SlideShare uma empresa Scribd logo
1 de 16
1




Ethics and Criminal
Justice Research
OUTLINE
   Ethical Issues in Criminal Justice Research
   Promoting Compliance with Ethical Principles
   Two Ethical Controversies
3




•Ethical concerns – Typically associated with
morality; both deal with matters of right & wrong
•Ethical - May be defined as behavior conforming to
the standards of conduct of a given group
•Matter of agreement among professionals
•We need to know of this general shared
conception among CJ researchers
4




•Dilemma – Balancing potential benefits against
possibility of harm
•Collecting info from active criminals presents
possibility of violence against them
•Psychological harm via remembrance of
unpleasant/traumatic experience
•Possible harm may be justified by potential benefit
of study (still arbitrary)
•Perrone – Drug use in N.Y. dance clubs
5




•CJ research often intrudes into people’s lives

•Asks them to reveal what is generally unknown

•Therefore, participation must be voluntary

•This threatens generalizability
6




•Anonymity – When researcher cannot identify a
given piece of information with a given person

•Confidentiality – A researcher can link information
with a subject, but promises not to do so publicly

•Techniques: Replace names/addresses with IDs,
specify when survey is C rather than A, specify that
info will not be disclosed to 3rd parties
7




•Generally considered unethical

•Sometimes useful and even necessary to identify
yourself as a researcher

•“Don’t go undercover”

•Widom (1999) – child abuse and illegal drug use

•Inciardi (1993) – studying crack houses
8




•Researchers have ethical obligations to scientific
community

•Make shortcomings and/or negative findings
known

•Tell the truth about pitfalls and problems you’ve
experienced

•It is as important to know that two things are not
related as to know that they are
9




•Researchers may expose themselves to criminal
liability by:
  •Failing to report observed criminal activity to the
  police
  •Engaging in participant observation studies
  where crimes are committed
•Subpoenas violate confidentiality
•Legal immunity (42 U.S. Code §22.28a)
10




•Becoming aware of staff misbehavior in agencies
•Research may produce crime or influence its
location or target
  •Crime may be displaced
•Withholding desirable treatments from control
group
•Mandatory Reporting: the Federal Child Abuse
Prevention and Treatment Act of 1974
11




•The National Research Act (1974): signed into law
after a few highly publicized examples of unethical
practices in medical and social science research
•The Belmont Report (1979): a brief, but
comprehensive set of ethical principles for
protecting human subjects
  •Respect for Persons
  •Beneficence
  •Justice
•The American Psychological Association (2002)
code of ethics is quite detailed, reflecting the
different professional roles of psychologists in
research, clinical treatment, and educational
contexts
  •Academy of Criminal Justice Sciences Ethical
  Standards
  •American Society of Criminology Code of Ethics
  •US Department of Health & Human Services
  •American Bar Association Code of Professional
  Responsibility
•Gov. agencies and non-gov. organizations must
establish Institutional Review Boards (IRBs)
  •Members make judgments about overall risks,
  and their acceptability
  •Whether research procedures includes
  safeguards to protect safety, confidentiality, and
  general welfare of subjects
14




•Informed consent – Requires that subjects both
have the capacity to understand and do
understand the research, risks, side effects,
benefits to subjects, and procedures used
  •New Jersey State Troopers and Racial Profiling

•Special populations – Specific regulations exist for
juveniles and prisoners
•Many social research study designs are
regarded as exempt from IRB review under
federal guidelines

•Exempt means that research proposals do
not have to be subject to full IRB review
TWO ETHICAL
          CONTROVERSIES
   Trouble in the tearoom
   The Standford prison experiment

Mais conteúdo relacionado

Mais procurados

Theories of crimes
Theories of crimesTheories of crimes
Theories of crimesjovi saquido
 
Rational choice theory
Rational choice theoryRational choice theory
Rational choice theoryShaista Mariam
 
Introduction to criminology lecture 1 module 1
Introduction to criminology lecture 1 module 1Introduction to criminology lecture 1 module 1
Introduction to criminology lecture 1 module 1JEN PAN
 
81-220-1 Chapter 7
81-220-1 Chapter 781-220-1 Chapter 7
81-220-1 Chapter 7mpalaro
 
Presentation. victimology
Presentation. victimologyPresentation. victimology
Presentation. victimologyAbu Bakkar
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminologyShaista Mariam
 
Intro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdfIntro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdfSarahJaneBeredo
 
Differential Association Theory- Cunningham
Differential Association Theory- CunninghamDifferential Association Theory- Cunningham
Differential Association Theory- Cunningham2576390
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - CriminologyDiana Dianot
 
9 Punishment: POWERPOINT
9 Punishment: POWERPOINT9 Punishment: POWERPOINT
9 Punishment: POWERPOINTmattyp99
 
Criminal Investigation Process
Criminal Investigation ProcessCriminal Investigation Process
Criminal Investigation ProcessMr Shipp
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Datayxl007
 
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...Cielo Gc
 
Ronald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpointRonald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpointlakers24123
 

Mais procurados (20)

Theories of crimes
Theories of crimesTheories of crimes
Theories of crimes
 
Rational choice theory
Rational choice theoryRational choice theory
Rational choice theory
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Introduction to criminology lecture 1 module 1
Introduction to criminology lecture 1 module 1Introduction to criminology lecture 1 module 1
Introduction to criminology lecture 1 module 1
 
81-220-1 Chapter 7
81-220-1 Chapter 781-220-1 Chapter 7
81-220-1 Chapter 7
 
Victimology.pptx
Victimology.pptxVictimology.pptx
Victimology.pptx
 
Presentation. victimology
Presentation. victimologyPresentation. victimology
Presentation. victimology
 
Introduction to chiminology
Introduction to chiminologyIntroduction to chiminology
Introduction to chiminology
 
Criminology Powerpoint One 2008
Criminology Powerpoint One 2008Criminology Powerpoint One 2008
Criminology Powerpoint One 2008
 
Intro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdfIntro-to-Crim-2021-2022.pdf
Intro-to-Crim-2021-2022.pdf
 
Differential Association Theory- Cunningham
Differential Association Theory- CunninghamDifferential Association Theory- Cunningham
Differential Association Theory- Cunningham
 
Victimization - Criminology
Victimization - CriminologyVictimization - Criminology
Victimization - Criminology
 
9 Punishment: POWERPOINT
9 Punishment: POWERPOINT9 Punishment: POWERPOINT
9 Punishment: POWERPOINT
 
Criminal Investigation Process
Criminal Investigation ProcessCriminal Investigation Process
Criminal Investigation Process
 
Theories of Criminal Behavior and Rehabilitation Overview
Theories of Criminal Behavior and Rehabilitation OverviewTheories of Criminal Behavior and Rehabilitation Overview
Theories of Criminal Behavior and Rehabilitation Overview
 
Ch11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary DataCh11 Agency Records, Content Analysis, and Secondary Data
Ch11 Agency Records, Content Analysis, and Secondary Data
 
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
El perfil criminal desde el lugar de los hechos en el delito de homicidio cul...
 
Theories of crime (criminology)
Theories of crime (criminology)Theories of crime (criminology)
Theories of crime (criminology)
 
Ronald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpointRonald akers social learning theory crmj powerpoint
Ronald akers social learning theory crmj powerpoint
 
Victimology
VictimologyVictimology
Victimology
 

Semelhante a Ch03 Ethics and Criminal Justice Research

Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...
Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...
Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...pq5jnhdws9
 
Unit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxUnit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxshakirRahman10
 
Ethics in research
Ethics in researchEthics in research
Ethics in researchMira K Desai
 
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Nawanan Theera-Ampornpunt
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxEyalClyne
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Nawanan Theera-Ampornpunt
 
Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Nawanan Theera-Ampornpunt
 
Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Nawanan Theera-Ampornpunt
 
Lecture 1 student.pptx
Lecture 1  student.pptxLecture 1  student.pptx
Lecture 1 student.pptxMCollazo2
 
Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Nawanan Theera-Ampornpunt
 
Ethics in research ppt by jiya
Ethics in research ppt by jiyaEthics in research ppt by jiya
Ethics in research ppt by jiyapanthanalil
 
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Nawanan Theera-Ampornpunt
 
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Nawanan Theera-Ampornpunt
 
L10 Ethics in research.ppt
L10 Ethics in research.pptL10 Ethics in research.ppt
L10 Ethics in research.pptDawit Alemu
 
L10 public health_ethics
L10 public health_ethicsL10 public health_ethics
L10 public health_ethicsAhmed Batun
 

Semelhante a Ch03 Ethics and Criminal Justice Research (20)

Chapter3
Chapter3Chapter3
Chapter3
 
Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...
Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...
Ch03 Watch Watch: “The Milgram Experiment ” Watch: “The Prison Stanford Exper...
 
Unit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxUnit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptx
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
 
Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)
 
Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)
 
Lecture 1 student.pptx
Lecture 1  student.pptxLecture 1  student.pptx
Lecture 1 student.pptx
 
Ethics in clinical research
Ethics in clinical researchEthics in clinical research
Ethics in clinical research
 
Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)
 
Ethics in research ppt by jiya
Ethics in research ppt by jiyaEthics in research ppt by jiya
Ethics in research ppt by jiya
 
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
 
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
 
L10 Ethics in research.ppt
L10 Ethics in research.pptL10 Ethics in research.ppt
L10 Ethics in research.ppt
 
Ethics revised 2013
Ethics revised 2013Ethics revised 2013
Ethics revised 2013
 
Three Cases of Ethical Controversy
Three Cases of Ethical ControversyThree Cases of Ethical Controversy
Three Cases of Ethical Controversy
 
L10 public health_ethics
L10 public health_ethicsL10 public health_ethics
L10 public health_ethics
 
Research Ethics.pptx
Research Ethics.pptxResearch Ethics.pptx
Research Ethics.pptx
 

Mais de yxl007

Ch07 Experimental & Quasi-Experimental Designs
Ch07 Experimental & Quasi-Experimental DesignsCh07 Experimental & Quasi-Experimental Designs
Ch07 Experimental & Quasi-Experimental Designsyxl007
 
Ch10 Field Research
Ch10 Field ResearchCh10 Field Research
Ch10 Field Researchyxl007
 
Ch09 Survey Research
Ch09 Survey ResearchCh09 Survey Research
Ch09 Survey Researchyxl007
 
Ch08 Sampling
Ch08 SamplingCh08 Sampling
Ch08 Samplingyxl007
 
Ch05 Concepts, Operationalization, and Measurement
Ch05 Concepts, Operationalization, and MeasurementCh05 Concepts, Operationalization, and Measurement
Ch05 Concepts, Operationalization, and Measurementyxl007
 
Ch04 General Issues in Research Design
Ch04 General Issues in Research DesignCh04 General Issues in Research Design
Ch04 General Issues in Research Designyxl007
 
Ch02 Theory and Criminal Justice Research
Ch02 Theory and Criminal Justice ResearchCh02 Theory and Criminal Justice Research
Ch02 Theory and Criminal Justice Researchyxl007
 
Ch01 Crime, Criminal Justice, and Scientific Inquiry
Ch01 Crime, Criminal Justice, and Scientific InquiryCh01 Crime, Criminal Justice, and Scientific Inquiry
Ch01 Crime, Criminal Justice, and Scientific Inquiryyxl007
 

Mais de yxl007 (8)

Ch07 Experimental & Quasi-Experimental Designs
Ch07 Experimental & Quasi-Experimental DesignsCh07 Experimental & Quasi-Experimental Designs
Ch07 Experimental & Quasi-Experimental Designs
 
Ch10 Field Research
Ch10 Field ResearchCh10 Field Research
Ch10 Field Research
 
Ch09 Survey Research
Ch09 Survey ResearchCh09 Survey Research
Ch09 Survey Research
 
Ch08 Sampling
Ch08 SamplingCh08 Sampling
Ch08 Sampling
 
Ch05 Concepts, Operationalization, and Measurement
Ch05 Concepts, Operationalization, and MeasurementCh05 Concepts, Operationalization, and Measurement
Ch05 Concepts, Operationalization, and Measurement
 
Ch04 General Issues in Research Design
Ch04 General Issues in Research DesignCh04 General Issues in Research Design
Ch04 General Issues in Research Design
 
Ch02 Theory and Criminal Justice Research
Ch02 Theory and Criminal Justice ResearchCh02 Theory and Criminal Justice Research
Ch02 Theory and Criminal Justice Research
 
Ch01 Crime, Criminal Justice, and Scientific Inquiry
Ch01 Crime, Criminal Justice, and Scientific InquiryCh01 Crime, Criminal Justice, and Scientific Inquiry
Ch01 Crime, Criminal Justice, and Scientific Inquiry
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Ch03 Ethics and Criminal Justice Research

  • 2. OUTLINE  Ethical Issues in Criminal Justice Research  Promoting Compliance with Ethical Principles  Two Ethical Controversies
  • 3. 3 •Ethical concerns – Typically associated with morality; both deal with matters of right & wrong •Ethical - May be defined as behavior conforming to the standards of conduct of a given group •Matter of agreement among professionals •We need to know of this general shared conception among CJ researchers
  • 4. 4 •Dilemma – Balancing potential benefits against possibility of harm •Collecting info from active criminals presents possibility of violence against them •Psychological harm via remembrance of unpleasant/traumatic experience •Possible harm may be justified by potential benefit of study (still arbitrary) •Perrone – Drug use in N.Y. dance clubs
  • 5. 5 •CJ research often intrudes into people’s lives •Asks them to reveal what is generally unknown •Therefore, participation must be voluntary •This threatens generalizability
  • 6. 6 •Anonymity – When researcher cannot identify a given piece of information with a given person •Confidentiality – A researcher can link information with a subject, but promises not to do so publicly •Techniques: Replace names/addresses with IDs, specify when survey is C rather than A, specify that info will not be disclosed to 3rd parties
  • 7. 7 •Generally considered unethical •Sometimes useful and even necessary to identify yourself as a researcher •“Don’t go undercover” •Widom (1999) – child abuse and illegal drug use •Inciardi (1993) – studying crack houses
  • 8. 8 •Researchers have ethical obligations to scientific community •Make shortcomings and/or negative findings known •Tell the truth about pitfalls and problems you’ve experienced •It is as important to know that two things are not related as to know that they are
  • 9. 9 •Researchers may expose themselves to criminal liability by: •Failing to report observed criminal activity to the police •Engaging in participant observation studies where crimes are committed •Subpoenas violate confidentiality •Legal immunity (42 U.S. Code §22.28a)
  • 10. 10 •Becoming aware of staff misbehavior in agencies •Research may produce crime or influence its location or target •Crime may be displaced •Withholding desirable treatments from control group •Mandatory Reporting: the Federal Child Abuse Prevention and Treatment Act of 1974
  • 11. 11 •The National Research Act (1974): signed into law after a few highly publicized examples of unethical practices in medical and social science research •The Belmont Report (1979): a brief, but comprehensive set of ethical principles for protecting human subjects •Respect for Persons •Beneficence •Justice
  • 12. •The American Psychological Association (2002) code of ethics is quite detailed, reflecting the different professional roles of psychologists in research, clinical treatment, and educational contexts •Academy of Criminal Justice Sciences Ethical Standards •American Society of Criminology Code of Ethics •US Department of Health & Human Services •American Bar Association Code of Professional Responsibility
  • 13. •Gov. agencies and non-gov. organizations must establish Institutional Review Boards (IRBs) •Members make judgments about overall risks, and their acceptability •Whether research procedures includes safeguards to protect safety, confidentiality, and general welfare of subjects
  • 14. 14 •Informed consent – Requires that subjects both have the capacity to understand and do understand the research, risks, side effects, benefits to subjects, and procedures used •New Jersey State Troopers and Racial Profiling •Special populations – Specific regulations exist for juveniles and prisoners
  • 15. •Many social research study designs are regarded as exempt from IRB review under federal guidelines •Exempt means that research proposals do not have to be subject to full IRB review
  • 16. TWO ETHICAL CONTROVERSIES  Trouble in the tearoom  The Standford prison experiment