Ethical Guidelines for the Online Researcher
|
|
- Scot Marshall
- 8 years ago
- Views:
Transcription
1 Ethical Guidelines for the Online Researcher The practice of using the internet as a tool for social science research is a comparatively new phenomenon. It is of paramount importance that the researcher wishing to embark on a study that involves accessing participants through internet sites such as blogs, bulletin boards, online communities or internet forums, understands the ethical issues that may arise from this style of research. Whilst the internet is becoming subject to legislation, a code of practice for the online researcher does not appear to exist in one clear format. Issues such as intellectual property, security of information, obtaining written consent and personal and participant safety are just some of the issues for online research. It is the purpose of this document to guide the online researcher in what has been described as netiquette ; the need to act at all times in a manner that respects and protects both the researcher and the online participants. Some key points 1. This is a guide and not an exhaustive list 2. All online research must be approved by IASREC before commencement 3. The researcher must at all times treat the online community with the same level of courtesy and respect that would be afforded to the offline community 4. The ethical standards of practice expected of researchers in the real world do not change for the online researcher. This document has in places been adapted from Bruckman A (2004) (see reference list) and assumes that you are already familiar with the basic requirements of human subjects research. We need firstly to accept that no one set of rigid rules can ever capture the subtlety of ethical situations that may arise. The following 'rules of thumb' are intended as a general guide only and not an exhaustive list. 1. You may freely quote and analyse online information without consent if: o It is officially, publicly archived. o No password is required for archive access. o No site policy prohibits it.
2 o The topic is not sensitive. For everything else not covered by 1, you typically need consent 2. Electronic consent It is acceptable to post a consent form on an internet site that has been generated by the researcher. The guidance on using chat rooms for research purposes appears to indicate that prior to the discussion taking place a posting is to be made that details the research purposes, right to withdraw, confidentiality, how to make a complaint etc. People will be asked to complete the consent form and from this they follow a link that allows access to the main chat room. In the case of accessing established online communities/blog pages for the purpose of recruiting participants for a study, a copy of the consent form, right to withdraw, how to make a complaint etc must be ed directly to the participants and returned (via ) before the study commences. It is for the researcher to develop a system of coding to allow the removal of information from the study should a participant wish to withdraw. 3. The process of requesting consent must not disrupt normal group activity e.g. when accessing chat rooms it is not acceptable to log into an active conversation and ask for permission to record the online chat, you must announce your research intentions prior to entering the general discussion and have sought permission from participants before hand. 4. When recording material that would otherwise be ephemeral, such as discussing deviant / illegal behaviours, consideration should be given to whether the act of recording potentially creates risks for subjects. 5. Be open and honest. Tell the respondents what support you are able/not able to offer. Identify any potential benefits and/or harm and make it clear what will happen to the data collected, how will it be used, who will have access to it. 6. Covert observation in chat rooms It is the decision of IASREC that covert observations of online communities is not acceptable. 7. Supply a link to the institution/researcher responsible for the research study
3 8. Before the start of a study, the researchers and IASREC must decide whether subjects' identities will be disguised, and if so to what degree. Note that pseudonyms function similarly to real names, and should be treated in the same way one treats real names Because: Levels of disguising: They are often de facto traceable to real names. People care about the reputation of their pseudonyms. In other words, they function for most purposes just like real names, and should be treated the same way. No disguise The Internet is rather like a playground for amateur artists. In many cases, people deserve credit for their creative work. Pseudonyms and real names may be used with permission of the individual. The individual's claim to copyright over the work is respected. The real author of the work is verified. (Some work may be copied or highly derivative, meaning credit belongs to the original author.) The researcher should omit details that would be harmful to the subject if revealed. Light disguise The group is named. Pseudonyms and some other identifying details (place names, organisational and institutional names, etc.) are changed. Verbatim quotes may be used, even if they could be used to identify an individual. Group members themselves may be able to guess who is being discussed. An outsider could probably figure out who is who with a little investigation.
4 Details that are harmful to individuals should be omitted. Moderate disguise A compromise position is chosen, incorporating some features of light disguise and some of complete disguise, as appropriate to the situation. Details of the specific compromise are reviewed by the researcher's ethics committee. Complete disguise The group is not named. Pseudonyms and other identifying details are changed. Verbatim quotes are not used if a search mechanism could link those quotes to the person in question. Some false details may be deliberately introduced. For example, if you are studying a support site for a chronic disease, you might change the disease in published accounts. A subject might or might not recognise themselves. No one else would recognise the subject. Someone deliberately seeking to find a subject's identity would be unable to do so. Details that would be harmful to the subject if disclosed may be revealed. Discussion These guidelines represent an interpretation of what is considered ethical practice when using the internet for research purposes. This style of research may include accessing online communities, news groups or bulletin boards. These guidelines do not address the steps one needs to take to assure that research is accurate. Use of online media introduces new risks of error, for example indiscriminate use of low-quality or erroneous information found online, errors of sampling method, etc. Taking reasonable steps to prevent error is also an ethical obligation of researchers, but is beyond the scope of this document.
5 Situated Research It's important to remember that all "Internet research" takes place in an embedded social context. To understand Internet-based phenomena, you need to understand that broader context. Consequently, most "online research" really also should have an offline component, and many ethical issues become identical to those for traditional research, such as the need to gain written consent from participants. Research Integrity Versus Ethical Obligations A frequent mistake made by many Internet researchers is, when faced with a trade off between needs of subjects and integrity of the research, to give priority to the integrity of the research. On further reflection, it should be obvious that this reasoning is faulty--the rights of subjects come first. For example, when faced with situations where getting consent from potential study participants in a computer-mediated communication forum is logistically difficult or potentially disruptive to the environment, some researchers have concluded that consent is not required. In fact, consent is still required, and substantially disrupting the environment is not acceptable. In such a situation, the investigator must fundamentally rethink the research plan or even abandon it, not lessen their ethical obligations. Many errors in research ethics stem from a researcher's sincere dedication to the quality of results. While producing quality research results is in itself an ethical imperative, it always takes a back seat to the needs of subjects. Consent from Whom? Where consent is required, you need to get consent from each individual you wish to record, quote, or study in any way. In cases where you have a vulnerable or under-age population, you need permission of the group's leader/ gatekeeper before you may solicit participation. A group leader may be an individual or an organisation. (You must remember that if you are considering using an under-age population or vulnerable group, you must have sought and been granted permission from IASREC prior to seeking permission from the site gatekeeper ). For regular groups, you do NOT need permission of the group leader to ask for voluntary participation from individuals, unless that is explicitly required by a posted site policy. "Official" Archives
6 An archive is "official" if its presence is announced in the welcome message sent to new group members, or the archive address is regularly posted to the list or noted in a group FAQ. An archive is public if it is accessible without a password. The point of this language is to try to articulate how we as researchers can determine when members of a list have a reasonable expectation that their communication is private, and when there is no such expectation. Some frequently asked questions Research on Chat rooms Q: What if the gatekeeper says no to my request, doesn't this make it difficult to do research on chat rooms? A: Yes, it does. One suggested technique is to create your own chat room just for the purposes of your study. When you create your own chat room, you can greet each person joining the channel/room with a message informing them about the study. Depending on the nature of the study, a channel logon message may be sufficient, you will also need to get informed consent from participants. Changing Risk Levels Q: My research started off as "low risk" but something unanticipated that is more controversial happened. What do I do? A: Consult your supervisor and they will guide you. You may need to abandon the study or re-think your strategies. The need may arise to go back to the ethics committee to seek new approval if the focus / risk level has changed. In some cases, you may need to with hold some information from your publications. For example, in reports on one educational environment the author created, it would shed light on important issues to comment on some children's personal problems. However, because it was impossible to disguise their identity sufficiently, this information was omitted from publications. While this does diminish the quality of the scholarship, there was really no alternative. Consent Q: The forum I want to use for my research has a posting that says I must seek consent from the forum manager before contacting / posting
7 on the site. I have ed many times asking for permission but got no reply, can I go ahead and make direct contact with forum members? A: No. If the site clearly states that permission must be sought then it is the belief of the forum members that they will not be solicited directly. If consent is not obtainable you will need to abandon this site and move to another. Intellectual ownership Q: Surely if someone has gone online and posted a comment about themselves, they cannot expect that information to be private, can they? Surely I can use that information if I wish without seeking their consent A: This continues to be a debated issue. Who owns a message once it has been placed on a message board? Private versus public? I would suggest you read Mann and Stewart (2000) chapter 3 (see reference list) to fully appreciate the complexities of this issues. Safeguarding privacy Q: If I set up my own discussion board/blog page can anyone else access these without my permission? I have heard that other search engines can gain access without my knowing, is this right? A: Yes it is possible for other providers to gain direct access to the message boards on your site. You will need to make sure you have put safeguards in place to limit this occurring. The researcher keeping safe in the online world It is important to consider your own safety when carrying out online research. Here are some key safety points Never use your home / personal address. Either use your university account for correspondence or set up an internet account that can be closed after the research has taken place. Never post personal details that are not relevant to the research study on a forum / blog / internet page. If you need participants to
8 post a consent form or questionnaire back to you, then consider using the University address or create a PO box address. Never arrange to meet a participant in person that you do not know or have not corresponded with in person (via telephone). If you do wish to carry out a face-to-face interaction with them, then you must follow the same guidelines for any other research project. You will find reference to online safety in Mann and Stewart (2000) chapter 3 (see reference list). These guidelines are not an exhaustive list. It is important that you read widely before considering online research as there are many pitfalls and complexities that need your attention before you commence. Essential reading Mann, C. and Stewart, F. (2000) Internet Communication and Qualitative Research. A Handbook for Researching Online. London. Sage Publication Please refer to the additional reading list for detailed information on using the internet for research purposes. Should you wish to discuss this document in any detail, or, would like further information on carrying out online research please feel free to contact Alison Tresidder-Spivey, Lecturer Sociology/Criminology department, Polhill Campus, Bedford. Alison.Tresidder-Spivey@beds.ac.uk
9 Using the internet as a tool for research purposes. Sources of information Brownlow, C. and O Dell L. (2002) Ethical issues for Qualitative Research in On-line Communities. Disability & Society. Vol. 17. No. 6, 2002, pp Buchanan, E, A. (eds) (2004) Readings in Virtual Research Ethics. Hershey. Information Science Publishing. - (An excellent source of information and recommended by many other writers as the book to consult if considering using the internet as a research tool) Clegg, B. (2006) Studying using the web: the student's guide to using the ultimate information resource. Oxford: Routledge. - (Section on using newsgroups and forums for academic study) Flicker, S., Haans, D. and Skinner, H. (2004) Ethical Dilemmas in Research on Internet Communities. Qualitative Health Research, vol.14 No. 1, January , Hine, C. (2005) Virtual Methods: Issues in Social Research on the Internet. Oxford. Berg - (Section on ethical considerations) Jones, S.G. (editor) (1999) Doing Internet Research. Critical Issues and Methods for Examining the Net. London. Sage. Mann, C. and Stewart, F. (2000) Internet Communication and Qualitative Research. A Handbook for Researching Online. London. Sage Publication - (An excellent source of information and recommended by many other writers as the book to consult if considering using the internet as a research tool) Nancarrow, C., Pallister, J. and Bruce, I. (2001) 'A New Research Medium, New Research Populations and Seven Deadly Sins for Internet Researchers', Qualitative Market Research, Vol. 4, No. 3, pp
10 O Dochartaigh, N. (2002) The Internet Research Handbook. A Practical Guide for Students and Researchers in the Social Sciences. London. Sage Publications. - (Has a chapter on making contact and netiquette. Details the correct way to make contact with online news groups, using bulletin boards and making contact with other researchers). Pears, R. and Shields, G. (2008) Cite them right: the essential referencing guide. Rev. ed. Newcastle upon Tyne: Pear Tree books. - (Covers how to reference web pages, blogs, wikis, social networking sites etc. and how to avoid plagiarism). Internet sources Bruckman, A. (2002) Ethical Guidelines for Research Online. Available at: Sociological Research Online. Via the University Library page Sociological Research Online : Internet [electronic resource]. Available in Ebscohost EJS. This is an invaluable source for anyone considering using the internet / internet users for their social science research. This site has many links to journal articles that have addressed the ethical issues surrounding online research practices. Key articles Chen, P and Hinton, S.M. (1999) 'Realtime Interviewing Using the World Wide Web' Sociological Research Online Vol. 4, No. 3 Coomber, R. (1997) 'Using the Internet for Survey Research' Sociological Research Online, vol. 2, no. 2, Denscombe, M. (2005) Research Ethics and the Governance of Research Projects: the Potential of Internet Home Pages. Sociological Research Online, Volume 10, Issue 3, Illingworth, N. (2001) 'The Internet Matters: Exploring the Use of the Internet as a Research Tool'. Sociological Research Online, vol. 6, no. 2,
11 Other sources that will help guide your practice MRS (2004) Code and Guidelines: Internet Research Guidelines, Market Research Society. < Professional Associations e.g. British Sociological Association. British Association of Social Workers. British Psychological Society (2007). Report of the Working Party on Conducting Research on the Internet. The data Protection Act
Making ethical decisions in an online context:
Making ethical decisions in an online context: Reflections on using blogs to explore narratives of experience Helene Snee, University of Manchester Framing the Gap Year: Distinction, Difference and Identity
More informationMRS Guidelines for Online Research. January 2012
MRS Guidelines for Online Research January 2012 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research, business intelligence and customer
More informationWith the increasing popularity of social media you need a Social Media Policy to protect your company.
Dear Reader, With the increasing popularity of social media you need a Social Media Policy to protect your company. It can become your biggest nightmare when employees distribute information that s not
More informationAuburn University at Montgomery Policies and Procedures
Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created
More informationPOLICY. Responsible Use of Social Media
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
More informationPrepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White
Principles of Good Research & Research Proposal Guidee Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White March 2006 Principles of Good Research All research is different
More informationWeb Server & Systems Usage Policy. The WGG Associates Limited Usage Policy has been developed with the following objectives:
Web Server & Systems Usage Policy The WGG Associates Limited Usage Policy has been developed with the following objectives: Ensure security, reliability and privacy of WGG Associates Limited' systems and
More informationForrestville Valley School District #221
Forrestville Valley School District #221 Student Acknowledgment of Receipt of Administrative Procedures for Acceptable Use of the Electronic Network 2015-2016 All use of electronic networks shall be consistent
More informationCommunications Council Best Practice Guide
Communications Council Best Practice Guide Social Media Code of Conduct social media code of conduct Purpose In the past few years social media has become an important and integral part of the marketing
More informationGLA Social Media Guidelines Contents
GLA Social Media Guidelines Contents Introduction... 2 The GLA s official social media channels... 2 Process... 2 Legal considerations & the Code of Conduct... 6 Pre-election periods (General elections,
More informationChicago State University Computer Usage Policy
Chicago State University Computer Usage Policy Introduction This document provides guidelines for appropriate use by students, faculty and staff of computers, and other technological facilities and services
More informationHow To Use Social Media At St James Anglican School
P o l i c i e s n P r o c e d u r e s n I n f o r m a t i o n T o t a l n u m b e r o f p a g e s 2 P o l i c y C r e a t i o n D a t e : 2 4 S e p t e m b e r 2 0 1 4 P o l i c y R e v i e w D a t e :
More informationSalisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
More informationDr. Lucy Gibson Sociology University of Manchester
Dr. Lucy Gibson Sociology University of Manchester Various aliases: Email interviewing/online interviewing/e-interviewing/electronic interviewing Asynchronous computer-mediated communication (CMC) Put
More informationFacebook s Emotional Contagion: Social Media Research
Facebook s Emotional Contagion: Social Media Research Mount Allison University March 11, 2015 Gordon DuVal, SJD gduval@uottawa.ca www.gduval.com Emotional Contagion 2 3 Facebook Research In 2012, Facebook
More informationSocial Media Policy for ALPFA Staff, Leaders and Volunteers
Empowering Latino Leaders Social Media Policy for ALPFA Staff, Leaders and Volunteers alpfa.org Introduction: At ALPFA, our mission is to empower and develop Latino men and women as leaders of character
More informationNorth Carolina EFNEP Social Media Guidelines
North Carolina EFNEP Social Media Guidelines This document gives guidance to the publication of and commentary on social media by employees of NC EFNEP. For the purposes of this document, social media
More informationsection 15 Computers, Email, Internet, and Communications
section 15 Computers, Email, Internet, and Communications 15.1 Electronic Communications Email is Not Private Email messages, including attachments, sent and received on YWCA Tulsa equipment are the property
More informationSOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE
SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE SOCIAL MEDIA POLICY FOR VOLUNTEERS TEMPLATE (Insert Your Organisation Name) uses social media in its work and recognises that those who are involved in its work
More informationPOLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY
POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these
More informationTECHNOLOGY USAGE POLICY
TECHNOLOGY USAGE POLICY Computer Usage Policy (CUP). 2 Aims/Objectives. 2 General.. 2 Student Responsibilities 2 Monitoring 3 Access Violations... 3 Personal Devices 3 Internet Safety: Acceptable Usage
More informationSOCIAL MEDIA POLICY. Presented by: Jaffe PR. 727 Kirkwood Avenue - Atlanta, GA - 30316 404.885.9100 - www.theremsengroup.com
SOCIAL MEDIA POLICY Presented by: Jaffe PR 727 Kirkwood Avenue - Atlanta, GA - 30316 404.885.9100 - www.theremsengroup.com Presented By Jaffe PR Revised January 1, 2012 SOCIAL MEDIA POLICY 1 NOTE: At Jaffe
More informationSOCIAL MEDIA GUIDELINES FOR SCHOOLS
SOCIAL MEDIA GUIDELINES FOR SCHOOLS The goal of these guidelines is to provide, staff, administrators, students, parents and the school district community direction when using social media applications
More informationA. INTRODUCTION B. TIMING IS IMPORTANT
A. INTRODUCTION A reference letter, or letter of recommendation, 1 is usually written to attest to a person s skills, character and/or achievements. It is a formal document, and should be typed on letterhead,
More informationHuman Resources Policies and Procedures
SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media
More informationMRS Guidelines for Business-to-Business Research. October 2011
MRS Guidelines for Business-to-Business Research October 2011 Updated September 2014 MRS is the world s largest association for people and organisations that provide or use market, social and opinion research,
More informationQuestionnaire Cornwell-Type Claims
Sensitive: Personal once completed Questionnaire Cornwell-Type Claims Please complete all sections of this form and enter N/A in any section that is not applicable to indicate that the question has been
More informationI NTERNET T ECHNOLOGY T
chapter 10 I NTERNET T ECHNOLOGY T his chapter addresses Internet technology as it relates to our public relations efforts. Since a website is often one of the first points of contact for members of the
More informationSOP 502L: INTERNET/SOCIAL MEDIA-BASED RESEARCH
University of Oklahoma Office of Human Research Participant Protection : INTERNET/SOCIAL MEDIA-BASED RESEARCH 1. POLICY Internet/social media-based research projects are reviewed by the IRB just as any
More informationWebsites: Social Networks, Blogs & Usergenerated
INFORMATION SHEET G108v04 December 2014 Websites: Social Networks, Blogs & Usergenerated Media In this information sheet we give an overview of copyright issues that apply when people operating websites,
More informationOnline Communication Services - TAFE NSW Code of Expected User Behaviour
Online Communication Services - TAFE NSW Code of Expected User Behaviour State of NSW, Department of Education and Training, TAFE Customer Support Copies of this document may be made for use in connection
More informationSubject: Computer Network and Internet Use Agreement Guidelines
February 4, 2013 Dear Parents/Guardian, Subject: Computer Network and Internet Use Agreement Guidelines Every student will receive a permission form that must be co-signed by parents/guardians and returned
More information6.9 Social Media Policy
Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government
More informationGwinnett United In Drug Education, Inc. Social Media Policy. Page 1 Updated 1-11-15
Gwinnett United In Drug Education, Inc. Social Media Policy Page 1 Updated 1-11-15 Introduction Gwinnett United in Drug Education, Inc. (GUIDE) recognizes the importance of social media to interact with
More informationHow to be Secure and Get Accurate Medical Information from Internet
Bahrain Medical Bulletin, Vol.23, No.4, December 2001 Editorial How to be Secure and Get Accurate Medical Information from Internet Ibrahim Mansoor, MBBS* Internet has seeped into every corner of medicine.
More informationSOCIAL MEDIA POLICY. Senior Governance Officer, NHS North of England Commissioning Support Unit Reference No
SOCIAL MEDIA POLICY Ratified Governance & Risk Committee 08/2015 Status Final Issued August 2015 Approved By Governance and Risk Committee Consultation Governance and Risk Committee Equality Impact Assessment
More informationHUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
More informationCCG Social Media Policy
Corporate CCG Social Media Policy Version Number Date Issued Review Date 2 25/03/2015 25/03/2017 Prepared By: Consultation Process: Formally Approved: Governance Manager, North of England Commissioning
More informationHow do we know what we know?
Research Methods Family in the News Can you identify some main debates (controversies) for your topic? Do you think the authors positions in these debates (i.e., their values) affect their presentation
More informationProposed Code of Ethical Principles for Professional Valuers
INTERNATIONAL VALUATION STANDARDS COUNCIL Second Exposure Draft Proposed Code of Ethical Principles for Professional Valuers Comments to be received by 31 August 2011 Copyright 2011 International Valuation
More informationHow To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
More informationSOCIAL MEDIA POLICY. Introduction
Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes
More informationThe ethics of using the internet to collect qualitative research data
Research Ethics Review (2006) Vol 2, No 3, 92 97 The Association of Research Ethics Committees 2006 Received 2 June 2006, accepted 20 July 2006 Original paper The ethics of using the internet to collect
More informationBest Practices for the Use of Social Media Summer 2011. Belmont University Athletics
Best Practices for the Use of Social Media Summer 2011 Belmont University Athletics Overview The rapid growth of social media technologies combined with their ease of use and pervasiveness make them attractive
More informationThe SCONUL Seven Pillars of Information Literacy. Core Model For Higher Education
The SCONUL Seven Pillars of Information Literacy Core Model For Higher Education SCONUL Working Group on Information Literacy April 2011 The SCONUL Seven Pillars of Information Literacy: Core Model 2 Introduction
More informationMacmillan Cancer Support Volunteering Policy
Macmillan Cancer Support Volunteering Policy Introduction Thousands of volunteers dedicate time and energy to improve the lives of people affected by cancer. Macmillan was started by a volunteer and volunteers
More informationDISTRICT COUNCIL OF LOXTON WAIKERIE. Social Media Policy
DISTRICT COUNCIL OF LOXTON WAIKERIE Social Media Policy Policy Identification: Adoption Date: 20 April 2012 Last Review: 17 April 2015 Next Review Date: April 2017 Every 2 years Responsible Officer(s):
More informationEthics in Internet. Joshi AG Centre for Information and Network Security University of Pune
Ethics in Internet Joshi AG Centre for Information and Network Security University of Pune The World Today Communication knows no physical boundaries Interconnected globe humming with electronic transmissions
More informationComputer Forensics for Business Leaders: Building Robust Policies and Processes Transcript
Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Part 1: Why Policy Is Key Stephanie Losi: Welcome to CERT's podcast series: Security for Business Leaders. The
More informationICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH
ICC/ESOMAR INTERNATIONAL CODE ON MARKET AND SOCIAL RESEARCH INTRODUCTION The first Code of Marketing and Social Research Practice was published by ESOMAR in 1948. This was followed by a number of codes
More informationA common sense guide to the Data Protection Act 1998 for volunteers
A common sense guide to the Data Protection Act 1998 for volunteers Why is it necessary? The Data Protection Act 1998 is a law introduced to control the way information held about individuals is handled
More informationREVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy
Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This
More informationRealities Toolkit #10. Using Blog Analysis. 1. Introduction. 2. Why use blogs? Helene Snee, Sociology, University of Manchester
Realities Toolkit #10 Using Blog Analysis Helene Snee, Sociology, University of Manchester July 2010 1. Introduction Blogs are a relatively new form of internet communication and as a result, little has
More informationCommunications Council Best Practice Guide Social Media and Online Commentary Code of Conduct
Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Revised Mar 13 2015 social media and online commentary code of conduct Purpose In the past few years social
More informationSocial and Digital Media Policy
Social and Digital Media Policy October 2012 Version 1.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationPlymouth College of Art Guiding Principles on Good Conduct in Staff Research and Scholarly Activities
Plymouth College of Art Guiding Principles on Good Conduct in Staff Research and Scholarly Activities Introduction This document constitutes Plymouth College of Art guiding principles on good conduct in
More informationGuidance on staff use of Social Media
Guidance on staff use of Social Media Introduction Social networking through the use of Internet-based and other electronic social media tools is integrated into everyday life. Use of Facebook, LinkedIn,
More informationAPPENDIX A: SOCIAL MEDIA PRINCIPLES, POLICIES AND GUIDELINES FOR PARISHES, SCHOOLS AND PROGRAMS OF THE ARCHDIOCESE OF SEATTLE
APPENDIX A: SOCIAL MEDIA PRINCIPLES, POLICIES AND GUIDELINES FOR PARISHES, SCHOOLS AND PROGRAMS OF THE ARCHDIOCESE OF SEATTLE In the digital world there are social networks which offer our contemporaries
More informationCARDIFF METROPOLITAN UNIVERSITY RESEARCH GOVERNANCE FRAMEWORK
The Cardiff Metropolitan University Research Governance Framework applies to all members of staff and students involved in research regardless of whether they are conducting research inside or outside
More informationSocial Media Guidelines
MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with
More informationService NSW Code of Conduct
Service NSW Code of Conduct Contents CEO Message 2 Our DNA 3 We ensure our personal and professional conduct complies with this Code of Conduct 4 We manage conflict of interest responsibly 6 We respect
More information(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
More informationAcceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
More informationSocial Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
More informationState University of New York at Canton Institutional Review Board. Sample Informed Consent Document
State University of New York at Canton Institutional Review Board Sample Informed Consent Document The following sample informed consent document includes instructions to the person writing the document,
More informationGUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010
GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social
More informationCHAPTER 13 Medical records and patient access to information
CHAPTER 13 Medical records and patient access to information Robert Stevens is an Auckland barrister and a consultant in the management of personal information and privacy. Cite this as Stevens R 2013.
More informationHallett Cove South Primary School Communications/Network Use Policy
Hallett Cove South Primary School Communications/Network Use Policy The Communications/Network Use Policy ( Policy ) sets out the rights and responsibilities for computer and communications network users
More informationThe SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance
The SHU Social Media CoLab: developing a social media strategy through open dialogue and collaborative guidance BECKINGHAM, Sue, PURVIS, Alison and RODGER, Helen Available from Sheffield Hallam University
More informationSocial Media. Scope. Computer Use Employee Code of Conduct Privacy Emergency Management Plan Communications Strategy Community Engagement Strategy
Social Media Responsible officer: Director Community and Corporate Services Key Result Area: Governance and Decision Making Document type: Policy Reference: 10/01/0004 Approved by: Council Date approved:
More informationCode of Ethics for Professional Accountants
COE Issued December 2005; revised June 2010 Effective on 30 June 2006 until 31 December 2010 Code of Ethics for Professional Accountants CODE OF ETHICS FOR PROFESSIONAL ACCOUNTANTS CONTENTS Page PREFACE...
More informationWe are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards.
Inspection Report We are the regulator: Our job is to check whether hospitals, care homes and care services are meeting essential standards. Bluebird Care (Milton Keynes) Suite 107, Interchange Business
More informationTHE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY
THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR
More informationBroadband Acceptable Use Policy
Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2
More informationTable of Contents. 1. Basic Netiquette Pg. 3-4. 2. Copyright Pg. 5. 3. Plagiarism Pg. 6. 4. Privacy Pg. 6
Computer Ethics 1 Table of Contents Computer ethics is a term used to describe the ethical principles and moral dilemmas that you encounter in today s computer-based society. It makes us think about the
More informationThe Harvard style. Reference with confidence. (2012 Edition)
Reference with confidence: The Harvard style 1 Reference with confidence The Harvard style (2012 Edition) As used in: Archaeology Biochemistry (as well as Vancouver) Biology (as well as Vancouver) Economics
More informationBLACKROCK COLLEGE E-MAIL/INTERNET USER POLICY
Acceptable Use Policy Educational Purpose The computer system in Blackrock College has been established for a limited educational purpose. The term "educational purpose" includes classroom activities,
More informationResponsible Use of Technology and Information Resources
Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni
More informationINSOLVENCY CODE OF ETHICS
LIST OF CONTENTS INSOLVENCY CODE OF ETHICS Paragraphs Page No. Definitions 2 PART 1 GENERAL APPLICATION OF THE CODE 1-3 Introduction 3 4 Fundamental Principles 3 5-6 Framework Approach 3 7-16 Identification
More informationMISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
More informationModel Policy for a Law Enforcement Agency s use of Social Networking
Model Policy for a Law Enforcement Agency s use of Social Networking Disclaimer: This is a model policy was designed to provide a guide to writing a policy related to social networking use. This model
More informationARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party 11601/EN WP 90 Opinion 5/2004 on unsolicited communications for marketing purposes under Article 13 of Directive 2002/58/EC Adopted on 27 February 2004 This Working
More informationInternational Federation of. June 2005. Accountants. Ethics Committee. Code of Ethics for Professional. Accountants
International Federation of Accountants Ethics Committee June 2005 Code of Ethics for Professional Accountants Mission of the International Federation of Accountants (IFAC) To serve the public interest,
More informationGuidelines on Research Ethics for Projects with Children and Young People Nathalie Noret, Faculty of Health and Life Sciences
Guidelines on Research Ethics for Projects with Children and Young People Nathalie Noret, Faculty of Health and Life Sciences Introduction When conducting research with children and young people, the ethical
More informationSocial Media Policy. Policies and Procedures. Social Media Policy
Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4
More informationAPPOINTING A COMPLIANCE CONSULTANCY FIRM
1. OVERVIEW The FCA has published details of the forthcoming supervisory projects for the general insurance, mortgage and financial advice sectors of the market. One project that appears on all three lists
More informationGuidelines for membership and operation of NCIRS-AIP email discussion group
Guidelines for membership and operation of NCIRS-AIP email discussion group NCIRS-AIP Guidelines August 2011 Management of this document This policy was discussed and reviewed by Endorsed by Next review
More information(Internet) for students, staff and, if requested, members of the Board of Education. All computer
4510 Computer Network (Cf. 4520) 4510 The Board authorizes the Superintendent to develop services linking computers within and between buildings in the District, and to provide access to the international
More informationSouthwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers
Southwest Texas Telephone Company (SWTTC) Acceptable Use Policy for Asynchronous Digital Subscriber Line (ADSL)/Internet Customers Introduction When you open your SWTTC ADSL/Internet account, you become
More informationDiscuss ethical guidelines for psychologists and illustrate with research examples.
Discuss ethical guidelines for psychologists and illustrate with research examples. Ethics has been defined as a branch of philosophy that deals with thinking about morality, moral problems, and judgements
More informationEmbedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
More informationAS Sociology. The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research.
AS Sociology Revision Sociological Methods The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research. Chris. Livesey 2006: www.sociology.org.uk
More informationWebsite Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.
Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,
More informationPINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT
PINELAND TELEPHONE COOPERATIVE DSL SERVICE AGREEMENT Check Plan: Residential Business Installation Cost $45.00 $62.00 Check Plan: 256 Down/128 Up $24.95 $44.95 Monthly 1.544 Down/256 Up $39.95 $49.95 Monthly
More informationMalpractice Policy BMAT
Malpractice Policy 1 BMAT Malpractice Policy 1. Statement of Purpose BMAT is committed to ensuring that standards of assessment are consistent, transparent and fair, whilst maintaining standards as a priority
More informationWebsite Privacy Policy Statement
Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise
More informationEffective from 1 January 2009. Code of Ethics for insolvency practitioners.
INSOLVENCY PRACTITIONERS (PART D) Effective from 1 January 2009. Code of Ethics for insolvency practitioners. On 1 January 2014 a minor change was made to paragraph 400.3 of the code. The change clarifies
More informationSocial Media Charter
Social Media Charter 1. Internet, social media, web 2.0 interface and on-line communication "Social media" and "web 2.0" interface are generic terms which designate different activities integrating technology,
More informationTransport for London. Code of Conduct MAYOR OF LONDON
Transport for London Code of Conduct Effective from 1 October 2008 MAYOR OF LONDON Transport for London This Code of Conduct describes TfL s ethical values and vision and sets out the behaviour that is
More informationthe ombudsman and smaller businesses
the ombudsman and smaller businesses your guide to the Financial Ombudsman Service the independent expert in settling complaints between consumers and businesses providing financial services about this
More information