Ethical requirements for responsible research with pirated data

Thomas, DR, Pastrana, S., Hutchings, A., Clayton, R. & Beresford, AR in Proc. Internet measurement conference 2017 445-462 (Association for Computer Machines, 2019).
Beecher, HK Ethics and Clinical Research. New Engl. J. Med. 274, 1354-1360 (1966).
Google Scholar
Chohaney, ML & Panozzo, KA Infidelity and the Internet: The Geography of Ashley Madison Use in the United States. Geogr. Tower. 108, 69-91 (2018).
Google Scholar
Arfer, KB & Jones, JJ US Political Party Affiliation as a Predictor of Adultery Website Use. Camber. Sex. Behave yourself. 48, 715-721 (2018).
Google Scholar
Griffin, JM, Kruger, S. & Maturana, G. Personal infidelity and professional conduct in 4 contexts. Proc. Natl Acad. Sci. United States 116, 16268â16273 (2019).
Google Scholar
Linke, AM, Witmer, FDW & O’Loughlin, J. Granger’s spatiotemporal analysis of the Iraq war: a study of coalition and insurgent action-reaction. Int. Interact. 38, 402-425 (2012).
Google Scholar
O’Loughlin, J., Witmer, FD, Linke, AM & Thorwardson, N. Looking into the Fog of War: The Geography of WikiLeaks War Diaries in Afghanistan, 2004-2009. Geogr. Eurasian. Econ. 51, 472-495 (2010).
Google Scholar
Cambridge Analytica controversy must prompt researchers to update data ethics. Nature 555, 559-560 (2018).
Ferretti, A. et al. Big data research ethics review: what should be retained and what should be reformed? BMC Med. Ethics 22, 51 (2021).
Google Scholar
Franzke, AS, Bechmann, A., Zimmer, M. & Ess, C. The Association of Internet Researchers. Internet Research: Ethical Guidelines, 3. https://aoir.org/reports/ethics3.pdf (2020).
Poor, N. & Davidson, R. The Ethics of Using Hacked Data: The Patreon Data Hacking and Academic Data Standards. Internet Res. Ethics Soc. Age 278-280 (2017).
McCoy, TH Jr & Perlis, RH Temporal trends and characteristics of reportable health data breaches, 2010-2017. JAMA 320, 1282-1284 (2018).
Google Scholar
Michael, GJ Who’s Afraid of WikiLeaks? Missed opportunities in political science research. Rev. Policy Res. 32, 175-199 (2015).
Google Scholar
US Department of Health and Human Services. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Research Subjects https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html (1978).
Mansfield-Devine, S. The Ashley Madison Case. Secure Network. 2015, 8-16 (2015).
Google Scholar
Baraniuk, C. Ashley Madison: “Suicides” on Website Hacking. BBC News (August 24, 2015).
Jones, S. Having an affair can shorten your life: Ashley Madison’s suicides. Georgia State University Law Journal 33, 455 (2016).
Google Scholar
Boustead, AE & Herr, T. Analysis of the ethical implications of research using data leaks. Polit. Sci. Polit. 53, 505-509 (2020).
Google Scholar
Post, SG The Nuremberg Echoes: Nazi Data and Ethics. J. Med. Ethics 17, 42-44 (1991).
Google Scholar
Ienca, M. & Vayena, E. Dual use in the 21st century: emerging risks and global governance. Switzerland Med. Weekly 148, w14688 (2018).
Google Scholar
Council of Europe. The Convention for the Protection of Human Rights and the Dignity of the Human Being with regard to the Applications of Biology and Medicine. Oviedo, Spain. https://www.coe.int/en/web/bioethics/oviedo-convention (1997).
Kahn, JP, Vayena, E. & Mastroianni, AC Learning As You Go: Lessons From Facebook’s Social Computing Research Post. Proc. Natl Acad. Sci. United States 111, 13677-13679 (2014).
Google Scholar
Eynon, R., Fry, J. & Schroeder, R. in The SAGE Handbook of Online Research Methods (Fielding eds, NG et al.) Vol. 2, 19-37 (2017).
Yee, A. et al. Ethical considerations in using the Pernkopf Anatomy Atlas: a surgical case study. Surgery 165, 860-867 (2019).
Google Scholar
Prunkl, CE et al. Institutionalize ethics in AI through broader impact requirements. Nat. Mach. Inform. 3, 104-110 (2021).
Google Scholar