Grounded theory methodology is a qualitative research method that aims to generate or discover a theory grounded in data from the field. It is an iterative process where the analyst becomes more grounded in the data and develops richer concepts and models. There are two major schools of grounded theory - the Glaserian school emphasizes emerging theory from neutral questions, while the Straussian school structures questions and coding more rigorously. Key aspects of grounded theory include theoretical sampling, validating findings through quotations, and achieving reliability through techniques like triangulation and audit trails.
This document discusses research ethics. It defines ethics and research ethics, and explains the importance of ethics in promoting valid research, building trust, and accountability. Key stakeholders in research like participants, researchers, funding agencies are discussed. Important ethical issues related to participants include informed consent, privacy and preventing harm. Ethical issues for researchers include honesty, objectivity, and appropriate methodology. Ethical issues for funders include restricting research and potential misuse of findings. The conclusion emphasizes balancing these issues, following guidelines, and acting ethically despite challenges to uphold scientific integrity.
This document discusses key principles of research ethics including guidelines for authorship, the Nuremberg Code, Declaration of Helsinki, Belmont Report, and Philippine laws and guidelines. Ethical research requires voluntary informed consent, favorable risk-benefit ratio, scientific validity, fair subject selection, and independent review. Research ethics aims to protect human subjects and ensure scientific integrity by applying principles like respect for persons, beneficence, and justice.
Grounded theory is a qualitative research method introduced in 1967 by Glaser and Strauss. It involves developing a theory grounded in data that is systematically gathered and analyzed through the constant comparative method. This iterative process involves collecting data, analyzing through coding and memo writing, and sorting memos to develop conceptual categories to generate an emergent theory. The theory should fit and work to explain the phenomenon under study. Grounded theory challenges assumptions that qualitative research is not systematic or rigorous and aims to develop conceptual theories rather than just descriptive case studies.
This document discusses ethics in research. It defines ethics and research ethics, covering honesty and respect for participants. It provides examples of unethical historical studies that harmed participants. Key ethics documents are summarized, including the Nuremberg Code, Belmont Report, and Institutional Review Board guidelines around informed consent, risks/benefits, confidentiality, and voluntary participation. The document also discusses issues like deception, errors versus fraud, plagiarism, and misleading data presentation.
This document discusses ethical considerations in research. It defines ethics as rules that guide moral behavior and research principles. Ethics in research provides rules for appropriate and inappropriate research conduct and application of findings. The document outlines three main components of ethics in research: truthfulness, courtesy, and respect for human rights. It provides examples of each component, such as obtaining permission before collecting data, avoiding fraud/misconduct, and protecting participants' confidentiality, dignity, and right to withdraw. The overall summary is that the document defines ethics and its role in research, then outlines and gives examples of three key ethical components to consider which are truthfulness, courtesy, and respect for human rights.
The document discusses several key issues regarding ethics in research:
- Research is not objective and researchers must recognize how their own biases and worldviews can influence the research process. They must actively manage power dynamics and potential biases.
- Researchers have a responsibility for the production of knowledge and must ensure accurate reporting of results, obtaining informed consent, protecting confidentiality of participants, and avoiding harm.
- Important considerations include recognizing one's own position and identity, being aware of dichotomization and power differentials, and understanding how language and cultural worldviews can impact research. Overall researchers must balance responsibilities to knowledge production with minimizing harm or abuse of participants.
Grounded theory methodology is a qualitative research method that aims to generate or discover a theory grounded in data from the field. It is an iterative process where the analyst becomes more grounded in the data and develops richer concepts and models. There are two major schools of grounded theory - the Glaserian school emphasizes emerging theory from neutral questions, while the Straussian school structures questions and coding more rigorously. Key aspects of grounded theory include theoretical sampling, validating findings through quotations, and achieving reliability through techniques like triangulation and audit trails.
This document discusses research ethics. It defines ethics and research ethics, and explains the importance of ethics in promoting valid research, building trust, and accountability. Key stakeholders in research like participants, researchers, funding agencies are discussed. Important ethical issues related to participants include informed consent, privacy and preventing harm. Ethical issues for researchers include honesty, objectivity, and appropriate methodology. Ethical issues for funders include restricting research and potential misuse of findings. The conclusion emphasizes balancing these issues, following guidelines, and acting ethically despite challenges to uphold scientific integrity.
This document discusses key principles of research ethics including guidelines for authorship, the Nuremberg Code, Declaration of Helsinki, Belmont Report, and Philippine laws and guidelines. Ethical research requires voluntary informed consent, favorable risk-benefit ratio, scientific validity, fair subject selection, and independent review. Research ethics aims to protect human subjects and ensure scientific integrity by applying principles like respect for persons, beneficence, and justice.
Grounded theory is a qualitative research method introduced in 1967 by Glaser and Strauss. It involves developing a theory grounded in data that is systematically gathered and analyzed through the constant comparative method. This iterative process involves collecting data, analyzing through coding and memo writing, and sorting memos to develop conceptual categories to generate an emergent theory. The theory should fit and work to explain the phenomenon under study. Grounded theory challenges assumptions that qualitative research is not systematic or rigorous and aims to develop conceptual theories rather than just descriptive case studies.
This document discusses ethics in research. It defines ethics and research ethics, covering honesty and respect for participants. It provides examples of unethical historical studies that harmed participants. Key ethics documents are summarized, including the Nuremberg Code, Belmont Report, and Institutional Review Board guidelines around informed consent, risks/benefits, confidentiality, and voluntary participation. The document also discusses issues like deception, errors versus fraud, plagiarism, and misleading data presentation.
This document discusses ethical considerations in research. It defines ethics as rules that guide moral behavior and research principles. Ethics in research provides rules for appropriate and inappropriate research conduct and application of findings. The document outlines three main components of ethics in research: truthfulness, courtesy, and respect for human rights. It provides examples of each component, such as obtaining permission before collecting data, avoiding fraud/misconduct, and protecting participants' confidentiality, dignity, and right to withdraw. The overall summary is that the document defines ethics and its role in research, then outlines and gives examples of three key ethical components to consider which are truthfulness, courtesy, and respect for human rights.
The document discusses several key issues regarding ethics in research:
- Research is not objective and researchers must recognize how their own biases and worldviews can influence the research process. They must actively manage power dynamics and potential biases.
- Researchers have a responsibility for the production of knowledge and must ensure accurate reporting of results, obtaining informed consent, protecting confidentiality of participants, and avoiding harm.
- Important considerations include recognizing one's own position and identity, being aware of dichotomization and power differentials, and understanding how language and cultural worldviews can impact research. Overall researchers must balance responsibilities to knowledge production with minimizing harm or abuse of participants.
The document discusses research ethics guidelines and procedures in the UK and at the University of Cumbria. It outlines the role of Research Ethics Committees in reviewing research proposals to protect participants. It also addresses ethics review for student research projects. Finally, it provides guidance on the research ethics review process and documents required for seeking ethical approval.
What is Qualitative and quantitative research?
Methods of qualitative research and pros and cons of qualitative research and the characteristics of qualitative research.
Qualitative researchers are interested in understanding social phenomena through the meanings that people assign to them and by observing people in natural settings. They aim to describe contexts in rich detail and see issues from the perspectives of research participants. Quantitative researchers aim to measure concepts accurately, determine causation between variables, and generalize patterns from samples to populations using statistical techniques. Both approaches have strengths and limitations depending on the type of research question being asked.
Framing research question and formulating hypothesis forAmbili Nanukuttan
The document discusses framing research questions and formulating hypotheses, which are critical steps in research. It defines key terms like background questions, foreground questions, and the PICO framework for developing questions. Hypotheses are conjectures between variables expressed as testable statements. The types of hypotheses discussed are the null hypothesis, alternate hypotheses, and how they can be directional or non-directional. Selecting good research questions involves considering feasibility, novelty, ethics and relevance, while properly scheduling and saving questions is also important.
This document discusses the moral foundations of research ethics and various issues that can arise, such as research misconduct, collaboration problems, peer review conflicts, and conflicts of interest. It explains that research ethics is about imperfect people making mistakes unintentionally as well as intentionally unethical actions. Research ethics violations can occur through fabrication, falsification, plagiarism, issues with authorship, data ownership, rigor of experiments, and conflicts of interest with funders. Thinking about research ethics provides tools for handling tricky ethical situations that may have unclear right answers.
Thematic analysis in qualitative research Explained with ExampleSufi Nouman Riaz
https://youtu.be/QNP4KkNFzu4
Thematic analysis is a technique of data analysis while conducting a qualitative study. Thematic analysis is the most recognized, adapted, and used approach to analyze qualitative data.
This video is made as per the illustrations and procedures explained in the Braun and Clarke (2006) research article on Thematic Analysis.
Have you just conducted a qualitative study involving:
Interviews
Focus Groups
Observations
Document or artifact analysis
Journal notes or reflections?
How to use this type of data?
Just as there are numerous statistical tests to run for quantitative data, there are just as many options for qualitative data analysis.
THEMATIC APPROACH
Most common forms of analysis in qualitative research. It emphasizes Pinpointing, Examining, Recording
Patterns (or "themes") within data.
Themes are patterns across data sets that are important to the description of a phenomenon and are associated to a specific research question.
Themes become categories for analysis
6 Phases of Coding
(Thematic Analysis)
1-Familiarization with data
2-Generating initial codes
3-Searching for themes among codes
4-Reviewing themes
5-Defining and naming themes
6-Producing the final report
Dr. Sarika Sawant presented on research ethics at a seminar. She discussed the definition of research ethics as regulating scientific activity to protect human participants and serve societal interests. She covered objectives like ensuring consent and oversight. Issues discussed included plagiarism, data handling, and research with humans and animals. National guidelines in India were also presented, as well as UNESCO's ethical guidelines focusing on informed consent, confidentiality, and integrity.
The document discusses the background and definition of research ethics. It defines ethics as norms for conduct that distinguish acceptable from unacceptable behavior. Research ethics refers to rules that define proper conduct for researchers and are aimed at protecting human subjects. The history of modern research ethics is traced back to unethical medical experiments conducted by Nazi doctors during World War 2, which led to the Nuremberg Code establishing ethical principles for research involving human subjects. Other influential documents discussed include the Helsinki Declaration, Belmont Report, and controversies like the Tuskegee Syphilis Study.
This document outlines the process of thematic analysis for qualitative research methods. It discusses constructing categories from the data and naming themes. The criteria for categories is that they should be responsive to the research purpose, exhaustive, mutually exclusive, and sensitizing. The number of themes can depend, but preferably there should be five to six according to Cresswell. Different types of qualitative data analysis are described, including phenomenological, grounded theory, ethnographic, narrative, case studies, and content analysis. Guidance is provided on the specific processes for each type. The importance of focusing on the research question rather than getting lost in software is also emphasized.
This document provides guidance on developing a successful research proposal. It discusses the purpose of proposals, when they should be written, and core components to include. Key elements are an indication of why the problem is important, a description of the research question and methodology, and a review of relevant literature. Additional components may include how findings will be disseminated and addressing reliability, validity, ethics and potential problems. The document provides examples and advice for writing strong titles, defining concepts and limits, conducting a literature review, demonstrating significance, and using appropriate methodology. It concludes with sample criteria for evaluating proposals, such as clearly identifying the problem, using a suitable approach, and ensuring feasibility.
This document discusses research design and methods. It outlines different research philosophies like positivism and post-modernism and how they influence knowledge generation. Qualitative and quantitative approaches are compared, with qualitative focused on understanding perspectives and meanings, while quantitative prioritizes measurable and statistical data. Examples of research designs, data collection methods, and analyses are provided for both qualitative and quantitative work. The document stresses using primary data for dissertations and supplementing with secondary data.
This document discusses research ethics and the ethical issues researchers must consider. It defines research ethics as principles guiding how researchers interact with participants, colleagues, and society. Researchers must get informed consent, avoid pressure on participants, respect participant autonomy, protect vulnerable groups, ensure anonymity and confidentiality, avoid harm, be objective, not take advantage of easy groups, and be open. Following ethics promotes respecting participants, advancing knowledge, trust, accountability, and public support. Violations can damage participant cooperation, public confidence, and researcher integrity. Ethics apply to all research stages and contribute to quality.
Learn the process of Research.
Research process consists of a series of actions or steps necessary to carry out research. It guides a researcher to conduct research in a planned and organized sequence.
Sampling Methods in Qualitative and Quantitative ResearchSam Ladner
This document discusses different types of sampling methods used in qualitative and quantitative research. It outlines the different assumptions researchers make regarding sampling in qualitative versus quantitative studies. A variety of sampling techniques are described for different research contexts such as ethnographic fieldwork, interviews, and content analysis.
The document discusses the important elements to consider when choosing a good research topic. It outlines six key elements: 1) the topic must be of interest, 2) it must be focused on a specific question, 3) it must be significant, 4) it must have a reasonable scope, 5) relevant literature must be available, and 6) it must be feasible given time and resource constraints. It provides examples and guidance on how to evaluate a topic against these criteria to ensure an effective research project.
Qualitative and quantitative methods of researchJordan Cruz
The document compares and contrasts qualitative and quantitative research methods. It discusses that qualitative research aims to understand social interactions through smaller, non-randomly selected samples, while quantitative research seeks to test hypotheses and make predictions using larger, randomly selected samples and specific variables. It also outlines the different types of data collected, forms of analysis, roles of researchers, and final reporting structures between the two methods.
This document discusses ethics in research. It covers key principles like voluntary participation, informed consent, avoiding harm, and maintaining privacy, anonymity and confidentiality. It discusses proper data gathering and storage procedures. It also addresses issues like plagiarism, fabrication, misleading authorship, and non-publication of data. The document provides guidelines from organizations like ESRC on ensuring research integrity and quality, informing participants, respecting confidentiality, avoiding coercion, and minimizing harm to participants. It discusses balancing risks and benefits in research.
A PRESENTATION ON RESEARCH METHODS: SELECTION OF A RESEARCH TOPIC, FORMULATING A HYPOTHESIS, PHILOSOPHICAL ISSUES IN RESEARCH, QUANTITATIVE VS QUALITATIVE DEBATE & SELECTION OF A RESEARCH METHOD
This document discusses various qualitative research methods for collecting and analyzing data. It describes qualitative research as focusing on collecting narrative and visual non-numerical data to understand a phenomenon of interest. It then outlines several common qualitative research approaches like grounded theory, ethnography, phenomenology, narrative research, case studies and the types of data collection methods used in each approach such as interviews, observations, focus groups and document analysis. Finally, it discusses the process of analyzing qualitative data which typically involves preparing, organizing, coding and categorizing the data to identify themes and patterns.
This document discusses key ethical considerations in research including informed consent, privacy, confidentiality, potential harms, and benefits. It addresses ethics committees that review proposed research methodology and adherence to ethical codes. Key principles of ethical research are protecting participants, voluntary participation with informed consent, and following national laws. The document also examines ethical issues around vulnerable groups, deception, incentives, and how to respond to ethical dilemmas that may arise during a study.
The document discusses research ethics guidelines and procedures in the UK and at the University of Cumbria. It outlines the role of Research Ethics Committees in reviewing research proposals to protect participants. It also addresses ethics review for student research projects. Finally, it provides guidance on the research ethics review process and documents required for seeking ethical approval.
What is Qualitative and quantitative research?
Methods of qualitative research and pros and cons of qualitative research and the characteristics of qualitative research.
Qualitative researchers are interested in understanding social phenomena through the meanings that people assign to them and by observing people in natural settings. They aim to describe contexts in rich detail and see issues from the perspectives of research participants. Quantitative researchers aim to measure concepts accurately, determine causation between variables, and generalize patterns from samples to populations using statistical techniques. Both approaches have strengths and limitations depending on the type of research question being asked.
Framing research question and formulating hypothesis forAmbili Nanukuttan
The document discusses framing research questions and formulating hypotheses, which are critical steps in research. It defines key terms like background questions, foreground questions, and the PICO framework for developing questions. Hypotheses are conjectures between variables expressed as testable statements. The types of hypotheses discussed are the null hypothesis, alternate hypotheses, and how they can be directional or non-directional. Selecting good research questions involves considering feasibility, novelty, ethics and relevance, while properly scheduling and saving questions is also important.
This document discusses the moral foundations of research ethics and various issues that can arise, such as research misconduct, collaboration problems, peer review conflicts, and conflicts of interest. It explains that research ethics is about imperfect people making mistakes unintentionally as well as intentionally unethical actions. Research ethics violations can occur through fabrication, falsification, plagiarism, issues with authorship, data ownership, rigor of experiments, and conflicts of interest with funders. Thinking about research ethics provides tools for handling tricky ethical situations that may have unclear right answers.
Thematic analysis in qualitative research Explained with ExampleSufi Nouman Riaz
https://youtu.be/QNP4KkNFzu4
Thematic analysis is a technique of data analysis while conducting a qualitative study. Thematic analysis is the most recognized, adapted, and used approach to analyze qualitative data.
This video is made as per the illustrations and procedures explained in the Braun and Clarke (2006) research article on Thematic Analysis.
Have you just conducted a qualitative study involving:
Interviews
Focus Groups
Observations
Document or artifact analysis
Journal notes or reflections?
How to use this type of data?
Just as there are numerous statistical tests to run for quantitative data, there are just as many options for qualitative data analysis.
THEMATIC APPROACH
Most common forms of analysis in qualitative research. It emphasizes Pinpointing, Examining, Recording
Patterns (or "themes") within data.
Themes are patterns across data sets that are important to the description of a phenomenon and are associated to a specific research question.
Themes become categories for analysis
6 Phases of Coding
(Thematic Analysis)
1-Familiarization with data
2-Generating initial codes
3-Searching for themes among codes
4-Reviewing themes
5-Defining and naming themes
6-Producing the final report
Dr. Sarika Sawant presented on research ethics at a seminar. She discussed the definition of research ethics as regulating scientific activity to protect human participants and serve societal interests. She covered objectives like ensuring consent and oversight. Issues discussed included plagiarism, data handling, and research with humans and animals. National guidelines in India were also presented, as well as UNESCO's ethical guidelines focusing on informed consent, confidentiality, and integrity.
The document discusses the background and definition of research ethics. It defines ethics as norms for conduct that distinguish acceptable from unacceptable behavior. Research ethics refers to rules that define proper conduct for researchers and are aimed at protecting human subjects. The history of modern research ethics is traced back to unethical medical experiments conducted by Nazi doctors during World War 2, which led to the Nuremberg Code establishing ethical principles for research involving human subjects. Other influential documents discussed include the Helsinki Declaration, Belmont Report, and controversies like the Tuskegee Syphilis Study.
This document outlines the process of thematic analysis for qualitative research methods. It discusses constructing categories from the data and naming themes. The criteria for categories is that they should be responsive to the research purpose, exhaustive, mutually exclusive, and sensitizing. The number of themes can depend, but preferably there should be five to six according to Cresswell. Different types of qualitative data analysis are described, including phenomenological, grounded theory, ethnographic, narrative, case studies, and content analysis. Guidance is provided on the specific processes for each type. The importance of focusing on the research question rather than getting lost in software is also emphasized.
This document provides guidance on developing a successful research proposal. It discusses the purpose of proposals, when they should be written, and core components to include. Key elements are an indication of why the problem is important, a description of the research question and methodology, and a review of relevant literature. Additional components may include how findings will be disseminated and addressing reliability, validity, ethics and potential problems. The document provides examples and advice for writing strong titles, defining concepts and limits, conducting a literature review, demonstrating significance, and using appropriate methodology. It concludes with sample criteria for evaluating proposals, such as clearly identifying the problem, using a suitable approach, and ensuring feasibility.
This document discusses research design and methods. It outlines different research philosophies like positivism and post-modernism and how they influence knowledge generation. Qualitative and quantitative approaches are compared, with qualitative focused on understanding perspectives and meanings, while quantitative prioritizes measurable and statistical data. Examples of research designs, data collection methods, and analyses are provided for both qualitative and quantitative work. The document stresses using primary data for dissertations and supplementing with secondary data.
This document discusses research ethics and the ethical issues researchers must consider. It defines research ethics as principles guiding how researchers interact with participants, colleagues, and society. Researchers must get informed consent, avoid pressure on participants, respect participant autonomy, protect vulnerable groups, ensure anonymity and confidentiality, avoid harm, be objective, not take advantage of easy groups, and be open. Following ethics promotes respecting participants, advancing knowledge, trust, accountability, and public support. Violations can damage participant cooperation, public confidence, and researcher integrity. Ethics apply to all research stages and contribute to quality.
Learn the process of Research.
Research process consists of a series of actions or steps necessary to carry out research. It guides a researcher to conduct research in a planned and organized sequence.
Sampling Methods in Qualitative and Quantitative ResearchSam Ladner
This document discusses different types of sampling methods used in qualitative and quantitative research. It outlines the different assumptions researchers make regarding sampling in qualitative versus quantitative studies. A variety of sampling techniques are described for different research contexts such as ethnographic fieldwork, interviews, and content analysis.
The document discusses the important elements to consider when choosing a good research topic. It outlines six key elements: 1) the topic must be of interest, 2) it must be focused on a specific question, 3) it must be significant, 4) it must have a reasonable scope, 5) relevant literature must be available, and 6) it must be feasible given time and resource constraints. It provides examples and guidance on how to evaluate a topic against these criteria to ensure an effective research project.
Qualitative and quantitative methods of researchJordan Cruz
The document compares and contrasts qualitative and quantitative research methods. It discusses that qualitative research aims to understand social interactions through smaller, non-randomly selected samples, while quantitative research seeks to test hypotheses and make predictions using larger, randomly selected samples and specific variables. It also outlines the different types of data collected, forms of analysis, roles of researchers, and final reporting structures between the two methods.
This document discusses ethics in research. It covers key principles like voluntary participation, informed consent, avoiding harm, and maintaining privacy, anonymity and confidentiality. It discusses proper data gathering and storage procedures. It also addresses issues like plagiarism, fabrication, misleading authorship, and non-publication of data. The document provides guidelines from organizations like ESRC on ensuring research integrity and quality, informing participants, respecting confidentiality, avoiding coercion, and minimizing harm to participants. It discusses balancing risks and benefits in research.
A PRESENTATION ON RESEARCH METHODS: SELECTION OF A RESEARCH TOPIC, FORMULATING A HYPOTHESIS, PHILOSOPHICAL ISSUES IN RESEARCH, QUANTITATIVE VS QUALITATIVE DEBATE & SELECTION OF A RESEARCH METHOD
This document discusses various qualitative research methods for collecting and analyzing data. It describes qualitative research as focusing on collecting narrative and visual non-numerical data to understand a phenomenon of interest. It then outlines several common qualitative research approaches like grounded theory, ethnography, phenomenology, narrative research, case studies and the types of data collection methods used in each approach such as interviews, observations, focus groups and document analysis. Finally, it discusses the process of analyzing qualitative data which typically involves preparing, organizing, coding and categorizing the data to identify themes and patterns.
This document discusses key ethical considerations in research including informed consent, privacy, confidentiality, potential harms, and benefits. It addresses ethics committees that review proposed research methodology and adherence to ethical codes. Key principles of ethical research are protecting participants, voluntary participation with informed consent, and following national laws. The document also examines ethical issues around vulnerable groups, deception, incentives, and how to respond to ethical dilemmas that may arise during a study.
Ethical standards are important in research for several reasons. They promote truthful and accurate research by prohibiting falsification of data. They also promote collaboration through values like trust and accountability. Ethical standards ensure researchers are accountable to the public since they are often publicly funded. Following ethics helps build public support and trust in research. Areas of unethical conduct include plagiarism, fabrication, failing to publish results, faulty methods, and improper authorship. Researchers have a duty to protect subjects' rights, obtain informed consent, and conduct legal and responsible research.
The document discusses research ethics and identifies important ethical principles to consider during the research process, including when developing the research problem, question, and design, collecting and analyzing data, and disseminating results. It highlights historical examples of unethical research like the Tuskegee Syphilis Study. Key principles that must be respected include informed consent, minimizing harm, respecting participants, and maintaining integrity. Researchers should obtain ethics approval and consult their institutional review board if they have any ethical questions or concerns.
This document provides an overview of ethics in research. It defines ethics and discusses key historical events that shaped modern research ethics like the Nazi experiments and the Nuremberg Code. The three primary ethical principles of beneficence, respect for human dignity, and justice are examined. Informed consent, risks/benefits analysis, and the role of institutional review boards in ensuring ethical research are covered. Challenges in vulnerable populations and qualitative/mixed methods research are also summarized.
The document discusses ethics in research and publication, outlining researchers' ethical responsibilities, approaches to ethical decision making, guidelines like the Belmont Report and APA Ethics Code, and considerations like informed consent, minimizing risks to participants, ensuring confidentiality, and the review processes of Institutional Review Boards and Institutional Animal Care and Use Committees. It also examines issues like scientific misconduct, ethical challenges in animal research, and case studies like Milgram's obedience experiment.
This document discusses the ethical considerations that must be addressed at each step of the planning process for social marketing programs. It outlines 6 key steps: 1) choosing a program focus, 2) selecting target audiences, 3) setting objectives and goals, 4) researching audience knowledge and behaviors, 5) designing the market offering or product, and 6) managing costs or prices. At each step, issues of social equity, competing priorities, disclosure, stewardship, and conflicts of interest must be carefully evaluated to ensure the program's ends justify the means and do not undermine alternative approaches or marginalize certain groups.
Supachai Chuenjitwongsa (Cardiff University) talks about his experiences of teaching and assessing research methods during his time as a lecturer in Thailand. This presentation was part of the HEA-funded project “Innovation in the Assessment of Social Science Research Methods in UK HEIs”. The project was led by Luke Sloan, Cardiff University.
8 ethical and social considerations in strategy developmentTaranpreet Kaur
This document discusses key ethical and social considerations in strategic planning. It identifies stakeholder participation, organizational values, individual values, and managing change as the main ethical considerations. Stakeholder participation, organizational values, and individual values are described as "acid tests" to ensure a strategy is developed with appropriate information and aligned with ethical standards. Change management is also highlighted as important to strategic planning to engage people and minimize risks from resistance to changes.
reseach methodology in social sciences..shailesh15
This document discusses various topics related to research methodology. It begins by defining what research is, including that it is a systematic effort to gain new knowledge. It then discusses different types of research such as descriptive, exploratory, and explanatory research. It also discusses different research methods like quantitative and qualitative approaches. Various steps in the research process are outlined, including defining the problem, literature review, data collection and analysis. Finally, it discusses key principles of research ethics like honesty, objectivity, and protecting confidentiality.
Jurgen Habermas is a German philosopher and social theorist born in 1929. He is known for his work on the foundations of social theory and analysis of advanced capitalist societies. He challenged social science by arguing that humans have the ability for rational communication. His major achievement was developing the theory of communicative rationality, which rests on the idea that humans possess communicative competence developed through evolution. However, he believed contemporary society has suppressed this competence. He had hope for the future in the development of an active public sphere in political communities. Habermas' defense of modernity and civil society has provided an alternative to poststructuralism.
The document provides an overview of social science research. It discusses key topics like the definition and objectives of social science research, methods used in social science research, types of social science research such as exploratory research, descriptive research, and experimental research. It also outlines the basic steps involved in conducting social science research such as selecting a problem, literature review, formulating hypotheses, data collection and analysis, and drawing conclusions.
Comparative Methods In Social Sciences, Lecture 1jdubrow2000
This document discusses comparative methods in social sciences and comparative sociology. It defines comparative methods as comparing "something" through space and/or time. Comparative sociology addresses problems inherent in cross-national and/or historical studies. Key topics covered include defining units of observation like nations, states, countries and societies; different approaches to comparative research; and traditions in comparative sociology from thinkers like Marx, Weber and Durkheim.
There are three main types of research: basic research, epidemiological research, and clinical research. The basic steps of research involve identifying the problem, planning the study design, implementing the plan by collecting and analyzing data, interpreting results, and reporting findings. Key aspects of the research process include formulating hypotheses, selecting appropriate study variables and objectives, choosing a study design, collecting and processing data, analyzing results, and writing proposals.
This document provides guidance on writing a health research proposal. It discusses key components such as the problem statement, objectives, methodology, variables, study design, data collection procedures, and ethics. A well-written proposal clearly explains the research question and plan to answer it. The methodology section should provide operational definitions of variables and detail how the study will be conducted and data analyzed. Considering ethics is important when researching human subjects. Overall, a strong proposal demonstrates the value and feasibility of the proposed research.
This document discusses the nature and types of scientific research. It defines scientific research as a systematic, objective, and empirical process of collecting and analyzing data to uncover facts and relationships. Scientific research follows the principles of being empirical, objective, systematic, public, replicable, and cumulative. The document outlines three main types of research: descriptive research which observes what people say, quantitative research which measures quantities and compares data, and qualitative research which does not express observations numerically. It also discusses five other types of research: basic research conducted in universities, applied research which aims to solve real problems, co-relational research which examines relationships between variables, and evaluative and action research.
This document discusses the key aspects of qualitative research design. It explains that qualitative research relies on data from interviews, observations, and documents rather than testing hypotheses. The goal is to understand people's behaviors and meanings rather than measuring things. Some common qualitative designs mentioned are grounded theory, ethnography, phenomenology, case studies, and content analysis. Sample sizes are small and purposeful rather than random. Data collection methods include interviews, observations, and documents. Analysis uses an inductive approach to identify themes. Researchers are the main instrument and context is important for understanding findings.
This document discusses research ethics and plagiarism. It presents four cases involving ethical issues in research: 1) Authorship disputes between a professor and PhD student on a grant-funded study. 2) A doctor considering manipulating data from an interim analysis of a clinical trial. 3) A doctor unsure about participating in an international drug trial. 4) Issues with the informed consent process for a drug safety study. It also provides background on regulations put in place after tragic human experiments and discusses principles of ethical research from the Nuremberg Code.
This document provides an outline and overview for writing a research proposal. It discusses reasons for conducting research such as contributing to knowledge and solving problems. A proposal and research proposal are defined as plans for carrying out a task or study. Guidelines are provided for preparing to write a proposal, including contents. A proposal should have chapters on introduction, literature review, and methodology. The introduction states the problem, purpose, significance and research questions or hypotheses. The literature review establishes the theoretical or conceptual framework and reviews related work. The methodology describes the research design, participants, instruments, and analysis plan. Ethical considerations must also be addressed.
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
This document provides an overview of internet research ethics. It discusses how the internet can be used both as a research tool and venue, and how this distinction has become blurred with social media. It outlines some of the key ethical issues in internet research, including privacy, recruitment, informed consent, and issues around big data and cloud computing. It also discusses the history and definitions of internet research ethics as a discipline, and how human subjects research protections apply in this context.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
Big Data can generate, through inferences, new knowledge and perspectives. The paradigm that results from using Big Data creates new opportunities. Big Data has great influence at the governmental level, positively affecting society. These systems can be made more efficient by applying transparency and open governance policies, such as Open Data. After developing predictive models for target audience behavior, Big Data can be used to generate early warnings for various situations. There is thus a positive feedback between research and practice, with rapid discoveries taken from practice.
DOI: 10.13140/RG.2.2.14677.17120
The use of social media in the recruitment processBhagyashree Zope
This document summarizes a study on the use of social media in the recruitment process. It finds that over half of UK jobseekers now use social media sites like Facebook and LinkedIn to search for jobs. While social media offers opportunities to efficiently target candidates, there are also risks around privacy, discrimination, and bias. Employers need to consider how to handle personal information found online and avoid letting non-job related factors influence hiring decisions. The study examines the costs and benefits of using social media, common tools and practices, and risks to both employers and candidates. It aims to understand how social media is changing recruitment and provide advice on related legal and policy issues.
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
This document summarizes a study on the use of social media in recruitment conducted by the Institute for Employment Studies (IES) for the UK's Advisory, Conciliation and Arbitration Service (Acas). The study aimed to understand how and why employers use social media tools for recruitment, the perceived costs and benefits, and the legal and reputational risks. It involved a literature review and case studies with Pets at Home, G4S, and Monmouthshire County Council. The study found that employers use social media mainly for candidate screening and marketing, though there are risks around privacy, discrimination, and bias. Employers must develop policies around social media use in recruitment to manage these risks.
httpojni.orgissuesp=1708 August 13, 2012The Ethics of.docxadampcarr67227
http://ojni.org/issues?p=1708 August 13, 2012
The Ethics of Internet Research
By
Susan G. Williams MSN, RN
CITATION
Williams, S. G. (June 2012). The Ethics of Internet Research. Online Journal of Nursing Informatics (OJNI), 16
(2), Available at http://ojni.org/issues/?p=1708
Abstract
Research conducted on the internet is a cost effective form of recruitment, data
collection, and analysis. Researchers can access individuals worldwide for studies
in remote areas where there is a lack of or inability to conduct research. With this
opportunity come ethical concerns such as determining a safe environment to take
a survey, research in a virtual environment, data security, confidentiality, and
performing secondary analysis on archived support group information.
Researchers should be aware of laws regarding minors and respect the core
ethical principles of beneficence, respect for persons and justice. Institutional
Review Boards at institutions conducting this type of research need specific
guidelines for researchers to follow in order to maintain the integrity of research. It
is important for future nurse researchers to incorporate new therapeutic models
and specific steps to protect the public when participating in internet research.
Ke y Words: internet, research, ethics, data collection
Introduction
The Internet or World Wide Web is changing the way people function on a daily basis. As of September 2010,
76% of Americans had either a laptop or desktop computer (Pew Internet American Life Project, 2010). Smith
(2011) identifies that 35% of Americans own a smart phone in a study conducted by the Pew Internet American
Life Project. Similarly, Kim (2011) states that “by the end of 2014, one in every three Americans, or 90 million
users is expected to have a tablet” (p.1). This capability to communicate with others online has opened many
opportunities for a researcher to recruit study participants and to collect data (Longo, 2010). An example of this
technology is tracking the progress of clients with chronic illnesses or following clients involved in longitudinal
research studies (MobileActive.org, 2012). As this type of “web-based” research grows, researchers will face
ethical concerns that are different from traditional research ethical issues (Denissen, Neumann & Van Zalk,
2010). The purpose of this article is to discuss the topic of internet research and the ethical issues that emerge
because of this process. The review of literature will present different views of this area of research and specific
ethical concerns. The article will include strategies to address these ethical issues and the status and future
directions of internet research.
Literature Review
A search on CINAHL was performed using the search terms internet, research, and ethics. The search was
limited to the last 6 years and yielded 75 articles. Both full text and peer-reviewed studies with references were
included. The author selected ten articles that.
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
Seventh lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
This document summarizes a research study that examined the impact of trust, security, and privacy concerns on information sharing in Facebook. The study developed a research model to understand how security and privacy concerns influence trust in social networking sites and willingness to share information. An online survey was administered to 250 Facebook users of different age groups over 4 months. Statistical analysis of the data supported the hypotheses that privacy concerns, security, and trust positively influence information sharing in social networking sites like Facebook. The findings provide insight into how privacy, security, and trust impact users' behaviors for revealing information on social media platforms.
Some ethicists argue that the very conduct that results in resistanc.pdflibowskymcinnisell69
Some ethicists argue that the very conduct that results in resistance from
participants—interference, invasiveness in their lives, denial of privacy rights—has encouraged
researchers to investigate topics online that have long been the principal commodity of offline
investigation. The novelty and convenience of communicating by computer has led researchers
to cyberspace in search of abundant sources of data. Whether we call it the “wired society,”
“digital life,” “computer-mediated communication,” or “cyberculture,” the growth of
cyberstudies causes us to question how we gather data online, deal with participants, and present
results.
In a special ethics issue of Information Society, scholars involved in cyberspace research
concluded:
All participants agree that research in cyberspace provides no special dispensation to ignore
ethical precepts. Researchers are obligated to protect human subjects and “do right” in electronic
venues as in more conventional ones. Second, each participant recognizes that cyberspace poses
complex ethical issues that may lack exact analogs in other types of inquiry. The ease of covert
observation, the occasional blurry distinction between public and private venues, and the
difficulty of obtaining the informed consent of subjects make cyber-research particularly
vulnerable to ethical breaches by even the most scrupulous scholars. Third, all recognize that
because research procedures or activities may be permissible or not precluded by law or policy, it
does not follow that they are necessarily ethical or allowable. Fourth, all agree that the individual
researcher has the ultimate responsibility for assuring that inquiry is not only done honestly, but
done with ethical integrity.7
Issues relating to cyberspace in research also relate to data mining. The information collection
devices available today were once the tools of the spy, the science fiction protagonist, or the
superhero. Smart cards, biometrics (finger printing, retinal scans, facial recognition), electronic
monitoring (closed circuit television, digital camera monitoring), global surveillance, and genetic
identification (DNA) are just some of the technological tools being used by today’s organizations
to track and understand employees, customers, and suppliers. The data mining of all this
information, collected from advanced and not necessarily obvious sources, offers infinite
possibilities for research abuse.
show your reaction to that, how it can damage and can be destructive to a research, how it can be
destructive to research results, how it can be destructive to the name of the researcher, etc. Is
there any positive side that you see in that ethical matter? Write your assignment based on what
was just explained. Your assignment will be a large paragraph to a maximum of one page
Solution
A cyber event can be instigated either from external parties (remote, unauthorized access) or by
insider misuse:
Resulting in theft, disruption and/or damage to data a.
This document discusses open data and privacy concerns in the humanities. It outlines that while open data has benefits, some humanities and social science data contains personal details that require protections. Three examples show challenges with medical records, subscriber lists, and student work. The document examines how data can be anonymized but still useful, and questions if IRB rules are too strict. Overall, it argues that fully open or closed access are sometimes false dichotomies, and more nuanced policies are needed to both protect privacy and enable collaborative research.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
Presentation of my Master Thesis for the International Master in Digital Library Learning (DILL). Prepared for the 2nd QQML 2010 International Conference Chania, Crete (Greece), 25-28 May 2010. Paper due to appear on the Conference’s Proceedings.
This presentation discusses the intersection of social media and human subjects research regulations. It provides an overview of the scope and requirements of HHS regulations for protecting human subjects. It then examines how these regulations apply to using social media for subject recruitment and as a research tool, as well as conducting research on social media. Key issues addressed include informed consent, privacy/confidentiality, risks/benefits, and challenges for IRBs in evaluating this type of research.
Similar to Ethical considerations in online research for the social sciences (20)
The Intersection of Social Media and Human Subjects Research
Ethical considerations in online research for the social sciences
1. Ethical considerations in online
research for the social sciences
With special consideration given to the
2nd edition of Tri-Council Policy Statement:
Ethical Conduct for Research Involving Humans
(TCPS2)
By Cody Skinner
University of Guelph
March 15, 2013
2. Using the internet for research
There are many different contexts for online research:
- in the form of the interaction (text, audio or video)
- the environment under scrutiny (online community, e-commerce site)
In addition to different epistemological and logistical approaches, each require
nuanced ethical considerations (AoIR, 2012; Krotoski, 2010).
“Although the medium presents challenges to existing ethical approaches, the
Internet does not inherently transform the accepted protocols. Technology
connects people to people via a network, and therefore we must be sensitive to the
rights of the human subjects behind the connections” (Krotoski, 2010, p. 4).
3. Three categories of online research
Kitchin (2003) suggests there are three general types of research methods available
through the Internet:
(1) Passive analysis: Studies of online information patterns or discussions without the
researchers involving themselves;
(2) Active analysis: Researchers participate in online communications;
(3) Online semi-structured interviews, online focus groups, or Internet based surveys,
or use the Internet to recruit subjects for traditional research.
Research that falls under numbers 2 and 3 will always require REB approval. Within
the research ethics guidelines of the Tri-Council Policy Statement, passive analysis may
need REB approval if it is judged to make use of private information (TCPS2, 2010).
The distinction between public and private on the internet, however, can be unclear.
4. Public vs private on the Internet
Some researchers contend that much of the data found online is situated in the
public domain and, as such, is comparable to a television or newspaper article
(Kitchin, 2003).
Drawing on previously created and archived narratives/texts falls under
publicly available information, especially in cases where the use of which
would pose no harm beyond that already assumed by speakers-as-writers
(Kitchin, 2003).
However, according to TCPS2 “a matter that is publicly accessible may,
nevertheless, be considered private in a prospective participant’s culture. There may
be a reasonable expectation of privacy by some groups, or for some activities”
(TCPS2, 2010, p 147).
5. Public vs private on the Internet
Covert observation (lurking) avoids many of the barriers associated with age,
gender and race in relationships between the researcher and participants. However,
‘lurking’ may have serious ethical considerations regarding invasion of privacy
(Brownlow and O’Dell, 2002).
While people online operate in a public space, they may have perceptions or
expectations of privacy.
Users may know their communication online is publicly visible, but the specific
context in which it appears may imply restrictions on how that information can be
used by other parties (AoIR, 2012).
6. Indicators for perceptions of privacy
Eysenbach and Till (2001) suggest researchers consider the following when
deciding whether online sources of data are private or public:
• Sites requiring registration or a user’s permission to gain access to a discussion
group or social media posts are most likely regarded as private places.
• The number of (real or assumed) users of a community may indicate how public
the space is perceived to be.
• The perception of privacy depends on an individual group's norms and codes,
target audience, and aim, often laid down in the frequently asked questions or
information files of an internet community.
7. Relevant passages in TCPS2
“Exemption from REB review is based on the information being accessible in the
public domain, and that the individuals to whom the information refers have no
reasonable expectation of privacy” (TCPS2, 2010, p 24).
“Cyber-material … to which the public is given uncontrolled access on the
Internet for which there is no expectation of privacy is considered to be publicly
available information” (TCPS2, 2010, p 24).
“When accessing identifiable information in publicly accessible digital sites …
with restricted membership, the privacy expectation of contributors of these sites is
much higher. Researchers shall submit their proposal for REB review”
(TCPS2, 2010, p 24).
“When in doubt … researchers should consult their REBs” (TCPS2, 2010, p 24).
8. ‘Active analysis’ and other online
engagement for research
According to a report by Social Sciences and Humanities Research Ethics Special
Working Committee (SSHWC, 2008), in cases where a researcher participates in
an online community, or in cases where the researcher uses the Internet to solicit
‘subjects,’ ethics review should be sought.
This includes:
1. engaged web-based research, even with minimal involvement where the
researchers participate in communications, and
2. online research (collecting information through interviews, discussion groups,
surveys or questionnaires)
Ethical assessment would be necessary as these situations raise problems involving
consent, anonymity, confidentiality and risk.
9. Challenges in obtaining consent online
The process of requesting consent can disrupt normal group activity
(Bruckman, 2002).
The speed of discussions and change in participants typical in online environments
make it difficult to obtain consent online from all participants (SSHWC, 2008).
It is difficult to ensure that subjects thoroughly read the consent form, understand
instructions and give information voluntarily (SSHWC, 2008).
While they may provide a useful starting point, obtaining permission from an
administrator is inadequate to obtain the consent of the community (Eysenbach
and Till, 2001).
10. Tips for obtaining consent online
SSHWC (2008) recommends the following when seeking consent online:
• Ask participants to indicate their agreement and understanding
at each major point in the consent form by using check boxes.
• Provide a hyperlink to frequently asked questions.
• Provide clear instructions for revoking consent, ensuring that data
are removed from the database.
• Test participants on the consent-related material with correct responses
to access the study.
11. Research with minors
As with most social science research, SSHWC (2008) suggests researchers are of
two positions when it comes to consent involving research with minors:
• For some, contact with and access to minors in the context of Internet research
should take place only through an intermediary, such as parents or the school.
• Others favour direct access to minors, with no parental consent, so that young
people can respond freely to research questions and not be prevented from
participating in the research
In either case, it is difficult to verify the age and identity of an online participant.
One might verify the participant’s information with a telephone call and cross-
checking information from the participant with information from other sources
(Kitchin, 2003).
According to TCPS2, “those who lack the capacity to consent on their own behalf
must neither be unfairly excluded from the potential benefits of research
participation, nor may their lack of capacity to consent be used to inappropriately
include them in research” (TCPS2, 2010, p 41).
12. Anonymity
Online pseudonyms should be treated in the same way one treats real names (Hill
et al, 2004). The reputation of a virtual identity needs to be valued as the most
important social currency in online environments (Krotoski, 2010).
Even ‘anonymised’ datasets can contain enough personal information for
individuals to be identifiable (AoIR, 2012).
Use of explicit quotes may make it possible to locate the original author of the text
through search engines (Kitchin, 2003).
Authors of online content may actually want to be credited. Failure to do so may
be considered a misuse of another person's intellectual property
(Eysenbach and Till, 2001).
“Where the researcher seeks data linkage of two or more anonymous sets of
information … and there is a reasonable prospect that this could generate
identifiable information, then REB review is required” (TCPS, 2010, pp 25).
13. Confidentiality
Identifying information, demographic or other sensitive information should be
collected, transmitted, and stored separately from experimental data
(Hill et al, 2004).
The confidentiality and privacy of data gathered through online surveys may
constitute another problem due to transmission of data (Hill et al, 2004).
Researchers should alert participants to potential privacy confidentiality breaches,
even though this may effect participation levels (Brownlow and O’Dell, 2002).
“Research data sent over the Internet may require encryption or use of special
denominalization software to prevent interception by unauthorized individuals, or
other risks to data security. In general, identifiable data obtained through research
that is kept on a computer and connected to the Internet should be encrypted”
(TCPS2, 2010, pp 61).
14. Risk
It is difficult to monitor for or help subjects deal with any distress raised by an
online interview or study (SSHWC, 2008). Debriefing and feedback are also more
complicated, as participants may exit the exercise before these happen. Hill et al
(2004) suggest the following steps be taken:
• Solicit personal, secure email at the beginning of the experiment whereby
feedback material can be sent if study participation is terminated prematurely.
• Opt-out buttons within surveys should be linked to a debriefing page.
• As debriefing cannot be guaranteed, deception should be used sparingly.
Information should also be provided on the identity, affiliation, and role of the
research team. Research design should include procedures for soliciting feedback
and handing complaints from participants, while summaries of study results should
be posted or sent via email to interested individuals (Hill et al, 2004).
15. A case for consideration
Henderson, Hutton and McNeilly (2002) examined two studies conducted using
passive observation of social networks. Simulating the two studies in terms of the
type of information collected, the researchers presented participants with social
network data from their own profiles (eg. status updates, photographs, friends,
locations). Participants were then asked if they would have consented to sharing
those pieces of data with researchers in a study.
Preliminary results indicated that passive crawling of social network sites might not
be acceptable to social network users, and therefore that mechanisms for obtaining
consent should be investigated for such studies.
For more information on this study and and the two cases examined, visit:
http://torrii
.responsible-innovation.org.uk/case-studies/ethics-online-social-network-research-0#
benabdesslem:esm
In your opinion, should the use of social network profile information always
require consent? Should content from Twitter be considered public? Should
comments on a bulletin board styled site like Reddit?
16. References
Association of Internet Researchers (AoIR). (2012). Ethical Decision-Making and Internet Research: Recommendations from the
AoIR Ethics Working Committee (Version 2.0). Chicago, IL: Markham, A., and Buchanan, E.
Brownlow, C., and O’Dell, L. (2002). Ethical Issues for Qualitative Research in Online Communities. Disability and Society,
17(6), pp. 685–694.
Bruckman, A. (2002). "Ethical Guidelines for Research Online." Georgia Institute of Technology. Retrieved March 14, 2013,
from http://www.cc.gatech.edu/~asb/ethics/
Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council of Canada, and Social Sciences and
Humanities Research Council of Canada. (2010). Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans
(TCPS2).
Eysenbach, G., and Till, J.E. (2001). Ethical issues in qualitative research on Internet communities. British Medical Journal, vol.
323: 1103-1105
Henderson, T., Hutton, L., and McNeilly, S. (2012). FRRIICT case study report: Ethics in online social network research.
Retrieved March 14, 2013, from http://torrii.responsible-innovation.org.uk/case-studies/ethics-online-social-network-research-
0#benabdesslem:esm
Hill, M.L. King, C.B. Ecker-Denver, C. Gibson, E., Pankoff, B. and Rice, T. (2004). "The Ethics of Online Research: Issues,
Guidelines and Practical Solutions." Society for Prevention Research – Conference 2004, Poster #196.
http://home.oise.utoronto.ca/~scottlab/colin.pdf
Kitchin, H.A. (2003). The Tri-council Policy Statement and research in cyberspace: Research ethics, the Internet, and revising a living
document. Journal of Academic Ethics, vol. 1(4): 397-418.
Krotoski, A. (2010). Introduction to the Special Issue: Research ethics in online communities. International Journal of Internet
Research Ethics, vol. 3(1): 1-5.
Interagency Advisory Panel and Secretariat on Research Ethics. (2008). Extending the Spectrum: The TCPS and Ethical Issues in
Internet-based Research. Ottawa, ON: Social Sciences and Humanities Research Ethics Special Working Committee (SSHWC).
Background image source: http://pixabay.com/en/ball-http-www-crash-administrator-63527/