Skip to main content

Guidance for Computer and Internet Based Research

Computer- and internet-based methods of collecting, storing, utilizing, and transmitting data in research involving human participants are developing at a rapid rate. As these new methods become more widespread in research in the social, psychological, and social sciences, they present new challenges to the protection of research participants. The Institutional Review Board (IRB) reviews computer- and internet-based research protocols using the same considerations and standards of approval of research (45 CFR 46.111) as all other research activities. All studies including those using computer and internet technologies must (a) ensure that the procedures fulfill the principles of voluntary participation and informed consent, (b) maintain the confidentiality of information obtained from or about human participants, and (c) adequately address possible risks to participants including psychosocial stress and related risks.

The purpose of these guidelines is to help researchers plan, propose, and implement computer- and internet-based research protocols that provide the same level of protection of human participants as more traditional research methodologies. The guidelines are comprised of requirements and recommendations that are consistent with the basic IRB principles applied to all research involving human participants.

Internet-based research may not be suitable for greater than minimal risk studies where the research involves data that:

  • places participants at risk of criminal or civil liability, or
  • could damage their financial standing, employability, insurability, reputation, or
  • could be stigmatizing, or
  • could result in stolen identity.

Recruitment

  • Computer- and internet-based procedures for advertising and recruiting potential study participants (e.g., internet advertising, e-mail solicitation, banner ads) must follow the IRB guidelines for recruitment that apply to any traditional media, such as newspapers and bulletin boards (see General Recruitment Practices and Advertisements).  All advertising and recruitment material must be reviewed and approved by the IRB.
  • Investigators are advised to review the University’s policy on sending campus-wide emails.
  • Investigators are advised that authentication—that is, proper qualification and/or identification of respondents—is a major challenge in computer- and internet-based research and one that threatens the integrity of research samples and the validity of research results.  Researchers are advised to take steps to authenticate participants, especially when conducting longitudinal studies where participant data will be matched over time.  For example, investigators can provide each study participant (in person or by U.S. Postal Service mail) with a Personal Identification Number (PIN) to be used for authentication in subsequent computer- and internet- based data collection. The PIN used must not be one that could be used by others to identify the individual (e.g. social security number, etc.)

Data Collection

  • It is strongly recommended that any data collected from human participants over computer networks be transmitted in encrypted format.  This helps insure that any data intercepted during transmission cannot be decoded and that individual responses cannot be traced back to an individual respondent.
  • The level of security should be appropriate to the risk. For most research, standard security measures like encryption and secure socket layer (SSL) will suffice. However, with sensitive topics additional protections include certified digital signatures for informed consent, encryption of data transmission, and technical separation of identifiers.
  • Researchers are cautioned that encryption standards vary from country to country and that there are legal restrictions regarding the export of certain encryption software outside US boundaries.
  • Internet-based survey instruments must be formatted in a way that will allow participants to skip questions if they wish or provide a response such as “I choose not to answer.”
  • You could opt to have two buttons at the end of the survey: one to allow participants to discard the data and the other to submit it for inclusion in the study.
  • If applicable, online surveys must include mechanisms for withdrawal. For example, if a participant decides to withdraw, there should be a mechanism for identifying the responses of a participant for the purposes of discarding those responses.
  • Websites must also comply with the University’s Information Privacy and Security Policy.
  • Researchers working with children online are subject to the Children’s Online Privacy Protection Act (COPPA) in addition to human subjects regulations. Researchers are prohibited from collecting personal information from a child without posting notices about how the information will be used and without getting verifiable (likely written) parental permission. For minimal risk research written permission may be obtained by via paper mail or fax. If the research is more than minimal risk, parental permission should be obtained in a face-to-face meeting.
  • Screen out minors by checking for internet monitoring software such as SafeSurf and RSACi rating or using Adult Check systems.

Server Administration

Use of SurveyMonkey, Psychsurveys, Qualtrics and other online survey tools is permitted for minimal risk studies that do not involve the collection of sensitive data.  As noted above, the IRB recommends that data be transmitted in a secure format.  Therefore, researchers who wish to use SurveyMonkey should upgrade to a Professional account which offers SSL encryption.  Psychsurveys and Qualtrics offer SSL encryption for all studies. A copy of all data files must be stored on a Boise State computer in on campus location for a minimum of three years following study completion.

For more than minimal risk studies that involve the collection of sensitive data, the IRB recommends it be housed on a Boise State server.  The server should be administered by a professionally trained person with expertise in computer and internet security.  Access to the server should be limited to key project personnel.  The server should receive frequent, regularly scheduled security audits. All data files must be stored on a Boise State computer in on campus location for a minimum of three years following study completion.

Data Storage/Disposal

  • If a server is used for data storage, personal identifying information should be kept separate from the data, and data should be stored in encrypted format. Use of Social Security Numbers is not permitted.
  • It is recommended that data backups be stored in a safe location, such as a secure data room that is environmentally controlled and has limited access.
  • It is recommended that competent data destruction services be used to ensure that no data can be recovered from obsolete electronic media.
  • Researchers must adhere to the University’s Information Privacy and Data Security policy.

Informed Consent Process

  • For anonymous internet-based surveys, include “I agree” or “I do not agree” buttons on the website for participants to click to indicate their active choice of whether or not they consent to participate.  For anonymous surveys sent to and returned by participants through email, include an information sheet with consent information and inform participants that submitting the completed survey implies their consent.
  • If the IRB determines that written consent is required, the consent form can be mailed or emailed to the participant who can then sign the form and return it via fax or postal mail.
  • Researchers conducting web-based research should be careful not to make guarantees of confidentiality or anonymity, as the security of online transmissions is not guaranteed.  A statement in the informed consent form indicating the limits to confidentiality is typically required.  The following statement may be used:
    “Your confidentiality will be maintained to the degree permitted by the technology used. Specifically, no guarantees can be made regarding the interception of data sent via the Internet by any third parties.”
Back To Top