Engaging Youth in Health Promotion Using Multimedia Technologies: Reflecting on 10 Years of TeenNet Research Ethics and Practice

Engaging Youth in Health Promotion Using Multimedia Technologies: Reflecting on 10 Years of TeenNet Research Ethics and Practice

Cameron Norman (University of Toronto, Canada), Adrian Guta (University of Toronto, Canada) and Sarah Flicker (York University, Canada)
Copyright: © 2009 |Pages: 21
DOI: 10.4018/978-1-60566-022-6.ch020
OnDemand PDF Download:
$37.50

Abstract

New information technologies are creating virtual spaces that allow youth to network and express themselves with unprecedented freedom and influence. However, these virtual spaces call into question traditional understandings of private and public space and open up new tensions for institutions (e.g. schools and law enforcement) trying to maintain safe spaces. For adolescent health researchers, these virtual spaces provide exciting opportunities to study youth culture, but also challenge the utility of ethical guidelines designed for a non-networked world. At issue are tensions between the realities of ‘natural’ interactions that occur online, often in full public view, and creating ethical research environments. These tensions and issues will be explored within this chapter, through an overview of the Teen- Net project, a discussion of anonymity and confidentiality within social networking technologies and software (including Friendster, Facebook, and Myspace), and a discussion of ethical considerations for researchers engaged in adolescent health research and promotion.
Chapter Preview
Top

The Teennet Experience

In 1995, Dr. Harvey Skinner, then professor of Public Health Sciences at the University of Toronto, established TeenNet with the aim of providing a living laboratory to develop, evaluate and disseminate youth-friendly tools for health promotion using emerging information and communication technologies (ICT) (Norman & Skinner, 2007; Skinner, Maley, Smith, & Morrison, 2001; Skinner et al., 1997). TeenNet’s approach to research is predicated on the idea that engaging young people in all aspects of health promotion planning – from identification of needs, to the design and delivery of programming – produces more authentic, relevant, useful and attractive tools to support positive youth development (Blum, 1998). This process is guided by five principles:

Key Terms in this Chapter

Privacy Paradox: Is a consequence of the competing demand to use information technologies (including social technology and social software) and have an on-line persona, which simultaneously having to guard against potential threats to personal safety and privacy resulting from the misuse of available information.

Prosumers: Are individuals who actively engage in accessing, viewing and creating content on the web. This is an important shift from the passive consumer who simply views content, as is a limitation of other mediums.

EHealth: (electronic health): Can be understood as the host of emerging information technologies related to accessing and/or exchanging health information; be it within formal health systems (transferring patient records within a hospital), or between independent users (exchanging treatment information through an on-line support group).

Social Software: Can be understood as the growing number of applications which run on computers and portable devices, allowing users to access and connect to individuals or networks of people. Examples of these (as discussed in the chapter) include Friendster, Facebook and Myspace, and can be connected to other services such as YouTube

Web 2.0: Can be used to describe the numerous interactive applications which have been developed to provide individuals with greater access and control in web based environments towards greater collaboration and information/resource sharing; these include social networking sites like Facebook, as well as information resources like wikipedia.

Youth Agency: Can be understood as youth actively engaging with systems, institutions, and technologies towards finding space for expression and resilience. Youth are often constructed as passive in debates about the use and abuse of technology, despite their demonstrated desire to participate in its development and evolution.

Social Technology: Can be understood as the physical hardware (cell phones, iPod’s, high speed data servers) on which networking software is supported. In many cases, these are small and highly portable devices which are themselves connected to powerful wireless networks.

Cyber-Bullying: Is a growing phenomena in which youth, but also adults, use information technology to harass others. This can take seemingly endless forms, and often maximize the potential of many applications; including posting hurtful comments about other people on one’s own site, about them on their site, hacking into and altering their personal profile, sending insulting text messages to mobile devices, and even filming embarrassing and/or illegal actions and uploading them onto the web.

Critical Appraisal: Can be understood as the ability to filter and decipher evidence which is presented, and evaluate it for its merits and limitations. Youth accessing information technologies and social technologies may not have developed and refined these skills, and therefore uptake incorrect information and/or may not know how to effectively use correct information.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Preface
Rocci Luppicini, Rebecca Adell
Acknowledgment
Rocci Luppicini, Rebecca Adell
Chapter 1
Rocci Luppicini
Over the last 30 years, an amassing body of work has focused on ethical dimensions of technology in a variety of contexts impacting society. This... Sample PDF
The Emerging Field of Technoethics
$37.50
Chapter 2
Marc J. de Vries
In this chapter it is argued that a multidisciplinary approach to technoethics is necessary to do justice to the complexity of technology.... Sample PDF
A Multi-Disciplinary Approach to Technoethics
$37.50
Chapter 3
Daniela Cerqui, Kevin Warwick
Common ethical issues related to technology are formulated in terms of impact. With an anthropological approach, every technological device is... Sample PDF
Technoethics: An Anthropological Approach
$37.50
Chapter 4
Michael S. Billinger
Despite the fact that analyses of biological populations within species have become increasing sophisticated in recent years, the language used to... Sample PDF
A Technoethical Approach to the Race Problem in Anthropology
$37.50
Chapter 5
Andy Miah
This chapter outlines a technoethics for sport by addressing the relationship between sport ethics and bioethics. The purpose of this chapter is to... Sample PDF
The Ethics of Human Enhancement in Sport
$37.50
Chapter 6
Darryl Macer
This chapter examines some of the cultural variation in the ethical factors associated with the use of science and technology. The issues discussed... Sample PDF
Education of Ethics of Science and Technology Across Cultures
$37.50
Chapter 7
Seppo Visala
Within the organisational development people’s arguments rise from their personal or group interests, which in turn are based on the systemic... Sample PDF
Planning, Interests, and Argumentation
$37.50
Chapter 8
Alireza Bagheri
This chapter elaborates on some of the existing concerns and ethical issues that may arise when biomedical research protocols are proposed or funded... Sample PDF
Ethics Review on Externally- Sponsored Research in Developing Countries
$37.50
Chapter 9
Gerrhard Fortwengel
At the beginning of this section the authors provide a definition of biomedical research and an interpretation of the meaning of ethics and social... Sample PDF
Social and Ethical Aspects of Biomedical Research
$37.50
Chapter 10
Stefano Fait
In assessing the ethical implications of genomics and biotechnology, it is important to acknowledge that science, technology, and bioethics do not... Sample PDF
Ethical Aspects of Genetic Engineering and Biotechnology
$37.50
Chapter 11
Timothy F. Murphy
Military researchers are working to exploit advances in nanoscale research for military uniforms, medical diagnosis and treatment, enhanced soldier... Sample PDF
Nanoscale Research, Ethics, and the Military
$37.50
Chapter 12
Keith Bauer
This chapter reviews key debates about the meaning of telehealth and also considers how new and emerging systems in telehealth work to protect... Sample PDF
Healthcare Ethics in the Information Age
$37.50
Chapter 13
Matthew Charlesworth, David Sewry
The development of cybernetics and digital computers prompted the need for a greater exploration of computer ethics. Information ethics, as... Sample PDF
Ethical Theories and Computer Ethics
$37.50
Chapter 14
John P. Sullins
This chapter will argue that artificial agents created or synthesized by technologies such as artificial life (ALife), artificial intelligence (AI)... Sample PDF
Artificial Moral Agency in Technoethics
$37.50
Chapter 15
Pilar Alejandra Cortés Pascual
‘What positive and negative aspects are perceived of Information and Communications Technologies (ICT)?’ and ‘What dilemmas arise regarding these... Sample PDF
Ethical Controversy over Information and Communication Technology
$37.50
Chapter 16
Martin Ryder
This chapter provides a brief summary of the technical and social hurdles that define the so-called ‘digital divide’ and it considers the celebrated... Sample PDF
The Cyborg and the Noble Savage: Ethics in the War on Information Poverty
$37.50
Chapter 17
Mike Ribble
In todays changing global society, digital technology users need to be prepared to interact and work with users from around the world. Digital... Sample PDF
Becoming a Digital Citizen in a Technological World
$37.50
Chapter 18
Deb Gearhart
Are we developing a (global) society where our youth think it is ok to copy and paste whatever they see on the Internet and turn it in for homework;... Sample PDF
Technoethics in Education for the Twenty-First Century
$37.50
Chapter 19
May Thorseth
The purpose of this chapter is to discuss important ethical aspects of online communication of global scope. We focus particularly on procedural... Sample PDF
The Ethics of Global Communication Online
$37.50
Chapter 20
Cameron Norman, Adrian Guta, Sarah Flicker
New information technologies are creating virtual spaces that allow youth to network and express themselves with unprecedented freedom and... Sample PDF
Engaging Youth in Health Promotion Using Multimedia Technologies: Reflecting on 10 Years of TeenNet Research Ethics and Practice
$37.50
Chapter 21
Samantha Mei-che Pang
In Hong Kong, end-of-life practice ideally adheres to values that include respect for the patient’s selfdetermination and an understanding shared by... Sample PDF
Ethical Challenges of Engaging Chinese in End-of-Life Talk
$37.50
Chapter 22
Busi Nkala
An estimated 39.5 million people are living with HIV worldwide. There were 4.3 million new infections in 2006 with 2.8 million (65%) of these... Sample PDF
Community Education in New HIV Prevention Technologies Research
$37.50
Chapter 23
Makoto Nakada, Rafael Capurro
In this article we give an overview of the range and characteristics of intercultural information ethics (IIE) focusing on the public/private debate... Sample PDF
The Public / Private Debate: A Contribution to Intercultural Information Ethics
$37.50
Chapter 24
Arsalan Butt
Consumer software piracy is widespread in many parts of the world. P2P based websites have made it easier to access pirated software, which has... Sample PDF
Ethical, Cultural and Socio- Economic Factors of Software Piracy Determinants in a Developing Country: Comparative Analysis of Pakistani and Canadian University Students
$37.50
Chapter 25
A. Anderson, S. Allan, A. Petersen, C. Wilkinson
Recent evidence on genetically modified crops, cloning and stem cell research suggests that the news media play a significant role in shaping wider... Sample PDF
Nanoethics: The Role of News Media in Shaping Debate
$37.50
Chapter 26
Russell W. Robbins, Kenneth R. Fleischmann, William A. Wallace
This chapter explains and integrates new approaches to teaching computing and information ethics (CIE) and researching CIE education. We first... Sample PDF
Computing and Information Ethics Education Research
$37.50
Chapter 27
Jennifer Candor
The allocation of resources for assistive technology does not have to result in a gap between general and special education. This case study... Sample PDF
The Ethical Dilemma over Money in Special Education
$37.50
Chapter 28
Pilar Alejandra Cortés Pascual
Educational orientation should be set within a specific socio-historical context, which is nowadays characterized by the Society of Information.... Sample PDF
Educational Technoethics Applied to Career Guidance
$37.50
Chapter 29
A.K. Haghi
In this book chapter, the authors summarize their retrospections as an engineering educator for more than 20 years. Consideration is given to a... Sample PDF
The Scholarship of Teaching Engineering: Some Fundamental Issues
$37.50
Chapter 30
Antoinette Rouvroy
The aim of the present chapter is to elucidate the paradoxical position of the individual legal subject in the context of human genetics. It first... Sample PDF
Which Rights for Which Subjects? Genetic Confidentiality and Privacy in the Post-Genomic Era
$37.50
Chapter 31
Eduardo A. Rueda
This chapter focuses on showing legitimate ways for coping with uncertainties within the informed consent process of predictive genetic testing. It... Sample PDF
Predictive Genetic Testing,Uncertainty, and Informed Consent
$37.50
Chapter 32
Soraj Hongladarom
The chapter argues that there is a way to justify privacy without relying on the metaphysical assumption of an independently existing self or... Sample PDF
Privacy, Contingency, Identity, and the Group
$37.50
Chapter 33
Y. Ibrahim
This chapter situates the current debates on pornography in the virtual realm and its ethical and legal implications for users and researchers. It... Sample PDF
The Ethics of Gazing: The Politics of Online Pornography
$37.50
Chapter 34
Neil C. Rowe
We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories... Sample PDF
The Ethics of Deception in Cyberspace
$37.50
Chapter 35
Cyber Identity Theft  (pages 542-557)
Lynne D. Roberts
Information and communication technologies (ICTs) provide substantial benefits to governments, organizations and individuals through providing low... Sample PDF
Cyber Identity Theft
$37.50
Chapter 36
A. Pablo Iannone
This chapter asks: What is information overload? At what levels of existence does it occur? Are there any features common to information overload at... Sample PDF
Walking the Information Overload Tightrope
$37.50
Chapter 37
Cyber-Victimization  (pages 575-592)
Lynne D. Roberts
Information and communication technologies (ICTs); while providing a range of benefits to individuals, organisations and governments; also provide... Sample PDF
Cyber-Victimization
$37.50
Chapter 38
Spyware  (pages 593-608)
Mathias Klang
It is well known that technology can be use as to effectively monitor the behavior of crows and individuals and in many cases this knowledge may b... Sample PDF
Spyware
$37.50
Chapter 39
D. Gareth Jones
The advent of in vitro fertilization (IVF) marked a watershed in the scientific understanding of the human embryo. This, in turn, led to a... Sample PDF
In Vitro Fertilization and the Embryonic Revolution
$37.50
Chapter 40
Joyce Yi- Hui Lee
In this chapter we argue that even though conflict has been explored at an intra-organizational level, its effect and role at an... Sample PDF
Inter-Organizational Conflicts in Virtual Alliances
$37.50
Chapter 41
Andreas Matthias
Creation of autonomously acting, learning artifacts has reached a point where humans cannot any more be justly held responsible for the actions of... Sample PDF
From Coder to Creator: Responsibility Issues in Intelligent Artifact Design
$37.50
Chapter 42
J. José Cortez
Fundamental democratic principles and values that guide our social relationships have been important concerns in the evolution of this nation’s... Sample PDF
Historical Perspective of Technoethics in Education
$37.50
Chapter 43
Heidi L. Schnackenberg
On the cutting edge of current technologies are portable media, where users can download information and take it with them to digest it anytime... Sample PDF
Podcasting and Vodcasting in Education and Training
$37.50
Chapter 44
Technoethics in Schools  (pages 680-699)
Darren Pullen
School students are used to digital technology-they blog, create movies for public viewing on the web, create and download music and use instant... Sample PDF
Technoethics in Schools
$37.50
Chapter 45
Charles R Crowell
This chapter discusses the ways in which moral psychology can inform information ethics. A “Four Component Model” of moral behavior is described... Sample PDF
Moral Psychology and Information Ethics: Psychological Distance and the Components of Moral Behavior in a Digital World
$37.50
Chapter 46
José-Rodrigo Córdoba
Current developments in information systems (IS) evaluation emphasise stakeholder participation in order to ensure adequate and beneficial IS... Sample PDF
A Critical Systems View of Power-Ethics Interactions in Information Systems Evaluation
$37.50
Chapter 47
Joan D. McMahon
If you were to survey course syllabi on your campus, you would probably find the standard syllabi to include: • Course title and number •... Sample PDF
Ethical Issues in Web-Based Learning
$37.50
Chapter 48
Barbara Paterson
Computer ethicists foresee that as information and communication technology (ICT) increasingly pervades more and more aspects of life, ethical... Sample PDF
We Cannot Eat Data: The Need for Computer Ethics to Address the Cultural and Ecological Impacts of Computing
$37.50
Chapter 49
Bernd Carsten Stahl, Simon Rogerson
The ever-changing face of ICT can render its deployment rather problematic in sensitive areas of applications, such as healthcare. The ethical... Sample PDF
Current and Future State of ICT Deployment and Utilization in Healthcare: An Analysis of Cross-Cultural Ethical Issues
$37.50
Chapter 50
Sue Conger
With each new technology, new ethical issues emerge that threaten both individual and household privacy. This chapter investigates issues relating... Sample PDF
Emerging Technologies, Emerging Privacy Issues
$37.50
Chapter 51
Robert N. Barger
This chapter discusses the ethics of a proof-of-concept demonstration of “parasitic computing.” A “parasite” computer attempts to solve a complex... Sample PDF
Ethics of "Parasitic Computing": Fair Use or Abuse of TCP/IP Over the Internet?
$37.50
Chapter 52
Cecilia Andrews
“Counter-terrorism refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism.”... Sample PDF
Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism
$37.50
Chapter 53
Gundars Kaupins
This article summarizes the legal and ethical implications associated with employee location monitoring. It states that few international laws and... Sample PDF
Legal and Ethical Implications of Employee Location Monitoring
$37.50
Chapter 54
Fjodor Ruzic
In today’s dynamic e-business environment where fast time to market is imperative, where information and telecommunications technology is costly and... Sample PDF
New Ethics for E-Business Offshore Outsourcing
$37.50
About the Contributors