| Thursday, June 10 |
| 9.00 am |
Welcome and Introductions: Project Goals and Work Plan |
|
| |
| 10.00 am |
Session I: Benefits and Risks |
|
| Speaker: |
Melinda Bier |
| Respondent: |
John Kennedy |
| Moderator: |
Amy Bruckman |
|
Questions:
- What constitute "benefit" and "harm/risk" in the virtual domain? In Internet research, how can benefits, risks, and harms be assessed?
- How can one assess long-term benefits or harm? How can follow-up be conducted for a study of an online community in which the participants are anonymous or pseudonymous, or when participants are no longer members of the community, or when the community itself no longer exists in cyberspace?
- Are there any special vulnerabilities among prospective subjects that might be relevant to evaluating risk of participation in Internet research?
|
| |
|
| |
| 1.00 pm |
Session II: Informed Consent and Deception in Internet Research |
|
| Speaker: |
Storm A. King |
| Respondent: |
Pattie Thomas |
| Moderator: |
Rachelle Hollander |
|
Questions:
- What are the requirements of informed consent for Internet research? By what mechanisms can it be obtained from virtual communities and from individuals?
- How can informed consent of subjects be authenticated online?
- How should consent be obtained in a community that has variable members, who may be from different cultures, with some participating in the research and some not?
- How should researchers apply the special informed consent requirements for minors in cyberspace?
- How do our traditional understandings of reciprocity and trust between researchers and those they study play out in research on the Internet?
- When is the use of deception permissible in online research?
- How should debriefings be conducted for members of an online community?
|
| |
| 3.00 pm |
Session III: Protecting Privacy and Confidentiality of Research Subjects |
|
| Speaker: |
Craig Childress |
| Respondent: |
Donald Bersoff |
| Moderator: |
Sanyin Siang |
|
Questions:
- How should "reasonable expectation of privacy" be defined in cyberspace?
- What information belongs in the private and public domains in cyberspace? Are lists and chatrooms, for instance, public?
- What, if any, responsibilities do researchers have to protect the online identities of research subjects?
- Are descriptions of rooms and characters quotable without permission, or would these texts be considered part of the character/user?
- What security provisions should be adopted when creating, storing, accessing, or transferring on-line data?
|
| |
| 5.00 pm |
Recess for the Day |
|
| |
| Friday, June 11, 1999 |
| 8.30 am |
Continental Breakfast |
| |
|
|
| 9.00 am |
Session IV: Justice |
|
| Speaker: |
Jim Thomas |
| Respondent: |
Michael Gallo |
| Moderator: |
Neal Dickert |
|
Questions:
- How, if at all, does the Internet, alter our understanding and application of justice in the context of human research?
- Given the wide disparity in usage of the Internet among groups within American society, let alone internationally, how should justice be defined when designing and evaluating social and behavioral research online?
- How can the fruits and burdens of research be distributed so that those at risk in online research are likely to benefit? How can this be achieved when subjects are anonymous or pseudonymous?
|
| |
| 10.30 am |
Session V: IRB Guidance and Developing a Research Agenda |
|
| IRB's Perpsective on the Issues |
| Speaker: |
Juli Espinoza |
| Speaker: |
Warren Ashe |
| Moderator: |
Jeff Cohen |
| |
|
|
| Recommendations and Developing a Research Agenda |
| Moderator: |
Mark S. Frankel |
|
Questions:
- In what areas can preliminary recommendations be made?
- What issues merit priority in a research agenda?
- How can further research on these issues be fostered?
|
| |
|