{"id":22462,"date":"2017-03-12T03:15:12","date_gmt":"2017-03-12T07:15:12","guid":{"rendered":"https:\/\/thesocietypages.org\/cyborgology\/?p=22462"},"modified":"2017-03-13T20:44:16","modified_gmt":"2017-03-14T00:44:16","slug":"context-integrity-and-consent-in-presenting-research","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2017\/03\/12\/context-integrity-and-consent-in-presenting-research\/","title":{"rendered":"Context Integrity and Consent in Presenting Research"},"content":{"rendered":"<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.flickr.com\/photos\/internetarchivebookimages\/14586793608\/in\/photolist-odZ8xw-hSQtb3-i8mKe1-obVwFr-hLgbgf-hUmcLP-i6jQm3-orBAWU-odoqeg-obQ1tb-hRitbm-ocpHw6-icE7La-hTSXs4-oc3UwK-hVgygo-obSTkY-hRhXzt-i7zgxw-hUj4Pc-iduKEW-hRku2W-ot7fNo-i6ySGh-idwPMi-oeYW6P-ouWLFf-i1yRNo-hSSPJf-hSZ5gX-obZ9qN-idSXqh-hSRkW2-ic5PeU-ocoRgP-ocaYky-hLgtbW-icGfWz-of26Rf-hUmTz8-ocrg5e-ocpiFy-odx67d-hSVQ21-hRh6EN-hT3e76-hRhp9C-i4AUJD-oc7ncJ-oc8fLX\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-22465\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z-324x400.jpg\" alt=\"\" width=\"324\" height=\"400\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z-324x400.jpg 324w, https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z-202x250.jpg 202w, https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z-405x500.jpg 405w, https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z.jpg 518w\" sizes=\"auto, (max-width: 324px) 100vw, 324px\" \/><\/a><\/p>\n<p>Like raising kids, there is no handbook that tells you how to make the thousands of decisions and judgment calls that shape what a conference grows into. Seven year into organizing the <a href=\"http:\/\/theorizvingtheweb.org\">Theorizing the Web conference<\/a>, we\u2019re still learning and adapting. In years past, we\u2019ve responded to feedback from our community, making significant changes to our review process (e.g., diversifying our committee and creating a better system to keep the process blind) as well as adopting and enforcing an anti-harassment policy.<\/p>\n<p>This year, we\u2019ve been thinking a lot about what we can do to ensure that presentations respect the privacy of the populations they are analyzing and respect the context integrity of text, images, video, and other media that presenters include in their presentations. I want to offer my take\u2014and, hopefully, spark a conversation\u2014on this important notion of \u201ccontext integrity\u201d in presenting research.<\/p>\n<p>In \u201c<a href=\"https:\/\/crypto.stanford.edu\/portia\/papers\/RevnissenbaumDTP31.pdf\">Privacy as Contextual Integrity<\/a>,\u201d Helen Nissenbaum observes that each of the various roles and situations that comprise our lives has \u201ca distinct set of norms, which governs its various aspects such as roles, expectations, actions, and practices\u201d and that \u201cappropriating information from one situation and inserting it in another can constitute a violation.\u201d It\u2019s often social scientists\u2019 job to take some things out of context and bring understanding to a broader audience. But, how we do that matters.<!--more--><\/p>\n<p>The ethical challenge for social scientists who use methods that remove information from its context (such as observation or content analysis) is figuring out how to still respect the norms of that context as well as the dignity of the people who are a part of it. We have not always done this well. Early anthropologists and sociologists were complicit in racism and colonialism. In my field of sex work research, previous generations of social scientists distorted or ignored sex workers\u2019 own narratives to such a degree that sex work community, as a whole, remains skeptical of researchers.<\/p>\n<p>Let\u2019s consider a concrete example of how taking information out of context for research purposes can prove problematic: Laud Humphreys\u2019 \u201cTearoom Trade\u201d study. Humphreys described the sex habits of a community of gay men who met in certain public bathrooms. In the process of observing the men, he took down their license plate numbers and later visited their homes to conduct a health survey (which he posed as unrelated). Most of the criticism aimed at the study concerned how Humphreys used deception and risked outing individual men by collecting and storing identifiable data. This latter issue is often framed as a violation of privacy. However, I think this only gets at some of what was wrong with the Humphreys study, and I\u2019d like to suggest that this case actually points to the limits of privacy as foundation for ethical decision-making in research.<\/p>\n<p>Notably, the most sensitive information was obtained in public spaces, while the primary risk was exposure to the private (i.e., home\/family) sphere. Already, this troubles conventional privacy discourses that tend to frame exposure as a uni-directional flow of information from private to public. Rather than seeing privacy and publicity as a simple dichotomy in which only that which is private is at risk of being exposed to that which is public, we might take Nissenbaum\u2019s suggestion and frame our lives as consisting of numerous, sometimes overlapping social spheres with different norms of disclosure. From this perspective, the problem with the Humprey\u2019s study is that it collapsed these contexts in potentially harmful ways. For example, though he altered his appearance, Humprey\u2019s subjects would likely have been distressed to have him in their homes if they to recognized him from the tearooms. Worse yet, by taking information and observations out of the specific context of the tearooms (where he was assumed to be just another participant), Humprey\u2019s research posed an existential threat to the community, making the men more susceptible to public moralizing and police actions.<\/p>\n<p>It\u2019s a staple of qualitative method courses to discuss how observation changes behavior. Part of the reason is that <strong>research, itself, is a context in which norms of disclosure may be different than other social situations<\/strong>. In the Humphreys study, subjects\u2019 behavior and responses may have been completely different had they known they were participating in a research study\u2014in fact, many men likely would have opted out altogether. This is something we should ask ourselves when presenting any data: \u201cIf the research subjects knew the manner in which I am presenting their information, would it change what they share?\u201d To share data in a way that ignores the implicit norms and expectations of the context in which the information was shared is, at best, negligent and, at worse, exploitative (i.e., using someone else in pursuit of one\u2019s own goals).<\/p>\n<p>Data collection via the Web, further highlights why the concept of context integrity is a desirable alternative to the conventional public\/private dichotomy. Researchers are sometimes tempted to believe that, because something is public (i.e., searchable on the Web), it is fair game for them to use as they wish (regardless of a site\u2019s norms or the user\u2019s original intent); but, such thinking is often rooted in a slippage between what information can be collected and held as a matter property rights and what is useable as a matter of ethics. Part of the problem is that discourse around public\/private information has been incorporated into the market logic of copyright law. According to this logic anything done in public (legally defined as that which lacks \u201ca reasonable expectation of privacy\u201d) can be captured and become the property of whomever recorded it.* However, establishing ownership of data does not intrinsically imply that it\u2019s ethical to share that data. In fact, IRB\u2019s regularly compel researchers to destroy identifiable data that they rightfully own. Simply saying \u201cwell, it was public\u201d and, therefore, legally obtained, in no way excuses harm done by placing information in another context.<\/p>\n<p>To think about what context integrity means for Web-related research, it may be useful to consider a second case (one with parallels to the tearooms Humphreys observed): namely, hookup\/dating sites like Grindr, Tindr, Fetlife, SwingLifeStyle, Craigslist. These sites are publicly accessible, and it is extraordinarily easy to capture screenshots from them (or even to systematically scrape data). Such research activities may violate terms of service, but they certainly aren\u2019t violations of criminal law. So, assuming for a moment that a scenario exists where it is both legal and ethical to attain information about a hookup\/dating site\u2019s users, the question is then: How do we determine what aspects of this \u201cpublic\u201d information can ethically be shared by researchers?<\/p>\n<p>Nissenbaum\u2019s theory of context integrity suggests that <strong>we should look to the norms of disclosure on sites and try to remain consistent with them<\/strong>. Specifically, we might infer that users only intended for the personal information on their profiles to be seen by potential dates. These profiles may contain information about their sex life or relationship status (e.g., non-monogamy) that they would not want to share with family or co-workers. In fact, some may obscure their faces or certain other personal details as an additional precaution against their information leaking into another context.<\/p>\n<p>The obvious conclusion in this case, then, is that sharing any potentially identifiable information (images, location, unique stories, etc.) would fail to respect the implicit assumptions made by users in posting their data. But, even if personal information can\u2019t easily be linked back to the user, it may still be unsettling to see intimate things taken out of context. Moreover, <strong>we shouldn\u2019t assume that de-identified aggregate level data is intrinsically benign<\/strong>; it can still, potentially, violate context integrity (as the \u201cTearoom Trade\u201d study demonstrated). <strong>Increasing general attention to a site can have negative consequences, outing communities writ large<\/strong>. We saw this just last week with FetLife as increased attention (much resulting from the <em>Fifty Shade of Grey<\/em> craze) led to the <a href=\"https:\/\/broadly.vice.com\/en_us\/article\/kinky-social-network-fetlife-deletes-thousands-of-fetishes-to-stay-online\">banning of many sorts of content from the site<\/a> after credit card companies threatened to stop processing payments unless things they objected to were removed.<\/p>\n<p>This isn\u2019t to say that all research into hookup\/dating sites is ethically dubious, just that, in such sensitive cases, no disclosure should go without careful consideration and scrutiny. It\u2019s the researcher\u2019s job to anticipate the consequences of bringing information into another context and to mitigate whatever risks this transfer entails.<\/p>\n<p>Finally, we need to pay special to the most sensitive cases: namely, those where the subject matter involves victims (e.g., research into police violence, sexual assault, revenge porn, etc.). When the context in which the information originates is an instance of violation, humiliation, and\/or violence, circulation of certain pieces of this information (e.g., names, images, specific acts, etc.) may amplify this harm, re-victimizing the target. If there is any reason to believe that a research subject (or subjects) might be embarrassed to have a piece of information shared in conference setting and the connection to the subject cannot be anonymized, pseudonymized, or otherwise obscured, then I think that obtaining explicit consent is the way to go. This is doubly important for vulnerable populations.<\/p>\n<p>In reflecting on \u201cTearoom Trade\u201d study and considering how the lessons learned from it might apply to current research on hookup\/dating site, I\u2019ve suggested that both <strong>privacy and ownership are weak ethical frameworks for information sharing practices; much harm could be avoided by, instead, centering ethical consideration on context integrity and consent<\/strong>. In particular, I think it\u2019s important to recognize research as its own context and that the basic purpose of methods such as observation and content analysis is to pull information out of their original context. While one-size-fits-all rules are difficult to establishe (given the wide variety of contexts explored by social scientific research), I\u2019ve suggested that <strong>sharing sensitive information disclosed in other contexts (including images and audio) merits careful consideration and usually requires protections (such as de-identification) and\/or explicit consent. <\/strong><\/p>\n<p>&#8212;<\/p>\n<p>*Criminals laws regulating public recording vary by state and local municipality.<\/p>\n<p>&#8212;<\/p>\n<p>PJ Patella-Rey (<a href=\"https:\/\/twitter.com\/pjrey\">@pjrey<\/a>) is a sociology PhD candidate writing about the experiences of sex cam models.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Like raising kids, there is no handbook that tells you how to make the thousands of decisions and judgment calls that shape what a conference grows into. Seven year into organizing the Theorizing the Web conference, we\u2019re still learning and adapting. In years past, we\u2019ve responded to feedback from our community, making significant changes to [&hellip;]<\/p>\n","protected":false},"author":563,"featured_media":22465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[14949,43118,43119,9663],"class_list":["post-22462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commentary","tag-consent","tag-context-integrity","tag-research-ethics","tag-theorizing-the-web"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/cyborgology\/files\/2017\/03\/14586793608_9b1b64106a_z.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/22462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/563"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=22462"}],"version-history":[{"count":9,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/22462\/revisions"}],"predecessor-version":[{"id":22473,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/22462\/revisions\/22473"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media\/22465"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=22462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=22462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=22462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}