Ethical requirements for responsible research with pirated data
Thomas, DR, Pastrana, S., Hutchings, A., Clayton, R. & Beresford, AR in Proc. Internet measurement conference 2017 445-462 (Association for Computer Machines, 2019).
Beecher, HK Ethics and Clinical Research. New Engl. J. Med. 274, 1354-1360 (1966).
Chohaney, ML & Panozzo, KA Infidelity and the Internet: The Geography of Ashley Madison Use in the United States. Geogr. Tower. 108, 69-91 (2018).
Arfer, KB & Jones, JJ US Political Party Affiliation as a Predictor of Adultery Website Use. Camber. Sex. Behave yourself. 48, 715-721 (2018).
Griffin, JM, Kruger, S. & Maturana, G. Personal infidelity and professional conduct in 4 contexts. Proc. Natl Acad. Sci. United States 116, 16268–16273 (2019).
Linke, AM, Witmer, FDW & O’Loughlin, J. Granger’s spatiotemporal analysis of the Iraq war: a study of coalition and insurgent action-reaction. Int. Interact. 38, 402-425 (2012).
O’Loughlin, J., Witmer, FD, Linke, AM & Thorwardson, N. Looking into the Fog of War: The Geography of WikiLeaks War Diaries in Afghanistan, 2004-2009. Geogr. Eurasian. Econ. 51, 472-495 (2010).
Cambridge Analytica controversy must prompt researchers to update data ethics. Nature 555, 559-560 (2018).
Ferretti, A. et al. Big data research ethics review: what should be retained and what should be reformed? BMC Med. Ethics 22, 51 (2021).
Franzke, AS, Bechmann, A., Zimmer, M. & Ess, C. The Association of Internet Researchers. Internet Research: Ethical Guidelines, 3. https://aoir.org/reports/ethics3.pdf (2020).
Poor, N. & Davidson, R. The Ethics of Using Hacked Data: The Patreon Data Hack and Academic Data Standards. Internet Res. Ethics Soc. Age 278-280 (2017).
McCoy, TH Jr & Perlis, RH Temporal trends and characteristics of reportable health data breaches, 2010-2017. JAMA 320, 1282-1284 (2018).
Michael, GJ Who’s Afraid of WikiLeaks? Missed opportunities in political science research. Rev. Policy Res. 32, 175-199 (2015).
US Department of Health and Human Services. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Research Subjects https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html (1978).
Mansfield-Devine, S. The Ashley Madison Case. Secure Network. 2015, 8-16 (2015).
Baraniuk, C. Ashley Madison: “Suicides” on Website Hacking. BBC News (August 24, 2015).
Jones, S. Having an affair can shorten your life: Ashley Madison’s suicides. Georgia State University Law Journal 33, 455 (2016).
Boustead, AE & Herr, T. Analysis of the ethical implications of research using data leaks. Polit. Sci. Polit. 53, 505-509 (2020).
Post, SG The Nuremberg Echoes: Nazi Data and Ethics. J. Med. Ethics 17, 42-44 (1991).
Ienca, M. & Vayena, E. Dual use in the 21st century: emerging risks and global governance. Switzerland Med. Weekly 148, w14688 (2018).
Council of Europe. The Convention for the Protection of Human Rights and the Dignity of the Human Being with regard to the Applications of Biology and Medicine. Oviedo, Spain. https://www.coe.int/en/web/bioethics/oviedo-convention (1997).
Kahn, JP, Vayena, E. & Mastroianni, AC Learning As You Go: Lessons From Facebook’s Social Computing Research Post. Proc. Natl Acad. Sci. United States 111, 13677-13679 (2014).
Eynon, R., Fry, J. & Schroeder, R. in The SAGE Handbook of Online Research Methods (Fielding eds, NG et al.) Vol. 2, 19-37 (2017).
Yee, A. et al. Ethical considerations in the use of the Pernkopf Anatomy Atlas: a surgical case study. Surgery 165, 860-867 (2019).
Prunkl, CE et al. Institutionalize ethics in AI through broader impact requirements. Nat. Mach. Inform. 3, 104-110 (2021).