Abstract
The emergence of massive datasets collected using automated or large scale data harvesting methodologies ushered in by digital tools creates new challenges for researchers with respect to the ethical use and securing of private information. Such concerns are heightened by the fact that big data is likely to be reused, reanalyzed, recombined, and repurposed without explicit consent from the original data providers. The present chapter offers a methodology for assessing the ethical nature of a given big data use situation. The approach is contextual and relational. Researchers are invited to use a privacy matrix that intersects five ethical concerns (non-maleficence, beneficence, justice, autonomy, and trust) with four possible contexts of use (social, science, government, and science). The matrix can be used to determine the significance of the ethical problem for a given situation by tallying the number and assessing the nature of concerns present in using the data in a given context. Furthermore, the heuristic procedure can be enhanced with a modified type of trade-off analysis which starts from a minimum ethical threshold below which trade-offs should not be performed. The matrix and the heuristic method offer a pragmatic, yet ethically grounded approach to dealing with the complex nature of privacy in the context of big data research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beauchamp, T. (2013). The Principle of beneficence in applied ethics. In E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy. http://plato.stanford.edu/archives/win2013/entries/principle-beneficence, Accessed 13 November 2015.
Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st Century (pp. 129–153). Stanford: Stanford University Press.
Dittrich, D., & Kenneally, E. (2012). The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security. http://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803.pdf, Accessed 13 Nov 2015.
Elgesem, D. (2002). What is special about the ethical issues in online research? Ethics and Information Technology, 4(3), 195–203.
Executive Office of the President. (2014). Big data: Seizing opportunities preserving values. http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf, Accessed 13 Nov 2015.
Hann, I.-H., Hui, K.-L., Lee, T., & Png, I. (2002). Online information privacy: Measuring the cost-benefit trade-off. ICIS 2002 Proceedings, 1.
Harmon, A. (2010). Indian tribe wins fight to limit research of its DNA. The New York Times. Retrieved from http://www.nytimes.com/2010/04/22/us/22dna.html
Jacobs, B., Roffenbender, J., Collmann, J. Cherry, K., LeManuel, L., & Bassett, K., et al. (2010). Bridging the gap between genomic scientists and indigenous peoples. Journal of Law, Medicine and Ethics, 38(3), 684–696. http://arep.med.harvard.edu/pdf/Jacobs-JLME_10.pdf
Kelman, S. (1981). Cost-benefit analysis: An ethical critique. Regulation, 5, 33.
Marwick, A. (2014). How your data are being deeply mined. New York Review of Books. January 9. http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false, Accessed 13 Nov 2015.
Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1), 1–6.
Morozov, E. (2014). To save everything, click here: The folly of technological solutionism. New York: Public Affairs.
Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus—The Journal of the American Academy of Arts & Sciences, (Fall), 32–48.
Office for Human Research Protection. (1993). Protecting human research subjects: Institutional review board guidebook. Washington, DC, U.S. Government Printing Office. http://www.hhs.gov/ohrp/archive/irb/irb_guidebook.htm, Accessed 13 November 2015.
Olmstead v. United States. (1928). 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944.
Palm, E., & Hansson, S. O. (2006). The case for ethical technology assessment (eTA). Technological Forecasting and Social Change, 73(5), 543–558.
Steinmann, M., Shuster, J., Collmann, J., Matei, S. A., Tractenberg, R. E., & FitzGerald, K., et al. (2015). Embedding privacy and ethical values in big data technology. In S. A. Matei, M. G. Russell, & E. Bertino (Eds.), Transparency in Social Media (pp. 277–301). Springer International Publishing. Retrieved from http://link.springer.com/chapter/10.1007/978-3-319-18552-1_15
Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The Handbook of Information and Computer Ethics (pp. 131–164). Hoboken: Wiley.
White, L. (2013). Understanding the relationship between autonomy and informed consent: A response to Taylor. The Journal of Value Inquiry, 47(4), 483–491.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Steinmann, M., Matei, S.A., Collmann, J. (2016). A Theoretical Framework for Ethical Reflection in Big Data Research. In: Collmann, J., Matei, S. (eds) Ethical Reasoning in Big Data. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-28422-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-28422-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28420-0
Online ISBN: 978-3-319-28422-4
eBook Packages: Computer ScienceComputer Science (R0)