Research Practice Mahdad Davari Muneeb Khan Nikos Nikoleris Andreas Sembrant.

Slides:



Advertisements
Similar presentations
Chapter 3 Striving for Integrity in the Research Process Zina OLeary.
Advertisements

What are key underlying principles and accepted strategic approaches for addressing monitoring discrimination? Partnership Participation Child rights approach.
A Case Study In The Light of Ethical Theories Andreas Sembrant Mahdad Davari Muneeb Khan Nikos Nikoleris.
Law Enforcement : Lessons for Investigators & Prosecutors by Ahmer Bilal Soofi Consultant National Accountability Bureau Government of Pakistan.
1 Improving Services and Performance Toolkit for Effective Front-line Services to Youth Module Six: Documentation: Record- keeping, and Case Notes.
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
RAP October 3,  What does “Best Practices of Grants Management” mean? ◦ It is the daily oversight of the grant/contract/agreement in accordance.
Whistleblower Policy and Implementation For Supervisors.
Ethics – Group Project Andreas Sembrant Mahdad Davari Muneeb Khan Nikos Nikoleris.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Information & Compliance UL University of Limerick & UL employees obliged to comply with certain legislation, including: Freedom of Information.
Informed Consent Waivers IRB Health Sciences & Behavioral Sciences University of Michigan /26/20091.
Data Protection.
Role of and Duties of Plan Commission Members Ralph E. Booker.
© 2006 The McGraw-Hill Companies, Inc., All Rights Reserved.McGraw-Hill/Irwin 5-1 Chapter 5 Ethics in Business Research.
INTERNATIONAL RESEARCH What are the ethical challenges? Richard Jenkins University of Sheffield.
Open Source vs. Proprietary Software Andreas Sembrant Mahdad Davari Muneeb Khan Nikos Nikoleris.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
 Federal regulations specify “engagement” at the institutional level  Cornell has a Federalwide Assurance specifying its commitment to comply with regulations.
Chapter 5: The Behavior Analyst’s Responsibility to Clients Guideline 2 Leigh O’Brien Caldwell College.
Module 6: The impact of national policy and legislation
4/3/20011 Ethics in Special Education Assessment and Testing and Maintenance of Student Information.
Engineering Ethics GE 105 Introduction to Engineering Design.
Ethics in Business Research
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
Investigation and Enforcement of competition law.
Release & Deployment ITIL Version 3
Practical Information Management
DATA PRIVACY PERSONNEL FILES “P-FILE”. Wisconsin Public Records Wisconsin Statue – Wisconsin Statue – Wisconsin Statue 230 Wisconsin.
Human Rights Monitoring and Reporting. What is human rights monitoring and how does it differ from similar activities? Human rights monitoring is a broad.
This project is funded by the EUAnd implemented by a consortium led by MWH Logical Framework and Indicators.
Ethics and professional Conducts for Civil engineers
HERMITAGE CAPITAL MANAGEMENT The Role of the Board of Directors in Promoting Corporate Governance by William F. Browder Managing Director, Hermitage Capital.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
University of North Carolina at Greensboro Protecting Research Participants.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Employment Law Unions. What is a labor union? 0 "a group of workers who have banded together to achieve common goals in the key areas of wages, hours,
ISO 9001 – an overview Tor Stålhane IDI / NTNU. ISO 9001 and software development ISO 9001 is a general standard – equally applicable to software development.
FERPA Family Educational Rights and Privacy Act A Tutorial.
A step-by-step guide to help you determine if your research protocol is required to be reviewed by the Lindenwood University IRB INSTITUTIONAL REVIEW BOARD.
McGraw-Hill/Irwin Business Research Methods, 10eCopyright © 2008 by The McGraw-Hill Companies, Inc. All Rights Reserved. Chapter 2 Ethics in Business Research.
. 5-1 Chapter 5 Ethics in Business Research. 5-2 Learning Objectives What issues are covered in research ethics The goal of “no harm” for all research.
STUDENT JUDICIAL AFFAIRS Balancing the Principals of Natural Justice with Requirements of Privacy Legislation CCSJA March 23, 2006 Harry Davis Deborah.
Access to Judicial Review Part II. 2 Procedural Injury In Lujan, the procedural violation was the failure of the agency to do an inter-agency consultation.
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
Researching your contemporary issue From How to Write an Effective Special Study Dodson, Jarvis & Melhuish.
SHARED CODE OF ETHICS AND VALUES OF THE COMMUNITIES OF CROWN POINT, HIGHLAND, MUNSTER, SCHERERVILLE AND WHITING.
The Law Society and You. The Role of the L.S.U.C. Regulates, governs and licenses Ontario’s lawyers and licensed paralegals pursuant to the Law Society.
Personal data protection in research projects
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
 The Labour Act Chapter of the Statutes of this Country is the governing piece of legislation as far Employment Law is concerned and Legal Practitioners.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Ethical, legal and social aspects of public health genomics Mark Taylor, School of Law, University of Sheffield 7 th November 2014.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.

Legal Aspects of Finance
Fraud Waste and Abuse Company Training.
Handling of research material
Data Protection and You
Test Security.
Test Security.
BE-5305 Ethics in Research.
1-3 Ethical Bases for Laws.
Student Records Montana Association of School Business Officials
Presentation transcript:

Research Practice Mahdad Davari Muneeb Khan Nikos Nikoleris Andreas Sembrant

What would you do in the following situation? Adam, collects data from a specific group of adult informants. He promises that no one outside his research group will have access to the data. His findings are questioned by two other researchers who request access to his source data. Adam refuses to hand them over, referring to his promise to his informants. Adam's colleagues destroy the source data

Is the action taken by Adam’s colleagues ethically acceptable? Ethically correct to protect the informant: There might be sensitive data about the informants There is a trust issue and might affect future experiments

Is the action taken by Adam’s colleagues ethically acceptable? Ethically incorrect as a research practice: Verification: o Experiment has to been done from scratch to verify its results Secondary use: o Experiment has to been done from scratch to extend its findings Research misconduct: o Allegations against cannot be investigated

Is it compatible with existing legislation? According to the Swedish Law data is official documents. Publicly available to anyone. Destroying is illegal. But special regulations for personal data.

Has Adam promised more than he can deliver? He should have promised less: o To allow other researchers access his data o Protect his research from allegations of misconduct What he promised is OK: o He collected sensitive data, no one would have participated in his survey without the non disclosure agreement. o More accurate data achieved when anonymity is ensured.