<<

EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) Protecting Subjects in Internet

By: Larry A. Pace Practical, Legal, and transforms basic aspects of human exist- [email protected] Ethical Challenges ence, such as identity, language, confiden- Mary M. Livingston tiality, that are at the core of any society Researchers are increasingly turning and are protected in most countries by to the World Wide Web as a convenient, local law” (p. 6). They advocate moving ubiquitous laboratory for gathering data from a “purely instrumental or moralist Abstract and conducting research (Buchanan, view” to an “ethics of care.” The growth of the Internet as a 2004; Reips, in press). There are many In this paper, the authors identify differences between conducting psycho- several key issues regarding the protec- research venue has led to practical, logical research in a person-to-person tion of human subjects in Internet-based legal, and ethical problems regard- setting and an online environment, yet research, describe the ethical and legal ing the protection of human sub- the ethical and legal issues involving the considerations related to these issues, jects. Among these are difficulty in protection of human subjects are the summarize the present codes address- verifying subjects’ identities, gaining same. Researchers in the Information ing these issues both in the informed , and assuring ethi- Age must face and deal responsibly with and Europe, and provide a set of work- these issues. ing guidelines for conducting ethical and cally-correct research. The authors While legal and ethical issues regard- lawful online research. These guidelines summarize the current standards ing the protection of human subjects should have broad applicability regard- pertaining to the protection of participating in online research are es- less of the ethical system adopted. human subjects in online research sentially the same as those in real-world and present a set of guidelines for research, it is likely that the solutions to dealing ethically, legally, and practi- the ethical dilemmas created by online Issues in Internet-Based Research research will not be the same as those cally with the issues of and practiced in the laboratory. Solutions The commercialized Internet acces- , intellectual property, that work in the physical world require sible through graphical web browsers is , and protection separate consideration and modification little more than a decade old, but Inter- from harm. As computer-mediated for virtual application. net-enabled electronic communication communications merge and evolve, Social scientists have expressed con- and concomitant research venues have as the Internet becomes more and cern that applying a human-subject-pro- proliferated over that period of time. tection model developed for science and Computer-mediated communications more a part of everyday life, and to the kinds of research con- include electronic mail, chatrooms, news- as standards for ethical and lawful ducted by , political scien- groups, listservs, web-based online research are instituted, sepa- tists, and anthropologists was inappro- and surveys, message boards, threaded rate consideration of human subject priate even in the real-world environment discussion forums, web logs (or blogs), protection issues in online research (AAUP, 2000). Regulations developed and collaborative web sites. A fundamen- will become less important. for the real-world medical environment tal issue is whether these venues are to be are even less appropriate when applied considered public or private. If they are to social science research conducted in an public, the archived responses of indi- online setting. viduals may be construed to be matters Keywords The set of United States regulations of public record, and few ethical consid- Internet research, research ethics, concerning the protection of human sub- erations apply when the records of these jects is often referred to as “the Common responses are used in research. protection of human subjects, in- Rule” (DHHS, 2001), and they are in- If web-based venues are private, how- formed consent, privacy, intellectual deed the for the United ever, individuals’ responses may be privi- property States. However, regulations and ethi- leged and protected, and could only be cal standards exist in other parts of the used in research with clear protection world. Thus, the global nature of Internet of the identity, autonomy, and informed research complicates the application of consent of the participant. The determi- these guidelines. For example, contrasting nation of “private information” by United the United States and Germany, Capurro States statute hinges on the individual and Pingle (2001) point out that the re- participant’s “reasonable expectation of search traditions and fundamental ethical privacy” (DHHS, 2001). assumptions and views of personal data In an online environment one’s level differ widely even within the Western of technological sophistication could play philosophical tradition. The reason for a major role in determining this variation “is that the online medium of privacy. More experienced Internet us-

35 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) ers may be aware of the identifiable digital footprints left behind ally identified (see for example Denzin, 1999). Such research- as they traverse the Internet, while neophytes may believe they ers state that information gathered by lurking passively in an are cloaked in electronic anonymity. Privacy, then, must involve Internet chatroom, for example, is a matter of public record. more than an objective determination by the researcher alone. Indeed, the collection and analysis of such publicly available The same chatroom that a naïve participant perceives as limited information may be justified without consent under strict cir- to those actively engaged in discussion may be experienced as cumstances (Bruckman, 2002). In some cases the researcher less isolated, more transparent, and publicly visible by another. goes beyond observation to create the virtual environment and Knowledgeable, computer-savvy researchers cannot assume may even create virtual confederates who react to the subject that their own perceptions of privacy or lack of it are shared by in preprogrammed ways (see for example Williams, Cheung & research participants. Some writers dismiss the issue, describing Choi, 2000). At the other extreme, many researchers are taking expectations of privacy as “misplaced” (Walther, 2001). Others precautions to ensure that participants in online research are describe such beliefs as naïve or unrealistic. Simply dismissing fully informed and give their voluntary consent to the use of the privacy expectations of naïve subjects as unrealistic begs their responses in research studies. the question of who is really naïve. It is also possible that the After World War II, the established the experimental context may alter expectations regarding privacy. foundation for modern ethical standards for psychological and For instance, while one would normally not take candy from using human subjects (Gravetter & Gorzano, strangers, one might feel safe taking it from an experimenter. 2003; Graziano & Raulin, 2000; Katz, 1972). Ethical guide- Online, one might feel safer typing in a credit card number on lines for the use and treatment of human subjects embody prin- a secure bank web site than on a general site. In the same fash- ciples requiring protection from harm, informed consent, and ion, subjects might feel that their responses were protected from confidentiality. scrutiny on a web site devoted to an experimental . The primary codes in the United States presently regulating A second major issue in Internet-based research is the ability online are the American Psychological of both researchers and subjects to assume anonymous or pseu- Association Ethics Code (APA, 2002), the U.S. Department donymous identities online (Amber, 2000; Frankel & Siang, of Health and Human Service’s Protection of Human Subjects 1999). This ability to assume or fabricate identity complicates (DHHS, 2001), and the DHHS Health Insurance Portability matters regarding informed consent, correct identification of re- and Accountability (HIPAA) Act (DHHS, 2003). Additional search participants, and protection of underage subjects. There protection is provided by the Children’s Online Privacy Protec- are further ethical implications regarding the integrity of results tion (COPPA) Act (FTC, 1998) and the Gramm-Leach-Bliley if the gender, age, and other aspects of identity are uncertain Act (FTC, 1999). Collectively, these codes are intended to: or inaccurate. In the online venue, experimenters often cannot • Protect the privacy and confidentiality of individuals and be sure they are even dealing with a single individual, as typists their personally identifiable medical and financial records. could change without the experimenter's knowledge. A student • Ensure that individuals who give consent to have person- taking an online test or participating in a survey an online ex- ally identifiable information collected, transmitted, and stored periment could easily have a parent or another student nearby electronically have been fully informed. to provide answers or assistance. The most extreme case would • Ensure that no personal information is collected from involve an experimenter involved in the naturalistic observation children under the age of 13 years without informed parental of an individual who did not exist at all. White cites the “Kaycee permission. Nicole” case involving the young girl whose web log document- As well, the Association of Internet Researchers (AoIR) is ed her fight against cancer. “Readers were shocked to tears” to developing a code of values that all Internet researchers would find she had died and “even more shocked to learn she had never be expected to uphold when conducting online research. The existed” (White, 2001). AoIR is also pursuing clarification and education regarding the Considering the many different Internet venues, it may be ethical dimensions of human-subjects research (AoIR, 2001) convenient to distinguish among three kinds of online psycho- and has recently released a set of recommendations for ethical logical research. First, there is experimental research that in- decision making and Internet research (Ess, 2002). volves the collection of survey or experimental data via electron- As in the United States, other countries have sought to cre- ic means, whether by electronic mail or via a web site. Normally, ate ethical standards for online research. These countries in- survey researchers and web experimenters collect only enough clude Canada, Germany (Capurro & Pingle, 2001), Norway personal information to confirm the identity and the informed (NESH, 2001), and Sweden, among others. The European consent of participants, and individual participants’ responses Commission’s Information Society Technologies Programme are typically not reported except as part of an aggregate. A sec- (IST, 2004) has produced a code of practice for socio-economic ond kind of Internet-based research includes the analysis of research in the European community. As indicated by Capurro online, public documents treated as texts or archives (Knobel, and Pingle (2001) and Ess (2002), the European perspective 2003). Third, online research can refer to the study of “Inter- on Internet research ethics is more typically deontological than net-worked cyberspaces” (Knobel, 2003). This third category that of researchers in the North America, and particularly the would include the study of web sites, online chat spaces, instant United States, whose views are more typically utilitarian. messaging, e-mail discussion lists, and other kinds of computer- Regardless of the global source of data collected and the eth- mediated communication (Knobel, 2003). ical system adopted, three primary and transcendent principles emerge regarding the protection of human subject, whether the research is conducted in a laboratory or on the Internet. These Protecting Personal Privacy principles originally delineated in the (NIH, 1979) are autonomy or , beneficence, and At the one extreme, some researchers apparently believe that (Frankel & Siang, 1999). The principle of autonomy dic- they can freely use information gathered from online public tates that the individual should be respected, and that in most communication sources as long as participants are not person- cases, he or she must give informed consent to voluntary par-

36 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) ticipation in any research activity. Furthermore, the individu- in determining if the individual soliciting research participants al’s privacy should be reasonably protected. As described by is a bona fide researcher whose research is for a legitimate sci- the Belmont Report, two moral requirements are involved in entific purpose. respect for persons “to acknowledge autonomy and to protect • Greater challenges to researchers because of increased those with diminished autonomy.” The principle of beneficence difficulty in obtaining informed consent. The aforementioned requires that the research should produce a benefit—whether identity issues have obvious implications for informed consent. to the general good or to the specific individuals who partici- Identity is linked to the subject’s actual and legal ability to give pate, or both. This benefit must outweigh the potential risks as- consent. Questions of competence, comprehension, and age sociated with the research. The Belmont Report cautions that arise. Researchers are challenged to gain informed consent while “hard cases” arise where general good and individual participant protecting the subject’s privacy. Because the researcher’s contact risk are both involved. Finally, justice demands that subjects be with the subject is electronically-mediated, the documenta- treated fairly, and that they have the opportunity to withdraw tion of truly informed consent becomes problematic. There are voluntarily from the study at any time without fear of conse- significant trust issues for the subject as well as the researcher. quence. Justice further involves fair or representative selection Many potential participants having read of various nefarious In- of research subjects without discrimination against particular ternet schemes may suspect the motives of the “researcher” and classes due to convenience or manipulability. believe that the “research” is not what it is purported to be. Such individuals may be hesitant to volunteer or to be completely forthcoming in their responses. This hesitation may increase Ethical Challenges of Internet Research with the sensitivity of the subject matter and the likelihood of negative repercussions if a breach of confidentiality should oc- The application of these human-subject-protection princi- cur. In a fashion similar to the findings of research concerning ples, however, is complicated in online research because the re- volunteer subjects and demand characteristics in real-world ex- searcher and the subject are not usually face-to-face. Specifically, periments (Rosenthal & Rosnow, 1975; Orne, 1962), individu- the Association of Internet Researchers has identified some dis- als willing to volunteer for online research may differ not only tinctive challenges of Internet-based research (AoIR, 2001 and from the general population but may also differ from the virtual Knobel, 2003). Below, the authors present, discuss, and expand population of Internet users as well. the list of Internet-research challenges: • Greater difficulty in discerning ethically-correct approach- • Greater risk to individual privacy and confidentiality be- es because of greater diversity of research venues and the global cause of greater accessibility of information about individuals, reach of the media involved. As previously stated, computer- groups, and their communications—and in ways that would mediated communication engages people from different cultural prevent subjects from knowing that their behaviors and commu- and legal settings in an increasingly diverse set of research ven- nications are being observed and recorded (e.g., in a large-scale ues. The applicability of various state, federal, and international analysis of postings and exchanges in a USENET newsgroup codes is problematic at best. archive, in a chatroom, etc.). Individuals often have unrealistic, • Difficulties in obtaining representative samples due to the even illusory, expectations concerning their anonymity on the economic “digital divide.”* The population of individuals using Internet. The truth belies these expectations. Not only are serv- the Internet is better educated and economically more advan- er logs with computer users’ Internet Protocol (IP) addresses taged than the population as a whole, and is grossly overrepre- maintained and backed up to tape and disk, but persistent iden- sented by North Americans. This has implications for the previ- tifiers (cookies) and other traces of online activity, for example ously explicated principle of justice. Yet on the other hand, the lists of visited web sites, may be recorded as well. Some of these Internet is less geographically circumscribed than most other personally-identifiable records may go into additional storage as research venues, and if used properly, could afford samples with electronic or hard copy information, which increases the risk of greater cultural diversity. identity capture and exposure in the future. Individuals’ respons- • Difficulties dealing with potential harm due to the absence es to questionnaires or surveys, including sensitive personal or of face-to-face contact. This issue is especially troublesome financial information, could conceivably be intercepted at vari- when subject matter, questionnaire items, or experimental ma- ous points as they travel across the Internet. When responding nipulations have the potential to result in psychological distress to a paper-and-pencil survey, an individual may feel reasonably for participants. Debriefing without direct contact with the par- sure that a questionnaire sent through the postal service will ticipant makes assessment of individual reactions and selection not be opened and read. However, it is debatable as to whether of appropriate interventions difficult (Kraut, 2003). Protective the same individual could be equally confident that e-mail sent debriefing may be more difficult because the subject could leave from an office computer or a networked computer laboratory the experimental space with the click of a button prior to the would not be intercepted or recorded. Hidden Trojans, worms, end of the . This could be an even larger issue in an or undetected keystroke counting mechanisms could increase experiment involving deception such as the social ostracism the likelihood of survey responses containing sensitive personal experiment of Williams, Cheung, and Choi (2000) where the information falling into unintended hands even if the survey it- subject might never know the nature of deception. self were later to be sent via encrypted processes. • Greater difficulty of ascertaining identities because of the use of pseudonyms, multiple online identities, etc. As previously Intellectual Property Issues mentioned, many individuals adopt pseudonymous identities on the Internet, and often individuals adopt completely false In addition to the ethical issues involved with online data identities. Ascertaining the true identity of research partici- pants requires the collection of personally-identifiable informa- * Note: The previous four challenges were identified by the AoIR Ethics Working tion, yet such information poses a risk to individual privacy, as Committee and are presented with adaptation and elaboration by the present noted above. Reciprocally, potential subjects may have difficulty authors. These last two points are added by the present authors.

37 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) collection, there is another issue regarding intellectual property, assumed here that ethical research will also be research that is namely the question of whether a subject’s responses to an online lawful. For the purposes of these guidelines, United States reg- data collection device such as a survey or the records in a web- ulations are the starting point of legal reference. International based journal are behavioral responses or in fact original works research will have the more complicated problem of conforming of authorship. If such responses are considered behavioral signs to more than one set of regulations. It is particularly important or samples, as is usually the case in psychological research, copy- that international and cross-cultural research have specific and right considerations hardly apply. If, on the other hand, they are detailed informed consent so that consent is based on fact rath- considered original works, they are de facto copyrighted under er than cultural expectation or researchers’ assumptions. the U.S. Copyright laws whether or not they display a copyright symbol (U.S. Copyright Office, 2003). As such, these materi- Guideline 2 als could only be used with the express written consent of the Public matter can be quoted or analyzed without consent copyright owner. under the following strict conditions (adapted from Bruckman, Similarly, the European community has sought to apply har- 2002): monize copyright standards across member countries via the 1. The material is publicly archived and readily available. recently enacted Directive on the Harmonisation of Copyright 2. No password is required to access the material. and Related Rights in the Information Society (IST, 2004). 3. The material is not sensitive in nature. 4. No stated site policy prohibits the use of the material. In all other cases, consent should be obtained before the The Future and Internet Research research is conducted. It should be noted that in the United States, when human subjects are involved, the decision to waive Online research is married to the technology that enables it. consent is no longer that of the researcher alone. Consent must Even now the virtual world resembles the real world more and be waived by the appropriate Intuitional Review Board (IRB) more as desktop video conferencing, file sharing, audio instant using procedures and guidelines described in the Federal regu- messaging, text messages, cell phones with built-in video camer- lations. as, and other computer-mediated communication become more prevalent and blur the distinction between online and face-to- Guideline 3 face interactions. The technologies themselves are merging; Gain informed consent without disrupting online activity. with the dividing lines between telephone, Internet, and televi- Participants in psychological research, whether the research is sion blurring even more as each of the media take advantage of conducted online or in person, have a reasonable expectation of the technology offered by the others. privacy. The gaining of informed consent should allow partici- Computer-mediated communication technologies are not pants to verify that they understand the purpose of the research only merging, but also evolving. Collaborative workspaces, vir- and the means taken to protect their privacy and confidentiality. tual organizations, electronic commerce, and online courses and In addition, wherever the use of online communication involves degrees all create interesting and important research questions. intellectual property, the ownership of that property should be Moreover, researchers are not always passive observers. The identified, and the permission of the copyright holder should be growth of the Internet has led to the involvement of researchers obtained before the material is used in research. Some Internet as participants themselves in Internet-based groups. Such par- writings are clearly meant to be publications or at least works of ticipation may involve different roles such as facilitator, advisor, original authorship. Other writings, such as casual instant mes- peer member, or even service provider (Humphreys, Winzel- sages or chatroom comments more closely resemble conversa- berg, & Klaw, 2000). Disclosure as to the particular role(s) be- tion where privacy expectations are different. There is a full con- ing performed is obviously dictated. As the Internet continues tinuum of examples and expectation between these extremes. to become a part of everyday life, and as technologies merge and Researchers should be aware of where their research stands on come to resemble real world research contexts, the differences that continuum. When in doubt the consent or permission of between online and laboratory ethical strictures will likely con- the is in order. tract if not collapse. Global communication technology, along Electronic forms of gaining consent may be appropriate if with global research venues and subject pools, will increasingly the subject is fully informed and is over the age of 18 years, and necessitate sensitivity to diverse cross-cultural conceptions the potential risk to the subject is low (Bruckman, 2002). In and traditions regarding privacy and the integrity of individu- other conditions, it is usually advisable to obtain signatures on als. Notions of beneficence and justice must be interpreted in a paper to document informed consent. The nature of gaining broader context. In the meantime, working solutions and guide- consent, whether electronic or paper-based, should be minimal- lines should be implemented to address current ethical dilem- ly disruptive to participants’ online activity. In recognition of the mas in online research. COPPA requirements in the United States, the participation of children under the age of 13 years in research should be grant- ed by informed parental permission. Where feasible the child Some Proposed Guidelines for participant additionally should be asked for consent. It may be Conducting Ethical Online Research difficult to ascertain the subject’s age with absolute confidence. However, the experimenter should make every effort to do so While ethical standards regarding Internet-based psycho- given the limitations of the online research venue. Asking for logical research are currently incomplete at best and contradic- date of birth, in addition to age, and the use of other verifying tory at worst, the authors’ recommendations should assist re- information may help ensure the process. searchers in conducting ethical and lawful online studies. As part of informing consent and protecting underage chil- dren, researchers should routinely post privacy policies on web Guideline 1 sites used for data collection purposes. Active rather than pas- Internet research should conform to legal requirements. It is sive consent processes are preferred. In some cases the consent

38 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) could take the form of agreeing that entry into a chatroom those on the IRB with knowledge of online research. It is quite constitutes entry into a public forum where behavior may be possible that more than one institution’s IRB may be involved monitored, observed, and reported elsewhere or even used for when conducting research across institutions. It is the research- research. Online, individuals frequently simply click through or er’s responsibility to seek approval from each. If the researcher agree to privacy statements without reading them. It may be ad- has doubts concerning IRB jurisdiction, the Office for Protec- visable as well for researchers to require participants to answer tion From Risks, Protection of Human Subjects can be con- a series of objective questions about the research to document tacted directly. Federal regulations set a floor on what research their informed consent. Obviously, there will be a tradeoff be- activities may be permissible. Institutions are encouraged to tween the use of questions to verify understanding and mini- elaborate these regulations to further protect the research par- mizing disruption. ticipants under their care, and to address other ethical concerns. Thus, it is likely that restrictions on Internet and other forms Guideline 4 of human subject research are tighter at some institutions than Protect the identities and confidentiality of online subjects. others. Thus researchers may find what is permissible in one As part of informed consent, subjects should be made aware of place may be disallowed in another either for ethical or practical the researcher’s intentions regarding the degree of revelation of reasons. In some cases it is necessary for the researcher to seek their identities, and should give permission for the use of both institutional permission when using the institution’s e-mail to names and pseudonyms. The strictest standards of confidential- contact or solicit employees, students, or other individuals for ity should be applied. Identities of subjects should be separated research. Institutional consent may be further needed when the from their responses wherever and whenever possible. research involves that institution. Below, the authors provide a tabular summary of their pro- Guideline 5 posed guidelines for conducting ethical online research: Practice disclosure. The researcher should disclose the pur- pose of his/her study, the methods of collecting data, and plans for analyzing and reporting data. If there are incentives for par- SUMMARY ticipation, they should be explained, and should not constitute Guideline 1. Internet research should conform to legal enticement or coercion. Rarely would Internet-based research- requirements. ers need to resort to deception to achieve their research goals Guideline 2. Public matter can be quoted or analyzed without (Frankel & Siang, 1999), so the use of deception in online re- consent under the following strict conditions (adapted from search should be avoided or kept to an absolute minimum. To Bruckman, 2002): • The information is publicly archived and readily available. the extent possible, researchers should follow the same stand- • No password is required to access the information. ards for debriefing subjects in online research as those for real- • The material is not sensitive in nature. world studies. In cases where a subject may elect to leave a site • No stated site policy prohibits the use of the material. prematurely, the debriefing frame should be a required part of Guideline 3. Gain informed consent without disrupting online the exit procedure. activity. Guideline 4. Protect the identities and confidentiality of online subjects. Guideline 6 Guideline 5. Practice disclosure. Use technological solutions to technology-caused problems Guideline 6. Use technological solutions to problems caused by such as electronic links to identity. Kraut (2003) suggests trans- technology such as electronic links to participants’ identities. mitting and storing identifiers separately from the data, in effect Guideline 7. Consult with the appropriate Institutional Review disconnecting the identifiers from the data, using session cook- Boards and follow their recommendations and directives. ies to tie together responses and storing them somewhere other Table 1. Summary of Proposed Guidelines for Ethical than on the same disk or file as the data, identifying the par- Internet Research ticipant only for the duration of the session, avoiding e-mailed responses which involve identifiers, and possibly even encrypt- ing the data. It is important to recognize that confidential data stored in networked commuters, especially in widely accessible Conclusion computer labs, may be at great risk for outside access, therefore storage on removable disks or CDs is preferable. The growing use of the Internet as a worldwide research It is generally recognized that in online survey research it is laboratory brings with it a number of practical, ethical, and le- better to e-mail a link to a web site where one can respond to gal challenges. Chief among these are the difficulty in obtaining the questionnaire in relative anonymity than it is to e-mail the truly informed consent, the protection of research participants’ questionnaire itself and require it to be returned by email with privacy and confidentiality, difficulty in verifying participants’ the commensurate links to identifiers. Commercial survey sites identities, difficulty in choosing ethically-correct approaches, are available that will post questionnaires for a fee. These serv- problems in obtaining representative samples, and difficulties ices vary in the degree to which anonymity and confidentiality in protecting subjects from potential harm and providing ap- are protected, so careful attention should be made to each site’s propriate debriefing. Additionally, difficulties regarding the per- privacy policies. ception of privacy and intellectual property currently obfuscate understanding of the best practices for ethical research and pro- Guideline 7 tection of subjects’ expectations of reasonable privacy. Consult with the appropriate Institutional Research Ethical codes for human subjects’ protection in an online en- Board(s) (IRB) and follow their recommendations and direc- vironment are in a state of flux, with standards currently being tives. IRB members vary in their knowledge of and sensitivity to developed simultaneously around the globe. As these standards online research issues. The online researcher should maintain are eventually integrated, the ethical issues should be clarified, two-way communication with the expedited reviewer(s) and and widely-accepted approaches for dealing with them should

39 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005) be forthcoming. In the interim, the authors propose a set of though basic ethical principles will still apply. Technology’s working guidelines that should suffice to ensure that online re- relatively rapid movement and evolution makes it necessary search is conducted ethically and lawfully. These guidelines in- for online researchers to stay abreast of advances in online re- clude consideration of what constitutes public matter that can search techniques and concomitant threats to privacy of human be accessed and researched without consent, gaining informed subjects. The protections of newer technologies should be em- consent in all other cases, protecting the privacy and confiden- ployed as they become available. The authors anticipate that as tiality of online subjects, practicing disclosure, using technology the virtual environment comes to resemble the real world and to address technology-created ethical issues, and gaining appro- is more thoroughly integrated into it, the distinctive nature of priate institutional permission for conducting the research. conducting research online will be lessened and online research Researchers should be aware of the evolutionary nature will come to resemble more and more the conduct of face-to- of technology. Today’s solutions may differ from tomorrow’s, face research.

Bibliography

Amber, D. (2004), “Online Research Still a Frontier,” The Scientist, Vol. Katz, J. (1972), Experimentation with Human Beings, Sage, New York. 14, No. 2, Available: http://www.the-scientist.com/yr2000/jan/ Kraut, R. (2003), “The ethics of online research”, Paper presented at the amber_p8_000124.html Annual Meeting of the American Psychological Society, Atlanta, American Association of University Professors (2000), “Protecting GA. Human Beings: Institutional Review Boards and Social Science Knobel, M. (2003), “Rants, ratings and representation: ethical issues in Research”, Author, Washington, DC. researching online social practices”, Education, Communication & American Psychological Association (1992), “Ethical Principles of Information, Vol. 3, No. 2, pp. 187-210. Psychologists and Code of Conduct”, Available: http://www.apa. National Institutes of Health, Office of Human Subjects Research org/ethics/code.html (1979), “The Belmont Report: Ethical principles and guidelines for Association of Internet Researchers (2001), “AOIR Ethics Working the protection of human subjects of research”, Available: http://ohsr. Committee—A Preliminary Report”, Available: http://aoir.org/ od.nih.gov/guidelines/belmont.html reports/ethics.html NESH (2001), “Guidelines for research ethics in the social sciences, law Buchanan, E. A. (2004), Readings in Virtual Research Ethics: Issues and and the humanities”, Available: http://www.etikkom.no/Etikkom/ Controversies, Information Science Publications, Hershey, PA. Etikkom/Engelsk/Publications/NESHguide Capurro, R. & Pingle, C. (2001), “Ethical Issues of Online Orne, M. T. (1962), “On the social of the psychological Communication Research”, available: http://www.nyu.edu/projects/ experiment: With particular reference to demand characteristics and nissenbaum/ethics_cap_full.html their implications”, American , Vol. 17, pp. 776–783. Denzin, N.K. (1999). “Cybertalk and the Method of Instances”, in Jones, Reips, U. (In Press), “The Web Experiment Method: Advantages, S. (Ed.), Doing Internet Research: Critical Issues and Methods for Disadvantages, and Solutions”, In Birnbaum, M. (Ed.), Psychology Examining the Net, Sage, Thousand Oaks. Experiments on the Internet, Academic Press, San Diego. Ess, C. & the AoIR Ethics Working Committee (2002), “Ethical Rosenthal, R., & Rosnow, R. L. (1975), The volunteer subject, Wiley, decision-making and Internet research: Recommendations from the New York. AoIR ethics working committee”, available: http://aoir.org/reports/ Sales, B.D. & Folkman S. (2000), Ethics in Human Subjects Research ethics.pdf with Human Participants. American Psychological Association, Federal Trade Commission (1998), “Children’s Online Privacy Protection Washington D.C. Act of 1998”, Available: http://www.ftc.gov/ogc/coppa1.htm U.S. Copyright Office (2003), “Copyright Law of the United States”, Federal Trade Commission (1999), “Gramm-Leach-Bliley Act of 1999”, Available: http://www.copyright.gov/title17/ Available: http://www.ftc.gov/privacy/glbact/ U.S. Department of Health and Human Services (2001), “Code of Frankel, M. S. & Siang, S. (1999), “Ethical and legal aspects of human Federal Regulations: Protection of Human Subjects”, subjects research on the Internet”, Available: http://www.aaas.org/ Available: http://www.hhs.gov/ohrp/humansubjects/guidance/ spp/dspp/sfrl/projects/intres/main.htm 45cfr46.htm Gravetter. F. & Gorzano, L. (2003), Research Methods for the Behavioral U.S. Department of Health and Human Services (2003), “Office for Sciences, Wadsworth, Belmont, CA. Civil Rights: Summary of the HIPAA Privacy Rule”, Available: Graziano, A. & Raulin, M. (2000), Research Methods: A Process of http://www.hhs.gov/ocr/privacysummary.pdf Inquiry (4th Ed.), Allyn & Bacon, Boston. Walther, J. B. (2001), “Internet Research Ethics: Research Ethics Humphreys, K., Winzelberg, A. & Klaw, E. (2000), “Psychologists' ethical in Internet-Enabled Research: Human Subjects Issues and responsibilities in Internet-based groups: issues, strategies, and a call Methodological Myopia”, Available: http://www.nyu.edu/projects/ for dialogue”, Professional Psychology, Research and Practice, Vol. 5, nissenbaum/ethics_wal_full.html pp. 493-496. Williams, K, Cheung, C. & Choi, W. (2000), “Cyberostracism: Effects Information Society Technologies Programme (2004), “The RESPECT of being ignored over the Internet”, Journal of Personality and Social project”, Available: http://www.respectproject.org/main/index.php Psychology, Vol. 79, No. 5, pp. 748-762.

40 http://ejbo.jyu.fi/ EJBO Electronic Journal of Business Ethics and Organization Studies Vol. 10, No. 1 (2005)

Larry A. Pace

Larry A. Pace is Associate Professor of Psychology at Louisiana Tech University. His research interests include statistics education, technology in education and research, and situational leadership.

Contact Information: Department of Psychology and Behavioral Sciences Louisiana Tech University Ruston, LA USA e-mail: [email protected] Tel: +1 318 257-4073 Fax: +1 318 257-3442

Mary M. Livingston

Mary Margaret Livingston is Professor of Psychology at Louisiana Tech University. Her research interests include health issues, ethics in research, gender-roles, and women’s issues.

41 http://ejbo.jyu.fi/