An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice

Achieving informed consent in online and digital contexts is challenging for several reasons. One reason is that conveying the meaning and implications of agreements to individuals is hindered by legalistic formats obscuring the potential harm that can ensue from analytics of data collected in a socio-technical context, such as online. Furthermore, as technical capability advances, what can be achieved with data mining and initiatives outpaces statutory regulation, as well as the social norms that frame individual human understandings. It is argued that the paradigm that currently underpins informed consent in online settings draws on ethical positions that are either utilitarian or legalistic. In contrast, the adoption of an ethics of virtue approach as a new paradigm provides a framework for reconceptualising informed consent. Characteristics that are material for informed consent, shared by Online Analytics and Qualitative Longitudinal Research, provide the inspiration and basis for this interdisciplinary approach, with the application of lessons learned in the practice and theory of one discipline to another.

[1]  Wolter Pieters,et al.  Cyber Security as Social Experiment , 2014, NSPW '14.

[2]  Lorrie Faith Cranor,et al.  Standardizing privacy notices: an online study of the nutrition label approach , 2010, CHI.

[3]  Kim Etherington Ethical Research in Reflexive Relationships , 2007 .

[4]  D. Taruscio,et al.  Improving the informed consent process in international collaborative rare disease research: effective consent for effective research , 2016, European Journal of Human Genetics.

[5]  Arthur P. Bochner,et al.  Composing Ethnography: Alternative Forms of Qualitative Writing , 1999 .

[6]  V. Dickson-Swift,et al.  Doing sensitive research: what challenges do qualitative researchers face? , 2007 .

[7]  Mary Ellen Zurko User-centered security: stepping up to the grand challenge , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[8]  J. Olsen Nine months that last a lifetime. Experience from the Danish National Birth Cohort and lessons learned. , 2012, International journal of hygiene and environmental health.

[9]  Salvatore Ruggieri,et al.  A multidisciplinary survey on discrimination analysis , 2013, The Knowledge Engineering Review.

[10]  S. Kvale,et al.  InterViews: Learning the Craft of Qualitative Research Interviewing , 1996 .

[11]  V. Rooney Consent in longitudinal intimacy research: adjusting formal procedure as a means of enhancing reflexivity in ethically important decisions , 2015 .

[12]  Michael Morrison,et al.  Dynamic consent: a patient interface for twenty-first century research networks , 2014, European Journal of Human Genetics.

[13]  J. Domingo-Ferrer,et al.  Beyond Informed Consent—Investigating Ethical Justifications for Disclosing, Donating or Sharing Personal Data in Research , 2017 .

[14]  B. Macfarlane Researching with Integrity: The Ethics of Academic Enquiry , 2008 .

[15]  A. Young Dwelling on the Threshold , 1990 .

[16]  P. Casali,et al.  Risks of the new EU Data Protection Regulation: an ESMO position paper endorsed by the European oncology community. , 2014, Annals of oncology : official journal of the European Society for Medical Oncology.

[17]  Simon N. Foley,et al.  I'm OK, You're OK, the System's OK: Normative Security for Systems , 2014, NSPW '14.

[18]  A. Azzouz 2011 , 2020, City.

[19]  S. M. García,et al.  2014: , 2020, A Party for Lazarus.

[20]  Ruzanna Chitchyan,et al.  Discovering "Unknown Known" Security Requirements , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[21]  Lisa M. Tillmann-healy,et al.  Friendship as Method , 2003 .

[22]  K. Charmaz,et al.  Constructing Grounded Theory , 2014 .

[23]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[24]  Britt Rusert “A Study in Nature”: The Tuskegee Experiments and the New South Plantation , 2009, The Journal of medical humanities.

[25]  Gerhard Fischer,et al.  Revisiting and Broadening the Meta-Design Framework for End-User Development , 2017, New Perspectives in End-User Development.

[26]  A. James 2010 , 2011, Philo of Alexandria: an Annotated Bibliography 2007-2016.

[27]  A. Grinyer,et al.  The Anonymity of Research Participants: Assumptions, Ethics, and Practicalities , 2009 .

[28]  Florence March,et al.  2016 , 2016, Affair of the Heart.

[29]  Bart W. Schermer,et al.  The crisis of consent: how stronger legal protection may lead to weaker consent in data protection , 2014, Ethics and Information Technology.

[30]  Nigel Cross,et al.  Developments in design methodology , 1984 .

[31]  Jennifer Shore and Jill Steinman Did You Really Agree to That? The Evolution of Facebook’s Privacy Policy , 2015 .

[32]  Thomas Herrmann,et al.  Socio-Technical Systems: A Meta-Design Perspective , 2011, Int. J. Sociotechnology Knowl. Dev..

[33]  K. Dannenfeldt,et al.  Technology in World Civilization , 1991 .

[34]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[35]  Johnny Saldaña,et al.  Longitudinal Qualitative Research: Analyzing Change Through Time , 2003 .

[36]  M. Gribaudo,et al.  2002 , 2001, Cell and Tissue Research.

[37]  I. Parker Qualitative Psychology: Introducing Radical Research , 2004 .

[38]  Bashar Nuseibeh,et al.  Distilling privacy requirements for mobile applications , 2014, ICSE.

[39]  Heidi M. Hurd The Moral Magic of Consent , 1996, Legal Theory.

[40]  Arnold Pacey,et al.  Meaning in Technology , 1999 .

[41]  Alan Wertheimer,et al.  The Fair Transaction Model of Informed Consent: An Alternative to Autonomous Authorization , 2011, Kennedy Institute of Ethics journal.

[42]  L. Gillam,et al.  Ethics, Reflexivity, and “Ethically Important Moments” in Research , 2004 .

[43]  Ross J. Anderson,et al.  The collection, linking and use of data in biomedical research and health care: ethical issues , 2015 .

[44]  Masooda Bashir,et al.  Online privacy and informed consent: The dilemma of information asymmetry , 2015, ASIST.

[45]  Christine Horne,et al.  Privacy, technology, and norms: the case of Smart Meters. , 2015, Social science research.

[46]  Nancy J. King,et al.  Smart metering systems and data sharing: why getting a smart meter should also mean getting strong information privacy controls to manage data sharing , 2014, Int. J. Law Inf. Technol..

[47]  Mike Surridge,et al.  Towards a Model of User-centered Privacy Preservation , 2017, ARES.

[48]  J. Warin Ethical Mindfulness and Reflexivity , 2011 .

[49]  M. Bailey,et al.  Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report , 2013 .

[50]  G. Crow,et al.  Informed Consent and the Research Process: Following Rules or Striking Balances? , 2007 .

[51]  R. Wiles What are Qualitative Research Ethics , 2012 .

[52]  J. Reveley Path Dependence , 2008, Prisoners of the Past.

[53]  D. Dittrich,et al.  The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research , 2012 .

[54]  David W. Chadwick,et al.  Expressions of expertness: the virtuous circle of natural language for access control policy specification , 2008, SOUPS '08.

[55]  Bart Custers,et al.  Click here to consent forever: Expiry dates for informed consent , 2016, Big Data Soc..

[56]  Bart Custers,et al.  Big Data and Data Reuse: A Taxonomy of Data Reuse for Balancing Big Data Benefits and Personal Data Protection , 2016 .

[57]  C. Ellis Telling Secrets, Revealing Lives , 2007 .

[58]  S. Milgram BEHAVIORAL STUDY OF OBEDIENCE. , 1963, Journal of abnormal psychology.

[59]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[60]  K. Kavanagh Book review: Reading Lives: Working-class Children and Literacy Learning , 2004 .

[61]  Simon N. Foley,et al.  Developer-centered security and the symmetry of ignorance , 2017, NSPW.