Information Technology Reference
In-Depth Information
Due to the way in which messages are relayed back and forth across the inter-
net, there are many ways that they can remain on a remote server somewhere.
Lacking sufficient ability to track tapping, unlike telephone research where
tapping is quite easily noted, can researchers be sure no one else is reading the
discussion (Flower, 1994)? The point is that with past technologies the
researcher had a physical audio tape, transcript, video tape, etc., that was filed
and maintained in spaces they controlled (Sieber, 1992). But with computer-
mediated communication, the researcher has much less control over the data.
Encryption and security have not attained levels whereby anyone on the inter-
net could legitimately guarantee a volunteer's privacy and/or confidentiality.
When a volunteer is recruited for an online focus group or interview, the indi-
vidual is being asked to be exposed to some level of risk that a researcher
has little to no control over. Text is often retrievable even when it was not
intentionally archived. Those with the technological knowledge and interest
will have access to a great deal of information about the participant, whether
or not the researcher provides permission.
The Rimm study provides an illustration of the debate regarding the use of
online data. Marty Rimm was a student at Carnegie-Mellon, and the principal
investigator in a study of internet pornography entitled “Marketing Pornography
on the Information Superhighway” (http://TRFN.pgh.pa.us/guest/mrtext.html).
Since publication of the study in the Georgetown Law Journal and subsequent
presscoverage,therehasbeendebateaboutissuesofprivacyandwhatconstitutes
“ethical” methods in online research. One critique of the research claimed Rimm
failed to protect the anonymity of those studied and deceived participants
(http://www2000.ogsm.vanderbilt.edu/cyberporn.debate.cgi). The charges stem
from the fact that Rimm accessed server information on people who had no idea
they were participants. Furthermore, he shared the data without making an
attempt to strip it of any traceable identity. The net result was that two individu-
als were prosecuted and went to prison, due, arguably, to the publication of the
study. While one could debate whether or not they deserved to go to prison, the
realitystillremainsthattheywerenotinformedoftheirparticipationinaresearch
study and data from the study led to imprisonment.
The complexity of computer-mediated communication requires researchers
to utilize available guides when determining what constitutes acceptable prac-
tice in their own fields of research, prior to embarking on a major online study.
Professional organizations have developed guidelines to enable people to
address a variety of concerns in the design of their research. In many instances,
it is sufficient to demonstrate respect for the rights and welfare of participants
(Diener & Crandell, 1978; Reynolds, 1982). There are times, of course, when
researchers will have to weigh the respect for individual rights against the over-
all benefit to society. But as there are no clear answers, researchers need to
demonstrate they have weighed the factors and considered the consequences
of their research and the welfare of those affected. Researchers need to ask
themselves whether they can protect participants in online research, and
whether the answer to this question limits their options for conducting
Search WWH ::




Custom Search