Abstract
European Union (EU) research is based on the commitment to embed ethics from the first conceptual stage of the proposal through the implementation of the project. Given this background, and while the concern for ethics in crime research has been widely covered by the European Commission, few contributions have yet shifted their interest on this issue with respect to the growing research on cybercrime. Hence, the purpose of the study is threefold: first, to identify the main European Commission research ethics guidelines and their applicability to cybercrime research; second, to conceptually introduce internet research ethics as a potential ethical framework that can serve as a complement to existing European reference documents; and third, to provide support on identifying some of its main challenges through practical key questions applied to cybercrime research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
All European Academies. (2017). The European code of conduct for research integrity. Available at: https://www.allea.org/wp-content/uploads/2017/05/ALLEA-European-Code-of-Conduct-for-Research-Integrity-2017.pdf.
Alexander, L., & Ferzan, K. K. (Eds.). (2019). The Palgrave handbook of applied ethics and the criminal law. Palgrave Macmillan.
Arrigo, B. A. (Ed.). (2014). Encyclopedia of criminal justice ethics. Sage.
Banks, C. (2018). Criminal justice ethics: Theory and practice. Sage.
Beran, T., & Li, Q. (2007). The relationship between cyberbullying and school bullying. The Journal of Student Wellbeing,1(2), 16–33.
Bossler, A. M. (2016). Cybercrime research at the crossroads: Where the field currently stands and innovative strategies to move forward. In T. J. Holt (Ed.), Cybercrime through an interdisciplinary lens. Routledge.
Braswell, M. C., McCarthy, B. R., & McCarthy, B. J. (2017). Justice, crime, and ethics. Taylor & Francis.
Bromseth, J. C. (2002). Public places–public activities: Methodological approaches and ethical dilemmas in research on computer-mediated communication contexts. SKIKT’Researchers–Researching IT in context, 33–61.
Buchanan, E., & Ess, C. (2008). Internet research ethics: The field and its critical issues. In H. Tavani & K. E. Himma (Eds.), The handbook of information and computer ethics. Wiley.
Buchanan, E., & Ess, C. (2016). Ethics in digital research. In M. Nolden., G. Rebane, & M. Schreiter (Eds.), The handbook of social practices and digital everyday worlds. Springer.
Buchanan, E. (2010). Internet research ethics: Past, present, future. In C. Ess & M. Consalvo (Eds.), The Blackwell handbook of internet studies. Oxford University Press.
Buchanan, E., & Zimmer, M. (2016). Internet research ethics. Retrieved from http://plato.stanford.edu/entries/ethics-internet-research/.
Burnap, P., & Williams, M. L. (2016). Us and them: Identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science,5(1), 11.
Caruana, M. M. (2019). The reform of the EU data protection framework in the context of the police and criminal justice sector: Harmonisation, scope, oversight and enforcement. International Review of Law, Computers & Technology,33(3), 249–270.
Castro Toledo, F. J. (2019). Miedo al crimen y sociedad tecnológica. B de F editorial.
Castro-Toledo, F. J., Gretenkort, T., Esteve, M., & Miró-Llinares, F. (2020). “Fear in 280 characters”: A new approach for evaluation of fear over time in cyberspace 1. In V. Cecatto & M. Nalla (Eds.), Crime and fear in public places. Routledge.
Castro-Toledo, F. J. (2021). Exploring some old and new ethical issues in criminological research and its implications for evidence-based policy. Spanish Journal of Legislative Studies, 2.
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders,11(4), 534–555.
Clarke, R. (2009). Privacy impact assessment: Its origins and development. Computer Law & Security Review,25(2), 123–135.
Cohen, M. (2003). 101 dilemas éticos. Alianza.
Cowburn, M., Gelsthorpe, L., & Wahidin, A. (2017). Research ethics in criminology: Dilemmas, issues and solutions. Routledge.
D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research,20(1), 79–98.
Díaz Fernández, A. (2019). La investigación de temas sensibles en criminología y seguridad. Tecnos.
Dingwall, R. (2012). How did we ever get into this mess? The rise of ethical regulation in the social sciences. In Ethics in social research. Emerald Group Publishing Limited.
Djanali, S., Arunanto, F. X., Pratomo, B. A., Baihaqi, A., Studiawan, H., & Shiddiqi, A. M. (2014, November). Aggressive web application honeypot for exposing attacker’s identity. In 2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering (pp. 212–216). IEEE.
Elgesem, D. (2002). What is special about the ethical issues in online research? Ethics and Information Technology,4(3), 195–203.
European Commission. (2013a). Research, risk-benefit analyses and ethical issues: A guidance document for researchers complying with requests from the European Commission Ethics Reviews. Available at: https://ec.europa.eu/research/swafs/pdf/pub_research_ethics/KI3213113ENC.pdf.
European Commission. (2013b). Ethics for researcher: Facilitating research excellence for FP7. Available at: https://ec.europa.eu/research/participants/data/ref/fp7/89888/ethics-for-researchers_en.pdf.
European Commission. (2018a). Ethics in social science and humanities.https://ec.europa.eu/info/sites/info/files/6._h2020_ethics-soc-science-humanities_en.pdf.
European Commission. (2018b). Ethics and data protection. Available at: https://ec.europa.eu/info/sites/info/files/5._h2020_ethics_and_data_protection_0.pdf.
Frankel, M. S., & Siang, S. (1999). Ethical and legal aspects of human subjects research on the Internet. Association for the Advancement of Science. Available at: https://www.aaas.org/sites/default/files/2020-02/report_internet_research.pdf.
Garrett, B. (2013). Explore everything: Place-hacking the city. Verso.
Hagan, F. E. (1997). Research methods in criminal justice and criminology. Allyn and Bacon.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior,35(1), 20–40.
Israel, M. (2015). Research ethics and integrity for social scientist: Beyond regulatory compliance. Sage.
Jasserand, C. (2018). Law enforcement access to personal data originally collected by private parties: Missing data subjects’ safeguards in directive 2016/680? Computer Law & Security Review,34(1), 154–165.
Kleinig, J. (2008). Ethics and criminal justice: An introduction. Cambridge University Press.
Lavorgna, A., & Sugiura, L. (2020). Direct contacts with potential interviewees when carrying out online ethnography on controversial and polarized topics: A loophole in ethics guidelines. International Journal of Social Research Methodology (online first).
Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology.
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior,35(7), 581–591.
McKee, H. A., & Porter, J. (2009). The ethics of internet research: A rhetorical, case-based process. Peter Lang Publishing.
Mertens, D., & Ginsberg, P. (2009). The handbook of social research ethics. Sage.
Miller, S., & Gordon, I. A. (2014). Investigative ethics: Ethics for police detectives and criminal investigators. Wiley.
Miró Llinares, F. (2012). El cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Marcial Pons.
Miró-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. The Oxford handbook of environmental criminology (pp. 883–906).
Miró-Llinares, F., Drew, J., & Townsley, M. (2020). Understanding target suitability in cyberspace: An international comparison of cyber victimization processes. International Journal of Cyber Criminology,14(1), 139–155.
Miró-Llinares, F., Moneva, A., & Esteve, M. (2018). Hate is in the air! But where? Introducing an algorithm to detect hate speech in digital microenvironments. Crime Science,7(1), 15.
Moneva, A., & Caneppele, S. (2019). 100% sure bets? Exploring the precipitation-control strategies of fixed-match informing websites and the environmental features of their networks. Crime, Law and Social Change, 1–19.
Moor, J. H. (2017). What is computer ethics? In Computer Ethics, Routledge. (pp. 31–40).
Nolan, K. (2018). GDPR: Harmonization or fragmentation? Applicable law problems in EU data protection law. Berkeley Technology Law Journal Blog,20.
O’Connor, F., Malthaner, S., & Lindekilde, L. (2018). Killing in Pairs: Radicalisation patterns of violent dyads. International Journal of Conflict and Violence (IJCV),12, a640–a640.
Pollock, J. M. (2014). Ethical dilemmas and decisions in criminal justice. Nelson Education.
Roberson, C., & Mire, S. (2019). Ethics for criminal justice professionals. CRC Press.
Rosenberg, A. (2010). Virtual world research ethics and the private/public distinction. International Journal of Internet Research Ethics,3(1), 23–37.
Stockman, M., Heile, R., & Rein, A. (2015, September). An open-source honeynet system to study system banner message effects on hackers. In Proceedings of the 4th Annual ACM Conference on Research in Information Technology (pp. 19–22).
Turner, R., & Angius, N. (2017). The philosophy of computer science. Stanford Encyclopedia of Philosophy.
Van Hee, C., Jacobs, G., Emmery, C., Desmet, B., Lefever, E., Verhoeven, B., De Pauw, G., Daelemans, W., & Hoste, V. (2018). Automatic detection of cyberbullying in social media text. PLoS ONE,13(10), e0203794.
Vemou, K., & Karyda, M. (2019). Evaluating privacy impact assessment methods: Guidelines and best practice. Information & Computer Security.
Walther, J. B. (2002). Research ethics in Internet-enabled research: Human subjects issues and methodological myopia. Ethics and Information Technology,4(3), 205–216.
Warren, I., Mann, M., & Molnar, A. (2020). Lawful illegality: Authorizing extraterritorial police surveillance. Surveillance & Society,18(3), 357–369.
Wiener, N. (2019). Cybernetics or control and communication in the animal and the machine. MIT Press.
Winlow, S., & Hall, S. (2012). What is an “ethics committee”? Academic governance in an epoch of belief and incredulity. British Journal of Criminology,52, 400–416.
Yao, M., Chelmis, C., & Zois, D. S. (2019). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427–3433).
Zeid, R. B., Moubarak, J., & Bassil, C. (2020, June). Investigating the darknet. In 2020 International Wireless Communications and Mobile Computing (IWCMC) (pp. 727–732). IEEE.
Zimmer, M. (2010). “But the data is already public”: On the ethics of research in Facebook. Ethics and Information Technology,12(4), 313–325.
Acknowledgments
This chapter has been elaborated within the framework of the project “Criminología, evidencias empíricas y Política criminal. Sobre la incorporación de datos científicos para la toma de decisiones en relación con la criminalización de conductas – Referencia: DER2017-86204-R,” funded by the Spanish State Agency for Research (AEI)/Ministry of Science, Innovation and Universities and the European Union through the European Regional Development Fund “ERDF- A way to make Europe.”
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Castro-Toledo, F.J., Miró-Llinares, F. (2021). Researching Cybercrime in the European Union: Asking the Right Ethics Questions. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-74837-1_16
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-74836-4
Online ISBN: 978-3-030-74837-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)