{"id":"https://openalex.org/W7105898585","doi":"https://doi.org/10.48550/arxiv.2511.10924","title":"Ethical conundrums: Hacked data in the study of far-right violent extremism","display_name":"Ethical conundrums: Hacked data in the study of far-right violent extremism","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7105898585","doi":"https://doi.org/10.48550/arxiv.2511.10924"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2511.10924","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.10924","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2511.10924","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Waldek, Lise","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Waldek, Lise","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Ballsun-Stanton, Brian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ballsun-Stanton, Brian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Iqbal, Muhammad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Iqbal, Muhammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kernot, David","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kernot, David","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Smith, Debra","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Smith, Debra","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.5156999826431274,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.5156999826431274,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12679","display_name":"Focus Groups and Qualitative Methods","score":0.04699999839067459,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13277","display_name":"Media, Religion, Digital Communication","score":0.02250000089406967,"subfield":{"id":"https://openalex.org/subfields/1211","display_name":"Philosophy"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reflexivity","display_name":"Reflexivity","score":0.6033999919891357},{"id":"https://openalex.org/keywords/morality","display_name":"Morality","score":0.44929999113082886},{"id":"https://openalex.org/keywords/ethical-issues","display_name":"Ethical issues","score":0.4332999885082245},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.42570000886917114},{"id":"https://openalex.org/keywords/research-ethics","display_name":"Research ethics","score":0.3630000054836273},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.304500013589859}],"concepts":[{"id":"https://openalex.org/C13200473","wikidata":"https://www.wikidata.org/wiki/Q2747831","display_name":"Reflexivity","level":2,"score":0.6033999919891357},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.555899977684021},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.49470001459121704},{"id":"https://openalex.org/C200113983","wikidata":"https://www.wikidata.org/wiki/Q48324","display_name":"Morality","level":2,"score":0.44929999113082886},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.4401000142097473},{"id":"https://openalex.org/C2986663376","wikidata":"https://www.wikidata.org/wiki/Q9465","display_name":"Ethical issues","level":2,"score":0.4332999885082245},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.42570000886917114},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4133000075817108},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3635999858379364},{"id":"https://openalex.org/C153997805","wikidata":"https://www.wikidata.org/wiki/Q42240","display_name":"Research ethics","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C500143535","wikidata":"https://www.wikidata.org/wiki/Q31022","display_name":"Professional ethics","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C7991579","wikidata":"https://www.wikidata.org/wiki/Q17955","display_name":"Criticism","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C2776240099","wikidata":"https://www.wikidata.org/wiki/Q327018","display_name":"Interrogation","level":2,"score":0.2831999957561493},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.27790001034736633},{"id":"https://openalex.org/C93474598","wikidata":"https://www.wikidata.org/wiki/Q1662553","display_name":"Information ethics","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.257099986076355}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2511.10924","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.10924","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2511.10924","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.10924","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7430429458618164}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Ethical":[0],"conduct":[1],"in":[2,53],"digital":[3],"research":[4,20,54,82,134],"is":[5,41,86],"full":[6],"of":[7,29,33,38,50,59,65,68,96,115],"grey":[8],"areas.":[9],"Disciplinary,":[10],"institutional":[11],"and":[12,15,45,89,145,152],"individual":[13],"norms":[14],"conventions":[16],"developed":[17],"to":[18,80,118,139],"support":[19],"are":[21,55,70],"challenged,":[22],"often":[23],"leaving":[24],"scholars":[25],"with":[26,83,135,149],"a":[27,103],"sense":[28],"unease":[30],"or":[31,63],"lack":[32],"clarity.":[34],"The":[35],"growing":[36],"availability":[37],"hacked":[39,116,136],"data":[40,85,117],"one":[42],"area.":[43],"Discussions":[44],"debates":[46,108],"around":[47],"the":[48,60,66,94,106,113],"use":[49,114],"these":[51],"datasets":[52],"extremely":[56],"limited.":[57],"Reviews":[58],"history,":[61],"culture,":[62],"morality":[64],"act":[67],"hacking":[69],"topics":[71],"that":[72,109,126],"have":[73],"attracted":[74],"some":[75],"scholarly":[76],"attention.":[77],"However,":[78,138],"how":[79],"undertake":[81],"this":[84],"less":[87],"examined":[88],"provides":[90],"an":[91],"opportunity":[92],"for":[93],"generation":[95],"reflexive":[97],"ethical":[98,107,133,150],"practice.":[99],"This":[100],"article":[101],"presents":[102],"case-study":[104],"outlining":[105],"arose":[110],"when":[111],"considering":[112],"examine":[119],"online":[120],"far-right":[121],"violent":[122],"extremism.":[123],"It":[124],"argues":[125],"under":[127],"certain":[128],"circumstances,":[129],"researchers":[130],"can":[131],"do":[132,140],"data.":[137],"so":[141],"we":[142],"must":[143],"proactively":[144],"continually":[146],"engage":[147],"deeply":[148],"quandaries":[151],"dilemmas.":[153]},"counts_by_year":[],"updated_date":"2025-11-18T23:46:17.205004","created_date":"2025-11-18T00:00:00"}
