Skip to main content
Top

2021 | OriginalPaper | Chapter

22. The Ethics of Web Crawling and Web Scraping in Cybercrime Research: Navigating Issues of Consent, Privacy, and Other Potential Harms Associated with Automated Data Collection

Authors : Russell Brewer, Bryce Westlake, Tahlia Hart, Omar Arauza

Published in: Researching Cybercrimes

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The abundance of data easily accessible on the internet has made it an appealing domain for conducting social science research. Because of the volume of data available, automated collection software, such as web crawlers and web scrapers, are increasingly being deployed. Ethical guidelines that have developed over the decades, however, are not always directly applicable to online research. As a result, there can be ambiguity as to when and how informed consent needs to be obtained, how privacy can be protected, and what potential harms websites, their owners, and even researchers could experience, and how to address them. In this chapter, we argue that automated data collection practices need not be unethical, provided special care is taken by researchers to acknowledge and explicitly address the complexities surrounding informed consent, privacy, and a myriad of other risks and potential harms (to subjects, websites, and researchers).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abbass, Z., Ali, Z., Ali, M., Akbar, B., & Saleem, A. (2020). A framework to predict social crime through Twitter tweets by using machine learning. 2020 IEEE 14th International Conference on Semantic Computing (ICSC), 363–368. Abbass, Z., Ali, Z., Ali, M., Akbar, B., & Saleem, A. (2020). A framework to predict social crime through Twitter tweets by using machine learning. 2020 IEEE 14th International Conference on Semantic Computing (ICSC), 363–368.
go back to reference Alim, S. (2013). Automated data extraction from online social network profiles: Unique ethical challenges for researchers. International Journal of Virtual Communities and Social Networking (IJVCSN),5(4), 24–42.CrossRef Alim, S. (2013). Automated data extraction from online social network profiles: Unique ethical challenges for researchers. International Journal of Virtual Communities and Social Networking (IJVCSN),5(4), 24–42.CrossRef
go back to reference Alim, S. (2014). An initial exploration of ethical research practices regarding automated data extraction from online social media user profiles. First Monday, 19(7). Alim, S. (2014). An initial exploration of ethical research practices regarding automated data extraction from online social media user profiles. First Monday, 19(7).
go back to reference Askitas, N., & Zimmermann, K. F. (2015). The Internet as a data source for advancement in social sciences. International Journal of Manpower,36(1), 2–12.CrossRef Askitas, N., & Zimmermann, K. F. (2015). The Internet as a data source for advancement in social sciences. International Journal of Manpower,36(1), 2–12.CrossRef
go back to reference Barrera, V., Malm, A., Décary-Hétu, D., & Munksgaard, R. (2019). Size and scope of the tobacco trade on the darkweb. Global Crime,20(1), 26–44.CrossRef Barrera, V., Malm, A., Décary-Hétu, D., & Munksgaard, R. (2019). Size and scope of the tobacco trade on the darkweb. Global Crime,20(1), 26–44.CrossRef
go back to reference Bent-Goodley, T. B. (2007). Teaching social work students to resolve ethical dilemmas in domestic violence. Journal of Teaching in Social Work,27(1–2), 73–88.CrossRef Bent-Goodley, T. B. (2007). Teaching social work students to resolve ethical dilemmas in domestic violence. Journal of Teaching in Social Work,27(1–2), 73–88.CrossRef
go back to reference Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In V. Mago & V. Dabbaghian (Eds.), Computational models of complex systems (pp. 171–184). Springer. Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In V. Mago & V. Dabbaghian (Eds.), Computational models of complex systems (pp. 171–184). Springer.
go back to reference Bouwman, H., de Reuver, M., Heerschap, N., & Verkasalo, H. (2013). Opportunities and problems with automated data collection via smartphones. Mobile Media & Communication,1(1), 63–68.CrossRef Bouwman, H., de Reuver, M., Heerschap, N., & Verkasalo, H. (2013). Opportunities and problems with automated data collection via smartphones. Mobile Media & Communication,1(1), 63–68.CrossRef
go back to reference Bulakh, V., & Gupta, M. (2015). Characterizing credit card black markets on the web. Proceedings of the 24th International Conference on World Wide Web, 1435–1440. Bulakh, V., & Gupta, M. (2015). Characterizing credit card black markets on the web. Proceedings of the 24th International Conference on World Wide Web, 1435–1440.
go back to reference Broadhurst, R., Ball, M., & Jiang, C. (2020). Availability of COVID-19 related products on Tor darknet markets. Statistical Bulletin, no. 24. Canberra: Australian Institute of Criminology. Broadhurst, R., Ball, M., & Jiang, C. (2020). Availability of COVID-19 related products on Tor darknet markets. Statistical Bulletin, no. 24. Canberra: Australian Institute of Criminology.
go back to reference Broadhurst, R., Ball, M., & Trivedi, H. (2020). Fentanyl availability on darknet markets. Trends & issues in crime and criminal justice, no. 590. Canberra: Australian Institute of Criminology. Broadhurst, R., Ball, M., & Trivedi, H. (2020). Fentanyl availability on darknet markets. Trends & issues in crime and criminal justice, no. 590. Canberra: Australian Institute of Criminology.
go back to reference Broadhurst, R., Lord, D., Maxim, D., Woodford-Smith, H., Johnston, C., Chung, H.W., et al. (2018). Malware trends on Darknet crypto-markets: Research review. ANU Cybercrime Observatory. Canberra. Broadhurst, R., Lord, D., Maxim, D., Woodford-Smith, H., Johnston, C., Chung, H.W., et al. (2018). Malware trends on Darknet crypto-markets: Research review. ANU Cybercrime Observatory. Canberra.
go back to reference Calvey, D. (2013). Covert ethnography in criminology: A submerged yet creative tradition. Current Issues in Criminal Justice,25(1), 541–550.CrossRef Calvey, D. (2013). Covert ethnography in criminology: A submerged yet creative tradition. Current Issues in Criminal Justice,25(1), 541–550.CrossRef
go back to reference Capriello, A., & Rossi, P. (2013). Spidering scripts for opinion monitoring. In H. Rahman & I. Ramos (Eds.), Ethical data mining applications for socio-economic development. IGI Global. Capriello, A., & Rossi, P. (2013). Spidering scripts for opinion monitoring. In H. Rahman & I. Ramos (Eds.), Ethical data mining applications for socio-economic development. IGI Global.
go back to reference Chang, L. Y. C. (2018). Internet vigilantism co-production of security and compliance in the digital age. In Brewer R. (Ed.), criminal justice and regulation revisited: Essays in honour of Peter Grabosky. Routledge. Chang, L. Y. C. (2018). Internet vigilantism co-production of security and compliance in the digital age. In Brewer R. (Ed.), criminal justice and regulation revisited: Essays in honour of Peter Grabosky. Routledge.
go back to reference Chiauzzi, E., & Wicks, P. (2019). Digital trespass: Ethical and terms-of-use violations by researchers accessing data from an online patient community. Journal of Medical Internet Research, 21(2). Chiauzzi, E., & Wicks, P. (2019). Digital trespass: Ethical and terms-of-use violations by researchers accessing data from an online patient community. Journal of Medical Internet Research, 21(2).
go back to reference Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 213–224. Christin, N. (2013). Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. Proceedings of the 22nd International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 213–224.
go back to reference Crosignani, M., Macchiavelli, M., & Silva, A. F. (2020). Pirates without borders: The propagation of cyberattacks through firms’ supply chains. SSRN Electronic Journal. Crosignani, M., Macchiavelli, M., & Silva, A. F. (2020). Pirates without borders: The propagation of cyberattacks through firms’ supply chains. SSRN Electronic Journal.
go back to reference Cunliffe, J., Martin, J., Décary-Hétu, D., & Aldridge, J. (2017). An island apart? Risks and prices in the Australian cryptomarket drug trade. The International Journal of Drug Policy,50, 64–73.CrossRef Cunliffe, J., Martin, J., Décary-Hétu, D., & Aldridge, J. (2017). An island apart? Risks and prices in the Australian cryptomarket drug trade. The International Journal of Drug Policy,50, 64–73.CrossRef
go back to reference Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime,2(2), 122–141. Décary-Hétu, D., & Aldridge, J. (2015). Sifting through the net: Monitoring of online offenders by researchers. European Review of Organised Crime,2(2), 122–141.
go back to reference Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime,14(2–3), 175–196.CrossRef Décary-Hétu, D., & Dupont, B. (2013). Reputation in a dark network of online criminals. Global Crime,14(2–3), 175–196.CrossRef
go back to reference Décary-Hétu, D., & Quessy-Doré, O. (2017). Are repeat buyers in cryptomarkets loyal customers? Repeat business between dyads of cryptomarket vendors and users. American Behavioral Scientist,61(11), 1341–1357.CrossRef Décary-Hétu, D., & Quessy-Doré, O. (2017). Are repeat buyers in cryptomarkets loyal customers? Repeat business between dyads of cryptomarket vendors and users. American Behavioral Scientist,61(11), 1341–1357.CrossRef
go back to reference Décary-Hétu, D., Dupont, B., & Fortin, F. (2014). Policing the hackers by hacking them: Studying online deviants in irc chat rooms. In A. J. Masys (Ed.), Networks and network analysis for defence and security. Springer. Décary-Hétu, D., Dupont, B., & Fortin, F. (2014). Policing the hackers by hacking them: Studying online deviants in irc chat rooms. In A. J. Masys (Ed.), Networks and network analysis for defence and security. Springer.
go back to reference Demant, J., Munksgaard, R., & Houborg, E. (2018). Personal use, social supply or redistribution? Cryptomarket demand on Silk Road 2 and Agora. Trends in Organized Crime,21(1), 42–61.CrossRef Demant, J., Munksgaard, R., & Houborg, E. (2018). Personal use, social supply or redistribution? Cryptomarket demand on Silk Road 2 and Agora. Trends in Organized Crime,21(1), 42–61.CrossRef
go back to reference Demant, J., Munksgaard, R., Décary-Hétu, D., & Aldridge, J. (2018). Going local on a global platform: A critical analysis of the transformative potential of cryptomarkets for organized illicit drug crime. International Criminal Justice Review,28(3), 255–274.CrossRef Demant, J., Munksgaard, R., Décary-Hétu, D., & Aldridge, J. (2018). Going local on a global platform: A critical analysis of the transformative potential of cryptomarkets for organized illicit drug crime. International Criminal Justice Review,28(3), 255–274.CrossRef
go back to reference Fournier, R., Cholez, T., Latapy, M., Chrisment, I., Magnien, C., Festor, O., & Daniloff, I. (2014). Comparing pedophile activity in different P2P systems. Social Sciences,3(3), 314–325.CrossRef Fournier, R., Cholez, T., Latapy, M., Chrisment, I., Magnien, C., Festor, O., & Daniloff, I. (2014). Comparing pedophile activity in different P2P systems. Social Sciences,3(3), 314–325.CrossRef
go back to reference Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. In M. A. Tayebi., U. Glässer, & D. B. Skillicorn (Eds.), Open source intelligence and cyber crime. Springer. Frank, R., & Mikhaylov, A. (2020). Beyond the ‘Silk Road’: Assessing illicit drug marketplaces on the public web. In M. A. Tayebi., U. Glässer, & D. B. Skillicorn (Eds.), Open source intelligence and cyber crime. Springer.
go back to reference Freelon, D. (2018). Computational research in the post-API Age. Political Communication,35(4), 665–668.CrossRef Freelon, D. (2018). Computational research in the post-API Age. Political Communication,35(4), 665–668.CrossRef
go back to reference García-Retuerta, D., Bartolomé, Á., Chamoso, P., & Corchado, J. M. (2019). Counter-terrorism video analysis using hash-based algorithms. Algorithms, 12(5). García-Retuerta, D., Bartolomé, Á., Chamoso, P., & Corchado, J. M. (2019). Counter-terrorism video analysis using hash-based algorithms. Algorithms, 12(5).
go back to reference Gata, W., & Bayhaqy, A. (2020). Analysis sentiment about islamophobia when Christchurch attack on social media. Telkomnika,18(4), 1819–1827.CrossRef Gata, W., & Bayhaqy, A. (2020). Analysis sentiment about islamophobia when Christchurch attack on social media. Telkomnika,18(4), 1819–1827.CrossRef
go back to reference Giles, C., Sun, Y., & Councill, I. (2010). Measuring the web crawler ethics. Proceedings of the 19th International Conference on World Wide Web, 1101–1102. Giles, C., Sun, Y., & Councill, I. (2010). Measuring the web crawler ethics. Proceedings of the 19th International Conference on World Wide Web, 1101–1102.
go back to reference Gök, A., Waterworth, A., & Shapira, P. (2015). Use of web mining in studying innovation. Scientometrics,102(1), 653–671.CrossRef Gök, A., Waterworth, A., & Shapira, P. (2015). Use of web mining in studying innovation. Scientometrics,102(1), 653–671.CrossRef
go back to reference Gold, Z., & Latonero, M. (2018). Robots welcome? Ethical and legal consideration for web crawling and scraping. Washington Journal for Law, Technology & Arts,13(3), 275–312. Gold, Z., & Latonero, M. (2018). Robots welcome? Ethical and legal consideration for web crawling and scraping. Washington Journal for Law, Technology & Arts,13(3), 275–312.
go back to reference Gorro, K. D., Sabellano, M. J. G., Maderazo, C. V., Ceniza, A. M., & Gorro, K. (2017). Exploring Facebook for sharing crime experiences using selenium and support vector machine. Proceedings of the 2017 International Conference on Information Technology, 218–222. Gorro, K. D., Sabellano, M. J. G., Maderazo, C. V., Ceniza, A. M., & Gorro, K. (2017). Exploring Facebook for sharing crime experiences using selenium and support vector machine. Proceedings of the 2017 International Conference on Information Technology, 218–222.
go back to reference Gueta, K., Eytan, S., & Yakimov, P. (2020). Between healing and revictimization: The experience of public self-disclosure of sexual assault and its perceived effect on recovery. Psychology of Violence,10(6), 626–637.CrossRef Gueta, K., Eytan, S., & Yakimov, P. (2020). Between healing and revictimization: The experience of public self-disclosure of sexual assault and its perceived effect on recovery. Psychology of Violence,10(6), 626–637.CrossRef
go back to reference Hand, D. J. (2018). Aspects of data ethics in a changing world: Where are we now? Big Data,6(3), 176–190.CrossRef Hand, D. J. (2018). Aspects of data ethics in a changing world: Where are we now? Big Data,6(3), 176–190.CrossRef
go back to reference Hansen, A. L. S., Li, A., Joly, D., Mekaru, S., & Brownstein, J. S. (2012). Digital surveillance: A novel approach to monitoring the illegal wildlife trade. PLoS ONE,7(12), e51156.CrossRef Hansen, A. L. S., Li, A., Joly, D., Mekaru, S., & Brownstein, J. S. (2012). Digital surveillance: A novel approach to monitoring the illegal wildlife trade. PLoS ONE,7(12), e51156.CrossRef
go back to reference Hardy, W., Krawczyk, M., & Tyrowicz, J. (2014). Internet piracy and book sales: A field experiment. Faculty of Economic Sciences, University of Warsaw Working Papers, 23(140), 1–22. Hardy, W., Krawczyk, M., & Tyrowicz, J. (2014). Internet piracy and book sales: A field experiment. Faculty of Economic Sciences, University of Warsaw Working Papers, 23(140), 1–22.
go back to reference Harlow, L. L., & Oswald, F. L. (2016). Big data in psychology: Introduction to the special issue. Psychological Methods,21(4), 447–457.CrossRef Harlow, L. L., & Oswald, F. L. (2016). Big data in psychology: Introduction to the special issue. Psychological Methods,21(4), 447–457.CrossRef
go back to reference Hayes, D. R., Cappa, F., & Cardon, J. (2018). A framework for more effective dark web marketplace investigations. Information (basel),9(8), 186–204.CrossRef Hayes, D. R., Cappa, F., & Cardon, J. (2018). A framework for more effective dark web marketplace investigations. Information (basel),9(8), 186–204.CrossRef
go back to reference Holt T. J., Smirnova, O., Strumsky, D., & Kilger, M. (2014). Advancing research on hackers through social network data. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise. Taylor Francis. Holt T. J., Smirnova, O., Strumsky, D., & Kilger, M. (2014). Advancing research on hackers through social network data. In C. D. Marcum & G. E. Higgins (Eds.), Social networking as a criminal enterprise. Taylor Francis.
go back to reference Hooley, T., Marriott, J., & Wellens, J. (2012). What is online research? Using the Internet for social science research. Bloomsbury Academic. Hooley, T., Marriott, J., & Wellens, J. (2012). What is online research? Using the Internet for social science research. Bloomsbury Academic.
go back to reference Israel, M. (2004). Strictly confidential? Integrity and the disclosure of criminological and socio-legal research. British Journal of Criminology,44(5), 715–740.CrossRef Israel, M. (2004). Strictly confidential? Integrity and the disclosure of criminological and socio-legal research. British Journal of Criminology,44(5), 715–740.CrossRef
go back to reference Jacques, S., Garstka, K., Hviid, M., & Street, J. (2018). An empirical study of the use of automated anti-piracy systems and their consequences for cultural diversity. SCRIPT-Ed,15(2), 277–312.CrossRef Jacques, S., Garstka, K., Hviid, M., & Street, J. (2018). An empirical study of the use of automated anti-piracy systems and their consequences for cultural diversity. SCRIPT-Ed,15(2), 277–312.CrossRef
go back to reference Joffres, K., Bouchard, M., Frank, R., & Westlake, B. G. (2011). Strategies to disrupt online child pornography networks. 2011 European Intelligence and Security Informatics Conference, 163–170. IEEE. Joffres, K., Bouchard, M., Frank, R., & Westlake, B. G. (2011). Strategies to disrupt online child pornography networks. 2011 European Intelligence and Security Informatics Conference, 163–170. IEEE.
go back to reference Keyvanpour, M. R., Javideh, M., & Ebrahimi, M. R. (2011). Detecting and investigating crime by means of data mining: A general crime matching framework. Procedia Computer Science,3, 872–880.CrossRef Keyvanpour, M. R., Javideh, M., & Ebrahimi, M. R. (2011). Detecting and investigating crime by means of data mining: A general crime matching framework. Procedia Computer Science,3, 872–880.CrossRef
go back to reference Kusz, J., & Bouchard, M. (2020). Nymphet or lolita? A gender analysis of online child pornography websites. Deviant Behavior,41(6), 805–813.CrossRef Kusz, J., & Bouchard, M. (2020). Nymphet or lolita? A gender analysis of online child pornography websites. Deviant Behavior,41(6), 805–813.CrossRef
go back to reference Landers, R., Brusso, R., Cavanaugh, K., & Collmus, A. (2016). A primer on theory-driven web scraping: Automatic extraction of big data from the Internet for use in psychological research. Psychological Methods,21(4), 475–492.CrossRef Landers, R., Brusso, R., Cavanaugh, K., & Collmus, A. (2016). A primer on theory-driven web scraping: Automatic extraction of big data from the Internet for use in psychological research. Psychological Methods,21(4), 475–492.CrossRef
go back to reference Latapy, M., Magnien, C., & Fournier, R. (2013). Quantifying paedophile activity in a large P2P system. Information Processing & Management,49(1), 248–263.CrossRef Latapy, M., Magnien, C., & Fournier, R. (2013). Quantifying paedophile activity in a large P2P system. Information Processing & Management,49(1), 248–263.CrossRef
go back to reference Lyu, Y., Xie, J., & Xie, B. (2020). The attitudes of Chinese online users towards movie piracy: A content analysis. In A. Sundqvist, G. Berget, J. Nolin, & K. Skjerdingstad (Eds.), Sustainable digital communities (pp. 169–185). Springer. Lyu, Y., Xie, J., & Xie, B. (2020). The attitudes of Chinese online users towards movie piracy: A content analysis. In A. Sundqvist, G. Berget, J. Nolin, & K. Skjerdingstad (Eds.), Sustainable digital communities (pp. 169–185). Springer.
go back to reference Macdonald, M., Frank, R., Mei, J., & Monk, B. (2015). Identifying digital threats in a hacker web forum. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, 926–933. Macdonald, M., Frank, R., Mei, J., & Monk, B. (2015). Identifying digital threats in a hacker web forum. Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, 926–933.
go back to reference Magdy, W., Elkhatib, Y., Tyson, G., Joglekar, S., Sastry, N. (2017). Fake it till you make it: Fishing for catfishes. Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, 497–504. Magdy, W., Elkhatib, Y., Tyson, G., Joglekar, S., Sastry, N. (2017). Fake it till you make it: Fishing for catfishes. Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, 497–504.
go back to reference Martin, J., & Christin, N. (2016). Ethics in cryptomarket research. International Journal of Drug Policy,35, 84–91.CrossRef Martin, J., & Christin, N. (2016). Ethics in cryptomarket research. International Journal of Drug Policy,35, 84–91.CrossRef
go back to reference Martin, J., Cunliffe, J., Décary-Hétu, D., & Aldridge, J. (2018a). Effect of restricting the legal supply of prescription opioids on buying through online illicit marketplaces: Interrupted time series analysis. British Medical Journal,361, 1–7. Martin, J., Cunliffe, J., Décary-Hétu, D., & Aldridge, J. (2018a). Effect of restricting the legal supply of prescription opioids on buying through online illicit marketplaces: Interrupted time series analysis. British Medical Journal,361, 1–7.
go back to reference Martin, J., Cunliffe, J. D., Décary-Hétu, D., & Aldridge, J. (2018b). The international darknet drugs trade-a regional analysis of cryptomarkets. Australasian Policing,10(3), 25–29. Martin, J., Cunliffe, J. D., Décary-Hétu, D., & Aldridge, J. (2018b). The international darknet drugs trade-a regional analysis of cryptomarkets. Australasian Policing,10(3), 25–29.
go back to reference McAlister, R. (2015). Webscraping as an investigation tool to identify potential human trafficking operations in Romania. Proceedings of the ACM Web Science Conference, 1–2. McAlister, R. (2015). Webscraping as an investigation tool to identify potential human trafficking operations in Romania. Proceedings of the ACM Web Science Conference, 1–2.
go back to reference McAuliffe, D. (2005). I’m still standing: Impacts and consequences of ethical dilemmas for social workers in direct practice. Journal of Social Work Values and Ethics,2(1), 1–10. McAuliffe, D. (2005). I’m still standing: Impacts and consequences of ethical dilemmas for social workers in direct practice. Journal of Social Work Values and Ethics,2(1), 1–10.
go back to reference McCann, M. (2016). The smartphones study: An analysis of disciplinary differences in research ethics committee responses to phone app-based automated data collection. European Journal of Public Health, 26(suppl. 1). McCann, M. (2016). The smartphones study: An analysis of disciplinary differences in research ethics committee responses to phone app-based automated data collection. European Journal of Public Health, 26(suppl. 1).
go back to reference Mei, J., & Frank, R. (2015). Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM),2015, 1024–1027. Mei, J., & Frank, R. (2015). Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM),2015, 1024–1027.
go back to reference Menczer, F. (2011). Web crawling. In B. Liu (Ed.), Web data mining: Exploring hyperlinks, contents, and usage data, 311 Data-Centric Systems and Applications (pp. 311–362). Springer. Menczer, F. (2011). Web crawling. In B. Liu (Ed.), Web data mining: Exploring hyperlinks, contents, and usage data, 311 Data-Centric Systems and Applications (pp. 311–362). Springer.
go back to reference Millstein, K. (2000). Confidentiality in direct social-work practice: Inevitable challenges and ethical dilemmas. Families in Society,81(3), 270–282.CrossRef Millstein, K. (2000). Confidentiality in direct social-work practice: Inevitable challenges and ethical dilemmas. Families in Society,81(3), 270–282.CrossRef
go back to reference Moeller, K., Munksgaard, R., & Demant, J. (2020). Illicit drug prices and quantity discounts: A comparison between a cryptomarket, social media, and police data. The International Journal of Drug Policy (online first). Moeller, K., Munksgaard, R., & Demant, J. (2020). Illicit drug prices and quantity discounts: A comparison between a cryptomarket, social media, and police data. The International Journal of Drug Policy (online first).
go back to reference Olston, C., & Najork, M. (2010). Web crawling. Foundations and Trends in Information Retrieval,4(3), 175–246.CrossRef Olston, C., & Najork, M. (2010). Web crawling. Foundations and Trends in Information Retrieval,4(3), 175–246.CrossRef
go back to reference O’Reilly, S. (2007). Nominative fair use and Internet aggregators: Copyright and trademark challenges posed by bots, web crawlers and screen-scraping technologies. Loyola Consumer Law Review,19(3), 273–288. O’Reilly, S. (2007). Nominative fair use and Internet aggregators: Copyright and trademark challenges posed by bots, web crawlers and screen-scraping technologies. Loyola Consumer Law Review,19(3), 273–288.
go back to reference Ozalp, S., Williams, M. L., Burnap, P., Liu, H., & Mostafa, M. (2020). Antisemitism on Twitter: Collective efficacy and the role of community organisations in challenging online hate speech. Social Media + Society, 6(2), 1–20. Ozalp, S., Williams, M. L., Burnap, P., Liu, H., & Mostafa, M. (2020). Antisemitism on Twitter: Collective efficacy and the role of community organisations in challenging online hate speech. Social Media + Society, 6(2), 1–20.
go back to reference Pannu, M., Kay, I., & Harris, D. (2018). Using dark web crawler to uncover suspicious and malicious websites. International Conference on Applied Human Factors and Ergonomics (pp. 108–115). Springer. Pannu, M., Kay, I., & Harris, D. (2018). Using dark web crawler to uncover suspicious and malicious websites. International Conference on Applied Human Factors and Ergonomics (pp. 108–115). Springer.
go back to reference Paquet-Clouston, M., Décary-Hétu, D., & Morselli, C. (2018). Assessing market competition and vendors’ size and scope on AlphaBay. International Journal of Drug Policy,54, 87–98.CrossRef Paquet-Clouston, M., Décary-Hétu, D., & Morselli, C. (2018). Assessing market competition and vendors’ size and scope on AlphaBay. International Journal of Drug Policy,54, 87–98.CrossRef
go back to reference Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018). Crimebb: Enabling cybercrime research on underground forums at scale. Proceedings of the 2018 World Wide Web Conference, 1845–1854. Pastrana, S., Thomas, D. R., Hutchings, A., & Clayton, R. (2018). Crimebb: Enabling cybercrime research on underground forums at scale. Proceedings of the 2018 World Wide Web Conference, 1845–1854.
go back to reference Pitman, B., Ralph, A. M., Camacho, J., & Monk-Turner, E. (2019). Social media users’ interpretations of the Sandra Bland arrest video. Race and Justice,9(4), 479–497.CrossRef Pitman, B., Ralph, A. M., Camacho, J., & Monk-Turner, E. (2019). Social media users’ interpretations of the Sandra Bland arrest video. Race and Justice,9(4), 479–497.CrossRef
go back to reference Scrivens, R., Davies, G., & Frank, R. (2017). Searching for signs of extremism on the web: An introduction to Sentiment-based Identification of Radical Authors. Behavioral Sciences of Terrorism and Political Aggression,10(1), 39–59.CrossRef Scrivens, R., Davies, G., & Frank, R. (2017). Searching for signs of extremism on the web: An introduction to Sentiment-based Identification of Radical Authors. Behavioral Sciences of Terrorism and Political Aggression,10(1), 39–59.CrossRef
go back to reference Scrivens, R., Gaudette, T., Davies, G., & Frank, R. (2019). Searching for extremist content online using the dark crawler and sentiment analysis. In M. Deflem & D. M. D Silva (Eds.), Methods of criminology and criminal justice research (Sociology of Crime, Law and Deviance). Emerald Publishing Limited. Scrivens, R., Gaudette, T., Davies, G., & Frank, R. (2019). Searching for extremist content online using the dark crawler and sentiment analysis. In M. Deflem & D. M. D Silva (Eds.), Methods of criminology and criminal justice research (Sociology of Crime, Law and Deviance). Emerald Publishing Limited.
go back to reference Shavitt, Y., & Zilberman, N. (2013). On the presence of child sex abuse in BitTorrent networks. IEEE Internet Computing,17(3), 60–66.CrossRef Shavitt, Y., & Zilberman, N. (2013). On the presence of child sex abuse in BitTorrent networks. IEEE Internet Computing,17(3), 60–66.CrossRef
go back to reference Sidhu, N., & Srinivasraghavan, J. (2016). Ethics and medical practice: Why psychiatry is unique. Indian Journal of Psychiatry,58(6), 199–202.CrossRef Sidhu, N., & Srinivasraghavan, J. (2016). Ethics and medical practice: Why psychiatry is unique. Indian Journal of Psychiatry,58(6), 199–202.CrossRef
go back to reference Silva, E., Till, A., & Adshead, G. (2017). Ethical dilemmas in psychiatry: When teams disagree. Bjpsych Advances,23(4), 231–239.CrossRef Silva, E., Till, A., & Adshead, G. (2017). Ethical dilemmas in psychiatry: When teams disagree. Bjpsych Advances,23(4), 231–239.CrossRef
go back to reference Solberg, L. B. (2010). Data mining on Facebook: A free space for researchers or an IRB nightmare? University of Illinois Journal of Law, Technology & Policy,2, 311–343. Solberg, L. B. (2010). Data mining on Facebook: A free space for researchers or an IRB nightmare? University of Illinois Journal of Law, Technology & Policy,2, 311–343.
go back to reference Soska, K., & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In USENIX Security Symposium (USENIX Security), 33–48. Soska, K., & Christin, N. (2015). Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In USENIX Security Symposium (USENIX Security), 33–48.
go back to reference Stokes, S. (2019). Digital copyright: Law and practice. Hart Publishing. Stokes, S. (2019). Digital copyright: Law and practice. Hart Publishing.
go back to reference Sun, Y., Councill, I. G., & Giles, C. L. (2010). The ethicality of web crawlers. 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 1, 668–675. Sun, Y., Councill, I. G., & Giles, C. L. (2010). The ethicality of web crawlers. 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 1, 668–675.
go back to reference Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment analysis of tweets for estimating criticality and security of events. Journal of Organizational and End User Computing,29(4), 51–71.CrossRef Subramaniyaswamy, V., Logesh, R., Abejith, M., Umasankar, S., & Umamakeswari, A. (2017). Sentiment analysis of tweets for estimating criticality and security of events. Journal of Organizational and End User Computing,29(4), 51–71.CrossRef
go back to reference Tavani, H. T. (1999). Informational privacy, data mining, and the Internet. Ethics and Information Technology,1(2), 137–145.CrossRef Tavani, H. T. (1999). Informational privacy, data mining, and the Internet. Ethics and Information Technology,1(2), 137–145.CrossRef
go back to reference Thelwall, M., & Stuart, D. (2006). Web crawling ethics revisited: Cost, privacy, and denial of service. Journal of the American Society for Information Science and Technology,57(13), 1771–1779.CrossRef Thelwall, M., & Stuart, D. (2006). Web crawling ethics revisited: Cost, privacy, and denial of service. Journal of the American Society for Information Science and Technology,57(13), 1771–1779.CrossRef
go back to reference Thomas, D. M., & Mathur, S. (2019). Data analysis by web scraping using python. 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 450–454. Thomas, D. M., & Mathur, S. (2019). Data analysis by web scraping using python. 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 450–454.
go back to reference Tsatsou, P. (2014). Research and the Internet: Fast-growing Internet research. In P. Tsatsou (Ed.), Internet studies: Past, present and future directions. Ashgate Publishing Ltd. Tsatsou, P. (2014). Research and the Internet: Fast-growing Internet research. In P. Tsatsou (Ed.), Internet studies: Past, present and future directions. Ashgate Publishing Ltd.
go back to reference Turk, K., Pastrana, S., & Collier, B. (2020). A tight scrape: Methodological approaches to cybercrime research data collection in adversarial environments. Workshop on Actors in Cybercrime Operations, 428–437. Turk, K., Pastrana, S., & Collier, B. (2020). A tight scrape: Methodological approaches to cybercrime research data collection in adversarial environments. Workshop on Actors in Cybercrime Operations, 428–437.
go back to reference Westlake, B. G., & Bouchard, M. (2016a). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly,33(7), 1154–1181.CrossRef Westlake, B. G., & Bouchard, M. (2016a). Criminal careers in cyberspace: Examining website failure within child exploitation networks. Justice Quarterly,33(7), 1154–1181.CrossRef
go back to reference Westlake, B. G., & Bouchard, M. (2016b). Liking and hyperlinking: Examining reciprocity and diversity in online child exploitation network communities. Social Science Research,59, 23–36.CrossRef Westlake, B. G., & Bouchard, M. (2016b). Liking and hyperlinking: Examining reciprocity and diversity in online child exploitation network communities. Social Science Research,59, 23–36.CrossRef
go back to reference Westlake, B. G., Bouchard, M., & Frank, R. (2011). Finding the key players in online child exploitation networks. Policy and Internet,3(2), 1–32.CrossRef Westlake, B. G., Bouchard, M., & Frank, R. (2011). Finding the key players in online child exploitation networks. Policy and Internet,3(2), 1–32.CrossRef
go back to reference Westlake, B. G., Bouchard, M., & Frank, R. (2012). Comparing methods for detecting child exploitation content online. European Intelligence and Security Informatics Conference, 156–163. Westlake, B. G., Bouchard, M., & Frank, R. (2012). Comparing methods for detecting child exploitation content online. European Intelligence and Security Informatics Conference, 156–163.
go back to reference Westlake, B. G., Bouchard, M., & Frank, R. (2017). Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse,29(7), 685–708.CrossRef Westlake, B. G., Bouchard, M., & Frank, R. (2017). Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse,29(7), 685–708.CrossRef
go back to reference Westlake, B. G., & Frank, R. (2016). Seeing the forest through the trees: Identifying key players in online child sexual exploitation distribution networks. In T. Holt (Ed.), Cybercrime through an interdisciplinary lens. New York: Routledge. Westlake, B. G., & Frank, R. (2016). Seeing the forest through the trees: Identifying key players in online child sexual exploitation distribution networks. In T. Holt (Ed.), Cybercrime through an interdisciplinary lens. New York: Routledge.
go back to reference Wilson, R. E., Gosling, S. D., & Graham, L. T. (2012). A review of Facebook research in the social sciences. Perspectives on Psychological Science,7(3), 203–220.CrossRef Wilson, R. E., Gosling, S. D., & Graham, L. T. (2012). A review of Facebook research in the social sciences. Perspectives on Psychological Science,7(3), 203–220.CrossRef
go back to reference Xin, Y., & Cai, T. (2018). Child trafficking in China: Evidence from sentencing documents. International Journal of Population Studies,4(2), 1–10. Xin, Y., & Cai, T. (2018). Child trafficking in China: Evidence from sentencing documents. International Journal of Population Studies,4(2), 1–10.
go back to reference Xu, Q., Cai, M., & Mackey, T. K. (2020). The illegal wildlife digital market: An analysis of Chinese wildlife marketing and sale on Facebook. Environmental Conservation,47(3), 206–212.CrossRef Xu, Q., Cai, M., & Mackey, T. K. (2020). The illegal wildlife digital market: An analysis of Chinese wildlife marketing and sale on Facebook. Environmental Conservation,47(3), 206–212.CrossRef
Metadata
Title
The Ethics of Web Crawling and Web Scraping in Cybercrime Research: Navigating Issues of Consent, Privacy, and Other Potential Harms Associated with Automated Data Collection
Authors
Russell Brewer
Bryce Westlake
Tahlia Hart
Omar Arauza
Copyright Year
2021
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-74837-1_22

Premium Partner