{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:39:53Z","timestamp":1725907193554},"reference-count":60,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2004,9,1]],"date-time":"2004-09-01T00:00:00Z","timestamp":1093996800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,9,1]]},"abstract":"This paper examines some of the ethical problems involved in undertaking Internet research and draws on historical accounts as well as contemporary studies to offer an analysis of the issues raised. It argues that privacy is a misleading and confusing concept to apply to the Internet, and that the concept of non\u2010alienation is more resourceful in addressing the many ethical issues surrounding Internet research. Using this as a basis, the paper then investigates the Free\/Libre and Open Source research model and argues for the principles of \u201copen source ethics\u201d in researching the online world, which includes a participatory and democratic research method.<\/jats:p>","DOI":"10.1108\/10662240410555333","type":"journal-article","created":{"date-parts":[[2006,7,18]],"date-time":"2006-07-18T03:16:32Z","timestamp":1153192592000},"page":"323-332","source":"Crossref","is-referenced-by-count":65,"title":["Internet research: privacy, ethics and alienation: an open source approach"],"prefix":"10.1108","volume":"14","author":[{"given":"David M.","family":"Berry","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031419444076800_b1","doi-asserted-by":"crossref","unstructured":"Allen, C. (1996), \u201cWhat's wrong with the \u2018Golden Rule\u2019? Conundrums of conducting ethical research in cyberspace\u201d, The Information Society, Vol. 12 No. 2, pp. 175\u201088.","DOI":"10.1080\/713856146"},{"key":"key2022031419444076800_b2","unstructured":"Allen, C. (1998), \u201cSpies like us: when sociologists deceive their subjects\u201d, available at: http:\/\/csf.colorado.edu\/gimenez\/papers\/lies.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b3","doi-asserted-by":"crossref","unstructured":"Anscombe, G.E.M. (1958), \u201cModern moral philosophy\u201d, Philosophy, Vol. 33, pp. 38\u201040.","DOI":"10.1017\/S0031819100037943"},{"key":"key2022031419444076800_b4","unstructured":"Association of Internet Researchers (2001), \u201cEthics Working Committee: preliminary report for ethics\u201d, available at: http:\/\/aoir.org\/reports\/ethics.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b5","unstructured":"Baier, A. (1985), Postures of the Mind: Essays on Mind and Morals, University of Minnesota Press, Minneapolis, MN."},{"key":"key2022031419444076800_b6","doi-asserted-by":"crossref","unstructured":"Bakardjieva, M. and Feenberg, A. (2001), \u201cInvolving the virtual subject: conceptual, methodological and ethical dimensions\u201d, Journal of Ethics and Information Technology, Vol. 2 No. 4, pp. 233\u201040.","DOI":"10.1023\/A:1011454606534"},{"key":"key2022031419444076800_b7","unstructured":"Bassett, E.H. and O'Riordan, K. (2002), \u201cEthics of Internet research: contesting the human subjects research model\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed January 10, 2003)."},{"key":"key2022031419444076800_b8","unstructured":"Benhabib, S. (1992), Situating the Self: Gender, Community and Postmodernism in Contemporary Ethics, Routledge, London."},{"key":"key2022031419444076800_b9","doi-asserted-by":"crossref","unstructured":"Berry, D.M. (2004a), \u201cThe contestation of code: a preliminary investigation into the discourse of the Free\/Libre and Open Source movement\u201d, Critical Discourse Studies, Vol. 1 No. 1, p. 1.","DOI":"10.1080\/17405900410001674524"},{"key":"key2022031419444076800_b10","unstructured":"Berry, D.M. (2004b), \u201cThe political economy of open source: immaterial labour and informational capitalism\u201d, available at: www.sussex.ac.uk\/Users\/hbp17\/ (accessed March 15)."},{"key":"key2022031419444076800_b11","unstructured":"Berry, D.M. and Moss, G. (2004), \u201cDemocratising digital government: the democratic implications of adopting open source software in government\u201d, available at: www.sussex.ac.uk\/Users\/hbp17\/ (accessed January 10)."},{"key":"key2022031419444076800_b12","unstructured":"Bruckman, A. (2001), \u201cStudying the amateur artist: a perspective on disguising data collected in human subjects research on the Internet\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b13","unstructured":"Capurro, R. and Pingel, C. (2002), \u201cEthical issues of online communication research\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b14","unstructured":"Castells, M. (2000a), The Information Society: The Power of Identity, Vol. 2, Blackwell, Oxford."},{"key":"key2022031419444076800_b15","unstructured":"Castells, M. (2000b), The Information Society: The Rise of the Network Society, Vol. 1, Blackwell, Oxford."},{"key":"key2022031419444076800_b16","doi-asserted-by":"crossref","unstructured":"Castells, M. (2001), The Internet Galaxy, Oxford University Press, Oxford.","DOI":"10.1093\/acprof:oso\/9780199255771.001.0001"},{"key":"key2022031419444076800_b17","unstructured":"Cavanagh, A. (1999), \u201cBehaviour in public? Ethics in online ethnography\u201d, available at: www.socio.demon.co.uk\/magazine\/6\/issue6.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b18","unstructured":"Creative Commons (2003), \u201cCreative Commons\u201d, available at: www.creativecommons.org (accessed February 1)."},{"key":"key2022031419444076800_b19","doi-asserted-by":"crossref","unstructured":"Denzin, N.K. (1999), \u201cCybertalk and the method of instances\u201d, in Jones, S. (Ed.), Doing Internet Research: Critical Issues and Methods for Examining the Net, Sage Publications, Newbury Park, CA, pp. 107\u201025.","DOI":"10.4135\/9781452231471.n5"},{"key":"key2022031419444076800_b20","unstructured":"DiBona, C., Ockman, S. and Stone, M. (Eds) (1999), Open Sources: Voices of the Open Source Revolution, O'Reilly and Associates, Sebastopol, CA."},{"key":"key2022031419444076800_b21","unstructured":"eff.org (2003), \u201cOpen Audio Licence 1.0.1\u201d, available at: www.eff.org (accessed January 10)."},{"key":"key2022031419444076800_b22","unstructured":"Elgesem, D. (2001), \u201cWhat is so special about the ethical issues in online research?\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b23","unstructured":"Ess, C. (2001), \u201cInternet research ethics\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed February 1, 2003)."},{"key":"key2022031419444076800_b24","unstructured":"Feyerabend, P. (2001), Against Method, Verso, London."},{"key":"key2022031419444076800_b25","doi-asserted-by":"crossref","unstructured":"Foster Hartley, S. (1982), \u201cSampling strategies and the threat to privacy\u201d, in Seiber, J.E. (Ed.), The Ethics of Social Research: Surveys and Experiments, Springer\u2010Verlag, New York, NY, pp. 186\u20109.","DOI":"10.1007\/978-1-4612-5719-6_8"},{"key":"key2022031419444076800_b26","doi-asserted-by":"crossref","unstructured":"Geller, D.M. (1982), \u201cAlternatives to deception: why, what and how?\u201d, in Seiber, J.E. (Ed.), The Ethics of Social Research: Surveys and Experiments, Springer\u2010Verlag, New York, NY, pp. 39\u201055.","DOI":"10.1007\/978-1-4612-5719-6_2"},{"key":"key2022031419444076800_b27","unstructured":"Gilligan, C. (1990), In a Different Voice: Psychological Theory and Women's Development, Harvard University Press, Cambridge, MA."},{"key":"key2022031419444076800_b28","unstructured":"Habermas, J. (1992), The Structural Transformation of the Public Sphere, (translated by McCarthy, T.), Polity Press, Cambridge."},{"key":"key2022031419444076800_b29","doi-asserted-by":"crossref","unstructured":"Herring, S. (1996), \u201cCritical analysis of language use in computer\u2010mediated contexts: some ethical and scholarly considerations\u201d, The Information Society, Vol. 12 No. 2, pp. 153\u201068.","DOI":"10.1080\/911232343"},{"key":"key2022031419444076800_b30","doi-asserted-by":"crossref","unstructured":"Jones, S. (1999), \u201cStudying the Net: intricacies and issues\u201d, in Jones, S. (Ed.), Doing Internet Research: Critical Issues and Methods for Examining the Net, Sage Publications, Newbury Park, CA, pp. 1\u201027.","DOI":"10.4135\/9781452231471.n1"},{"key":"key2022031419444076800_b31","unstructured":"Koepsell, D.R. (2003), The Ontology of Cyberspace, Open Court Publishing, Chicago, IL."},{"key":"key2022031419444076800_b32","doi-asserted-by":"crossref","unstructured":"King, S.A. (1996a), \u201cCommentary on responses to the proposed guidelines\u201d, The Information Society, Vol. 12 No. 2, pp. 199\u2010202.","DOI":"10.1080\/713856141"},{"key":"key2022031419444076800_b33","doi-asserted-by":"crossref","unstructured":"King, S.A. (1996b), \u201cResearching Internet communities: proposed ethical guidelines for the reporting of results\u201d, The Information Society, Vol. 12 No. 2, pp. 119\u201028.","DOI":"10.1080\/713856145"},{"key":"key2022031419444076800_b34","doi-asserted-by":"crossref","unstructured":"Knerr, C.R. (1982), \u201cWhat to do before and after a subpoena of data arrives\u201d, in Seiber, J.E. (Ed.), The Ethics of Social Research: Surveys and Experiments, Springer\u2010Verlag, New York, NY, pp. 191\u2010206.","DOI":"10.1007\/978-1-4612-5719-6_9"},{"key":"key2022031419444076800_b35","unstructured":"Lessig, L. (1999), Code and Other Laws of Cyberspace, Basic Books, New York, NY."},{"key":"key2022031419444076800_b36","unstructured":"Libre Society (2003), \u201cThe Libre Society manifesto\u201d, available at: www.libresociety.org (accessed December 12)."},{"key":"key2022031419444076800_b37","unstructured":"Litman, J. (2001), Digital Copyright, Prometheus Books, Amherst, NY."},{"key":"key2022031419444076800_b38","unstructured":"LOCA (2003), \u201cLOCA Records and Open Media\u201d, available at: www.locarecords.com (accessed January 14)."},{"key":"key2022031419444076800_b39","doi-asserted-by":"crossref","unstructured":"Loo, C.M. (1982), \u201cVulnerable populations: case studies in crowding research\u201d, in Seiber, J.E. (Ed.), The Ethics of Social Research: Surveys and Experiments, Springer\u2010Verlag, New York, NY, pp. 105\u201026.","DOI":"10.1007\/978-1-4612-5719-6_5"},{"key":"key2022031419444076800_b40","doi-asserted-by":"crossref","unstructured":"Mitra, A. and Cohen, E. (1999), \u201cAnalysing the Web: directions and challenges\u201d, in Jones, S. (Ed.), Doing Internet Research: Critical Issues and Methods for Examining the Net, Sage Publications, Newbury Park, CA, pp. 179\u2010202.","DOI":"10.4135\/9781452231471.n9"},{"key":"key2022031419444076800_b41","unstructured":"Negroponte, N. (1996), Being Digital, Hodder & Stoughton, London."},{"key":"key2022031419444076800_b42","unstructured":"Nozick, R. (1978), Anarchy, State, and Utopia, Blackwell, Oxford."},{"key":"key2022031419444076800_b43","unstructured":"Poster, M. (2001), \u201cCyberdemocracy: the Internet and the public sphere\u201d, in Trend, D. (Ed.), Reading Digital Culture, Blackwell, Oxford, pp. 259\u201071."},{"key":"key2022031419444076800_b44","unstructured":"Raymond, E.S. (2001), The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, O'Reilly and Associates, Sebastopol, CA."},{"key":"key2022031419444076800_b45","doi-asserted-by":"crossref","unstructured":"Reid, E. (1996), \u201cInformed consent in the study of online communities: a reflection on the effects of computer\u2010mediated social research\u201d, The Information Society, Vol. 12 No. 2, pp. 169\u201074.","DOI":"10.1080\/713856138"},{"key":"key2022031419444076800_b46","doi-asserted-by":"crossref","unstructured":"Rheingold, H. (2000), The Virtual Community: Homesteading on the Electronic Frontier, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/7105.001.0001"},{"key":"key2022031419444076800_b47","doi-asserted-by":"crossref","unstructured":"Seiber, J.E. (1982), The Ethics of Social Research: Surveys and Experiments, Springer\u2010Verlag, New York, NY.","DOI":"10.1007\/978-1-4612-5719-6"},{"key":"key2022031419444076800_b48","doi-asserted-by":"crossref","unstructured":"Sharf, B.F. (1999), \u201cBeyond Netiquette: the ethics of doing naturalistic discourse research on the Internet\u201d, in Jones, S. (Ed.), Doing Internet Research: Critical Issues and Methods for Examining the Net, Sage Publications, Newbury Park, CA, pp. 243\u201056.","DOI":"10.4135\/9781452231471.n12"},{"key":"key2022031419444076800_b49","unstructured":"Stallman, R.M. (1991), \u201cThe GNU general purpose license\u201d, available at: www.gnu.org\/copyleft\/gpl.html (accessed February 12, 2003)."},{"key":"key2022031419444076800_b50","unstructured":"Stallman, R.M. (1993), \u201cThe GNU manifesto\u201d, available at: www.gnu.org\/gnu\/manifesto.html (accessed February 10, 2003)."},{"key":"key2022031419444076800_b51","unstructured":"Stallman, R.M. (1999), \u201cThe GNU operating system and the free software movement\u201d, in DiBona, C., Ockman, S. and Stone, M. (Eds), Open Sources: Voices from the Open Source Revolution, O'Reilly and Associates, Sebastopol, CA, pp. 53\u201070."},{"key":"key2022031419444076800_b52","unstructured":"Stallman, R.M. (2003), \u201cGNU is not Unix\u201d, available at: www.gnu.org\/ (accessed February 10)."},{"key":"key2022031419444076800_b53","doi-asserted-by":"crossref","unstructured":"Thomas, J. (1996a), \u201cIntroduction: a debate about the ethics of fair practice for collecting social science data in cyberspace\u201d, The Information Society, Vol. 12 No. 2, pp. 107\u201017.","DOI":"10.1080\/713856137"},{"key":"key2022031419444076800_b54","doi-asserted-by":"crossref","unstructured":"Thomas, J. (1996b), \u201cWhen cyber\u2010research goes awry: the ethics of the Rimm \u2018cyberporn\u2019 study\u201d, Information Society, Vol. 12 No. 2, pp. 189\u201097.","DOI":"10.1080\/713856140"},{"key":"key2022031419444076800_b55","unstructured":"Turkle, S. (1995), Life on the Screen: Identity In the Age of the Internet, Simon & Schuster, New York, NY."},{"key":"key2022031419444076800_b56","unstructured":"Vaidhyanathan, S. (2001), Copyrights and Copywrongs, New York University Press, New York, NY."},{"key":"key2022031419444076800_b57","unstructured":"Walther, J.B. (2002), \u201cResearch ethics in Internet\u2010enabled research: human subjects issues and methodological myopia\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed March 2, 2003)."},{"key":"key2022031419444076800_b58","doi-asserted-by":"crossref","unstructured":"Waskul, D. (1996), \u201cEthics of online research: considerations for the study of computer\u2010mediated forms of interaction\u201d, The Information Society, Vol. 12 No. 2, pp. 129\u201040.","DOI":"10.1080\/713856142"},{"key":"key2022031419444076800_b59","unstructured":"White, M. (2002), \u201cRepresentations or people?\u201d, available at: www.nyu.edu\/projects\/nissenbaum\/projects_ethics.html (accessed March 2, 2003)."},{"key":"key2022031419444076800_b60","unstructured":"Williams, S. (2002), Free as in Freedom, O'Reilly and Associates, Sebastopol, CA."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240410555333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410555333\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410555333\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T19:55:23Z","timestamp":1647287723000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240410555333\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,9,1]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,9,1]]}},"alternative-id":["10.1108\/10662240410555333"],"URL":"https:\/\/doi.org\/10.1108\/10662240410555333","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2004,9,1]]}}}