skip to main content
research-article
Public Access

Ethical Considerations for Research Involving (Speculative) Public Data

Published:05 December 2019Publication History
Skip Abstract Section

Abstract

As the process of creating and sharing data about ourselves becomes more prevalent, researchers have access to increasingly rich data about human behavior. Framed as a fictional paper published at some point in the not-so-distant future, this design fiction draws from current inquiry and debate into the ethics of using public data for research, and speculatively extends this conversation into even more robust and more personal data that could exist when we design new technologies in the future. By looking to how the precedents of today might impact the practices of tomorrow, we can consider how we might design policies, ethical guidelines, and technologies that are forward-thinking.

References

  1. Anita L Allen. 2003. Privacy Isn't Everything: Accountability As a Personal and Social Good . Alabama Law Review , Vol. 54 (2003), 1375--1391.Google ScholarGoogle Scholar
  2. Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury , and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2016), 3906--3918. https://doi.org/10.1145/2858036.2858096Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alina Arseniev-Koehler, Hedwig Lee, Tyler McCormick, and Megan A. Moreno. 2016. #Proana: Pro-Eating Disorder Socialization on Twitter . Journal of Adolescent Health , Vol. 58, 6 (2016), 659--664. https://doi.org/10.1016/j.jadohealth.2016.02.012Google ScholarGoogle Scholar
  4. Patricia Aufderheide and Peter Jaszi. 2011. Reclaiming Fair Use: How to Put Balance Back Into Copyright. University of Chicago Press, Chicago, IL.Google ScholarGoogle Scholar
  5. John W. Ayers, Theodore L. Caputi, Camille Nebeker, and Mark Dredze. 2018. Don't quote me: reverse identification of research participants in social media studies . npj Digital Medicine , Vol. 1, 1 (2018), 29--30. https://doi.org/10.1038/s41746-018-0036--2Google ScholarGoogle Scholar
  6. S. Barocas and Helen Nissenbaum. 2014. Big data's end run around anonymity and consent . In Privacy, big data, and the public good: Frameworks for engagement, J. Lane, V. Stodden, S. Bender, and Helen Nissenbaum (Eds.). Cambridge University Press, Cambridge, UK, 44--75.Google ScholarGoogle Scholar
  7. Eric P. S. Baumer, June Ahn, Mei Bie, Elizabeth M. Bonsignore, Ahmet Brutecene, Oguz Turan Buruk, Tamara Clegg, Allison Druin, Florian Echtler, Daniel Gruen, Mona Leigh Guha, Chelsea Hordatt, Antonio Kruger, Shachar Maidenbaum, Meethu Malu, Brenna McNally, Michael Muller, Leyla Norooz, Juliet Norton, Oguzhan Ozcan, Donald J. Patterson, Andreas Riener, Steven I. Ross, Karen Rust, Johannes Schnoning, M. Six Silberman, Bill Tomlinson, and Jason Yip. 2014. CHI 2039: Speculative Research Visions . Extended Abstracts on Human Factors in Computing Systems (CHI'14) (2014), 761--769. https://doi.org/10.1145/2559206.2578864Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Julian Bleecker. 2009. Design Fiction: A Short Essay on Design, Science, Fact and Fiction . Near Future Laboratory March (2009), 4--97.Google ScholarGoogle Scholar
  9. Mark Blythe. 2014. Research through design fiction. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 703--712. https://doi.org/10.1145/2556288.2557098Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J.C.H. Bromseth. 2002. Public places - public activities? Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts . In Resesarching ICTs in Context , , A. Morrison (Ed.). University of Oslo, 33--61.Google ScholarGoogle Scholar
  11. Amy Bruckman. 2014. Research Ethics and HCI . In Ways of Knowing in HCI , , Wendy A. Kellogg and Judith S. Olson (Eds.). Springer, 449--468.Google ScholarGoogle Scholar
  12. Emanuelle Burton, Judy Goldsmith, and Nicholas Mattei. 2018. How to Teach Computer Ethics through Science Fiction . Commun. ACM , Vol. 61, 8 (2018), 54--64. https://doi.org/10.1145/3154485Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Stevie Chancellor, Michael L Birnbaum, Eric D Caine, Vincent M B Silenzio, and Munmun De Choudhury. 2019. A Taxonomy of Ethical Tensions in Inferring Mental Health States from Social Media. In Proceedings of the ACM Conference on Fairness, Accountability, and Transparency (FAT*) . Atlanta, GA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M Jose. 2016. Understanding Lifelog Sharing Preferences of Lifeloggers. In Proceedings of the ACM OzCHI Conference . https://doi.org/10.1145/3010915.3011852Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Paul Coulton, Joseph Lindley, Miriam Sturdee, and Michael Stead. 2017. Design Fiction as World Building . Proceedings of the Research Through Design Conference (2017), 1--16. https://doi.org/10.6084/m9.figshare.4746964.ImageGoogle ScholarGoogle Scholar
  16. Kate Crawford and Megan Finn. 2015. The limits of crisis data: analytical and ethical challenges of using social and mobile data to understand disasters . GeoJournal , Vol. 80, 4 (2015), 491--502.Google ScholarGoogle ScholarCross RefCross Ref
  17. Masashi Crete-Nishihata, Ronald M. Baecker, Michael Massimi, Deborah Ptak, Rachelle Campigotto, Liam D. Kaufman, Adam M. Brickman, Gary R. Turner, Joshua R. Steinerman, and Sandra E. Black. 2012. Reconstructing the past: Personal memory technologies are not just personal and not just for memory . Human-Computer Interaction , Vol. 27, 1--2 (2012), 92--123. https://doi.org/10.1080/07370024.2012.656062Google ScholarGoogle Scholar
  18. Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Perez-Quinones, Meredith M. Skeels, and Tiziana Catarci. 2006. Digital Memories in an Era of Ubiquitous Computing and Abundant Storage . Commun. ACM , Vol. 49, 1 (2006), 45--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 2377--2386. https://doi.org/10.1145/2556288.2557352Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Elizabeth Dubois, Anatoliy Gruzd, and Jenna Jacobson. 2018. Journalists ' Use of Social Media to Infer Public Opinion : The Citizens ' Perspective . Social Science Computer Review (2018), 1--18. https://doi.org/10.1177/0894439318791527Google ScholarGoogle Scholar
  21. James M Dubois, Michelle Strait, and Heidi Walsh. 2017. Is It Time to Share Qualitative Research Data ? Qualitative Psychology , Vol. 5, 3 (2017), 380--393.Google ScholarGoogle ScholarCross RefCross Ref
  22. Brianna Dym and Casey Fiesler. 2018. Vulnerable and Online: Fandom's Case for Stronger Privacy Norms and Tools. In Companion of the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). Jersey City, NJ, 329--332. https://doi.org/10.1145/3272973.3274089Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Dave Eggers. 2013. The Circle. Random House, New York, NY.Google ScholarGoogle Scholar
  24. Motahhare Eslami, Sneha R Krishna Kumaran, Christian Sandvig, and Karrie Karahalios. 2018. Communicating Algorithmic Process in Online Behavioral Advertising . Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (2018), 432:1--13. https://doi.org/10.1145/3173574.3174006Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Mylynn Felt. 2016. Social media and the social sciences: How researchers employ Big Data analytics . Big Data & Society , Vol. 3, 1 (2016).Google ScholarGoogle ScholarCross RefCross Ref
  26. Md Sadek Ferdous, Soumyadeb Chowdhury, and Joemon M. Jose. 2017. Analysing privacy in visual lifelogging . Pervasive and Mobile Computing , Vol. 40 (2017), 430--449. https://doi.org/10.1016/j.pmcj.2017.03.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Casey Fiesler, Michaelanne Dye, Jessica Feuston, Chaya Hiruncharoenvate, C. J. Hutto, Shannon Morrison, Amy S. Bruckman, Munmun De Choudhury, and Eric Gilbert. 2017. What (or who) is public? Privacy settings and social media content sharing. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW). 567--580.Google ScholarGoogle Scholar
  28. Casey Fiesler and Blake Hallinan. 2018. "We Are the Product": Public Reactions to Data Sharing and Privacy Controversies in the Media. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI) .Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Casey Fiesler and Nicholas Proferes. 2018. "Participant" Perceptions of Twitter Research Ethics . Social MediaGoogle ScholarGoogle Scholar
  30. Society , Vol. 4, 1 (2018).Google ScholarGoogle Scholar
  31. Jeana H. Frost and Michael P. Massagli. 2008. Social uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data . Journal of Medical Internet Research , Vol. 10, 3 (2008). https://doi.org/10.2196/jmir.1053Google ScholarGoogle ScholarCross RefCross Ref
  32. Sidney Fussell. 2019. You No Longer Own Your Face . The Atlantic (2019). https://www.theatlantic.com/technology/archive/2019/06/universities-record-students-campuses-research/592537/Google ScholarGoogle Scholar
  33. Cathal Gurrin, Alan F. Smeaton, and Aiden R. Doherty. 2014. LifeLogging: Personal Big Data . Foundations and Trends® in Information Retrieval , Vol. 8, 1 (2014), 1--125. https://doi.org/10.1561/1500000033Google ScholarGoogle Scholar
  34. Blake Hallinan, Jed R Brubaker, and Casey Fiesler. 2019. Unexpected expectations: Public reaction to the Facebook emotional contagion study . New Media & Society (2019), 146144481987694. https://doi.org/10.1177/1461444819876944Google ScholarGoogle Scholar
  35. Ruth Halperin and Yuval Dror. 2015. Privacy and the Digital Generation Gap: Myth and Reality. In Proceedings of the Mediterranean Conference on Information Systems (MCIS). Samos, Greece, 1--14.Google ScholarGoogle Scholar
  36. Brent Hecht. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process . ACM Future of Computing Academy Blog (2018). https://acm-fca.org/2018/03/29/negativeimpacts/Google ScholarGoogle Scholar
  37. Anna Lauren Hoffmann and Anne Jones. 2016. Recasting Justice for Internet and Online Industry Research Ethics . In Internet Research Ethics for the Social Age: New Cases and Challenges, Michael Zimmer and Katharina E Kinder-kurlanda (Eds.). Peter Lang, Bern, Switzerland, 3--18.Google ScholarGoogle Scholar
  38. Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras . Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '14 Adjunct (2014), 571--582. https://doi.org/10.1145/2632048.2632079Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Jane C. Hu. 2019. Should researchers be allowed to use YouTube videos and tweets? https://slate.com/technology/2019/06/youtube-twitter-irb-human-subjects-research-social-media-mining.htmlGoogle ScholarGoogle Scholar
  40. Xiaolei Huang, Linzi Xing, Jed R. Brubaker, and Michael J. Paul. 2017. Exploring timelines of confirmed suicide incidents through social media . Proceedings of the IEEE International Conference on Healthcare Informatics (ICHI) (2017), 470--477.Google ScholarGoogle Scholar
  41. Luke Hutton and Tristan Henderson. 2015. "I Didn't Sign Up for This!": Informed Consent in Social Media Research. In Proceedings of the International AAAI Conference on Web and Social Media (ICWSM) . 178--187. https://research-repository.st-andrews.ac.uk/handle/10023/6691Google ScholarGoogle Scholar
  42. Krissi M. Jimroglou. 2002. A Cameria With a View: JenniCAM, Visual Representation, and Cyborg Subjectivity . Information, Communication & Society , Vol. 2, 4 (2002), 439--453. https://doi.org/10.1080/136911899359493Google ScholarGoogle ScholarCross RefCross Ref
  43. Paul Kelly, Simon J. Marshall, Hannah Badland, Jacqueline Kerr, Melody Oliver, Aiden R. Doherty, and Charlie Foster. 2013. An ethical framework for automated, wearable cameras in health behavior research . American Journal of Preventive Medicine , Vol. 44, 3 (2013), 314--319. https://doi.org/10.1016/j.amepre.2012.11.006Google ScholarGoogle ScholarCross RefCross Ref
  44. Julie A. Kientz, Rosa I. Arriaga, and Gregory D. Abowd. 2009. Baby Steps: Evaluation of a System to Support Record-Keeping for Parents of Young Children. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Boston, MA, 1713--1722. https://doi.org/10.1145/1518701.1518965Google ScholarGoogle Scholar
  45. Gary King. 2011. Ensuring the data-rich future of the social sciences . Science , Vol. 331, 6018 (2011), 719--721. https://doi.org/10.1126/science.1197872Google ScholarGoogle ScholarCross RefCross Ref
  46. Ben Kirman, John Conor Linehan, Shaun Fitz Lawson, and Dan O'Hara. 2013. CHI and the Future Robot Enslavement of Humankind; A Retrospective. In Extended Abstracts on Human Factors in Computing Systems (CHI). Paris, France.Google ScholarGoogle Scholar
  47. Marion Koelle, Matthias Kranz, and M Andreas. 2015. Don't look at me that way! Understanding User Attitudes Towards Data Glasses Usage . Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI) (2015), 362--372. https://doi.org/10.1145/2785830.2785842Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Marina Kogan, Leysia Palen, and Kenneth M. Anderson. 2016. Think local, Retweet global: Retweeting by the geographically-vulnerable during Hurricane Sandy. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW) . 981--993.Google ScholarGoogle Scholar
  49. Sze Yin Kwok, Anya Skatova, Victoria Shipp, and Andy Crabtree. 2015. The Ethical Challenges of Experience Sampling Using Wearable Cameras. In Extended Abstracts on Mobile HCI. Copenhagen, Denmark, 1054--1057. https://doi.org/10.1145/2786567.2794325Google ScholarGoogle Scholar
  50. Ohbyung Kwon and Yixing Wen. 2010. An empirical study of the factors affecting social network service use . Computers in Human Behavior , Vol. 26, 2 (2010), 254--263. https://doi.org/10.1016/j.chb.2009.04.011Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Alex Lamb, Michael J. Paul, and Mark Dredze. 2013. Separating fact from fear: Tracking flu infections on Twitter . HLT-NAACL (2013), 789--795.Google ScholarGoogle Scholar
  52. Matthew L Lee and Anind K Dey. 2007. Providing good memory cues for people with episodic memory impairment . Proceedings of the International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS) (2007), 131. https://doi.org/10.1145/1296843.1296867Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Sam Levin. 2017. New AI can guess whether you're gay or straight from a photograph . The Guardian (2017). https://www.theguardian.com/technology/2017/sep/07/new-artificial-intelligence-can-tell-whether-youre-gay-or-straight-from-a-photographGoogle ScholarGoogle Scholar
  54. Joseph Lindley. 2015. Operationalising Design Fiction for Ethical Computing . ACM SIGCAS Computers and Society , Vol. 45, 3 (2015), 79--83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Joseph Lindley, Paul Coulton, and Miriam Sturdee. 2017. Implications for Adoption. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Denver, CO, 265--277. https://doi.org/10.1145/3025453.3025742Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Conor Linehan and Ben Kirman. 2014. Alternate Endings : Using Fiction . Extended Abstracts of the ACM CHI Conference on Human Factors in Computing Systems (2014), 45--48.Google ScholarGoogle Scholar
  57. Jacob Metcalf and Kate Crawford. 2016. Where are human subjects in big data research? The emerging ethics divide . Big Data and Society , Vol. 3, 1 (2016). https://doi.org/10.1177/2053951716650211Google ScholarGoogle ScholarCross RefCross Ref
  58. Jude Mikal, Samantha Hurst, and Mike Conway. 2016. Ethical issues in using Twitter for population-level depression monitoring: a qualitative study . BMC Medical Ethics , Vol. 17, 1 (2016), 22. https://doi.org/10.1186/s12910-016-0105--5Google ScholarGoogle ScholarCross RefCross Ref
  59. Tze Ming Mok, Flora Cornish, and Jen Tarr. 2015. Too Much Information: Visual Research Ethics in the Age of Wearable Cameras . Integrative Psychological and Behavioral Science , Vol. 49, 2 (2015), 309--322. https://doi.org/10.1007/s12124-014--9289--8Google ScholarGoogle ScholarCross RefCross Ref
  60. Kieron O'Hara, Mischa M. Tuffield, and Nigel Shadbolt. 2008. Lifelogging: Privacy and empowerment with memories for life . Identity in the Information Society , Vol. 1, 1 (2008), 155--172. https://doi.org/10.1007/s12394-009-0008--4Google ScholarGoogle ScholarCross RefCross Ref
  61. Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: Real-time event detection by social sensors . Proceedings of the International Conference on World Wide Web (WWW) (2010), 851--860.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Sara Shaw and Geraldine Barrett. 2006. Research governance: Regulating risk and reducing harm? Journal of the Royal Society of Medicine , Vol. 99, 1 (2006), 14--19. https://doi.org/10.1258/jrsm.99.1.14Google ScholarGoogle ScholarCross RefCross Ref
  63. A. Signorini, A.M. Segre, and P.M. Polgreen. 2011. The use of Twitter to track levels of disease activity and public concern in the US during the influenza A H1N1 pandemic . PLoS ONE , Vol. 6, 5 (2011).Google ScholarGoogle Scholar
  64. Natasha Singer. 2015. Love in the Time of Twitter . https://bits.blogs.nytimes.com/2015/02/13/love-in-the-times-of-twitter/Google ScholarGoogle Scholar
  65. Robert Soden, Michael Skirpan, Casey Fiesler, Zahra Ashktorab, Eric Baumer, Mark Blythe, and Jasmine Jones. 2019. CHI4EVIL: Creative Speculation On the Negative Impacts of HCI Research. In Extended Abstracts on Human Factors in Computing Systems (CHI EA) .Google ScholarGoogle Scholar
  66. Luke Stark. 2018. Algorithmic psychometrics and the scalable subject . Social Studies of Science , Vol. 48, 2 (2018), 204--231. https://doi.org/10.1177/0306312718772094Google ScholarGoogle ScholarCross RefCross Ref
  67. United States. 1978. The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. Technical Report. The Commission, Bethesda, MD.Google ScholarGoogle Scholar
  68. Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook . Journal of Privacy and Confidentiality , Vol. 4, 2 (2013), 7--41. http://repository.cmu.edu/jpc/vol4/iss2/2/Google ScholarGoogle ScholarCross RefCross Ref
  69. Robert Templeman, Mohammed Korayem, David Crandall, and Apu Kapadia. 2014. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces . Proceedings of the Network and Distributed System Security (NDSS) Symposium February (2014), 23--26. https://doi.org/10.14722/ndss.2014.23014Google ScholarGoogle ScholarCross RefCross Ref
  70. Edison Thomaz, Aman Parnami, Jonathan Bidwell, Irfan Essa, and Gregory D. Abowd. 2013. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras . Proceedings of the 2013 ACM International Conference on Pervasive and Ubiquitous Computing (UbiComp) (2013), 739. https://doi.org/10.1145/2493432.2493509Google ScholarGoogle Scholar
  71. Elizabeth Tucker. 2014. The Endangered Child: Choking and Fainting Games in the Online Underground of YouTube . Children's Folklore Review , Vol. 36 (2014), 19--34.Google ScholarGoogle Scholar
  72. Jessica Vitak, Nicholas Proferes, Katie Shilton, and Zahra Ashktorab. 2017. Ethics Regulation in Social Computing Research: Examining the Role of Institutional Review Boards . Journal of Empirical Research on Human Research Ethics , Vol. 12, 5 (2017), 372--382. https://doi.org/10.1177/1556264617725200Google ScholarGoogle Scholar
  73. Jessica Vitak, Katie Shilton, and Z. Ashktorab. 2016. Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. In Proceedings of the ACM CSCW Conference on Computer Supported Cooperative Work & Social Computing. San Franciso, CA, 941--953.Google ScholarGoogle Scholar
  74. Helena Webb, Marina Jirotka, Bernd Carsten Stahl, William Housley, Adam Edwards, Matthew Williams, Rob Procter, Omer Rana, and Pete Burnap. 2017. The Ethical Challenges of Publishing Twitter Data for Research Dissemination . Proceedings of the ACM on Web Science Conference (WebSci) (2017), 339--348. https://doi.org/10.1145/3091478.3091489Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Daniel Weiz, Gagat Anad, and Claus-Peter H. Ernst. 2016. The Influence of Subjective Norm on the Usage of Smartglasses . In The Drivers of Wearable Device Usage , , Claus-Peter H. Ernst (Ed.). Springer, 1--11.Google ScholarGoogle Scholar
  76. Katrin Weller and Katharina E Kinder-kurlanda. 2015. Uncovering the Challenges in Collection, Sharing and Documentation : The Hidden Data of Social Media Research? Proceedings of the Ninth International AAAI Conference on Web and Social Media 2014 (2015), 28--37.Google ScholarGoogle Scholar
  77. Lindy West. 2015. What happened when I confronted my cruelest troll . The Guardian (2015). https://www.theguardian.com/society/2015/feb/02/what-happened-confronted-cruellest-troll-lindy-westGoogle ScholarGoogle Scholar
  78. Richmond Y. Wong, Deirdre K. Mulligan, Ellen Van Wyk , James Pierce, and John Chuang. 2017a. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks . Proceedings of the ACM on Human-Computer Interaction , Vol. 1, CSCW (2017), 111:1--27. https://doi.org/10.1145/3134746Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Richmond Y. Wong, Ellen Van Wyk, and James Pierce. 2017b. Real-fictional entanglements: Using science fiction and design fiction to interrogate sensing technologies . Proceedings of the ACM DIS Conference on Designing Interactive Systems (2017), 567--579. https://doi.org/10.1145/3064663.3064682Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Sean D. Young, Caitlin Rivers, and Bryan Lewis. 2014. Methods of using real-time social media technologies for detection and remote monitoring of HIV outcomes . Preventive Medicine , Vol. 63 (2014), 112--115.Google ScholarGoogle ScholarCross RefCross Ref
  81. Michael Zimmer. 2010. "But the data is already public": On the ethics of research in Facebook . Ethics and Information Technology , Vol. 12, 4 (2010), 313--325. https://doi.org/10.1007/s10676-010--9227--5Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Michael Zimmer. 2016. OKCupid Study Reveals the Perils of Big Data Science . https://www.wired.com/2016/05/okcupid-study-reveals-perils-big-data-science/Google ScholarGoogle Scholar
  83. Michael Zimmer and Nicholas John Proferes. 2014. A Topology of Twitter Research: Disciplines, Methods, and Ethics . Aslib Journal of Information Management , Vol. 66, 3 (2014), 250--261.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Ethical Considerations for Research Involving (Speculative) Public Data

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!