Skip to main content

Table of Contents

  1. Key questions
  2. Example of harm from social science research -
  3. Research merit and integrity
  4. Justice
  5. Special protections for vulnerable communities
  6. Ethics Controversies: Case Studies - Debates about the ethics of the Tearoom Trade Study Methodology
  7. Case 2: The Human Terrain System
  8. Informed consent
  9. Freedom from coercion
  10. Case 3: Gang Leader for a day
  11. When social scientists uncover crime through their research
    1. Confidentiality for research participants when crime occurs
  12. Other ethical problems in Venkatesh's research
  13. Responsibilities to people/cultures being studied
    1. Informed Consent
    2. Informed consent scenario
    3. Best practice:
    4. Protecting identities of participants
    5. Case Study
    6. Protecting identities of participants: scenario
  14. Do no harm: think about the ramifications of the research
  15. Reciprocity: paying people for their contributions
    1. Reciprocity and collaboration with the community you work with
  16. Intimacy in research: maintaining informed consent over time
    1. Case Study:
    2. Intimacy in ethnographic research: sex and the field
  17. Respect for persons:
  18. Protection from psychological or physical harm
  19. Intellectual property
  20. Summary of Principles of Ethical Research
  21. Council for International Organization of Medical Sciences (CIOMS)
  22. Death of Jesse Gelsinger (1999) Conflicts of Interest Example
  23. Respect for Persons
  24. Informed Consent
    1. Voluntariness
    2. Comprehension
    3. Disclosure
  25. Case Study: Study on Campus
  26. Informed Consent
    1. Consent Document 1
    2. Consent Document 2
  27. Requirements for documentation of informed consent
  28. Decisional Capacity
  29. Children's Participation in Research
    1. Lack of assent from a child
  30. Research with prisoners
  31. Community Consultation
  32. Beneficence
  33. Justice
  34. Compensation for Research Participation
    1. Avoiding undue inducement
    2. Case Study involving confidentiality of clinical data
  35. Confidentiality

Protecting identities of participants: scenario

1

Protecting identities of participants: scenario

Imagine you want to write about your family and you describe all the conflicts between relatives, including a particularly bad argument between your brother and sister at your sister's 21st birthday party. In your research you also describe your sister's drug use.

You use pseudonyms referring to your sister as "Emma". Despite this, given the context your mum reads it and quickly identifies that it is describing your brother and sister and puts two and two together about the drug use.

What would be a good strategy to have used to try and prevent this?

a)
b)
c)
d)
b) or c) You could decide not to write about your family on the grounds that it is harder for members of your own family to keep intimate details from you than in the situation where you are an entirely independent researcher. The problem with including a fictional sibling is that you might include too many fictional elements into your research and this would undermine its objectivity. Whether you write about your sister's drug use or not depends on how important it is given the context of the research. The best strategies are b or c. You could decide not to write about your family on the grounds that it is harder for members of your own family to keep intimate details from you than in the situation where you are an entirely independent researcher. The problem with including a fictional sibling is that you might include too many fictional elements into your research and this would undermine its objectivity. Whether you write about your sister's drug use or not depends on how important it is given the context of the research. Your answer has been saved.
Check your answer