Building Ethics into the Research with Vulnerable groups

514 views

Published on

Published in: Education
6 Comments
1 Like
Statistics
Notes
  • Great Job La! Your slideshare was well organized and aesthetically pleasing. The tables outlining the ethically preferred and practical application of different methodologies, worked really well. I was really interested in your take on the level of researcher involvement in terms of data collection and follow-up, as I'm currently struggling with this as well. Also, as the others mentioned, I liked the fact that you included information on power dynamics between the parties, as it plays a significant role in the research design. Thanks for sharing!
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi La! I already mentioned this in class, but I really enjoyed your slide layout. It is so refreshing to see something so unique, yet clear and fresh. Well done with having a slide that discusses each main idea, and then adding a slide about the practical implications of that idea - this really helped the audience and practical researchers to grasp each notion.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • As mentioned in class I really liked the format. Your point about vulnerability of persons after telling a personal story struck a chord with me. My requesting the story you might be opening up partially or fully healed mental or emotional wounds. If there is no social network for the story teller to connect with it can be devastating for the story teller.
    One formatting issue were your bullets on slide 7. Might want to continue them throughout.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Nice slides, La! Like I said in class, it might be a good idea to include a link to TCPS2 for those who want to learn more. TCPS2 is very accessible and has a presentation format that is very friendly (like SlideShare).
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Great job La! For slide 4, it would be interesting to see some information on power and how it relates to who the researcher is, and their role in creating a vulnerable dynamic.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
514
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
24
Comments
6
Likes
1
Embeds 0
No embeds

No notes for slide

Building Ethics into the Research with Vulnerable groups

  1. 1. Building Ethics into the Research with Vulnerable Groups La Zhuo University of Guelph EDRD 6000: QUALITATIVE ANALYSIS
  2. 2. Overview of General Ethical Considerations Consent process • Free • Informed • Ongoing Sampling Methodology • Appropriate inclusion • Avoid inappropriate exclusion Confidentiality • Anonymity • confidentiality • privacy • Safety Research Practice • Concerns for welfare • Respect for participants • Justice Ethics in Research Design (TCPS2, 2010)
  3. 3. Understanding Vulnerability 4 dimensions of vulnerability: 1. Vulnerable individuals: children, women, the elderly, the mentally and physically disabled, refugees. 2. Vulnerable groups and vulnerability through group membership: religious group, ethnic group, minority group, institutional membership such as prisoners 3. Construction of vulnerability: vulnerability is the result of research activity such as confirmation of stereotypes about the social group (homeless people, prostitutes, drug addicts, single mothers, asylum seekers, the long-term unemployed, ethnic minorities, or gay) 4. Vulnerable research environment: the environment that is intimidating or dangerous (socially or physically) for participants. (Biggs et al). Vulnerability is often caused by limited capacity, or limited access to social goods, such as rights, opportunities and power (TCPS2, 2010).
  4. 4. Sources of Vulnerability  Economic Status and Geographic Location  Health, Age, and Functional or Developmental Status  Communication Barriers  Unexplained Vulnerability Associated with Race, Ethnicity, Sex
  5. 5. Ethics in Research Design: Consent and Power Ethically Preferred Consent Process Practical Difficulties Seeking access from gate keepers  Researchers need to gain permissions from gatekeepers (e.g. parents, guardians or authorized third parties) before in a position to seek the consent of vulnerable individuals.  Relying on a third party or agency that are already in the field could ensure that the process maintains ethical integrity (Melrose, 2002). Time consuming  It may require several layers of consent to access to individuals. (Munro, Holmes & Ward, 2005). Exclusion of individuals’ chances to participate  Considering the well-being of the research participants, the gate keepers decide whether it is appropriate for one to participate. Such time consuming procedure may exclude vulnerable individuals with great willingness to participate. Power issue  The exclusion of potential interested participant may impose limitations on the final sample and further impacts on the findings (Melrose, 2002). The finding may serve the gate keeper‟s best.
  6. 6. Ethics in Research Design: Sampling Methodology  Opt-in sampling method: Participants are asked to actively volunteer to participate by responding to the recruitment. This includes signing the consent form or giving verbal consent.  Opt-out sampling method: Participants are deemed to have given consent and excluded only when they refuse to participate. (The Research Ethics Guidebook)
  7. 7. Ethics in Research Design: Sampling Methodology Ethically Preferred Sampling Methodology Practical Implications Opt-in sampling  Ethics committees are more likely to expect researchers to prefer opt-in sampling (The Research Ethics Guidebook).  “The opt-in approach has ethical advantages because consent is actively given by the child/young person, following consent from a range of adult gate-keepers and is often preferred by policy makers and social service managers” (Munro, Holmes & Ward, 2005).  Opt-in sampling method would make researchers more reliant on local personnel to facilitate access to children” (Munro, Holmes & Ward, 2005).  Opt-in samples are small and less representative. (Munro, Holmes & Ward, 2005).  When a participant seeks to opt-out, the data collected from them may already have been accessed and processed (The Research Ethics Guidebook).  Equal opportunity for members to participate within the community “It challenges the researchers to develop strategies to reach out to the broader community members whilst still respecting and acknowledging the status of the gatekeepers” (Pittaway, Bartolomei, & Hugman, 2010).
  8. 8. Ethics in Research Design: Confidentiality and Trust Ethics Implications Protecting confidentiality as researcher’s duty  It is the researcher‟s duty to protect the confidentiality of the sensitive personal information. Conflict of duties  If the participant is considered by the researcher to be at risk, the researcher has the obligation to protect and inform relevant authorities. This may require certain level of exposure of information. (Melrose, 2002).  For example,in the situation which a young people‟s life is threatened by ongoing abuse, the researcher has forced duty to protect the participant by breaking the confidentiality promise (Melrose, 2002). Risks for vulnerable participants  Individuals participate in the research involves sensitive issues may face higher level of risks than other qualitative research.  Such risk may threaten individuals‟ welfare or well-being, for example, abused women participate in the research may be physically threatened by the husband.  “While protecting the confidentiality, the researchers in sensitive area should keep in mind that vulnerable people, however, may be in greater danger from NOT having participated and NOT having their story told” (Biggs et al).
  9. 9. Ethics in Research Design: Research Practise Research Settings and Design Implication Presence of gate keepers  The gate keeper can play an important role in ensuring the vulnerable individual is comfortable and understands the research.  In the home setting, for example, parent can provide children with particular communication or support needs. Violation of voluntariness  Individuals may feel inhibited to reveal personal information or feel obliged to provide socially acceptable responses (Shaw, Brady, & Davey, 2011). Institutional setting  Special care is given to vulnerable groups in the institutional settings in order to ensure the voluntariness of participation. Such situation includes prisons, care homes, school settings, or other situations where individuals‟ welfare depends on the caregiver.  There is a deep-rooted dynamic of compliance associated with the institutional care. Violation of voluntariness  “In institutional settings, where conformity and compliance are rewarded, people may not feel that they have a real choice” (Biggs et al).  Due to the usual experiences of students in the school setting, they may feel pressure to only provide the right answer (Shaw, Brady, & Davey, 2011). General level of researchers’ involvement  The researcher‟s duty is merely established upon gathering data and ends once the research is completed.  The trust with vulnerable group is formally established in the process of consent and data collection (Biggs et al). Increase vulnerability  Participants may left vulnerable revealing feelings, stories, and emotions.  Research may cause harm to participants by Immediate involvement and recruitment through confirmation of negative stereotypes (Pittaway, Bartolomei, & Hugman, 2010).
  10. 10. Practical Tactics  Reporting back: vulnerable participants may be particularly sensitive with “hit and run” situation. Researcher should extend the obligation beyond merely gather data for own research.  Follow-up support: research can sometimes cause additional harm to vulnerable people when individuals‟ feeling and emotion are fully exploited.  Narrative research method: with the research involves individuals experiencing emotional crisis, direct questions are unethical, causing distress and anxious. The narrative approach can be therapeutic for participants.  Disguise information: in some case researchers can disguise the information of personal identities or research location in order to effectively protect confidentiality.  Hidden involvement of participants: with the research may impose higher risks for participants, it is important to ensure the participants are not seen or contacted throughout the research.
  11. 11. References Biggs, H, Clough, R, Esterhuizen, L., Hatton, C., Levitt, M, & Rennie, C. (n.d.). Vulnerable People and Groups. Retrieved from http://www.lancaster.ac.uk/researchethics/4-3-infcons.html Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada, Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans, December 2010. Munro, E. R., Holmes, L., & Ward, H. (2005). Researching vulnerable groups: Ethical issues and the effective conduct of research in local authorities. British Journal of Social Work, 35(7), 1023-1038. Pittaway, E., Bartolomei, L., & Hugman, R. (2010). „Stop stealing our stories‟: The ethics of research with vulnerable groups. Journal of Human Rights Practice, 2(2), 229-251. Shaw, C., Brady, L. M., & Davey, C. (2011). Guidelines for research with children and young people. London: National Children‟s Bureau Research Centre. The Research Ethics Guidebook. (n.d.). Opt-in and opt-out sampling. Retrieved from http://www.ethicsguidebook.ac.uk/Opt-in-and-opt-out-sampling-94

×