Ethics in Research Ethics in Research

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

Ethics in Research

Historical
Historical Context
Context


Past
– German Experimentation
– Tuskegee Syphilis Study

Present
– Cancer Research
– AIDS (AZT) Research
Historical
Historical Context
Context


Ethical system designed to prevent
people from being used as scientific
guinea pigs

Contemporary emphasis on the ‘rights’
of people to take risks to save
themselves
Ethical
Ethical Issues


Voluntary Participation
Ethical
Ethical Issues


Voluntary Participation

Informed Consent
Ethical
Ethical Issues


Voluntary Participation

Informed Consent

Risk of Harm
Ethical
Ethical Issues


Voluntary Participation

Informed Consent

Risk of Harm

Anonymity
Ethical
Ethical Issues


Voluntary Participation

Informed Consent

Risk of Harm

Anonymity

Confidentiality
Ethical
Ethical Issues


Voluntary Participation

Informed Consent

Risk of Harm

Anonymity

Confidentiality

Right to Services
Institutional
Institutional Review
Review Boards


mechanism for reviewing
proposed research

mechanism for protecting the
institution and researcher

submitting an IRB Proposal
Professional issues
• Scientific misconduct as specified and
regulated by professional organizations
and groups
• Peer Review process
A. Fraudulent activity
• Presentation or publication of forged,
falsified, or manipulated data
B. Research Publication Issues
• Plagiarism = present substantial
portions or elements of another's work
or data as their own
• Publication Credit = Authorship and
publication credit for only work
actually performed
• Partial Publication = publication of
several articles based on one large set
of data

• Dual Publication = publishing the same


data and results in more than one
journal or publication
C. Financial Conflict of Interest
• Fiducial interest of investigator
confounded with production of
research
Ethical Principles
•Principle A:
In planning a study, the
investigator has responsibility to
make a careful evaluation of its
ethical acceptability.
•Principle B:
Determine degree of risk to subject
(deception, stressful conditions, or
take medication).

•Principle C:
Investigator always retains
responsibility for ethical practice.
•Principle D:
Prior to conducting research, the
investigator must disclose obligations
and responsibilities of both subject
and investigator (influence willingness
to participate).

Not for: anonymous surveys or naturalistic


observation.
•Principle E:
If deception is going to be used:
(1) determine if justified;
(2) identify alternatives to deception,
if any;
(3) ensure participants provided with
sufficient explanation as
immediate as possible.
•Principle F:
Investigator respects individual's
freedom to decline at any time during
course of experiment.
•Principle G:
Investigator protects participant from
physical and mental discomfort, harm,
and danger that may arise from
research procedures.
•Principle H:
After collection of data, researcher
provides participant with information
about the nature of the study
(debriefing).
•Principle I:
If research procedures result in
undesirable consequences for
individual participant, investigator
has responsibility to detect and
remove or correct these consequences
(long-term).
•Principle J:
Information obtained about research
participant during the course of an
investigation is confidential unless
otherwise agreed upon in advance.
Keep all data and records from your research investigations for
at least 5 years. It’s a good idea, depending on the
investigation and the nature of the data, to keep them forever.

Any party with a legitimate interest has a right to inspect your


original data and data analyses (subject to participant
confidentiality controls):

journal editors/reviewers; professional review boards;


other research colleagues

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy