SlideShare uma empresa Scribd logo
1 de 47
Research
methodology
Ethical Issues in Research
1
Submitted to: Sir Waqas Mehmood
presenter: Usman Mukhtar
Shahbaz khan
BS IT 7th sememter
University of Gujrat 2
Outline
• Code of conduct in research
• Principles
• Internal review board
• Misconducts in research
• Un acceptable practices
• Unethical issues
3
Ethics in research
• Research is always based on the expectation
that researchers undertake and report their
work in the basis of fairness, honesty, and
accuracy.
A researcher who fails to fulfill these
expectations lacks the integrity and can be
accused of engaging in research misconduct.
4
Code of conduct in research
• The guiding principle by which all research
should stand with
• personified in the Research Policy Manuals of
every academic and research institutions
5
Principle #1:
Protection from harm
• Participant should not be exposed to undue
physical and psychological harm
• Any risk involved should not be considerably
greater than the normal risk or day-to-day
living.
• Participant should know ahead of time if some
degree of discomfort is expected.
• Debriefing and counselling should immediately
follow the research procedure.
6
Principle #2:
Informed consent
• Any participation in a study should be strictly
voluntary.
• Some degree of cheating may be necessary to
validate the research. In this case, the
participant must be informed immediately
after the study is over.
• Unobstructed measure is allowed for as long as
participants are not made to do more than
their daily routine and that it is not invasive.
• Consent form required.
7
Principle #3:
Right to privacy
• Strict confidentiality
• Use codes to identify people
8
Principle #4:
Honesty w/ professional colleagues
• Complete and honest reporting, no
misrepresentation
• Give credit where it is due
9
Summary
• Principles
• Protection from harm
• Informed consent
• Right to privacy
• Honesty with professional colleague
10
Internal Review Board
.
11
Internal Review Board
• An ethics committee reviews any research
proposal. No study can begin without the go
signal of this review board.
12
Ethics Review
• Ethics Review Applies to:
• the design and implementation of research
involving the use of humans in research
(Human Subject Research or HSR) either as:
• subject in experiments (biomedical research)
• participants in experiments using mental exercises
(behavioral/ psychological research)
• the use of living animals as subject in
experiments (e.g. drug testing investigations
by pharmaceutical companies)
13
Ethics Review
• started in the medical field;
• anchored on
• Nuremberg Code (1946)
• Helsinki Declaration (1964)
14
1946 Nuremberg Code
• Medical experiments by Nazis on Jews which
involved torture
• Vaccination trials in 1700’s by physicians either
using themselves or their slaves as the test
subjects.
• Dr. Edward Jenner, who first introduced smallpox
vaccines, used his son and neighbor’s kids as the
test subjects.
• The basis of the Nuremberg Code is that the
benefits of the research must balance the risks.
15
Helsinki Declaration
• Developed by the World Medical Association as
a code of research ethics
• A reinterpretation of the Nuremberg Code
with an eye to medical research with
beneficial intent
• Journal editors require that research be
performed in accordance with the Declaration,
setting the stage for the implementation of
the Institutional Review Board (IRB) process
(Shamoo & Irving 1993
16
Rules on Human Subject
Research (Schutt 2006)
1. Research should cause no harm to subjects, at no
point should subjects feel distressed.
2. Deception needs to be left out of the research
process, under no circumstance should a
researcher lie to their subjects.
3. Participation in research should be voluntary, and
therefore subjects must give their informed
consent to participate in the research.
4. Researchers should be very careful when dealing
with vulnerable clients (persons who are
mentally ill, incarcerated people, or minors they
should make sure to get the proper consent).
17
Rules on Human Subject
Research (Schutt 2006)
5. Researchers should fully disclose their identity.
6. Anonymity or confidentiality must be maintained
for individual research participants unless it is
voluntary and explicitly waived.
7. Actively attempt to remove from the research
records any elements that might indicate the
subjects identities.
8. Finally, benefits from a research project should
balance any predictable risks.
18
Misconduct in Research
.
19
Misconduct in research
• Happens during:
• Research proposal writing stage
• Conduct or performance of research
• Peer-review process of research report, or
• Reporting the research results
• Does not include honest errors or honest
differences in interpretations or judgments of
data
20
Misconduct in research
• At UC Berkeley, findings of research
misconduct requires that:
• There be a significant departure from accepted
practices of the relevant scientific/research
community;
• The misconduct be committed intentionally,
knowingly, or carelessly; and
• The allegation be proven by a prevalence of the
evidence
21
Misconduct in research
• The US National Science Foundation defines
three types of misconduct:
• Fraud or Fabrication
• Falsification
• Plagiarism
• Others may include:
• Professionally unacceptable practices in performing
research and/or reporting the results of research
• Willful failure to comply with government and other
requirements
22
Fraud or fabrication
• is making up data or results and recording and
reporting them
• e.g. South Korean scientist Hwang Hoo Suk’s
(born Jan. 29, 1953) claimed to have
succeeded in creating human embryonic stem
cells by cloning
23
Falsification
• Manipulation of research materials,
equipment, or processes, or changing or
omitting data or results such that the research
is not accurately represented in the research
record.
• Falsification is committed if there is:
• undisclosed selective reporting and rejection of
unwanted results
• manipulation of a representation or illustration
24
Plagiarism
• the appropriation of another person’s ideas,
processes, results, or words without giving
appropriate credit.
• the use of another’s original words or ideas as
though they were your own
• theft or misappropriation of IP and the
substantial unattributed textual copying of
another's work
25
“
”
“A plagiarist is ostracized by the
academic community, ridiculed
by peers, refused tenure or
awards, demonized by history”
– Isagani Cruz, linguist, columnist
26
Professionally unacceptable
practices
• Examples:
• research fund mishandling
• use of prohibited chemicals/drugs in experimental
research
• violating ethical standards
27
Willful failure to comply with
laws
• e.g. not following Ethics Review requiring the
protection of human and animal research
subjects, permits, authorization to carry out
scientific research
28
Other Unethical Issues
Related to Research
.
29
Unethical Issues
• Issue on authorship in publication – who should
be authors?
• Issue on duplicate publication
• Issue on premature release of information
about to be published
• Issue on self-citation
• Issue on data ownership (IP issue)
• Conflict of interest
30
Issue on authorship in publication –
who should be authors?
• Publication must give appropriate credit to all
authors for their roles in the research.
• The decision of which names are to be listed
as co-authors should reflect the relative
contributions of various participants in the
research.
• A person's name should not be listed as author
without his or her knowledge, permission, and
review of the final version of the manuscript,
which includes the names of all co-authors.
31
Issue on authorship in publication –
who should be authors?
• Many professional associations and research
journals have specified criteria for authorship.
One common standard followed by journals is
that each author:
• should have participated in formulating the research
problem,
• should have participated in interpreting the results,
• should have participated in writing the research
paper, and
• should be prepared to defend the publication
against criticisms.
32
Issue on authorship in publication –
who should be authors?
• Co-authorship should be named even in oral
presentations
• Authorship entitlement should be given to a
person whether or not he/she is still at the
original location of the research when a paper
is submitted for publication.
• Honorary authors who do not meet the criteria
for authorship should be avoided.
33
Issue on authorship in publication –
who should be authors?
• Giving technical assistance, providing research
materials or facilities, do not merit co-
authorship; credits for such must use
alternative forms of acknowledgment within
the paper such as in Acknowledgement.
• To avoid misunderstandings and even
recriminations, the inclusion and exclusion of
names of research participants as co-authors
should be made clear to all participants in the
research prior to submission of the manuscript
34
Issue on authorship in publication –
who should be authors?
• Order sequence of Authors’ names:
• Customs regarding the order in which co-authors'
names appear vary with the discipline. Whatever
the discipline, it is important that all co-authors
understand the basis for assigning an order of names
and should agree in advance to the assignments.
• Corresponding, or senior author – is usually the first
or last of the listed names in a multi-authored
manuscript who is designated for every paper, who
will be responsible for communicating with the
publisher
35
Issue on duplicate publication
• Publishing the same article in two different
places without very good reason to do so is
inappropriate, unless appropriate citation is
made in the later publication to the earlier
one, and unless the editor is explicitly
informed.
• If there is unexplained duplication of
publication, a reader may be deceived as to
the amount of original research data.
36
Issue on duplicate publication
• An author should not divide a research paper which
is a self-contained integral whole into a number of
smaller papers (“Chop-chop”) merely for the sake
of expanding the number of items in the author's
CV.
• Publication of two papers representing different
interpretations of the same data by different
participants in the research is confusing to
readers. The participants with differing
interpretations of the same data should attempt to
reconcile their differences in a single publication
or present their alternative interpretations in the
same paper.
37
Issue on premature release of
information about to be published
• It is unethical to release to the media
scientific information contained in an
accepted manuscript prior to its publication.
• An exception may be made if a public health
issue is involved and the editor agrees to an
advance release
38
Issue on self-citation
• In citing one's own unpublished work, an
author must be careful not to imply an
unwarranted status of a manuscript.
• A paper should not be listed as “submitted”, in
anticipation of expected submission.
• A paper should not be listed as “accepted for
publication” or “In Press” unless the author
has received Galley Proof or Page Proof or has
received a letter from an editor or publisher
stating that publication has been approved,
subject perhaps only to copy-editing
39
Issue on data ownership (IP
issue)
• Research data obtained in studies performed
in the University and/or by employees of the
University are not the property of the
researcher who generated or observed them,
or even of the principal investigator of the
research group - they belong to the University,
which can be held accountable for the
integrity of the data even if the researchers
have left the University.
40
Conflict of interest
• Conflicts of interest could compromise the
integrity of research or even lead to research
misconduct, Example: the distortion of
research outcomes as a result of personal
financial interests of a researcher.
• University researchers should not allow their
names to be used as “ghost” authors of
manuscripts written by commercial sponsors.
41
Conflict of interest
• Unless with permission by designated
University officer, in no case are University
facilities be used in the conduct of an outside
activity, and the University name and logo be
used by outside entities
• Our USC logo is now Trademark protected, its
use may require permission from USC authority
42
Other matters
.
43
Some reasons why fraudulent
acts happen:
• inadequate mentoring of researchers
• veneration of a high volume of published
research
• chases for grants
• personal glory
• political pressures for practical results
44
“
”
“Practicing the Code of Conduct is a
step towards promoting a culture of
research
- it starts with YOURSELF.”
“Let it flourish in your department,
and eventually to your University you
hold with high esteem !"
.
. 45
References
• Paul Leedy and Jeanne Ellis Ormrod,
PRACTICAL RESEARCH: PLANNING AND DESIGN,
Pearson Prentice Hall, 2005, New Jersey
• Danilo B. Largo, Lecture Slides: CODE OF
CONDUCTS IN RESEARCH FOR SOLG, Aug. 14,
2012
46
47

Mais conteúdo relacionado

Mais procurados

Rmc0001 research publications & ethics - module 3 (5)
Rmc0001  research publications & ethics - module 3 (5)Rmc0001  research publications & ethics - module 3 (5)
Rmc0001 research publications & ethics - module 3 (5)KURMAIAHA20PHD1086
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In Researchali haider
 
scientific misconduct
scientific misconductscientific misconduct
scientific misconductkusuma latha
 
Selective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSelective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSaptarshi Ghosh
 
Research and publication ethics
Research and publication ethicsResearch and publication ethics
Research and publication ethicsS. Sathishkumar
 
Selective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxSelective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxDrDollyThankachan
 
Research ethics & scientific misconduct
Research ethics & scientific misconductResearch ethics & scientific misconduct
Research ethics & scientific misconductDr Ghaiath Hussein
 
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdf
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdfScientific Conduct- Ethics, Intellectual honesty & research integrity.pdf
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdfDr. Mahesh Koltame
 
What is salami slicing
What is salami slicingWhat is salami slicing
What is salami slicingJustin Dabin
 
Predatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationPredatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationSaptarshi Ghosh
 

Mais procurados (20)

ETHICS OF PUBLICATION
ETHICS OF PUBLICATIONETHICS OF PUBLICATION
ETHICS OF PUBLICATION
 
Rmc0001 research publications & ethics - module 3 (5)
Rmc0001  research publications & ethics - module 3 (5)Rmc0001  research publications & ethics - module 3 (5)
Rmc0001 research publications & ethics - module 3 (5)
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In Research
 
scientific misconduct
scientific misconductscientific misconduct
scientific misconduct
 
Selective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSelective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of Data
 
Research and publication ethics
Research and publication ethicsResearch and publication ethics
Research and publication ethics
 
Selective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptxSelective Reporting and Misrepresentation.pptx
Selective Reporting and Misrepresentation.pptx
 
Research ethics & scientific misconduct
Research ethics & scientific misconductResearch ethics & scientific misconduct
Research ethics & scientific misconduct
 
Publication ethics
Publication ethicsPublication ethics
Publication ethics
 
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdf
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdfScientific Conduct- Ethics, Intellectual honesty & research integrity.pdf
Scientific Conduct- Ethics, Intellectual honesty & research integrity.pdf
 
What is salami slicing
What is salami slicingWhat is salami slicing
What is salami slicing
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Predatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationPredatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for Identification
 
Authorship
AuthorshipAuthorship
Authorship
 
Research Methodology-03: Plagiarism
Research Methodology-03: PlagiarismResearch Methodology-03: Plagiarism
Research Methodology-03: Plagiarism
 
Research Metrics
Research MetricsResearch Metrics
Research Metrics
 
Research ethics philosphy
Research ethics philosphyResearch ethics philosphy
Research ethics philosphy
 
Publication ethics
Publication ethics Publication ethics
Publication ethics
 
Scientific misconduct
Scientific misconductScientific misconduct
Scientific misconduct
 
Citation Database
Citation Database Citation Database
Citation Database
 

Destaque

business research method chp 7]
business research method  chp 7]business research method  chp 7]
business research method chp 7]fizza tanvir
 
Presentation of business research method
Presentation of business research methodPresentation of business research method
Presentation of business research methodTaha Ghori
 
national bank of pakistan of mis
national bank of pakistan of misnational bank of pakistan of mis
national bank of pakistan of misAbdul Butt
 
National bank of pakistan analysis report
National bank of pakistan analysis reportNational bank of pakistan analysis report
National bank of pakistan analysis reportSamreen Lodhi
 
Mcb Final Project
Mcb Final ProjectMcb Final Project
Mcb Final Projectwheelrzzzz
 
(In)famous cases of research misconduct
(In)famous cases of research misconduct(In)famous cases of research misconduct
(In)famous cases of research misconductChris Willmott
 
Mcb bank internship report 2013
Mcb bank internship report 2013Mcb bank internship report 2013
Mcb bank internship report 2013Muhammad Yasir
 

Destaque (8)

business research method chp 7]
business research method  chp 7]business research method  chp 7]
business research method chp 7]
 
Presentation of business research method
Presentation of business research methodPresentation of business research method
Presentation of business research method
 
national bank of pakistan of mis
national bank of pakistan of misnational bank of pakistan of mis
national bank of pakistan of mis
 
National bank of pakistan analysis report
National bank of pakistan analysis reportNational bank of pakistan analysis report
National bank of pakistan analysis report
 
Mcb Final Project
Mcb Final ProjectMcb Final Project
Mcb Final Project
 
Mcb bank
Mcb bankMcb bank
Mcb bank
 
(In)famous cases of research misconduct
(In)famous cases of research misconduct(In)famous cases of research misconduct
(In)famous cases of research misconduct
 
Mcb bank internship report 2013
Mcb bank internship report 2013Mcb bank internship report 2013
Mcb bank internship report 2013
 

Semelhante a Ethics in research

Research 04 ethical issues in research
Research 04   ethical issues in researchResearch 04   ethical issues in research
Research 04 ethical issues in researchTroy Elizaga
 
Research ethics by pankaj
Research ethics by pankajResearch ethics by pankaj
Research ethics by pankajPankaj Chandel
 
Unit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxUnit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxshakirRahman10
 
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Nawanan Theera-Ampornpunt
 
Research ethics
Research ethicsResearch ethics
Research ethicsSKS
 
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Nawanan Theera-Ampornpunt
 
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Nawanan Theera-Ampornpunt
 
Ethical issues in Research
Ethical issues  in ResearchEthical issues  in Research
Ethical issues in Researchtrivkale
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Nawanan Theera-Ampornpunt
 
Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Nawanan Theera-Ampornpunt
 
Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Nawanan Theera-Ampornpunt
 
Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Nawanan Theera-Ampornpunt
 

Semelhante a Ethics in research (20)

Research 04 ethical issues in research
Research 04   ethical issues in researchResearch 04   ethical issues in research
Research 04 ethical issues in research
 
Bioethic(research ethics)
Bioethic(research ethics)Bioethic(research ethics)
Bioethic(research ethics)
 
Research ethics by pankaj
Research ethics by pankajResearch ethics by pankaj
Research ethics by pankaj
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Research Ethics.pptx
Research Ethics.pptxResearch Ethics.pptx
Research Ethics.pptx
 
Ethics in Medical Research
Ethics in Medical ResearchEthics in Medical Research
Ethics in Medical Research
 
Unit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptxUnit 8. Ethical Considerations in Reseaerch.pptx
Unit 8. Ethical Considerations in Reseaerch.pptx
 
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)Research Ethics and Ethics for Health Informaticians (October 31, 2017)
Research Ethics and Ethics for Health Informaticians (October 31, 2017)
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)Research Ethics and Ethics for Health Informaticians (October 30, 2018)
Research Ethics and Ethics for Health Informaticians (October 30, 2018)
 
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)Research Ethics and Ethics for Health Informaticians (November 14, 2019)
Research Ethics and Ethics for Health Informaticians (November 14, 2019)
 
Ethical issues in Research
Ethical issues  in ResearchEthical issues  in Research
Ethical issues in Research
 
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)Research Ethics and Ethics for Health Informaticians (November 15, 2021)
Research Ethics and Ethics for Health Informaticians (November 15, 2021)
 
Research ethics
Research ethics Research ethics
Research ethics
 
Ethics revised 2013
Ethics revised 2013Ethics revised 2013
Ethics revised 2013
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)Ethics in Biomedical Informatics (March 10, 2021)
Ethics in Biomedical Informatics (March 10, 2021)
 
Research Ethics - Summary
Research Ethics - SummaryResearch Ethics - Summary
Research Ethics - Summary
 
Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)Ethics in Biomedical Informatics (February 20, 2019)
Ethics in Biomedical Informatics (February 20, 2019)
 
Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)Ethics in Biomedical Informatics (February 19, 2020)
Ethics in Biomedical Informatics (February 19, 2020)
 

Mais de Usman Mukhtar

Software reliability
Software reliability Software reliability
Software reliability Usman Mukhtar
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCIUsman Mukhtar
 
LRA and TORA in MANETS
LRA and TORA in MANETSLRA and TORA in MANETS
LRA and TORA in MANETSUsman Mukhtar
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBPUsman Mukhtar
 

Mais de Usman Mukhtar (6)

Software reliability
Software reliability Software reliability
Software reliability
 
Risk management
Risk managementRisk management
Risk management
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
 
LRA and TORA in MANETS
LRA and TORA in MANETSLRA and TORA in MANETS
LRA and TORA in MANETS
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBP
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Ethics in research

  • 2. Submitted to: Sir Waqas Mehmood presenter: Usman Mukhtar Shahbaz khan BS IT 7th sememter University of Gujrat 2
  • 3. Outline • Code of conduct in research • Principles • Internal review board • Misconducts in research • Un acceptable practices • Unethical issues 3
  • 4. Ethics in research • Research is always based on the expectation that researchers undertake and report their work in the basis of fairness, honesty, and accuracy. A researcher who fails to fulfill these expectations lacks the integrity and can be accused of engaging in research misconduct. 4
  • 5. Code of conduct in research • The guiding principle by which all research should stand with • personified in the Research Policy Manuals of every academic and research institutions 5
  • 6. Principle #1: Protection from harm • Participant should not be exposed to undue physical and psychological harm • Any risk involved should not be considerably greater than the normal risk or day-to-day living. • Participant should know ahead of time if some degree of discomfort is expected. • Debriefing and counselling should immediately follow the research procedure. 6
  • 7. Principle #2: Informed consent • Any participation in a study should be strictly voluntary. • Some degree of cheating may be necessary to validate the research. In this case, the participant must be informed immediately after the study is over. • Unobstructed measure is allowed for as long as participants are not made to do more than their daily routine and that it is not invasive. • Consent form required. 7
  • 8. Principle #3: Right to privacy • Strict confidentiality • Use codes to identify people 8
  • 9. Principle #4: Honesty w/ professional colleagues • Complete and honest reporting, no misrepresentation • Give credit where it is due 9
  • 10. Summary • Principles • Protection from harm • Informed consent • Right to privacy • Honesty with professional colleague 10
  • 12. Internal Review Board • An ethics committee reviews any research proposal. No study can begin without the go signal of this review board. 12
  • 13. Ethics Review • Ethics Review Applies to: • the design and implementation of research involving the use of humans in research (Human Subject Research or HSR) either as: • subject in experiments (biomedical research) • participants in experiments using mental exercises (behavioral/ psychological research) • the use of living animals as subject in experiments (e.g. drug testing investigations by pharmaceutical companies) 13
  • 14. Ethics Review • started in the medical field; • anchored on • Nuremberg Code (1946) • Helsinki Declaration (1964) 14
  • 15. 1946 Nuremberg Code • Medical experiments by Nazis on Jews which involved torture • Vaccination trials in 1700’s by physicians either using themselves or their slaves as the test subjects. • Dr. Edward Jenner, who first introduced smallpox vaccines, used his son and neighbor’s kids as the test subjects. • The basis of the Nuremberg Code is that the benefits of the research must balance the risks. 15
  • 16. Helsinki Declaration • Developed by the World Medical Association as a code of research ethics • A reinterpretation of the Nuremberg Code with an eye to medical research with beneficial intent • Journal editors require that research be performed in accordance with the Declaration, setting the stage for the implementation of the Institutional Review Board (IRB) process (Shamoo & Irving 1993 16
  • 17. Rules on Human Subject Research (Schutt 2006) 1. Research should cause no harm to subjects, at no point should subjects feel distressed. 2. Deception needs to be left out of the research process, under no circumstance should a researcher lie to their subjects. 3. Participation in research should be voluntary, and therefore subjects must give their informed consent to participate in the research. 4. Researchers should be very careful when dealing with vulnerable clients (persons who are mentally ill, incarcerated people, or minors they should make sure to get the proper consent). 17
  • 18. Rules on Human Subject Research (Schutt 2006) 5. Researchers should fully disclose their identity. 6. Anonymity or confidentiality must be maintained for individual research participants unless it is voluntary and explicitly waived. 7. Actively attempt to remove from the research records any elements that might indicate the subjects identities. 8. Finally, benefits from a research project should balance any predictable risks. 18
  • 20. Misconduct in research • Happens during: • Research proposal writing stage • Conduct or performance of research • Peer-review process of research report, or • Reporting the research results • Does not include honest errors or honest differences in interpretations or judgments of data 20
  • 21. Misconduct in research • At UC Berkeley, findings of research misconduct requires that: • There be a significant departure from accepted practices of the relevant scientific/research community; • The misconduct be committed intentionally, knowingly, or carelessly; and • The allegation be proven by a prevalence of the evidence 21
  • 22. Misconduct in research • The US National Science Foundation defines three types of misconduct: • Fraud or Fabrication • Falsification • Plagiarism • Others may include: • Professionally unacceptable practices in performing research and/or reporting the results of research • Willful failure to comply with government and other requirements 22
  • 23. Fraud or fabrication • is making up data or results and recording and reporting them • e.g. South Korean scientist Hwang Hoo Suk’s (born Jan. 29, 1953) claimed to have succeeded in creating human embryonic stem cells by cloning 23
  • 24. Falsification • Manipulation of research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record. • Falsification is committed if there is: • undisclosed selective reporting and rejection of unwanted results • manipulation of a representation or illustration 24
  • 25. Plagiarism • the appropriation of another person’s ideas, processes, results, or words without giving appropriate credit. • the use of another’s original words or ideas as though they were your own • theft or misappropriation of IP and the substantial unattributed textual copying of another's work 25
  • 26. “ ” “A plagiarist is ostracized by the academic community, ridiculed by peers, refused tenure or awards, demonized by history” – Isagani Cruz, linguist, columnist 26
  • 27. Professionally unacceptable practices • Examples: • research fund mishandling • use of prohibited chemicals/drugs in experimental research • violating ethical standards 27
  • 28. Willful failure to comply with laws • e.g. not following Ethics Review requiring the protection of human and animal research subjects, permits, authorization to carry out scientific research 28
  • 29. Other Unethical Issues Related to Research . 29
  • 30. Unethical Issues • Issue on authorship in publication – who should be authors? • Issue on duplicate publication • Issue on premature release of information about to be published • Issue on self-citation • Issue on data ownership (IP issue) • Conflict of interest 30
  • 31. Issue on authorship in publication – who should be authors? • Publication must give appropriate credit to all authors for their roles in the research. • The decision of which names are to be listed as co-authors should reflect the relative contributions of various participants in the research. • A person's name should not be listed as author without his or her knowledge, permission, and review of the final version of the manuscript, which includes the names of all co-authors. 31
  • 32. Issue on authorship in publication – who should be authors? • Many professional associations and research journals have specified criteria for authorship. One common standard followed by journals is that each author: • should have participated in formulating the research problem, • should have participated in interpreting the results, • should have participated in writing the research paper, and • should be prepared to defend the publication against criticisms. 32
  • 33. Issue on authorship in publication – who should be authors? • Co-authorship should be named even in oral presentations • Authorship entitlement should be given to a person whether or not he/she is still at the original location of the research when a paper is submitted for publication. • Honorary authors who do not meet the criteria for authorship should be avoided. 33
  • 34. Issue on authorship in publication – who should be authors? • Giving technical assistance, providing research materials or facilities, do not merit co- authorship; credits for such must use alternative forms of acknowledgment within the paper such as in Acknowledgement. • To avoid misunderstandings and even recriminations, the inclusion and exclusion of names of research participants as co-authors should be made clear to all participants in the research prior to submission of the manuscript 34
  • 35. Issue on authorship in publication – who should be authors? • Order sequence of Authors’ names: • Customs regarding the order in which co-authors' names appear vary with the discipline. Whatever the discipline, it is important that all co-authors understand the basis for assigning an order of names and should agree in advance to the assignments. • Corresponding, or senior author – is usually the first or last of the listed names in a multi-authored manuscript who is designated for every paper, who will be responsible for communicating with the publisher 35
  • 36. Issue on duplicate publication • Publishing the same article in two different places without very good reason to do so is inappropriate, unless appropriate citation is made in the later publication to the earlier one, and unless the editor is explicitly informed. • If there is unexplained duplication of publication, a reader may be deceived as to the amount of original research data. 36
  • 37. Issue on duplicate publication • An author should not divide a research paper which is a self-contained integral whole into a number of smaller papers (“Chop-chop”) merely for the sake of expanding the number of items in the author's CV. • Publication of two papers representing different interpretations of the same data by different participants in the research is confusing to readers. The participants with differing interpretations of the same data should attempt to reconcile their differences in a single publication or present their alternative interpretations in the same paper. 37
  • 38. Issue on premature release of information about to be published • It is unethical to release to the media scientific information contained in an accepted manuscript prior to its publication. • An exception may be made if a public health issue is involved and the editor agrees to an advance release 38
  • 39. Issue on self-citation • In citing one's own unpublished work, an author must be careful not to imply an unwarranted status of a manuscript. • A paper should not be listed as “submitted”, in anticipation of expected submission. • A paper should not be listed as “accepted for publication” or “In Press” unless the author has received Galley Proof or Page Proof or has received a letter from an editor or publisher stating that publication has been approved, subject perhaps only to copy-editing 39
  • 40. Issue on data ownership (IP issue) • Research data obtained in studies performed in the University and/or by employees of the University are not the property of the researcher who generated or observed them, or even of the principal investigator of the research group - they belong to the University, which can be held accountable for the integrity of the data even if the researchers have left the University. 40
  • 41. Conflict of interest • Conflicts of interest could compromise the integrity of research or even lead to research misconduct, Example: the distortion of research outcomes as a result of personal financial interests of a researcher. • University researchers should not allow their names to be used as “ghost” authors of manuscripts written by commercial sponsors. 41
  • 42. Conflict of interest • Unless with permission by designated University officer, in no case are University facilities be used in the conduct of an outside activity, and the University name and logo be used by outside entities • Our USC logo is now Trademark protected, its use may require permission from USC authority 42
  • 44. Some reasons why fraudulent acts happen: • inadequate mentoring of researchers • veneration of a high volume of published research • chases for grants • personal glory • political pressures for practical results 44
  • 45. “ ” “Practicing the Code of Conduct is a step towards promoting a culture of research - it starts with YOURSELF.” “Let it flourish in your department, and eventually to your University you hold with high esteem !" . . 45
  • 46. References • Paul Leedy and Jeanne Ellis Ormrod, PRACTICAL RESEARCH: PLANNING AND DESIGN, Pearson Prentice Hall, 2005, New Jersey • Danilo B. Largo, Lecture Slides: CODE OF CONDUCTS IN RESEARCH FOR SOLG, Aug. 14, 2012 46
  • 47. 47

Notas do Editor

  1. he Declaration of Helsinki is a set of ethical principles regarding human experimentation developed for the medical community by the World Medical Association (WMA). It is widely regarded as the cornerstone document on human research ethics.