SlideShare a Scribd company logo
1 of 16
ETHICS
DATA MANAGEMENT
ETHICAL CONSIDERATIONS FOR
EDUCATIONAL RESEARCH
Sweta
Shivdasani
AIMS
This presentation considers ethical issues surrounding
the management of your research data.
In particular it focuses on three important issues,
anonymity, confidentiality and data storage.
1. THE ETHICAL
CONSIDERATIONS OF DATA
MANAGEMENT
All research and enquiry involves dealing with
data.
This data can take many different forms eg the
results of surveys, observations or interviews.
Managing your research data in an ethical
manner is crucial to the research process.
In particular, ensuring that you consider how
best to create, store, protect, share and
preserve your data is essential.
2. KEY CONSIDERATIONS
RESEARCH PRACTICES MUST ENSURE THAT
RESEARCH DATA AND RECORDS ARE:
Accurate, complete,
authentic and reliable
Identifiable, retrievable,
and accessible
Retained in a safe and
secure manner
Retained in a manner
that is compliant with
legal obligations
Available to others in
line with appropriate
ethical, data sharing and
open access principles
Commensurate with the
legitimate interests and
protection of human
participants of research
data.
Mentioned in (UWTSD
Research Data
Management statement,
2018)
ANONYMITY AND CONFIDENTIALITY
‘The confidential and anonymous treatment of participants’ data is
considered the norm for the conduct of research’ (BERA, 2018:21)
The participants in your research have the right to privacy.
This is achieved through ensuring you manage your research
data with confidentiality and anonymity in mind.
ANONYMITY
Being able to share your research is important. However, ethically we
must protect our participants.
Anonymity is a valuable tool in allowing us to do this.
Maintaining anonymity means that you do not collect identifying
information (such as name, address) for your participants.
Or, if your study requires this type of information as part of the
research design, the data is stored so that individual responses
cannot be linked directly to individuals.
HOW CAN YOU ANONYMISE DATA?
The process of anonymising data requires that identifiers are changed in some way.
This might mean identifying information is removed, substituted, distorted,
generalised or aggregated.
Remember that a person's identity can be disclosed from: Direct identifiers such as
names, postcode information or pictures.
Indirect identifiers which, when linked with other available information, could identify
someone, for example information on workplace, occupation, salary or age.
BUT REMEMBER
Many studies do not need to collect any personal information at all.
However, anonymity is not necessarily the default position to take:
‘in some circumstances individual participants, or their guardians or responsible others, may want to
specifically and willingly waive their right to confidentiality and anonymity: researchers should
recognise participants’ rights to be identified in any publication of their original works or other inputs
if they so wish’
(BERA, 2018:21).
FOR INSTANCE
Your research might highlight some effective teaching strategies taking place in
your school which you wish to disseminate in your cluster (or more widely).
In this case, you might decide to waive the right to keep the school name, or your
specific year group anonymous.
However, you may still decide to maintain the anonymity of individual teachers
and pupils within the school.
CONFIDENTIALITY
Confidentiality is usually maintained. This happens when the data collected can identify
individuals in some way, for example if you are carrying out a case study of an
individual pupil.
Confidentiality means that only the investigator(s) or members of the research team
can identify the responses of individuals.
The researchers must make every effort to prevent anyone from outside of the
study connecting individuals with their responses.
Individuals who give consent to be identified (i.e. who waive their right to
confidentiality) must be fully aware of who will be able to see their information, and
the purposes of this.
COMPLIANCE: THE GENERAL DATA
PROTECTION REGULATION (GDPR) AND
RESEARCH
The core principles of GDPR are the principles of ethical research data management:
Collect no more data than is necessary from an individual for the purpose for which it will be used;
Obtain personal data fairly from the individual by giving them notice of the collection, and its specific purpose;
Retain the data for no longer than is necessary for that specified purpose;
Keep data safe and secure;
Provide an individual with a copy of his or her personal data if they request it.
STORING YOUR RESEARCH DATA
You must ensure that you store your research data securely.
For example, you may use electronic devices which have password protection and data encryption.
You may avoid using portable storage devices like USB sticks
Data should not be sent via email or other forms of media that can be hacked.
Hard copies of any records should be stored in secure premises.
All members of a research team should understand how to protect the data.
See BERA (2018: 25).
FIND OUT MORE
• THE UK DATA ARCHIVE HAS A
COMPREHENSIVE GUIDE ON CONSENT,
CONFIDENTIALITY AND ETHICS.
• BERA (2018) ETHICAL GUIDELINES FOR
EDUCATIONAL RESEARCH
THANK
YOU

More Related Content

What's hot

Measurement and scaling techniques
Measurement and scaling techniquesMeasurement and scaling techniques
Measurement and scaling techniques
Sarfaraz Ahmad
 
Glass Evidence
Glass EvidenceGlass Evidence
Glass Evidence
annperry09
 
Fostering & Promoting Integrity in Research.pptx
Fostering & Promoting Integrity in Research.pptxFostering & Promoting Integrity in Research.pptx
Fostering & Promoting Integrity in Research.pptx
sheelu57
 

What's hot (20)

Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Toolmarks
ToolmarksToolmarks
Toolmarks
 
Research design
Research designResearch design
Research design
 
Measurement and scaling techniques
Measurement and scaling techniquesMeasurement and scaling techniques
Measurement and scaling techniques
 
Fraudulent in plastic currency
Fraudulent in plastic currencyFraudulent in plastic currency
Fraudulent in plastic currency
 
Reserch design and sample design
Reserch design and sample designReserch design and sample design
Reserch design and sample design
 
Glass Evidence
Glass EvidenceGlass Evidence
Glass Evidence
 
Types of Research -Business Research Methods
Types of Research -Business Research MethodsTypes of Research -Business Research Methods
Types of Research -Business Research Methods
 
Introduction to Questioned Document
Introduction to Questioned DocumentIntroduction to Questioned Document
Introduction to Questioned Document
 
Primary data and secondary data
Primary data and secondary dataPrimary data and secondary data
Primary data and secondary data
 
General requirements for the competence of testing and calibration laboratories
General requirements for the competence of testing and calibration laboratories General requirements for the competence of testing and calibration laboratories
General requirements for the competence of testing and calibration laboratories
 
Questioned documents Full PPT
Questioned documents Full PPTQuestioned documents Full PPT
Questioned documents Full PPT
 
Research Methodology and the Application of Research in Management
Research Methodology and the Application of Research in ManagementResearch Methodology and the Application of Research in Management
Research Methodology and the Application of Research in Management
 
Research design brm-chap-2..
Research design brm-chap-2..Research design brm-chap-2..
Research design brm-chap-2..
 
Fraud Deterrence
Fraud DeterrenceFraud Deterrence
Fraud Deterrence
 
Identification of Research Gaps Through Literature Review.pptx
Identification of Research Gaps Through Literature Review.pptxIdentification of Research Gaps Through Literature Review.pptx
Identification of Research Gaps Through Literature Review.pptx
 
Fostering & Promoting Integrity in Research.pptx
Fostering & Promoting Integrity in Research.pptxFostering & Promoting Integrity in Research.pptx
Fostering & Promoting Integrity in Research.pptx
 
Types of exploratory research design
Types of exploratory research designTypes of exploratory research design
Types of exploratory research design
 
Preparation of the research report
Preparation of the research reportPreparation of the research report
Preparation of the research report
 
Forensic science dna
Forensic science dnaForensic science dna
Forensic science dna
 

Similar to ETHICS OF DATA MANAGEMENT.pptx

CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docxCHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
christinemaritza
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
MaiJoy
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
EyalClyne
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effort
Hina Honey
 

Similar to ETHICS OF DATA MANAGEMENT.pptx (20)

Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Data Security.docx
Data Security.docxData Security.docx
Data Security.docx
 
Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers Research ethics and problems encountred by reseachers
Research ethics and problems encountred by reseachers
 
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docxCHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
CHAPTER 7Standards on Privacyand Confidentiality4. Privacy a.docx
 
Publishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 JunePublishing and sharing sensitive data 28 June
Publishing and sharing sensitive data 28 June
 
Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
Research methodology – unit 9
Research methodology – unit 9Research methodology – unit 9
Research methodology – unit 9
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
JALWIN_ENDCHAPTER.pdf
JALWIN_ENDCHAPTER.pdfJALWIN_ENDCHAPTER.pdf
JALWIN_ENDCHAPTER.pdf
 
Clinical research ethics and regulation
Clinical research ethics and regulationClinical research ethics and regulation
Clinical research ethics and regulation
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Research Ethics.pptx
Research Ethics.pptxResearch Ethics.pptx
Research Ethics.pptx
 
Lesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptxLesson 1 Nature of Inqury and Research - Copy.pptx
Lesson 1 Nature of Inqury and Research - Copy.pptx
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
Ethics my own effort
Ethics my own effortEthics my own effort
Ethics my own effort
 
METHODS OF RESEARCH IN NURSING.pdf
METHODS OF RESEARCH IN NURSING.pdfMETHODS OF RESEARCH IN NURSING.pdf
METHODS OF RESEARCH IN NURSING.pdf
 
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATADATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
DATA ETHICS: BEST PRACTICES FOR HANDLING SENSITIVE DATA
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

ETHICS OF DATA MANAGEMENT.pptx

  • 1. ETHICS DATA MANAGEMENT ETHICAL CONSIDERATIONS FOR EDUCATIONAL RESEARCH Sweta Shivdasani
  • 2. AIMS This presentation considers ethical issues surrounding the management of your research data. In particular it focuses on three important issues, anonymity, confidentiality and data storage.
  • 3. 1. THE ETHICAL CONSIDERATIONS OF DATA MANAGEMENT
  • 4. All research and enquiry involves dealing with data. This data can take many different forms eg the results of surveys, observations or interviews. Managing your research data in an ethical manner is crucial to the research process. In particular, ensuring that you consider how best to create, store, protect, share and preserve your data is essential.
  • 6. RESEARCH PRACTICES MUST ENSURE THAT RESEARCH DATA AND RECORDS ARE: Accurate, complete, authentic and reliable Identifiable, retrievable, and accessible Retained in a safe and secure manner Retained in a manner that is compliant with legal obligations Available to others in line with appropriate ethical, data sharing and open access principles Commensurate with the legitimate interests and protection of human participants of research data. Mentioned in (UWTSD Research Data Management statement, 2018)
  • 7. ANONYMITY AND CONFIDENTIALITY ‘The confidential and anonymous treatment of participants’ data is considered the norm for the conduct of research’ (BERA, 2018:21) The participants in your research have the right to privacy. This is achieved through ensuring you manage your research data with confidentiality and anonymity in mind.
  • 8. ANONYMITY Being able to share your research is important. However, ethically we must protect our participants. Anonymity is a valuable tool in allowing us to do this. Maintaining anonymity means that you do not collect identifying information (such as name, address) for your participants. Or, if your study requires this type of information as part of the research design, the data is stored so that individual responses cannot be linked directly to individuals.
  • 9. HOW CAN YOU ANONYMISE DATA? The process of anonymising data requires that identifiers are changed in some way. This might mean identifying information is removed, substituted, distorted, generalised or aggregated. Remember that a person's identity can be disclosed from: Direct identifiers such as names, postcode information or pictures. Indirect identifiers which, when linked with other available information, could identify someone, for example information on workplace, occupation, salary or age.
  • 10. BUT REMEMBER Many studies do not need to collect any personal information at all. However, anonymity is not necessarily the default position to take: ‘in some circumstances individual participants, or their guardians or responsible others, may want to specifically and willingly waive their right to confidentiality and anonymity: researchers should recognise participants’ rights to be identified in any publication of their original works or other inputs if they so wish’ (BERA, 2018:21).
  • 11. FOR INSTANCE Your research might highlight some effective teaching strategies taking place in your school which you wish to disseminate in your cluster (or more widely). In this case, you might decide to waive the right to keep the school name, or your specific year group anonymous. However, you may still decide to maintain the anonymity of individual teachers and pupils within the school.
  • 12. CONFIDENTIALITY Confidentiality is usually maintained. This happens when the data collected can identify individuals in some way, for example if you are carrying out a case study of an individual pupil. Confidentiality means that only the investigator(s) or members of the research team can identify the responses of individuals. The researchers must make every effort to prevent anyone from outside of the study connecting individuals with their responses. Individuals who give consent to be identified (i.e. who waive their right to confidentiality) must be fully aware of who will be able to see their information, and the purposes of this.
  • 13. COMPLIANCE: THE GENERAL DATA PROTECTION REGULATION (GDPR) AND RESEARCH The core principles of GDPR are the principles of ethical research data management: Collect no more data than is necessary from an individual for the purpose for which it will be used; Obtain personal data fairly from the individual by giving them notice of the collection, and its specific purpose; Retain the data for no longer than is necessary for that specified purpose; Keep data safe and secure; Provide an individual with a copy of his or her personal data if they request it.
  • 14. STORING YOUR RESEARCH DATA You must ensure that you store your research data securely. For example, you may use electronic devices which have password protection and data encryption. You may avoid using portable storage devices like USB sticks Data should not be sent via email or other forms of media that can be hacked. Hard copies of any records should be stored in secure premises. All members of a research team should understand how to protect the data. See BERA (2018: 25).
  • 15. FIND OUT MORE • THE UK DATA ARCHIVE HAS A COMPREHENSIVE GUIDE ON CONSENT, CONFIDENTIALITY AND ETHICS. • BERA (2018) ETHICAL GUIDELINES FOR EDUCATIONAL RESEARCH