Hostname: page-component-586b7cd67f-dlnhk Total loading time: 0 Render date: 2024-11-26T11:51:52.792Z Has data issue: false hasContentIssue false

The Provenance Problem: Research Methods and Ethics in the Age of WikiLeaks

Published online by Cambridge University Press:  07 December 2021

CHRISTOPHER DARNTON*
Affiliation:
Naval Postgraduate School, United States
*
Christopher Darnton, Associate Professor, Department of National Security Affairs, Naval Postgraduate School, United States, [email protected].

Abstract

How should political scientists navigate the ethical and methodological quandaries associated with analyzing leaked classified documents and other nonconsensually acquired sources? Massive unauthorized disclosures may excite qualitative scholars with policy revelations and quantitative researchers with big-data suitability, but they are fraught with dilemmas that the discipline has yet to resolve. This paper critiques underspecified research designs and opaque references in the proliferation of scholarship with leaked materials, as well as incomplete and inconsistent guidance from leading journals. It identifies provenance as the primary concept for improved standards and reviews other disciplines’ approaches to this problem. It elaborates eight normative and evidentiary criteria for scholars by which to assess source legitimacy and four recommendations for balancing their trade-offs. Fundamentally, it contends that scholars need deeper reflection on source provenance and its consequences, more humility about whether to access new materials and what inferences to draw, and more transparency in citation and research strategies.

Type
Research Article
Copyright
© The Author(s), 2021. Published by Cambridge University Press on behalf of the American Political Science Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

ABC7 News. 2008. “Saddam Papers Come to Bay Area.” June 18. http://abc7news.com/archive/6212282/.Google Scholar
Aftergood, Stephen. 2011. “CIA Declassifies Documents from World War I.” Federation of American Scientists (blog). April 20. https://fas.org/blogs/secrecy/2011/04/cia_wwi/.Google Scholar
American Historical Association. n.d. “Statement on Standards of Professional Conduct, updated 2019.” Historians.org. Accessed November 14, 2021. https://www.historians.org/jobs-and-professional-development/statements-standards-and-guidelines-of-the-discipline/statement-on-standards-of-professional-conduct.Google Scholar
American Political Science Association (APSA). 2020. “Principles and Guidance for Human Subjects Research.” APSA. April 20. https://www.apsanet.org/Portals/54/diversity%20and%20inclusion%20prgms/Ethics/Final_Principles%20with%20Guidance%20with%20intro.pdf?ver=2020-04-20-211740-153.Google Scholar
American Statistical Association. 2018. “Ethical Guidelines for Statistical Practice.” Amstat.org. April 14. https://www.amstat.org/asa/files/pdfs/EthicalGuidelines.pdf.Google Scholar
Andrew, Christopher, and Mitrokhin, Vasili. 1999. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books.Google Scholar
Appadurai, Arjun. 1986. “Introduction: Commodities and the Politics of Value.” In The Social Life of Things: Commodities in Cultural Perspective, ed. Appadurai, Arjun, 363. New York: Cambridge University Press.CrossRefGoogle Scholar
Avey, Paul, and Desch, Michael. 2014. “What Do Policymakers Want From Us? Results of a Survey of Current and Former Senior National Security Decision Makers.” International Studies Quarterly 58 (2): 227–46.CrossRefGoogle Scholar
Bamford, James. 2016. “The Espionage Economy.” Foreign Policy 216: 70–2.Google Scholar
Banka, Andris, and Quinn, Adam. 2018. “Killing Norms Softly: US Targeted Killing, Quasi-Secrecy and the Assassination Ban.” Security Studies 27 (4): 665–70.CrossRefGoogle Scholar
Bennett, Andrew, and Checkel, Jeffrey, eds. 2015. Process Tracing: From Metaphor to Analytic Tool. Cambridge: Cambridge University Press.Google Scholar
Besterman, Tristram. 2014. “Crossing the Line: Restitution and Cultural Equity.” In Museums and Restitution: New Practices, New Approaches, eds. Tythacott, Louise and Arvanitis, Kostas, 1936. Burlington, VT: Ashgate.Google Scholar
Boustead, Anne, and Herr, Trey. 2020. “Analyzing the Ethical Implications of Research Using Leaked Data.” PS: Political Science and Politics 53 (3): 505–9.Google Scholar
Brand, Stewart. 1987. The Media Lab: Inventing the Future at MIT. New York: Viking Penguin.Google Scholar
Burton, Antoinette, ed. 2005. Archive Stories: Facts, Fictions, and the Writing of History. Durham, NC: Duke University Press.Google Scholar
Büthe, Tim, and Jacobs, Alan, eds. 2015. “Symposium: Transparency in Qualitative and Multi-Method Research.” Qualitative & Multi-Method Research 13 (1): 28.Google Scholar
Clinton, Hillary. 2014. Hard Choices. New York: Simon and Schuster.Google Scholar
Cohen, Michael, Farrell, Henry, and Finnemore, Martha. 2014. “Hypocrisy Hype: Can Washington Still Walk and Talk Differently?” Foreign Affairs 93 (2): 161–5.Google Scholar
Colwell, Chip. 2015. “Curating Secrets: Repatriation, Knowledge Flows, and Museum Power Structures.” Current Anthropology 56 (Supplement 12): S263–75.CrossRefGoogle Scholar
Connelly, Matthew, Hicks, Raymond, Jervis, Robert, Spirling, Arthur, and Suong, Clara. 2020. “Diplomatic Documents Data for International Relations: The Freedom of Information Archive Database.” Conflict Management and Peace Science 38 (6): 762–81.CrossRefGoogle Scholar
Cox, Douglas. 2010. “Archives & Records in Armed Conflict: International Law and the Current Debate over Iraqi Records and Archives.” Catholic University Law Review 59 (4): 1001–56.Google Scholar
Cox, Robert. 1981. “Social Forces, States and World Orders: Beyond International Relations Theory.” Millennium: Journal of International Studies 10 (2): 126–55.CrossRefGoogle Scholar
Darnton, Christopher. 2018. “Archives and Inference: Documentary Evidence in Case Study Research and the Debate over U.S. Entry into World War II.” International Security 42 (3): 84126.CrossRefGoogle Scholar
Darnton, Christopher. 2021. “Replication Data for: The Provenance Problem: Research Methods and Ethics in the Age of WikiLeaks.” Harvard Dataverse. Dataset. https://doi.org/10.7910/DVN/SPLDTF.CrossRefGoogle Scholar
Deutschmann, Emanuel. 2016. “Between Collaboration and Disobedience: The Behavior of the Guantánamo Detainees and its Consequences.” Journal of Conflict Resolution 60 (3): 555–82.CrossRefGoogle Scholar
Dilanian, Ken. 2019. “Under Trump, More Leaks—and More Leak Investigations.” NBC News. April 8. https://www.nbcnews.com/politics/justice-department/under-trump-more-leaks-more-leak-investigations-n992121.Google Scholar
Doyle, Megan. 2009. “Ownership by Display: Adverse Possession to Determine Ownership of Cultural Property.” George Washington International Law Review 41 (1): 269–97.Google Scholar
Drezner, Daniel. 2010. “Why WikiLeaks is Bad for Scholars.” Chronicle of Higher Education, December 5. https://www.chronicle.com/article/Why-WikiLeaks-Is-Bad-for/125628.Google Scholar
Elias, Barbara. 2018. “The Big Problem of Small Allies: New Data and Theory on Defiant Local Counterinsurgency Partners in Afghanistan and Iraq.” Security Studies 27 (2): 233–62.CrossRefGoogle Scholar
Elbein, Asher. 2021. “Decolonizing the Hunt for Dinosaurs and other Fossils.” New York Times, March 22. https://www.nytimes.com/2021/03/22/science/dinosaurs-fossils-colonialism.html.Google Scholar
Ellsberg, Daniel. 2002. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking.Google Scholar
Feaver, Peter, Stanger, Allison, and Walzer, Michael. 2018. “The Secret Sharers: Leaking and Whistle-Blowing in the Trump Era.” Foreign Affairs 97 (6): 199206.Google Scholar
Foreman, Gene. 2016. The Ethical Journalist: Making Responsible Decisions in the Digital Age, 2nd ed. Malden, MA: Wiley-Blackwell.Google Scholar
Fraser, John. 2018. “The Elephant in the Room.” American Alliance of Museums (blog). February 12. https://www.aam-us.org/2018/02/12/the-elephant-in-the-room/.Google Scholar
Frisch, Scott, Harris, Douglas, Kelly, Sean, and Parker, David, eds. 2012. Doi ng Archival Research in Political Science. Amherst, NY: Cambria Press.Google Scholar
Fujii, Lee Ann. 2012. “Research Ethics 101: Dilemmas and Responsibilities.” PS: Political Science and Politics 45 (4): 717–23.Google Scholar
Galbraith, Peter. 2011. “How to Write a Cable.” Foreign Policy 185: 102–3.Google Scholar
Gates, Robert. 2014. Duty: Memoirs of a Secretary at War. New York: Knopf.Google Scholar
Giles, Micheal, and Garand, James. 2007. “Ranking Political Science Journals: Reputational and Citational Approaches.” PS: Political Science and Politics 40 (4): 741–51.Google Scholar
George, Alexander, and Bennett, Andrew. 2005. Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press.Google Scholar
Gerring, John. 2001. Social Science Methodology: A Criterial Framework. New York: Cambridge University Press.CrossRefGoogle Scholar
Gill, David, and Chippindale, Christopher. 2007. “Review Article: The Illicit Antiquities Scandal: What It Has Done to Classical Archaeology Collections.” American Journal of Archaeology 111 (3) 571–4.CrossRefGoogle Scholar
Gill, Michael, and Spirling, Arthur. 2015. “Estimating the Severity of the WikiLeaks U.S. Diplomatic Cables Disclosure.” Political Analysis 23 (2): 299305.CrossRefGoogle Scholar
Glasser, Susan. 2011. “Epiphanies: Bob Woodward.” Foreign Policy 188: 25.Google Scholar
Goodison, Sean, Davis, Robert, and Jackson, Brian. 2015. “Digital Evidence and the U.S. Criminal Justice System: Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence.” Report, RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RR800/RR890/RAND_RR890.pdf.Google Scholar
Gordon, Michael. 2015. “Archive of Captured Enemy Documents Closes.” New York Times, June 21. https://www.nytimes.com/2015/06/22/world/middleeast/archive-of-captured-terrorist-qaeda-hussein-documents-shuts-down.html.Google Scholar
Haberman, Maggie, and Rogers, Katie. 2018. “An Aggrieved Trump Wants Better Press, and He Blames Leaks for Not Getting It.” New York Times, May 17. https://www.nytimes.com/2018/05/17/us/politics/white-house-leaks.html.Google Scholar
Healy, Patrick, Sanger, David, and Haberman, Maggie. 2016. “Donald Trump Finds Improbable Ally in WikiLeaks.” New York Times, October 12. https://www.nytimes.com/2016/10/13/us/politics/wikileaks-hillary-clinton-emails.html.Google Scholar
Helderman, Rosalind, Dawsey, Josh, and Reinhard, Beth. 2021. “Trump Grants Clemency to 143 People in Late-Night Pardon Blast.” Washington Post, January 20. https://www.washingtonpost.com/politics/trump-pardons/2021/01/20/7653bd12-59a2-11eb-8bcf-3877871c819d_story.html.Google Scholar
Higonnet, Anne. 2013. “Afterword: The Social Life of Provenance.” In Provenance: An Alternate History of Art, eds. Feigenbaum, Gail and Reist, Inge, 195209. Los Angeles, CA: Getty Research Institute.Google Scholar
Horner, David. 2014. Understanding Media Ethics. Thousand Oaks, CA: SAGE.Google Scholar
Hunt, Katie. 2020. “‘Blood Amber’ May Be A Portal Into Dinosaur Times, But The Fossils Are An Ethical Minefield For Palaeontologists.” CNN, updated September 20, 2020. https://www.cnn.com/2020/09/19/world/blood-amber-myanmar-fossils-scn/index.html.Google Scholar
Information Security Oversight Office. 2018. Developing and Using Security Classification Guides. National Archives. October. https://www.archives.gov/files/isoo/training/scg-handbook.pdf.Google Scholar
International Studies Association. n.d. “Statement on the Use of Classified Materials in ISA Publications.” Accessed November 14, 2021. https://www.isanet.org/Publications/Classified-Materials.Google Scholar
Israel, Mark. 2015. Research Ethics and Integrity for Social Scientists: Beyond Regulatory Compliance, 2nd ed. Thousand Oaks, CA: SAGE.CrossRefGoogle Scholar
Jacobs, Alan, Büthe, Tim, Arjona, Ana, Arriola, Leonardo R., Bellin, Eva, Bennett, Andrew, Björkman, Lisa, et al. 2021. “The Qualitative Transparency Deliberations: Insights and Implications.” Perspectives on Politics 19 (1): 171208.CrossRefGoogle Scholar
Jervis, Robert. 2015. “The Torture Blame Game: The Botched Senate Report on the CIA’s Misdeeds.” Foreign Affairs 94 (3): 120–7.Google Scholar
Jones, Cynthia. 2010. “A Reason to Doubt: The Suppression of Evidence and the Inference of Innocence.” The Journal of Criminal Law and Criminology 100 (2): 415–74.Google Scholar
Kapiszewski, Diana, MacLean, Lauren, and Read, Benjamin. 2015. Field Research in Political Science: Practices and Principles. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Kapiszewski, Diana, and Wood, Elisabeth Jean. 2021. “Ethics, Epistemology, and Openness in Research with Human Participants.” Perspectives on Politics doi:10.1017/S1537592720004703.CrossRefGoogle Scholar
Keller, Bill. 2011. “Dealing with Assange and the WikiLeaks Secrets.” New York Times, January 26. https://archive.nytimes.com/www.nytimes.com/2011/01/30/magazine/30Wikileaks-t.html.Google Scholar
King, Gary, Jennifer, Pan, and Margaret, Peters. 2017. “How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument.” American Political Science Review 111 (3): 484501.CrossRefGoogle Scholar
Kornblut, Anne. 2008. “Obama Central: Peace, Harmony and Deep Secrecy.” Washington Post, August 3. https://www.washingtonpost.com/wp-dyn/content/article/2008/08/02/AR2008080201687.html?itid=lk_inline_manual_1.Google Scholar
Kuyper, Jonathan. 2016. “Systemic Representation: Democracy, Deliberation, and Nonelectoral Representatives.” American Political Science Review 110 (2): 308–24.CrossRefGoogle Scholar
La Follette, Laetitia. 2017. “Looted Antiquities, Art Museums and Restitution in the United States since 1970.” Journal of Contemporary History 52 (3): 669–87.CrossRefGoogle Scholar
Lessing, Benjamin, and Willis, Graham Denyer. 2019. “Legitimacy in Criminal Governance: Managing a Drug Empire from behind Bars.” American Political Science Review 113 (2): 584606.CrossRefGoogle Scholar
Lew, Jacob. 2010. “WikiLeaks-Mishandling of Classified Information.” Obamawhitehouse.archives.gov. November 28. https://obamawhitehouse.archives.gov/sites/default/files/omb/memoranda/2011/m11-06.pdf.Google Scholar
Maliniak, Daniel, Peterson, Susan, and Tierney, Michael. 2012. “TRIP around the World: Teaching, Research, and Policy Views of International Relations Faculty in 20 Countries.” Williamsburg, VA: The College of William and Mary. https://www.wm.edu/offices/itpir/_documents/trip/trip_around_the_world_2011.pdf.Google Scholar
Marzano, Marco. 2012. “Ethics and Social Conflict: A Framework for Research.” In Ethics in Social Research, ed. Love, Kevin, 7390. Bingley, UK: Emerald Publishing.CrossRefGoogle Scholar
McBride, Kelly, and Rosenstiel, Tom. 2014. “New Guiding Principles for a New Era of Journalism.” In The New Ethics of Journalism: Principles for the 21st Century, eds. McBride, Kelly and Rosenstiel, Tom, 16. Los Angeles, CA: CQ Press.Google Scholar
Michael, Gabriel. 2015. “Who’s Afraid of WikiLeaks? Missed Opportunities in Political Science Research.” Review of Policy Research 32 (2): 175–99.CrossRefGoogle Scholar
Monks-Leeson, Emily. 2011. “Archives on the Internet: Representing Contexts and Provenance from Repository to Website.” The American Archivist 74 (1): 3857.Google Scholar
Moravcsik, Andrew. 2014. “Trust, but Verify: The Transparency Revolution and Qualitative International Relations.” Security Studies 23 (4): 663–88.CrossRefGoogle Scholar
Nathan, Andrew. 2019. “The New Tiananmen Papers: Inside the Secret Meeting That Changed China.” Foreign Affairs 98 (4): 8091.Google Scholar
National Archives. 2009. “The President Executive Order 13526, Classified National Security Information.” December 29. https://www.archives.gov/isoo/policy-documents/cnsi-eo.html.Google Scholar
National Archives. 2011. “Press Release: National Archives and Presidential Libraries Release Pentagon Papers.” June 8. https://www.archives.gov/press/press-releases/2011/nr11-138.html.Google Scholar
National Archives. 2016. “Collection of Foreign Records Seized.” Last reviewed August 15, 2016. https://www.archives.gov/research/captured-german-records/foreign-records-seized.html.Google Scholar
National Archives. 2019. “About Controlled Unclassified Information.” Last reviewed August 1, 2019. https://www.archives.gov/cui/about.Google Scholar
Nuwer, Rachel. 2019. “This Tarantula Became a Scientific Celebrity. Was It Poached from the Wild?” New York Times, April 1. https://www.nytimes.com/2019/04/01/science/poaching-wildlife-scientists.html.Google Scholar
Nincic, Miroslav, and Lepgold, Joseph, eds. 2000. Being Useful: Policy Relevance and International Relations Theory. Ann Arbor: University of Michigan Press.CrossRefGoogle Scholar
Parker, Ashley, and Sanger, David. 2016. “Donald Trump Calls on Russia to Find Hillary Clinton’s Missing Emails.” New York Times, July 27. https://www.nytimes.com/2016/07/28/us/politics/donald-trump-russia-clinton-emails.html.Google Scholar
O’Loughlin, John. 2016. “The Perils of Self-Censorship in Academic Research in a WikiLeaks World.” Journal of Global Security Studies 1 (4): 337–45.CrossRefGoogle Scholar
Poor, Nathaniel. 2017. “The Ethics of Using Hacked Data: Patreon’s Data Hack and Academic Data Standards.” In Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts, eds. Zimmer, Michael and Kinder-Kurlanda, Katharina, 277–80. New York: Peter Lang.Google Scholar
Rinke, Eike Mark, and Wuttke, Alexander. 2021. “Open Minds, Open Methods: Transparency and Inclusion in Pursuit of Better Scholarship.” PS: Political Science and Politics 54 (2): 281–4.CrossRefGoogle Scholar
Rosenberg, Matthew, and Schmitt, Eric. 2017. “Trump Revealed Highly Classified Intelligence to Russia, in Break with Ally, Officials Say.” New York Times, May 15. https://www.nytimes.com/2017/05/15/us/politics/trump-russia-classified-information-isis.html.Google Scholar
Rudenstine, David. 1998. The Day the Presses Stopped: A History of the Pentagon Papers Case. Oakland: University of California Press.Google Scholar
Rudenstine, David. 2002. “Lord Elgin and the Ottomans: The Question of Permission.” Cardozo Law Review 23: 449–71.Google Scholar
Rudenstine, David. 2016. The Age of Deference: The Supreme Court, National Security, and the Constitutional Order. Oxford: Oxford University Press.Google Scholar
Rusbridger, Alan. 2018. Breaking News: The Remaking of Journalism and Why It Matters Now. New York: Farrar, Straus and Giroux.Google Scholar
Savage, Charlie. 2017. “Chelsea Manning to Be Released Early as Obama Commutes Sentence.” New York Times, January 17. https://www.nytimes.com/2017/01/17/us/politics/obama-commutes-bulk-of-chelsea-mannings-sentence.html.Google Scholar
Savage, Charlie. 2021. “Risk of Nuclear War over Taiwan in 1958 Said to Be Greater than Publicly Known.” New York Times, May 22. https://www.nytimes.com/2021/05/22/us/politics/nuclear-war-risk-1958-us-china.html.Google Scholar
Schwartz-Shea, Peregrine, and Yanow, Dvora. 2012. Interpretive Research Design: Concepts and Processes. New York: Routledge.Google Scholar
Scott, Janny. 2021. “Now It Can Be Told: How Neil Sheehan Got the Pentagon Papers.” New York Times, January 7; updated January 9. https://www.nytimes.com/2021/01/07/us/pentagon-papers-neil-sheehan.html.Google Scholar
Seib, Philip. 2006. Beyond the Front Lines: How the News Media Cover a World Shaped by War. New York: Palgrave.Google Scholar
Shimabukuro, Jon, and Whitaker, L. Paige. 2012. “Whistleblower Protections under Federal Law: An Overview.” Congressional Research Service. September 13. https://fas.org/sgp/crs/misc/R42727.pdf.Google Scholar
Shapiro, Jacob, and Siegel, David. 2010. “Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism.” Security Studies 19 (1): 6698.CrossRefGoogle Scholar
Shepherd, Laura, ed. 2013. Critical Approaches to Security: An Introduction to Theories and Methods. New York: Routledge.CrossRefGoogle Scholar
Sjoberg, Laura. 2015. “Locating Relevance in Security Studies.” Perspectives on Politics 13 (2): 396–8.CrossRefGoogle Scholar
Smith, Rogers. 1997. “Still Blowing in the Wind: The American Quest for a Democratic, Scientific Political Science.” Daedalus 126 (1): 253–87.Google Scholar
Society of Vertebrate Paleontology. 2020. “Fossils from Conflict Zones and Reproducibility of Fossil-Based Scientific Data.” Letter to Editors. Vertpaleo.org. April 21. https://vertpaleo.org/wp-content/uploads/2021/01/SVP-Letter-to-Editors-FINAL.pdf.Google Scholar
Steil, Benn. 2013. “Red White: Why a Founding Father of Postwar Capitalism Spied for the Soviets.” Foreign Affairs 92 (2): 115–29.Google Scholar
Subotić, Jelena. 2021. “Ethics of Archival Research on Political Violence.” Journal of Peace Research 58 (3): 342–54.CrossRefGoogle Scholar
Sweeney, Shelley. 2008. “The Ambiguous Origins of the Archival Principle of ‘Provenance.’Libraries & the Cultural Record 43 (2): 193213.CrossRefGoogle Scholar
The Editors of American Political Science Review. 2017. “Notes from the Editors.” American Political Science Review 111 (3): iiiix.CrossRefGoogle Scholar
Tidy, Joanna. 2017. “Visual Regimes and the Politics of War Experience: Rewriting War ‘from above’ in WikiLeaks’ ‘Collateral Murder.’Review of International Studies 43 (1): 95111.CrossRefGoogle Scholar
Trachtenberg, Marc. 2006. The Craft of International History: A Guide to Method. Princeton, NJ: Princeton University Press.Google Scholar
Trouillot, Michel-Rolph. 1995. Silencing the Past: Power and the Production of History. Boston: Beacon Press.Google Scholar
\UK Parliament. 2009. “Holocaust (Return of Cultural Objects) Bill” (second reading). Hansard, Lords, Vol. 712, July 10, 2009. https://hansard.parliament.uk/Lords/2009-07-10/debates/09071034000391/Holocaust(ReturnOfCulturalObjects)Bill.Google Scholar
U.S. Department of Health, Education, and Welfare. 1979. “The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research.” April 18. https://www.hhs.gov/ohrp/sites/default/files/the-belmont-report-508c_FINAL.pdf.Google Scholar
Walt, Stephen. 2011. “Where Do Bad Ideas Come from and Why Don’t They Go Away?” Foreign Policy 184: 4853.Google Scholar
Walzer, Michael. 2018. “Just and Unjust Leaks: When to Spill Secrets.” Foreign Affairs 97 (2): 4859.Google Scholar
Ward, Stephen. 2014. “The Magical Concept of Transparency.” In Ethics for Digital Journalists: Emerging Best Practices, eds. Zion, Lawrie and Craig, David, 4558. New York: Routledge.Google Scholar
Whitfield, Gregory. 2019. “TRENDS: Toward a Separate Ethics of Political Field Experiments.” Political Research Quarterly 72 (3): 527–38.CrossRefGoogle Scholar
Zimmer, Michael. 2010. “‘But the Data Is Already Public’: On the Ethics of Research in Facebook.” Ethics & Information Technology 12 (4): 313–25.CrossRefGoogle Scholar
Supplementary material: Link

Darnton Dataset

Link
Submit a response

Comments

No Comments have been published for this article.