SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Ethics in Social Science Research
IFY Social Science
Term 1
Content
sheffield.ac.uk/international-college
2
• What is ethics?
• Why do we discuss ethics in the context of social research?
• How do ethical consideration shape our research?
What is ethics?
sheffield.ac.uk/international-college
3
• ‘Ethics’ usually refers to moral principles that one must follow. Ethics is also a branch of
philosophy that deals with moral principles and is often called moral philosophy.
behaving ethically is usually understood as doing the ‘right thing’.
• In the context of social research, however, ‘ethics’ refers to the moral principles that
researchers must follow in their research.
• Procedural ethics refer to the aspects of compliance in performing research. For
example, in some research projects, consent forms may need to be completed before
the data collection can begin.
• ‘Ethics in practice’ refer to the everyday ethical issues that a researcher may encounter
while doing research.
Ethical Guidelines for Research
sheffield.ac.uk/international-college
4
• In modern day academia, internationally
recognised guidelines are in place to
ensure ethical research.
• These have largely developed in response
to several notorious example of unethical
research (Facial expressions experiment
(1924), Milgram experiment (1963),
Stanford prison experiment (1971), Good
Samaritan experiment (1973) and others).
• Ethical guidelines help the researcher
make the right decisions. Examples include
the Belmont Report (medicine, US 1978),
BERA guidelines (education, UK), UK
Research and Innovation (UKRI) policy,
guidelines on governance of good research
conduct, and the European code of
conduct for research integrity.
Image source: QS Study
sheffield.ac.uk/international-college
5
Guidelines examples
For example:
• The Belmont Report (1979) outlined three ethical principles: respect for persons;
beneficence (doing good and avoiding harm); justice (fair distribution of
burden/benefits). It also outlined three practical application: informed consent;
assessment of risk and benefits; selection of subjects.
• BERA guidelines are based on similar principles:
Social science is fundamental to a democratic society, and should be inclusive of
different interests, values, funders, methods and perspectives. […] All social
science should respect the privacy, autonomy, diversity, values and dignity of
individuals, groups and communities. […] All social science should be conducted
with integrity throughout, employing the most appropriate methods for the research
purpose. […] All social scientists should act with regard to their
social responsibilities in conducting and disseminating their research. i.e. All social
science should aim to maximise benefit and minimise harm.
Image source: Bioethics
Research Library
Main ethical challenges and considerations for social scientists
sheffield.ac.uk/international-college
6
• Informed consent
• Deception in research
• Privacy, confidentiality and
anonymity
• Coercion
• Storing data
• Special volunrability
Image source: UCL
Informed Consent
sheffield.ac.uk/international-college
7
• A researcher must get permission from
their participants before participating
in their research.
• Informed consent should give
participants enough information to
make a fair assessment of the project.
• Form of consent depends on the type
of respondent, the nature of the
research process and the context.
• There may be several levels of
consent required.
Image source: Userfocus
Deception
sheffield.ac.uk/international-college
8
• Deception involves withholding information from, or giving false
information to, participants about the topic, hypothesis or
methods of a research project.
• In some cases, researchers argue that it is necessary for them
to be deceptive so they can effectively carry out their research.
• This is particularly the case in ‘covert participant observation.’
For example, if you wanted to study illegal drug taking
behaviour you might have to go ‘undercover’ to be able to study
this particular group of people. If they knew about you or your
research they might refuse to take part or change their
behaviour.
• In various other cases, paraphrasing the aims or a study can be
justified, to avoid influencing the results.
• Difficult to decide what level or deception is acceptable and in
which situations. Image source: Pixers
Privacy, Confidentiality and Anonymity
sheffield.ac.uk/international-college
9
• Anonymity and confidentiality protect the privacy of
those who voluntarily agree to participate in
research. This can encourage participation, too.
• In a confidential study, the participant is known by
the researcher. The interviewer knows the name of
the participant and may know the address or other
personal, identifying information.
• In an anonymous study, the researcher cannot
trace the data to an individual participant.
• It is very important that the researcher protects the
privacy of the participant.
• Personal information should be replaced with
numerical codes or pseudonyms (made-up
names), and sometimes needs to be locked or
encrypted.
Image source: GroupDynamics
Coercion
sheffield.ac.uk/international-college
10
• Willingness of participants to volunteer may be
influenced by the expectation of benefits or
rewards. To enhance participation in a research
project and to compensate for people’s time,
researchers often offer a reward or ‘thank you’ gift.
• Small rewards for their time (e.g. an Amazon
voucher) or renumeration for time may be
acceptable. However, too large a gift may make the
participants feel pressured into continuing
participating in a research study they are unsure
of/have changed their mind about.
• Dishonest means of persuasion, such as posing as
a state official, making unrealistic and untrue
promises, targeting people in vulnerable situations,
threatening participants and bribing them must
always be avoided.
Image source: ThinkImmigration
Sensitive Data
sheffield.ac.uk/international-college
11
• Researchers may uncover information that if revealed could do damage to the participants or to other
people. Therefore, Careful thought must be given to the implications of divulging information to others.
• Because data is often sensitive or confidential, storing it safely and limiting access to it are essential.
For example, Paper-based and audio data should be locked away, computer databases should be
protected by a password, and where transmission of data is essential, it must also be in secured
channels.
• There are also laws that we must abide by.
In the UK: The Data Protection Act (1998) covers all collections of
personal data.
• Researchers should ensure they know who to contact for
support regarding any sensitive information –
safeguarding lead, supervisor, manager etc. Image source: TechPrivacy
How can we address these issues?
sheffield.ac.uk/international-college
12
1. Record and validate your data. Make the data available, following its use, to professional social scientists.
– Allow oversight from other professionals;
– Keeps a record of the research process;
– Allow collaboration from others on better (less ethically challenging) research methods.
2. Protect the privacy of your subjects and do them no harm.
– Follow proper data protection procedures;
– Ensure the safety of yourself and others e.g. do not carry out research in people’s homes alone;
– Ensure you know who to go to if something arises.
3. Pilot study
– Gives you the chance to ‘practice’ your study and uncover any serious ethical issues before you do
the real thing.
Special consideration: Vulnerable participants
sheffield.ac.uk/international-college
13
• Vulnerability is a key concern in ethics, and ensuring the needs of vulnerable people involved must be
proved for research to be allowed or funded.
• Different types of vulnerability include:
– Innate/personal - characteristics unique to an individual person that may be sensitive. E.g. health and
psychological issues (anxiety, Alzheimer’s disease, autism, self-esteem, obesity, illiteracy, or nonstandard
appearances).
– Structural/contextual/environmental factors. E.g. homeless, drugs abuse, sex work, or living in a war-torn
country.
– Children and young people (teenagers) are always considered vulnerable.
• Careful consideration needs to be taken around issues of consent (are they competent to give consent?),
methods (are they appropriate?), anonymity/confidentiality and safeguarding.
• A researcher must ensure that the vulnerability is not enhanced or made worse by research processes.
Summary
sheffield.ac.uk/international-college
14
• Ethical guidelines help the researcher to make the right decisions
• Ethical consideration include: informed consent, deception in research,
privacy, coercion, sensitive topics and storing of the data
• Key focal points include:
• recording and validating your data
• protecting the privacy of research subjects and doing them no harm
• giving special consideration to vulnerable participants

Weitere ähnliche Inhalte

Was ist angesagt?

Social Construct of Gender
Social Construct of GenderSocial Construct of Gender
Social Construct of Gender
Denise Aguilar
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
Vikas Dalmia
 
Lesson 6 social stratification.doc
Lesson 6 social stratification.docLesson 6 social stratification.doc
Lesson 6 social stratification.doc
Jamaica Tapiculin
 
Transformative Paradigm
Transformative ParadigmTransformative Paradigm
Transformative Paradigm
Jairo Gomez
 

Was ist angesagt? (14)

Introduction to Survey Research
Introduction to Survey ResearchIntroduction to Survey Research
Introduction to Survey Research
 
Research Methodologies
Research MethodologiesResearch Methodologies
Research Methodologies
 
Social Construct of Gender
Social Construct of GenderSocial Construct of Gender
Social Construct of Gender
 
Sociological Perspectives
Sociological PerspectivesSociological Perspectives
Sociological Perspectives
 
Week 3: Society
Week 3: Society Week 3: Society
Week 3: Society
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Role Of Community Advisory Board
Role Of Community Advisory BoardRole Of Community Advisory Board
Role Of Community Advisory Board
 
Research ethics overview for social science researchers
Research  ethics  overview for social science researchers Research  ethics  overview for social science researchers
Research ethics overview for social science researchers
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
 
Lesson 6 social stratification.doc
Lesson 6 social stratification.docLesson 6 social stratification.doc
Lesson 6 social stratification.doc
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Topic7 research ethics (1)
Topic7 research ethics (1)Topic7 research ethics (1)
Topic7 research ethics (1)
 
Transformative Paradigm
Transformative ParadigmTransformative Paradigm
Transformative Paradigm
 
Tribal Movements.ppt
Tribal Movements.pptTribal Movements.ppt
Tribal Movements.ppt
 

Ähnlich wie IFY_SSc_Lecture4_Ethics.pptx

Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptx
XiaolanDeng1
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
MaiJoy
 
Common Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptxCommon Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptx
JhalakVerma7
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in research
R.Harish Kumar
 

Ähnlich wie IFY_SSc_Lecture4_Ethics.pptx (20)

Research ethics
Research ethicsResearch ethics
Research ethics
 
Research Ethics -PPT.ppt
Research Ethics -PPT.pptResearch Ethics -PPT.ppt
Research Ethics -PPT.ppt
 
role of ethics in research.pptx
role of ethics in research.pptxrole of ethics in research.pptx
role of ethics in research.pptx
 
GROUP 6-1.pptx
GROUP 6-1.pptxGROUP 6-1.pptx
GROUP 6-1.pptx
 
Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptx
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
Introduction of Research Integrity
 Introduction of Research Integrity Introduction of Research Integrity
Introduction of Research Integrity
 
Research Ethics.pptx
Research Ethics.pptxResearch Ethics.pptx
Research Ethics.pptx
 
Research ethics
Research  ethicsResearch  ethics
Research ethics
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Bioethic(research ethics)
Bioethic(research ethics)Bioethic(research ethics)
Bioethic(research ethics)
 
Common Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptxCommon Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptx
 
Ethical issues in research
Ethical issues in researchEthical issues in research
Ethical issues in research
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
How do you define research ethics? Discuss Ethics and the Research Process. ...
 How do you define research ethics? Discuss Ethics and the Research Process. ... How do you define research ethics? Discuss Ethics and the Research Process. ...
How do you define research ethics? Discuss Ethics and the Research Process. ...
 
Research methodology
Research methodologyResearch methodology
Research methodology
 
Ch3 research methods
Ch3 research methodsCh3 research methods
Ch3 research methods
 
Chapter5
Chapter5Chapter5
Chapter5
 
RESEARCH ETHICS.pptx
RESEARCH ETHICS.pptxRESEARCH ETHICS.pptx
RESEARCH ETHICS.pptx
 
EHICAL ISSUES IN CONDUCTING RESEARCH.pptx
EHICAL ISSUES IN CONDUCTING RESEARCH.pptxEHICAL ISSUES IN CONDUCTING RESEARCH.pptx
EHICAL ISSUES IN CONDUCTING RESEARCH.pptx
 

Mehr von EyalClyne

W7 State Power Authority.pptx
W7 State Power Authority.pptxW7 State Power Authority.pptx
W7 State Power Authority.pptx
EyalClyne
 
L6 Crime and dev.pptx
L6 Crime and dev.pptxL6 Crime and dev.pptx
L6 Crime and dev.pptx
EyalClyne
 
L4 Workshop II - Annotating and grouping info.pptx
L4 Workshop II - Annotating and grouping info.pptxL4 Workshop II - Annotating and grouping info.pptx
L4 Workshop II - Annotating and grouping info.pptx
EyalClyne
 
FSSc Week 3 Media.pptx
FSSc Week 3 Media.pptxFSSc Week 3 Media.pptx
FSSc Week 3 Media.pptx
EyalClyne
 
L2 Workshop I - Starting to work.pptx
L2 Workshop I - Starting to work.pptxL2 Workshop I - Starting to work.pptx
L2 Workshop I - Starting to work.pptx
EyalClyne
 
IFY_SSc_Lecture1_Intro_Social Science.pptx
IFY_SSc_Lecture1_Intro_Social Science.pptxIFY_SSc_Lecture1_Intro_Social Science.pptx
IFY_SSc_Lecture1_Intro_Social Science.pptx
EyalClyne
 
Lecture 1 Education and Social Mobility Jan 2023.pptx
Lecture 1 Education and Social Mobility Jan 2023.pptxLecture 1 Education and Social Mobility Jan 2023.pptx
Lecture 1 Education and Social Mobility Jan 2023.pptx
EyalClyne
 
IFY_SSc_Lecture8_Symbolic Interactionism.pptx
IFY_SSc_Lecture8_Symbolic Interactionism.pptxIFY_SSc_Lecture8_Symbolic Interactionism.pptx
IFY_SSc_Lecture8_Symbolic Interactionism.pptx
EyalClyne
 
IFY_SSc_Lecture7_conflict theory.pptx
IFY_SSc_Lecture7_conflict theory.pptxIFY_SSc_Lecture7_conflict theory.pptx
IFY_SSc_Lecture7_conflict theory.pptx
EyalClyne
 
IFY_SSc_Lecture6_Functionalism
IFY_SSc_Lecture6_FunctionalismIFY_SSc_Lecture6_Functionalism
IFY_SSc_Lecture6_Functionalism
EyalClyne
 
IFY_SSc_Lecture5_Social Theories.pptx
IFY_SSc_Lecture5_Social Theories.pptxIFY_SSc_Lecture5_Social Theories.pptx
IFY_SSc_Lecture5_Social Theories.pptx
EyalClyne
 
IFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptxIFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptx
EyalClyne
 

Mehr von EyalClyne (12)

W7 State Power Authority.pptx
W7 State Power Authority.pptxW7 State Power Authority.pptx
W7 State Power Authority.pptx
 
L6 Crime and dev.pptx
L6 Crime and dev.pptxL6 Crime and dev.pptx
L6 Crime and dev.pptx
 
L4 Workshop II - Annotating and grouping info.pptx
L4 Workshop II - Annotating and grouping info.pptxL4 Workshop II - Annotating and grouping info.pptx
L4 Workshop II - Annotating and grouping info.pptx
 
FSSc Week 3 Media.pptx
FSSc Week 3 Media.pptxFSSc Week 3 Media.pptx
FSSc Week 3 Media.pptx
 
L2 Workshop I - Starting to work.pptx
L2 Workshop I - Starting to work.pptxL2 Workshop I - Starting to work.pptx
L2 Workshop I - Starting to work.pptx
 
IFY_SSc_Lecture1_Intro_Social Science.pptx
IFY_SSc_Lecture1_Intro_Social Science.pptxIFY_SSc_Lecture1_Intro_Social Science.pptx
IFY_SSc_Lecture1_Intro_Social Science.pptx
 
Lecture 1 Education and Social Mobility Jan 2023.pptx
Lecture 1 Education and Social Mobility Jan 2023.pptxLecture 1 Education and Social Mobility Jan 2023.pptx
Lecture 1 Education and Social Mobility Jan 2023.pptx
 
IFY_SSc_Lecture8_Symbolic Interactionism.pptx
IFY_SSc_Lecture8_Symbolic Interactionism.pptxIFY_SSc_Lecture8_Symbolic Interactionism.pptx
IFY_SSc_Lecture8_Symbolic Interactionism.pptx
 
IFY_SSc_Lecture7_conflict theory.pptx
IFY_SSc_Lecture7_conflict theory.pptxIFY_SSc_Lecture7_conflict theory.pptx
IFY_SSc_Lecture7_conflict theory.pptx
 
IFY_SSc_Lecture6_Functionalism
IFY_SSc_Lecture6_FunctionalismIFY_SSc_Lecture6_Functionalism
IFY_SSc_Lecture6_Functionalism
 
IFY_SSc_Lecture5_Social Theories.pptx
IFY_SSc_Lecture5_Social Theories.pptxIFY_SSc_Lecture5_Social Theories.pptx
IFY_SSc_Lecture5_Social Theories.pptx
 
IFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptxIFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptx
 

KĂźrzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

KĂźrzlich hochgeladen (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

IFY_SSc_Lecture4_Ethics.pptx

  • 1. Ethics in Social Science Research IFY Social Science Term 1
  • 2. Content sheffield.ac.uk/international-college 2 • What is ethics? • Why do we discuss ethics in the context of social research? • How do ethical consideration shape our research?
  • 3. What is ethics? sheffield.ac.uk/international-college 3 • ‘Ethics’ usually refers to moral principles that one must follow. Ethics is also a branch of philosophy that deals with moral principles and is often called moral philosophy. behaving ethically is usually understood as doing the ‘right thing’. • In the context of social research, however, ‘ethics’ refers to the moral principles that researchers must follow in their research. • Procedural ethics refer to the aspects of compliance in performing research. For example, in some research projects, consent forms may need to be completed before the data collection can begin. • ‘Ethics in practice’ refer to the everyday ethical issues that a researcher may encounter while doing research.
  • 4. Ethical Guidelines for Research sheffield.ac.uk/international-college 4 • In modern day academia, internationally recognised guidelines are in place to ensure ethical research. • These have largely developed in response to several notorious example of unethical research (Facial expressions experiment (1924), Milgram experiment (1963), Stanford prison experiment (1971), Good Samaritan experiment (1973) and others). • Ethical guidelines help the researcher make the right decisions. Examples include the Belmont Report (medicine, US 1978), BERA guidelines (education, UK), UK Research and Innovation (UKRI) policy, guidelines on governance of good research conduct, and the European code of conduct for research integrity. Image source: QS Study
  • 5. sheffield.ac.uk/international-college 5 Guidelines examples For example: • The Belmont Report (1979) outlined three ethical principles: respect for persons; beneficence (doing good and avoiding harm); justice (fair distribution of burden/benefits). It also outlined three practical application: informed consent; assessment of risk and benefits; selection of subjects. • BERA guidelines are based on similar principles: Social science is fundamental to a democratic society, and should be inclusive of different interests, values, funders, methods and perspectives. […] All social science should respect the privacy, autonomy, diversity, values and dignity of individuals, groups and communities. […] All social science should be conducted with integrity throughout, employing the most appropriate methods for the research purpose. […] All social scientists should act with regard to their social responsibilities in conducting and disseminating their research. i.e. All social science should aim to maximise benefit and minimise harm. Image source: Bioethics Research Library
  • 6. Main ethical challenges and considerations for social scientists sheffield.ac.uk/international-college 6 • Informed consent • Deception in research • Privacy, confidentiality and anonymity • Coercion • Storing data • Special volunrability Image source: UCL
  • 7. Informed Consent sheffield.ac.uk/international-college 7 • A researcher must get permission from their participants before participating in their research. • Informed consent should give participants enough information to make a fair assessment of the project. • Form of consent depends on the type of respondent, the nature of the research process and the context. • There may be several levels of consent required. Image source: Userfocus
  • 8. Deception sheffield.ac.uk/international-college 8 • Deception involves withholding information from, or giving false information to, participants about the topic, hypothesis or methods of a research project. • In some cases, researchers argue that it is necessary for them to be deceptive so they can effectively carry out their research. • This is particularly the case in ‘covert participant observation.’ For example, if you wanted to study illegal drug taking behaviour you might have to go ‘undercover’ to be able to study this particular group of people. If they knew about you or your research they might refuse to take part or change their behaviour. • In various other cases, paraphrasing the aims or a study can be justified, to avoid influencing the results. • Difficult to decide what level or deception is acceptable and in which situations. Image source: Pixers
  • 9. Privacy, Confidentiality and Anonymity sheffield.ac.uk/international-college 9 • Anonymity and confidentiality protect the privacy of those who voluntarily agree to participate in research. This can encourage participation, too. • In a confidential study, the participant is known by the researcher. The interviewer knows the name of the participant and may know the address or other personal, identifying information. • In an anonymous study, the researcher cannot trace the data to an individual participant. • It is very important that the researcher protects the privacy of the participant. • Personal information should be replaced with numerical codes or pseudonyms (made-up names), and sometimes needs to be locked or encrypted. Image source: GroupDynamics
  • 10. Coercion sheffield.ac.uk/international-college 10 • Willingness of participants to volunteer may be influenced by the expectation of benefits or rewards. To enhance participation in a research project and to compensate for people’s time, researchers often offer a reward or ‘thank you’ gift. • Small rewards for their time (e.g. an Amazon voucher) or renumeration for time may be acceptable. However, too large a gift may make the participants feel pressured into continuing participating in a research study they are unsure of/have changed their mind about. • Dishonest means of persuasion, such as posing as a state official, making unrealistic and untrue promises, targeting people in vulnerable situations, threatening participants and bribing them must always be avoided. Image source: ThinkImmigration
  • 11. Sensitive Data sheffield.ac.uk/international-college 11 • Researchers may uncover information that if revealed could do damage to the participants or to other people. Therefore, Careful thought must be given to the implications of divulging information to others. • Because data is often sensitive or confidential, storing it safely and limiting access to it are essential. For example, Paper-based and audio data should be locked away, computer databases should be protected by a password, and where transmission of data is essential, it must also be in secured channels. • There are also laws that we must abide by. In the UK: The Data Protection Act (1998) covers all collections of personal data. • Researchers should ensure they know who to contact for support regarding any sensitive information – safeguarding lead, supervisor, manager etc. Image source: TechPrivacy
  • 12. How can we address these issues? sheffield.ac.uk/international-college 12 1. Record and validate your data. Make the data available, following its use, to professional social scientists. – Allow oversight from other professionals; – Keeps a record of the research process; – Allow collaboration from others on better (less ethically challenging) research methods. 2. Protect the privacy of your subjects and do them no harm. – Follow proper data protection procedures; – Ensure the safety of yourself and others e.g. do not carry out research in people’s homes alone; – Ensure you know who to go to if something arises. 3. Pilot study – Gives you the chance to ‘practice’ your study and uncover any serious ethical issues before you do the real thing.
  • 13. Special consideration: Vulnerable participants sheffield.ac.uk/international-college 13 • Vulnerability is a key concern in ethics, and ensuring the needs of vulnerable people involved must be proved for research to be allowed or funded. • Different types of vulnerability include: – Innate/personal - characteristics unique to an individual person that may be sensitive. E.g. health and psychological issues (anxiety, Alzheimer’s disease, autism, self-esteem, obesity, illiteracy, or nonstandard appearances). – Structural/contextual/environmental factors. E.g. homeless, drugs abuse, sex work, or living in a war-torn country. – Children and young people (teenagers) are always considered vulnerable. • Careful consideration needs to be taken around issues of consent (are they competent to give consent?), methods (are they appropriate?), anonymity/confidentiality and safeguarding. • A researcher must ensure that the vulnerability is not enhanced or made worse by research processes.
  • 14. Summary sheffield.ac.uk/international-college 14 • Ethical guidelines help the researcher to make the right decisions • Ethical consideration include: informed consent, deception in research, privacy, coercion, sensitive topics and storing of the data • Key focal points include: • recording and validating your data • protecting the privacy of research subjects and doing them no harm • giving special consideration to vulnerable participants