Although laws and policies developed in the context of off-line research apply to online investigations, questions about the identifiability of human subjects, the conceptualization of privacy, the need for and means of obtaining informed consent, and the applicability of copyright law to computer-mediated communication (CMC) pose special problems for doing research in cyberspace.
Get full access to this article
View all access options for this article.
References
1.
Allen, C.1996. “What’s wrong with the golden rule?” Conundrums of conducting ethical research in cyberspace. Information Society12(2): 175–187.
2.
American Anthropological Association. 1997. Code of Ethics of the American Anthropological Association. Final draft, March 1. Available from the World Wide Web at: http://www.ameranthassn.org/ethcode.html.
3.
American Psychological Association. 1998. Ethical principles of psychologists and code of conduct. August 5. Available from the World Wide Web at: http://www.apa.org/ethics/code.html%236.12.
4.
American Sociological Association. 1997. Code of Ethics. July 30, 1998. Available from the World Wide Web at: http://www.asanet.org/ecoderev.htm.
5.
Bacard, A. 1995. Frequently asked questions about anonymous re-mailers. July 30, 1998. Available from the World Wide Web at: http://www.eff.org/pub/Privacy/Anonymity/anon_re-mailer.faq.
6.
Bernard, H. R.1994. Research methods in anthropology: Qualitative and quantitative approaches. 2d ed.Thousand Oaks, CA: Sage.
7.
Brandriss, I. L.1996. Writing in frost on a window pane: E-mail and chatting on RAM and copyright fixation. Journal of the Copyright Society43:237–278.
8.
Branscomb, A. W.1995. Anonymity, autonomy, and accountability: Challenges to the first amendment in cyberspaces. Yale Law Journal104:1639–1679.
9.
Branscomb, A. W.1996. Cyberspaces: Familiar territory or lawless frontier. July 30, 1998. Journal of Computer-Mediated Communication2(1): Part 1. Available from the World Wide Web at: http://jcmc.huji.ac.il/vol2/issue1/.
10.
Bruckman, A., compiler. 1997. The ethics of research in virtual communities. July 30, 1998. Available from the World Wide Web at: http://www.cc.gatech.edu/fac/asb/MediaMOO/ethics-symposium-97.html.
11.
Cavazos, E., and G. Morin. 1994. Cyberspace and the law: Your rights and duties in the on-line world. Cambridge, MA: MIT Press.
12.
Code of Federal Regulations. 1991. Title 45, Part 46 (Protection of Human Subjects). Washington, DC: Government Printing Office.
13.
Commonwealth of Massachusetts (Information Technology Division, Legal Department). 1996. The basics of public key cryptography and digital signatures. August 4, 1998. Available from the World Wide Web at: http://www.magnet.state.ma.us/itd/legal/crypto-3.htm.
14.
Curtis, P.1992. Mudding: Social phenomena in text-based virtual realities. March 5, 1999. Available from the World Wide Web at: http://www.eff.org/pub/Net_culture/MOO_MUD_IRC/curtis_mudding.
15.
Detwiler, L.1993. Identity, privacy, and anonymity on the Internet. July 30, 1998. Available from the World Wide Web at: http://www.eff.org/pub/Privacy/Anonymity/privacy_anonymity.faq.
16.
Dibbell, J.1998. My tiny life: Crime and passion in a virtual world. New York: Henry Holt.
17.
Donath, J. S.1996. Identity and deception in the virtual community. August 4, 1998. Available from the World Wide Web at: http://www.judith.media.mit.edu/Judith/IdentityDeception.html.
18.
Electronic Frontiers Florida News. 1998. On-Line Copyright Infringement Liability Limitation Act. July 30, 1998. Available from the World Wide Web at: http://www.efflorida.org/Intell/hr3209.html.
19.
Electronic Privacy Information Center Digital Signatures. August 4, 1998. Available from the World Wide Web at: http://www.epic.org/crypto/dss/.
20.
Elkin-Koren, N.1996. Public/private and copyright reform in cyberspace. Journal of Computer-Mediated Communication2(2). July 30, 1998. Available from the World Wide Web at: http://jcmc.huji.ac.il/vol2/issue2/.
21.
Ellison, C. M. 1996. Establishing identity without certification authorities. August 4, 1998. Available from the World Wide Web at: http://www.clark.net/pub/cme/usenix.html.
22.
Froomkin, A. M.1995. Anonymity and its enmities. Journal of On-line Law Art. 4–4. March 5, 1999. Available from the World Wide Web at: http://www.wm.edu/law/publications/jol/froomkin.html.
23.
Gajjala, R. 1996. Cyborg diaspora and virtual imagined community: Studying SAWNET1. July 30, 1998. Available from the World Wide Web at: http://ernie.bgsu.edu/∼radhik/sanov.html.
24.
Gray, M.1996. Web sites, hostnames and IP addresses, oh my. July 30, 1998. Available from the World Wide Web at: http://www.mit.edu/∼mkgray/net/terminology.html.
25.
Hardy, I. T. 1998. Project looking forward: Sketching the future of copyright in a networked world. August 5. Available from the World Wide Web at: http://lcweb.loc.gov/copyright/reports/.
26.
Herring, S.1996. Posting in a different voice: Gender and ethics in computer-mediated communication. In Philosophical perspectives on computer-mediated communication, edited by C. Ess, 115–145. Albany: State University of New York Press.
27.
Information Infrastructure Task Force. 1995. Intellectual property and the national information infrastructure: The report of the working group on intellectual property rights.Washington, DC: United States Patent and Trademark Office.
28.
Jacobson, D.1996. Contexts and cues in cyberspace: The pragmatics of naming in text-based virtual realities. Journal of Anthropological Research52(4): 461–479.
29.
King, S. A.1996. Researching Internet communities: Proposed ethical guidelines for the reporting of results. The Information Society12(2): 119–127.
30.
Lea, M., and R. Spears. 1995. Love at first byte? Building personal relationships over computer networks. In Under-studied relationships: Off the beaten track, edited by J. T. Wood and S. Duck, 197–223. Thousand Oaks, CA: Sage.
31.
Lee, G. B.1996. Addressing anonymous messages in cyberspace. Journal of Computer-Mediated Communication2(1): Part 1. July 30, 1998. Available from the World Wide Web at: http://jcmc.huji.ac.il/vol2/issue1/.
32.
Long, G. P.1994. Who are you?: Identity and anonymity in cyberspace. University of Pittsburgh Law Review55:1177–1213.
33.
Marvin, L.1995. Spoof, spam, lurk and lag: The aesthetics of text-based virtual realities. Journal of Computer-Mediated Communication1(2). July 30, 1998. Available from the World Wide Web at: http://www.ascusc.org/jcmc/vol1/issue2/marvin.html.
34.
Mnookin, J. L.1996. Virtual(ly) law: The emergence of law in lambdaMOO. July 30, 1998. Journal of Computer-Mediated Communication2(1), Part 1. Available from the World Wide Web at: http://jcmc.huji.ac.il/vol2/issue1/.
35.
Myers, D.1987. “Anonymity is part of the magic”: Individual manipulation of computer-mediated communication contexts. Qualitative Sociology10(3): 251–266.
36.
National Institutes of Health, Office for Protection from Research Risks, Protecting Human Research Subjects. 1993. Institutional Review Board guidebook. Washington, DC: Government Printing Office.
37.
NUA Internet Surveys. 1998. How many on-line? July 30, 1998. Available from the World Wide Web at: http://www.nua.ie/surveys/how_many_on-line/index.html.
38.
Paccagnella, L.1997. Getting the seats of your pants dirty: Strategies for ethnographic research on virtual communities. Journal of Computer-Mediated Communication3(1).August 5, 1998. Available from the World Wide Web at: http://www.ascusc.org/jcmc/vol3/issue1/paccagnella.html.
39.
Parks, M. R., and K. Floyd. 1996. Making friends in cyberspace. Journal of Computer-Mediated Communication1(4). July 30, 1998. Available from the World Wide Web at: http://www.ascusc.org/jcmc/vol1/issue4/parks.html.
40.
Parks, M. R., and L. D. Roberts. 1997. Making MOOsic: The development of personal relationships on-line and a comparison to their off-line counterparts. July 30, 1998. Available from the World Wide Web at: http://psych.curtin.edu.au:80/people/robertsl/moosic.htm.
41.
Post, D. G. 1996a. Encryption—It’s not just for spies anymore. July 30, 1998. Available from the World Wide Web at: http://www.cli.org/DPost/X0009_ENCRYPT1.html.
42.
Post, D. G. 1996b. Knock knock, who’s there?: Anonymity and pseudonymity in cyberspace. July 30, 1998. Available from the World Wide Web at: http://www.cli.org/DPost/X0012_KNOCK.html.
43.
Post, D. G. 1996c. Pooling intellectual capital: Thoughts on anonymity, pseudoanonymity, and limited liability in cyberspace. July 30, 1998. Available from the World Wide Web at: http://www.cli.org/DPost/paper8.html.
44.
Quarterman, J. S.1996. Summary: Third MIDS Internet Demographic Survey. Matrix News6(3). July 30, 1998. Available from the World Wide Web at: http://www.mids.org/ids3/ids3sum.603.
45.
Quarterman, J. S., and S. Carl-Mitchell. 1994. What is the Internet, anyway?Matrix News4(8).July 30, 1998. Available from the World Wide Web at: http://www.mids.org/what.html%23TheMatrix.
46.
Rafaeli, S., F. Sudweeks, J. Konstan, and E. Mabry. 1998. ProjectH: A collaborative quantitative study of computer-mediated communication. In Network and netplay: Virtual groups on the Internet, edited by F. Sudweeks, M. McLaughlin, and S. Rafaeli, 265–281. Cambridge, MA: MIT Press.
47.
Rosenoer, J.1997. Cyberlaw: The law of the Internet. New York/Berlin: Springer-Verlag.
48.
Rosoff, D.1995. PGP and what it does. July 30, 1998. Available from the World Wide Web at: http://www.arc.unm.edu/∼drosoff/pgp/pgp.html.
49.
Sewell, D.1996. A taxonomy of usenet posting identities. July 30, 1998. Available from the World Wide Web at: http://packrat.aml.arizona.edu/∼dsew/taxonomy.txt.
50.
Spears, R., and M. Lea. 1994. Panacea or panopticon? The hidden power in computer-mediated communication. Communication Research21(4): 427–459.
51.
Thomas, J., ed. 1996. Introduction: A debate about the ethics of fair practices for collecting social science data in cyberspace. Information Society12(2): 107–117.
52.
Tien, L.1996. Who’s afraid of anonymous speech? McIntyre and the Internet. Oregon Law Review75: 117–189.
53.
Turkle, S.1995. Life on the screen: Identity in the age of the Internet. New York: Simon &Schuster.
54.
U.S. Copyright Office. 1996. Copyright basics. July 30, 1998. Available from the World Wide Web at: http://lcweb.loc.gov/copyright/circs/circ1.html.
55.
U.S. Copyright Office. 1998. On-Line Copyright Infringement Liability Limitation Act. August 5. Available from the World Wide Web at: http://lcweb.loc.goov/copyright/penleg.html.
56.
Walther, J. B.1996. Computer-mediated communication: Impersonal, interpersonal, and hyper-personal interaction. Communication Research23(1): 3–43.
57.
Waskul, D., and M. Douglass. 1996. Considering the electronic participant: Some polemical observations on the ethics of on-line research. Information Society12(2): 129–139.
58.
Zakon, R. H. 1998. Hobbes’ Internet timeline v.3.3. July 30, 1998. Available from the World Wide Web at: http://info.isoc.org/guest/zakon/Internet/History/HIT.html.