SlideShare a Scribd company logo
1 of 9
Download to read offline
ETHICS OF
CARE
THE ETHICS OF ENGAGING WITH THE DIGITAL
COMMUNITY OF DRUG USERS SURROUNDING
CRYPTOMARKETS
Alexia Maddox, Deakin University
•What are Cryptomarkets?
•The five studies under analysis
•Researcher disclosure
•Participant anonymity
•Hidden or difficult to reach populations
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
OVERVIEW
AN ETHICS OF CARE FOR ONLINE RESEARCH
Kozinets, R. V. (2020). Netnography : the essential guide to qualitative social media
research (Third edition.). SAGE, p.179.
What are cryptomarkets, where are they and who goes there?
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
ONLINE ETHNOGRAPHICALLY SENSITISED STUDIES OF POPULATIONS SURROUNDING CRYPTOMARKETS
THEFIVESTUDIES
• 3 phase study
• Drug Consumerism
• Silk Road cryptomarket
• 12 months, 2012-2013
• Case study, interviews,
online monitoring &
engagement
• Single phase study
• Drug use trajectories
• Silk Road cryptomarket,
before and after LE
seizure
• 6 months, 2013-2014
• Interviews, online
monitoring and
engagement
• Extended immersion
• Pseudonymous identity
in high-risk transactions
• Cryptomarkets & social
media
• Four years immersion
• Interviews, online
monitoring and
engagement
• Extended immersion
• The morality of
exchange
• Range of cryptomarkets
• 2014-2017
• Interviews, online
monitoring and
engagement.
• Single phase study
• Adoption barriers surrounding
cryptomarkets
• Range of cryptomarkets
• 7 months during 2016
• Netnographic method
including interviews, field
notes, monitoring &
engagement.
Study 1 Study 2 Study 3 Study 4 Study 5
Van Hout & Bingham
(2013a,b/2014)
Barratt & Maddox
(et al 2016 a,b,c)
Ferguson (2017)
Masson & Bancroft
(2018)
Kowalski et al (2019)
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
RESEARCHERDISCLOSURE
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
Direct disclosure Nodal disclosure Published disclosure
Researcher to
anonymous
participant
Researcher to
moderators & site
administrator
Researcher publishes
forum post/
recruitment thread
RESEARCHERDISCLOSURE
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
Direct disclosure Nodal disclosure Published disclosure
RISKS AND ADVANTAGES
•Participant can choose if they want
to know researcher identity
• Researcher can negotiate
disclosure at the individual level.
• Interpersonal relationship building
(rapport building)
• Trust negotiated at the individual
level
• Approval sought for the conduct of the
research with site members.
• Acknowledgement of whether the
research can be conducted in the space
• Endorsement from established
personas on the site.
• Avenue of recourse should things “go
wrong”
•Raises the visibility of the research
with the site membership.
• Provides an avenue for engagement,
tester probes and study recruitment
• A record of community receptivity
towards the study.
• Raises the stakes of the researcher
visibility within the community.
FROM COMMUNITY PRACTICES TO DATA COLLECTION TECHNOLOGIES
PARTICIPANTANONYMITY
•Culture of anonymity
•Operational security
•Technical anonymity
•Social anonymity
•Ensuring participant identities are
disconnected from data sets.
• Ensuring data sets are securely
stored.
• Ensuring participants cannot be re-
identified through quote text
matching from content taken from
social media and forums.
• Ensuring stories provided do not
make participants recognisable to
the community under study.
•Fully de-identified data also means
disabling how the technologies of data
capture, correspondence, and analysis
retain traces of participant identities.
• Researching security and privacy issues
and community receptivity of technologies
for engagement.
• Considering the use of encryption for data
storage.
• Identifying secure cloud storage and data
sharing practices.
• Ensuring data territoriality concerns are
taken into account.
Community Research practices Technologies of data capture
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
WORKINGWITHHIDDENPOPULATIONS
•Hidden populations are hard to reach for a reason, either they wish to stay hidden due to illicit practices and/or they experience
severe social stigma.
•Online communities have made some of these populations easier to reach through their increased visibility but no less difficult
to engage with research.
•Online anonymity does not detract from the depth of insight that can be gained from engaging with people. If this is a normative
practice, the researcher needs to navigate disclosure with this in mind.
•If working with populations that engage in illicit practices, researchers in Australia must consider this in their research design (ie
how to ensure their data has value for the research but little value for law enforcement activities.
•Hidden populations may occupy contentious spaces where both the research participant and researcher can be put at risk
through the conduct of the study.
•Empathy, compassion, rapport building and the investment of time is what it takes to engage populations, alongside a strong
value proposition for the research itself with a clear contribution that overlaps with community agendas.
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
STUDYREFERENCES
Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016). ‘What if you live on top of a bakery and you like cakes?’—Drug use and harm trajectories before, during and after the
emergence of Silk Road. International Journal of Drug Policy, 35, 50-57. doi:10.1016/j.drugpo.2016.04.006
Barratt, M. J., & Maddox, A. (2016). Active engagement with stigmatised communities through digital ethnography. Qualitative Research, 16(6), 701-719.
doi:10.1177/1468794116648766
Ferguson, R. H. (2017). Offline ‘stranger’ and online lurker: methods for an ethnography of illicit transactions on the darknet. Qualitative Research, 17(6), 683-698.
doi:10.1177/1468794117718894
Kowalski, M., Hooker, C., & Barratt, M. J. (2019). Should we smoke it for you as well? An ethnographic analysis of a drug cryptomarket environment. International Journal of
Drug Policy. doi:10.1016/j.drugpo.2019.03.011
Maddox, A., Barratt, M. J., Lenton, S., & Allen, M. (2016). Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information
Communication and Society, 19(1), 111-126. doi:10.1080/1369118X.2015.1093531
Masson, K., & Bancroft, A. (2018). ‘Nice people doing shady things’: Drugs and the morality of exchange in the darknet cryptomarkets. International Journal of Drug Policy,
58, 78-84. doi:10.1016/j.drugpo.2018.05.008
Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385-391.
doi:http://dx.doi.org/10.1016/j.drugpo.2013.01.005
Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524-529. doi:http://dx.doi.org/
10.1016/j.drugpo.2013.08.011
Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2),
183-189. doi:http://dx.doi.org/10.1016/j.drugpo.2013.10.009
ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD

More Related Content

What's hot

Who’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social MediaWho’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social MediaDerek Weber
 
Practicing Data Science Responsibly
Practicing Data Science ResponsiblyPracticing Data Science Responsibly
Practicing Data Science Responsiblyrahulbot
 
Privacy Perceptions and Gender Effects on Foursquare Usage
 Privacy Perceptions and Gender Effects on Foursquare Usage Privacy Perceptions and Gender Effects on Foursquare Usage
Privacy Perceptions and Gender Effects on Foursquare UsageJoshua M. Chang
 
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...JAYAPRAKASH JPINFOTECH
 
WeVerify project description
WeVerify project description WeVerify project description
WeVerify project description Weverify
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...Tin180 VietNam
 
The Sociology of Nothingness: Challenges of Big Data
The Sociology of Nothingness: Challenges of Big DataThe Sociology of Nothingness: Challenges of Big Data
The Sociology of Nothingness: Challenges of Big DataEugen Glavan
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Quantifying covid 19 content in the online health opinion war using machine l...
Quantifying covid 19 content in the online health opinion war using machine l...Quantifying covid 19 content in the online health opinion war using machine l...
Quantifying covid 19 content in the online health opinion war using machine l...Venkat Projects
 
Facebook reveals how it shares your data with researchers
Facebook reveals how it shares your data with researchersFacebook reveals how it shares your data with researchers
Facebook reveals how it shares your data with researchersniraj joshi
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Ansgar Koene
 

What's hot (16)

Who’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social MediaWho’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social Media
 
Practicing Data Science Responsibly
Practicing Data Science ResponsiblyPracticing Data Science Responsibly
Practicing Data Science Responsibly
 
Privacy Perceptions and Gender Effects on Foursquare Usage
 Privacy Perceptions and Gender Effects on Foursquare Usage Privacy Perceptions and Gender Effects on Foursquare Usage
Privacy Perceptions and Gender Effects on Foursquare Usage
 
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
Who You Should Not Follow: Extracting Word Embeddings from Tweets to Identify...
 
17
1717
17
 
WeVerify project description
WeVerify project description WeVerify project description
WeVerify project description
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
 
The Sociology of Nothingness: Challenges of Big Data
The Sociology of Nothingness: Challenges of Big DataThe Sociology of Nothingness: Challenges of Big Data
The Sociology of Nothingness: Challenges of Big Data
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Reveal - Social Media Verification - poster
Reveal - Social Media Verification - posterReveal - Social Media Verification - poster
Reveal - Social Media Verification - poster
 
Polinter07
Polinter07Polinter07
Polinter07
 
SXSW slides 2016
SXSW slides 2016SXSW slides 2016
SXSW slides 2016
 
Quantifying covid 19 content in the online health opinion war using machine l...
Quantifying covid 19 content in the online health opinion war using machine l...Quantifying covid 19 content in the online health opinion war using machine l...
Quantifying covid 19 content in the online health opinion war using machine l...
 
Facebook reveals how it shares your data with researchers
Facebook reveals how it shares your data with researchersFacebook reveals how it shares your data with researchers
Facebook reveals how it shares your data with researchers
 
Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)Citizen centric approaches to Social Media analysis (CaSMa)
Citizen centric approaches to Social Media analysis (CaSMa)
 

Similar to An ethics of care: engaging with cryptomarket users

Exploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraExploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraTogar Simatupang
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Netnography webinar
Netnography webinarNetnography webinar
Netnography webinarsuresh sood
 
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Axel Bruns
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)Han Woo PARK
 
Assisting information practice: from information intermediary to digital proxy
Assisting information practice: from information intermediary to digital proxyAssisting information practice: from information intermediary to digital proxy
Assisting information practice: from information intermediary to digital proxyEdinburgh Napier University
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3lroddesign
 
Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)MiguelRosario24
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016suresh sood
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumUniversity of Southern California
 
Qualitative research: Monitoring anonymous online drug marketplaces
Qualitative research: Monitoring anonymous online drug marketplacesQualitative research: Monitoring anonymous online drug marketplaces
Qualitative research: Monitoring anonymous online drug marketplacesTim Bingham
 
EDRD *6000 Netnography & eFieldnotes
EDRD *6000 Netnography & eFieldnotesEDRD *6000 Netnography & eFieldnotes
EDRD *6000 Netnography & eFieldnotesS.R. Page
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014oiisdp
 
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...Kicking off the INCENTIVE project with an intro to the CS Principles and Char...
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...Margaret Gold
 

Similar to An ethics of care: engaging with cryptomarket users (20)

Exploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraExploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital Era
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Netnography webinar
Netnography webinarNetnography webinar
Netnography webinar
 
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...Types of Polarisation and Their Operationalisation in Digital and Social Medi...
Types of Polarisation and Their Operationalisation in Digital and Social Medi...
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)
 
Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"
 
Ica cs spanelv2
Ica cs spanelv2Ica cs spanelv2
Ica cs spanelv2
 
Assisting information practice: from information intermediary to digital proxy
Assisting information practice: from information intermediary to digital proxyAssisting information practice: from information intermediary to digital proxy
Assisting information practice: from information intermediary to digital proxy
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
 
Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)Big data for qualitative research by kathy a. mills (z lib.org)
Big data for qualitative research by kathy a. mills (z lib.org)
 
Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016Netnography online course part 1 of 3 17 november 2016
Netnography online course part 1 of 3 17 november 2016
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Qualitative research: Monitoring anonymous online drug marketplaces
Qualitative research: Monitoring anonymous online drug marketplacesQualitative research: Monitoring anonymous online drug marketplaces
Qualitative research: Monitoring anonymous online drug marketplaces
 
EDRD *6000 Netnography & eFieldnotes
EDRD *6000 Netnography & eFieldnotesEDRD *6000 Netnography & eFieldnotes
EDRD *6000 Netnography & eFieldnotes
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014
 
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...Kicking off the INCENTIVE project with an intro to the CS Principles and Char...
Kicking off the INCENTIVE project with an intro to the CS Principles and Char...
 
Chris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptxChris hankin tril_presentation_pdf.pptx
Chris hankin tril_presentation_pdf.pptx
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

An ethics of care: engaging with cryptomarket users

  • 1. ETHICS OF CARE THE ETHICS OF ENGAGING WITH THE DIGITAL COMMUNITY OF DRUG USERS SURROUNDING CRYPTOMARKETS Alexia Maddox, Deakin University
  • 2. •What are Cryptomarkets? •The five studies under analysis •Researcher disclosure •Participant anonymity •Hidden or difficult to reach populations ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD OVERVIEW AN ETHICS OF CARE FOR ONLINE RESEARCH Kozinets, R. V. (2020). Netnography : the essential guide to qualitative social media research (Third edition.). SAGE, p.179.
  • 3. What are cryptomarkets, where are they and who goes there? ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
  • 4. ONLINE ETHNOGRAPHICALLY SENSITISED STUDIES OF POPULATIONS SURROUNDING CRYPTOMARKETS THEFIVESTUDIES • 3 phase study • Drug Consumerism • Silk Road cryptomarket • 12 months, 2012-2013 • Case study, interviews, online monitoring & engagement • Single phase study • Drug use trajectories • Silk Road cryptomarket, before and after LE seizure • 6 months, 2013-2014 • Interviews, online monitoring and engagement • Extended immersion • Pseudonymous identity in high-risk transactions • Cryptomarkets & social media • Four years immersion • Interviews, online monitoring and engagement • Extended immersion • The morality of exchange • Range of cryptomarkets • 2014-2017 • Interviews, online monitoring and engagement. • Single phase study • Adoption barriers surrounding cryptomarkets • Range of cryptomarkets • 7 months during 2016 • Netnographic method including interviews, field notes, monitoring & engagement. Study 1 Study 2 Study 3 Study 4 Study 5 Van Hout & Bingham (2013a,b/2014) Barratt & Maddox (et al 2016 a,b,c) Ferguson (2017) Masson & Bancroft (2018) Kowalski et al (2019) ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
  • 5. RESEARCHERDISCLOSURE ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD Direct disclosure Nodal disclosure Published disclosure Researcher to anonymous participant Researcher to moderators & site administrator Researcher publishes forum post/ recruitment thread
  • 6. RESEARCHERDISCLOSURE ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD Direct disclosure Nodal disclosure Published disclosure RISKS AND ADVANTAGES •Participant can choose if they want to know researcher identity • Researcher can negotiate disclosure at the individual level. • Interpersonal relationship building (rapport building) • Trust negotiated at the individual level • Approval sought for the conduct of the research with site members. • Acknowledgement of whether the research can be conducted in the space • Endorsement from established personas on the site. • Avenue of recourse should things “go wrong” •Raises the visibility of the research with the site membership. • Provides an avenue for engagement, tester probes and study recruitment • A record of community receptivity towards the study. • Raises the stakes of the researcher visibility within the community.
  • 7. FROM COMMUNITY PRACTICES TO DATA COLLECTION TECHNOLOGIES PARTICIPANTANONYMITY •Culture of anonymity •Operational security •Technical anonymity •Social anonymity •Ensuring participant identities are disconnected from data sets. • Ensuring data sets are securely stored. • Ensuring participants cannot be re- identified through quote text matching from content taken from social media and forums. • Ensuring stories provided do not make participants recognisable to the community under study. •Fully de-identified data also means disabling how the technologies of data capture, correspondence, and analysis retain traces of participant identities. • Researching security and privacy issues and community receptivity of technologies for engagement. • Considering the use of encryption for data storage. • Identifying secure cloud storage and data sharing practices. • Ensuring data territoriality concerns are taken into account. Community Research practices Technologies of data capture ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
  • 8. WORKINGWITHHIDDENPOPULATIONS •Hidden populations are hard to reach for a reason, either they wish to stay hidden due to illicit practices and/or they experience severe social stigma. •Online communities have made some of these populations easier to reach through their increased visibility but no less difficult to engage with research. •Online anonymity does not detract from the depth of insight that can be gained from engaging with people. If this is a normative practice, the researcher needs to navigate disclosure with this in mind. •If working with populations that engage in illicit practices, researchers in Australia must consider this in their research design (ie how to ensure their data has value for the research but little value for law enforcement activities. •Hidden populations may occupy contentious spaces where both the research participant and researcher can be put at risk through the conduct of the study. •Empathy, compassion, rapport building and the investment of time is what it takes to engage populations, alongside a strong value proposition for the research itself with a clear contribution that overlaps with community agendas. ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD
  • 9. STUDYREFERENCES Barratt, M. J., Lenton, S., Maddox, A., & Allen, M. (2016). ‘What if you live on top of a bakery and you like cakes?’—Drug use and harm trajectories before, during and after the emergence of Silk Road. International Journal of Drug Policy, 35, 50-57. doi:10.1016/j.drugpo.2016.04.006 Barratt, M. J., & Maddox, A. (2016). Active engagement with stigmatised communities through digital ethnography. Qualitative Research, 16(6), 701-719. doi:10.1177/1468794116648766 Ferguson, R. H. (2017). Offline ‘stranger’ and online lurker: methods for an ethnography of illicit transactions on the darknet. Qualitative Research, 17(6), 683-698. doi:10.1177/1468794117718894 Kowalski, M., Hooker, C., & Barratt, M. J. (2019). Should we smoke it for you as well? An ethnographic analysis of a drug cryptomarket environment. International Journal of Drug Policy. doi:10.1016/j.drugpo.2019.03.011 Maddox, A., Barratt, M. J., Lenton, S., & Allen, M. (2016). Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’. Information Communication and Society, 19(1), 111-126. doi:10.1080/1369118X.2015.1093531 Masson, K., & Bancroft, A. (2018). ‘Nice people doing shady things’: Drugs and the morality of exchange in the darknet cryptomarkets. International Journal of Drug Policy, 58, 78-84. doi:10.1016/j.drugpo.2018.05.008 Van Hout, M. C., & Bingham, T. (2013a). ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences. International Journal of Drug Policy, 24(5), 385-391. doi:http://dx.doi.org/10.1016/j.drugpo.2013.01.005 Van Hout, M. C., & Bingham, T. (2013b). ‘Surfing the Silk Road’: A study of users’ experiences. International Journal of Drug Policy, 24(6), 524-529. doi:http://dx.doi.org/ 10.1016/j.drugpo.2013.08.011 Van Hout, M. C., & Bingham, T. (2014). Responsible vendors, intelligent consumers: Silk Road, the online revolution in drug trading. International Journal of Drug Policy, 25(2), 183-189. doi:http://dx.doi.org/10.1016/j.drugpo.2013.10.009 ALEXIA MADDOX 28TH APRIL 2020 TWITTER: @ALEXIAMADD