{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:49:14Z","timestamp":1776872954158,"version":"3.51.2"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T00:00:00Z","timestamp":1662768000000},"content-version":"vor","delay-in-days":9,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Concerned researchers of online forums might implement what Bruckman (2002) referred to as<jats:italic>disguise<\/jats:italic>. Heavy disguise, for example, elides usernames and rewords quoted prose so that sources are difficult to locate via search engines. This can protect users (who might be members of vulnerable populations, including minors) from additional harms (such as harassment or additional identification). But does disguise work? I analyze 22 Reddit research reports: 3 of light disguise, using verbatim quotes, and 19 of heavier disguise, using reworded phrases. I test if their sources can be located via three different search services (i.e., Reddit, Google, and RedditSearch). I also interview 10 of the reports\u2019 authors about their sourcing practices, influences, and experiences. Disguising sources is effective only if done and tested rigorously; I was able to locate all of the verbatim sources (3\/3) and many of the reworded sources (11\/19). There is a lack of understanding, among users and researchers, about how online messages can be located, especially after deletion. Researchers should conduct similar site-specific investigations and develop practical guidelines and tools for improving the ethical use of online sources.<\/jats:p>","DOI":"10.1007\/s10676-022-09663-w","type":"journal-article","created":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T08:20:45Z","timestamp":1662798045000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Disguising Reddit sources and the efficacy of ethical research"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0650-9097","authenticated-orcid":false,"given":"Joseph","family":"Reagle","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,10]]},"reference":[{"key":"9663_CR1","doi-asserted-by":"publisher","unstructured":"Andalibi, N., Ozturk, P., & Forte, A. (2017). Sensitive self-disclosures, responses, and social support on Instagram. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. https:\/\/doi.org\/10.1145\/2998181.2998243","DOI":"10.1145\/2998181.2998243"},{"key":"9663_CR2","doi-asserted-by":"publisher","unstructured":"Reagle, J., & Gaur, M. (2022). Spinning words as disguise: Shady services for ethical research? First Monday. https:\/\/doi.org\/10.5210\/fm.v27i1.12350","DOI":"10.5210\/fm.v27i1.12350"},{"key":"9663_CR3","doi-asserted-by":"publisher","unstructured":"Ayers, J. W., Caputi, T. L., Nebeker, C., & Dredze, M. (2018). Don\u2019t quote me: Reverse identification of research participants in social media studies. NPJ Digital Medicine, 1(1), https:\/\/doi.org\/10.1038\/s41746-018-0036-2","DOI":"10.1038\/s41746-018-0036-2"},{"key":"9663_CR4","doi-asserted-by":"publisher","unstructured":"Backes, M., Berrang, P., Goga, O., Gummadi, K. P., & Manoharan, P. (2016). On profile linkability despite anonymity in social media systems. Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society - WPES\u201916. https:\/\/doi.org\/10.1145\/2994620.2994629","DOI":"10.1145\/2994620.2994629"},{"key":"9663_CR5","unstructured":"Balamuta, J. (2018, November 13). Using Google BigQuery to obtain Reddit comment phrase counts. The Coatless Professor. https:\/\/thecoatlessprofessor.com\/programming\/sql\/using-google-bigquery-to-obtain-reddit-comment-phrase-counts\/"},{"key":"9663_CR6","unstructured":"Barbaro, M., & Zeller, T. Jr. (2006, August 9). A face is exposed for AOL searcher no. 4417749. The New York Times. https:\/\/www.nytimes.com\/2006\/08\/09\/technology\/09aol.html"},{"key":"9663_CR7","unstructured":"Baumgartner, J. (2016, September 19). pushshift.io: API documentation: List of endpoints. pushshift.io. https:\/\/pushshift.io\/api-parameters\/"},{"key":"9663_CR8","doi-asserted-by":"crossref","unstructured":"Baumgartner, J., Zannettou, S., Keegan, B., Squire, M., & Blackburn, J. (2020). The Pushshift Reddit dataset. Proceedings of The International AAAI Conference on Web and Social Media, 14(1), 830\u2013839. https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/7347","DOI":"10.1609\/icwsm.v14i1.7347"},{"key":"9663_CR56","doi-asserted-by":"publisher","unstructured":"boyd, danah. (2007). Why youth heart social network sites. In D. Buckingham (Ed.), Youth, identity, anddigital media. MIT Press. https:\/\/doi.org\/10.1162\/dmal.9780262524834.119","DOI":"10.1162\/dmal.9780262524834.119"},{"key":"9663_CR9","doi-asserted-by":"publisher","unstructured":"Buckingham, D. (Ed.). (2007). Why youth heart social network sitesYouth, identity, and digital media. MIT Press. https:\/\/doi.org\/10.1162\/dmal.9780262524834.119. boyd","DOI":"10.1162\/dmal.9780262524834.119"},{"key":"9663_CR10","doi-asserted-by":"publisher","unstructured":"Brown, A., & Abramson, M. (2015). Twitter fingerprints as active authenticators. 2015 IEEE International Conference on Data Mining Workshop (ICDMW). https:\/\/doi.org\/10.1109\/ICDMW.2015.223","DOI":"10.1109\/ICDMW.2015.223"},{"key":"9663_CR11","doi-asserted-by":"crossref","unstructured":"Bruckman, A. (2002). Studying the amateur artist: a perspective on disguising data collected in human subjects research on the Internet.Ethics and Information Technology, 4(3). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.432.1591&rep=rep1&type=pdf","DOI":"10.1023\/A:1021316409277"},{"key":"9663_CR12","doi-asserted-by":"crossref","unstructured":"Bruckman, A., Luther, K., & Fiesler, and C (2015). When should we use real names in published accounts of internet research?. In E. Hargittai, & C. Sandvig (Eds.), Digital research confidential: The secrets of studying behavior online. MIT Press","DOI":"10.7551\/mitpress\/9386.003.0013"},{"key":"9663_CR13","doi-asserted-by":"crossref","unstructured":"Brunton, F., & Nissenbaum, H. (2015). Obfuscation: A user\u2019s guide for privacy and protest. MIT Press. https:\/\/we.riseup.net\/assets\/355198\/Obfuscation.pdf","DOI":"10.7551\/mitpress\/9780262029735.001.0001"},{"key":"9663_CR14","doi-asserted-by":"publisher","unstructured":"Chen, Y., Sherren, K., Smit, M., & Lee, K. Y. (2021). Using social media images as data in social science research. New Media & Society, 146144482110387. https:\/\/doi.org\/10.1177\/14614448211038761","DOI":"10.1177\/14614448211038761"},{"key":"9663_CR15","unstructured":"ConvoKit (2018, October 31). Reddit corpus (by subreddit). Cornell. https:\/\/convokit.cornell.edu\/documentation\/subreddit.html"},{"key":"9663_CR16","doi-asserted-by":"publisher","unstructured":"Dym, B., & Fiesler, C. (2020). Ethical and privacy considerations for research using online fandom data. Transformative Works and Cultures, 33. https:\/\/doi.org\/10.3983\/twc.2020.1733","DOI":"10.3983\/twc.2020.1733"},{"key":"9663_CR17","unstructured":"Ess, C., & Committee, A. E. W. (2002). Ethical decision-making and Internet research: recommendations from the AOIR Ethics Working Committee. http:\/\/aoir.org\/reports\/ethics.pdf"},{"key":"9663_CR18","doi-asserted-by":"crossref","unstructured":"Eysenbach, G., & Till, J. E. (2001). Ethical issues in qualitative research on internet communities.BMJ,1103\u20131105. http:\/\/bmj.bmjjournals.com\/cgi\/content\/full\/323\/7321\/1103","DOI":"10.1136\/bmj.323.7321.1103"},{"key":"9663_CR19","doi-asserted-by":"publisher","unstructured":"Fiesler, C., & Proferes, N. (2018). \u201cParticipant\u201d perceptions of Twitter research ethics. Social Media + Society, 4(1), https:\/\/doi.org\/10.1177\/2056305118763366","DOI":"10.1177\/2056305118763366"},{"issue":"1\u20132","key":"9663_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1300\/J009v17n01_03","volume":"17","author":"J Finn","year":"1994","unstructured":"Finn, J., & Lavitt, M. (1994). Computer-based self-help groups for sexual abuse survivors. Social Work With Groups, 17(1\u20132), 21\u201346. https:\/\/doi.org\/10.1300\/J009v17n01_03","journal-title":"Social Work With Groups"},{"issue":"1","key":"9663_CR21","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1177\/1049732303259842","volume":"14","author":"S Flicker","year":"2004","unstructured":"Flicker, S., Haans, D., & Skinner, H. (2004). Ethical dilemmas in research on internet communities. Qualitative Health Research, 14(1), 124\u2013134","journal-title":"Qualitative Health Research"},{"key":"9663_CR22","unstructured":"Franzke, A. S., Bechmann, A., Zimmer, M., Ess, C., & AoIR (2020). and. Internet research: Ethical guidelines 3.0. AoIR. https:\/\/aoir.org\/reports\/ethics3.pdf"},{"key":"9663_CR23","doi-asserted-by":"publisher","unstructured":"Gaffney, D., & Matias, J. N. (2018). Caveat emptor, computational social science: Large-scale missing data in a widely-published Reddit corpus. PLOS ONE, 13(7), https:\/\/doi.org\/10.1371\/journal.pone.0200162","DOI":"10.1371\/journal.pone.0200162"},{"key":"9663_CR24","doi-asserted-by":"publisher","unstructured":"Guarino, A. (2013). Digital forensics as a big data challenge. ISSE 2013 Securing Electronic Business Processes, 197\u2013203. https:\/\/doi.org\/10.1007\/978-3-658-03371-2_17","DOI":"10.1007\/978-3-658-03371-2_17"},{"key":"9663_CR25","unstructured":"Guidelines for data de-identification or anonymization. EDUCAUSE. https:\/\/www.educause.edu\/focus-areas-and-initiatives\/policy-and-security\/cybersecurity-program\/resources\/information-security-guide\/toolkits\/guidelines-for-data-deidentification-or-anonymization"},{"key":"9663_CR26","unstructured":"Haimson, O. L., Andalibi, N., & Pater, J. (2016, December 20). Ethical use of visual social media content in research publications. AHRECS. https:\/\/ahrecs.com\/ethical-use-visual-social-media-content-research-publications\/"},{"key":"9663_CR27","doi-asserted-by":"publisher","unstructured":"Johansson, F., Kaati, L., & Shrestha, A. (2015). Timeprints for identifying social media users with multiple aliases. Security Informatics, 4(1), https:\/\/doi.org\/10.1186\/s13388-015-0022-z","DOI":"10.1186\/s13388-015-0022-z"},{"key":"9663_CR28","doi-asserted-by":"publisher","unstructured":"King, S. A. (1996). Researching internet communities: Proposed ethical guidelines for the reporting of results. The Information Society, 12(2), https:\/\/doi.org\/10.1080\/713856145","DOI":"10.1080\/713856145"},{"key":"9663_CR29","volume-title":"Netnography: Redefined (Kindle)","author":"RV Kozinets","year":"2015","unstructured":"Kozinets, R. V. (2015). Netnography: Redefined (Kindle). Limited: SAGE Publications"},{"key":"9663_CR30","unstructured":"Mann, C., & Stuart, F. (2000). Internet communication and qualitative research: a handbook for researching online. Sage"},{"key":"9663_CR31","doi-asserted-by":"publisher","unstructured":"Markham, A. (2012). Fabrication as ethical practice: Qualitative inquiry in ambiguous Internet contexts. Information Communication & Society, 15(3), https:\/\/doi.org\/10.1080\/1369118x.2011.641993","DOI":"10.1080\/1369118x.2011.641993"},{"key":"9663_CR32","doi-asserted-by":"publisher","unstructured":"Narayanan, A., Paskov, H., Gong, N. Z., Bethencourt, J., Stefanov, E., Shin, E. C. R., & Song, D. (2012). On the feasibility of internet-scale author identification. 2012 IEEE Symposium on Security and Privacy. https:\/\/doi.org\/10.1109\/SP.2012.46","DOI":"10.1109\/SP.2012.46"},{"key":"9663_CR33","doi-asserted-by":"publisher","unstructured":"Narayanan, A., & Shmatikov, V. (2009). De-anonymizing social networks. 2009 30th IEEE Symposium on Security and Privacy. https:\/\/doi.org\/10.1109\/SP.2009.22","DOI":"10.1109\/SP.2009.22"},{"key":"9663_CR34","doi-asserted-by":"publisher","unstructured":"Nguyen, H., & Cavallari, S. (2020). Neural multi-task text normalization and sanitization with pointer-generator. Proceedings of the First Workshop on Natural Language Interfaces. https:\/\/doi.org\/10.18653\/v1\/2020.nli-1.5","DOI":"10.18653\/v1\/2020.nli-1.5"},{"key":"9663_CR35","unstructured":"Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization.UCLA Law Review, 58(2). https:\/\/www.uclalawreview.org\/broken-promises-of-privacy-responding-to-the-surprising-failure-of-anonymization-2\/"},{"issue":"2","key":"9663_CR36","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10676-017-9423-7","volume":"19","author":"C Pentzold","year":"2017","unstructured":"Pentzold, C. (2017). \u201cWhat are these researchers doing in my Wikipedia?\u201d: Ethical premises and practical judgment in internet-based ethnography. Ethics and Information Technology, 19(2), 143\u2013155. https:\/\/doi.org\/10.1007\/s10676-017-9423-7","journal-title":"Ethics and Information Technology"},{"key":"9663_CR37","doi-asserted-by":"publisher","unstructured":"Proferes, N., Jones, N., Gilbert, S., Fiesler, C., & Zimmer, M. (2021). Studying Reddit: A systematic overview of disciplines, approaches, methods, and ethics. Social Media + Society, 7(2), https:\/\/doi.org\/10.1177\/20563051211019004","DOI":"10.1177\/20563051211019004"},{"key":"9663_CR38","unstructured":"Reddit (2021, January 27). Reddit by the numbers. RedditInc. https:\/\/www.redditinc.com\/press"},{"key":"9663_CR39","unstructured":"Reddit Search. (2021, January 14). Reddit. https:\/\/www.reddit.com\/wiki\/search"},{"key":"9663_CR40","doi-asserted-by":"crossref","unstructured":"Reid, E. (1996). Informed consent in the study of online communities: A reflection on the effects of computer-mediated social research.Information Science, 12(2)","DOI":"10.1080\/713856138"},{"key":"9663_CR41","doi-asserted-by":"publisher","unstructured":"Reyes, V. (2017). Three models of transparency in ethnographic research: Naming places, naming people, and sharing data. Ethnography, 19(2), https:\/\/doi.org\/10.1177\/1466138117733754","DOI":"10.1177\/1466138117733754"},{"issue":"3","key":"9663_CR42","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1177\/174701610600200303","volume":"2","author":"K Rodham","year":"2006","unstructured":"Rodham, K., & Gavin, J. (2006). The ethics of using the internet to collect qualitative research data. Research Ethics, 2(3), 92\u201397. https:\/\/doi.org\/10.1177\/174701610600200303","journal-title":"Research Ethics"},{"key":"9663_CR43","doi-asserted-by":"crossref","unstructured":"Sharf, B. (1999). Beyond netiquette: The ethics of doing naturalistic discourse research on the Internet. In S. Jones (Ed.), Doing internet research: Critical issues and methods for examining the net. Sage","DOI":"10.4135\/9781452231471.n12"},{"key":"9663_CR44","doi-asserted-by":"crossref","unstructured":"Shklovski, I., & Vertesi, J. (2013, April 27). \u201cUnGoogling\u201d publications: The ethics and problems of anonymization. Proceedings of CHI 2013. https:\/\/pure.itu.dk\/portal\/files\/80190129\/p2169_shklovski.pdf","DOI":"10.1145\/2468356.2468737"},{"key":"9663_CR45","unstructured":"Siang, S. (1999). Researching ethically with human subjects in cyberspace.Professional Ethics Report, 22(4). http:\/\/www.aaas.org\/spp\/sfrl\/per\/per19.htm"},{"key":"9663_CR46","unstructured":"Singal, J. (2016, March 9). 3 lingering questions from the Alice Goffman controversy. The Cut. https:\/\/www.thecut.com\/2016\/01\/3-lingering-questions-about-alice-goffman.html"},{"key":"9663_CR47","unstructured":"Singal, J. (2015, June 18). The internet accused Alice Goffman of faking details in her study of a black neighborhood. I went to Philadelphia to check. The Cut. https:\/\/www.thecut.com\/2015\/06\/i-fact-checked-alice-goffman-with-her-subjects.html"},{"key":"9663_CR48","unstructured":"Singer, N. (2015, February 14). Love in the time of Twitter. The New York Times. https:\/\/web.archive.org\/web\/20190412053116\/https:\/\/bits.blogs.nytimes.com\/2015\/02\/13\/love-in-the-times-of-twitter\/"},{"key":"9663_CR49","doi-asserted-by":"crossref","unstructured":"Smith, J. S., & Murray, C. D. (2001). Pearls, pith, and provocation: Ethical issues in the documentary data analysis of internet posts and archives.Qualitative Health Research, 11(3)","DOI":"10.1177\/104973201129119109"},{"key":"9663_CR50","unstructured":"Staff, R. (2022, April 14). New on Reddit: Comment search, improved search results relevance, updated search design. Reddit Inc. https:\/\/www.redditinc.com\/blog\/new-on-reddit-comment-search-improved-search-results-relevance-updated-search-design"},{"key":"9663_CR51","unstructured":"Stuck_In_the_Matrix (2019, April 8). Pushshift will now be opting in by default to quarantined subreddits. r\/pushshift. https:\/\/www.reddit.com\/r\/pushshift\/comments\/bazctc\/pushshift_will_now_be_opting_in_by_default_to\/."},{"key":"9663_CR52","unstructured":"Stuck_In_the_Matrix (2015, September 8). Reddit data for ~ 900,000 subreddits (includes both public and private subreddits). r\/datasets. https:\/\/www.reddit.com\/r\/datasets\/comments\/3k3mr9\/reddit_data_for_900000_subreddits_includes_both\/"},{"key":"9663_CR53","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/713856142","volume":"12","author":"D Waskul","year":"1996","unstructured":"Waskul, D., & Douglas, M. (1996). Considering the electronic participant: polemical observations on the ethics of online research. The Information Society, 12, 129\u2013139. http:\/\/www.informaworld.com\/10.1080\/713856142","journal-title":"The Information Society"},{"issue":"2","key":"9663_CR54","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TKDE.2015.2485222","volume":"28","author":"X Zhou","year":"2016","unstructured":"Zhou, X., Liang, X., Zhang, H., & Ma, Y. (2016). Cross-platform identification of anonymous identical users in multiple social media networks. IEEE Transactions on Knowledge and Data Engineering, 28(2), 411\u2013424. https:\/\/doi.org\/10.1109\/TKDE.2015.2485222","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9663_CR55","doi-asserted-by":"publisher","unstructured":"Zimmer, M. (2010). \u201cBut the data is already public\u201d: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), https:\/\/doi.org\/10.1007\/s10676-010-9227-5","DOI":"10.1007\/s10676-010-9227-5"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09663-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-022-09663-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09663-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T20:23:40Z","timestamp":1701030220000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-022-09663-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["9663"],"URL":"https:\/\/doi.org\/10.1007\/s10676-022-09663-w","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"19 July 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests (include appropriate disclosures)"}},{"value":"Northeastern Univervisty Institutional Review Board application #20-08-30 and \u201capproved\u201d as DHHS Review Category #2: \u201cExempt\u2026 No further action or IRB oversight is required as long as the project remains the same.\u201d","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval (include appropriate approvals or waivers)"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate (include appropriate statements)"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication (include appropriate statements)"}}],"article-number":"41"}}