Abstract

ABSTRACTThis paper reflects on the ethics of internet research on community controversies. Specifically, it focuses on controversies concerning gendered, social interaction in hacking communities. It addresses the question how internet researchers should treat and represent content that individuals controversially discussed online. While many internet sources are likewise technically public, they may yet suggest distinct privacy expectations on the part of involved individuals. In internet research, ethical decision-making regarding which online primary sources may be, e.g., referenced and quoted or require anonymisation is still ambiguous and contested. Instead of generalisable rules, the context dependence of internet research ethics has been frequently stressed. Given this ambiguity, the paper elaborates on ethical decisions and their implications by exploring the case of a controversial hackerspaces.org mailing list debate. In tracing data across different platforms, it analyses the emerging ethico-methodological challenges.

Highlights

  • Hackers and hacking communities have been described as influential actors in digital societies: as activists monitoring IT corporations and policymakers (Coleman, 2013; Kubitschko, 2015; Schrock, 2016); as hubs for digital innovation and entrepreneurship (Davies, 2017; Lindtner, Hertz, & Dourish, 2014); and as facilitators of IT expertise (Bilandzic & Foth, 2017; Schrock, 2014)

  • It focuses on controversies concerning gendered, social interaction in hacking communities

  • It should likewise be considered that some hackers and their communities are entangled in problematic social dynamics and developments

Read more

Summary

Introduction

Hackers and hacking communities have been described as influential actors in digital societies: as activists monitoring IT corporations and policymakers (Coleman, 2013; Kubitschko, 2015; Schrock, 2016); as hubs for digital innovation and entrepreneurship (Davies, 2017; Lindtner, Hertz, & Dourish, 2014); and as facilitators of IT expertise (Bilandzic & Foth, 2017; Schrock, 2014). Such accounts counter the widespread, misleading idea that ‘hacking’ merely refers to malicious cybercrime (Jordan, 2008; Tréguer, 2015). These issues reattracted attention: in secondary literature

RICHTERICH
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.