Abstract
As the process of creating and sharing data about ourselves becomes more prevalent, researchers have access to increasingly rich data about human behavior. Framed as a fictional paper published at some point in the not-so-distant future, this design fiction draws from current inquiry and debate into the ethics of using public data for research, and speculatively extends this conversation into even more robust and more personal data that could exist when we design new technologies in the future. By looking to how the precedents of today might impact the practices of tomorrow, we can consider how we might design policies, ethical guidelines, and technologies that are forward-thinking.
- Anita L Allen. 2003. Privacy Isn't Everything: Accountability As a Personal and Social Good . Alabama Law Review , Vol. 54 (2003), 1375--1391.Google Scholar
- Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury , and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2016), 3906--3918. https://doi.org/10.1145/2858036.2858096Google Scholar
Digital Library
- Alina Arseniev-Koehler, Hedwig Lee, Tyler McCormick, and Megan A. Moreno. 2016. #Proana: Pro-Eating Disorder Socialization on Twitter . Journal of Adolescent Health , Vol. 58, 6 (2016), 659--664. https://doi.org/10.1016/j.jadohealth.2016.02.012Google Scholar
- Patricia Aufderheide and Peter Jaszi. 2011. Reclaiming Fair Use: How to Put Balance Back Into Copyright. University of Chicago Press, Chicago, IL.Google Scholar
- John W. Ayers, Theodore L. Caputi, Camille Nebeker, and Mark Dredze. 2018. Don't quote me: reverse identification of research participants in social media studies . npj Digital Medicine , Vol. 1, 1 (2018), 29--30. https://doi.org/10.1038/s41746-018-0036--2Google Scholar
- S. Barocas and Helen Nissenbaum. 2014. Big data's end run around anonymity and consent . In Privacy, big data, and the public good: Frameworks for engagement, J. Lane, V. Stodden, S. Bender, and Helen Nissenbaum (Eds.). Cambridge University Press, Cambridge, UK, 44--75.Google Scholar
- Eric P. S. Baumer, June Ahn, Mei Bie, Elizabeth M. Bonsignore, Ahmet Brutecene, Oguz Turan Buruk, Tamara Clegg, Allison Druin, Florian Echtler, Daniel Gruen, Mona Leigh Guha, Chelsea Hordatt, Antonio Kruger, Shachar Maidenbaum, Meethu Malu, Brenna McNally, Michael Muller, Leyla Norooz, Juliet Norton, Oguzhan Ozcan, Donald J. Patterson, Andreas Riener, Steven I. Ross, Karen Rust, Johannes Schnoning, M. Six Silberman, Bill Tomlinson, and Jason Yip. 2014. CHI 2039: Speculative Research Visions . Extended Abstracts on Human Factors in Computing Systems (CHI'14) (2014), 761--769. https://doi.org/10.1145/2559206.2578864Google Scholar
Digital Library
- Julian Bleecker. 2009. Design Fiction: A Short Essay on Design, Science, Fact and Fiction . Near Future Laboratory March (2009), 4--97.Google Scholar
- Mark Blythe. 2014. Research through design fiction. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 703--712. https://doi.org/10.1145/2556288.2557098Google Scholar
Digital Library
- J.C.H. Bromseth. 2002. Public places - public activities? Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts . In Resesarching ICTs in Context , , A. Morrison (Ed.). University of Oslo, 33--61.Google Scholar
- Amy Bruckman. 2014. Research Ethics and HCI . In Ways of Knowing in HCI , , Wendy A. Kellogg and Judith S. Olson (Eds.). Springer, 449--468.Google Scholar
- Emanuelle Burton, Judy Goldsmith, and Nicholas Mattei. 2018. How to Teach Computer Ethics through Science Fiction . Commun. ACM , Vol. 61, 8 (2018), 54--64. https://doi.org/10.1145/3154485Google Scholar
Digital Library
- Stevie Chancellor, Michael L Birnbaum, Eric D Caine, Vincent M B Silenzio, and Munmun De Choudhury. 2019. A Taxonomy of Ethical Tensions in Inferring Mental Health States from Social Media. In Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT*) . Atlanta, GA.Google Scholar
Digital Library
- Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M Jose. 2016. Understanding Lifelog Sharing Preferences of Lifeloggers. In Proceedings of the ACM OzCHI Conference . https://doi.org/10.1145/3010915.3011852Google Scholar
Digital Library
- Paul Coulton, Joseph Lindley, Miriam Sturdee, and Michael Stead. 2017. Design Fiction as World Building . Proceedings of the Research Through Design Conference (2017), 1--16. https://doi.org/10.6084/m9.figshare.4746964.ImageGoogle Scholar
- Kate Crawford and Megan Finn. 2015. The limits of crisis data: analytical and ethical challenges of using social and mobile data to understand disasters . GeoJournal , Vol. 80, 4 (2015), 491--502.Google Scholar
Cross Ref
- Masashi Crete-Nishihata, Ronald M. Baecker, Michael Massimi, Deborah Ptak, Rachelle Campigotto, Liam D. Kaufman, Adam M. Brickman, Gary R. Turner, Joshua R. Steinerman, and Sandra E. Black. 2012. Reconstructing the past: Personal memory technologies are not just personal and not just for memory . Human-Computer Interaction , Vol. 27, 1--2 (2012), 92--123. https://doi.org/10.1080/07370024.2012.656062Google Scholar
- Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Perez-Quinones, Meredith M. Skeels, and Tiziana Catarci. 2006. Digital Memories in an Era of Ubiquitous Computing and Abundant Storage . Commun. ACM , Vol. 49, 1 (2006), 45--50.Google Scholar
Digital Library
- Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 2377--2386. https://doi.org/10.1145/2556288.2557352Google Scholar
Digital Library
- Elizabeth Dubois, Anatoliy Gruzd, and Jenna Jacobson. 2018. Journalists ' Use of Social Media to Infer Public Opinion : The Citizens ' Perspective . Social Science Computer Review (2018), 1--18. https://doi.org/10.1177/0894439318791527Google Scholar
- James M Dubois, Michelle Strait, and Heidi Walsh. 2017. Is It Time to Share Qualitative Research Data ? Qualitative Psychology , Vol. 5, 3 (2017), 380--393.Google Scholar
Cross Ref
- Brianna Dym and Casey Fiesler. 2018. Vulnerable and Online: Fandom's Case for Stronger Privacy Norms and Tools. In Companion of the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). Jersey City, NJ, 329--332. https://doi.org/10.1145/3272973.3274089Google Scholar
Digital Library
- Dave Eggers. 2013. The Circle. Random House, New York, NY.Google Scholar
- Motahhare Eslami, Sneha R Krishna Kumaran, Christian Sandvig, and Karrie Karahalios. 2018. Communicating Algorithmic Process in Online Behavioral Advertising . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2018), 432:1--13. https://doi.org/10.1145/3173574.3174006Google Scholar
Digital Library
- Mylynn Felt. 2016. Social media and the social sciences: How researchers employ Big Data analytics . Big Data & Society , Vol. 3, 1 (2016).Google Scholar
Cross Ref
- Md Sadek Ferdous, Soumyadeb Chowdhury, and Joemon M. Jose. 2017. Analysing privacy in visual lifelogging . Pervasive and Mobile Computing , Vol. 40 (2017), 430--449. https://doi.org/10.1016/j.pmcj.2017.03.003Google Scholar
Digital Library
- Casey Fiesler, Michaelanne Dye, Jessica Feuston, Chaya Hiruncharoenvate, C. J. Hutto, Shannon Morrison, Amy S. Bruckman, Munmun De Choudhury, and Eric Gilbert. 2017. What (or who) is public? Privacy settings and social media content sharing. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW). 567--580.Google Scholar
- Casey Fiesler and Blake Hallinan. 2018. "We Are the Product": Public Reactions to Data Sharing and Privacy Controversies in the Media. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI) .Google Scholar
Digital Library
- Casey Fiesler and Nicholas Proferes. 2018. "Participant" Perceptions of Twitter Research Ethics . Social MediaGoogle Scholar
- Society , Vol. 4, 1 (2018).Google Scholar
- Jeana H. Frost and Michael P. Massagli. 2008. Social uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data . Journal of Medical Internet Research , Vol. 10, 3 (2008). https://doi.org/10.2196/jmir.1053Google Scholar
Cross Ref
- Sidney Fussell. 2019. You No Longer Own Your Face . The Atlantic (2019). https://www.theatlantic.com/technology/archive/2019/06/universities-record-students-campuses-research/592537/Google Scholar
- Cathal Gurrin, Alan F. Smeaton, and Aiden R. Doherty. 2014. LifeLogging: Personal Big Data . Foundations and Trends® in Information Retrieval , Vol. 8, 1 (2014), 1--125. https://doi.org/10.1561/1500000033Google Scholar
- Blake Hallinan, Jed R Brubaker, and Casey Fiesler. 2019. Unexpected expectations: Public reaction to the Facebook emotional contagion study . New Media & Society (2019), 146144481987694. https://doi.org/10.1177/1461444819876944Google Scholar
- Ruth Halperin and Yuval Dror. 2015. Privacy and the Digital Generation Gap: Myth and Reality. In Proceedings of the Mediterranean Conference on Information Systems (MCIS). Samos, Greece, 1--14.Google Scholar
- Brent Hecht. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process . ACM Future of Computing Academy Blog (2018). https://acm-fca.org/2018/03/29/negativeimpacts/Google Scholar
- Anna Lauren Hoffmann and Anne Jones. 2016. Recasting Justice for Internet and Online Industry Research Ethics . In Internet Research Ethics for the Social Age: New Cases and Challenges, Michael Zimmer and Katharina E Kinder-kurlanda (Eds.). Peter Lang, Bern, Switzerland, 3--18.Google Scholar
- Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras . Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '14 Adjunct (2014), 571--582. https://doi.org/10.1145/2632048.2632079Google Scholar
Digital Library
- Jane C. Hu. 2019. Should researchers be allowed to use YouTube videos and tweets? https://slate.com/technology/2019/06/youtube-twitter-irb-human-subjects-research-social-media-mining.htmlGoogle Scholar
- Xiaolei Huang, Linzi Xing, Jed R. Brubaker, and Michael J. Paul. 2017. Exploring timelines of confirmed suicide incidents through social media . Proceedings of the IEEE International Conference on Healthcare Informatics (ICHI) (2017), 470--477.Google Scholar
- Luke Hutton and Tristan Henderson. 2015. "I Didn't Sign Up for This!": Informed Consent in Social Media Research. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM) . 178--187. https://research-repository.st-andrews.ac.uk/handle/10023/6691Google Scholar
- Krissi M. Jimroglou. 2002. A Cameria With a View: JenniCAM, Visual Representation, and Cyborg Subjectivity . Information, Communication & Society , Vol. 2, 4 (2002), 439--453. https://doi.org/10.1080/136911899359493Google Scholar
Cross Ref
- Paul Kelly, Simon J. Marshall, Hannah Badland, Jacqueline Kerr, Melody Oliver, Aiden R. Doherty, and Charlie Foster. 2013. An ethical framework for automated, wearable cameras in health behavior research . American Journal of Preventive Medicine , Vol. 44, 3 (2013), 314--319. https://doi.org/10.1016/j.amepre.2012.11.006Google Scholar
Cross Ref
- Julie A. Kientz, Rosa I. Arriaga, and Gregory D. Abowd. 2009. Baby Steps: Evaluation of a System to Support Record-Keeping for Parents of Young Children. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Boston, MA, 1713--1722. https://doi.org/10.1145/1518701.1518965Google Scholar
- Gary King. 2011. Ensuring the data-rich future of the social sciences . Science , Vol. 331, 6018 (2011), 719--721. https://doi.org/10.1126/science.1197872Google Scholar
Cross Ref
- Ben Kirman, John Conor Linehan, Shaun Fitz Lawson, and Dan O'Hara. 2013. CHI and the Future Robot Enslavement of Humankind; A Retrospective. In Extended Abstracts on Human Factors in Computing Systems (CHI). Paris, France.Google Scholar
- Marion Koelle, Matthias Kranz, and M Andreas. 2015. Don't look at me that way! Understanding User Attitudes Towards Data Glasses Usage . Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI) (2015), 362--372. https://doi.org/10.1145/2785830.2785842Google Scholar
Digital Library
- Marina Kogan, Leysia Palen, and Kenneth M. Anderson. 2016. Think local, Retweet global: Retweeting by the geographically-vulnerable during Hurricane Sandy. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW) . 981--993.Google Scholar
- Sze Yin Kwok, Anya Skatova, Victoria Shipp, and Andy Crabtree. 2015. The Ethical Challenges of Experience Sampling Using Wearable Cameras. In Extended Abstracts on Mobile HCI. Copenhagen, Denmark, 1054--1057. https://doi.org/10.1145/2786567.2794325Google Scholar
- Ohbyung Kwon and Yixing Wen. 2010. An empirical study of the factors affecting social network service use . Computers in Human Behavior , Vol. 26, 2 (2010), 254--263. https://doi.org/10.1016/j.chb.2009.04.011Google Scholar
Digital Library
- Alex Lamb, Michael J. Paul, and Mark Dredze. 2013. Separating fact from fear: Tracking flu infections on Twitter . HLT-NAACL (2013), 789--795.Google Scholar
- Matthew L Lee and Anind K Dey. 2007. Providing good memory cues for people with episodic memory impairment . Proceedings of the International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS) (2007), 131. https://doi.org/10.1145/1296843.1296867Google Scholar
Digital Library
- Sam Levin. 2017. New AI can guess whether you're gay or straight from a photograph . The Guardian (2017). https://www.theguardian.com/technology/2017/sep/07/new-artificial-intelligence-can-tell-whether-youre-gay-or-straight-from-a-photographGoogle Scholar
- Joseph Lindley. 2015. Operationalising Design Fiction for Ethical Computing . ACM SIGCAS Computers and Society , Vol. 45, 3 (2015), 79--83.Google Scholar
Digital Library
- Joseph Lindley, Paul Coulton, and Miriam Sturdee. 2017. Implications for Adoption. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Denver, CO, 265--277. https://doi.org/10.1145/3025453.3025742Google Scholar
Digital Library
- Conor Linehan and Ben Kirman. 2014. Alternate Endings : Using Fiction . Extended Abstracts of the ACM CHI Conference on Human Factors in Computing Systems (2014), 45--48.Google Scholar
- Jacob Metcalf and Kate Crawford. 2016. Where are human subjects in big data research? The emerging ethics divide . Big Data and Society , Vol. 3, 1 (2016). https://doi.org/10.1177/2053951716650211Google Scholar
Cross Ref
- Jude Mikal, Samantha Hurst, and Mike Conway. 2016. Ethical issues in using Twitter for population-level depression monitoring: a qualitative study . BMC Medical Ethics , Vol. 17, 1 (2016), 22. https://doi.org/10.1186/s12910-016-0105--5Google Scholar
Cross Ref
- Tze Ming Mok, Flora Cornish, and Jen Tarr. 2015. Too Much Information: Visual Research Ethics in the Age of Wearable Cameras . Integrative Psychological and Behavioral Science , Vol. 49, 2 (2015), 309--322. https://doi.org/10.1007/s12124-014--9289--8Google Scholar
Cross Ref
- Kieron O'Hara, Mischa M. Tuffield, and Nigel Shadbolt. 2008. Lifelogging: Privacy and empowerment with memories for life . Identity in the Information Society , Vol. 1, 1 (2008), 155--172. https://doi.org/10.1007/s12394-009-0008--4Google Scholar
Cross Ref
- Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: Real-time event detection by social sensors . Proceedings of the International Conference on World Wide Web (WWW) (2010), 851--860.Google Scholar
Digital Library
- Sara Shaw and Geraldine Barrett. 2006. Research governance: Regulating risk and reducing harm? Journal of the Royal Society of Medicine , Vol. 99, 1 (2006), 14--19. https://doi.org/10.1258/jrsm.99.1.14Google Scholar
Cross Ref
- A. Signorini, A.M. Segre, and P.M. Polgreen. 2011. The use of Twitter to track levels of disease activity and public concern in the US during the influenza A H1N1 pandemic . PLoS ONE , Vol. 6, 5 (2011).Google Scholar
- Natasha Singer. 2015. Love in the Time of Twitter . https://bits.blogs.nytimes.com/2015/02/13/love-in-the-times-of-twitter/Google Scholar
- Robert Soden, Michael Skirpan, Casey Fiesler, Zahra Ashktorab, Eric Baumer, Mark Blythe, and Jasmine Jones. 2019. CHI4EVIL: Creative Speculation On the Negative Impacts of HCI Research. In Extended Abstracts on Human Factors in Computing Systems (CHI EA) .Google Scholar
- Luke Stark. 2018. Algorithmic psychometrics and the scalable subject . Social Studies of Science , Vol. 48, 2 (2018), 204--231. https://doi.org/10.1177/0306312718772094Google Scholar
Cross Ref
- United States. 1978. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. Technical Report. The Commission, Bethesda, MD.Google Scholar
- Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook . Journal of Privacy and Confidentiality , Vol. 4, 2 (2013), 7--41. http://repository.cmu.edu/jpc/vol4/iss2/2/Google Scholar
Cross Ref
- Robert Templeman, Mohammed Korayem, David Crandall, and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces . Proceedings of the Network and Distributed System Security (NDSS) Symposium February (2014), 23--26. https://doi.org/10.14722/ndss.2014.23014Google Scholar
Cross Ref
- Edison Thomaz, Aman Parnami, Jonathan Bidwell, Irfan Essa, and Gregory D. Abowd. 2013. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras . Proceedings of the 2013 ACM International Conference on Pervasive and Ubiquitous Computing (UbiComp) (2013), 739. https://doi.org/10.1145/2493432.2493509Google Scholar
- Elizabeth Tucker. 2014. The Endangered Child: Choking and Fainting Games in the Online Underground of YouTube . Children's Folklore Review , Vol. 36 (2014), 19--34.Google Scholar
- Jessica Vitak, Nicholas Proferes, Katie Shilton, and Zahra Ashktorab. 2017. Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards . Journal of Empirical Research on Human Research Ethics , Vol. 12, 5 (2017), 372--382. https://doi.org/10.1177/1556264617725200Google Scholar
- Jessica Vitak, Katie Shilton, and Z. Ashktorab. 2016. Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. In Proceedings of the ACM CSCW Conference on Computer Supported Cooperative Work & Social Computing. San Franciso, CA, 941--953.Google Scholar
- Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew Williams, Rob Procter, Omer Rana, and Pete Burnap. 2017. The Ethical Challenges of Publishing Twitter Data for Research Dissemination . Proceedings of the ACM on Web Science Conference (WebSci) (2017), 339--348. https://doi.org/10.1145/3091478.3091489Google Scholar
Digital Library
- Daniel Weiz, Gagat Anad, and Claus-Peter H. Ernst. 2016. The Influence of Subjective Norm on the Usage of Smartglasses . In The Drivers of Wearable Device Usage , , Claus-Peter H. Ernst (Ed.). Springer, 1--11.Google Scholar
- Katrin Weller and Katharina E Kinder-kurlanda. 2015. Uncovering the Challenges in Collection, Sharing and Documentation : The Hidden Data of Social Media Research? Proceedings of the Ninth International AAAI Conference on Web and Social Media 2014 (2015), 28--37.Google Scholar
- Lindy West. 2015. What happened when I confronted my cruelest troll . The Guardian (2015). https://www.theguardian.com/society/2015/feb/02/what-happened-confronted-cruellest-troll-lindy-westGoogle Scholar
- Richmond Y. Wong, Deirdre K. Mulligan, Ellen Van Wyk , James Pierce, and John Chuang. 2017a. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks . Proceedings of the ACM on Human-Computer Interaction , Vol. 1, CSCW (2017), 111:1--27. https://doi.org/10.1145/3134746Google Scholar
Digital Library
- Richmond Y. Wong, Ellen Van Wyk, and James Pierce. 2017b. Real-fictional entanglements: Using science fiction and design fiction to interrogate sensing technologies . Proceedings of the ACM DIS Conference on Designing Interactive Systems (2017), 567--579. https://doi.org/10.1145/3064663.3064682Google Scholar
Digital Library
- Sean D. Young, Caitlin Rivers, and Bryan Lewis. 2014. Methods of using real-time social media technologies for detection and remote monitoring of HIV outcomes . Preventive Medicine , Vol. 63 (2014), 112--115.Google Scholar
Cross Ref
- Michael Zimmer. 2010. "But the data is already public": On the ethics of research in Facebook . Ethics and Information Technology , Vol. 12, 4 (2010), 313--325. https://doi.org/10.1007/s10676-010--9227--5Google Scholar
Digital Library
- Michael Zimmer. 2016. OKCupid Study Reveals the Perils of Big Data Science . https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-data-science/Google Scholar
- Michael Zimmer and Nicholas John Proferes. 2014. A Topology of Twitter Research: Disciplines, Methods, and Ethics . Aslib Journal of Information Management , Vol. 66, 3 (2014), 250--261.Google Scholar
Cross Ref
Index Terms
Ethical Considerations for Research Involving (Speculative) Public Data
Recommendations
Framing ethical issues associated with the UK COVID-19 contact tracing app: exceptionalising and narrowing the public ethics debate
AbstractThis paper explores ethical debates associated with the UK COVID-19 contact tracing app that occurred in the public news media and broader public policy, and in doing so, takes ethics debate as an object for sociological study. The research ...
What is special about the ethical issuesin online research?
In the analysis of the ethical problems of online research, there is much to be learned from the work that has already been done on research ethics in the social sciences and the humanities. I discuss the structure of norms in the Norwegian ethical guidelines ...
Ethical pluralism and global information ethics
A global information ethics that seeks to avoid imperialistic homogenization must conjoin shared norms while simultaneously preserving the irreducible differences between cultures and peoples. I argue that a global information ethics may fulfill these ...






Comments