Jump to content

List mining

From Wikipedia, the free encyclopedia

List mining can be defined as the use, for purposes of scientific research, of messages sent to Internet-based electronic mailing lists. List mining raises novel issues in Internet research ethics. These ethical issues are especially important for health related lists. Some questions that need to be considered by a Research Ethics Committee (or an Institutional Review Board) when reviewing research proposals that involve list mining include these:

Are participants in mailing lists "research subjects"?

[edit]

Should those participants in a health related electronic mailing list who were the original sources of messages sent to such lists be regarded as "research subjects"? If so, then several ethical issues need to be considered. These include those pertaining to privacy, informed consent, whether the research is intrusive and has potential for harm, and whether the list should be perceived as "private" or "public" space.

Are participants in mailing lists "published authors"?

[edit]

Should those who were the sources of messages sent to such lists be regarded as "published authors"? Or, perhaps, as "amateur authors"? If so, there are issues of copyright and proper attribution to be considered if messages sent to such lists are cited verbatim. Even short excerpts from such messages raise such issues.

Are participants in mailing lists "members of a community"?

[edit]

Participants on mailing lists such as electronic support groups may regard themselves as members of an online "community". Are they?

To provide an answer to this question, characteristics of various types of communities need to be defined and considered. For example, if one defining characteristic of a community is "self-identification as community", then virtual groups often have this characteristic. However, if "geographic localization" or "legitimate political authority" are considered to be other defining characteristics of a community, then virtual groups rarely or never possess this characteristic.

Of particular importance are virtual groups that, instead of being supportive, may endanger public health in some way. Examples would be mailing lists that attempt to promote actions that may be illegal (such as inciting race hatred), or actions that may be unpopular, but not currently illegal (such as promoting the sale of cigarettes to adults). From a perspective of Internet research ethics, judgements about the potential of particular mailing lists to cause more harms than benefits should be made by a Research Ethics Committee (or an Institutional Review Board), rather than by the researchers themselves.

See also

[edit]
[edit]
  • Till, J. E. "List mining" raises novel issues in research ethics. BMJ 2006; 332(7547): 939 (Rapid Response, 24 April 2006) Read Rapid Responses; BMJ 2006(6 May); 332(7549): 1095 Letter
  • Eysenbach, G. and Till, J. E. Ethical issues in qualitative research on internet communities. : BMJ 2001(Nov 10);323(7321):1103-5. Full text.
  • Bruckman, A. Internet Research Ethics: Studying the Amateur Artist: A Perspective on Disguising Data Collected in Human Subjects Research on the Internet. Part of a collection of papers from members of a panel organized for the Computer Ethics: Philosophical Enquiries (CEPE) conference held at Lancaster University, December 14–16, 2001. Abstract.
  • Galegher, J., Sproull, L., and Keisler, S. Legitimacy, Authority, and Community in Electronic Support Groups. Written Communication 1998(Oct); 15(4): 493–530. Archived text.
  • Weijer, C., Emanuel, E.J. Ethics. Protecting communities in biomedical research. Science 2000(Aug 18); 289(5482): 1142–4. PubMed citation
  • Chapman, S. Respect for privacy of groups that endanger public health? BMJ 2001; 323(7321): 1103 (Rapid Response, 12 November 2001). Read Rapid Responses.
  • Madge, C. Developing a geographers' agenda for online research ethics. Prog Hum Geogr 2007; 31(5); 654–74. Abstract
  • Ruttan, S. The Internet, Access, Accuracy and Abuse. Sandra Ruttan blog, 29 September 2007. Blog post
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy