Understanding Research (44 page)

Read Understanding Research Online

Authors: Marianne Franklin

BOOK: Understanding Research
6.86Mb size Format: txt, pdf, ePub
NOTE

1
   ‘Draft Ethical Guidelines for Internet Research/Researching Cyberspace’ (June 15th 2010); reproduced here with kind permission from Tim Crook.

Table A2.1 Guidelines for internet research/researching cyberspace

Internet/cyberspace
Textual analysis.
Access by ‘going online’ using search engines and retrieving internet page impressions without the need for registration, username and password.
Ethical obligations:
Attribution, URLs, date and time ‘retrieved/visited’. Disclosure not needed in visits to web- pages, but permission for inclusion of quotations and multi- media recommended.
Legal risks:
Indecency, anti-terrorism crimes. Breach of copyright/intellectual property laws.
Internet communities and macro-membership networks
Large-scale, e.g. Facebook, MySpace, Friendsreunited, YouTube, Second Life. Computer games such as Fairyland and Farmville.
Textual analysis.
Access by joining the large-scale network via registration, username and password. Opinion is divided on whether permission should be obtained by the companies owning these cyberspace ‘networks’ prior to conducting textual analysis research or ‘ethnographic observation’.
Ethical obligations:
Attribution, URLs, date and time ‘retrieved/visited’. Disclosure that registration is being made for the purposes of research is advisable.
Ethnographic observation without participation. Ethnographic participation.
It is advisable to disclose and seek permission not only from the network ‘gate-keepers’ but also from individuals and group forums that are being observed and are responding to your participation.
Legal risks:
Mainly breach of copyright/intellectual property laws as issues of indecency and terrorism crimes tend to be excluded or met through the networks’ own pre-moderation and reporting protocols. Participant-observation must avoid the infliction or causation of emotional and/or social harm. Legal risks include communication crimes and torts such as generating racial, religious, or gender orientation hatred, defamation and breach of privacy.
Closed membership
Bulletin boards, email exchanges, chat-rooms.
For
textual analysis and non-participating observation or participant-observation,
prior permission and notification is considered essential.
Ethical obligations:
Full and explicit disclosure of identity. The avoidance of social and emotional harm in all communications.
Legal risks:
These may have been excluded by the adoption of ethical principles cited above. UK law prohibits communication crimes and torts such as generating racial, religious, or gender orientation hatred, harassment, defamation and breach of privacy.
Subterfuge and ‘undercover’ techniques of investigation
These are generally discouraged in the field of academic research and belong to the daredevil world of journalism or intelligence. It is rare indeed to find any justification for such research behaviour in textual analysis, qualitative interviewing, quantitative surveying or participant and non-partİcİpant ethnographic observation. In cyberspace and internet communications this could involve ‘infiltrating’ communities without prior disclosure and permission, adopting fake identities and social participation in cyber communications and behaviour via an avatar.
Ethical obligations:
Such methodology has to be considered at college research sub-committee level and will only be discussed after the furnishing of compelling evidence that there is no other means of undertaking the research; the purpose involves the research of unlawful, anti-social and unethical textual communication and human behaviour. Ethical issues arising involve the acute consideration of justifiable behaviour, utilitarian and deontological analysis, and human rights issues.
There are very serious
legal risks
including fraud, sexual offences, as well as serious civil wrongs in relation to defamation and breaches of privacy and contract. Researching some areas of human sexuality in cyberspace may require registration with the police under the 2003 Sexual Offences Act, and highly specialized academic supervision.
Consent protocols
These consents must be in writing, and where established by email exchanges should be supported by credible and recognizable electronic signatures.
Ethical obligations:
Researchers must be conscious that their research subjects and participants are capable of providing informed consent. Issues do arise where the research subjects are persuaded to consent to any textual or observational analysis that is likely to cause emotional, social, or physical harm.
In these circumstances issues of ethics may also give rise to
legal risks
such as incitement, joint enterprise, and strict liability for sexual and terrorism offences.
Issues of anonymity
These are rather complex in the realm of cyberspace and should be simplified by clarity of promise, expression of obligation and explicit explanation of the limitations and extent of ‘anonymity’ confidentiality. Internet and cyberspace communications leave a digital trail in being retrievable and traceable via search engines, and are ‘saved’ on hard disk servers. Internet texts, authors and behaviour are much more capable of being electronically triangulated and ‘jigsaw’ identified than in the analogue world. Internet identities are usually capable of exposure and confirmation via IP addresses unless they have been communicating using proxy servers. In these circumstances the degree of confidentiality available needs to be qualified.
It is advisable that the authors of textual communications, qualitative interviewees, and individuals and social groups subject to ethnographic observation agree to be identified and that this is obtained in writing to cover inclusion and publication of the research thesis. All research subjects should be informed about the nature of academic publication, e.g. adoption by university library, access via inter-library loans, ProQuest and future public academic book publication. Anonymity protocols need to be by written consent with force majeure declarations and qualified assurances based on the nature of the internet medium.
Ethical obligations:
Promises concerning confidentiality and anonymity need to be either guaranteed or qualified. A time- limit as well as arrangements for the protection and storage of research data needs to be determined prior to the start of any project.
Legal risks:
Breach of privacy, contract and confidentiality.

Source:
‘Draft Ethical Guidelines for Internet Research/Researching Cyberspace’ (June 15th 2010); reproduced here with kind permission from Tim Crook.

Appendix 3
Sample (master-level) ethics form
1
  • Name of student
  • ID number
  • Email address
  • Date
  • Programme of study
  • Project (e.g. dissertation)
  • Working title of project
  • Supervisor
OVERVIEW

Does the proposed research involve working with human subjects, on the ground or online? Yes/No

Examples of research involving human subjects include (but are not limited to): carrying out interviews; conducting a survey; distributing a questionnaire; carrying out focus groups; and observation of individuals or groups. Where this research can take place can be in conventional, on-the-ground settings, on the web, or a combination of the two.

If so please respond to the questions below in Part A, and Part B where necessary. If not please proceed to sign and date the form and attach to your project the following items [for example]:

  • Project description (50–100 words)
  • Purpose (50–100 words)
  • Research methodology (100–150 words).
PART A
1 Human subjects: does the research proposal involve:
  • (a)  Any person under the age of 18? Yes/No
  • (b)  Adult patients? Yes/No
  • (c)  Adults with psychological impairments? Yes/No
  • (d)  Adults with learning difficulties? Yes/No
  • (e)  Adults under the protection/control/influence of others (e.g. in care/in prison)? Yes/No (f) Relatives of ill people (e.g. parents of sick children)? Yes/No
  • (g)  People who may only have a basic knowledge of English? Yes/No
2 Subject matter: does the research proposal involve:
  • (a)  Sensitive personal issues (e.g. suicide, bereavement, gender identity, sexuality, fertility, abortion, gambling)? Yes/No
  • (b)  Illegal activities, illicit drug taking, substance abuse or the self-reporting of criminal behaviour? Yes/No
  • (c)  Any act that might diminish self-respect or cause shame, embarrassment or regret? Yes/No
  • (d)  Research into politically and/or racially/ethically sensitive areas? Yes/No
3 Procedures: does the proposal involve:
  • (a)  Use of personal or company records without consent? Yes/No
  • (b)  Deception of participants? Yes/No
  • (c)  The offer of disproportionately large inducements to participate? Yes/No
  • (d)  Audio or visual recordings without consent? Yes/No
  • (e)  Invasive physical interventions or treatments? Yes/No
  • (f)  Research which might put researchers or participants at risk? Yes/No

If you have answered YES to any of the questions in PART A, sections 1–3, you will also need to comply with the requirements of PART B of this form.

4 Research subjects (informants):
  • (a)  Who will your informants be?
  • (b)  Do you have a pre-existing relationship with the informants and, if so, what is the nature of that relationship?
  • (c)  How do you plan to gain access to/contact/approach potential informants?
  • (d)  What arrangements have you made for anonymity and confidentiality?
  • (e)  What, if any, is the particular vulnerability of your informants?
  • (f)  What arrangements are in place to ensure that informants know the purpose of the research and what they are going to inform about?
  • (g)  How will you ensure that informants are aware of their right to refuse to participate or withdraw at any time?
  • (h)  What are the safety issues (if any) arising from this research, and how will you deal with them?
  • (i)  How do you propose to store the information?
Checklist

If you have answered ‘NO’ to all of the questions in sections 1–3 above, please ignore PART B of the form.

You should return a hard and soft-copy to your supervisor for approval or further consultation.

As noted above, the supervisor can contact the Departmental Ethics Subcommittee about any issues arising.

This form should be considered and completed before research begins.

  • Student signature:
  • Date:
  • Supervisor signature:
  • Date:
PART B

This part of the application form is only relevant where researchers have answered ‘YES’ to any of the questions in sections 1–3 of PART A.

As you design and plan your project the question below will help you make some decisions and ensure you are aware of relevant elements.

A: Justification – ethical issues
  • 1  What are the ethical issues involved in your research?
  • 2  Please explain why the use of human participants is essential to your research project.
  • 3  How will you ensure that informed consent is freely given by human participants?

Please attach a preliminary Consent Form, or provide an indication of a culturally appropriate form of consent that applies to this project.

B: Data-storage and privacy matters

Please consider and answer the following questions
where relevant to your research project
as well as you can. These may best be completed after consultation with your supervisor:

  • 4  How will you protect human participants if your research deals with sensitive issues?
  • 5  How will you ensure that vulnerable research participants are protected? (Please state clearly if you abide by the child protection guidelines and/or have police clearance where necessary.)
  • 6  How will you protect human participants if your research uses sensitive research procedures?
  • 7  Outline any points arising from your project in light of the College’s code of practice for research ethics.
  • 8  How will you comply any data protection issues according to the College’s guidelines?
  • 9  If relevant, how will you deal with your obligations in relation to the processing of sensitive personal data (special restrictions)?
NOTE

1
  This form is similar to one used by the Department of Media and Communications,Goldsmiths (UK) designed for master students to consider for their research projects, as an educative and research design tool.

GLOSSARY

Note
: Glossaries at the end of books may appear quaint in an age where many students start and end their referencing and research projects online. This glossary dovetails these online sources alongside those provided by other books in this field.

Academic misconduct
  This term encompasses a number of transgressions within formal and informal codes of conduct in research communities; from accidentally or deliberately citing someone else’s work without providing a full reference, claiming the ideas or expressions of someone else as your own, getting someone else to write the work instead of you, to making up data or manipulating results. The increased use of the cut-and-paste functions of word-processing software in tandem with the ease of web-based access to written texts, images, and other media has raised the stakes in this regard.

Other books

Holy Death by Anthony Neil Smith
Chasing the Storm by Martin Molsted
Water Street by Patricia Reilly Giff
One of the Guys by Dawn Doyle
Cats in the Belfry by Doreen Tovey