COMMENTARY ON CONDUCTING RESEARCH IN ONLINE COMMUNITIES 1
|
|
|
- Abigail Melton
- 10 years ago
- Views:
Transcription
1 COMMENTARY ON CONDUCTING RESEARCH IN ONLINE COMMUNITIES 1 Brian Schrag Indiana University This case raises issues in research ethics which are in part old and in part new. On the one hand there is the old issue of whether it is ethically justified to do observational research on public human behavior. A newer question is whether listserves on the internet are public spaces and whether there are privacy norms that are applicable and place restrictions even in public spaces. I will address three issues in this case. I. IS THIS HUMAN SUBJECTS RESEARCH? The first issue is whether or not the research proposed in this case is properly classified as human subjects research as defined in the Code of Federal Regulations and therefore falls under the United States guidelines for human subjects research. In Part 1 of this case, Dr. McIntosh s first suggestion is that Roger simply lurk on line as an unregistered guest and do his research, since the web site can be accessed by unregistered guests to read current postings and archived postings. Is this human subjects research? The relevant guidelines are found in the Code of Federal Regulations PART 46, PRO- TECTION OF HUMAN SUBJECTS. (CFR (1), (2) provide the definition and (CFR (b) (2) (4) identifies the activities that are exempt from human research guidelines (Code of Federal Regulation). Consider first the definitions of human subjects research in the Code of Federal Regulation. (PART 46, PROTECTION OF HUMAN SUBJECTS Definitions): (f), Human subject means a living individual about whom an investigator (whether professional or student) conducting research obtains 1
2 2 Teaching Ethics, Spring 2008 (1) Data through intervention or interaction with the individual, or (2) Identifiable private information. Intervention includes both physical procedures by which data are gathered (for example, venipuncture) and manipulations of the subject or the subject s environment that are performed for research purposes. Interaction includes communication or interpersonal contact between investigator and subject. Private information includes information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information which has been provided for specific purposes by an individual and which the individual can reasonably expect will not be made public (for example, a medical record). Private information must be individually identifiable (i.e., the identity of the subject is or may readily be ascertained by the investigator or associated with the information) in order for obtaining the information to constitute research involving human subjects. In Part I, if Roger merely lurks on line, observing postings or looking at archived postings, there is presumably no interaction between Roger and the members of the group; neither is there any intervention since he is not manipulating the subject or the subjects environment. The information Roger would obtain is available to anyone who accesses the web site as an unregistered guest. It is reasonable to say the information is as public as that in a daily newspaper. Given these considerations, it is reasonable to say that the research proposed in Part 1 does not constitute Human Subjects research under the U. S. Code of Federal Regulations. In Part 2, an alternate proposal to download only the site s archived messages posted the previous year is considered. The forum moderator indicates that participants did not expect at the time of posting that their messages would be used for research purposes; that most participants were unaware that their postings are publicly available and that they view their messages as private communications to other members of the NFF forum. The moderator will only help Roger if Roger first seeks permission from the entire NFF support group. The fact that participants are unaware that their postings are publicly available and that they consider them private, does not change the status of the research under the definition. This research still does not fall under the definition of Human Subjects research. For a systematic dis-
3 Brian Schrag: Response: Commentary on Conducting Research in Online Communities 3 cussion of what counts as human subjects research on the internet under the Code of Federal Regulation see (Walther). In Part 3, Roger decides to post a message to the community to inform them that he would like to conduct research on NFF s activities during the next year. At that point Roger has begun to interact with the group. By making the group aware that it is possible for them to be monitored, Roger has destroyed their illusion that this is a private space and may make them self-conscious about their postings. In that sense, Roger has intervened in the group and perhaps already altered the group behavior, whether or not they give him permission to proceed. If they consent to the research, the same research activity which did not previously fall under the definition of Human Subjects research certainly does now. Impact of Human Subjects Research on Group Function The primary function of this website is to provide mutual support for a group of persons who are concerned with a disorder which is surely distressing to those who have it or those with a loved one with the disorder and all of whom are aware of the social stigma associated with the disorder. Their focus is understandably on that situation and they may deliberately keep access boundaries minimal in order to encourage those who seek support to join in. Their focus is thus inward on their group, not a wider public of strangers scrutinizing their every word. It is not credible to assume group participants would not be affected by the realization that a complete stranger was observing them and reporting their interactions to a larger world of strangers. In this sense, this particular group differs from other groups such as those involved in Face Book where participants assume that what they write is for a wider public. Thus one effect Roger and his mentor may have in doing their study of this group as proposed in Part 3 is to undermine the function of the group. The group has been created as a support group. That presupposes its members share a common concern and develop a certain trust and a climate of mutual support among the members. It has to be disruptive to be aware that a stranger, who does not share those concerns, is observing and at some point reporting their interactions (Elgesem). That is so whether their anonymity is protected or not. (Imagine the impact on group dynamics if an Alcoholics Anonymous group was aware that a researcher was sitting in on their meeting and would be reporting their discussions and interactions to a wider audience.) Undermining this narcolepsy group s function as a support group is a moral harm. How does Roger justify the moral harm done to this
4 4 Teaching Ethics, Spring 2008 group in order to observe them? What is the research value of this study that is so important that it justifies undermining the very purpose of the group s existence, especially since there may be many other groups Roger could study for which this is not a consideration? Is this Research Subject to Research Guidelines of Other Countries? Although it is understandable to approach this case from the perspective of the U.S. Code of Federal Regulation, it is worth noting that since postings in this case could have been made by citizens in other countries, (and Roger has no way of knowing the background of the group) it is quite possible that participant s perceptions of the ethical acceptability of research by lurking and the research guidelines of those countries having to do with invasion of privacy in research on human subjects could be quite different than that reflected in the U.S. Code. It is worth noting that European research guidelines are much more inclined to assume a deontological emphasis on rights of individuals and not (as does the U.S. code) allow utilitarian considerations of benefits to others to override those values (Ess). Is this Observation of Internet Behavior, the Observation of Public Behavior? Whether the research proposed in either Part 1 or Part 3 of this case falls under the definition of Human subjects research is one issue. However, even if, in Part 3 of the case, the research does fall under the definition of Human Subjects research, it may be exempt from humans subjects research guidelines because, it could be argued, it involves observation of public behavior. The exemptions from human subjects research Guidelines are specified in the Code of Federal Regulations (b): (Code of Federal Regulation) (b) research activities in which the only involvement of research subjects will be in one or more of the following categories are exempt from this policy: (2) Research involving the use of educational tests (cognitive, diagnostic, aptitude, achievement), survey procedures, interview procedures or observation of public behavior, unless: (i) information obtained is recorded in such a manner that human subjects can be identified, directly or through identifiers linked to the subjects; and (ii) any disclosure of the
5 Brian Schrag: Response: Commentary on Conducting Research in Online Communities 5 human subjects responses outside the research could reasonably place the subjects at risk of criminal or civil liability or be damaging to the subjects financial standing, employability, or reputation. (4) Research involving the collection or study of existing data, documents, records, pathological specimens, or diagnostic specimens, if these sources are publicly available or if the information is recorded by the investigator in such a manner that subjects cannot be identified, directly or through identifiers linked to the subjects. Assuming Roger can protect the identity of persons in the group, then if the behavior being observed is in public or the archives of group discussions are public, then Roger may be exempt from human subjects guide lines and is not required by the regulations to obtain informed consent from the subjects. (I hasten to add that, even if the research is exempt, there may still be good reasons to bring this research before an IRB for their review.) It is an open question whether, in fact, Roger can protect the identity of the participants in doing this research. Bruckman details just how difficult it is to disguise and protect the identity of subjects in research in this sort of online setting (Bruckman). II. IS THE INTERNET IN THE PUBLIC SPHERE? This case raises issues beyond that of simply asking what the Code of Federal Regulations would require of researchers. It raises a new conceptual issue that has implications for this sort of research; that is, should we view the narcolepsy listserve as a public space or public sphere? For the purposes of research ethics, is this listserve a public space, or is it relevantly analogous to a public space, or is it something altogether different? In doing research ethics on the web, it is common to assert an analogy between a public space and space in a public chat room and therefore between observation of subjects in a public sphere and observation of online behavior (Ess). The issue of whether there is an exemption in this research to human subjects guidelines as discussed above does assume that such spaces on the internet constitute a public space. Is that really so? If the listserve literally is a public space, then there is a case to be made that ethical guidelines regarding observing human action in that
6 6 Teaching Ethics, Spring 2008 internet space is no different than guidelines for observing human behavior in the public square. The behavior is thus public and in that sense up for grabs. Anyone is free to observe anyone else in the public square and since a listserve is just a variant on the public square, no listserve participant can complain about being the object of surveillance in that setting. The paradigm of a public space is a public square, with actual people walking about, observable to all, perhaps with people sitting at open air cafes holding conversations accessible to others at nearby tables. Yet, on the internet, people are not in the same physical location, not in visual contact, perhaps not even in the same temporal coordinates. What is true is that the internet is a technically accessible medium. But why should technical accessibility be equated with being in the public space? (Berry, 2004) Walther, for example, presupposes that a listserve is literally a public space or relevantly analogous to a public space in which participants cannot reasonably expect that what they say and do should be treated as private. As he notes, research use of conversation, if gathered in a publicly accessible venue is not human subjects research by definition and is parallel to recording conversations in a public park. Collection of data which is publicly available is analogous to collecting data from old newspapers or public broadcasts (Walther, p. 207). Bruckman, on the other hand, challenges that analogy and argues that our intuitive notions of public and private in this context can be misleading, and that a web page is neither a public place, like an art gallery nor a private place like one s home it is a web page. Bruckman argues that, in thinking about research on the postings on the narcolepsy listserve, rather than invoking the analogy of a person in a public square or public park, perhaps the appropriate analogy is an author of a published work (Bruckman). Is it conceptually clearer to think of the internet as a space in which embodied persons interact, or is it conceptually more appropriate to think of the internet as a textual repository where authors deposit their work? (Berry) It is true that we do argue that a letter to the editor of a newspaper, addressed to fellow citizens is a public document in the public sphere. But, in that setting, the letter is intentionally addressed to a wide audience of strangers. How is that comparable to what is written by members of the narcolepsy group? What is distinctive of their writings is that they are written explicitly to their group members who share a fairly narrow set of therapeutic goals; they are not writing to the universe as a whole.
7 Brian Schrag: Response: Commentary on Conducting Research in Online Communities 7 If one thinks of postings on the internet as creative writings of authors, then that shifts the use of those materials from a focus on human subjects research guidelines to the permission of the use of copyrighted material. One effect of that shift in paradigm is to force a recognition that such postings, even if public, are not simply up for grabs as taped conversations in the park by the researcher may be, but must be treated as copyrighted material. It is beyond the scope of this commentary to resolve the issue but perhaps it is enough to raise the issue to caution researchers not to simply assume that the internet is a public space and all the usual understandings regarding doing research in public spaces apply. III. IS THERE NO PRIVACY IN THE PUBLIC SPHERE? There is a larger issue that goes beyond the question of whether this research is activity in the public sphere. Suppose we grant for the moment that the activity of the narcolepsy group falls within the category of the public sphere. There is a yet more fundamental question to address. That is the question of whether there can be privacy in the public sphere. That possibility challenges the very presupposition of the conventional public/private distinction. The conventional wisdom, which underlies longstanding practice in observational research in the social sciences and the Code of Federal Regulation human subjects research guidelines, is as Helen Nissenbaum puts it: If you have chosen to expose yourself and information about yourself in public view with the result that others have access to you or to information about you without intruding upon your private realm, then any restrictions on what they may observe, record or do with this information cannot be justified. (Nissenbaum, 1998 p. 572) This is not an issue unique to the internet. In the social sciences, there is a long history of assuming that public behavior is fair game for observational research and that there is implicit consent in a subject s public behavior that such behavior may be studied by others. Lurking on the internet, in this case, may be no different than anthropologists observing and writing about the behavior of an isolated, indigenous tribe without the tribe s knowledge or consent or the infamous case of the observational research in the Tearoom Trade case. In all such cases, sub-
8 8 Teaching Ethics, Spring 2008 jects may be unaware that their public behavior is being recorded and reported to a wider audience of complete strangers. Nissenbaum and other scholars (Nissenbaum, 1997, 1998, 2004; Rachels, 1975; Scanlon, 2001; Schoeman, 1984) have begun to challenge this conventional wisdom and argue for a fundamental rethinking of the public/private distinction and argue for the notion of a sphere of privacy in public. Nissenbaum has been at the forefront of that discussion as it relates to the internet. We cannot rehearse the entire argument for this perspective but the basic argument is this. We all live our lives in multiple contexts, realms or spheres, including such contexts as our work setting, visiting friends, seeking health care, shopping, banking and walking the public streets. Each of these contexts is governed by norms, including norms for the exchange of information. The central point is that there is no place that is not governed by informational norms. The notion that when one ventures out in public no norms are in operation is simply pure fiction. Nissenbaum posits two forms of informational norms for these contexts. One is a norm of appropriateness. This norm dictates that information which may be appropriate and fitting to reveal in one particular context may not be fitting and appropriate to reveal in another context. The kind of information appropriately shared by a patient with a doctor is not necessarily the kind of information that would be appropriate for a doctor to share about himself with a patient. Information on one s financial standing may be appropriately shared with a bank but not necessarily appropriately shared by the banker with acquaintances. It is understood to be inappropriate to take information that is appropriate in one context, e.g. revealing information about oneself in a group therapy session and insert it into another context e.g a researcher sharing that information in a research project. The second is a norm for distribution or transfer of information. We recognize that there are norms regarding the flow of information about ourselves. It is expected that if one shares information with a friend, it would be a violation of the norms of friendship for the friend to share that information with strangers. It would be a violation of the norms of support groups if information revealed about oneself in that context were to be transformed by someone else into data for their research paper. On this view then, as Nissenbaum put it, personal information revealed in a particular context is always tagged with that context and never up for grabs as
9 Brian Schrag: Response: Commentary on Conducting Research in Online Communities 9 other accounts would have us believe of public information gathered in public places. (Nissenbaum, 2004, p. 121) It is beyond the scope of this commentary to assess Nissenbaum s analysis but if her analysis is right, it does help one to see why there may be a difference between information about a person being technically accessible on the internet and a researcher being morally justified in appropriating that information. The mere fact that such information is public in the sense of technically accessible does not justify its acquisition and use by a researcher. That is what is wrong with Roger lurking on line and using the data from the narcolepsy group for his research. That is what is wrong with downloading the archived data without their consent and perhaps what is wrong with him even approaching them for consent. Nissenbaum s analysis also raises questions about the general practice, particularly in the social sciences, of research involving observation of human behavior in a public setting. None of this is captured by the current Code of Federal Regulations research guidelines and may call into question the adequacy of those guidelines. NOTE 1 Reprinted with permission: Research Ethics: Cases and Commentaries, Volume 7, Association for Practical and Professional Ethics, February 2006, pp Prepared under NSF Grant Number SES REFERENCES Bassett, Elizabeth H. and O Riordan, Kate. Ethics of Internet Research: Contesting the Human Subjects Research Model, Ethics and Information Technology, Volume 4, Number 3, 2002, pp Berry, David M. Internet Research: Privacy, Ethics and Alienation: an Open Source Approach, Internet Research, Vol 14, No. 4, 2004, pp Bruckman, Amy. Studying the Amateur Artist: A perspective on Disguising Data Collected in Human Subjects Research on the Inter-
10 10 Teaching Ethics, Spring 2008 net, Ethics and Information Technology, Volume 4, Number 3, 2002, pp Capurro Rafael and Pingel, Christoph. Ethical Issues of Online Communication Research, Ethics and Information Technology, Volume 4, Number 3, 2002, pp Code of Federal Regulations, TITLE 45, PUBLIC WELFARE, DEPARTMENT OF HEALTH AND HUMAN SERVICES, PART 46, PROTECTION OF HUMAN SUBJECTS November 17, Ess, Charles. Introduction, Ethics and Information Technology, Volume 4, Number 3, 2002, pp Elgesem, Dag. What is Special About the Ethical issues in Online Research? Ethics and Information Technology, Volume 4, Number 3, 2002 pp Nissenbaum, Helen. Toward an Approach to Privacy in Public: Challenges of Information Technology, Ethics and Behavior, 7(3) 1997, pp Protecting Privacy in an Information Age: The Problem of Privacy in Public, Law and Philosophy, 17: 1998, pp Privacy as Contextual Integrity, Washington Law Review, Vol. 79, No. 1, 2004, pp Rachels, James. Why Privacy is Important, Philosophy and Public Affairs, 1975, 4: Scanlon, Michael. Informational Privacy and Moral Values, Information Technology, Volume 3, 2001, pp Schoeman, F., (ed.). Philosophical Dimensions of Privacy: An Anthology, Cambridge: Cambridge University Press, Walther, Joseph B. Research Ethics in Internet-Enabled Research: Human Subjects Issues and Methodological Myopia, Ethics and Information Technology, Volume 4, Number 3, 2002, pp
Instructions for Form: Application for Claim of Exemption
Instructions for Form: Application for Claim of Exemption In order to decide whether your activity involves research that may be reviewed and approved at the exempt level, review the following information.
Human Subjects Research at OSU
Office of Responsible Research Practices 300 Research Foundation 1960 Kenny Road Columbus, OH 43210-1063 Human Subjects Research at OSU Phone (614) 688-8457 Fax (614) 688-0366 www.orrp.osu.edu Behavioral
Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006)
NOÛS 43:4 (2009) 776 785 Critical Study David Benatar. Better Never To Have Been: The Harm of Coming into Existence (Oxford: Oxford University Press, 2006) ELIZABETH HARMAN Princeton University In this
Kant s deontological ethics
Michael Lacewing Kant s deontological ethics DEONTOLOGY Deontologists believe that morality is a matter of duty. We have moral duties to do things which it is right to do and moral duties not to do things
Making ethical decisions in an online context:
Making ethical decisions in an online context: Reflections on using blogs to explore narratives of experience Helene Snee, University of Manchester Framing the Gap Year: Distinction, Difference and Identity
Scanlon and the claims of the many versus the one
288 michael otsuka the Kantian principle is true, so is Weak PAP; and Frankfurter s known arguments in opposition to PAP are in conflict with this basic Kantian moral intuition. 5 Bar-Ilan University Ramat
Research Involving Human Biological Materials: Ethical Issues and Policy Guidance Executive Summary
Research Involving Human Biological Materials: Ethical Issues and Policy Guidance Executive Summary Introduction Biomedical researchers have long studied human biological materials such as cells collected
Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues
Office for Human Research Protections (OHRP) Department of Health and Human Services (HHS) Guidance on Withdrawal of Subjects from Research: Data Retention and Other Related Issues This guidance represents
Chapter Four. Ethics in International Business. Introduction. Ethical Issues in International Business
Chapter Four Ethics in International Business 4-2 Introduction Business ethics are the accepted principles of right or wrong governing the conduct of business people An ethical strategy is a strategy or
Ethics in International Business
4 Ethics in International Business INTRODUCTION Ethics refers to accepted principles of right or wrong that govern the conduct of a person, the members of a profession, or the actions of an organization.
6.9 Social Media Policy
Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government
HUMAN RESOURCES POLICIES & PROCEDURES
HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to
Miami University: Human Subjects Research General Research Application Guidance
Miami University: Human Subjects Research General Research Application Guidance Use the accompanying Word template for completing the research description. You must provide sufficient information regarding
Killing And Letting Die
[This essay originally appeared in the Encyclopedia of Ethics, 2nd edition, ed. Lawrence Becker and Charlotte Becker (New York: Routledge, 2001), vol. 2, pp. 947-50.] Killing And Letting Die Is it worse
The ABC s of Basic Advocacy and Negotiation skills
The ABC s of Basic Advocacy and Negotiation skills This section was prepared by Ann Shalof, a nonprofit professional focused on youth advocacy and empowerment. Most recently, as Associate Director of Youth
ETHICAL APPROACHES TO PUBLIC RELATIONS
ETHICAL APPROACHES TO PUBLIC RELATIONS Ethical baselines for justifying persuasion The following models are most often used to justify persuasive communication. 1 Enlightened self-interest Under this model,
Last May, philosopher Thomas Nagel reviewed a book by Michael Sandel titled
Fourth Quarter, 2006 Vol. 29, No. 4 Editor s Watch Sandel and Nagel on Abortion Last May, philosopher Thomas Nagel reviewed a book by Michael Sandel titled Public Philosophy in The New York Review of Books.
Internet Safety/CIPA Lesson Plan
Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,
Perspectives from FSF Scholars May 10, 2013 Vol. 8, No. 13
Perspectives from FSF Scholars May 10, 2013 Vol. 8, No. 13 The Constitutional Foundations of Intellectual Property by Randolph J. May * and Seth L. Cooper ** Introduction Intellectual property (IP) protection
STANDARD OPERATING POLICY AND PROCEDURE
STANDARD OPERATING POLICY AND PROCEDURE SUBJECT: Biospecimen Request and Release Policy Number: 500.0 Policy Date: 1/16/2009 Amendment Date: N/A Revision Date: 5-3-2010 I. INTRODUCTION AND PURPOSE The
Professional Ethics PHIL 3340. Today s Topic Absolute Moral Rules & Kantian Ethics. Part I
Professional Ethics PHIL 3340 Today s Topic Absolute Moral Rules & Kantian Ethics Part I Consequentialism vs. Deontology Consequentialism: A type of ethical theory stating that to act morally we must base
Social Media. The Good, The Bad, The Really Ugly
Social Media The Good, The Bad, The Really Ugly Hospitals Using Social Media No longer a luxury it s a necessity Bottom Line It expands our reach to a broader audience Allows us to disseminate health information
Ethical Guidelines for the Online Researcher
Ethical Guidelines for the Online Researcher The practice of using the internet as a tool for social science research is a comparatively new phenomenon. It is of paramount importance that the researcher
Follow links for Class Use and other Permissions. For more information send email to: [email protected]
COPYRIGHT NOTICE: Richard Raatzsch: The Apologetics of Evil is published by Princeton University Press and copyrighted, 2009, by Princeton University Press. All rights reserved. No part of this book may
SAN DIEGO COMMUNITY COLLEGE DISTRICT INSTITUTIONAL REVIEW BOARD (IRB) INVESTIGATOR GUIDELINES FOR RESEARCH USING HUMAN SUBJECTS
BACKGROUND SAN DIEGO COMMUNITY COLLEGE DISTRICT INSTITUTIONAL REVIEW BOARD (IRB) INVESTIGATOR GUIDELINES FOR RESEARCH USING HUMAN SUBJECTS The first priority of the SDCCD Institutional Review Board (IRB)
Comments on Professor Takao Tanase s Invoking Law as Narrative: Lawyer s Ethics and the Discourse of Law
Proceedings from the 2005 Sho Sato Conference in Honor of Takao Tanase Comments on Professor Takao Tanase s Invoking Law as Narrative: Lawyer s Ethics and the Discourse of Law Norman Spaulding Stanford
Facebook s Emotional Contagion: Social Media Research
Facebook s Emotional Contagion: Social Media Research Mount Allison University March 11, 2015 Gordon DuVal, SJD [email protected] www.gduval.com Emotional Contagion 2 3 Facebook Research In 2012, Facebook
It has been contended that it would be possible for a socialist economy to solve
THE EQUATIONS OF MATHEMATICAL ECONOMICS AND THE PROBLEM OF ECONOMIC CALCULATION IN A SOCIALIST STATE LUDWIG VON MISES I It has been contended that it would be possible for a socialist economy to solve
Measuring Quality in Graduate Education: A Balanced Scorecard Approach
Measuring Quality in Graduate Education: A Balanced Scorecard Approach Dr. S. Kim Sokoya Professor of Management Associate Dean, Graduate and Executive Education Jones College of Business Middle Tennessee
PhD in Information Studies Goals
PhD in Information Studies Goals The goals of the PhD Program in Information Studies are to produce highly qualified graduates for careers in research, teaching, and leadership in the field; to contribute
How to be Secure and Get Accurate Medical Information from Internet
Bahrain Medical Bulletin, Vol.23, No.4, December 2001 Editorial How to be Secure and Get Accurate Medical Information from Internet Ibrahim Mansoor, MBBS* Internet has seeped into every corner of medicine.
IRB REVIEW OF USE OF RESEARCH REPOSITORIES
IRB Review of Research Data Repositories at the Portland VA Medical Center IRB REVIEW OF USE OF RESEARCH REPOSITORIES 1. PURPOSE: To set policies and procedures for appropriate establishment, review, approval,
The Ontology of Cyberspace: Law, Philosophy, and the Future of Intellectual Property by
The Ontology of Cyberspace: Law, Philosophy, and the Future of Intellectual Property by David R. Koepsell, Peru, Illinois: Open Court Publishing, 2000, ISBN 0-8126-9423-6, (Price $26.95); Paper: ISBN 0-8126-9537-2,
Social Media and Our Guiding Principles
Social Media and Our Guiding Principles Social Media and Our Guiding Principles The rise of social media and social networking in recent years has had significant and widespread effects on how members
Field Guide to Consulting and Organizational Development. Table of Contents
Field Guide to Consulting and Organizational Development Collaborative and Systems Approach to Performance, Change and Learning Introduction Focus of Guidebook Audiences Content of Guidebook How to Use
Principle 3 (cont.) Principle 4:
CODE OF ETHICS The Idaho board of Alcohol/Drug Counselor s Certification, Inc. is comprised of professional alcoholism and drug abuse counselors who, as responsible health care professionals, believe in
4. Which sector do you belong to? Please check one box.
CONSULTATION QUESTIONNAIRE FOR ITU/UNICEF GUIDELINES FOR INDUSTRY ON CHILD ONLINE PROTECTION December 2013 The Institute for Human Rights and Business (IHRB) appreciates the opportunity to provide written
work Privacy Your Your right to Rights Know
Your right to Privacy Know Your Rights www.worksmart.org.uk at work Everyone has the right to a private life even when they re at work. But new technology is making it easier than ever for employers to
In Defense of Kantian Moral Theory Nader Shoaibi University of California, Berkeley
In Defense of Kantian Moral Theory University of California, Berkeley In this paper, I will argue that Kant provides us with a plausible account of morality. To show that, I will first offer a major criticism
Critical Analysis o Understanding Ethical Failures in Leadership
Terry Price focus on the ethical theories and practices of the cognitive account. The author argues that leaders that even put their own interests aside may not be ethically successful. Thus, volitional
IAHIP Code of Ethics FOR PSYCHOTHERAPISTS 1.0. INTRODUCTION
IAHIP Code of Ethics FOR PSYCHOTHERAPISTS 1.0. INTRODUCTION 1.1 The purpose of this Code is to establish and maintain standards for psychotherapists, who are accredited members of the Irish Association
Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence
Freedom of information guidance Exemptions guidance Section 41 Information provided in confidence 14 May 2008 Contents Introduction 2 What information may be covered by this exemption? 3 Was the information
Social Presence Online: Networking Learners at a Distance
Education and Information Technologies 7:4, 287 294, 2002. 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Social Presence Online: Networking Learners at a Distance ELIZABETH STACEY Faculty
The Right of a State to Control Immigration
The Right of a State to Control Immigration Caleb Yong Nuffield College, Oxford [email protected] DRAFT only. Please do not cite. Comments very welcome. NOTE: This is a revised version of one
Navigating Ethical Challenges in Behavior Analysis: Translating Code into Conduct. What today is about EHICAL CHALLENGES 8/3/14
Navigating Ethical Challenges in Behavior Analysis: Translating Code into Conduct Mary Jane Weiss, Ph.D., BCBA-D National Autism Conference Penn State August, 2014 What today is about Understanding guidelines
Behavioral Consultants:
Behavioral Consultants: Who Are They and How Do I Find the Right One? What is a Behavioral Consultant and How is This Different From a Psychologist? These questions are often asked by people trying to
Designing Learning for All Learners
Foreword Designing Learning for All Learners Martha L. Minow How can public policy help us envision and implement a new kind of curriculum one that expands learning opportunities for everyone rather than
School of Social Work
MSW Core Curriculum for Generalist Practice St. Catherine University/University of St. Thomas Core and Advanced Competencies of the MSW Program The SCU/UST MSW curriculum prepares its graduates for advanced
Instructional Designer Standards: Competencies & Performance Statements
Standards Set 2012 ibstpi Instructional Designer Standards: Competencies & Performance Statements The 2012 ibstpi Instructional Designer Competencies and Performance statements are copyrighted by the International
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
GUIDELINES FOR THE USE OF SOCIAL MEDIA. January 2010
GUIDELINES FOR THE USE OF SOCIAL MEDIA January 2010 Revised July 2010 Prepared by: The Voices Technology and Best Practice Team TABLE OF CONTENTS Overview of Document...2 General Rules to Follow...3 Social
Chapter 2 ETHICAL DECISION-MAKING: PERSONAL AND PROFESSIONAL CONTEXTS
Chapter 2 ETHICAL DECISION-MAKING: PERSONAL AND PROFESSIONAL CONTEXTS McGraw-Hill/Irwin Copyright 2014 by The McGraw-Hill Companies, Inc. All rights reserved. ETHICS IS TOUGHER THAN YOU THINK... "This
What is public theology?
What is public theology? David Bromell 1 Visiting Fellow, Centre for Theology and Public Issues University of Otago, May 2011 This paper addresses a set of four related questions. What is the proper Does
"I'll Be Glad I Did It" Reasoning and the Significance of Future Desires. Elizabeth Harman. Word Count: 4,499. I. Two Puzzles
RoME Version 2009 "I'll Be Glad I Did It" Reasoning and the Significance of Future Desires Elizabeth Harman Word Count: 4,499 I. Two Puzzles We use I ll be glad I did it reasoning all the time. For example,
USE OF HUMAN SUBJECTS IN RESEARCH PRESENTED BY BRIAN WEIMER TULANE UNIVERSITY RESEARCH COMPLIANCE OFFICER
USE OF HUMAN SUBJECTS IN RESEARCH PRESENTED BY BRIAN WEIMER TULANE UNIVERSITY RESEARCH COMPLIANCE OFFICER June 14, 2011 Objectives of Presentation What is the role of the Research Compliance Officer? Why
What are communities of practice?
Communiitiies of practiice a briieff iinttroducttiion Etienne Wenger The term "community of practice" is of relatively recent coinage, even though the phenomenon it refers to is age-old. The concept has
Examining a Thesis in the Visual Arts
Examining a Thesis in the Visual Arts Dr George Petelin, Convenor, Higher Degrees by Research, Queensland College of Art 1. How do Higher Degrees by Research with a Visual Arts creative component vary
NIA Article - ASX Guidelines for Good Corporate Governance
NIA Article - ASX Guidelines for Good Corporate Governance In the wake of the shambles of the collapse of HIH Insurance in Australia, and against the back ground of a series of overseas collapses such
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Research Data Management Procedures
Research Data Management Procedures pro-123 To be read in conjunction with: Research Data Management Policy Version: 2.00 Last amendment: Oct 2014 Next Review: Oct 2016 Approved By: Academic Board Date:
Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White
Principles of Good Research & Research Proposal Guidee Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White March 2006 Principles of Good Research All research is different
IMPROVING QUALITY. Quality criteria for global education school visits
IMPROVING QUALITY Quality criteria for global education school visits Organisations that have worked on these quality criteria: Pro Ethical Trade Finland Kepa Service Centre for Development Cooperation
What Is the Narcotics Anonymous Program?
Who Is an Addict? Most of us do not have to think twice about this question. We know! Our whole life and thinking was centered in drugs in one form or another the getting and using and finding ways and
Social Media Policy for ALPFA Staff, Leaders and Volunteers
Empowering Latino Leaders Social Media Policy for ALPFA Staff, Leaders and Volunteers alpfa.org Introduction: At ALPFA, our mission is to empower and develop Latino men and women as leaders of character
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA): FACT SHEET FOR NEUROPSYCHOLOGISTS Division 40, American Psychological Association DISCLAIMER This general information fact sheet is made available
BEing There Counseling
BEing There Counseling Booklet #1 BEing There Counseling 823 Mease Road Grand Junction, Colorado 81505 Tel. (970) 245-6502 website: www.beingthere.net email: [email protected] 2 BEing There Counseling
Doctor of Education - Higher Education
1 Doctor of Education - Higher Education The University of Liverpool s Doctor of Education - Higher Education (EdD) is a professional doctoral programme focused on the latest practice, research, and leadership
Administrative Procedures Memorandum A1300
Page 1 of 8 Date of Issue October 2013 Original Date of Issue June 2012 Subject INFORMATION AND COMPUTING TECHNOLOGY - APPROPRIATE USE GUIDELINES FOR STUDENTS References This APM replaces A1160 Computing
Objections to Friedman s Shareholder/Stockholder Theory
Objections to Friedman s Shareholder/Stockholder Theory 1. Legal Morally Permissible: Almeder offers several criticisms of Friedman s claim that the only obligation of businesses is to increase profit
Ethics and the Senior Design Project: A Guide. All Senior Design Projects require the completion of a written section addressing the
1 Ethics and the Senior Design Project: A Guide All Senior Design Projects require the completion of a written section addressing the ethical significance of the project. This brief guide is meant to help
Private Today, Public Tomorrow
Estimated time: 40 minutes Essential Question: How can you respect the privacy of others online? Learning Overview and Objectives Overview: Students reflect on their responsibility to protect the privacy
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
wwwww The Code of Ethics for Social Work Statement of Principles
wwwww The Code of Ethics for Social Work Statement of Principles Copyright British Association of Social Workers Date: January 2012 Author: The Policy, Ethics and Human Rights Committee Contact: Fran McDonnell,
PEOPLE'S RIGHT TO SAFETY
Roundtable D i s cu s s io n PEOPLE'S RIGHT TO SAFETY In May 2002, the 6th World Conference on Injury Prevention and Control was held in Montreal, Canada. An outcome of that conference was the finalization
Book Review of Rosenhouse, The Monty Hall Problem. Leslie Burkholder 1
Book Review of Rosenhouse, The Monty Hall Problem Leslie Burkholder 1 The Monty Hall Problem, Jason Rosenhouse, New York, Oxford University Press, 2009, xii, 195 pp, US $24.95, ISBN 978-0-19-5#6789-8 (Source
Johari Window A model for self-awareness, personal development, group development and understanding relationship
Johari Window A model for self-awareness, personal development, group development and understanding relationship Adapted from www.businessballs.com, Copyright alan chapman 2003 The Johari Window model
Certified Substance Abuse Counselor (CSAC) Code of Ethics Principle 1: Non-Discrimination Principle 2: Responsibility Principle 3: Competence
Certified Substance Abuse Counselor (CSAC) Code of Ethics (Adopted from the Code of Ethics of the National Association of Alcoholism and Drug Abuse Counselors - Revised 5/20/95) Principle 1: Non-Discrimination
Universal Declaration on Bioethics and Human Rights
Universal Declaration on Bioethics and Human Rights Adopted by the UNESCO General Conference, 19 October 2005 The General Conference, Conscious of the unique capacity of human beings to reflect upon their
Compass Interdisciplinary Virtual Conference 19-30 Oct 2009
Compass Interdisciplinary Virtual Conference 19-30 Oct 2009 10 Things New Scholars should do to get published Duane Wegener Professor of Social Psychology, Purdue University Hello, I hope you re having
How To Write A Community Conversation About The Raleigh Arts Plan
Raleigh Arts Plan Community Conversation Guide OVERVIEW The goal of an arts and cultural plan for Raleigh is to better meet the cultural needs for all residents. In order to accomplish this, our team needs
Ethical Standards for Publication of Aeronautics and Astronautics Research
Ethical Standards for Publication of Aeronautics and Astronautics Research I. Preface/Introduction II. AIAA Ethical Standards A. Ethical Standards for AIAA Journals B. Ethical Standards for AIAA Books
WOMEN S RECOVERY CENTER 25 Beulah Road New Britain, Pennsylvania. 18901 VOLUNTEER APPLICATION NAME: DATE: ADDRESS: TELEPHONE: EDUCATION:
25 Beulah Road New Britain, Pennsylvania. 18901 VOLUNTEER APPLICATION NAME: DATE: ADDRESS: TELEPHONE: EDUCATION: WORK EXPERIENCE: 1.) Why do you want to become a volunteer in the Recovery Center? 2.) How
Social Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
