Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ethics in Business Research

Similar presentations


Presentation on theme: "Ethics in Business Research"— Presentation transcript:

1 Ethics in Business Research
Chapter 2 Ethics in Business Research This chapter explains the ethical issues faced by researchers.

2 Learning Objectives Understand . . . What issues are covered in research ethics. The goal of “no harm” for all research activities and what constitutes no harm for participant, researcher, and research sponsor.

3 Learning Objectives Understand . . . Differing ethical dilemmas and responsibilities of researchers, sponsors, and research assistants. Role of ethical codes of conduct in professional associations.

4 Pull Quote Angelique Carson, CIPP/US,
“Today, it would be remiss to say that the privacy profession is anything but flourishing. Companies are increasingly hiring privacy officers and even elevating them to C-suite positions; the European Commission has proposed a statute in its amended data protection framework that would require data protection officers at certain organizations, and, at the International Association of Privacy Professionals (IAPP) membership recently hit 10,000 worldwide.” Angelique Carson, CIPP/US, International Association of Privacy Professionals

5 Ethics are norms or standards of behavior that guide moral choices about our behavior and our relationships with others. The goal of ethics in research is to ensure that no one is harmed or suffers adverse consequences from research activities. Unethical activities are pervasive and include many types of activities. Think: what is the difference between legal and ethical?

6 Ethical Issues and the Research Process

7 Types of Ethical Violations
Violating disclosure agreements Misrepresenting results Breaking confidentiality Deceiving participants Ethics are norms or standards of behavior that guide moral choices about our behavior and our relationships with others. The goal of ethics in research is to ensure that no one is harmed or suffers adverse consequences from research activities. Unethical activities are pervasive and include many types of activities. Some of these are listed in the slide. For some researchers, ethical and legal norms are the same. The text authors feel that legal constraints are the minimum standard but not the ideal. Padded invoices Avoiding legal liability

8 Ethical Codes of Conduct
These organizations offering codes specifically for researchers. Some of the logos in the slide are linked to the respective organization’s website where you can view the codes of ethics.

9 Ethical Treatment of Participants
Do no harm Explain study benefits Explain participant rights and protections Research must be designed so that a participant does not suffer physical harm, discomfort, pain, embarrassment, or loss of privacy. This slide lists the three guidelines researchers should follow to protect participants. When discussing benefits, the researcher should be careful not to overstate or understate the benefits. Informed consent means that the participant has given full consent to participation after receiving full disclosure of the procedures of the proposed study. Obtain informed consent

10 Components of Informed Consent
Researcher Intro Describe Survey Topic Describe geographic sample Reveal sponsor Describe purpose Good Faith Time Estimate Anonymity & confidentiality Research must be designed so that a participant does not suffer physical harm, discomfort, pain, embarrassment, or loss of privacy. This slide lists the three guidelines researchers should follow to protect participants. When discussing benefits, the researcher should be careful not to overstate or understate the benefits. Informed consent means that the participant has given full consent to participation after receiving full disclosure of the procedures of the proposed study. Voluntary Participation Item nonresponse acceptable Permission to begin

11 Characteristics of Informed Consent
Competent to Give Consent Elements Knowledge of Risks Voluntary Consent Since 1966, all projects with federal funding are required to be reviewed by an Institutional Review Board (IRB). An IRB evaluates the risks and benefits of proposed research. The review requirement may be more relaxed for projects that are unlikely to be risky – such as marketing research projects. Many institutions require that all research – whether funded or unfunded by the federal government – be reviewed by a local IRB. The IRBs concentrate on two areas. First is the guarantee of obtaining complete, informed consent from participants. The second is the risk assessment and benefit analysis review. Complete informed consent has four characteristics and these are named in the slide. The participant must be competent to give consent. Consent must be voluntary, and free from coercion. Participants must be adequately informed to make a decision. Participants should know the possible risks or outcomes associated with the research. Adequately Informed

12 Ethical Responsibilities
Special guidelines apply to children! Informed consent means parental approval. Special consideration is necessary when researching the behavior and attitudes of children. Besides providing informed consent, parents are often interviewed during the selection process to ensure that the child is mature enough and has the verbal and physical capabilities necessary.

13 Deception Disguising non-research activities Camouflaging
true research objectives  Deception occurs when participants are told only part of the truth or when the truth is fully compromised. Deception occurs when the participants are only told part of the truth or when the truth is fully compromised. Deception can take two forms. One form relates to disguising nonresearch activities as opinion or business research. For instance, research might be used to collect data that are used to sell merchandise. Personal information could be collected for illegal purposes. Sometimes researchers use deception as part of a research design. It involves camouflaging the true research objects or the identity of the sponsor. This form of deception is used to prevent biasing respondents or to protect the confidentiality of a third party. Some researchers believe that deception should never occur. It is generally accepted in the industry that the benefits to be gained by appropriate research design-based deception should be balanced against the risks to the participants.

14 Protect confidentiality
Reasons for Deception Prevent biasing participants Protect confidentiality of the sponsor  Deception occurs when participants are told only part of the truth or when the truth is fully compromised. Deception occurs when the participants are only told part of the truth or when the truth is fully compromised. Deception can take two forms. One form relates to disguising nonresearch activities as opinion or business research. For instance, research might be used to collect data that are used to sell merchandise. Personal information could be collected for illegal purposes. Sometimes researchers use deception as part of a research design. It involves camouflaging the true research objects or the identity of the sponsor. This form of deception is used to prevent biasing respondents or to protect the confidentiality of a third party. Some researchers believe that deception should never occur. It is generally accepted in the industry that the benefits to be gained by appropriate research design-based deception should be balanced against the risks to the participants.

15 Describe hypothesis, goal or purpose
Debriefing Explain any deception Describe hypothesis, goal or purpose Share results In situations where participants are intentionally or accidentally deceived, they should be debriefed once the research is complete. Debriefing describes the goals of the research, as well as the truth and reasons for any deception. Results are shared after the study is complete. Participants who require any medical or psychological follow-up attention will receive it during the debriefing process. Provide follow-up

16 Protect Participant Confidentiality
Obtain signed nondisclosure Non- disclosure of data subsets Restrict access to ID All individuals have a right to privacy, and researchers must respect that right. Once a guarantee of confidentiality is given, protecting that confidentiality is essential. Researchers protect participant confidentiality in several ways. Obtaining signed nondisclosure documents – only researchers who have signed nondisclosure forms should be allowed access to the data. Restricting access to participant identification. Revealing participant information only with written consent. Restricting access to data instruments where the participant is identified. Nondisclosure of data subsets. Methods 2-5 deal with minimizing the chance for a participant to identified and matched with his or her responses. Links between data and identifying information must be minimized. Interview response sheets should be inaccessible to everyone except the editors and data entry personnel. Data collection instruments may be destroyed once data are in a data file. For very small groups, data should not be made available if it would be easy to pinpoint a person in the group. Minimize instruments requiring ID Reveal only with written consent

17 Prior permission to interview
Right to Privacy Right to refuse Prior permission to interview For researchers to fully address participants’ right to privacy, they must also 1) inform participants of their right to refuse to answer any questions or participate in the study; 2) obtain prior permission to interview or observe participants; and 3) limit the time required for participation to limit the amount of information collected to only that which is deemed critical. Limit time required

18 Sponsor Confidentiality
Sponsor Nondisclosure Purpose Nondisclosure Some sponsors wish to undertake research without revealing themselves. They have a right to several types of confidentiality. Sponsor nondisclosure is used when the sponsor of the research restricts revealing the sponsorship. In this case, the sponsor may hire an outside firm to complete the research projects. Purpose nondisclosure is used when the sponsor camouflages the true research objective of the study. Findings nondisclosure is used when the sponsor restricts the researcher from discussing the findings of the research project. Findings Nondisclosure

19 Unethical Behavior to Avoid
Violating participant confidentiality Changing data Creating false data Changing data presentation Changing data interpretations Injecting bias in interpretations Research must be designed so that a participant does not suffer physical harm, discomfort, pain, embarrassment, or loss of privacy. This slide lists the three guidelines researchers should follow to protect participants. When discussing benefits, the researcher should be careful not to overstate or understate the benefits. Informed consent means that the participant has given full consent to participation after receiving full disclosure of the procedures of the proposed study. Omitting sections of data Making recommendations beyond scope of data

20 What To Do If Coerced? Educate Explain on problems purpose Emphasize
fact-finding role Occasionally, researchers may be asked by sponsors to participate in unethical behavior. What can the researcher do to remain ethical? There are four suggestions provided in the slide. The researcher can attempt to educate the sponsor to the purpose of the research, explain the researcher’s role as a fact-finder, explain how distorting the truth or breaking faith will lead to future problems, and if the others fail, terminate the relationship. Terminate Relationship

21 Principles of Effective Codes of Ethics
Enforceable Regulate Protect Many organizations have codes of ethics. A code of ethics is an organization’s codified set of norms or standards of behavior that guide moral choices about research behavior. Effective codes are those that 1) are regulative, 2) protect the public interest and the interests of the profession served by the code, 3) are behavior-specific, and 4) are enforceable. Exhibit 2-5 provides additional sources for ethics resources. Specify Behavior

22 Key Terms Code of ethics Nondisclosure Confidentiality Debriefing
Deception Ethics Informed consent Nondisclosure Findings Purpose Sponsor Right to privacy Right to quality Right to safety

23 Snapshot: Location Based Services
Know data collection, sharing procedures Appoint privacy trained personnel to ensure privacy Treat LBS as sensitive information Demonstrate informed consent Sensitive to parent expectations Stay current on privacy developments

24 Snapshot: Ethics of Mobile Surveys
Recruiting Financial Disadvantage Privacy & Intrusion Tracking Behavior

25 Ethical Approaches Deontology Teleology (Ethical Relativism) Ethical
standards There is no single approach to ethics. Deontology advocates that ethical behavior should be directed by duties regardless of the positive circumstances that might result from behavior that is in contradiction to the duty. An example might be “Do not lie,” even when lying might result in a positive outcome. Another approach is that of ethical relativism. Ethical relativism is based on an individual’s sense of morality. Therefore, each person decides for his or herself what is ethical behavior. A middle ground is necessary and provided through ethical standards of behavior for researchers.


Download ppt "Ethics in Business Research"

Similar presentations


Ads by Google