Chapter 2 Learning Objectives Understand What issues are covered in research ethics The goal of no harm for all research activities and what constitutes no harm for participant researcher and research ID: 512224
Download Presentation The PPT/PDF document "Ethics in Business Research" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Ethics in Business Research
Chapter 2Slide2
Learning Objectives
Understand . . .
What issues are covered in research ethics.
The goal of “no harm” for all research activities and what constitutes no harm for participant, researcher, and research
sponsor.Slide3
Learning Objectives
Understand . . .
Differing ethical dilemmas and responsibilities of researchers, sponsors,
and research assistants.
Role of ethical codes of conduct in professional associations.Slide4
Pull Quote
“Today, it would be remiss to say that the privacy profession is anything but flourishing. Companies are increasingly hiring privacy officers and even elevating them to C-suite positions; the European Commission has proposed a statute in its amended data protection framework that would require data protection officers at certain organizations, and, at the International Association of Privacy Professionals (IAPP) membership recently hit 10,000 worldwide.”
Angelique Carson,
CIPP/US,
International Association of Privacy ProfessionalsSlide5
Ethical Issues and the Research ProcessSlide6
Types of Ethical Violations
Violating
disclosure
agreements
Breaking
confidentiality
Misrepresenting
results
Deceiving
participants
Padded
invoices
Avoiding
legal liabilitySlide7
Ethical Codes of ConductSlide8
Ethical Treatment of Participants
Do no harm
Explain study benefits
Explain participant rights and protections
Obtain informed consentSlide9
Components of Informed Consent
Researcher Intro
Describe Survey Topic
Describe geographic sample
Reveal sponsor
Describe purpose
Good Faith Time Estimate
Anonymity & confidentiality
Voluntary Participation
Item nonresponse acceptable
Permission to beginSlide10
Characteristics of Informed Consent
Elements
Competent to
Give Consent
Adequately Informed
Knowledge
of Risks
Voluntary
ConsentSlide11
Ethical Responsibilities
Special guidelines apply to children!
Informed consent means parental approval.Slide12
Deception
Disguising
non-research
activities
Camouflaging
true research
objectivesSlide13
Reasons for Deception
Prevent biasing
participants
Protect confidentiality
of the sponsorSlide14
Debriefing
Explain any deception
Describe hypothesis, goal or purpose
Share results
Provide follow-upSlide15
Protect Participant Confidentiality
Minimize instruments requiring ID
Non-
disclosure of data subsets
Restrict access to ID
Obtain signed
nondisclosure
Reveal only with written consentSlide16
Right to Privacy
Right to refuse
Prior permission to interview
Limit time requiredSlide17
The U.S. Safe Harbor Agreement
Security
Notice
Access
Enforcement
Choice
Onward Transfer
Data IntegritySlide18
Sponsor Confidentiality
Sponsor Nondisclosure
Purpose Nondisclosure
Findings NondisclosureSlide19
Unethical Behavior to Avoid
Violating participant confidentiality
Changing data
Creating false data
Changing data interpretations
Changing data presentation
Injecting bias in interpretations
Omitting sections of data
Making recommendations beyond scope of dataSlide20
What To Do If Coerced?
Educate
on
purpose
Emphasize
fact-finding
role
Explain
problems
Terminate
RelationshipSlide21
Principles of Effective Codes of Ethics
Enforceable
Specify Behavior
Regulate
ProtectSlide22
Key Terms
Code of ethics
Confidentiality
Debriefing
Deception
Ethics
Informed consent
Nondisclosure
Findings
Purpose
Sponsor
Right to privacy
Right to quality
Right to safetySlide23
Additional Discussion opportunities
Chapter 2Slide24
Snapshot: Location Based Services
Know data collection, sharing procedures
Appoint privacy trained personnel to ensure privacy
Treat LBS as sensitive information
Demonstrate informed consent
Sensitive to parent expectations
Stay current on privacy developmentsSlide25
Snapshot: Ethics of Mobile Surveys
Recruiting
Financial Disadvantage
Privacy & Intrusion
Tracking BehaviorSlide26
Snapshot: Has Trust Trumped Privacy
“91 percent of U.S.
online adults worry to some degree about their privacy online, while 53 percent said they ‘don’t completely trust companies with their business online.”
Privacy Fundamentalists
PrivacyPragmatists
Privacy
UnconcernedsSlide27
Snapshot: OffshoringSlide28
Research Thought Leaders
“[Privacy pragmatists are] often willing to allow people to have access to, and to use, their personal information where they understand the reasons for its use, where they see tangible benefits for so doing, and when they believe care is taken to prevent the misuse of this information.”
Humphrey Taylor
chairman of The Harris Poll®
Harris Interactive.Slide29
PulsePoint: Research Revelation
89
The percent of consumer PCs infected with spyware.Slide30
PulsePoint: Research Revelation
$944
The amount, in millions,
that employers will lose
this year due to employee
fraud.Slide31
Procter & Gamble
Admits to competitive intelligence gathering
Contracted BI firm took documents from Unilever trash receptacles
Out-of-court settlement rumored (and reported) at $10mSlide32
Ethical Approaches
Ethical
standards
Ethical
Relativism
DeontologySlide33
Ethical Approaches
Ethical
Relativism
Deontology
How would you assess the P&G case using the two ethical approaches?Slide34
Ethics in Business Research
Chapter 2Slide35
Photo Attributions
Slide
Source
6
Chris Ryan/Getty Images
14
Polka Dot Images/Jupiterimages
18
ERproductions
Ltd./Getty Images
20
Brand X Pictures/
Photolibrary
24
©Jose Luis
Pelaez
Inc
/Blend Images LLC
25
©Siri Stafford/Digital Vision/Getty Images
26
Ingram Publishing
27
Courtesy of Foundation for Transparency in Offshoring
31
Florian
Franke
/
Purestock
/
SuperStock
33
Ingram Publishing