{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:04:34Z","timestamp":1775023474893,"version":"3.50.1"},"reference-count":82,"publisher":"Association for Computing Machinery (ACM)","issue":"GROUP","license":[{"start":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T00:00:00Z","timestamp":1575504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1704303"],"award-info":[{"award-number":["1704303"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2019,12,5]]},"abstract":"<jats:p>As the process of creating and sharing data about ourselves becomes more prevalent, researchers have access to increasingly rich data about human behavior. Framed as a fictional paper published at some point in the not-so-distant future, this design fiction draws from current inquiry and debate into the ethics of using public data for research, and speculatively extends this conversation into even more robust and more personal data that could exist when we design new technologies in the future. By looking to how the precedents of today might impact the practices of tomorrow, we can consider how we might design policies, ethical guidelines, and technologies that are forward-thinking.<\/jats:p>","DOI":"10.1145\/3370271","type":"journal-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T16:31:11Z","timestamp":1575649871000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Ethical Considerations for Research Involving (Speculative) Public Data"],"prefix":"10.1145","volume":"3","author":[{"given":"Casey","family":"Fiesler","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"1375","article-title":"Privacy Isn't Everything: Accountability As a Personal and Social Good","volume":"54","author":"Allen Anita L","year":"2003","journal-title":"Alabama Law Review"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858096"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2016.02.012"},{"key":"e_1_2_1_4_1","volume-title":"Reclaiming Fair Use: How to Put Balance Back Into Copyright","author":"Aufderheide Patricia"},{"key":"e_1_2_1_5_1","volume-title":"Don't quote me: reverse identification of research participants in social media studies . npj Digital Medicine","author":"Ayers John W.","year":"2018"},{"key":"e_1_2_1_6_1","volume-title":"Privacy, big data, and the public good: Frameworks for engagement","author":"Barocas S."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2578864"},{"key":"e_1_2_1_8_1","volume-title":"Design Fiction: A Short Essay on Design, Science, Fact and Fiction . Near Future Laboratory March","author":"Bleecker Julian","year":"2009"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557098"},{"key":"e_1_2_1_10_1","volume-title":"Resesarching ICTs in Context","author":"Bromseth J.C.H."},{"key":"e_1_2_1_11_1","volume-title":"Ways of Knowing in HCI , , Wendy A","author":"Bruckman Amy"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154485"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287587"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3010915.3011852"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the Research Through Design Conference","author":"Coulton Paul","year":"2017"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-014-9597-z"},{"key":"e_1_2_1_17_1","first-page":"1","article-title":"Reconstructing the past: Personal memory technologies are not just personal and not just for memory","volume":"27","author":"Crete-Nishihata Masashi","year":"2012","journal-title":"Human-Computer Interaction"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107489"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_2_1_20_1","volume-title":"Journalists ' Use of Social Media to Infer Public Opinion : The Citizens ' Perspective . Social Science Computer Review","author":"Dubois Elizabeth","year":"2018"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/qup0000076"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274089"},{"key":"e_1_2_1_23_1","volume-title":"The Circle","author":"Eggers Dave"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174006"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716645828"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.03.003"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW). 567--580","author":"Fiesler Casey","year":"2017"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173627"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Casey Fiesler and Nicholas Proferes. 2018. \"Participant\" Perceptions of Twitter Research Ethics . Social Media  Casey Fiesler and Nicholas Proferes. 2018. \"Participant\" Perceptions of Twitter Research Ethics . Social Media","DOI":"10.1177\/2056305118763366"},{"key":"e_1_2_1_30_1","unstructured":"Society Vol. 4 1 (2018).  Society Vol. 4 1 (2018)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1053"},{"key":"e_1_2_1_32_1","volume-title":"You No Longer Own Your Face . The Atlantic","author":"Fussell Sidney","year":"2019"},{"key":"e_1_2_1_33_1","volume-title":"Doherty","author":"Gurrin Cathal","year":"2014"},{"key":"e_1_2_1_34_1","volume-title":"Unexpected expectations: Public reaction to the Facebook emotional contagion study","author":"Hallinan Blake","year":"2019"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Mediterranean Conference on Information Systems (MCIS)","author":"Halperin Ruth","year":"2015"},{"key":"e_1_2_1_36_1","volume-title":"It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process","author":"Hecht Brent","year":"2018"},{"key":"e_1_2_1_37_1","volume-title":"Internet Research Ethics for the Social Age: New Cases and Challenges, Michael Zimmer and Katharina E Kinder-kurlanda (Eds.). Peter Lang","author":"Hoffmann Anna Lauren"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_2_1_39_1","unstructured":"Jane C. Hu. 2019. Should researchers be allowed to use YouTube videos and tweets? https:\/\/slate.com\/technology\/2019\/06\/youtube-twitter-irb-human-subjects-research-social-media-mining.html  Jane C. Hu. 2019. Should researchers be allowed to use YouTube videos and tweets? https:\/\/slate.com\/technology\/2019\/06\/youtube-twitter-irb-human-subjects-research-social-media-mining.html"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the IEEE International Conference on Healthcare Informatics (ICHI)","author":"Huang Xiaolei","year":"2017"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM) . 178--187","author":"Hutton Luke","year":"2015"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/136911899359493"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amepre.2012.11.006"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI)","author":"Kientz Julie A.","year":"1870"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1197872"},{"key":"e_1_2_1_46_1","volume-title":"Shaun Fitz Lawson, and Dan O'Hara.","author":"Kirman Ben","year":"2013"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW) . 981--993","author":"Kogan Marina"},{"key":"e_1_2_1_49_1","volume-title":"Extended Abstracts on Mobile HCI.","author":"Kwok Sze Yin"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.04.011"},{"key":"e_1_2_1_51_1","volume-title":"Separating fact from fear: Tracking flu infections on Twitter . HLT-NAACL","author":"Lamb Alex","year":"2013"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296867"},{"key":"e_1_2_1_53_1","volume-title":"New AI can guess whether you're gay or straight from a photograph . The Guardian","author":"Levin Sam","year":"2017"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2874239.2874251"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025742"},{"key":"e_1_2_1_56_1","volume-title":"Extended Abstracts of the ACM CHI Conference on Human Factors in Computing Systems","author":"Linehan Conor","year":"2014"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716650211"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12910-016-0105-5"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12124-014-9289-8"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0008-4"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/014107680609900109"},{"key":"e_1_2_1_63_1","volume-title":"PLoS ONE","volume":"6","author":"Signorini A.","year":"2011"},{"key":"e_1_2_1_64_1","unstructured":"Natasha Singer. 2015. Love in the Time of Twitter . https:\/\/bits.blogs.nytimes.com\/2015\/02\/13\/love-in-the-times-of-twitter\/  Natasha Singer. 2015. Love in the Time of Twitter . https:\/\/bits.blogs.nytimes.com\/2015\/02\/13\/love-in-the-times-of-twitter\/"},{"key":"e_1_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Robert Soden Michael Skirpan Casey Fiesler Zahra Ashktorab Eric Baumer Mark Blythe and Jasmine Jones. 2019. CHI4EVIL: Creative Speculation On the Negative Impacts of HCI Research. In Extended Abstracts on Human Factors in Computing Systems (CHI EA) .  Robert Soden Michael Skirpan Casey Fiesler Zahra Ashktorab Eric Baumer Mark Blythe and Jasmine Jones. 2019. CHI4EVIL: Creative Speculation On the Negative Impacts of HCI Research. In Extended Abstracts on Human Factors in Computing Systems (CHI EA) .","DOI":"10.1145\/3290607.3299033"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306312718772094"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23014"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the 2013 ACM International Conference on Pervasive and Ubiquitous Computing (UbiComp)","author":"Thomaz Edison","year":"2013"},{"key":"e_1_2_1_71_1","first-page":"19","article-title":"The Endangered Child: Choking and Fainting Games in the Online Underground of YouTube","volume":"36","author":"Tucker Elizabeth","year":"2014","journal-title":"Children's Folklore Review"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/1556264617725200"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the ACM CSCW Conference on Computer Supported Cooperative Work & Social Computing","author":"Vitak Jessica"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091489"},{"key":"e_1_2_1_75_1","volume-title":"The Drivers of Wearable Device Usage , , Claus-Peter H","author":"Weiz Daniel"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the Ninth International AAAI Conference on Web and Social Media 2014","author":"Weller Katrin","year":"2015"},{"key":"e_1_2_1_77_1","volume-title":"What happened when I confronted my cruelest troll . The Guardian","author":"West Lindy","year":"2015"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064682"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ypmed.2014.01.024"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9227-5"},{"key":"e_1_2_1_82_1","unstructured":"Michael Zimmer. 2016. OKCupid Study Reveals the Perils of Big Data Science . https:\/\/www.wired.com\/2016\/05\/okcupid-study-reveals-perils-big-data-science\/  Michael Zimmer. 2016. OKCupid Study Reveals the Perils of Big Data Science . https:\/\/www.wired.com\/2016\/05\/okcupid-study-reveals-perils-big-data-science\/"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-09-2013-0083"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3370271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3370271","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3370271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:34Z","timestamp":1750202614000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3370271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,5]]},"references-count":82,"journal-issue":{"issue":"GROUP","published-print":{"date-parts":[[2019,12,5]]}},"alternative-id":["10.1145\/3370271"],"URL":"https:\/\/doi.org\/10.1145\/3370271","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,5]]},"assertion":[{"value":"2019-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}