<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v19i6e195</article-id>
    <article-id pub-id-type="pmid">28588006</article-id>
    <article-id pub-id-type="doi">10.2196/jmir.7082</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Attitudes Toward the Ethics of Research Using Social Media: A Systematic Review</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Bond</surname>
          <given-names>Carol</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Gardner</surname>
          <given-names>Karen</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Conway</surname>
          <given-names>Mike</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" corresp="yes">
      <name name-style="western">
        <surname>Golder</surname>
        <given-names>Su</given-names>
      </name>
      <degrees>BSc (Hons), MSc, PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Department of Health Sciences</institution>
        <institution>University of York</institution>
        <addr-line>Heslington</addr-line>
        <addr-line>York, YO10 5DD</addr-line>
        <country>United Kingdom</country>
        <phone>44 1904 321904</phone>
        <email>su.golder@york.ac.uk</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-8987-5211</ext-link></contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Ahmed</surname>
          <given-names>Shahd</given-names>
        </name>
        <degrees>MD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-0615-7450</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Norman</surname>
          <given-names>Gill</given-names>
        </name>
        <degrees>BSc (Hons), PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3972-5733</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>Booth</surname>
          <given-names>Andrew</given-names>
        </name>
        <degrees>BA (Hons), MA, PhD</degrees>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-4808-3880</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
    <sup>1</sup>
    <institution>Department of Health Sciences</institution>
    <institution>University of York</institution>  
    <addr-line>York</addr-line>
    <country>United Kingdom</country></aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>School of Nursing, Midwifery &#38; Social Work</institution>
    <institution>University of Manchester</institution>  
    <addr-line>Manchester</addr-line>
    <country>United Kingdom</country></aff>
    <aff id="aff3">
    <sup>3</sup>
    <institution>School of Health and Related Research (ScHARR)</institution>
    <institution>University of Sheffield</institution>  
    <addr-line>Sheffield</addr-line>
    <country>United Kingdom</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Su Golder 
      <email>su.golder@york.ac.uk</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>06</month><year>2017</year></pub-date>
    <pub-date pub-type="epub">
      <day>06</day>
      <month>06</month>
      <year>2017</year>
    </pub-date>
    <volume>19</volume>
    <issue>6</issue>
    <elocation-id>e195</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>1</day>
        <month>12</month>
        <year>2016</year>
      </date>
      <date date-type="rev-request">
        <day>23</day>
        <month>2</month>
        <year>2017</year>
      </date>
      <date date-type="rev-recd">
        <day>13</day>
        <month>3</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>30</day>
        <month>3</month>
        <year>2017</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Su Golder, Shahd Ahmed, Gill Norman, Andrew Booth. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.06.2017.</copyright-statement>
    <copyright-year>2017</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://www.jmir.org/2017/6/e195/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>Although primarily used for social networking and often used for social support and dissemination, data on social media platforms are increasingly being used to facilitate research. However, the ethical challenges in conducting social media research remain of great concern. Although much debated in the literature, it is the views of the public that are most pertinent to inform future practice.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>The aim of our study was to ascertain attitudes on the ethical considerations of using social media as a data source for research as expressed by social media users and researchers.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>A systematic review was conducted, wherein 16 databases and 2 Internet search engines were searched in addition to handsearching, reference checking, citation searching, and contacting authors and experts. Studies that conducted any qualitative methods to collect data on attitudes on the ethical implications of research using social media were included. Quality assessment was conducted using the quality of reporting tool (QuaRT) and findings analyzed using inductive thematic synthesis.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>In total, 17 studies met the inclusion criteria. Attitudes varied from overly positive with people expressing the views about the essential nature of such research for the public good, to very concerned with views that social media research should not happen. Underlying reasons for this variation related to issues such as the purpose and quality of the research, the researcher affiliation, and the potential harms. The methods used to conduct the research were also important. Many respondents were positive about social media research while adding caveats such as the need for informed consent or use restricted to public platforms only.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>Many conflicting issues contribute to the complexity of good ethical practice in social media research. However, this should not deter researchers from conducting social media research. Each Internet research project requires an individual assessment of its own ethical issues. Guidelines on ethical conduct should be based on current evidence and standardized to avoid discrepancies between, and duplication across, different institutions, taking into consideration different jurisdictions.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>review literature as topic</kwd>
      <kwd>social media</kwd>
      <kwd>ethics</kwd>
      <kwd>research design</kwd>
      <kwd>qualitative research</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Social media are any Web-based computer-mediated tools to cocreate, share or exchange information, ideas, pictures or videos in virtual communities and networks (such as message boards, social networks, patient forums, Twitter, blogs, and Facebook) [<xref ref-type="bibr" rid="ref1">1</xref>]. The availability of social media opens up new avenues for researchers to easily collect data, especially from sources that may have previously been difficult to access. This has led to a massive surge in social media analytics (whereby posts or chats are analyzed via qualitative methods or aggregate numerical data collection). The order of magnitude of data and the speed with which it is made available (approaching real time) make social media a potential tool to revolutionize health research [<xref ref-type="bibr" rid="ref2">2</xref>]. Health-related social media analytics has taken many forms, including drug or product surveillance, monitoring disease or health patterns, or views or experiences of patients. Examples are pharmacovigilance (such as the discovery of adverse events), monitoring outbreaks of the flu epidemic, illicit drug usage or suicide patterns, and views on vaccinations and health service quality [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref29">29</xref>].</p>
        <p>However, these new research avenues are not without ethical challenges [<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref34">34</xref>]. In common with other research, potentially difficult considerations surround the purpose and value of the research, benefits and harm to participants, as well as privacy, informed consent, and confidentiality. However, Internet research is very different from traditional research and as such brings about many different ethical challenges. Whereas procedures are well established for obtaining ethical approval for traditional research, how far these can be transferred directly to Internet-mediated research is difficult to decipher. Whereas the ethical issues of social media research have been much debated [<xref ref-type="bibr" rid="ref34">34</xref>-<xref ref-type="bibr" rid="ref37">37</xref>], the attitudes of social media users (either posters or lurkers) and researchers have rarely been sought [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref42">42</xref>]. Researchers currently seek guidance from a wide variety of sources, such as individual institutions, research supervisors, subject specialist guidance [<xref ref-type="bibr" rid="ref43">43</xref>], and increasing guidelines proposed specifically for research using social media [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref49">49</xref>].</p>
        <p>This systematic review summarizes the existing research that has evaluated attitudes on the ethical considerations of research using social media. This will help to contribute to, and consolidate, current research practice as well as to clarify those ethical issues most pertinent to the public and researchers. This, in turn, will help guideline developers to formulate evidence-based guidelines for researchers conducting research using social media.</p>
      </sec>
      <sec>
        <title>Objective</title>
        <p>This study aimed to systematically review the research evidence that has evaluated attitudes of social media users, researchers, and other stakeholders on the ethical considerations of using social media as a data source for research.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Inclusion Criteria</title>
        <p>Due to the anticipated dearth of studies specific to health-related research and the potential for generalizability of other research, any research area was considered. To reflect the qualitative or mixed methods nature of the research, we adopted SPIDER (sample, phenomenon of interest, design, evaluation, research type) for defining the inclusion criteria [<xref ref-type="bibr" rid="ref50">50</xref>]:</p>
        <p>S- Sample: Any sample of people (such as social media posters or lurkers, researchers, academics or other stakeholders). No minimum sample size was implemented.</p>
        <p>P- Phenomenon of interest: Attitudes held on the ethical implications of conducting research using social media analytics.</p>
        <p>D- Design: Any qualitative data collection methods (eg, surveys, questionnaires, interviews, observations, or focus groups) independent of the analysis conducted. Discussion papers were excluded.</p>
        <p>E- Evaluation: Any information on attitudes to the ethical implications of research using social media. Such information may be the primary or secondary focus of the study.</p>
        <p>R- Research type: Qualitative (such as interviews or focus groups), quantitative (such as surveys or questionnaires with fixed responses only) or mixed methods (such as research which collates a combination of fixed and open-ended responses).</p>
        <p>No date, language or publication type restrictions were applied to the inclusion criteria. However, financial and logistical restraints did not enable translation from all languages.</p>
      </sec>
      <sec>
        <title>Exclusion Criteria</title>
        <p>Papers that are non–research based such as discussion papers were excluded. Such papers have been summarized elsewhere [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
        <p>Research on the ethics of individual “look-ups” were excluded, for example, employers seeking information on employees or prospective employees, parents viewing their children’s posts, and health professionals seeking information on patients (or vice versa). Research on individual privacy or security issues such as fraud, cyberbullying, grooming, and child protection were also excluded.</p>
      </sec>
      <sec>
        <title>Search Methods</title>
        <p>A total of 16 databases and 2 Internet search engines were searched in addition to handsearching journals and conferences (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). Databases were carefully selected to reflect the multidisciplinary nature of the review. Other methods included reference checking all included articles and any related systematic reviews, citation searching of key papers on Google Scholar and Web of Science, and contacting authors and experts.</p>
      </sec>
      <sec>
        <title>Search Strategies</title>
        <p>The search strategies contained 3 facets—social media, ethics, and qualitative research. A date restriction of 1996 onwards was placed on the searches as blogging first began in 1997. No language limits were placed on the searches. The Embase search strategy is contained in <xref ref-type="app" rid="app2">Multimedia Appendix 2</xref> and was translated as appropriate for each database.</p>
      </sec>
      <sec>
        <title>Selection of Studies</title>
        <p>The results of the searches were entered into an EndNote library and duplicates were removed. The titles and abstracts were screened by 2 researchers independently (SG and GN). The full text of any potentially relevant articles was assessed for eligibility by 2 researchers independently (SG and GN or SA). Disagreements were resolved by consensus based discussion and, if necessary, a third reviewer.</p>
      </sec>
      <sec>
        <title>Data Extraction</title>
        <p>Information was collected on the research question, the numbers of respondents, the characteristics of the participants (such as age and gender), the methods used to ascertain attitudes (such as interviews and survey), sampling methods or survey distribution (such as email and snowballing), questions or methods used to ascertain ethical considerations, and key findings. Data were extracted independently by 2 reviewers (SG and SA). Any disagreements were resolved by discussion or a third reviewer where necessary.</p>
      </sec>
      <sec>
        <title>Assessment of Methodological Quality</title>
        <p>Two reviewers (SG, SA) conducted independent quality assessment using the methodological assessment tool—quality of reporting tool (QuaRT). This involves checking the reporting quality of the articles using 4 elements: (1) the question and study design, (2) recruitment and selection, (3) methods of data collection, and (4) analysis. Studies were categorized as “adequately reported” when a “yes” had been assigned against 2 or more criteria or “inadequately reported” where a study was assigned a single “yes” response, or no yes responses [<xref ref-type="bibr" rid="ref51">51</xref>]. Any disagreements were resolved by discussion or a third reviewer where necessary.</p>
      </sec>
      <sec>
        <title>Analysis</title>
        <p>Although the quality of the reporting of the included papers was assessed, no quality threshold was implemented. All studies which provided insight or contributed to the analysis were included.</p>
        <p>We chose an inductive theme analysis with descriptive analysis rather than a framework approach. We acknowledge that a framework approach is an equally valid approach. However, we did not identify any framework completely compatible with our intended purpose. For instance, the most relevant framework identified was restricted to Twitter [<xref ref-type="bibr" rid="ref52">52</xref>]. In addition, framework analysis has a risk of suppressing “interpretative creativity” and thus reducing some of the “vividness of insight” [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
        <p>Inductive thematic synthesis aims to identify salient themes via coding of the data without the use of a preexisting coding frame, or any preconceptions held by the analysts [<xref ref-type="bibr" rid="ref54">54</xref>] <italic>.</italic> We undertook coding in QSR NVivo Pro 11 by assigning text on a line-by-line basis to nodes developed by one author (SG) and then checked by a second author (SA). An aggregation approach to the synthesis of the data was applied with data from each study extracted and grouped together to form themes with supporting quotations. Finally, interrelationships between themes were assessed and organized into a structure to produce synthesized findings.</p>
      </sec>
      <sec>
        <title>Reporting</title>
        <p>The enhancing transparency in reporting the synthesis of qualitative research (ENTREQ) statement of 21 items was used to report the stages of this review [<xref ref-type="bibr" rid="ref55">55</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Included Studies</title>
        <p>Of the 3340 records (4636 before duplicates removed) identified by the original searches in February 2016 and a further 555 unique records by update searches in July or August 2016, 132 full-text papers were retrieved of which 112 were excluded. Excluded studies were mostly concerned with personal privacy or security (such as bank details), or with individual “look-ups” (such as seeking information on a particular person; <xref ref-type="app" rid="app3">Multimedia Appendix 3</xref>). Overall, 17 studies (from 20 publications) met the inclusion criteria (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Flow diagram.</p>
          </caption>
          <graphic xlink:href="jmir_v19i6e195_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Characteristics of Included Studies</title>
        <p>Of the 17 studies, 12 explored the ethical concerns of social media users [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref67">67</xref>] and 5 asked researchers (mainly academics) [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref68">68</xref>-<xref ref-type="bibr" rid="ref71">71</xref>] (<xref ref-type="table" rid="table1">Table 1</xref> and <xref ref-type="app" rid="app4">Multimedia Appendix 4</xref>). The earliest study was published in 2001 and the latest in 2016, with 12 studies published after 2012.</p>
        <p>Numbers of study participants were reported in 16 of the 17 studies. The smallest study involved 26 respondents and the largest study 2260. The total number of participants was over 5453.</p>
        <p>In 7 studies the participants were from a single country: the United Kingdom (4), the United States (2), or Australia (1). The other studies either explicitly indicated an international participant coverage (3 studies) or implied an international coverage of participants (7 studies)—most of which used social media for recruitment or study observation.</p>
        <p>8 studies used surveys of participants’ attitudes, whereas others carried out more in-depth research and analysis using interviews (6 studies), or focus groups (4 studies). A mixture of open and closed questions was used. Three studies used observational or experimental techniques; with an original design devised by the authors (4 studies used more than one technique).</p>
        <p>The majority of the studies did not indicate the demographic details of the respondents; however, in those that did males and females were well represented. Some studies specifically targeted young people [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        <p>5 studies were specifically concerned with health-related research [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref69">69</xref>], whereas the remaining studies tended to be more general.</p>
      </sec>
      <sec>
        <title>Quality Assessment</title>
        <p>Only 3 studies (from 4 reports) were assessed as “inadequately reported” [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref71">71</xref>] (<xref ref-type="app" rid="app5">Multimedia Appendix 5</xref>). The contribution to the synthesis of these 3 “inadequately reported” studies was assessed as being limited. These 3 studies did not impact on the presence of concepts within the synthesis and had only a marginal effect on the detail within the concepts.</p>
      </sec>
      <sec>
        <title>Analysis</title>
        <p>Whereas some included studies reported summary data from surveys or questionnaires, the majority of studies presented author interpretations supported by verbatim extracts from participants.</p>
      </sec>
      <sec>
        <title>Emerging Themes</title>
        <p>Some responses spanned multiple themes and attempted to categorize overall reactions to social media research use. Many closely related themes underpin the diverse attitudes exhibited by the study respondents. The framework we adopted from our emerging themes was: the 2 actors (researchers and social media users), managing their relationship (consent), and framing the context (responsibilities of the social media site (<xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="app" rid="app6">Multimedia Appendix 6</xref>). Some studies assessed multiple themes in a more integrated and quantifiable way and we consider these first under general reactions.</p>
        <p>Within the arena of “researchers,” we identified themes of the perceived benefit of the research, the affiliation or type of researcher, the validity of the methods used to conduct the research, and the risks to the researchers themselves. Those themes related to the “social media users” were concerned with the risks involved with particular concern for vulnerable groups. Linked to these risks were the intended purpose of the social media poster and their ability to self-regulate through personal censorship or privacy settings. The next theme related to “consent” and the importance of and difficulties of informed consent and research disclosure. The last theme was regarding “responsibilities”—either via the social media site (including the platform and site administrators) or legal requirements (<xref ref-type="table" rid="table2">Tables 2</xref> and <xref ref-type="app" rid="app6">Multimedia Appendix 6</xref>).</p>
      </sec>
      <sec>
        <title>General Reactions</title>
        <p>Three studies attempted to quantify general reactions to social media research. Moreno found that over half (56.1%, 74/132) of university students “strongly like” or “somewhat like” the concept of using Facebook for research by university researchers, nearly a third (28.8%, 38/132) were “neutral” and only 15.2% (20/132) were “unsure or uneasy” or had an “overt concern” [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>Williams found that 37.2% (N=564) of social media users were “not at all concerned” with their social media information being used by university researchers, whereas 46.4% (N=564) were “slightly concerned,” 11.2% (N=564) “quite concerned,” and 5.2% (N=564) “very concerned” [<xref ref-type="bibr" rid="ref67">67</xref>]. Evans found that 60% (N=1250) of social media users felt that “sharing individuals’ social media data with third parties, such as the government or companies, for research purposes” should not happen and 32% (N=1250) felt that “sharing overall numbers of social media data with third parties, such as the government or companies, for research purposes (but not linked to individuals)” should not happen [<xref ref-type="bibr" rid="ref59">59</xref>].</p>
        <p>Respondents in Evans may have been less positive because they were given use of examples relating to government and companies rather than university researchers [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref67">67</xref>]. The more positive attitudes in Moreno may be linked to surveying younger people [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref67">67</xref>].</p>
      </sec>
      <sec>
        <title>Researchers</title>
        <sec>
          <title>Perceived Benefit of Research</title>
          <p>Research was considered more acceptable if “it’s going to a good cause” [<xref ref-type="bibr" rid="ref65">65</xref>] and was “morally right” or for “general good” (such as social benefit or to help others) [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref62">62</xref>-<xref ref-type="bibr" rid="ref65">65</xref>]. Some respondents were more specific—stating that social media research could give a voice to patients and other groups, uncover true prevailing issues, and improve patient care [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref65">65</xref>];</p>
          <disp-quote>
            <p>I have no reservations about your mining information from forums...it will provide much information about the human side of illness and how individuals singly and collectively approach and cope through sharing. Dare I say its importance cannot be understated.</p>
            <attrib>Diabetic forum user  
            <xref ref-type="bibr" rid="ref57">57</xref></attrib>
          </disp-quote>
          <disp-quote>
            <p>I kind of think it’s cool when it’s stuff that’s like the flu, because then that’s how they know to get the vaccines to a place.</p>
            <attrib>Twitter user  
           <xref ref-type="bibr" rid="ref64">64</xref></attrib>
          </disp-quote>
          <p>Others described the general benefit of social media research as a precondition to acceptance [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>] or considered if the benefits outweighed the risks [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]. Others felt positive provided a caveat or set of conditions had been met, such as informed consent (see following sections).</p>
          <p>Whereas some stipulated the good that should come from social media research, others stated the research they would not like to see, such as research with a “bad intention” [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref65">65</xref>], for commercial gain [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>] or to drive an agenda [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          <p>The strong feeling for the “public good” meant that some felt service to the greater social good was more important than individual privacy concerns [<xref ref-type="bibr" rid="ref64">64</xref>]. However, others considered that social media users’ desire for privacy should take precedence over researchers’ goals [<xref ref-type="bibr" rid="ref66">66</xref>].</p>
        </sec>
        <sec>
          <title>Type of Researcher</title>
          <p>Linked to the purpose of the research was the affiliation of the researcher. The type of organization or company influenced whether or not respondents viewed research as “good quality” and user concerns about use of social media information [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref69">69</xref>]. Generally, respondents were less concerned about use of social media information by university researchers, than by students [<xref ref-type="bibr" rid="ref58">58</xref>], the police, government organizations [<xref ref-type="bibr" rid="ref67">67</xref>], commercial organizations [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref67">67</xref>] or journalists [<xref ref-type="bibr" rid="ref58">58</xref>]. But no difference was reported between health organizations and researchers [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
          <p>Social media users who preferred not-for-profit researchers (such as academics) to commercial organizations did so because the former were felt to be more “productive,” more “ethical,” and “not exploitative.” Furthermore, users did not like their social media posts being used to generate a profit for others [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref64">64</xref>].</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Brief summary of characteristics of included studies.</p>
            </caption>
            <table width="750" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="35"/>
              <col width="36"/>
              <col width="30"/>
              <col width="50"/>
              <col width="50"/>
              <col width="50"/>
              <col width="50"/>
              <thead>
                <tr valign="top">
                  <td>Source</td>
                  <td><break/></td>
                  <td>Number of respondents</td>
                  <td>Characteristics of the participants</td>
                  <td>Survey distribution</td>
                  <td>Specific questions or methods used to ascertain ethical considerations</td>
                  <td>Key findings identified in terms of the ethical considerations raised</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td><bold>Researchers as respondents</bold></td>
                  <td>Alim 2014 [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
                  <td>64</td>
                  <td>International and interdisciplinary researchers and academics</td>
                  <td>Emailed questionnaire</td>
                  <td><italic>Open and closed questions</italic> <break/><break/></td>
                  <td>Researchers aware of ethical issues but require clarity in informed consent and public and private data.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Bakardjieva 2001 [<xref ref-type="bibr" rid="ref56">56</xref>]</td>
                  <td>NR<sup>a</sup></td>
                  <td>Mailing list discussants</td>
                  <td>Mailing list discussion</td>
                  <td>Discussions provoked by post</td>
                  <td>An ethical approach to Web-based research is practically achievable.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Carter 2015 [<xref ref-type="bibr" rid="ref68">68</xref>]</td>
                  <td>30</td>
                  <td>Academic staff from UK university</td>
                  <td>Emailed Web-based survey</td>
                  <td>Respondents asked to agree, disagree or neither to 12 statements. <break/><break/></td>
                  <td>Recognize importance of avoiding deception and gaining consent, but acknowledge problems. Most disagreed that studying public social media data is same as studying documented text and disagreed that individuals wouldn’t be identified if anonymous.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Denecke 2014 [<xref ref-type="bibr" rid="ref69">69</xref>] <break/><break/></td>
                  <td>45</td>
                  <td>International Medical Informatics Association (IMIA) social media working group members</td>
                  <td>Mailing list members</td>
                  <td>3 questions asked <break/><break/></td>
                  <td>Different social media platforms should be managed in different ways in terms of confidentiality and privacy. Individuals should be deidentified and cited only indirectly.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>McKee 2009 [<xref ref-type="bibr" rid="ref70">70</xref>]</td>
                  <td>30</td>
                  <td>International and interdisciplinary researchers from corporate research centers and academia.</td>
                  <td>Contacted known researchers</td>
                  <td>Used open-ended interviews</td>
                  <td>Researchers strived to follow “do no harm” principle. Agreement that there is no blanket approach to Internet research ethics.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Woodfield 2013 [<xref ref-type="bibr" rid="ref71">71</xref>]/Salmons 2013 [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
                  <td>465</td>
                  <td>International and interdisciplinary researchers</td>
                  <td>Program of Web-based and offline activities including conference and Twitter chat</td>
                  <td>Open discussions in which ethics consistently raised <break/><break/></td>
                  <td>Discussions focused on informed consent, confidentiality or anonymity, role and safety of the researcher, and research setting or social media platform. Concern of a lack of agreement.</td>
                </tr>
                <tr valign="top">
                  <td><bold>Social media users as respondents</bold></td>
                  <td>Beninger 2014 [<xref ref-type="bibr" rid="ref40">40</xref>]</td>
                  <td>34</td>
                  <td>Adult male and females</td>
                  <td>British social attitudes 29 (BSA 29) survey and external recruitment agency</td>
                  <td>Focus groups and interviews using vignettes</td>
                  <td>Conditional acceptance of using social media for research.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Bond 2013 [<xref ref-type="bibr" rid="ref57">57</xref>]</td>
                  <td>26 <break/><break/></td>
                  <td>Male and females</td>
                  <td>Diabetes forums</td>
                  <td>Web-based semistructured asynchronous (email) interviews</td>
                  <td>Agreed forum posts in the public domain and aggregated information could be used by researchers.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Chen 2004 [<xref ref-type="bibr" rid="ref58">58</xref>]</td>
                  <td>47</td>
                  <td>Mailing list owners and moderators or long standing members on sensitive and controversial topics</td>
                  <td>Emailed mailing lists and newsgroups</td>
                  <td>Survey questionnaire <break/><break/></td>
                  <td>Animosity toward researchers. Research should be conditional on research identify disclosure, informed consent, and feedback.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Evans 2015 [<xref ref-type="bibr" rid="ref59">59</xref>]</td>
                  <td>1265+</td>
                  <td>Aged 13 to 75 years and broadly reflective of UK population</td>
                  <td>NR</td>
                  <td>Web-based survey, workshops or interviews included example research projects</td>
                  <td>60% do not support use of social media data for research. Terms and conditions not sufficient for consent and need option to opt out. Biggest factor in likelihood to approve research is whether data is public.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Hudson 2004 [<xref ref-type="bibr" rid="ref60">60</xref>] and Hudson 2005 [<xref ref-type="bibr" rid="ref61">61</xref>]</td>
                  <td>Up to 2260</td>
                  <td>Chatroom users on ICQ chat—range of topics including geographical region or language, age-orientated, romance or friends, adult or sexuality, technical, trivia avoided sensitive discussions such as “breast cancer survivors” <break/><break/></td>
                  <td>Monitored chatrooms</td>
                  <td>Recorded if “kicked-out” of chatroom and messages on why or comments to researchers</td>
                  <td>Kicked out of 63.3% of chatrooms when message posted about research. <break/>Reasons were— prohibition of spamming, opposition to being studied, general requests to leave, and insults.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Michaelidou 2016a [<xref ref-type="bibr" rid="ref62">62</xref>] and Michaelidou 2016b [<xref ref-type="bibr" rid="ref63">63</xref>]</td>
                  <td>405</td>
                  <td>Adult male and females <break/><break/></td>
                  <td>NR</td>
                  <td>Focus groups and Web-based survey</td>
                  <td>10-item scale of transparency, legality, approval, privacy concerns, permission, vulnerability, reward, consumer responsibility, protection, and terms.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Mikal 2016 [<xref ref-type="bibr" rid="ref64">64</xref>]</td>
                  <td>26</td>
                  <td>Male and females with average age 26 years. Over half with depression history</td>
                  <td>Advertised on list serves, discussion boards, and local Internet community websites</td>
                  <td>Focus group s <italic>emistructured</italic> interviews</td>
                  <td>Relatively positive view provided data are anonymous and aggregated to protect identities.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Monks 2015 [<xref ref-type="bibr" rid="ref65">65</xref>]</td>
                  <td>48</td>
                  <td>13-14 years old Australian school students</td>
                  <td>Sample of convenience drawn from students participating in a leadership workshop</td>
                  <td>Focus groups with 3 main open questions</td>
                  <td>Some concerns about privacy but open to the use of social media for research if opportunity to provide consent and assured of confidentiality and anonymity.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Moreno 2012 [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                  <td>132</td>
                  <td>Male and female adolescents aged 18-19 years within US university <break/><break/></td>
                  <td>Used Facebook to identify students</td>
                  <td>At end of interview about health, asked “We identified participants for this study by looking at publicly available Facebook profiles. Do you have any thoughts about that?”</td>
                  <td>Endorsement by 26 respondents. 48 were “fine” with it, 38 were neutral or no specific comments, 12 were uneasy, 8 had overt concerns.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Petersen 2013 [<xref ref-type="bibr" rid="ref66">66</xref>]</td>
                  <td>27</td>
                  <td>Members of Medical Webmasters (MWM), an open, unmoderated list and Patient Advocates in Research (PAIR), a closed, unmoderated list for cancer patient advocates</td>
                  <td>Posted on 2 electronic lists</td>
                  <td>Survey</td>
                  <td>Two themes emerged. Respondents believed journalists should seek permission from list members and/or webmasters and viewed members’ desire for privacy as taking precedence over researchers’ goals.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Williams 2015 [<xref ref-type="bibr" rid="ref67">67</xref>]</td>
                  <td>564</td>
                  <td>Social media users</td>
                  <td>Web-based survey</td>
                  <td>Survey with open and closed questions</td>
                  <td>37% are not at all concerned about their social media information being used by university researchers, whereas 46% are slightly concerned, 11% are quite concerned, and 5% are very concerned.</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table1fn1">
                <p><sup>a</sup>NR: not reported.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Summary of coding framework.</p>
            </caption>
            <table width="616" cellpadding="7" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="127"/>
              <col width="131"/>
              <col width="314"/>
              <thead>
                <tr valign="top">
                  <td>Concept headings</td>
                  <td>Concepts derived for coding</td>
                  <td>Definitions</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td rowspan="4">Researchers</td>
                  <td>Perceived benefit of research</td>
                  <td>Overall outcome or intention of the research to do “good.”</td>
                </tr>
                <tr valign="top">
                  <td>Type of researcher</td>
                  <td>The affiliation of the researcher (such as university or commercial company). This is associated with the perceived benefit of the research.</td>
                </tr>
                <tr valign="top">
                  <td>Validity of the research methods</td>
                  <td>High or low validity of the methodology used, including risk of bias.</td>
                </tr>
                <tr valign="top">
                  <td>Risks to researchers</td>
                  <td>Any risks that the researcher is exposed to.</td>
                </tr>
                <tr valign="top">
                  <td rowspan="4">Social media users</td>
                  <td>Risks to social media users</td>
                  <td>Any risks that the social media users are exposed to either individually or as a group.</td>
                </tr>
                <tr valign="top">
                  <td>Vulnerable groups</td>
                  <td>Groups could be determined as vulnerable by either their individual characteristics or the topic discussed.</td>
                </tr>
                <tr valign="top">
                  <td>Original purpose of posts</td>
                  <td>The intent of the poster at the time the message was placed.</td>
                </tr>
                <tr valign="top">
                  <td>Privacy and self-regulation</td>
                  <td>The public versus private nature of social media and the need for anonymity or confidentiality. Connected to this issue is self-regulation whereby individuals control content.</td>
                </tr>
                <tr valign="top">
                  <td rowspan="2">Consent</td>
                  <td>Informed consent</td>
                  <td>Permission for posts to be used in a study.</td>
                </tr>
                <tr valign="top">
                  <td>Researcher disclosure</td>
                  <td>Researchers being transparent and honest about their intent. This can be either up-front or at a later stage.</td>
                </tr>
                <tr valign="top">
                  <td rowspan="2">Social media site responsibilities</td>
                  <td>Terms of service</td>
                  <td>Also known as “terms of use” or “terms and conditions,” these are the rules agreed to in order to use social media sites.</td>
                </tr>
                <tr valign="top">
                  <td>Site administrators</td>
                  <td>Site administrators, list administrators or list moderators are often in charge of maintaining a discussion or mailing list.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Legality</td>
                  <td>Refers to legal issues, regulation or government oversight and includes issues of copyright.</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Type of platform</td>
                  <td>The type of social media platform, for example closed or open, personal or professional. This is connected to issues of public versus private space, and the original purpose of the postings.</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>Validity of the Research Methods (High and Low)</title>
          <p>Whereas users’ perceptions of the validity of social media research was partially influenced by the researcher affiliation, they also discussed its methodological rigor on its own merits. Attitudes were divided as to whether social media research could be viewed as high or low validity research, particularly compared with more traditional research methods. Those users who viewed social media research as high quality cited it as a means of quick access to vast amounts of timely information and large samples to mitigate the effect of false information or extreme views and improve research accuracy [<xref ref-type="bibr" rid="ref40">40</xref>]. Anonymity of posts was also thought to encourage open and honest opinions and discussions particularly about sensitive issues or nonconventional or “politically incorrect” views. Research using social media was also seen to avoid biases inherent in having to answer questions in the presence of others, such as in a survey [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          <p>In contrast, other social media users were concerned about the low validity of the research in terms of quality of the data, representativeness, and poor methodological approach [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Concerns were raised about inaccurate or false data or accounts with people severely limiting what they post on the Web (see self-regulation), and behaving differently off and on the Web [40,58 64,65];</p>
          <disp-quote>
            <p>I’ve never once posted anything negative. So if you took that data, it would not be accurate, because of course I have had bad days or sad days.</p>
            <attrib>Twitter user [ 
            <xref ref-type="bibr" rid="ref64">64</xref>]</attrib>
          </disp-quote>
          <p>Social media posters were not considered representative of the general population and using social media would lead to “only the loudest voices heard” [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>].</p>
          <p>Some social media users were skeptical not only about the data posted on social media but also about the accuracy of the methods of using social media, and biased research;</p>
          <disp-quote>
            <p>You can’t even get targeted advertising right, what makes you think public health accuracy is going to be any better?</p>
            <attrib>Twitter user [ 
            <xref ref-type="bibr" rid="ref64">64</xref>]</attrib>
          </disp-quote>
          <disp-quote>
            <p>Many researchers in the fields covered by this list do research solely to “prove” that our illness are faked or psychological. Most of us do not care to operate with people like that. Any truly unbiased research is fine.</p>
            <attrib>Chemical-injury mailing list owner  
            [<xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
        </sec>
        <sec>
          <title>Risks to Researchers</title>
          <p>Insults or being “flamed” were the most common threat posed to researchers [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. Researchers spoke from experience of the need for care that they do not become victims to trolls and to separate their “researcher” persona from their “personal” persona and thus protect the boundaries between their professional and personal lives [<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref71">71</xref>].</p>
          <p>The potential for more extreme harm was cited in countries with governments which control Internet access and communications [<xref ref-type="bibr" rid="ref70">70</xref>]. For example, an associate professor carrying out a study in Central Asia stated that local researchers could be risking their lives by conducting social media research;</p>
          <disp-quote>
            <p>I can’t get anyone to work with me right now because the Uzbek government just passed a law that anyone accused of giving sensitive information to foreigners will be accused of treason, and the law doesn’t define what is sensitive information. Now the penalty for treason in Uzbekistan is death, I believe.</p>
            <attrib>Associate professor, University of Washington  
            [<xref ref-type="bibr" rid="ref70">70</xref>]</attrib>
          </disp-quote>
        </sec>
      </sec>
      <sec>
        <title>Social Media Users</title>
        <sec>
          <title>Risks to Social Media Users</title>
          <p>Social media users were also worried about the risks of judgment or ridicule or unsolicited attention on the Web and, more seriously, “abuse” or bullying [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. Other possible harm included exploitation from organizations or use by the police or courts for purposes of prosecution in divorce cases, child custody cases or lawsuits [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. Other social media users felt very uneasy about social media research or felt it was “creepy” or “scary” [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Respondents commonly held the perception that posters are being “exploited” or “used,” with researchers using social media posters to “get someone to do their work for them” was widely held [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</p>
          <p>Risks were associated with data being taken out of context, used inappropriately or the poster being identifiable. Users were concerned at the potential to distort the context in which something was said or that findings would be used to defend or promote something that was not intended (see purpose and validity of the research) [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Some respondents, although happy for researchers to use verbatim quotes, felt that “if it actually involves taking your comments and interpreting it, then it’s a very different thing” [<xref ref-type="bibr" rid="ref40">40</xref>]. Use of verbatim quotes, rather than some form of interpretation [<xref ref-type="bibr" rid="ref65">65</xref>], was one solution to taking comments out of context. However, this bought about issues of anonymity and privacy.</p>
          <p>Researchers were generally aware of the risks to social media users (even with anonymized data) and considered these risks in their studies [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. In addition, researchers were worried that the risks were not taken seriously by international review boards (IRBs) [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. Deidentification of social media posts was seen as crucial to minimize negative consequences [<xref ref-type="bibr" rid="ref65">65</xref>]. However, using verbatim quotes could compromise individual anonymity (see privacy).</p>
          <p>Whereas users were well aware of the risks, they exhibited a feeling of apathy [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref64">64</xref>] with risks just being something to be accepted and the only way to stop it happening being to stop using social media [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref64">64</xref>];</p>
          <disp-quote>
            <p>With some of the stuff I write, I am uncomfortable thinking it is going to be accessible for a long time but this is after all the Internet and it’s hardly private...The alternative, (that is) total privacy is to sit here in my house alone and not communicate. I’d give it about three weeks before total insanity set in.</p>
            <attrib>Discussion list member 
            [<xref ref-type="bibr" rid="ref56">56</xref>]</attrib>
          </disp-quote>
          <p>Risks extended beyond individuals to social media groups. It was considered important to maintain social media as a protected space where members may speak openly without concern that their words will be shared outside the group [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. Researchers were seen by some as an intrusion which can destroy the dynamics and enjoyment of using social media and curtail freedom of expression [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. This was reiterated by some users who reluctantly self-regulated their posts [<xref ref-type="bibr" rid="ref65">65</xref>]. Some users even felt that the damage to communication and community within these forums could lead to people not participating or sites closing [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        </sec>
        <sec>
          <title>Vulnerable Groups</title>
          <p>Certain groups such as children and teenagers [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref71">71</xref>], individuals suffering from mental health issues [<xref ref-type="bibr" rid="ref64">64</xref>], and even the deceased [<xref ref-type="bibr" rid="ref66">66</xref>] were perceived as vulnerable and thus required extra emphasis on respect and caution to counteract this vulnerability [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. The legal context and government practice of the country from which the post originates may also affect the potential for harm. For example, homosexuality is illegal, or at least taboo, in certain regions. Thus, individuals could be exposed to severe harm if their sexual orientation were publicized [<xref ref-type="bibr" rid="ref70">70</xref>]. Risks to professional reputations and careers were also raised for those, such as school teachers or health professionals, with responsibility for potentially vulnerable or impressionable individuals [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          <p>Whereas some social media users thought ethical principles of research should be upheld regardless of the topic of the research [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref65">65</xref>], others thought that topics of a sensitive or personal nature needed more consideration [<xref ref-type="bibr" rid="ref58">58</xref>-<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. The sensitive nature of some discussion groups was cited as good reason to prohibit or discourage researchers;</p>
          <disp-quote>
            <p>Our code of conduct explicitly prohibits information gathering from SPALS (subsequent pregnancy after a loss support) for other than immediate personal use. …Privacy and confidentiality are also concerns. We don’t want to attract the “research-paparazzi.”</p>
            <attrib>List owner  
            [<xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
        </sec>
        <sec>
          <title>Original Purpose of Posts</title>
          <p>When social media users post on social media, they may have no expectation that this would ever be used for research [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. The intended audience may be limited to friends and family and possibly “friends-of-friends” [<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. Considerations of the wider implications and access by third parties are not likely to be at the forefront of many social media users’ minds [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</p>
          <p>Even if people are aware of the public nature of social media, people may still “get carried away with themselves when they are writing (on social media platforms)” [<xref ref-type="bibr" rid="ref40">40</xref>] and then “once it is on there, to try and get rid of it, it’s too late or it’s too hard” [<xref ref-type="bibr" rid="ref40">40</xref>]. Thus, there is a need to consider carefully the impact of reporting of verbatim social media data no matter how open or public a site is considered to be [<xref ref-type="bibr" rid="ref71">71</xref>];</p>
          <disp-quote>
            <p>I was also very irritated with people who used that argument that we should not ask for informed consent because it is easy to get into the groups. It is the participants’ purpose for being in the group that is important in a way and their feelings about what kind of space this is.</p>
            <attrib>Researcher, Norwegian University of Science and Technology [ 
            <xref ref-type="bibr" rid="ref70">70</xref>]</attrib>
          </disp-quote>
        </sec>
        <sec>
          <title>Privacy and Self-Regulation</title>
          <p>Whether social media should be seen as a public or private space occasioned contention as well as confusion [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref68">68</xref>-<xref ref-type="bibr" rid="ref71">71</xref>] and was the principal factor in the likelihood of approval for social media research projects [<xref ref-type="bibr" rid="ref59">59</xref>]. Some social media users believe that “there is no such thing as privacy online” [<xref ref-type="bibr" rid="ref40">40</xref>], so once information is posted it is available to the public and thus can be accessed and used for research purposes [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>].</p>
          <p>Despite the commonly held view that social media are public, some privacy was still expected and this raises caution for Internet research [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref62">62</xref>-<xref ref-type="bibr" rid="ref64">64</xref>]. Some users still expressed discomfort about it being used—although appreciated how contradictory this may appear [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref63">63</xref>];</p>
          <disp-quote>
            <p>I write a blog about my experience of diabetes and would feel very aggrieved if I found any of it quoted in a medical research paper without having been asked. I realise this is slightly contrary (since I am posting and effectively actively encouraging readership) but nevertheless it would feel like “theft” of my content.</p>
            <attrib>Diabetic forum user [ 
            <xref ref-type="bibr" rid="ref57">57</xref>]</attrib>
          </disp-quote>
          <p>An expectation of privacy resulted, in part, from a lack of understanding of the extent of the public nature of social media exchanges [<xref ref-type="bibr" rid="ref56">56</xref>]. Navigating the privacy settings of social media isn’t always simple or straightforward. Some social media users did not know what is public or private on social media or what their settings were [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Some users did not understand the permanent nature of social media data, how extensive data reach can be, and the big data computational tools that can be used to analyze posts [<xref ref-type="bibr" rid="ref64">64</xref>]. Users also felt it was easy to forget or not think about this while posting (see risks) [<xref ref-type="bibr" rid="ref57">57</xref>].</p>
          <p>Confidentiality and anonymity were thought to help protect privacy [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. Social media users emphasized the importance of anonymity [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref69">69</xref>] with approximately three-quarters preferring to remain anonymous [<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref67">67</xref>]. Users were also more likely to accept research if it looked at deauthored data or used overall aggregated numbers [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>-<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref69">69</xref>].</p>
          <p>Some respondents (both users and researchers) identified the challenge of using quotations and maintaining anonymity [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref70">70</xref>] given that quotes, even if anonymized, can be traced back to their origins using a Google search [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. These views were confirmed in a small Web-based survey of academics from a single UK university where only 10 out of 30 researchers agreed it was “very unlikely that individuals will be able to be identified if social media datasets are anonymised” [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <p>One solution to using direct quotes was to cite only indirectly or to paraphrase quotes [<xref ref-type="bibr" rid="ref69">69</xref>]. This, however, could have implications for those social media users’ who were concerned about their posts being taken out of context (see risks).</p>
          <p>Respondents who disagreed with the need for anonymity believed that users are responsible for managing their identity as people “can always be anonymous if you want to be” [<xref ref-type="bibr" rid="ref40">40</xref>]. For example, users could use a username unrelated to their real name, utilize privacy settings, and select what to share on the Web [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref62">62</xref>-<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. The idea that there is no such thing as privacy was reiterated (52) and as such self-regulation was key [<xref ref-type="bibr" rid="ref64">64</xref>];</p>
          <disp-quote>
            <p>I think our generation is gravitating towards (the idea that) privacy is not to be expected anymore. You have to create it yourself. You have to enable it yourself, because it just doesn’t exist anymore.</p>
            <attrib>Twitter user  
            [<xref ref-type="bibr" rid="ref64">64</xref>]</attrib>
          </disp-quote>
          <p>This idea that self-regulation should be relied upon was reflected in the results of the survey of UK academics where 17 out of 30 agreed “it is the responsibility of individuals to rethink how they use social media if they are unwilling for their online public behavior to be studied by researchers” [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <p>These views were inextricable from views on informed consent as social media users who actively “self-regulated” did not think researchers needed to gain consent [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Consent</title>
        <sec>
          <title>Informed Consent</title>
          <p>Generally social media users were divided as to whether they agreed or disagreed that social media research required informed consent from posters [<xref ref-type="bibr" rid="ref67">67</xref>]. Users and researchers who did not feel informed consent was necessary tended to feel that informed consent was implied by the public nature of social media [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]. Others felt that anonymization removed the need for informed consent [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref69">69</xref>].</p>
          <p>Other social media users expressed reservations feeling that researchers should obtain permission for use [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref66">66</xref>]. They linked this to the original intention of the post [<xref ref-type="bibr" rid="ref57">57</xref>], data ownership, or to difficulties of anonymizing direct quotes [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Attitudes appear to be changing as users learn from experience and social media develops;</p>
          <disp-quote>
            <p>I have allowed this in the past, but I feel that they should get permission first.</p>
            <attrib>Mailing list owner [ 
            <xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
          <p>Gaining consent was seen as part of common decency and not solely to ensure good ethical practice [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. Researchers were felt to have a moral responsibility toward Web-based content [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref65">65</xref>] and to protect citizens from violations linked to social media research [<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>].</p>
          <p>Some researchers tended to assume that proceeding without informed consent was acceptable because social media are public [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <disp-quote>
            <p>Only publicly visible data was extracted so we thought that, because the data was publicly available, no ethics applied.</p>
            <attrib>Researcher [ 
            <xref ref-type="bibr" rid="ref43">43</xref>]</attrib>
          </disp-quote>
          <p>This was reiterated in the survey of 30 UK academics where 10 felt that there is no need for informed consent if social media were publically accessible [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <p>However, they also raised the issue of whether posts represent a “human subject” or text [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
          <disp-quote>
            <p>If I think of Perry’s comments as the letter for the editors, I don’t have to get any informed consent, but if I think of it as a personal conversation, I have to get informed consent.</p>
            <attrib>Doctoral student, York University in Canada [ 
            <xref ref-type="bibr" rid="ref70">70</xref>]</attrib>
          </disp-quote>
          <p>This issue was not discussed among social media users but when asked, 22 out of 30 UK academics disagreed that “studying public data on social media is essentially same as studying documented text” [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <p>Some users saw the necessity for informed consent as depending upon both the content and type of analysis. Many thought that sensitive, personal posts or posts with a “sexual, political or religious” focus required informed consent [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref58">58</xref>] and were more accepting of the use of aggregate data, generalizations or observational overviews than case studies or the use of quotes (this was interconnected with anonymity) [<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
          <p>Both social media users [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref65">65</xref>] and researchers [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref70">70</xref>] felt that it was difficult to implement informed consent. Challenges related to the large amounts of data involved, the impossibility of getting informed consent from all the users, and difficulties in how and whom to ask [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. The impracticalities of detecting minors were also highlighted [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. However, where respondents favored consent, they did not think that logistical burdens offered a justification for not seeking permission [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        </sec>
        <sec>
          <title>Research Disclosure</title>
          <p>Many social media users felt that the collection, access, and use of social networking data should be transparent [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref56">56</xref>-<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref60">60</xref>-<xref ref-type="bibr" rid="ref66">66</xref>]. Some felt that authors of postings should know how their comments might be used “up-front” at the time of producing them [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref56">56</xref>] with an option to opt-out of research (or even better, an opt-in) [<xref ref-type="bibr" rid="ref58">58</xref>-<xref ref-type="bibr" rid="ref61">61</xref>];</p>
          <disp-quote>
            <p>Any researcher that joins a mailing list should identify themselves as such as soon as they have joined-opt better yet before they have joined and ask permission of the list owner. As a person I have a right to know I am being experimented on or studied.</p>
            <attrib>List owner [ 
            <xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
          <p>Many researchers agreed that being explicit and transparent as possible about one’s role as a researcher was the best possible action [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref70">70</xref>] whereas some were uncertain about when it is appropriate to collect data without disclosing their identities [<xref ref-type="bibr" rid="ref71">71</xref>]. Deception of social media users was generally seen as unacceptable [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
          <p>Respondents drew a distinction between naturally occurring social media data and data stimulated by a researcher’s intervention. It was more important for a researcher to make themselves and their intentions known in advance when participating in forums [<xref ref-type="bibr" rid="ref71">71</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Social Media Site Responsibilities</title>
        <sec>
          <title>Terms of Service</title>
          <p>Most researchers factor in consideration of “terms of service” for the social media platforms from which they extract data into their research planning [<xref ref-type="bibr" rid="ref43">43</xref>]. Whereas the vast majority of social media users were aware of “terms of service,” neither researchers nor most social media users agreed that this is sufficient for informed consent [<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. Terms of service were considered too long, dense, and confusing [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]; “constantly changing” [<xref ref-type="bibr" rid="ref40">40</xref>]; and unread by most members of social media sites [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. A few social media users felt that the public openness and accessibility of the platform of social media (such as Twitter or LinkedIn) implies that third parties may use the data [<xref ref-type="bibr" rid="ref40">40</xref>]. Thus, researchers should not rely upon the terms of service.</p>
        </sec>
        <sec>
          <title>Site Administrators</title>
          <p>There was an absence of consensus over the role of site administrators. Some social media users thought that researchers need to gain permission from the list owner [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref69">69</xref>], in addition to the users’ permission;</p>
          <disp-quote>
            <p>No individual or entity should be using it (private forum) for research without explicit permission from both the people who writes the message as well as the people/group who runs the mailing list.</p>
            <attrib>List owner [ 
            <xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
          <p>Others were vehemently opposed to list owners giving permission on behalf of members;</p>
          <disp-quote>
            <p>I think it would be a complete betrayal if (admin) were to give permission on behalf of the members.</p>
            <attrib>Diabetic forum user  
            [<xref ref-type="bibr" rid="ref57">57</xref>]</attrib>
          </disp-quote>
        </sec>
        <sec>
          <title>Legality</title>
          <p>Some social media users thought government oversight or regulation should ensure the ethical use of data and protect the rights of users [<xref ref-type="bibr" rid="ref64">64</xref>]. Some suggested a law against collecting information about social media users [<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>] and not gaining consent was compared with “hacking” [<xref ref-type="bibr" rid="ref40">40</xref>]. Others suggested that governmental oversight was unnecessary leading to fears of Orwellian monitoring [<xref ref-type="bibr" rid="ref64">64</xref>].</p>
          <p>The public nature of social media platforms and their content raises the issue of data ownership [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. Some social media users thought that users automatically surrender their right to ownership by posting and that as they are public they are “uncopyrighted so they are ‘free’ for anyone to use” [<xref ref-type="bibr" rid="ref56">56</xref>] or the social media platform owns all data on the site [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref64">64</xref>].</p>
          <p>However, other social media users and researchers thought that users own the intellectual property of content they post and that posts should be treated in line with copyright laws [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref70">70</xref>]. This requires that proper referencing or acknowledgment is in place [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref70">70</xref>];</p>
          <disp-quote>
            <p>If someone decided to republish my post in another forum or document, I would expect my comments to be kept in context and credited to me.</p>
            <attrib>Diabetic forum user [ 
            <xref ref-type="bibr" rid="ref57">57</xref>]</attrib>
          </disp-quote>
          <p>However, including a “handle” or the Web-based username in a reference was perceived as problematic by some social media users who valued anonymity over credit [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        </sec>
        <sec>
          <title>Type of Platform</title>
          <p>The type of social media website, such as open and closed groups or sites with privacy settings, also influenced whether consent was considered implicit [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>,<xref ref-type="bibr" rid="ref69">69</xref>,<xref ref-type="bibr" rid="ref71">71</xref>];</p>
          <disp-quote>
            <p>I feel if a forum is viewable to the public, IE you don’t have to be a member to view any of the forum threads, then you or anyone else can use any of the information you find on any forum.</p>
            <attrib>Diabetic forum user [ 
            <xref ref-type="bibr" rid="ref57">57</xref>]</attrib>
          </disp-quote>
          <p>Twitter and Web-based open forums were seen as inherently public forums [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>]. In contrast, Facebook has explicit privacy control settings and was therefore viewed differently [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref64">64</xref>];</p>
          <disp-quote>
            <p>It all comes down to the fact that we know that we’re using Twitter and it’s public. I think I might honestly feel differently about that if it were Facebook, because I do feel like there is some degree of privacy in Facebook.</p>
            <attrib>Twitter user [ 
            <xref ref-type="bibr" rid="ref64">64</xref>]</attrib>
          </disp-quote>
          <p>iMessage and other messaging functions were viewed as private spaces with closed conversations [<xref ref-type="bibr" rid="ref58">58</xref>,<xref ref-type="bibr" rid="ref65">65</xref>];</p>
          <disp-quote>
            <p>A mailing list unlike a sidewalk has a membership list and only members are part of that list… the mailing list retains an identity as a PRIVATE forum. With that in mind, no individual or entity should be using it for research without explicit permission..</p>
            <attrib>List owner [ 
            <xref ref-type="bibr" rid="ref58">58</xref>]</attrib>
          </disp-quote>
          <p>Social media websites with a fun, social purpose are likely to contain much more “personal” content and were therefore viewed differently from websites with a professional aim such as LinkedIn [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          <p>Users were also more concerned about researchers accessing and using photos than written content because text could have been written by anyone—whereas it is more difficult to falsify photos [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This systematic review demonstrates the need to understand a complex array of interrelated and challenging factors with respect to ethical considerations in social media research. Diverse important issues and concerns remain to be addressed, but consensus proves difficult to achieve. Respondent views varied considerably from complete “animosity” to being “overly positive.” In between were attitudes of conditional acceptance (for instance social media research only to be undertaken if informed consent is gained or the site is public) and complete apathy. In addition, even views from the same respondent were conflicting with many being well aware of their contradictory views. The comprehensiveness of this review enables us to develop a broader view of the contrasting issues rather than being restricted to findings from a single study or single population that is not as transferable.</p>
        <p>The differing attitudes can partially be explained by the heterogeneity of respondents, their different understandings of social media research, and different methodologies used in each included study. In particular, Twitter users and the younger generation tended to be more accepting of social media research. Research using social media is a relatively new phenomenon. Some respondents had little understanding of social media research particularly in the earlier studies or were unaware of the range of examples. Social media users were more likely than researchers to evaluate the perceived benefit of the research and the validity of the research when considering the acceptance of social media research. Researchers, on the other hand, were also more likely than social media users to be concerned about risks to researchers themselves.</p>
        <p>There was general agreement on several issues. Whereas there was strong support for social media research that is for the “good” of society (and thus greater acceptance of university researchers)—this should not offer researchers carte blanche or an opportunity to ignore ethical principles. There are different definitions of “beneficial” research and some people could still be at risk of harm. Respondents acknowledged possible risks with these being more complex for such groups as, children, adolescents or vulnerable adults [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref72">72</xref>-<xref ref-type="bibr" rid="ref75">75</xref>] or for discussions on sensitive topics. Risks to social media group dynamics and freedom of expression have been highlighted in the literature [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref76">76</xref>] and this review demonstrates the strength of feeling about the importance of keeping safe and supportive environments for people to post on. The potential benefits, therefore, should still be weighed up against any potential harm. However, often researchers considered general principles such as “do no harm” as difficult to follow [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        <p>Respondents were much more likely to support the use of numerical aggregate data (such as overall statistics) than qualitative research involving quotes or interpretation of quotes. This view was almost unanimous [<xref ref-type="bibr" rid="ref40">40</xref>]. Respondents agreed overwhelmingly that the terms of service of social media platforms are infrequently read and should not be relied upon. This finding may be related to newsworthy cases where terms of service were relied upon. Over time much has been learnt through trial and error. As a consequence, platforms such as Twitter and Facebook have changed their terms of service with much tighter control over external research [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. However, this review does not suggest that users feel this is the best way forward.</p>
        <p>Respondents also thought that the conduct of social media research should not just obey the principles of the law (although there was little agreement as to what the law is) but also follow ethical principles and a moral obligation.</p>
        <p>Many issues encountered little agreement and conflicting attitudes. The boundaries between public availability and privacy were particularly complex. The public nature of social media has been used to support current practice, whereby a minority of studies apply for institutional ethics board or other approval and most studies do not mention ethical approval [<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref80">80</xref>]. Social media research, therefore, often involves a lack of informed or valid consent with group members often unaware that they are being monitored [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref80">80</xref>,<xref ref-type="bibr" rid="ref81">81</xref>]. Whereas some social media users seemed happy with this lack of consent, quoting the public nature of social media and the potential to self-regulate, others strongly opposed this on the grounds of privacy, original intent of the post, risks to users, and ownership of the data. These arguments are similarly rehearsed in the literature [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref78">78</xref>,<xref ref-type="bibr" rid="ref82">82</xref>-<xref ref-type="bibr" rid="ref86">86</xref>].</p>
        <p>Rooted within the concepts of risk to users are the issues of privacy and traceability or anonymity of the poster [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref71">71</xref>-<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref77">77</xref>,<xref ref-type="bibr" rid="ref81">81</xref>,<xref ref-type="bibr" rid="ref87">87</xref>-<xref ref-type="bibr" rid="ref93">93</xref>]. Whereas some respondents were happy for use of anonymous posts, others wanted to be cited (as is the case for published works). Both users and researchers displayed a lack of understanding of the difficulty in upholding anonymity [<xref ref-type="bibr" rid="ref80">80</xref>]. In 2006, deanonymization of social media users was carried out by journalists of the New York Times [<xref ref-type="bibr" rid="ref94">94</xref>], and in 2011 data aggregated and allegedly anonymized by researchers from Harvard were deanonymized [<xref ref-type="bibr" rid="ref83">83</xref>,<xref ref-type="bibr" rid="ref95">95</xref>]. Covert participation inside Web-based communities has also occasioned controversy [<xref ref-type="bibr" rid="ref96">96</xref>].</p>
        <p>Respondents lacked clarity with regard to informed consent, when it should be implemented, and how [<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. However, users agreed that it is unacceptable to use names and direct quotes without consent and that it is practically difficult to obtain informed consent. The issue of informed consent was highlighted in 2012 when Facebook manipulated users’ posts in an experiment to influence people’s mood. This caused much anger and dismay among users who were unaware they were part of any experiment [<xref ref-type="bibr" rid="ref97">97</xref>,<xref ref-type="bibr" rid="ref98">98</xref>]. The included studies in this review, however, did not examine the ethics of manipulation of sites and this needs separate consideration.</p>
        <p>Researchers may access content posted on the Web without interacting with the individuals who wrote the posts or even considering them “human subjects.” The “human subject” or “published author” debate, however, was little discussed in the included studies, yet, has important implications for ethical approval and is often debated in the literature [<xref ref-type="bibr" rid="ref70">70</xref>].</p>
        <p>The absence of an overarching consensus with regard to social media research ethics is apparent. Many complex ethical dilemmas persist [<xref ref-type="bibr" rid="ref73">73</xref>]. Whereas researchers have found it useful to read and understand ethical considerations faced by other researchers, they find it challenging to translate approaches used in another research context to their own particular research [<xref ref-type="bibr" rid="ref70">70</xref>]. Each research project, therefore, requires individual consideration of its ethical issues. Just as a blanket approach to the ethics of traditional research (such as surveys or focus groups) would prove unsuitable so, too, we should resist a “one rule fits all” to social media research. Researchers should consider the type of research (such as aggregate, qualitative); the nature of their topic (whether sensitive or trivial); as well as issues of anonymization, confidentiality, informed consent, privacy, and the benefits and risks involved. The ability to undertake Internet research may depend on the level of trust and confidence the public have in the research being undertaken when people choose to contribute to studies or make posts publically available [<xref ref-type="bibr" rid="ref77">77</xref>]. Koene [<xref ref-type="bibr" rid="ref77">77</xref>] considers a possible revolt with a call for a public backlash and boycott of Internet-mediated research. This review does not suggest that social media users feel as strongly as Koene [<xref ref-type="bibr" rid="ref77">77</xref>] suggests, but we should still be mindful of these issues.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Although the heterogeneity of included studies contributes strength to this review, this also makes it challenging to arrive at definitive conclusions. In particular, studies differed in their methodological approaches and by their presentation of results.</p>
        <p>Social media are constantly evolving and have changed considerably since the first of the included studies was undertaken in 2001. It would be interesting to uncover how people’s perception of the ethical issues in social media research have changed; however, unfortunately the sparsity and heterogeneity of studies made it challenging to reveal any time trends.</p>
        <p>Whereas additional non-database searches (such as citation searching and reference checking) were used in an attempt to overcome the difficulties in searching for this type of research, it is likely that some relevant studies remain unidentified. The review was also limited to papers in English or for which a translation could easily be obtained.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>It remains unlikely that a consensus on the ethical considerations on using social media research will ever be reached. Each Internet research project requires an individual assessment of its ethical issues and selection of the most appropriate methodological approach.</p>
        <p>Whereas the issues raised in this review suggest that ethical considerations in using social media for research are complex and require thoughtful consideration, this should not deter researchers from conducting social media research. Contributions from social media offer a more immediate time window than experiences documented in formally published qualitative research. This is because social media data can be analyzed immediately whereas published qualitative findings may take at least two years from data collection, through peer review and the wider editorial process, to publication. To a large degree such contributions may be unfiltered and unfettered and less subject to the influence of the researcher. They are less constrained by the temporal and spatial limitations encountered when planning and conducting qualitative research. However, social media contributions are public offerings largely written in the knowledge that they could be read by a wider audience. They offer a perspective that is often stripped, or at the very least, lacking a grounding in context and that may challenge representation and interpretation. Thus, we cannot afford to miss the considerable potential of social media research and its unique contribution to knowledge.</p>
        <p>Guidelines for ethical conduct should be based on the available best practices and standardized to avoid discrepancies and duplication from one institution to another. This methodological review is offered to initiate ongoing discussion within the research community of how such guidelines might be formulated. It highlights the importance of properly conducted social media research of benefit to the public. It also highlights the need to consider informed consent and privacy and researchers should not rely solely on regulation but have a moral and ethical duty to consider social media users and the main purpose of social media groups.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Sources searched.</p>
        <media xlink:href="jmir_v19i6e195_app1.pdf" xlink:title="PDF File (Adobe PDF File), 23KB"/>
      </app>
      <app id="app2">
        <title>Multimedia Appendix 2</title>
        <p>Embase search strategy.</p>
        <media xlink:href="jmir_v19i6e195_app2.pdf" xlink:title="PDF File (Adobe PDF File), 28KB"/>
      </app>
      <app id="app3">
        <title>Multimedia Appendix 3</title>
        <p>Excluded studies.</p>
        <media xlink:href="jmir_v19i6e195_app3.pdf" xlink:title="PDF File (Adobe PDF File), 86KB"/>
      </app>
      <app id="app4">
        <title>Multimedia Appendix 4</title>
        <p>Characteristics of included studies.</p>
        <media xlink:href="jmir_v19i6e195_app4.pdf" xlink:title="PDF File (Adobe PDF File), 67KB"/>
      </app>
      <app id="app5">
        <title>Multimedia Appendix 5</title>
        <p>Quality of reporting in included studies.</p>
        <media xlink:href="jmir_v19i6e195_app5.pdf" xlink:title="PDF File (Adobe PDF File), 32KB"/>
      </app>
      <app id="app6">
        <title>Multimedia Appendix 6</title>
        <p>Results matrix for studies by emerging themes.</p>
        <media xlink:href="jmir_v19i6e195_app6.pdf" xlink:title="PDF File (Adobe PDF File), 43KB"/>
      </app>
    </app-group>
    <ack>
      <p>This report is an independent research arising from a postdoctoral research fellowship, Su Golder (PDF-2014-07-041), supported by the National Institute for Health Research (NIHR). The views expressed in this publication are those of the authors and not necessarily those of the NHS, the National Institute for Health Research, or the Department of Health.</p>
      <p>The authors would like to thank Professor Yoon Loke, University of East Anglia, and Dr Darren Read, University of York for valuable discussion or comments on the paper. We would also like to thank Amy Hicks, MD, University of York for checking the interpretation of the results and reviewing the report.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>SG developed the study protocol, carried out the scientific literature search, screened the EndNote libraries, extracted and analyzed data, carried out the quality assessment, interpreted the results, and drafted the report. SH carried out the update searches, extracted the data, carried out the quality assessment, and reviewed the report. GN screened the search results, acted as third reviewer for disagreements on data extraction and quality assessment, and reviewed the report. AB gave substantive comments on all stages of the review from protocol to report.</p>
      </fn>
      <fn fn-type="conflict">
        <p>SG had support from the NIHR for the submitted work; SG, SH, and GN had no financial relationships with any organizations that might have an interest in the submitted work, and they had no other relationships or activities that could appear to have influenced the submitted work.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Obar</surname>
            <given-names>JA</given-names>
          </name>
          <name name-style="western">
            <surname>Wildman</surname>
            <given-names>SS</given-names>
          </name>
        </person-group>
        <source>SSRN Journal</source>  
        <access-date>2017-04-25</access-date>
        <comment>Social media definition and the governance challenge: an introduction to the special issue 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2647377">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2647377</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pz0vskJB"/></comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Wyatt</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Using the internet for surveys and health research</article-title>
        <source>J Med Internet Res</source>  
        <year>2002</year>  
        <month>11</month>  
        <volume>4</volume>  
        <issue>2</issue>  
        <fpage>e13</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2002/2/e13/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.4.2.e13</pub-id>
        <pub-id pub-id-type="medline">12554560</pub-id>
        <pub-id pub-id-type="pmcid">PMC1761932</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Toussi</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>De</surname>
            <given-names>MC</given-names>
          </name>
          <name name-style="western">
            <surname>Nadarajah</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Breckenridge</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Tracking of adverse drug reactions in social media: current status of requirements, best practices, methods and tools</article-title>
        <source>Pharmacoepidemiol Drug Saf</source>  
        <year>2014</year>  
        <volume>23</volume>  
        <fpage>206</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="medline">25483472</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sampathkumar</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Luo</surname>
            <given-names>B</given-names>
          </name>
        </person-group>
        <article-title>Mining adverse drug reactions from online healthcare forums using hidden Markov model</article-title>
        <source>BMC Med Inform Decis Mak</source>  
        <year>2014</year>  
        <volume>14</volume>  
        <fpage>91</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1472-6947/14/91"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1472-6947-14-91</pub-id>
        <pub-id pub-id-type="medline">25341686</pub-id>
        <pub-id pub-id-type="pii">1472-6947-14-91</pub-id>
        <pub-id pub-id-type="pmcid">PMC4283122</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pages</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Bondon-Guitton</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Montastruc</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Bagheri</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Adverse drug reactions related to oral chemotherapy drugs: patients' internet narratives vs Pharmacovigilance Database</article-title>
        <source>Fundam Clin Pharmacol</source>  
        <year>2014</year>  
        <volume>28</volume>  
        <fpage>52</fpage> </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Golder</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Norman</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Loke</surname>
            <given-names>YK</given-names>
          </name>
        </person-group>
        <article-title>Systematic review on the prevalence, frequency and comparative value of adverse events data in social media</article-title>
        <source>Br J Clin Pharmacol</source>  
        <year>2015</year>  
        <month>10</month>  
        <volume>80</volume>  
        <issue>4</issue>  
        <fpage>878</fpage>  
        <lpage>88</lpage>  
        <pub-id pub-id-type="doi">10.1111/bcp.12746</pub-id>
        <pub-id pub-id-type="medline">26271492</pub-id>
        <pub-id pub-id-type="pmcid">PMC4594731</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gesualdo</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Stilo</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Agricola</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Gonfiantini</surname>
            <given-names>MV</given-names>
          </name>
          <name name-style="western">
            <surname>Pandolfi</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Velardi</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Tozzi</surname>
            <given-names>AE</given-names>
          </name>
        </person-group>
        <article-title>Influenza-like illness surveillance on twitter through automated learning of naïve language</article-title>
        <source>PLoS One</source>  
        <year>2013</year>  
        <volume>8</volume>  
        <issue>12</issue>  
        <fpage>e82489</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0082489"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0082489</pub-id>
        <pub-id pub-id-type="medline">24324799</pub-id>
        <pub-id pub-id-type="pii">PONE-D-13-24070</pub-id>
        <pub-id pub-id-type="pmcid">PMC3853203</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Broniatowski</surname>
            <given-names>DA</given-names>
          </name>
          <name name-style="western">
            <surname>Paul</surname>
            <given-names>MJ</given-names>
          </name>
          <name name-style="western">
            <surname>Dredze</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>National and local influenza surveillance through twitter: an analysis of the 2012-2013 influenza epidemic</article-title>
        <source>PLoS One</source>  
        <year>2013</year>  
        <volume>8</volume>  
        <issue>12</issue>  
        <fpage>e83672</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0083672"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0083672</pub-id>
        <pub-id pub-id-type="medline">24349542</pub-id>
        <pub-id pub-id-type="pii">PONE-D-13-35058</pub-id>
        <pub-id pub-id-type="pmcid">PMC3857320</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Witteman</surname>
            <given-names>HO</given-names>
          </name>
          <name name-style="western">
            <surname>Zikmund-Fisher</surname>
            <given-names>BJ</given-names>
          </name>
        </person-group>
        <article-title>The defining characteristics of Web 2.0 and their potential influence in the online vaccination debate</article-title>
        <source>Vaccine</source>  
        <year>2012</year>  
        <month>05</month>  
        <day>28</day>  
        <volume>30</volume>  
        <issue>25</issue>  
        <fpage>3734</fpage>  
        <lpage>40</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.vaccine.2011.12.039</pub-id>
        <pub-id pub-id-type="medline">22178516</pub-id>
        <pub-id pub-id-type="pii">S0264-410X(11)01962-1</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Firestone</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Christley</surname>
            <given-names>RM</given-names>
          </name>
          <name name-style="western">
            <surname>Ward</surname>
            <given-names>MP</given-names>
          </name>
          <name name-style="western">
            <surname>Dhand</surname>
            <given-names>NK</given-names>
          </name>
        </person-group>
        <article-title>Adding the spatial dimension to the social network analysis of an epidemic: investigation of the 2007 outbreak of equine influenza in Australia</article-title>
        <source>Prev Vet Med</source>  
        <year>2012</year>  
        <month>09</month>  
        <day>15</day>  
        <volume>106</volume>  
        <issue>2</issue>  
        <fpage>123</fpage>  
        <lpage>35</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.prevetmed.2012.01.020</pub-id>
        <pub-id pub-id-type="medline">22365721</pub-id>
        <pub-id pub-id-type="pii">S0167-5877(12)00038-4</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Signorini</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Segre</surname>
            <given-names>AM</given-names>
          </name>
          <name name-style="western">
            <surname>Polgreen</surname>
            <given-names>PM</given-names>
          </name>
        </person-group>
        <article-title>The use of twitter to track levels of disease activity and public concern in the U.S. during the influenza A H1N1 pandemic</article-title>
        <source>PLoS One</source>  
        <year>2011</year>  
        <volume>6</volume>  
        <issue>5</issue>  
        <fpage>e19467</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pone.0019467"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pone.0019467</pub-id>
        <pub-id pub-id-type="medline">21573238</pub-id>
        <pub-id pub-id-type="pii">PONE-D-10-02464</pub-id>
        <pub-id pub-id-type="pmcid">PMC3087759</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Collier</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Son</surname>
            <given-names>NT</given-names>
          </name>
          <name name-style="western">
            <surname>Nguyen</surname>
            <given-names>NM</given-names>
          </name>
        </person-group>
        <article-title>OMG U got flu? analysis of shared health messages for bio-surveillance</article-title>
        <source>J Biomed Semantics</source>  
        <year>2011</year>  
        <volume>2 Suppl 5</volume>  
        <fpage>S9</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jbiomedsem.com/content/2%20Suppl%205//S9"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/2041-1480-2-S5-S9</pub-id>
        <pub-id pub-id-type="medline">22166368</pub-id>
        <pub-id pub-id-type="pii">2041-1480-2-S5-S9</pub-id>
        <pub-id pub-id-type="pmcid">PMC3239309</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Corley</surname>
            <given-names>CD</given-names>
          </name>
          <name name-style="western">
            <surname>Cook</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Mikler</surname>
            <given-names>AR</given-names>
          </name>
          <name name-style="western">
            <surname>Singh</surname>
            <given-names>KP</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Arabnia HR</surname>
            <given-names/>
          </name>
        </person-group>
        <article-title>Using web and social media for influenza surveillance</article-title>
        <source>Advances in computational biology</source>  
        <year>2010</year>  
        <publisher-loc>Berlin</publisher-loc>
        <publisher-name>Springer</publisher-name>
        <fpage>559</fpage>  
        <lpage>64</lpage> </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Martin</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Zhou</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Marshall</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Jia</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Fusheng</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>FrancoDixon</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>DeHaan</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Pfeiffer</surname>
            <given-names>DU</given-names>
          </name>
          <name name-style="western">
            <surname>Soares</surname>
            <given-names>MR</given-names>
          </name>
          <name name-style="western">
            <surname>Gilbert</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Risk-based surveillance for avian influenza control along poultry market chains in South China: the value of social network analysis</article-title>
        <source>Prev Vet Med</source>  
        <year>2011</year>  
        <month>12</month>  
        <day>01</day>  
        <volume>102</volume>  
        <issue>3</issue>  
        <fpage>196</fpage>  
        <lpage>205</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.prevetmed.2011.07.007</pub-id>
        <pub-id pub-id-type="medline">21925753</pub-id>
        <pub-id pub-id-type="pii">S0167-5877(11)00233-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Daniulaityte</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Carlson</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Falck</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Cameron</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Perera</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Sheth</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>“I just wanted to tell you that loperamide WILL WORK”: a web-based study of extra-medical use of loperamide</article-title>
        <source>Drug Alcohol Depend</source>  
        <year>2013</year>  
        <month>06</month>  
        <day>1</day>  
        <volume>130</volume>  
        <issue>1-3</issue>  
        <fpage>241</fpage>  
        <lpage>4</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23201175"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.drugalcdep.2012.11.003</pub-id>
        <pub-id pub-id-type="medline">23201175</pub-id>
        <pub-id pub-id-type="pii">S0376-8716(12)00429-2</pub-id>
        <pub-id pub-id-type="pmcid">PMC3633632</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>MacKridge</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Sampere</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Online discussion of pharmaceutical cognitive enhancement: a qualitative analysis</article-title>
        <source>Int J Pharm Pract</source>  
        <year>2012</year>  
        <volume>20</volume>  
        <fpage>30</fpage>  
        <lpage>1</lpage> </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jashinsky</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Burton</surname>
            <given-names>SH</given-names>
          </name>
          <name name-style="western">
            <surname>Hanson</surname>
            <given-names>CL</given-names>
          </name>
          <name name-style="western">
            <surname>West</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Giraud-Carrier</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Barnes</surname>
            <given-names>MD</given-names>
          </name>
          <name name-style="western">
            <surname>Argyle</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Tracking suicide risk factors through twitter in the US</article-title>
        <source>Crisis</source>  
        <year>2014</year>  
        <volume>35</volume>  
        <issue>1</issue>  
        <fpage>51</fpage>  
        <lpage>9</lpage>  
        <pub-id pub-id-type="doi">10.1027/0227-5910/a000234</pub-id>
        <pub-id pub-id-type="medline">24121153</pub-id>
        <pub-id pub-id-type="pii">334K5X21L0436430</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Goh</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Huang</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Monitoring youth depression risk in Web 2.0</article-title>
        <source>VINE</source>  
        <year>2009</year>  
        <month>08</month>  
        <day>28</day>  
        <volume>39</volume>  
        <issue>3</issue>  
        <fpage>192</fpage>  
        <lpage>202</lpage>  
        <pub-id pub-id-type="doi">10.1108/03055720911003969</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cox</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Anton</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Varenicline: evaluation of the utility of spontaneous consumer reports of suspected adverse effects filed on internet sites</article-title>
        <source>Drug Saf</source>  
        <year>2009</year>  
        <volume>32</volume>  
        <issue>10</issue>  
        <fpage>903</fpage>  
        <lpage>4</lpage> </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Young</surname>
            <given-names>AM</given-names>
          </name>
          <name name-style="western">
            <surname>DiClemente</surname>
            <given-names>RJ</given-names>
          </name>
          <name name-style="western">
            <surname>Halgin</surname>
            <given-names>DS</given-names>
          </name>
          <name name-style="western">
            <surname>Sterk</surname>
            <given-names>CE</given-names>
          </name>
          <name name-style="western">
            <surname>Havens</surname>
            <given-names>JR</given-names>
          </name>
        </person-group>
        <article-title>Drug users' willingness to encourage social, sexual, and drug network members to receive an HIV vaccine: a social network analysis</article-title>
        <source>AIDS Behav</source>  
        <year>2014</year>  
        <month>09</month>  
        <volume>18</volume>  
        <issue>9</issue>  
        <fpage>1753</fpage>  
        <lpage>63</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24849621"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s10461-014-0797-9</pub-id>
        <pub-id pub-id-type="medline">24849621</pub-id>
        <pub-id pub-id-type="pmcid">PMC4279243</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Penţa</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Băban</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Dangerous agent or saviour? HPV vaccine representations on online discussion forums in Romania</article-title>
        <source>Int J Behav Med</source>  
        <year>2014</year>  
        <month>02</month>  
        <volume>21</volume>  
        <issue>1</issue>  
        <fpage>20</fpage>  
        <lpage>8</lpage>  
        <pub-id pub-id-type="doi">10.1007/s12529-013-9340-z</pub-id>
        <pub-id pub-id-type="medline">24057409</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Coloma</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Becker</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Van</surname>
            <given-names>ME</given-names>
          </name>
          <name name-style="western">
            <surname>Kors</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Use of social media in pharmacovigilance: testing the waters</article-title>
        <source>Pharmacoepidemiol Drug Saf</source>  
        <year>2014</year>  
        <volume>23</volume>  
        <fpage>290</fpage> </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Larson</surname>
            <given-names>HJ</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>DM</given-names>
          </name>
          <name name-style="western">
            <surname>Paterson</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Cumming</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Eckersberger</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Freifeld</surname>
            <given-names>CC</given-names>
          </name>
          <name name-style="western">
            <surname>Ghinai</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Jarrett</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Paushter</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Brownstein</surname>
            <given-names>JS</given-names>
          </name>
          <name name-style="western">
            <surname>Madoff</surname>
            <given-names>LC</given-names>
          </name>
        </person-group>
        <article-title>Measuring vaccine confidence: analysis of data obtained by a media surveillance system used to analyse public concerns about vaccines</article-title>
        <source>Lancet Infect Dis</source>  
        <year>2013</year>  
        <month>07</month>  
        <volume>13</volume>  
        <issue>7</issue>  
        <fpage>606</fpage>  
        <lpage>13</lpage>  
        <pub-id pub-id-type="doi">10.1016/S1473-3099(13)70108-7</pub-id>
        <pub-id pub-id-type="medline">23676442</pub-id>
        <pub-id pub-id-type="pii">S1473-3099(13)70108-7</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Denecke</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Krieck</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Otrusina</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Smrz</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Dolog</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Nejdl</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Velasco</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>How to exploit twitter for public health monitoring?</article-title>
        <source>Methods Inf Med</source>  
        <year>2013</year>  
        <volume>52</volume>  
        <issue>4</issue>  
        <fpage>326</fpage>  
        <lpage>39</lpage>  
        <pub-id pub-id-type="doi">10.3414/ME12-02-0010</pub-id>
        <pub-id pub-id-type="medline">23877537</pub-id>
        <pub-id pub-id-type="pii">12-02-0010</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nicholson</surname>
            <given-names>MS</given-names>
          </name>
          <name name-style="western">
            <surname>Leask</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Lessons from an online debate about measles-mumps-rubella (MMR) immunization</article-title>
        <source>Vaccine</source>  
        <year>2012</year>  
        <month>05</month>  
        <day>28</day>  
        <volume>30</volume>  
        <issue>25</issue>  
        <fpage>3806</fpage>  
        <lpage>12</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.vaccine.2011.10.072</pub-id>
        <pub-id pub-id-type="medline">22063388</pub-id>
        <pub-id pub-id-type="pii">S0264-410X(11)01709-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Seeman</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Ing</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Rizo</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Assessing and responding in real time to online anti-vaccine sentiment during a flu pandemic</article-title>
        <source>Healthc Q</source>  
        <year>2010</year>  
        <volume>13</volume>  
        <fpage>8</fpage>  
        <lpage>15</lpage>  
        <pub-id pub-id-type="medline">20959725</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Keelan</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Pavri</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Balakrishnan</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Wilson</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>An analysis of the Human Papilloma Virus vaccine debate on MySpace blogs</article-title>
        <source>Vaccine</source>  
        <year>2010</year>  
        <month>02</month>  
        <day>10</day>  
        <volume>28</volume>  
        <issue>6</issue>  
        <fpage>1535</fpage>  
        <lpage>40</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.vaccine.2009.11.060</pub-id>
        <pub-id pub-id-type="medline">20003922</pub-id>
        <pub-id pub-id-type="pii">S0264-410X(09)01863-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Skea</surname>
            <given-names>ZC</given-names>
          </name>
          <name name-style="western">
            <surname>Entwistle</surname>
            <given-names>VA</given-names>
          </name>
          <name name-style="western">
            <surname>Watt</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Russell</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>'Avoiding harm to others' considerations in relation to parental measles, mumps and rubella (MMR) vaccination discussions - an analysis of an online chat forum</article-title>
        <source>Soc Sci Med</source>  
        <year>2008</year>  
        <month>11</month>  
        <volume>67</volume>  
        <issue>9</issue>  
        <fpage>1382</fpage>  
        <lpage>90</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.socscimed.2008.07.006</pub-id>
        <pub-id pub-id-type="medline">18703263</pub-id>
        <pub-id pub-id-type="pii">S0277-9536(08)00362-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Huesch</surname>
            <given-names>MD</given-names>
          </name>
          <name name-style="western">
            <surname>Currid-Halkett</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Doctor</surname>
            <given-names>JN</given-names>
          </name>
        </person-group>
        <article-title>Public hospital quality report awareness: evidence from National and Californian Internet searches and social media mentions, 2012</article-title>
        <source>BMJ Open</source>  
        <year>2014</year>  
        <month>03</month>  
        <day>11</day>  
        <volume>4</volume>  
        <issue>3</issue>  
        <fpage>e004417</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmjopen.bmj.com/cgi/pmidlookup?view=long&#38;pmid=24618223"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/bmjopen-2013-004417</pub-id>
        <pub-id pub-id-type="medline">24618223</pub-id>
        <pub-id pub-id-type="pii">bmjopen-2013-004417</pub-id>
        <pub-id pub-id-type="pmcid">PMC3963102</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Swirsky</surname>
            <given-names>ES</given-names>
          </name>
          <name name-style="western">
            <surname>Hoop</surname>
            <given-names>JG</given-names>
          </name>
          <name name-style="western">
            <surname>Labott</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Using social media in research: new ethics for a new meme?</article-title>
        <source>Am J Bioeth</source>  
        <year>2014</year>  
        <volume>14</volume>  
        <issue>10</issue>  
        <fpage>60</fpage>  
        <lpage>1</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25229594"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1080/15265161.2014.948302</pub-id>
        <pub-id pub-id-type="medline">25229594</pub-id>
        <pub-id pub-id-type="pmcid">PMC4169004</pub-id></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Flicker</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Haans</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Skinner</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Ethical dilemmas in research on Internet communities</article-title>
        <source>Qual Health Res</source>  
        <year>2004</year>  
        <month>01</month>  
        <volume>14</volume>  
        <issue>1</issue>  
        <fpage>124</fpage>  
        <lpage>34</lpage>  
        <pub-id pub-id-type="doi">10.1177/1049732303259842</pub-id>
        <pub-id pub-id-type="medline">14725180</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Elgesem</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>What is special about the ethical issues in online research?</article-title>
        <source>Ethics Inf Technol</source>  
        <year>2002</year>  
        <volume>4</volume>  
        <fpage>195</fpage>  
        <lpage>203</lpage>  
        <pub-id pub-id-type="medline">15977360</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Heilferty</surname>
            <given-names>CM</given-names>
          </name>
        </person-group>
        <article-title>Ethical considerations in the study of online illness narratives: a qualitative review</article-title>
        <source>J Adv Nurs</source>  
        <year>2011</year>  
        <month>05</month>  
        <volume>67</volume>  
        <issue>5</issue>  
        <fpage>945</fpage>  
        <lpage>53</lpage>  
        <pub-id pub-id-type="doi">10.1111/j.1365-2648.2010.05563.x</pub-id>
        <pub-id pub-id-type="medline">21231955</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Till</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in qualitative research on internet communities</article-title>
        <source>BMJ</source>  
        <year>2001</year>  
        <month>11</month>  
        <day>10</day>  
        <volume>323</volume>  
        <issue>7321</issue>  
        <fpage>1103</fpage>  
        <lpage>5</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/11701577"/>
        </comment>  
        <pub-id pub-id-type="medline">11701577</pub-id>
        <pub-id pub-id-type="pmcid">PMC59687</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Herron</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Sinclair</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Kernohan</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Stockdale</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in undertaking internet research of user-generated content: a review of the literature</article-title>
        <source>Evid Based Mid</source>  
        <year>2011</year>  
        <volume>9</volume>  
        <issue>1</issue>  
        <fpage>9</fpage>  
        <lpage>15</lpage> </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Whitehead</surname>
            <given-names>LC</given-names>
          </name>
        </person-group>
        <article-title>Methodological and ethical issues in Internet-mediated research in the field of health: an integrated review of the literature</article-title>
        <source>Soc Sci Med</source>  
        <year>2007</year>  
        <month>08</month>  
        <volume>65</volume>  
        <issue>4</issue>  
        <fpage>782</fpage>  
        <lpage>91</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.socscimed.2007.03.005</pub-id>
        <pub-id pub-id-type="medline">17512105</pub-id>
        <pub-id pub-id-type="pii">S0277-9536(07)00118-9</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Capurro</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Pingel</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues of online communication research</article-title>
        <source>Ethics Inf Technol</source>  
        <year>2002</year>  
        <volume>4</volume>  
        <fpage>189</fpage>  
        <lpage>94</lpage> </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Moreno</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Grant</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Kacvinsky</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Moreno</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Fleming</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Older adolescents' views regarding participation in facebook research</article-title>
        <source>J Adolesc Health</source>  
        <year>2012</year>  
        <month>11</month>  
        <volume>51</volume>  
        <issue>5</issue>  
        <fpage>439</fpage>  
        <lpage>44</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23084164"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.jadohealth.2012.02.001</pub-id>
        <pub-id pub-id-type="medline">23084164</pub-id>
        <pub-id pub-id-type="pii">S1054-139X(12)00054-7</pub-id>
        <pub-id pub-id-type="pmcid">PMC3478668</pub-id></nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Moreno</surname>
            <given-names>MA</given-names>
          </name>
          <name name-style="western">
            <surname>Goniu</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Moreno</surname>
            <given-names>PS</given-names>
          </name>
          <name name-style="western">
            <surname>Diekema</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Ethics of social media research: common concerns and practical considerations</article-title>
        <source>Cyberpsychol Behav Soc Netw</source>  
        <year>2013</year>  
        <month>09</month>  
        <volume>16</volume>  
        <issue>9</issue>  
        <fpage>708</fpage>  
        <lpage>13</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23679571"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1089/cyber.2012.0334</pub-id>
        <pub-id pub-id-type="medline">23679571</pub-id>
        <pub-id pub-id-type="pmcid">PMC3942703</pub-id></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Beninger</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Fry</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Jago</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Lepps</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Nass</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Silvester</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <source>NatCen</source>  
        <year>2014</year>  
        <access-date>2017-04-25</access-date>
        <comment>Research using social media; users’ views 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.natcen.ac.uk/media/282288/p0639-research-using-social-media-report-final-190214.pdf">http://www.natcen.ac.uk/media/282288/p0639-research-using-social-media-report-final-190214.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzSYOf6"/></comment> </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McKee</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in using social media for health and health care research</article-title>
        <source>Health Policy</source>  
        <year>2013</year>  
        <month>05</month>  
        <volume>110</volume>  
        <issue>2-3</issue>  
        <fpage>298</fpage>  
        <lpage>301</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.healthpol.2013.02.006</pub-id>
        <pub-id pub-id-type="medline">23477806</pub-id>
        <pub-id pub-id-type="pii">S0168-8510(13)00046-8</pub-id></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Salmons</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Woodfield</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>SRA</source>  
        <year>2013</year>  
        <access-date>2017-04-25</access-date>
        <publisher-loc>London</publisher-loc>
        <publisher-name>NatCen</publisher-name>
        <comment>Social media, social science &#38; research ethics 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://the-sra.org.uk/wp-content/uploads/salmons_woodfield.pdf">http://the-sra.org.uk/wp-content/uploads/salmons_woodfield.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzUiA2j"/></comment> </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Alim</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>An initial exploration of ethical research practices regarding automated data extraction from online social media user profiles</article-title>
        <source>First Monday</source>  
        <year>2014</year>  
        <volume>19</volume>  
        <issue>7</issue>  
        <fpage>105</fpage>  
        <lpage>27</lpage>  
        <pub-id pub-id-type="doi">10.5210/fm.v19i7.5382</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Markham</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Buchanan</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <source>AOIR</source>  
        <access-date>2017-04-25</access-date>
        <comment>Ethical Decision-Making and Internet Research: Recommendations from the AoIR Ethics Working Committee (Version 2.0) 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aoir.org/reports/ethics2.pdf">http://aoir.org/reports/ethics2.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzXJFZ0"/></comment> </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Im</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Chee</surname>
            <given-names>W</given-names>
          </name>
        </person-group>
        <article-title>Practical guidelines for qualitative research using online forums</article-title>
        <source>Comput Inform Nurs</source>  
        <year>2012</year>  
        <month>11</month>  
        <volume>30</volume>  
        <issue>11</issue>  
        <fpage>604</fpage>  
        <lpage>11</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22918135"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1097/NXN.0b013e318266cade</pub-id>
        <pub-id pub-id-type="medline">22918135</pub-id>
        <pub-id pub-id-type="pmcid">PMC3727223</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>British Psychological Society</collab>
        </person-group>
        <source>BPS</source>  
        <year>2013</year>  
        <access-date>2017-04-25</access-date>
        <publisher-loc>Leicester</publisher-loc>
        <comment>Ethics guidelines for internet-mediated research 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.bps.org.uk/system/files/Public%20files/inf206-guidelines-for-internet-mediated-research.pdf">http://www.bps.org.uk/system/files/Public%20files/inf206-guidelines-for-internet-mediated-research.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzZbMN2"/></comment> </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>Liberty University Institutional Review Board</collab>
        </person-group>
        <source>Liberty</source>  
        <year>2012</year>  
        <access-date>2017-04-25</access-date>
        <comment>Guidelines for internet research with human subjects 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.liberty.edu/media/9997/Internet_Research.pdf">https://www.liberty.edu/media/9997/Internet_Research.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzak1yy"/></comment> </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Townsend</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Wallace</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <source>Dotrural</source>  
        <year>2017</year>  
        <access-date>2017-05-03</access-date>
        <publisher-name>The University of Aberdeen</publisher-name>
        <comment>Social media research: a guide to ethics 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.dotrural.ac.uk/socialmediaresearchethics.pdf">http://www.dotrural.ac.uk/socialmediaresearchethics.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6qBEyf6S3"/></comment> </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <collab>The Norwegian National Research Ethics Committees</collab>
        </person-group>
        <source>Etikkom</source>  
        <year>2014</year>  
        <access-date>2017-04-25</access-date>
        <comment>Ethical guidelines for internet research 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.etikkom.no/en/ethical-guidelines-for-research/ethical-guidelines-for-internet-research/">https://www.etikkom.no/en/ethical-guidelines-for-research/ethical-guidelines-for-internet-research/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzdR0Xz"/></comment> </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Cooke</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Booth</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Beyond PICO: the SPIDER tool for qualitative evidence synthesis</article-title>
        <source>Qual Health Res</source>  
        <year>2012</year>  
        <month>10</month>  
        <volume>22</volume>  
        <issue>10</issue>  
        <fpage>1435</fpage>  
        <lpage>43</lpage>  
        <pub-id pub-id-type="doi">10.1177/1049732312452938</pub-id>
        <pub-id pub-id-type="medline">22829486</pub-id>
        <pub-id pub-id-type="pii">1049732312452938</pub-id></nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Carroll</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Booth</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Lloyd-Jones</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Should we exclude inadequately reported studies from qualitative systematic reviews? an evaluation of sensitivity analyses in two case study reviews</article-title>
        <source>Qual Health Res</source>  
        <year>2012</year>  
        <month>10</month>  
        <volume>22</volume>  
        <issue>10</issue>  
        <fpage>1425</fpage>  
        <lpage>34</lpage>  
        <pub-id pub-id-type="doi">10.1177/1049732312452937</pub-id>
        <pub-id pub-id-type="medline">22865107</pub-id>
        <pub-id pub-id-type="pii">1049732312452937</pub-id></nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Conway</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in using twitter for public health surveillance and research: developing a taxonomy of ethical concepts from the research literature</article-title>
        <source>J Med Internet Res</source>  
        <year>2014</year>  
        <volume>16</volume>  
        <issue>12</issue>  
        <fpage>e290</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/12/e290/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.3617</pub-id>
        <pub-id pub-id-type="medline">25533619</pub-id>
        <pub-id pub-id-type="pii">v16i12e290</pub-id>
        <pub-id pub-id-type="pmcid">PMC4285736</pub-id></nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dixon-Woods</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Using framework-based synthesis for conducting reviews of qualitative studies</article-title>
        <source>BMC Med</source>  
        <year>2011</year>  
        <month>04</month>  
        <day>14</day>  
        <volume>9</volume>  
        <fpage>39</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/1741-7015-9-39"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1741-7015-9-39</pub-id>
        <pub-id pub-id-type="medline">21492447</pub-id>
        <pub-id pub-id-type="pii">1741-7015-9-39</pub-id>
        <pub-id pub-id-type="pmcid">PMC3095548</pub-id></nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Thomas</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Harden</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Methods for the thematic synthesis of qualitative research in systematic reviews</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2008</year>  
        <volume>8</volume>  
        <fpage>45</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1471-2288/8/45"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1471-2288-8-45</pub-id>
        <pub-id pub-id-type="medline">18616818</pub-id>
        <pub-id pub-id-type="pii">1471-2288-8-45</pub-id>
        <pub-id pub-id-type="pmcid">PMC2478656</pub-id></nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Tong</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Flemming</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>McInnes</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Oliver</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Craig</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Enhancing transparency in reporting the synthesis of qualitative research: ENTREQ</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2012</year>  
        <volume>12</volume>  
        <fpage>181</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmcmedresmethodol.biomedcentral.com/articles/10.1186/1471-2288-12-181"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1471-2288-12-181</pub-id>
        <pub-id pub-id-type="medline">23185978</pub-id>
        <pub-id pub-id-type="pii">1471-2288-12-181</pub-id>
        <pub-id pub-id-type="pmcid">PMC3552766</pub-id></nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bakardjieva</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Feenberg</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Involving the virtual subject</article-title>
        <source>Ethics Inf Technol</source>  
        <year>2001</year>  
        <volume>2</volume>  
        <fpage>233</fpage>  
        <lpage>40</lpage> </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bond</surname>
            <given-names>CS</given-names>
          </name>
          <name name-style="western">
            <surname>Ahmed</surname>
            <given-names>OH</given-names>
          </name>
          <name name-style="western">
            <surname>Hind</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Thomas</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Hewitt-Taylor</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>The conceptual and practical ethical dilemmas of using health discussion board posts as research data</article-title>
        <source>J Med Internet Res</source>  
        <year>2013</year>  
        <volume>15</volume>  
        <issue>6</issue>  
        <fpage>e112</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/6/e112/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.2435</pub-id>
        <pub-id pub-id-type="medline">23748147</pub-id>
        <pub-id pub-id-type="pii">v15i6e112</pub-id>
        <pub-id pub-id-type="pmcid">PMC3713935</pub-id></nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Hall</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>MF</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>SS</given-names>
          </name>
          <name name-style="western">
            <surname>Hall</surname>
            <given-names>GJ</given-names>
          </name>
        </person-group>
        <article-title>Research paparazzi in cyberspace: the voices of the researched</article-title>
        <source>Online Social Research: Methods, Issues, and Ethics</source>  
        <year>2004</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Peter Lang</publisher-name>
        <fpage>157</fpage>  
        <lpage>75</lpage> </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Evans</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Ginnis</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Barlett</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>Ipsos</source>  
        <year>2015</year>  
        <access-date>2017-04-25</access-date>
        <comment>#SocialEthics a guide to embedding ethics in social media research 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.ipsos-mori.com/Assets/Docs/Publications/im-demos-social-ethics-in-social-media-research-summary.pdf">https://www.ipsos-mori.com/Assets/Docs/Publications/im-demos-social-ethics-in-social-media-research-summary.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pyzmUaiL"/></comment> </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hudson</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Bruckman</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>'Go Away': participant objections to being studied and the ethics of chatroom research</article-title>
        <source>Inform Soc</source>  
        <year>2004</year>  
        <volume>20</volume>  
        <fpage>127</fpage>  
        <lpage>39</lpage> </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hudson</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Bruckman</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Using empirical data to reason about internet research ethics</article-title>
        <year>2005</year>  
        <conf-name>ECSCW : Proceedings of the Ninth European Conference on Computer-Supported Cooperative Work</conf-name>
        <conf-date>2005</conf-date>
        <conf-loc>Paris, France</conf-loc>
        <fpage>287</fpage>  
        <lpage>306</lpage>  
        <pub-id pub-id-type="doi">10.1007/1-4020-4023-7_15</pub-id></nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Michaelidou</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <source>Lboro</source>  
        <year>2016</year>  
        <access-date>2017-04-25</access-date>
        <comment>Social media as a means of collecting information 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.lboro.ac.uk/departments/sbe/inspire-08/ethicality-social-media/">http://www.lboro.ac.uk/departments/sbe/inspire-08/ethicality-social-media/</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pzYu07tb"/></comment> </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Michaelidou</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Moraes</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Micevski</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>A scale for measuring consumers? ethical perceptions of social media research</article-title>
        <source>Let’s Get Engaged! Crossing the Threshold of Marketing’s Engagement Era</source>  
        <year>2016</year>  
        <publisher-loc>Cham</publisher-loc>
        <publisher-name>Springer</publisher-name>
        <fpage>97</fpage>  
        <lpage>100</lpage> </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mikal</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Hurst</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Conway</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in using twitter for population-level depression monitoring: a qualitative study</article-title>
        <source>BMC Med Ethics</source>  
        <year>2016</year>  
        <month>04</month>  
        <day>14</day>  
        <volume>17</volume>  
        <fpage>22</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-016-0105-5"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/s12910-016-0105-5</pub-id>
        <pub-id pub-id-type="medline">27080238</pub-id>
        <pub-id pub-id-type="pii">10.1186/s12910-016-0105-5</pub-id>
        <pub-id pub-id-type="pmcid">PMC4832544</pub-id></nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Monks</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Cardoso</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Papageorgiou</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Carolan</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Costello</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Thomas</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Young people's views regarding participation in mental health and wellbeing research through social media</article-title>
        <source>Int J Emot Educ</source>  
        <year>2015</year>  
        <volume>7</volume>  
        <issue>1</issue>  
        <fpage>4</fpage>  
        <lpage>19</lpage> </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Petersen</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Permission, privacy are key concerns in internet research</article-title>
        <source>BMJ</source>  
        <year>2003</year>  
        <volume>323</volume>  
        <fpage>1103</fpage> </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>M</given-names>
          </name>
          <collab>editor</collab>
        </person-group>
        <source>Socialdatalab</source>  
        <year>2015</year>  
        <access-date>2017-04-25</access-date>
        <comment>Towards an ethical framework for using social media data in social research 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://socialdatalab.net/wp-content/uploads/2016/08/EthicsSM-SRA-Workshop.pdf">http://socialdatalab.net/wp-content/uploads/2016/08/EthicsSM-SRA-Workshop.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pzZ9S8zP"/></comment> </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Carter</surname>
            <given-names>CJ</given-names>
          </name>
          <name name-style="western">
            <surname>Koene</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Perez</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Statache</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Adolphs</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>O'Malley</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Understanding academic attitudes towards the ethical challenges posed by social media research</article-title>
        <year>2015</year>  
        <conf-name>ACM SIGCAS Computers and Society - Special Issue on Ethicomp</conf-name>
        <conf-date>September 2015</conf-date>
        <conf-loc>New York</conf-loc>
        <fpage>202</fpage>  
        <lpage>10</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dl.acm.org/citation.cfm?id=2874268"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Denecke</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Ethical aspects of using medical social media in healthcare applications</article-title>
        <source>Stud Health Technol Inform</source>  
        <year>2014</year>  
        <volume>198</volume>  
        <fpage>55</fpage>  
        <lpage>62</lpage>  
        <pub-id pub-id-type="medline">24825685</pub-id></nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McKee</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Porter</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>The ethics of internet research: a rhetoical, case-based process</source>  
        <year>2009</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Peter Lang Publishing</publisher-name></nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Woodfield</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Morrell</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Metzler</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Blank</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Salmons</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Finnegan</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>NCRM</source>  
        <year>2013</year>  
        <access-date>2017-04-25</access-date>
        <publisher-loc>Southampton</publisher-loc>
        <publisher-name>National Centre for Research Methods</publisher-name>
        <comment>Blurring the boundaries? new social media, new social research: developing a network to explore the issues faced by researchers negotiating the new research landscape of online social media platforms: a methodological review paper 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://eprints.ncrm.ac.uk/3168/1/blurring_boundaries.pdf">http://eprints.ncrm.ac.uk/3168/1/blurring_boundaries.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pzZlVwdw"/></comment> </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Brownlow</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>O'Dell</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues for qualitative research in on-line communities</article-title>
        <source>Disabil Soc</source>  
        <year>2002</year>  
        <volume>17</volume>  
        <issue>6</issue>  
        <fpage>685</fpage>  
        <lpage>94</lpage> </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Henderson</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Johnson</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Auld</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Silences of ethical practice: dilemmas for researchers using social media</article-title>
        <source>Educ Res Eval</source>  
        <year>2013</year>  
        <volume>19</volume>  
        <issue>6</issue>  
        <fpage>546</fpage>  
        <lpage>60</lpage> </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Trevisan</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Reilly</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Ethical dilemmas in researching sensitive issues online: lessons from the study of British disability dissent networks</article-title>
        <source>Inform Commun Soc</source>  
        <year>2013</year>  
        <volume>17</volume>  
        <issue>9</issue>  
        <fpage>1131</fpage>  
        <lpage>46</lpage> </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Battles</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Exploring ethical and methodological issues in internet-based research with adolescents</article-title>
        <source>Int J Qual Methods</source>  
        <year>2010</year>  
        <volume>9</volume>  
        <issue>1</issue>  
        <fpage>27</fpage>  
        <lpage>39</lpage> </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>King</surname>
            <given-names>SA</given-names>
          </name>
        </person-group>
        <article-title>Researching internet communities: proposed ethical guidelines for the reporting of results</article-title>
        <source>Inform Soc</source>  
        <year>1996</year>  
        <volume>12</volume>  
        <issue>2</issue>  
        <fpage>119</fpage>  
        <lpage>28</lpage> </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Koene</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Perez</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Carter</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Statache</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Adolphs</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>O?Malley</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Research ethics and public trust, preconditions for continued growth of internet mediated research</article-title>
        <year>2015</year>  
        <conf-name>ICISSP 2015-1st International Conference on Information Systems Security and Privacy</conf-name>
        <conf-date>2015</conf-date>
        <conf-loc>Anglers, France</conf-loc>
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://casma.wp.horizon.ac.uk/wp-content/uploads/2015/02/ICISSP_2015_60_CaSMa.pdf"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gustafson</surname>
            <given-names>DL</given-names>
          </name>
          <name name-style="western">
            <surname>Woodworth</surname>
            <given-names>CF</given-names>
          </name>
        </person-group>
        <article-title>Methodological and ethical issues in research using social media: a metamethod of Human Papillomavirus vaccine studies</article-title>
        <source>BMC Med Res Methodol</source>  
        <year>2014</year>  
        <volume>14</volume>  
        <fpage>127</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://bmcmedresmethodol.biomedcentral.com/articles/10.1186/1471-2288-14-127"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1186/1471-2288-14-127</pub-id>
        <pub-id pub-id-type="medline">25468265</pub-id>
        <pub-id pub-id-type="pii">1471-2288-14-127</pub-id>
        <pub-id pub-id-type="pmcid">PMC4265425</pub-id></nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zimmer</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Proferes</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>A topology of Twitter research: disciplines, methods, and ethics</article-title>
        <source>Aslib Journal of Information Management</source>  
        <year>2014</year>  
        <volume>66</volume>  
        <issue>3</issue>  
        <fpage>250</fpage>  
        <lpage>61</lpage> </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dawson</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Our anonymous online research participants are not always anonymous: is this a problem?</article-title>
        <source>Br J Educ Technol</source>  
        <year>2014</year>  
        <volume>45</volume>  
        <issue>3</issue>  
        <fpage>428</fpage>  
        <lpage>37</lpage> </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Barnes</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Johns</surname>
            <given-names>MD</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>SS</given-names>
          </name>
          <name name-style="western">
            <surname>Hall</surname>
            <given-names>GJ</given-names>
          </name>
        </person-group>
        <article-title>Issues of attributionidentification in online social research</article-title>
        <source>Online Social Research: Methods, Issues, and Ethics</source>  
        <year>2004</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Peter Lang</publisher-name>
        <fpage>203</fpage>  
        <lpage>22</lpage> </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schrum</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Ethical research in the information age: Beginning the dialog</article-title>
        <source>Comput Human Behav</source>  
        <year>1997</year>  
        <month>5</month>  
        <volume>13</volume>  
        <issue>2</issue>  
        <fpage>117</fpage>  
        <lpage>25</lpage>  
        <pub-id pub-id-type="doi">10.1016/s0747-5632(97)80001-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Zimmer</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>“But the data is already public”: on the ethics of research in Facebook</article-title>
        <source>Ethics Inform Technol</source>  
        <year>2010</year>  
        <volume>12</volume>  
        <issue>4</issue>  
        <fpage>313</fpage>  
        <lpage>25</lpage> </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Stevens</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>O'Donnell</surname>
            <given-names>VL</given-names>
          </name>
          <name name-style="western">
            <surname>Williams</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Public domain or private data? developing an ethical approach to social media research in an inter-disciplinary project</article-title>
        <source>Educ Res Eval</source>  
        <year>2015</year>  
        <volume>21</volume>  
        <issue>2</issue>  
        <fpage>154</fpage>  
        <lpage>67</lpage> </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Taylor</surname>
            <given-names>HA</given-names>
          </name>
          <name name-style="western">
            <surname>Kuwana</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Wilfond</surname>
            <given-names>BS</given-names>
          </name>
        </person-group>
        <article-title>Ethical implications of social media in health care research</article-title>
        <source>Am J Bioeth</source>  
        <year>2014</year>  
        <volume>14</volume>  
        <issue>10</issue>  
        <fpage>58</fpage>  
        <lpage>9</lpage>  
        <pub-id pub-id-type="doi">10.1080/15265161.2014.947820</pub-id>
        <pub-id pub-id-type="medline">25229593</pub-id></nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Boyd</surname>
            <given-names>DC</given-names>
          </name>
        </person-group>
        <article-title>Critical questions for big data</article-title>
        <source>Information, Communication &#38; Society</source>  
        <year>2012</year>  
        <volume>15</volume>  
        <issue>5</issue>  
        <fpage>662</fpage>  
        <lpage>79</lpage> </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>DeCamp</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues when using social media for health outside professional relationships</article-title>
        <source>Int Rev Psychiatry</source>  
        <year>2015</year>  
        <month>04</month>  
        <volume>27</volume>  
        <issue>2</issue>  
        <fpage>97</fpage>  
        <lpage>105</lpage>  
        <pub-id pub-id-type="doi">10.3109/09540261.2014.1001726</pub-id>
        <pub-id pub-id-type="medline">25738215</pub-id></nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eastham</surname>
            <given-names>LA</given-names>
          </name>
        </person-group>
        <article-title>Research using blogs for data: public documents or private musings?</article-title>
        <source>Res Nurs Health</source>  
        <year>2011</year>  
        <month>08</month>  
        <volume>34</volume>  
        <issue>4</issue>  
        <fpage>353</fpage>  
        <lpage>61</lpage>  
        <pub-id pub-id-type="doi">10.1002/nur.20443</pub-id>
        <pub-id pub-id-type="medline">21626517</pub-id></nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>McKee</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in using social media for health and health care research</article-title>
        <source>Health Policy</source>  
        <year>2013</year>  
        <month>05</month>  
        <volume>110</volume>  
        <issue>2-3</issue>  
        <fpage>298</fpage>  
        <lpage>301</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.healthpol.2013.02.006</pub-id>
        <pub-id pub-id-type="medline">23477806</pub-id>
        <pub-id pub-id-type="pii">S0168-8510(13)00046-8</pub-id></nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hopewell-Kelly</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Baillie</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Sivell</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Harrop</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Bowyer</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Taylor</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Thomas</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Newman</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Prout</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Byrne</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Taubert</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Nelson</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Palliative care research centre's move into social media: constructing a framework for ethical research, a consensus paper</article-title>
        <source>BMJ Support Palliat Care</source>  
        <year>2016</year>  
        <month>01</month>  
        <day>28</day>  
        <fpage>28</fpage>  
        <pub-id pub-id-type="doi">10.1136/bmjspcare-2015-000889</pub-id>
        <pub-id pub-id-type="medline">26823291</pub-id>
        <pub-id pub-id-type="pii">bmjspcare-2015-000889</pub-id></nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="web">
        <source>Information Commissioner's Office</source>  
        <year>2014</year>  
        <access-date>2017-04-25</access-date>
        <comment>Big data and data protection 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://ico.org.uk/media/for-organisations/documents/1541/big-data-and-data-protection.pdf">https://ico.org.uk/media/for-organisations/documents/1541/big-data-and-data-protection.pdf</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pzakfnqX"/></comment> </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Roberts</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <article-title>Ethical issues in conducting qualitative research in online communities</article-title>
        <source>Qual Res Psychol</source>  
        <year>2015</year>  
        <volume>12</volume>  
        <issue>3</issue>  
        <fpage>314</fpage>  
        <lpage>25</lpage> </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Convery</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Cox</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>A review of research ethics in internet-based research</article-title>
        <source>Practitioner Research in Higher Education</source>  
        <year>2012</year>  
        <volume>6</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://194.81.189.19/ojs/index.php/prhe/article/view/100"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Barbaro</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Zeller</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>A face is exposed for AOL searcher no. 4417749</article-title>
        <source>New York Times</source>  
        <year>2006</year>  
        <fpage>9</fpage> </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Parry</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Harvard researchers accused of breaching students' privacy</article-title>
        <source>The Chronicle of Higher Education</source>  
        <year>2011</year>  
        <month>07</month>  
        <fpage>10</fpage> </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Brotsky</surname>
            <given-names>SR</given-names>
          </name>
          <name name-style="western">
            <surname>Giles</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Inside the “pro-ana” community: a covert online participant observation</article-title>
        <source>Eat Disord</source>  
        <year>2007</year>  
        <volume>15</volume>  
        <issue>2</issue>  
        <fpage>93</fpage>  
        <lpage>109</lpage>  
        <pub-id pub-id-type="doi">10.1080/10640260701190600</pub-id>
        <pub-id pub-id-type="medline">17454069</pub-id>
        <pub-id pub-id-type="pii">777443878</pub-id></nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="web">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Booth</surname>
            <given-names>R</given-names>
          </name>
        </person-group>
        <source>The Guardian</source>  
        <year>2014</year>  
        <access-date>2017-04-25</access-date>
        <comment>Facebook reveals news feed experiment to control emotions 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://www.theguardian.com/technology/2014/jun/29/facebook-users-emotions-news-feeds">https://www.theguardian.com/technology/2014/jun/29/facebook-users-emotions-news-feeds</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6pz0eBj8o"/></comment> </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kleinsman</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Buckley</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Facebook study: a little bit unethical but worth it?</article-title>
        <source>J Bioeth Inq</source>  
        <year>2015</year>  
        <month>06</month>  
        <volume>12</volume>  
        <issue>2</issue>  
        <fpage>179</fpage>  
        <lpage>82</lpage>  
        <pub-id pub-id-type="doi">10.1007/s11673-015-9621-0</pub-id>
        <pub-id pub-id-type="medline">25740760</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
