首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 24 毫秒
1.
Communication researchers and social scientists are quickly discovering the value of data that exists in the postings of members of Internet e-mail, Usenet, and real-time groups. The ability to communicate with one's peers, no matter how esoteric the interests, is causing an explosion in the number of new virtual communities. The interpersonal dynamics of these groups are increasingly coming under the scrutiny of academic research. The publicly available archived records of Internet virtual communities are being analyzed for a wide variety of research interests. The ability to do naturalistic observations of group dynamics, as they are exhibited in these exchanges of text, has captured the attention of many researchers. The institutional review boards of major universities are granting researchers exempt or expedited (exempt from full review) status for this work, due to the public nature of the notes being analyzed. These studies often involve the lack of informed consent, where the group members under study are unaware they are being monitored. There is a potential for psychological harm to the members of these groups, depending on the way results are reported. This article explores the ethical considerations that must be taken into account to protect cyberspace participants. The guidelines proposed are based on the American Psychological Association ethical guidelines for use of human subjects in research. An explanation is offered as to how such guidelines can best be applied to the study of Internet communities. The constructs of Group Accessibility (the public/private nature of the actual cyberspace occupied by a group) and Perceived Privacy (the level of privacy that group members assume they have) are defined and proposed as two dimensions by which individual Internet communities may be evaluated in order to assure the ethical reporting of research findings.  相似文献   

2.
The primary theme of this paper is the normative case against ownership of one's genetic information along with the source of that information (usually human tissues samples). The argument presented here against such "upstream" property rights is based primarily on utilitarian grounds. This issue has new salience thanks to the Human Genome Project and "bio-prospecting" initiatives based on the aggregation of genetic information, such as the one being managed by deCODE Genetics in Iceland. The rationale for ownership is twofold: ownership will protect the basic human rights of privacy and autonomy and it will enable the data subjects to share in the tangible benefits of the genetic research. Proponents of this viewpoint often cite the principle of genetic exceptionalism, which asserts that genetic information needs a higher level of protection than other kinds of personal information such as financial data. We argue, however, that the recognition of such ownership rights would lead to inefficiency along with the disutility of genetic discoveries. Biomedical research will be hampered if property rights in genes and genetic material are too extensive. We contend that other mechanisms such as informed consent and strict confidentiality rules can accomplish the same result as a property right without the liabilities of an exclusive entitlement.  相似文献   

3.
Critical research is becoming increasingly accepted as a valid approach to research in information systems. It is deemed to be particularly suitable for situations where researchers want to address conspicuous injustice, such as in areas of development or the digital divide. Critical research in information systems (CRIS), I will argue, is a possible approach to some of the ethical problems arising in the context of information and communication technology (ICT). It can be sensitive to the question of culture and therefore suitable for researching cross-cultural ethical questions in ICT. It is often unclear, however, what exactly critical research stands for and to what extent critical approaches are applicable across cultural boundaries. This paper will address these problems by proposing a definition of critical research as focused on changing the status quo and aiming for emancipation. It will then look at the question whether different cultures are compatible and comparable and what the role of culture in research on information systems is. The paper will then return to the question whether the critical intention to emancipate and empower humans is an expression of cultural imperialism or whether there are valid ways of promoting emancipation across cultural divides.  相似文献   

4.
In 2008, a group of researchers publicly released profile data collected from the Facebook accounts of an entire cohort of college students from a US university. While good-faith attempts were made to hide the identity of the institution and protect the privacy of the data subjects, the source of the data was quickly identified, placing the privacy of the students at risk. Using this incident as a case study, this paper articulates a set of ethical concerns that must be addressed before embarking on future research in social networking sites, including the nature of consent, properly identifying and respecting expectations of privacy on social network sites, strategies for data anonymization prior to public release, and the relative expertise of institutional review boards when confronted with research projects based on data gleaned from social media.  相似文献   

5.
Along with informed consent, anonymization is an accepted method of protecting the interests of research participants, while allowing data collected for official statistical purposes to be reused by other agencies within and outside government. The Decennial Census, carried out in a number of countries, including the United Kingdom, is a major event in the production of research data and provides an important resource for a variety of organizations. This article combines ethical evaluation, a review of relevant law and guidance, and analysis of 30 qualitative interviews (carried out during the period of the 2001 UK Census), in order to explore the adequacy of the current framework for the protection of informational privacy in relation to census data. Taking account of Nissenbaum's concept of “contextual integrity,” Vedder's concept of “categorical privacy,” and Sen's call to heed of the importance of “actual behavior,” it will be argued that the current “contractarian” view of the relationship between an individual participant and the organization carrying out the Census does not engage sufficiently with actual uses of data. As a result, people have expectations of privacy that are not matched by practice and that the current normative—including the governance—framework cannot capture.  相似文献   

6.
Anonymity   总被引:1,自引:1,他引:0  
Anonymity is a form of nonidentifiability which I define as noncoordinatability of traits in a given respect. This definition broadens the concept, freeing it from its primary association with naming. I analyze different ways anonymity can be realized. I also discuss some ethical issues, such as privacy, accountability and other values which anonymity may serve or undermine. My theory can also conceptualize anonymity in information systems where, for example, privacy and accountability are at issue.  相似文献   

7.
Substantial investments were made in population based biobanks over the past decade. Ethnocultural community members are both sponsors and beneficiaries of biobanks. In addition, the success of biobank projects depends on community support and participation. Yet there are few empirical data on views, perceptions and interests of ethnocultural communities on biobanks. This silent gap in genomics, ethics and policy literatures has to be addressed. We conducted a qualitative research study with in-depth interviews of ethnocultural community leaders (e.g., members of the Canadian Parliament, school commissioners) on their perspectives concerning population specific genomics research and biobanks. An equal partnership model where public is not only informed, but also involved in decision-making processes was perceived as an essential democratic requisite. These empirical data on ethnocultural community leaders' views, interests and perceptions identify several key socio-cultural and ethical factors that can be decisive for effective and sustainable community involvement in biobanks.  相似文献   

8.
In studying on-line communities, researchers must consider the unique environmental factors involved in order to minimize potential harm to human subjects. In particular, the often commented upon disinhibiting effect of computer-mediated communication can encourage people to agree to or even insist on a kind of public exposure by which they may eventually be harmed. On the Internet, where perceptions of interpersonal affect and effects may be obscured by the nature of the medium itself, care must be taken to guard against not only any increased tendency for researchers to objectify subjects, but also the tendency for subjects to underestimate the potential consequences of consent. The criteria for informed consent that may be sufficient in face-toface research environments are not necessarily so in a medium in which subjective experience is easily objectified and information is easily devalued.  相似文献   

9.
《The Information Society》2013,29(2):169-174
In studying on-line communities, researchers must consider the unique environmental factors involved in order to minimize potential harm to human subjects. In particular, the often commented upon disinhibiting effect of computer-mediated communication can encourage people to agree to or even insist on a kind of public exposure by which they may eventually be harmed. On the Internet, where perceptions of interpersonal affect and effects may be obscured by the nature of the medium itself, care must be taken to guard against not only any increased tendency for researchers to objectify subjects, but also the tendency for subjects to underestimate the potential consequences of consent. The criteria for informed consent that may be sufficient in face-toface research environments are not necessarily so in a medium in which subjective experience is easily objectified and information is easily devalued.  相似文献   

10.
This article reviews the qualitative changes that big data technology introduced to society, particularly changes that affect how individuals control the access, use and retention of their personal data. In particular interest is whether the practice of privacy self-management in this new context could still ensure the informed consent of individuals to the privacy terms of big data companies. It is concluded that that accepting big data companies’ privacy policies falls short of the disclosure and understanding requirements for informed consent. The article argues that the practice of privacy self-management could remain viable if the review, understanding and acceptance of privacy agreements is streamlined, standardized and automated. Technology should be employed to counter the privacy problems created by big data technology. The creation of the privacy exchange authorities (PEA) is proposed as a solution to the failures of privacy self-management. The PEA are intermediaries that empower individuals to define their own privacy terms and express informed consent in their dealings with data companies. They will create the technological infrastructure for individuals to select their own privacy terms from a list of standard choices, potentially only once. The PEA will further mediate the delivery and authentication of the individual users’ privacy terms to data companies. A logical proof of concept is offered, illustrating the potential steps involved in the creation of the PEA.  相似文献   

11.
Government agencies often face trade-offs in developing initiatives that address a public good given competing concerns of various constituent groups. Efforts to construct data warehouses that enable data mining of citizens’ personal information obtained from other organizations (including sister agencies) create a complex challenge, since privacy concerns may vary across constituent groups whose priorities diverge from agencies’ e-government goals. In addition to privacy concerns, participating government agencies’ priorities related to the use of the information may also be in conflict. This article reports on a case study of the Integrated Non-Filer Compliance System used by the California Franchise Tax Board for which data are collected from federal, state, and municipal agencies and other organizations in a data mining application that aims to identify residents who under-report income or fail to file tax returns. This system pitted the public good (ensuring owed taxes are paid) against citizen concerns about privacy. Drawing on stakeholder theory, the authors propose a typology of four stakeholder groups (data controllers, data subjects, data providers, and secondary stakeholders) to address privacy concerns and argue that by ensuring procedural fairness for the data subjects, agencies can reduce some barriers that impede the successful adoption of e-government applications and policies. The article concludes that data controllers can reduce adoption and implementation barriers when e-government data mining applications rely on data shared across organizational boundaries: identify legitimate stakeholders and their concerns prior to implementation; enact procedures to ensure procedural fairness when data are captured, shared, and used; explain to each constituency how the data mining application helps to ensure distributive fairness; and continue to gauge stakeholders’ responses and ongoing concerns as long as the application is in use.  相似文献   

12.
Doing the Right Thing: Ethical Cyberspace Research   总被引:1,自引:0,他引:1  
With increased use of the Internet and other computer-based communications resources, researchers have begun examining interactions in, and uses of, 'cyberspace.' In considering ways to conduct ethical cyberspace research, some have looked to guidelines in their own disciplines. A potentially useful ethics statement for social science researchers to consider is that of the Association of Computing Machinery. Keeping in mind some of the ACM guidelines, as well as the similarities and differences between cyberspace and other communications media, may help researchers to be aware of their ethical responsibilities in conducting their research. The ACM guidelines, especially in consideration with other communications media, help remind researchers of the technological environment within which the social interactions being studied take place.  相似文献   

13.
刘松 《现代情报》2009,29(9):199-201
基于现行数据隐私问题日益严重,如何防止数据挖掘过程中隐私信息的泄漏,将是一个重要的研究议题。本文主要针对关联规则挖掘技术,从安全多方计算方面探讨隐私信息的保护,提出适用于挖掘水平分割数据的保护机制。方法设计采用集中式挖掘,过程中加入信息安全技术以确保参与单位的数据隐私,以求在隐私保护和知识获取间取得一个平衡。  相似文献   

14.
The article ties together codified ethical premises, proceedings of ethical reasoning, and field-specific ethical reflections so to inform the ethnography of an Internet-based collaborative project. It argues that instead of only obeying formal statutes, practical judgment has to account for multiple understandings of ethical issues in the research field as well as for the self-determination of reflexive participants. The article reflects on the heuristics that guided the decisions of a 4-year participant observation in the English-language and German-language editions of Wikipedia. Employing a microsociological perspective, it interrogates the technological, social, and legal implications of publicness and information sensitivity as core ethical concerns among Wikipedia authors. The first problem area of managing accessibility and anonymity contrasts the handling of the technologically available records of activities, disclosures of personal information, and the legal obligations to credit authorship with the authors’ right to work anonymously and the need to shield their identity. The second area confronts the contingent addressability of editors with the demand to assure and maintain informed consent. Taking into account these problem areas, the ethical reasoning on the one hand proposes options for observing and documenting episodes. On the other, it provides advice on the feasibility and the necessity of obtaining informed consent.  相似文献   

15.
We analysed the decisions of major European public funding organisations to fund or not to fund synthetic biology (SB) and related ethical, legal and social implication (ELSI) studies. We investigated the reaction of public organisations in six countries (Austria, France, Germany, the Netherlands, Switzerland and the U.K.) towards SB that may influence SB's further development in Europe. We examined R&D and ELSI communities and their particular funding situation. Our results show that the funding situation for SB varies considerably among the analysed countries, with the U.K. as the only country with an established funding scheme for R&D and ELSI that successfully integrates these research communities. Elsewhere, we determined a general lack of funding (France), difficulties in funding ELSI work (Switzerland), lack of an R&D community (Austria), too small ELSI communities (France, Switzerland, Netherlands), or difficulties in linking existing communities with available funding sources (Germany), partly due to an unclear SB definition.  相似文献   

16.
This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore, the ethical evaluation of surveillance technologies should not be limited to privacy issues. While it will also be argued that PTs may become instrumental in pre-commitment strategies, it will also be demonstrated that the use of persuasive surveillance technologies in order to influence the users to become more compliant, to get their consent more easily or making it harder to opt out of the system does give rise to ethical issues.  相似文献   

17.
In the analysis of the ethicalproblems of online research, there is much tobe learned from the work that has already beendone on research ethics in the socialsciences and the humanities. I discuss thestructure of norms in the Norwegian ethicalguidelines for research in the social scienceswith respect to their relevance for the ethicalissues of Internet research. A four-stepprocedure for the ethical evaluation ofresearch is suggested. I argue that eventhough, at one level, the problems of onlineresearch are very similar to those we find intraditional areas of social scientificresearch, there still are some issues that areunique to research online. A general model forthe analysis of privacy and data protection issuggested. This model is then used tocharacterize the special problems pertaining tothe protection of privacy in online contexts,and to argue that one cannot assume a simpledistinction between the private and the publicwhen researching in such contexts.  相似文献   

18.
In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual (or non-automated), fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the case. In preference to the extremes I argue in favour of partial automation in which the system integrates a human CCTV operator with some level of automation. To assess the degree to which such a system should be automated I draw on the further issues of privacy and distance. Here I argue that the privacy of the surveilled subject can benefit from automation, while the distance between the surveilled subject and the CCTV operator introduced by automation can have both positive and negative effects. I conclude that in at least the majority of cases more automation is preferable to less within a partially automated system where this does not impinge on efficacy.  相似文献   

19.
赵喜凤  蔡仲 《科学学研究》2013,31(12):1810-1815
 间隔十年,国外科研机构对我国进行了两起有据可考的基因实验,从最初的“基因采集”引起重视,到“黄金大米”的令人震惊。在全球化过程中,“生物勘测”经常演变成“生物剽窃”,其根本原因在于经济利益的追逐,“地方性知识”被掘取、生产与操控,科学场域中的资本不断聚集。具体原因有两点:其一,认识论上的“知识遮蔽”,研究者以狡猾的手段进行谋取利益的论证,信息的不对等情况出现;其二,修辞学上的身份认同,研究者的头衔和研究机构的声望博得受试者的信任,加重了对信息的遮蔽。此外,伦理审查程序的不严格、伦理审查制度的不完善使得生物勘测由物种多样性采集深入到了人体基因采集,伦理审查的弊端亟待解决。  相似文献   

20.
梅傲  苏建维 《情报杂志》2021,(2):154-160,122
[目的/意义]“知情同意”模式一直是数据处理重要的合法性基础,但其在适用过程中也存在现实困境。我国《数据安全法》和《个人信息保护法》尚在持续完善之中,我国要深度参与全球数据治理,就需要关注“知情同意”的有关问题。[方法/过程]以谷歌公司因涉嫌违反欧盟《一般数据保护条例》而被法国国家信息与自由委员会开出巨额罚单一案为考察中心,从算法的特征、个人数据的多样性以及数据主体与数据控制者间的关系三个角度揭示“知情同意”模式存在的问题,从案件焦点回归现实困境,寻求改良现有“知情同意”模式的方法。[结果/结论]一方面要强化数据控制者的责任与义务,从外部监管、内部优化以及事后救济三个维度补充“知情同意”模式的效力,另一方面要引入“动态同意”模式,稳固“知情同意”模式的法律基础。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号