{"id":76608,"date":"2021-06-30T15:30:00","date_gmt":"2021-06-30T13:30:00","guid":{"rendered":"https:\/\/www.hiig.de\/?p=76608"},"modified":"2021-10-22T18:13:18","modified_gmt":"2021-10-22T16:13:18","slug":"when-online-research-can-do-harm","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/","title":{"rendered":"When Online Research Can Do Harm"},"content":{"rendered":"\n<p><em>While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations, but still advice for digital ethnographers<sup><a id=\"anker3\" href=\"#fn3\">[1]<\/a><\/sup> in terms of the ethical dilemmas of researching and marketing to vulnerable populations online is scarce. The aim here is not to create ethical protocols or standard prescriptive as to how digital ethnographers should practice ethnography online, but to discuss some ethical considerations and challenges associated with researching vulnerable populations, in hope to sensitize social researchers to the potential issues digital ethnography poses.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Vulnerable groups, who are they?<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-600x400.jpg\" alt=\"\" class=\"wp-image-77604\" width=\"600\" height=\"400\" srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-600x400.jpg 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-800x533.jpg 800w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-1200x800.jpg 1200w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-60x40.jpg 60w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-768x512.jpg 768w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-180x120.jpg 180w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-50x33.jpg 50w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-540x360.jpg 540w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-1536x1024.jpg 1536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-2048x1365.jpg 2048w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/creative-christians-HN6uXG7GzTE-unsplash-1320x880.jpg 1320w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>When we hear the word \u2018vulnerable\u2019, we might think of economically disadvantaged people, racial and ethnic minorities, children, teenagers, or disabled people, and that\u2019s all correct. If we check definitions among extant literature, we will figure out that vulnerable groups are individuals who are at greater risk of poor physical and social health status (<a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007%2F978-94-007-0753-5_3184\">Rukmana, 2014<\/a>), where vulnerability can either be perceived as a situational, short-run phenomenon, or a more enduring, even permanent state (<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/j.1745-6606.2008.00115.x\">Mansfield &amp; Pinto, 2008<\/a>). Vulnerable groups experience disparities in physical, economic, and social health status when compared with the dominant population (<a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007%2F978-94-007-0753-5_3184\">Rukmana, 2014<\/a>). From a consumer perspective, consumer vulnerability is concerned with the potential risks and social consequences populations or individuals face in different consumption contexts (<a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/0276146705280622\">Baker, Gentry, &amp; Rittenburg, 2005<\/a>).&nbsp;<\/p>\n\n\n\n<p><strong>Could we possibly harm vulnerable groups in online research, unwittingly?&nbsp;<\/strong><br>Harming vulnerable groups could occur unwittingly while researching them online. Rule number one is to ensure that the researched participants (the vulnerable populations) are empowered in their own representations, and given agency in their interactions with researchers. An inherent challenge in maintaining this relationship in a digital age is that data representation may have unintended outcomes beyond the control of individual researchers and their participants. For example, the identification of textual data in a research output can mean that specific individuals can be traced. Visual data representations can pinpoint specific geographical areas. Researching vulnerable populations requires that special attention to be paid to the design of the studies, and to the collection and dissemination of data. Protection of rights, wellbeing, safety, privacy and confidentiality are all crucial elements that we must prioritize while researching vulnerable communities, to avoid bringing these vulnerable individuals into disrepute, endangering them within their social fabric, where they are already disadvantaged (<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S014829631630488X?via%3Dihub\">Shivayogi, 2013<\/a>).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Not one layer of vulnerability, actually two<\/strong><\/h3>\n\n\n\n<p>All of us experience online vulnerability, whether we would be deemed a \u2018vulnerable\u2019 individual or not. Our daily online practices potentially make us vulnerable, with privacy risks posed by sharing not only personal information but the generation of any information that distinguishes one person from another, such as usage, or sharing data that ties a device ID to a person, which could be used for \u201cre-identifying anonymous data\u201d (<a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/4\/1\/tyy001\/4954056\">Politou et al., 2018: 3<\/a>). These unconscious online practices might expose users to a variety of online vulnerabilities such as data misuse, identity theft, online harassment, and exposure to inappropriate content (<a href=\"https:\/\/academic.oup.com\/jcmc\/article\/13\/1\/210\/4583062\">Boyd &amp; Ellison, 2008<\/a>). Online vulnerability is complex. There are also psychological and social benefits to engaging online, in terms of social connectivity, self-esteem, and support (<a href=\"https:\/\/academic.oup.com\/jcmc\/article\/21\/4\/265\/4161784\">Burke &amp; Kraut, 2016<\/a>). Another layer of vulnerability emerges when individuals are themselves vulnerable.&nbsp;<\/p>\n\n\n\n<p>Teenagers, for example, comprise a vulnerable group which has been researched extensively. A research overviews 400 studies across Europe and reveal five in ten teenagers have given away personal information, four in ten have witnessed online pornography, three in ten have seen violent content, two in ten have been victim to bullying, and one in ten has met someone first encountered online (<a href=\"https:\/\/www.researchgate.net\/publication\/313012759_EU_Kids_Online_final_report_2009\">Livingstone and Haddon, 2009<\/a>).&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/christopher-ott-hgGLolfrGyQ-unsplash-1200x1200.jpg\" alt=\"\" class=\"wp-image-77602\" width=\"469\" height=\"505\"\/><figcaption>What started out as web surfing for one teen descended into online obsession and isolation.<\/figcaption><\/figure>\n\n\n\n<p>Similar risks of harm could be considered with other groups online, such as the bereaved, repressed, abused, depressed, and stigmatized, who may use digital self-presentation and social interaction as a coping mechanism for self-transformation, but experience vulnerability and disempowerment (<a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/0276146705280622\">Baker et al., 2005<\/a>). This broader understanding of online vulnerability and how vulnerability could be aggravated online warns us of the importance of digital research ethics in light of online vulnerability. Therefore, we will discuss some core ethical considerations which sensitize social researchers to some of the ethical challenges associated with digital research on vulnerable individuals.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Researcher transparency: not too passive, not too strict<\/strong><\/h3>\n\n\n\n<p>There is no prescription that details how digital ethnographers can actively declare their identities and research interests to the participants that they are studying, although various ways of dealing with this issue in the digital realm have been suggested (<a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/1609406917700647\">Costello et al., 2017<\/a>;&nbsp;<a href=\"https:\/\/aisel.aisnet.org\/icis2006\/62\/\">Yeow, Johnson, &amp; Faraj, 2006<\/a>). On the one hand, researchers may disclose his or her presence, inform participants about the research, and consistently and overtly interact with informants (<a href=\"https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0038038508094565?casa_token=99Jdsqk35nwAAAAA:fAQaWWPuU2NbJGLaRc9c4Mqc43_akNVIgrc3oQFjEwod3Ylo8hpLgit8EJ3kgRhRWgmSBrt8WMUx\">Murthy, 2008<\/a>). Yet even in cases where the ethnographer is virtually present, the speed and the volume of postings within a thread of conversation can quickly cause the role of the researcher to recede into the background. If this happens, researchers may run the risk of falling into a covert research role in order to collect data, a subject position that exemplifies \u2018lurking\u2019. Lurking on the web refers to the epistemic position of a researcher who passively watches web interaction unfold without interacting in the setting, which creates a perception of privacy, as participants are often only cognizant of the people with whom they are actively interacting (<a href=\"https:\/\/scholar.google.com\/scholar_lookup?title=Issues%20of%20attribution%20and%20identification%20in%20online%20social%20research&amp;author=S.B.%20Barnes&amp;publication_year=2004&amp;pages=203-222\">Barnes, 2004<\/a>).<\/p>\n\n\n\n<p>On the other hand, if researchers do interact, they become organizing elements of these online spaces, co-constructing the informant with whom they are interacting, contributing to the development of their identity, and creating the field in which the study occurs. This co-construction of space immerses both the researcher and the research participants in guiding the topic of conversation and the nature of the dialogue. Therefore, you don\u2019t want to be too strict in adhering to your transparency, as it disrupts the flow of interaction, neither do you want to be too in declaring your research position, as you run the risk of unethically exploiting your participants. Therefore, the advice here to reconcile this confusing position through what so called \u2018self-reflexivity\u2019.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Avoid \u2018going native\u2019 and keep your \u2018self-reflexivity\u2019 button on<\/strong><\/h3>\n\n\n\n<p>Reflexivity is constantly needed to avoid the risk of \u2018going native\u2019, and maintaining a critical distance from the participants and their stories. Researcher self-reflexivity towards their relation to the research object is another key ethical consideration. A call for self-reflexivity is a call to acknowledge the way in which the researcher\u2019s knowledge about the world influences research claims, and to acknowledge what the researcher brings with them in terms of personal and social biases to the object of inquiry. Employing reflexivity as a \u2018sensitizing device\u2019 empowers the researchers\u2019 decision making with regard to the field study, what is considered to be meaningful data, and how ethically to represent the lived experiences of the studied subjects (<a href=\"https:\/\/scholar.google.com\/scholar_lookup?title=An%20invitation%20to%20reflective%20sociology&amp;author=P.%20Bourdieu&amp;publication_year=1992\">Bourdieu &amp; Wacquant, 1992<\/a>).&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Data collection, then fabrication<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-1200x787.jpg\" alt=\"\" class=\"wp-image-77606\" width=\"600\" height=\"394\" srcset=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-1200x787.jpg 1200w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-800x525.jpg 800w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-60x39.jpg 60w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-768x504.jpg 768w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-180x118.jpg 180w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-50x33.jpg 50w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-550x360.jpg 550w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-600x393.jpg 600w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-1536x1007.jpg 1536w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-2048x1343.jpg 2048w, https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/06\/niv-singer-LkD_IH8_K8k-unsplash-1320x866.jpg 1320w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>Researching some vulnerable communities in political sites where researchers could potentially bring political activists under the spotlight and disclosing the dynamics of activism might expose participants to surveillance, repression, and personal threats. A fieldwork encounter that highlighted this tension was doctoral research by the author exploring politically motivated social movements in Palestine (<a href=\"https:\/\/scholar.google.com\/scholar_lookup?title=Exploring%20the%20mechanisms%20and%20dynamics%20of%20politically-motivated%20youth%20movements%20in%20palestine%3A%20A%20Bourdieusian%20Perspective&amp;author=A.%20Nazzal&amp;publication_year=2017\">Nazzal, 2017<\/a>). In Palestine, a country which has experienced considerable political turbulence, from Israeli occupation and state authoritarianism, the dangers of inadvertently exposing the identities of activists is readily apparent. In addition, the web affords a higher degree of visibility (<a href=\"https:\/\/scholar.google.com\/scholar_lookup?title=Internet%20or%20outernet%3F&amp;author=B.%20Ebo&amp;publication_year=1998&amp;pages=1-12\">Ebo, 1998<\/a>), which might facilitate the tracking of the participants\u2019 online identities and relationships. So what can we do?&nbsp;<br>Some scholars draw attention to the importance of data triangulation, and the potential for researchers to collect netnographic data that misrepresents vulnerable groups. Therefore, it is important to verify social media data through private social media channels and offline interactions. Moreover, researchers also advocate&nbsp;<em>data fabrication<\/em>&nbsp;to protect informants\u2019 identities (<a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1369118X.2011.641993\">Markham, 2012<\/a>). Scholars may need to create a composite dialogue through paraphrasing the participants\u2019 quotations, paying careful attention to changing details of the data, and the social media platform, to assure participants\u2019 confidentiality and privacy. Therefore, participants\u2019 confidentiality, privacy, and anonymity must be given highest priority.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Data representation: hide or represent?&nbsp;<\/strong><\/h3>\n\n\n\n<p>While conducting netnographic research, the researcher needs to think about data representation. First, digital ethnographers should evaluate what is considered meaningful data, what is to be excluded, and how data can be filtered into appropriate categories for interpretation and analysis. Reflexivity on the data collected, and the way it is presented, should be one of the major ethical considerations as the researcher filters data based on critical reflection and ethical research standards.&nbsp;<\/p>\n\n\n\n<p>There needs to be sensitivity from the researcher to the fact that \u2018every choice we make about how to represent the self, the participants, and the cultural context under study contributes to how these are understood, framed, and responded to by readers, future students, policy makers, and the like\u2019 (Markham, 2005: 811). For example, data collected from Palestine warns the author (<a href=\"https:\/\/scholar.google.com\/scholar_lookup?title=Exploring%20the%20mechanisms%20and%20dynamics%20of%20politically-motivated%20youth%20movements%20in%20palestine%3A%20A%20Bourdieusian%20Perspective&amp;author=A.%20Nazzal&amp;publication_year=2017\">Nazzal, 2017<\/a>) to exclude some of the collected data as conditions of online surveillance and punitive action had worsened, where new&nbsp; laws and legislation were introduced by the Palestinian state to reinforce control and mass surveillance over of Palestinian social media accounts. For example, The researcher found evidence of \u2018digital occupation\u2019 where Israeli forces arrested more than 300 Palestinians from the West Bank in 2017 because of social media posts (<a href=\"https:\/\/7amleh.org\/wp-content\/uploads\/2018\/04\/Palestine-2017-English-final.pdf\">The Arab Center for the Advancement of Social Media reported \u2013 2018<\/a>).&nbsp;<\/p>\n\n\n\n<p>At the end, more attention to the need for ethical protocols, signaling existing perspectives with a particular eye on vulnerable consumers and advocating safeguards needs to be considered from academics, policy makers, marketers and individuals.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><sup id=\"fn3\"><a href=\"#anker3\">[1]<\/a> <\/sup>Digital ethnography is an online research method that adapts ethnographic methods to the study of the communities and cultures created through computer-mediated social interaction (<a href=\"https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/0038038508094565?casa_token=99Jdsqk35nwAAAAA:fAQaWWPuU2NbJGLaRc9c4Mqc43_akNVIgrc3oQFjEwod3Ylo8hpLgit8EJ3kgRhRWgmSBrt8WMUx\">Murthy, 2008<\/a>).<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong><em><em><strong>Amal Nazzal<\/strong> <\/em><\/em><\/strong><em><em>is an Assistant Professor at the Birzeit University at the Faculty of Business and Economics<\/em>.<\/em><\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fwhen-online-research-can-do-harm%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=When%20Online%20Research%20Can%20Do%20Harm https%3A%2F%2Fwww.hiig.de%2Fen%2Fwhen-online-research-can-do-harm%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fwhen-online-research-can-do-harm%2F&subject=When%20Online%20Research%20Can%20Do%20Harm\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations, but still advice for digital ethnographers in terms of the ethical dilemmas of researching and marketing to vulnerable populations online is scarce.<\/p>\n","protected":false},"author":289,"featured_media":76601,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[226],"tags":[1108,1256,1257,1246],"class_list":["post-76608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge","tag-diskriminierung-2","tag-forschungsmethoden-en","tag-internetforschung-en","tag-wissenschaft-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When Online Research Can Do Harm &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Online Research Can Do Harm &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-30T13:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-22T16:13:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lukas Fox\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lukas Fox\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Online Research Can Do Harm &#8211; Digital Society Blog","description":"While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/","og_locale":"en_US","og_type":"article","og_title":"When Online Research Can Do Harm &#8211; Digital Society Blog","og_description":"While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations.","og_url":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/","og_site_name":"HIIG","article_published_time":"2021-06-30T13:30:00+00:00","article_modified_time":"2021-10-22T16:13:18+00:00","og_image":[{"width":800,"height":452,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg","type":"image\/jpeg"}],"author":"Lukas Fox","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lukas Fox","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/"},"author":{"name":"Lukas Fox","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/aed3e66f31e1c7d5e7aec61fe0b9d1f7"},"headline":"When Online Research Can Do Harm","datePublished":"2021-06-30T13:30:00+00:00","dateModified":"2021-10-22T16:13:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/"},"wordCount":1658,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg","keywords":["diskriminierung","Forschungsmethoden","Internetforschung","Wissenschaft"],"articleSection":["Knowledge"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/","url":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/","name":"When Online Research Can Do Harm &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg","datePublished":"2021-06-30T13:30:00+00:00","dateModified":"2021-10-22T16:13:18+00:00","description":"While research ethics are a core component to all social research, digital ethnography poses an additional set of unique challenges that must be addressed while researching vulnerable populations.","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2021\/05\/victoria-heath-MAGAXAYq_NE-unsplash.jpg","width":800,"height":452},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/when-online-research-can-do-harm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"When Online Research Can Do Harm"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/aed3e66f31e1c7d5e7aec61fe0b9d1f7","name":"Lukas Fox"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/76608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/289"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=76608"}],"version-history":[{"count":9,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/76608\/revisions"}],"predecessor-version":[{"id":79637,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/76608\/revisions\/79637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/76601"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=76608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=76608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=76608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}