{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:02:51Z","timestamp":1759971771219,"version":"build-2065373602"},"reference-count":63,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T00:00:00Z","timestamp":1668211200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Asso for Info Science &amp; Tech"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>How scholars and IRBs perceive and apply the Belmont principles in crowd work\u2010based research was an open and largely neglected question. As crowd work becomes increasingly popular for scholars to implement research and collect data, such negligence, signaling a lack of attention to the ethical issues in crowd work\u2010based research more broadly, seemed alarming. To fill this gap, we conducted a qualitative study with 32 scholars and IRB directors\/analysts in the United States to inquire into their perceptions and applications of the Belmont principles in crowd work\u2010based research. We found two dilemmas in applying the Belmont principles in crowd work\u2010based research, namely the dilemma between the dehumanization and expected autonomy of crowd workers, and the dilemma between the monetary incentive\/reputationall risks and the conventional notion of research benefits\/risks. We also compared the scholars' and IRBs' ethical perspectives and proposed our research implications for future work.<\/jats:p>","DOI":"10.1002\/asi.24724","type":"journal-article","created":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T10:39:56Z","timestamp":1668249596000},"page":"67-80","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["What scholars and <scp>IRBs<\/scp> talk when they talk about the Belmont principles in crowd <scp>work\u2010based<\/scp> research"],"prefix":"10.1002","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0838-7452","authenticated-orcid":false,"given":"Huichuan","family":"Xia","sequence":"first","affiliation":[{"name":"Department of Information Management Peking University  Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2022,11,12]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1215\/9780822393245"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2021.57"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2637485"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208699"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/2158244020980751"},{"key":"e_1_2_7_7_1","first-page":"169","volume-title":"Dehumanization, deindividuation, anomie and organizational justice","author":"Bell C. M.","year":"2011"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/ntwe.12038"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10508-016-0932-y"},{"key":"e_1_2_7_10_1","unstructured":"Bezos J.(2006).Opening Keynote. Paper presented at MIT emerging technologies conference. Retrieved fromhttp:\/\/video.mit.edu\/watch\/opening-keynote-andkeynote-interview-with-jeff-bezos-9197"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2018.28"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_7_13_1","unstructured":"Buhrmester M.(2018).M\u2010Turk guide. Retrieved fromhttps:\/\/michaelbuhrmester.wordpress.com\/mechanical-turk-guide\/"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/eat.23614"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.35808\/ijeba\/1"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.3115\/1699510.1699548"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-019-01273-7"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550617698203"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550619875149"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35142-6_14"},{"key":"e_1_2_7_22_1","unstructured":"Dreyfuss E.(2018 August 17).A bot panic hits Amazon's Mechanical Turk.WIRED. Retrieved fromhttps:\/\/www.wired.com\/story\/amazon-mechanical-turk-bot-panic\/"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-022-01955-9"},{"volume-title":"Internet research\u2014Ethical guidelines 3.0","year":"2020","author":"Franzke A. S.","key":"e_1_2_7_24_1"},{"key":"e_1_2_7_25_1","first-page":"7","article-title":"A ghost workers' bill of rights: How to establish a fair and safe gig work platform","volume":"1","author":"Friedland J.","year":"2020","journal-title":"California Management Review"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66435-4_2"},{"volume-title":"Ghost work: How to stop silicon valley from building a new global underclass","year":"2019","author":"Gray M.","key":"e_1_2_7_27_1"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174023"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_4"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428029.3428062"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470742"},{"volume-title":"Groundwork of the metaphysic of morals","year":"2009","author":"Kant I.","key":"e_1_2_7_32_1"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2016.1269304"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1017\/psrm.2020.6"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11019-007-9048-4"},{"issue":"8","key":"e_1_2_7_36_1","first-page":"611","article-title":"The Belmont report's misleading conception of autonomy","volume":"11","author":"Kristinsson S.","year":"2009","journal-title":"American Medical Association Journal of Ethics"},{"key":"e_1_2_7_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300649"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-014-0483-x"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781526437280"},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v1i1.13075"},{"volume-title":"Designing qualitative research","year":"2014","author":"Marshall C.","key":"e_1_2_7_41_1"},{"volume-title":"The Belmont report: Ethical principles and guidelines for the protection of human subjects of research","year":"1979","author":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research","key":"e_1_2_7_42_1"},{"volume-title":"Guidelines for academic requesters","year":"2014","author":"Northwestern University IRB","key":"e_1_2_7_43_1"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-013-0434-y"},{"key":"e_1_2_7_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376403"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479531"},{"key":"e_1_2_7_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10728-012-0233-0"},{"issue":"5","key":"e_1_2_7_48_1","first-page":"1633","article-title":"You get what you pay for: An empirical examination of the use of MTurk in legal scholarship","volume":"72","author":"Robertson A. Z.","year":"2019","journal-title":"Vanderbilt Law Review"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.789223"},{"key":"e_1_2_7_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11019-017-9781-2"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118795876"},{"key":"e_1_2_7_52_1","first-page":"1228","volume-title":"Proceedings of the web conference","author":"Savage S.","year":"2020"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucx053"},{"volume-title":"Amazon's Mechanical Turk for academics: The HIT handbook for social science research","year":"2016","author":"Sheehan K. B.","key":"e_1_2_7_54_1"},{"key":"e_1_2_7_55_1","doi-asserted-by":"crossref","unstructured":"Shmueli B. Fell J. Ray S. &Ku L.\u2010W.(2021).Beyond fair pay: Ethical implications of NLP crowdsourcing. ArXiv:2104.10097 [Cs].","DOI":"10.18653\/v1\/2021.naacl-main.295"},{"key":"e_1_2_7_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180492"},{"key":"e_1_2_7_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476060"},{"volume-title":"Mechanical Turk (MTurk) for online research","year":"2020","author":"UC Berkeley IRB","key":"e_1_2_7_58_1"},{"key":"e_1_2_7_59_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5283"},{"key":"e_1_2_7_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-12-2021-0126"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2022.548"},{"key":"e_1_2_7_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-020-09374-0"},{"key":"e_1_2_7_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134748"},{"key":"e_1_2_7_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326010"}],"container-title":["Journal of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.24724","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/asi.24724","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.24724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:06:25Z","timestamp":1759943185000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.24724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,12]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1002\/asi.24724"],"URL":"https:\/\/doi.org\/10.1002\/asi.24724","archive":["Portico"],"relation":{},"ISSN":["2330-1635","2330-1643"],"issn-type":[{"type":"print","value":"2330-1635"},{"type":"electronic","value":"2330-1643"}],"subject":[],"published":{"date-parts":[[2022,11,12]]},"assertion":[{"value":"2021-10-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}