practice.Theoretical articleIt turns out to be a compilation of different guidelines, what to do and what not to do, regarding e-mail in the professional medical context. Some examples are: be concise, avoid long sentences, use templates, use a contact signature, protect the privacy of others, turn off the automatic reply, respect confidentiality, do not abuse the “high priority” option, do not write everything in capital letters, do not remember messages, do not ask for too much, do not use abbreviations, do not expect privacy when using a work email, etc.
[ ]United States2000Guidelines for the use of appropriate distribution lists by nurses in their professional contextTheoretical articleDifferent ethical and practical issues for the use of distribution lists in the context of nursing are presented. Respect the ethical code (maintain privacy, provide information and sources for ethical decisions, incorporate legislative framework), avoid unethical messages (ask questions), consider Internet privacy, practical suggestions (do not leave your email account open and go away, sign your message, do not incorporate advertising, do not publish institutional messages without permission, do not write disrespectful or insensitive messages).
[ ]United Kingdom2002Expose the importance of confidentiality among librarians and users in the face of the attraction of new technologies.Theoretical article Taking as a reference to a study by Loughborough University, which exposed the confidence of users and the poor preparation of librarians, a series of ethical reflections are raised. The development of specific users in libraries, individuality and privacy, access to the Internet and the individual, punishment, harassment, handling information, and making good policies.

Author Contributions

Conceptualization, P.L.-O., A.-J.M.-G., and M.M.-M.; methodology, M.M.-M. and P.L.-O.; software, A.-J.M.-G. and P.L.-O.; validation, A.-J.M.-G.; formal analysis, R.S.-C.; investigation, M.M.-M., A.-J.M.-G., R.S.-C., and P.L.-O.; data curation, A.-J.M.-G., M.M.-M., and R.S.-C.; writing—original draft preparation, M.M.-M., A.-J.M.-G., R.S.-C., and P.L.-O.; writing—review and editing, M.M.-M., A.-J.M.-G., R.S.-C., and P.L.-O.; visualization R.S.-C.; supervision, M.M.-M. and P.L.-O. All authors have read and agreed to the published version of the manuscript.

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Have a language expert improve your writing

Run a free plagiarism check in 10 minutes, generate accurate citations for free.

  • Knowledge Base

Methodology

  • Ethical Considerations in Research | Types & Examples

Ethical Considerations in Research | Types & Examples

Published on October 18, 2021 by Pritha Bhandari . Revised on May 9, 2024.

Ethical considerations in research are a set of principles that guide your research designs and practices. Scientists and researchers must always adhere to a certain code of conduct when collecting data from people.

The goals of human research often include understanding real-life phenomena, studying effective treatments, investigating behaviors, and improving lives in other ways. What you decide to research and how you conduct that research involve key ethical considerations.

These considerations work to

  • protect the rights of research participants
  • enhance research validity
  • maintain scientific or academic integrity

Table of contents

Why do research ethics matter, getting ethical approval for your study, types of ethical issues, voluntary participation, informed consent, confidentiality, potential for harm, results communication, examples of ethical failures, other interesting articles, frequently asked questions about research ethics.

Research ethics matter for scientific integrity, human rights and dignity, and collaboration between science and society. These principles make sure that participation in studies is voluntary, informed, and safe for research subjects.

You’ll balance pursuing important research objectives with using ethical research methods and procedures. It’s always necessary to prevent permanent or excessive harm to participants, whether inadvertent or not.

Defying research ethics will also lower the credibility of your research because it’s hard for others to trust your data if your methods are morally questionable.

Even if a research idea is valuable to society, it doesn’t justify violating the human rights or dignity of your study participants.

Receive feedback on language, structure, and formatting

Professional editors proofread and edit your paper by focusing on:

  • Academic style
  • Vague sentences
  • Style consistency

See an example

research paper internet ethics

Before you start any study involving data collection with people, you’ll submit your research proposal to an institutional review board (IRB) .

An IRB is a committee that checks whether your research aims and research design are ethically acceptable and follow your institution’s code of conduct. They check that your research materials and procedures are up to code.

If successful, you’ll receive IRB approval, and you can begin collecting data according to the approved procedures. If you want to make any changes to your procedures or materials, you’ll need to submit a modification application to the IRB for approval.

If unsuccessful, you may be asked to re-submit with modifications or your research proposal may receive a rejection. To get IRB approval, it’s important to explicitly note how you’ll tackle each of the ethical issues that may arise in your study.

There are several ethical issues you should always pay attention to in your research design, and these issues can overlap with each other.

You’ll usually outline ways you’ll deal with each issue in your research proposal if you plan to collect data from participants.

Voluntary participation Your participants are free to opt in or out of the study at any point in time.
Informed consent Participants know the purpose, benefits, risks, and funding behind the study before they agree or decline to join.
Anonymity You don’t know the identities of the participants. Personally identifiable data is not collected.
Confidentiality You know who the participants are but you keep that information hidden from everyone else. You anonymize personally identifiable data so that it can’t be linked to other data by anyone else.
Potential for harm Physical, social, psychological and all other types of harm are kept to an absolute minimum.
Results communication You ensure your work is free of or research misconduct, and you accurately represent your results.

Voluntary participation means that all research subjects are free to choose to participate without any pressure or coercion.

All participants are able to withdraw from, or leave, the study at any point without feeling an obligation to continue. Your participants don’t need to provide a reason for leaving the study.

It’s important to make it clear to participants that there are no negative consequences or repercussions to their refusal to participate. After all, they’re taking the time to help you in the research process , so you should respect their decisions without trying to change their minds.

Voluntary participation is an ethical principle protected by international law and many scientific codes of conduct.

Take special care to ensure there’s no pressure on participants when you’re working with vulnerable groups of people who may find it hard to stop the study even when they want to.

Informed consent refers to a situation in which all potential participants receive and understand all the information they need to decide whether they want to participate. This includes information about the study’s benefits, risks, funding, and institutional approval.

You make sure to provide all potential participants with all the relevant information about

  • what the study is about
  • the risks and benefits of taking part
  • how long the study will take
  • your supervisor’s contact information and the institution’s approval number

Usually, you’ll provide participants with a text for them to read and ask them if they have any questions. If they agree to participate, they can sign or initial the consent form. Note that this may not be sufficient for informed consent when you work with particularly vulnerable groups of people.

If you’re collecting data from people with low literacy, make sure to verbally explain the consent form to them before they agree to participate.

For participants with very limited English proficiency, you should always translate the study materials or work with an interpreter so they have all the information in their first language.

In research with children, you’ll often need informed permission for their participation from their parents or guardians. Although children cannot give informed consent, it’s best to also ask for their assent (agreement) to participate, depending on their age and maturity level.

Anonymity means that you don’t know who the participants are and you can’t link any individual participant to their data.

You can only guarantee anonymity by not collecting any personally identifying information—for example, names, phone numbers, email addresses, IP addresses, physical characteristics, photos, and videos.

In many cases, it may be impossible to truly anonymize data collection . For example, data collected in person or by phone cannot be considered fully anonymous because some personal identifiers (demographic information or phone numbers) are impossible to hide.

You’ll also need to collect some identifying information if you give your participants the option to withdraw their data at a later stage.

Data pseudonymization is an alternative method where you replace identifying information about participants with pseudonymous, or fake, identifiers. The data can still be linked to participants but it’s harder to do so because you separate personal information from the study data.

Confidentiality means that you know who the participants are, but you remove all identifying information from your report.

All participants have a right to privacy, so you should protect their personal data for as long as you store or use it. Even when you can’t collect data anonymously, you should secure confidentiality whenever you can.

Some research designs aren’t conducive to confidentiality, but it’s important to make all attempts and inform participants of the risks involved.

As a researcher, you have to consider all possible sources of harm to participants. Harm can come in many different forms.

  • Psychological harm: Sensitive questions or tasks may trigger negative emotions such as shame or anxiety.
  • Social harm: Participation can involve social risks, public embarrassment, or stigma.
  • Physical harm: Pain or injury can result from the study procedures.
  • Legal harm: Reporting sensitive data could lead to legal risks or a breach of privacy.

It’s best to consider every possible source of harm in your study as well as concrete ways to mitigate them. Involve your supervisor to discuss steps for harm reduction.

Make sure to disclose all possible risks of harm to participants before the study to get informed consent. If there is a risk of harm, prepare to provide participants with resources or counseling or medical services if needed.

Some of these questions may bring up negative emotions, so you inform participants about the sensitive nature of the survey and assure them that their responses will be confidential.

The way you communicate your research results can sometimes involve ethical issues. Good science communication is honest, reliable, and credible. It’s best to make your results as transparent as possible.

Take steps to actively avoid plagiarism and research misconduct wherever possible.

Plagiarism means submitting others’ works as your own. Although it can be unintentional, copying someone else’s work without proper credit amounts to stealing. It’s an ethical problem in research communication because you may benefit by harming other researchers.

Self-plagiarism is when you republish or re-submit parts of your own papers or reports without properly citing your original work.

This is problematic because you may benefit from presenting your ideas as new and original even though they’ve already been published elsewhere in the past. You may also be infringing on your previous publisher’s copyright, violating an ethical code, or wasting time and resources by doing so.

In extreme cases of self-plagiarism, entire datasets or papers are sometimes duplicated. These are major ethical violations because they can skew research findings if taken as original data.

You notice that two published studies have similar characteristics even though they are from different years. Their sample sizes, locations, treatments, and results are highly similar, and the studies share one author in common.

Research misconduct

Research misconduct means making up or falsifying data, manipulating data analyses, or misrepresenting results in research reports. It’s a form of academic fraud.

These actions are committed intentionally and can have serious consequences; research misconduct is not a simple mistake or a point of disagreement about data analyses.

Research misconduct is a serious ethical issue because it can undermine academic integrity and institutional credibility. It leads to a waste of funding and resources that could have been used for alternative research.

Later investigations revealed that they fabricated and manipulated their data to show a nonexistent link between vaccines and autism. Wakefield also neglected to disclose important conflicts of interest, and his medical license was taken away.

This fraudulent work sparked vaccine hesitancy among parents and caregivers. The rate of MMR vaccinations in children fell sharply, and measles outbreaks became more common due to a lack of herd immunity.

Research scandals with ethical failures are littered throughout history, but some took place not that long ago.

Some scientists in positions of power have historically mistreated or even abused research participants to investigate research problems at any cost. These participants were prisoners, under their care, or otherwise trusted them to treat them with dignity.

To demonstrate the importance of research ethics, we’ll briefly review two research studies that violated human rights in modern history.

These experiments were inhumane and resulted in trauma, permanent disabilities, or death in many cases.

After some Nazi doctors were put on trial for their crimes, the Nuremberg Code of research ethics for human experimentation was developed in 1947 to establish a new standard for human experimentation in medical research.

In reality, the actual goal was to study the effects of the disease when left untreated, and the researchers never informed participants about their diagnoses or the research aims.

Although participants experienced severe health problems, including blindness and other complications, the researchers only pretended to provide medical care.

When treatment became possible in 1943, 11 years after the study began, none of the participants were offered it, despite their health conditions and high risk of death.

Ethical failures like these resulted in severe harm to participants, wasted resources, and lower trust in science and scientists. This is why all research institutions have strict ethical guidelines for performing research.

If you want to know more about statistics , methodology , or research bias , make sure to check out some of our other articles with explanations and examples.

  • Normal distribution
  • Measures of central tendency
  • Chi square tests
  • Confidence interval
  • Quartiles & Quantiles
  • Cluster sampling
  • Stratified sampling
  • Thematic analysis
  • Cohort study
  • Peer review
  • Ethnography

Research bias

  • Implicit bias
  • Cognitive bias
  • Conformity bias
  • Hawthorne effect
  • Availability heuristic
  • Attrition bias
  • Social desirability bias

Ethical considerations in research are a set of principles that guide your research designs and practices. These principles include voluntary participation, informed consent, anonymity, confidentiality, potential for harm, and results communication.

Scientists and researchers must always adhere to a certain code of conduct when collecting data from others .

These considerations protect the rights of research participants, enhance research validity , and maintain scientific integrity.

Research ethics matter for scientific integrity, human rights and dignity, and collaboration between science and society. These principles make sure that participation in studies is voluntary, informed, and safe.

Anonymity means you don’t know who the participants are, while confidentiality means you know who they are but remove identifying information from your research report. Both are important ethical considerations .

You can only guarantee anonymity by not collecting any personally identifying information—for example, names, phone numbers, email addresses, IP addresses, physical characteristics, photos, or videos.

You can keep data confidential by using aggregate information in your research report, so that you only refer to groups of participants rather than individuals.

These actions are committed intentionally and can have serious consequences; research misconduct is not a simple mistake or a point of disagreement but a serious ethical failure.

Cite this Scribbr article

If you want to cite this source, you can copy and paste the citation or click the “Cite this Scribbr article” button to automatically add the citation to our free Citation Generator.

Bhandari, P. (2024, May 09). Ethical Considerations in Research | Types & Examples. Scribbr. Retrieved July 26, 2024, from https://www.scribbr.com/methodology/research-ethics/

Is this article helpful?

Pritha Bhandari

Pritha Bhandari

Other students also liked, data collection | definition, methods & examples, what is self-plagiarism | definition & how to avoid it, how to avoid plagiarism | tips on citing sources, "i thought ai proofreading was useless but..".

I've been using Scribbr for years now and I know it's a service that won't disappoint. It does a good job spotting mistakes”

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sustainability-logo

Article Menu

research paper internet ethics

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Mapping the terrain of open innovation in consumer research: insights and directions from bibliometrics.

research paper internet ethics

1. Introduction

2. literature review, 3. materials and methods, 3.1. data processing, 3.2. data analysis, 4.1. content analysis, 4.1.1. decades of knowledge transfer, 4.1.2. analysis of the primary sources of publications and citations, 4.1.3. journal analysis, 4.1.4. author analysis, 4.1.5. most-relevant-keyword analysis, 4.2. descriptive analysis of the bibliographic data, 4.2.1. co-occurrence, 4.2.2. descriptive co-citation, 4.2.3. authorship connection, 5. discussion, 5.1. current trends in open innovation research: focus on consumer behavior, 5.2. an exploration and analysis of co-occurring terms, 5.3. the future of exploring complex relationships: oi and consumer behavior, 5.3.1. emerging trends and gaps in open innovation research, 5.3.2. identifying future research directions in open innovation: insights and examples, 6. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Li, B.; Xu, Z.; Wu, H.; Hong, N.; Skare, M. Open innovation: A research framework and case study of Huawei. Technol. Econ. Dev. Econ. 2023 , 29 , 278–306. [ Google Scholar ] [ CrossRef ]
  • Voegtlin, C.; Scherer, A.G.; Stahl, G.K.; Hawn, O. Grand societal challenges and responsible innovation. J. Manag. Stud. 2022 , 59 , 1–28. [ Google Scholar ] [ CrossRef ]
  • Diepenmaat, H.; Kemp, R.; Velter, M. Why sustainable development requires societal innovation and cannot be achieved without this. Sustainability 2020 , 12 , 1270. [ Google Scholar ] [ CrossRef ]
  • Zhai, Y.; Cai, Z.; Lin, H.; Yuan, M.; Mao, Y.; Yu, M. Does better environmental, social, and governance induce better corporate green innovation: The mediating role of financing constraints. Corp. Soc. Responsib. Environ. Manag. 2022 , 29 , 1513–1526. [ Google Scholar ] [ CrossRef ]
  • Xie, X.; Wang, H. How to bridge the gap between innovation niches and exploratory and exploitative innovations in open innovation ecosystems. J. Bus. Res. 2021 , 124 , 299–311. [ Google Scholar ] [ CrossRef ]
  • Gajdzik, B.; Wolniak, R. Smart production workers in terms of creativity and innovation: The implication for open innovation. J. Open Innov. Technol. Mark. Complex. 2022 , 8 , 68. [ Google Scholar ] [ CrossRef ]
  • Grunwald, G.; Schwill, J.; Sassenberg, A.-M. Sustainability project partnerships in times of crisis: Conceptual framework and implications for stakeholder integration. J. Entrep. Public Policy 2021 , 20 , 1717–1730. [ Google Scholar ] [ CrossRef ]
  • McGahan, A.M.; Bogers, M.L.; Chesbrough, H.; Holgersson, M. Tackling societal challenges with open innovation. Calif. Manag. Rev. 2021 , 63 , 49–61. [ Google Scholar ] [ CrossRef ]
  • Lam, L.; Nguyen, P.; Le, N.; Tran, K. The relation among organizational culture, knowledge management, and innovation capability: Its implication for open innovation. J. Open Innov. Technol. Mark. Complex. 2021 , 7 , 66. [ Google Scholar ] [ CrossRef ]
  • Adamides, E.; Karacapilidis, N. Information technology for supporting the development and maintenance of open innovation capabilities. J. Innov. Knowl. 2020 , 5 , 29–38. [ Google Scholar ] [ CrossRef ]
  • Osorno-Hinojosa, R.; Koria, M.; del Carmen Ramírez-Vázquez, D. Open innovation with value co-creation from university–industry collaboration. J. Open Innov. Technol. Mark. Complex. 2022 , 8 , 32. [ Google Scholar ] [ CrossRef ]
  • Abu Farha, A.; Al-Kwifi, O.S.; Sakka, G.; Nguyen, P.; Zafar, A. Enhancing servitization by international Cons integration: The influence of open innovation and co-creation. Int. Mark. Rev. 2022 , 40 , 774–797. [ Google Scholar ] [ CrossRef ]
  • Dziurski, P.; Sopińska, A. Does industry matter? Drivers and barriers for open innovation in high-tech and non-high-tech industries—Evidence from Poland. Int. J. Manag. Econ. 2020 , 56 , 307–323. [ Google Scholar ] [ CrossRef ]
  • Hutton, S.; Demir, R.; Eldridge, S. How does open innovation contribute to the firm’s dynamic capabilities? Technovation 2021 , 106 , 102288. [ Google Scholar ] [ CrossRef ]
  • Hong, K.; Kim, B. Open innovation competency of design enterprises to outsourcing service. J. Open Innov. Technol. Mark. Complex. 2020 , 6 , 36. [ Google Scholar ] [ CrossRef ]
  • Obradović, T.; Vlačić, B.; Dabić, M. Open innovation in the manufacturing industry: A review and research agenda. Technovation 2021 , 102 , 102221. [ Google Scholar ] [ CrossRef ]
  • Arshi, N. Consumer Behavior in Marketing Patterns, Types, Segmentation. Eur. J. Econ. Financ. Bus. Dev. 2023 , 1 , 1–18. Available online: https://europeanscience.org/index.php/2/article/view/3 (accessed on 29 March 2024).
  • Cano, J.A.; Londoño-Pineda, A.; Castro, M.F.; Paz, H.B.; Rodas, C.; Arias, T. A bibliometric analysis and systematic review on E-marketplaces, open innovation, and sustainability. Sustainability 2022 , 14 , 5456. [ Google Scholar ] [ CrossRef ]
  • Stanisławski, R. Open Innovation as a Value Chain for Small and Medium-Sized Enterprises: Determinants of the Use of Open Innovation. Sustainability 2020 , 12 , 3290. [ Google Scholar ] [ CrossRef ]
  • Sun, Y.; Liu, J.; Ding, Y. Analysis of the relationship between open innovation, knowledge management capability and dual innovation. Technol. Anal. Strateg. Manag. 2020 , 32 , 15–28. [ Google Scholar ] [ CrossRef ]
  • Rahman, M.; Rahman, U.H.F.B. How Do Norwegian Technology Start-ups Use Open Innovation Strategies to Gain Access to New Business Ideas? Open Econ. 2021 , 4 , 98–105. [ Google Scholar ] [ CrossRef ]
  • Sengupta, A.; Sena, V. Impact of open innovation on industries and firms—A dynamic complex systems view. Technol. Forecast. Soc. Chang. 2020 , 159 , 120199. [ Google Scholar ] [ CrossRef ]
  • Leckel, A.; Veilleux, S.; Dana, L.P. Local open innovation: A means for public policy to increase collaboration for innovation in SMEs. Technol. Forecast. Soc. Chang. 2020 , 153 , 119891. [ Google Scholar ] [ CrossRef ]
  • Hameed, W.U.; Nisar, Q.A.; Wu, H.C. Relationships between external knowledge, internal innovation, firms’ open innovation performance, service innovation and business performance in the Pakistani hotel industry. Int. J. Hosp. Manag. 2021 , 92 , 102745. [ Google Scholar ] [ CrossRef ]
  • Pustovrh, A.; Rangus, K.; Drnovšek, M. The role of open innovation in developing an entrepreneurial support ecosystem. Technol. Forecast. Soc. Chang. 2020 , 152 , 119892. [ Google Scholar ] [ CrossRef ]
  • Fan, M.D. The right to benefit from big data as a public resource. New York Univ. Law Rev. 2021 , 96 , 1438. [ Google Scholar ]
  • Tsai, C.L.; Ahn, J.M.; Mortara, L. Managing platform-based ecosystems in B2B markets–out-bound open innovation perspective. Int. J. Technol. Manag. 2022 , 89 , 139–162. [ Google Scholar ] [ CrossRef ]
  • Grimaldi, M.; Greco, M.; Cricelli, L. A framework of intellectual property protection strategies and open innovation. J. Bus. Res. 2021 , 123 , 156–164. [ Google Scholar ] [ CrossRef ]
  • Yun, J.J.; Zhao, X.; Jung, K.; Yigitcanlar, T. The Culture for Open Innovation Dynamics. Sustainability 2020 , 12 , 5076. [ Google Scholar ] [ CrossRef ]
  • Abhari, K.; McGuckin, S. Limiting factors of open innovation organizations: A case of social product development and research agenda. Technovation 2023 , 119 , 102526. [ Google Scholar ] [ CrossRef ]
  • Mikheev, A.A.; Krasnov, A.; Griffith, R.; Draganov, M. The Interaction Model within Phygital Environment as an Implementation of the Open Innovation Concept. J. Open Innov. Technol. Mark. Complex. 2021 , 7 , 114. [ Google Scholar ] [ CrossRef ]
  • Naruetharadhol, P.; Srisathan, W.A.; Gebsombut, N.; Wongthahan, P.; Ketkaew, C. Industry 4.0 for Thai SMEs: Implementing open innovation as innovation capability management. Int. J. Technol. 2022 , 13 , 48–57. [ Google Scholar ] [ CrossRef ]
  • Oluwafemi, T.B.; Mitchelmore, S.; Nikolopoulos, K. Leading innovation: Empirical evidence for ambidextrous leadership from UK high-tech SMEs. J. Bus. Res. 2020 , 119 , 195–208. [ Google Scholar ] [ CrossRef ]
  • Badir, Y.F.; Frank, B.; Bogers, M. Employee-level open innovation in emerging markets: Linking internal, external, and managerial resources. J. Acad. Mark. Sci. 2020 , 48 , 891–913. [ Google Scholar ] [ CrossRef ]
  • Angrisani, M.; Dell’Anno, D.; Hockaday, T. From ecosystem to community. Combining entrepreneurship and university engagement in an open innovation perspective. Int. J. Technol. Manag. 2022 , 88 , 71–92. [ Google Scholar ] [ CrossRef ]
  • Naqshbandi, M.M.; Meeran, S.; Wilkinson, A. On the soft side of open innovation: The role of human resource practices, organizational learning culture and knowledge sharing. RD Manag. 2023 , 53 , 279–297. [ Google Scholar ] [ CrossRef ]
  • Lee, S.-H.; Workman, J.; Jung, K. Perception of Time, Creative Attitudes, and Adoption of Innovations: A Cross-Cultural Study from Chinese and US College Students. Sustainability 2016 , 8 , 1193. [ Google Scholar ] [ CrossRef ]
  • Bahoo, S.; Cucculelli, M.; Qamar, D. Artificial intelligence and corporate innovation: A review and research agenda. Technol. Forecast. Soc. Chang. 2023 , 188 , 122264. [ Google Scholar ] [ CrossRef ]
  • Flamini, G.; Pellegrini, M.M.; Fakhar Manesh, M.; Caputo, A. Entrepreneurial approach for open innovation: Opening new opportunities, mapping knowledge and highlighting gaps. Int. J. Entrep. Behav. Res. 2022 , 28 , 1347–1368. [ Google Scholar ] [ CrossRef ]
  • Yeung, A.W.K.; Atanasov, A.G.; Sheridan, H.; Klager, E.; Eibensteiner, F.; Völkl-Kernsock, S.; Schaden, E. Open innovation in medical and pharmaceutical research: A literature landscape analysis. Front. Pharmacol. 2021 , 11 , 587526. [ Google Scholar ] [ CrossRef ]
  • Carmona-Lavado, A.; Gimenez-Fernandez, E.M.; Vlaisavljevic, V.; Cabello-Medina, C. Cross-industry innovation: A systematic literature review. Technovation 2023 , 124 , 102743. [ Google Scholar ] [ CrossRef ]
  • Cricelli, L.; Mauriello, R.; Strazzullo, S. Preventing open innovation failures: A managerial framework. Technovation 2023 , 127 , 102833. [ Google Scholar ] [ CrossRef ]
  • Jain, V.; Wadhwani, K.; Eastman, J.K. Artificial intelligence Consumer Behavior: A hybrid review and research agenda. J. Cons Behav. 2024 , 23 , 676–697. [ Google Scholar ] [ CrossRef ]
  • Aviv-Reuven, S.; Rosenfeld, A. Publication patterns’ changes due to the COVID-19 pandemic: A longitudinal and short-term scientometric analysis. Scientometrics 2021 , 126 , 6761–6784. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Yusoff, Z.M.; Ismail, N.; Nordin, S.A. Dataset for five recent years (2019–2023) agarwood essential open innovationl research trends: A bibliometric analysis. Data Brief 2024 , 54 , 110310. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Raynaud, M.; Goutaudier, V.; Louis, K.; Al-Awadhi, S.; Dubourg, Q.; Truchot, A.; Loupy, A. Impact of the COVID-19 pandemic on publication dynamics and non-COVID-19 research production. BMC Med. Res. Methodol. 2021 , 21 , 255. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Paul, J.; Ueno, A.; Dennis, C. ChatGPT and Cons: Benefits, pitfalls and future research agenda. Int. J. Cons Stud. 2023 , 47 , 1213–1225. [ Google Scholar ] [ CrossRef ]
  • Kargaran, S.; Shahri, M.H.; Ghorbani, Z.; Saberi, A.; Jamali, S.M.; Aleebrahim, N. Patterns of publications in social media-based co-creation: A bibliometric analysis. VINE J. Inf. Knowl. Manag. Syst. 2022; ahead-of-print . [ Google Scholar ] [ CrossRef ]
  • Shi, X.; Liang, X.; Luo, Y. Unpacking the intellectual structure of ecosystem research in innovation studies. Res. Policy 2023 , 52 , 104783. [ Google Scholar ] [ CrossRef ]
  • Ampornklinkaew, C.A. Bibliometric Review of Research on Customer Commitment. J. Relatsh. Mark. 2023 , 22 , 254–298. [ Google Scholar ] [ CrossRef ]
  • Rita, P.; Ramos, R.F. Global research trends in Consumer Behavior and sustainability in E-Commerce: A bibliometric analysis of the knowledge structure. Sustainability 2022 , 14 , 9455. [ Google Scholar ] [ CrossRef ]
  • Kajla, T.; Raj, S.; Kansra, P.; Gupta, S.L.; Singh, N. Neuromarketing and Consumer Behavior: A bibliometric analysis. J. Cons Behav. 2024 , 23 , 959–975. [ Google Scholar ] [ CrossRef ]
  • Küster, I.; Vila, N. Cons ethics: An extensive bibliometric review (1995–2021). Bus. Ethics Environ. Responsib. 2023 , 32 , 1150–1169. [ Google Scholar ] [ CrossRef ]
  • Vergura, D.T.; Zerbini, C.; Luceri, B.; Palladino, R. Investigating sustainable consumption behaviors: A bibliometric analysis. Br. Food J. 2023 , 125 , 253–276. [ Google Scholar ] [ CrossRef ]
  • Janik, A.; Ryszko, A.; Szafraniec, M. Exploring the Social Innovation Research Field Based on a Comprehensive Bibliometric Analysis. J. Open Innov. Technol. Mark. Complex. 2021 , 7 , 226. [ Google Scholar ] [ CrossRef ]
  • De Sousa, F.D.B. Cons Awareness of Plastic: An Overview of Different Research Areas. Circ. Econ. Sust. 2023 , 3 , 2083–2107. [ Google Scholar ] [ CrossRef ]
  • Van Eck, N.; Waltman, L. Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 2010 , 84 , 523–538. [ Google Scholar ] [ CrossRef ]
  • Valenzuela-Fernández, L.; Escobar-Farfán, M. Zero-Waste Management and Sustainable Consumption: A Comprehensive Bibliometric Mapping Analysis. Sustainability 2022 , 14 , 16269. [ Google Scholar ] [ CrossRef ]
  • Hladchenko, M. Implications of publication requirements for the research output of Ukrainian academics in Scopus in 1999–2019. J. Data Inf. Sci. 2022 , 7 , 71–93. [ Google Scholar ] [ CrossRef ]
  • Christensen, J.F.; Olesen, M.H.; Kjær, J.S. The industrial dynamics of Open Innovation—Evidence from the transformation of consumer electronics. Res. Policy 2005 , 34 , 1533–1549. [ Google Scholar ] [ CrossRef ]
  • Füller, J.; Mühlbacher, H.; Matzler, K.; Jawecki, G. Consumer empowerment through internet-based co-creation. J. Manag. Inf. Syst. 2009 , 26 , 71–102. [ Google Scholar ] [ CrossRef ]
  • Füller, J.; Matzler, K.; Hoppe, M. Brand community members as a source of innovation. J. Prod. Innov. Manag. 2008 , 25 , 608–619. [ Google Scholar ] [ CrossRef ]
  • Nambisan, S.; Siegel, D.; Kenney, M. On open innovation, platforms, and entrepreneurship. Strateg. Entrep. J. 2018 , 12 , 354–368. [ Google Scholar ] [ CrossRef ]
  • Kohler, T.; Matzler, K.; Füller, J. Avatar-based innovation: Using virtual worlds for real-world innovation. Technovation 2009 , 29 , 395–407. [ Google Scholar ] [ CrossRef ]
  • Stanko, M.A.; Henard, D.H. Toward a better understanding of crowdfunding, openness and the consequences for innovation. Res. Policy 2017 , 46 , 784–798. [ Google Scholar ] [ CrossRef ]
  • Wilden, R.; Akaka, M.A.; Karpen, I.O.; Hohberger, J. The evolution and prospects of service-dominant logic: An investigation of past, present, and future research. J. Serv. Res. 2017 , 204 , 345–361. [ Google Scholar ] [ CrossRef ]
  • Kohler, T. Crowdsourcing-based business models: How to create and capture value. Calif. Manag. Rev. 2015 , 57 , 63–84. [ Google Scholar ] [ CrossRef ]
  • Kohler, T.; Fueller, J.; Stieger, D.; Matzler, K. Avatar-based innovation: Consequences of the virtual co-creation experience. Comput. Hum. Behav. 2011 , 27 , 160–168. [ Google Scholar ] [ CrossRef ]
  • Wolfert, J.; Verdouw, C.N.; Verloop, C.M.; Beulens, A.J.M. Organizing information integration in agri-food—A method based on a service-oriented architecture and living lab approach. Comput. Electron. Agric. 2010 , 70 , 389–405. [ Google Scholar ] [ CrossRef ]
  • Gao, H.; Ding, X.H.; Wu, S. Exploring the domain of open innovation: Bibliometric and content analyses. J. Clean. Prod. 2020 , 275 , 122580. [ Google Scholar ] [ CrossRef ]
  • Yang, C.; Lan, S.; Shen, W.; Huang, G.Q.; Wang, X.; Lin, T. Towards product customization and personalization in IoT-enabled cloud manufacturing. Clust. Comput. 2017 , 20 , 1717–1730. [ Google Scholar ] [ CrossRef ]
  • Saorin, T.; Peset, F.; Ferrer, A. Factors linked to the adoption of data and implementation of the Semantic Web in libraries, archives and museums. Inf. Res. 2013 , 18 , 1. [ Google Scholar ]

Click here to enlarge figure

YearTPTCTC/TPYearTPTCTC/TP
20051495495.0020151244937.44
2006000.0020161022122.10
2007100.0020171246153.42
20084460115.0020181453037.86
20097727103.8620191018518.50
2010210653.0020201228921.58
2011522344.6020212830310.82
2012416040.002022221416.41
2013917519.44202319432.26
2014938943.222024300.00
Source TitleTP(R)TP (%)TC(R)TC/TPQ
Journal of Open Innovation: Technology, Market, and Complexity31(1)16.85%384(3)12.391 (97th)
Sustainability (Switzerland)10(2)5.43%194(4)19.401 (87th)
British Food Journal7(3)3.80%122(7)17.432 (74th)
Journal of Cleaner Production4(4)2.17%182(5)45.501 (99th)
Technological Forecasting and Social Change4(5)2.17%175(6)43.751 (98th)
IEEE Transactions on Engineering Management3(6)1.63%22(9)7.331 (84th)
International Journal of Knowledge Management3(7)1.63%18(10)6.002 (63th)
International Journal of Technology Marketing3(8)1.63%53(8)17.674 (26th)
Journal of Product Innovation Management3(9)1.63%563(2)187.671 (96th)
Research Policy3(10)1.63%760(1)253.331 (98th)
RCFAuthorsTPTitleJournalY
1492Christensen, J.F., Olesen, M.H., Kjær, J.S.1The industrial dynamics of Open Innovation - Evidence from the transformation of consumer electronics [ ]Research Policy,2005
2467Füller, J., Mühlbacher, H., Matzler, Jawecki, G.3 *Consumer empowerment through internet-based co-creation [ ]Journal of Management Information Systems2009
3440Füller, J., Matzler, K., Hoppe, M.1Brand community members as a source of innovation [ ]Journal of Product Innovation Management2008
4260Nambisan, S., Siegel, D., Kenney, M.1On open innovation, platforms, and entrepreneurship [ ]Strategic Entrepreneurship Journal2018
5217Kohler, T., Matzler, K., Füller, J. *1Avatar-based innovation: Using virtual worlds for real-world innovation [ ]Technovation,2009
6199Stanko M.A.; Henard D.H.1Toward a better understanding of crowdfunding, openness, and the consequences for innovation [ ]Research Policy2017
7117Wilden R.; Akaka M.A.; Karpen I.O.; Hohberger J.1The Evolution and Prospects of Service-Dominant Logic: An Investigation of Past, Present, and Future Research [ ]Journal of Service Research2017
8111Kohler T.1Crowdsourcing-based business models: How to create and capture value [ ]California Management Review2015
9107Kohler T.; Fueller J.; Stieger D.; Matzler K.1Avatar-based innovation: Consequences of the virtual co-creation experience [ ]Computers in Human Behavior2011
10106Wolfert J.; Verdouw C.N.; Verloop C.M.; Beulens A.J.M.1Organizing information integration in agri-food-A method based on a service-oriented architecture and living lab approach [ ]Computers and Electronics in Agriculture2010
RCountryTLSDCRCountryTLSDC
1United Kingdom232455816Thailand5689
2United States2132149517Australia44141
3Italy131633018Israel4388
4France11911819Netherlands45169
5Russian Federation995720Republic of Korea47134
6Germany81970721Sweden3352
7Indonesia779722Switzerland33101
8Spain71424223China212183
9Austria68143724Hungary2323
10Canada6520325Mexico2323
11Denmark6464126Portugal233
12India632827Romania2330
13Philippines634928Ukraine2316
14Poland573929Brazil1324
15Taiwan552530Finland15192
OI and ConsScope of ResearchQuestioning Idea
Effective Consumer Engagement Strategies
Cultural and Contextual Factors
Integration of Offline and Online Channels
Ethical Considerations and Consumer Privacy
Consumer Co-Creation Platforms
Empowering Marginalized and Underrepresented Consumers
Consumer Learning and Knowledge Transfer
Consumer Insights and Analytics
Personalization and Customization
Community Engagement and Brand Advocacy
Lack of Leadership Support and Alignment
Trust and Relationship Building
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Siriwong, C.; Pongsakornrungsilp, S.; Pongsakornrungsilp, P.; Kumar, V. Mapping the Terrain of Open Innovation in Consumer Research: Insights and Directions from Bibliometrics. Sustainability 2024 , 16 , 6283. https://doi.org/10.3390/su16156283

Siriwong C, Pongsakornrungsilp S, Pongsakornrungsilp P, Kumar V. Mapping the Terrain of Open Innovation in Consumer Research: Insights and Directions from Bibliometrics. Sustainability . 2024; 16(15):6283. https://doi.org/10.3390/su16156283

Siriwong, Chukiat, Siwarit Pongsakornrungsilp, Pimlapas Pongsakornrungsilp, and Vikas Kumar. 2024. "Mapping the Terrain of Open Innovation in Consumer Research: Insights and Directions from Bibliometrics" Sustainability 16, no. 15: 6283. https://doi.org/10.3390/su16156283

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

  • Oakland University
  • Oakland University Alumni Association
  • Class Notes

The homepage of the Oakland University Alumni Magazine

OUWB’s Afonso, Wasserman named Dean’s Distinguished Professors

icon of a calendar

Share this story

Afonso and Wasserman

Two professors from Oakland University William Beaumont School of Medicine have each achieved the faculty rank of Dean’s Distinguished Professor. 

The Oakland University Board of Trustees approved the title changes recommended by Oakland University President Ora Hirsch Pescovitz, M.D., at its regular meeting on June 28, 2024.

Nelia Afonso, M.D., professor, and Jason Wasserman, Ph.D., professor — both from OUWB’s Department of Foundational Medical Studies — each received the title.

“This prestigious recognition is not merely a personal achievement but a testament to the collaborative efforts of our academic community,” said Afonso.

Wasserman shared similar thoughts.

“The thing that means the most to me is that it was the result of a nomination of at least 10 of my colleagues,” he said. “It’s a really nice honor.”

The rank of Dean’s Distinguished Professor was established in 2021 upon approval from the OU Provost and the OU Assistant Vice President of Academic Human Resources. It’s a permanent, honorific title that acknowledges contributions of employed, full-time, tenured faculty at the rank of professor.

According to the recommendations from Pescovitz, the designation “shall be afforded to awardees who have superior teaching skills that encompass the breadth and depth of their discipline, a distinguished record of public service, and scholarly, creative, and artistic achievements.”

‘Truly been a privilege’

Sarah Lerchenfeldt, Pharm.D., associate professor and interim co-chair, Department of Foundational Medical Studies, nominated Afonso.

In her nomination, Lerchenfeldt said Afonso “exemplifies the criteria” for the title.

“Since joining OUWB as a founding faculty member, she has demonstrated unparalleled dedication to medical education, significantly enhancing both the academic and practical aspects of these fields,” wrote Lerchenfeldt.

The nomination noted Afonso’s scholarly excellence, particularly in the domains of education, clinical skills, women’s health, and vaccine hesitancy. Lerchenfeldt said that Afonso was principal investigator for the Merck Investigator Studies program project called “Promoting Vaccine Confidence in Medical and Dental Students.” The project secured about $179,000 in funding.

The nomination also pointed to Afonso’s efforts to develop and refine the curriculum for OUWB’s Art and Practice of Medicine (APM) course, previous awards she received, commitment to service, and leadership roles with organizations like the Southeast Michigan Center for Medical Education.

“Dr. Afonso’s tenure at OUWB has been marked by a commitment to advancing medical education, research, and community health,” wrote Lerchenfeldt. “Her work not only reflects the values and mission of our institution, but also sets a benchmark for academic and professional excellence.”

Afonso said it has “truly been a privilege” to receive the title.

“I have been fortunate to be part of this medical school since its inception and I am grateful for the numerous opportunities provided that have fostered my growth as a physician, educator, and researcher,” she said. “I appreciate the dedication and commitment of our faculty and staff, whose support has been instrumental in implementing various curricular innovations.”

‘Invaluable member of OUWB faculty’  

Wasserman , who joined OUWB in 2013, was nominated by a group of 10 other faculty from the Department of Foundational Medical Studies.

They called him a “prolific and influential scholar” on several topics: homelessness, clinical bioethics, and Holocaust medicine.

“His scholarship and research range from core bioethics topics, such as autonomy and informed consent, to empirical research and qualitative inquiry into homelessness and medical ethics,” they wrote, and noted that he has published three books, 12 book chapters and supplements, 64 peer-reviewed journal articles, 22 editor-reviewed articles, and seven invited articles.

“Dr. Wasserman’s extensively cited research has contributed to important debates surrounding ethics in medical education, care for homeless individuals, pediatric ethical concerns, euthanasia, the rights of patients without decision-making capacity, and immunization policy,” wrote the nominators.

They also noted Wasserman’s roles in shaping the Medical Humanities and Clinical Bioethics (MHCB) curriculum, replacing traditional essay assignments with extemporaneous self-reflection videos, development of interactive iBooks, serving as a mentor to more than 50 OUWB students for their  Embark  projects, and developing a national training course in bioethics for the Arnold P. Gold Foundation.

The nominators also mentioned Wasserman’s history of service. In 2020, he was appointed as one of only two Provost Fellows for Faculty Diversity at Oakland University. In 2022, he was honored with the OU Founder’s Day Award for Faculty Excellence in Diversity, Equity, and Inclusion. He also chaired the admissions committee for five years, served as director of student professionalism for nine years, co-founded  Street Medicine Oakland , launched the Center for Moral Values in Health Medicine, and more.

And he has plans to do even more, including launching a new student-led journal on ethics, humanities, and social justice, and a health care ethics debate tournament that will be open to all OU students.  

“One of the reasons I came to OUWB was because it was a new school and there was a lot of opportunity to be entrepreneurial,” he said. “I didn’t want to go to some well-established place where the expectation is you teach your courses, you write papers, and otherwise just let things run.”

For more information, contact Andrew Dietderich, senior marketing specialist, OUWB, at [email protected] .

To request an interview, visit the OUWB Communications & Marketing  webpage .

This work is licensed under a  Creative Commons Attribution-NonCommercial 4.0 International License .

white arrow pointing up

  • Skip to main content
  • Keyboard shortcuts for audio player

Harris’ struggles with immigration policy expose political vulnerabilities

Headshot of Sergio Martinez-Beltran

Sergio Martínez-Beltrán

Headshot of Jasmine Garsd

Jasmine Garsd

A look at Vice President Kamala Harris’ record on immigration

U.S. Vice President Kamala Harris (center,) along with Department of Homeland Security Secretary, Alejandro Mayorkas, Representative Veronica Escobar, a Democrat from Texas, and Senator Dick Durbin, a Democrat from Illinois, tour a U.S. Customs and Border Protection facility in El Paso, Texas, U.S., on Friday, June 28, 2021.

Vice President Kamala Harris, center, along with Department of Homeland Security Secretary, Alejandro Mayorkas, Rep. Veronica Escobar, a Democrat from Texas, and Sen. Dick Durbin, a Democrat from Illinois, tour a U.S. Customs and Border Protection facility in El Paso, Texas, U.S., in June 2021. Bloomberg/via Getty Images hide caption

As Vice President Kamala Harris works to secure the presidential nomination of the Democratic Party next month, her role on immigration policy is now in the spotlight.

Minutes after the President Joe Biden announced he was dropping out of the race and was endorsing Harris, Republicans started attacking her record on immigration and border policy.

“Joe Biden has now endorsed and fully supports his ‘Borders Czar’ Kamala Harris to be the Democrat candidate for president,” Gov. Greg Abbott, R-Texas, posted on X . “I think I will need to triple the border wall, razor wire barriers and National Guard on the border.”

Conservatives have often referred to Harris as the Biden administration’s "Border Czar," incorrectly claiming she was tasked with repairing the border.

“Kamala had one job,” said Nikki Haley earlier this month at the Republican National Convention. “One job. And that was to fix the border. Now imagine her in charge of the entire country.”

In reality, that was not Harris’ job.

She was tasked by Biden in 2021 to examine the root causes of migration from Central America, including poverty, violence, and corruption. At that time, unauthorized migration came primarily from Mexico and Central America.

She was never tapped to head immigration policy, which is the responsibility of Homeland Security Secretary Alejandro Mayorkas, who oversees all agencies in charge of the enforcement of immigration laws.

Three years later, this role could be Harris’ Achilles' heel. Her role in pushing for Biden’s immigration proposals have disenchanted Democrats and immigrant rights groups.

“I do think there is an opportunity here for Vice President Harris to have a more hopeful message around immigration than even the Biden administration has had in the past,” said Adriel Orozco, a senior policy counsel with the American Immigration Council.

Biden’s policy proposals have included severely restricting most asylum claims at the border and expediting the removal of unauthorized migrants, something immigrant rights groups have opposed.

Suyapa Portillo, a professor of Chicano/a-Latino/a Transnational Studies at Pitzer College, says Harris should try to separate herself from the Biden administration’s “slow move towards immigration reform,” and from the message of deterrence that “represents that conservatism from the Biden administration and the Democratic Party — the old guard.”

Vice President Kamala Harris speaks from the White House in Washington, Monday, July 22, 2024, during an event with NCAA college athletes. This is her first public appearance since President Joe Biden endorsed her to be the next presidential nominee of the Democratic Party.

Vice President Kamala Harris speaks from the South Lawn of the White House in Washington on Monday during an event with NCAA college athletes. This was her first public appearance since President Joe Biden endorsed her to be the next presidential nominee of the Democratic Party. Susan Walsh/AP hide caption

A changed immigration landscape

If Harris secures the presidential nomination, she will be facing a very different immigration landscape than back in 2021, when she was tasked with addressing its root causes.

Last year, unauthorized crossings at the U.S.-Mexico border hit an all-time high. In December 2023, the number of encounters reached nearly 250,000, according to U.S. Customs and Border Protection.

For the last four months, the number of migrants trying to cross illegally has dramatically dropped. That’s due in part due to Mexico’s enforcement, and Biden’s policies, which include severely restricting most asylum claims at the border .

But migration has diversified in the last few years. There is an unprecedented crisis of global displacement. When Harris was elected in 2020, 90% of immigration hailed from Mexico and Central America, according to an analysis by the Migration Policy Institute .

In 2023, only 49 percent of the encounters were with migrants from those four countries.

Today, immigrants arriving at the US Mexico border are fleeing from the crisis in Venezuela, the war in Ukraine and cartel violence in Ecuador, just to name a few.

A mixed track record

Harris’ record on immigration has been marred by policy blunders.

Her first international trip as vice president made clear her approach on immigration: addressing root causes to stop illegal migration.

In the summer of 2021, she traveled to Guatemala to meet with then-President Alejandro Giammattei. In a speech, she said that the Biden administration was committed to helping Guatemalans find “hope at home.”

But she also warned prospective migrants.

“I want to be clear to folks in this region who are thinking about making that dangerous trek to the United States-Mexico border,” Harris said. “Do not come. Do not come.”

Those three words: Do not come, were seen by many as a blunder . Latino advocates criticized the statement as paternalistic and tone-deaf, given the violent crises rattling the region.

For many immigrant advocates, that statement continues to haunt Harris’ candidacy.

“She needs to separate from Biden,” Portillo says. “She needs to speak to TPS holders and DACA holders for a plan for legalization, and a border plan that does not include throwing children in jail.”

But Harris has maintained that deterrence is essential: last year she announced $950 million in pledges from private companies to support Central American communities.

Judith Browne Dianis, the executive director of the D.C.-based civil rights organization Advancement Project, says Harris will now have to explain how she would tackle immigration if she were elected president.

“Is it a humanitarian response, or is there a criminalization response?” Dianis says. “We don’t need more criminalization. We don’t need a border wall. We need to get to the root causes. We need to make sure that people are taken care of.”

Criticism from GOP for not visiting the border enough

In early June 2021, Harris came under fire for not visiting the border. In an interview with NBC News , she was asked about Republican critiques.

“And I haven’t been to Europe,” Harris fired back. “I mean, I don’t understand the point that you are making.”

Her response was criticized by conservatives as disconnected and flippant towards border communities and agencies which have felt overwhelmed by the influx of migrants in recent years.

Harris’ first trip to the border came later that month, to El Paso, Texas. At a press conference there, she stated that migration “cannot be reduced to a political issue. We’re talking about children, we’re talking about families, we are talking about suffering.”

Earlier this year, Harris backed a Biden-endorsed bipartisan bill on border enforcement.

The measure would have added immigration detention beds, increased the number of U.S. Customs and Border Protection personnel and asylum officers, and funded technology to detect fentanyl smuggling at the Southern border. It passed in the Senate but failed to move forward after former President Donald Trump urged House Republicans to kill it.

But for many immigration advocates, Harris is their candidate.

Kerri Talbot, the executive director of the national advocacy organization Immigration Hub, called Harris a “strong defender and champion of American families, including their immigrant family members” in a statement Sunday.

“We have no doubt that she can step up to the challenge, counter Trump and JD Vance’s rhetoric and dark vision for democracy, and protect the progress we’ve made while delivering transformative change for our immigration system,” Talbot said.

Before VP, Harris was already pushing for reform

But Harris involvement with immigration goes way beyond her vice presidency, and her actions show a shift in policies.

When she was the district attorney in San Francisco, she backed a city policy that turned over to federal immigration authorities migrant juveniles suspected of committing a felony. In 2019, Harris’ campaign told CNN “this policy could have been applied more fairly.”

But as California’s attorney general, she had a different stance. In a 2015 interview with CBS Los Angeles, Harris said, “Unfortunately, I know what crime looks like. I know what a criminal looks like who's committing a crime. An undocumented immigrant is not a criminal.”

Harris became U.S. senator from California in 2017.

She was part of a Senate hearing on the Trump administration’s highly controversial separation policy, in which undocumented migrant children were separated from their parents at the U.S.-Mexico border, as a form of immigration deterrence. She questioned Trump officials, and said separating families can cause “irreparable harm.”

In 2019, she and several other Democratic senators reintroduced the Reunite Every Unaccompanied Newborn Infant, Toddler and Other Children Expeditiously (REUNITE) Act , “to expedite the reunification of separated immigrant families and promote humane alternatives for asylum-seeking immigrant families.”

When she ran for president in 2019, Harris unveiled an immigration plan that called for a path to citizenship for recipients of Deferred Action on Childhood Arrivals program, best known as DACA.

That’s similar to what the Biden-Harris campaign promised when they run in 2020. However, none of that has happened during the administration.

IMAGES

  1. (PDF) Internet research ethics and the policy gap for ethical practice

    research paper internet ethics

  2. Introduction To The Sources Of The New Ethics That Is Required By The

    research paper internet ethics

  3. (PDF) Internet Ethics

    research paper internet ethics

  4. Internet Ethics Persuasive Essay Example

    research paper internet ethics

  5. Ethical Issues and Guidelines for Internet Research

    research paper internet ethics

  6. FREE 11+ Research Ethics Templates in PDF

    research paper internet ethics

VIDEO

  1. Chapter 6 Internet Ethics and Safeguard Revision Part-1

  2. Internet Ethics

  3. Ethics and values question paper 3rd semester examination ll #ug 3rd semester examination 2023-24

  4. 2023 GS IV Ethics paper

  5. ETHICS, APSC CCE GS PAPER 4 TIPS & DISCUSSION

  6. Class 5 B Assembly "Internet ethics" St. Joseph's College, Nainital

COMMENTS

  1. PDF Internet Research: Ethical Guidelines 3.0 Association of Internet

    This document introduces Internet Research Ethics (IRE) 3.0. We begin with a review of the AoIR ethical approaches and guidelines that we now designate as IRE 1.0 (Ess and the AoIR ethics working committee, 2002) and IRE 2.0 (Buchanan, 2011, p. 102; Markham & Buchanan, 2012; Ess, 2017). While driven by on-going changes and developments in the

  2. PDF The Ethics of Internet Research

    The ethics, and ethical governance, of online research have been much debated, and a number of professional organizations have promulgated guidelines for researchers considering conduct-ing their research online. This chapter offers an overview of the current position, suggesting relevant considerations in respect of different kinds of project ...

  3. Ethical challenges in online research: Public/private perceptions

    Online research has created new challenges for ethics committees and institutions as well as for researchers: as Ackland (2013: 43) succinctly puts it, 'Ethical guidelines for use of digital trace data are still a moving target.'New digital online spaces force researchers to rethink established ethical principles of informed consent, privacy and anonymity.

  4. PDF A review of research ethics in internet-based research

    Over the last ten years an upsurge in internet-based research (IBR) has led to increased interest in IBR and research ethics (from herein referred to as IBRE). This review paper considers a range of issues relevant to IBR, including public and private spaces; risks to participants and IBR and informed consent. Finally, we

  5. Internet Research Ethics

    The commonly accepted definition of Internet research ethics (IRE) has been used by Buchanan and Ess (2008, 2009), Buchanan (2011), and Ess & Association of Internet Researchers (AoIR) (2002): IRE is defined as the analysis of ethical issues and application of research ethics principles as they pertain to research conducted on and in the Internet.

  6. Research Ethical Norms, Guidance and the Internet

    The internet, either as a tool or as an area of research, adds moral worries to an already complicated research ethical backdrop. Agencies, professional associations and philosophers have formulated research ethical norms designed to help scientists to arrive at responsible solutions to the problems. Yet, many criticize this reliance on norms. Somewhat more precisely, many claim that research ...

  7. Internet Research Ethics and Social Media

    Introduction. Internet research ethics (IRE) is rooted in both communication technologies and research ethics traditions that precede the rise of the Internet per se. The historical and cultural conditions surrounding the rise of computer-mediated communication (CMC) and what became the Internet are initially US-centric.

  8. Internet Research Ethics: Past, Present, and Future

    Korina Giaxoglou, Reflections on internet research ethics from language-focused research on web-based mourning: revisiting the private/public distinction as a language ideology of differentiation, Applied Linguistics Review, 10.1515/applirev-2016-1037, 8, 2-3, (229-250), (2017).

  9. 14. Research Ethics in Context

    consolidated the Association of Internet Researchers (AoIR) Ethics Working Committee's recommendations into a comprehensive document. In 2015, we revisited the subject with Internet Research: Ethical Concerns, which took a practical approach to internet research ethics by reviewing the work of other researchers in the field.

  10. Internet Research Ethics: Past, Present, and Future

    Internet Research Ethics: Past, Present, and Future. ... Search for more papers by this author. Elizabeth A. Buchanan, Elizabeth A. Buchanan. Center for Information Policy Research, School of Information Studies, University of Wisconsin-Milwaukee, USA. Search for more papers by this author.

  11. Ethical, Practical, and Methodological Considerations for Unobtrusive

    As Internet research grows in popularity, attention to the ethics of studying online content is crucial to ensuring ethical diligence and appropriateness. Over recent years, ethical guidelines and recommendations have emerged to advise researchers and institutional review boards on best practices.

  12. Internet Research Ethics

    Recruitment in or through Internet locales or tools, for example social media, push technologies. A critical distinction in the definition of Internet research ethics is that between the Internet as a research tool versus a research venue. The distinction between tool and venue plays out across disciplinary and methodological orientations.

  13. Internet Research Ethics: The Field and Its Critical Issues

    Search for more papers by this author. Charles Ess, Charles Ess. PhD Distinguished Research Professor Professor of Philosophy. Drury University, USA. ... Introduction to Internet Research Ethics: Background and Major Issues in the Literature. IRE: A Brief History. Methodologies and Ethics. Conclusions. References.

  14. PDF Internet research ethics and the policy gap for ethical practice in

    conduct internet research. Key Issues and Complexities of Internet Research Ethics The TCPS2 is developed specifically for research involving human subjects (CIHR et al., 2010a). This is a particularly pertinent point for researchers who may attempt to adapt the TCPS2 to the online setting. In subsequent sections of this paper, the wide-

  15. The ethics and editorial challenges of internet-based research

    Use of the internet in research has created many challenges, not just for those conducting and reviewing the studies, but also for editors publishing this work. Two key issues raised by internet-based research are ethics approval and informed consent. While some guidance exists regarding the ethics and consent of internet-based research, and ...

  16. Ethics and the Internet: Issues Associated with Qualitative Research

    This paper examines the need for. standards to resolve ethical conflicts related to quali tative, on-line research. Practitioners working in the area of qualitative research gauged the breadth and. depth of this need. Those practitioners identified. several key ethical issues associated with qualitative.

  17. PDF Using data from the internet and social media in research: ethics & consent

    archers working with or collecting data from the internet and social media. Inevitably, it is a broad framework for thinking through ethical. issues rather than a narrow prescription of what is expected in every case. As such, it is subject to dialogue, discussion and change as new modes of socia. media data come into play and/or legal and ...

  18. Ethical issues in using the internet to engage participants in family

    Background The internet is an increasingly popular tool in family and child research that is argued to pose new ethical challenges, yet few studies have systematically assessed the ethical issues of engaging parents and children in research online. This scoping review aims to identify and integrate evidence on the ethical issues reported when recruiting, retaining and tracing families and ...

  19. Guest Editorial: Ethical Issues in Social Media Research

    Research ethics, of course, goes beyond procedural ethics (Giraud et al., 2019; Markham, 2018; Ravn et al., this issue), and the second set of papers in this special issue focuses on the more "every-day" ethics of research practice, reporting on researchers' reflections and fine-grained analyses of different contexts of practice. As ...

  20. Internet research ethics

    Internet research ethics involves the research ethics of social science, humanities, ... An introduction, by Charles Ess, to papers that emerged from a panel presentation organized for a conference held at Lancaster University on December 14- December 16, 2001, building on the efforts of the Ethics Working Committee of the Association of ...

  21. Netiquette: Ethic, Education, and Behavior on Internet—A Systematic

    These results show that this is a poorly defined line of research, both in theory and in practice. ... it is clear that these years have seen the birth of a new question that goes beyond ethics: how to behave on the Internet [20,28 ... Lloyd B.A. E-mail etiquette (netiquette); Proceedings of the Conference Record of Annual Pulp and Paper ...

  22. Research Ethics: Internet Research

    Internet research ethics (IRE) attempts to clarify and resolve ethical dilemmas encountered by researchers who use the → Internet as a medium for their research - for example, doing online surveys - and/or focus on the various forms of interactions observable online, such as virtual communities, social networks like MySpace, web pages, instant messaging, and other forms of computer ...

  23. Ethical Considerations in Research

    Research ethics are a set of principles that guide your research designs and practices in both quantitative and qualitative research. In this article, you will learn about the types and examples of ethical considerations in research, such as informed consent, confidentiality, and avoiding plagiarism. You will also find out how to apply ethical principles to your own research projects with ...

  24. Mapping the Terrain of Open Innovation in Consumer Research ...

    Mapping the Landscape of Open Innovation in Consumer Research: Insights and Directions from Bibliometrics examines how publications in the fields of consumer behavior research (Cons) and open innovation (OI) have developed over time. Terms that frequently appear together are explored to elucidate potential future research directions and thematic areas that influence academic writing ...

  25. OUWB's Afonso, Wasserman named Dean's Distinguished Professors

    "His scholarship and research range from core bioethics topics, such as autonomy and informed consent, to empirical research and qualitative inquiry into homelessness and medical ethics," they wrote, and noted that he has published three books, 12 book chapters and supplements, 64 peer-reviewed journal articles, 22 editor-reviewed articles ...

  26. Harris' struggles with immigration policy expose vulnerabilities : NPR

    Ethics; Harris' struggles with immigration policy expose vulnerabilities Vice President Harris was tasked to address the roots of mass migration to the U.S. Some of her actions have sparked ...