Author / Contributor
image for Brian Schrag
Brian Schrag More Posts
Ethical Issues in Incorporating Online Information with Interview-Based Research



Authoring Institution Association for Practical and Professional Ethics (APPE)
Show More Show Less
Contributor(s) Brian Schrag
Volume 7
Year 2006
Publisher Association for Practical and Professional Ethics
Sort By
  • Ullica  Segerstrale

    Posted 3 years and 4 months ago

    The case of Marie’s friendship research is an interesting and delicate one and well-suited as a case for social scientists. As the other commentator points out, there are several ethical problems involved, not least the question of internal vs. external confidentiality. The issue of both external and internal confidentiality enriches the case considerably; at the same time it makes it more complicated. The problem with internal confidentiality is the difficulty for researchers to camouflage adequately the identity of respondents in regard to their fellow respondents in the interview sample. Using pseudonyms, changing the town, changing the major, etc. for each interviewee will certainly help, but a researcher won’t know about potential other identifying elements that can be picked up only by insiders (perhaps from excerpts of interviews used in publications).

    At the same time, there is an important issue having to do with the way in which identities are being camouflaged. It would be good to know some more details about the nature of Marie’s research on friendship formation. What is the hypothesis being tested—at least what type of hypothesis is involved here? Depending on the type of study involved, certain camouflage attempts may be more or less adequate. When Marie substitutes, say, the subject of a class where two people met and became friends, or the names of the specific streets, buildings, or floors where they lived, is it OK to substitute a history class with a chemistry class? That depends on the type of study involved.

    Here is an example. One would assume that a study of friendship formation in a university setting would take into account the classical findings of Leon Festinger and others when it comes to who makes friends with whom—the theory of “functional distance.” This theory emphasizes the role of proximity and frequency of contact for friendship formation. All other things being equal, people tend to like those they come in contact with on a regular basis. Take the hypothetical example of substituting a class in chemistry with a class in history. This type of substitution might lead to loss of important information. In theory at least a chemistry class with its laboratory work should naturally provide a better place for making friends than a more sedentary history class. Also, in this type of study the actual physical locations (campus addresses) of participants are important for their estimated chances of “bumping into” one another on a regular basis. The challenge is how to make adequate substitution without losing the spatial information.

    In summary, then, a study involving spatial factors in friendship formation is an example of research that might require less of potentially identifiable personal detail. If spatial elements are of primary interest, spatial considerations might rather safely guide the substitution process without loss of scientific information. The problem will depend on the nature of the study, and before we know the nature of the study, it will be hard to give more specific advice as to the balance of ethical concerns vs. the needs of research. It seems to me, however, that leaving the matter in the hand of Marie and her own cost-benefit calculations leaves the problem far too open.

    We also need more information about another matter. One concern was whether Marie did the right thing in looking up students on the website. It is unclear if Marie was a graduate student at the same university in which she was doing friendship research, or another university. If she was doing research at “her” university, that would explain how she so easily could just register on the website. If not, how could she register at all as an outsider? In both cases, however, the network doesn’t seem to be a place for people who want to protect confidential information. Marie could register without revealing much about herself while getting access to detailed information about potential friends. The network appears to be a quite open one, intended for people who “want” to be found by others. Probably one should not worry too much about Marie looking up people on the website.

    In general, the numerous and diverse ethical problems involved in a case like this make me think that it is not enough to identify potential ethical issues in research. We need a set of additional guidelines as to how to organize and prioritize ethical concerns in situations with many ethical issues. Marie, just as any other researcher, may get unduly confused and nervous if she tries to find a solution that takes into account all the different and conflicting ethical issues on an equal basis.

    Marie may be complicating issues for herself by offering her interviewees copies of a published paper. However, transcripts and interview recordings would seem to be something that interviewees should have access to in principle. But the scholarly conclusions drawn by a researcher in a publication (also relating to the existing discourse on the subject) are not necessarily going to coincide with interviewees’ own perceptions. This raises a larger issue about “truth” in research—should or should not the researcher’s truth coincide with her subjects’ truth? Can there be two or more different coexisting truths? Can the truths be contradictory? Berger and Kellner may be invoking a difficult standard when they, in a Weberian mode, say:

    Sociological concepts cannot be models of thought imposed from without (as positivists of all descriptions are wont to do), but rather must relate to the typifications that are already operative in the siutation being studied. . . . Or, using Weberian language, sociological concepts must be meaning-adequate (sinnadequat)—that is, they must retain an intelligible connection with the meaningful intentions of the actors in the situation (Berger and Kellner, 1981, p. 40).

    Personally, I believe that a successful study should have some kind of validation by the subjects whose world it purports to understand. This is the position I take in my own Defenders of the Truth (Segerstrale, 2000, chapter 18). But in some cases this may involve working with one’s subjects to make them understand one’s interpretation. And there may be cases where a convergence of researcher’s and subject’s truth is not possible or even desirable.



    Berger, Peter and Hansfried Kellner. 1981. Sociology Reinterpreted. New York: Doubleday Anchor Books.

    Segerstrale, Ullica. 2000. Defenders of the Truth. The Battle for Science in the Sociobiology Debate and Beyond. Oxford and New York: Oxford University Press.

  • Anonymous  Participant

    Posted 3 years and 5 months ago

    This case highlights the role of ethics in incorporating online information with confidential data from personal interviews, using an emergent research design, and managing concerns over internal confidentiality.  Some of the concerns raised in this case are issues that often arise in social science research, while others are fairly new issues that relate to technological changes. 

    New websites pop up each day, but the ethical guidelines surrounding them often lag far behind.  Professional codes of ethics in many disciplines do not have specific policies for research using online data.  This case raises a number of issues concerning new technologies.  It is important that researchers are aware of the ethical principles of respect for persons, beneficence, and justice that are discussed in the Belmont Report (1979) and work to incorporate these principles into any research that they conduct and/or write about, regardless of whether there are specific guidelines that relate to the research they are conducting.

    Another set of issues that are raised in this case surround internal confidentiality.  Internal confidentiality involves participants in research being able to figure out the identity of, or other details about, other research participants.  The issue of internal confidentiality is a concern with or without the online information, although the inclusion of the online information raises the stakes and makes it more likely that respondents may figure out the identities of other respondents—most likely their friends—even with the use of pseudonyms.  Very few researchers discuss issues of internal confidentiality; one notable exception is that by Tolich (2004).  More often, the focus is on protection against identification by individuals who are not participants in the research, which is referred to as external confidentiality.  Although it is rarely discussed, internal confidentiality is important in social science research.  Two notable cases where internal confidentiality was breached include Carolyn Ellis’ (1986) study of Fisher Folk and William Whyte’s (1943) study of Street Corner Society.  In both these cases, participants knew each other intimately and, therefore, could identify some of the other respondents in research publications, which, in turn, may have allowed them to find out confidential information about these people that they did not know before the study (Tolich 2004).  This disrupts relationships among people, including respondents, the researcher, and other individuals who are part of the community.  For example, when Carolyn Ellis returned to the field after publishing her results, she faced a cold reception from her respondents, who were previously very friendly and warm towards her, due to their concerns over internal confidentiality, and the interconnected issues surrounding their representation in research publications (Ellis 1995).  As Marie’s research focuses on intimate relationships (i.e., friendships), sometimes between research participants, maintaining internal confidentiality will be one of the challenges of writing up the results of this research in an ethical manner.

    In order to publish research that maintains the rigor demanded by her discipline while also adhering to ethical principles she believes in, including respect for persons, beneficence, and justice, Marie must do a careful cost-benefit analysis to decide how to proceed.  Should she privilege maintaining the accuracy of her data at the cost of respondents’ privacy or confidentiality?  Or should she privilege internal and external confidentiality over the accuracy of the data?  How much can she paraphrase—or change, if she deems it necessary—the details of people’s profiles on the Internet site without altering the results of her study and its validity?  She has given each person—both those she interviewed as well as their friends and other individuals they mention—a pseudonym to protect their confidentiality.  She also has changed other identifying information, such as names of clubs or organizations to which they belong as well as hometowns, to further protect her respondents’ privacy.  However, it is possible that Marie does not know exactly which details will identify her respondents to their friends.  A related set of issues revolve around whether or not to identify the website.  Should Marie identify the name and web address of the website where she got this Internet information so that other researchers can check the validity of her interpretations?  Or should she not reveal the identity of the website as a further precaution in terms of confidentiality (both internal and external confidentiality)?  Marie struggles with the cost-benefit analysis of preserving the accuracy of her data and her respondents’ confidentiality and privacy.  There is no easy solution.

    As discussed in the case, these issues become even trickier because Marie is using an emergent research design.  Her research design was flexible to allow for shifts in data collection based on what she learned in the field.  Most important to this case, the inclusion of the Internet data was a decision that occurred after her research was underway.  In part 1 of the case, Marie wonders if she should view this online data and if there is an ethical difference in viewing Internet data for participants (such as Jane), for whom she has obtained informed consent, versus other students, for whom she does not have informed consent.  A question that arises from this is when it is appropriate to obtain permission for this aspect of her research from the university’s Institutional Review Board for the Protection of Human Subjects (IRB).  Marie could have filed an amendment to her IRB proposal as soon as she suspected that she might want to use data from this website in her dissertation.  Given that all of this was emerging as she was in the field and talking with students, she decided to wait until she had a better idea of what data she would like to incorporate into her research and a better idea of the ethical issues involved before filing the IRB amendment.  While this approach seemed preferable to Marie, it seems possible that others would argue the opposite:  that to protect the rights and confidentiality of her respondents, Marie had an obligation to seek IRB approval as soon as she thought she might want to use this data.  One important point is that Marie did not publish or present on aspects of the projects that incorporated the Internet data until she had IRB approval for these activities.  If she had, this would certainly be a breach of her obligations to her research participants and her university’s IRB.  Some ethical decisions are clearer cut than others.

    The emergent research design allows Marie a good deal of flexibility in her methodological decisions, which opens up alternative solutions to these ethical dilemmas.  In addition to the options discussed in Part 2 of the case and the questions that follow, there are other options available to Marie.  She may incorporate the Internet data into her dissertation for methodological rather than substantive reasons.  Marie could use the information on the website as a validity check on the information that she gathered during the interviews.  To what extent do students’ website postings match what they told her during the interview?  If they do not match, what are some possible reasons and how should she deal with it?  This is one way to make use of the rich data gathered from the website and tie it to the interview data without putting interview respondents at further risk of being identified.

    One final issue is that surrounding Marie’s desire to incorporate feminist methodology in her research.  Most germane to this case, feminist methodology seeks to reduce the distance between researcher and subject as well as to give back to research participants (Reinharz 1992).  As discussed in the case, Marie offered each participant a copy of her transcript and interview recording as well as a copy of a published paper that comes out of the research; nearly all participants requested a copy of a published paper.  In this case, Marie’s desire to use feminist methodology and give back to her research participants complicates her ability to maintain internal confidentiality.  It will require more time on her part if she decides to send different people different published papers.  However, she will know to consider these confidentiality issues surrounding interpersonal relations in future research projects.


    • Ellis, Carolyn.  1995.  “Emotional and Ethical Quagmires in Returning to the Field.”  Journal of Contemporary Ethnography 24: 68-98.

    • Ellis, Carolyn.  1986.  Fisher Folk:  Two Communities on Chesapeake Bay.  Lexington: University of Kentucky Press.

    • The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.  1979.  The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects (Federal Register Document 79- 12065).  Washington, D.C.: Government Printing Office.

    • Reinharz, Shulamit.  1992.  Feminist Methods in Social Research.  New York:  Oxford University Press.

    • Tolich, Martin.  2004 “Internal Confidentiality:  When Confidentiality Assurances Fail Relational Informants.”  Qualitative Sociology 27 (1): 101-106.

    • Whyte, William T.  1943.  Street Corner Society:  The Social Structure of an Italian Slum.  Chicago:  University of Chicago Press.

Cite this page: "Ethical Issues in Incorporating Online Information with Interview-Based Research" Online Ethics Center for Engineering 2/12/2016 OEC Accessed: Tuesday, July 16, 2019 <>