SlideShare a Scribd company logo
Ethical Problems in Political Research Dr Justin Greaves Introduction to Research Methods
Definition ,[object Object]
Some examples ,[object Object],[object Object],[object Object]
But are ethics objective? ,[object Object],[object Object]
Are ethics objective? (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Influence of religion ,[object Object],[object Object]
Kant’s approach ,[object Object],[object Object]
Potential problems ,[object Object],[object Object],[object Object]
Utilitarian approach (J S Mill) ,[object Object],[object Object]
Potential problems ,[object Object],[object Object],[object Object]
Contemporary approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is harm? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Doctrine of informed consent ,[object Object],[object Object],[object Object],[object Object]
Informed consent (2) ,[object Object],[object Object],[object Object]
Invasion of privacy ,[object Object],[object Object],[object Object]
Is deception ever justified? ,[object Object],[object Object],[object Object],[object Object]
His defences ,[object Object],[object Object],[object Object]
Before we continue... ,[object Object],[object Object],[object Object]
A wider debate ,[object Object],[object Object],[object Object],[object Object]
A wider debate (2) ,[object Object]
As Burnham et al put it.... ,[object Object],[object Object]
Funders ,[object Object],[object Object],[object Object],[object Object]
Who are the funders? (1) Government ,[object Object],[object Object],[object Object],[object Object]
Who are the funders (2) Private foundations ,[object Object],[object Object],[object Object]
Foundations ,[object Object],[object Object],[object Object]
Project Camelot 1965 ,[object Object],[object Object],[object Object],[object Object]
Gatekeepers ,[object Object],[object Object],[object Object]
Challenges with gatekeepers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Citizens ,[object Object],[object Object],[object Object]
Ethics committees  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Professional codes of conduct ,[object Object],[object Object],[object Object]
Problem of fraud in research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Plagiarism  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Book recommendation ,[object Object]

More Related Content

What's hot

Cumulative knowledge in community studies by Professor Graham Crow
Cumulative knowledge in community studies by Professor Graham CrowCumulative knowledge in community studies by Professor Graham Crow
Cumulative knowledge in community studies by Professor Graham Crow
University of Southampton
 
Ethics of scientific research rc d ec 2014
Ethics of scientific research rc d ec 2014Ethics of scientific research rc d ec 2014
Ethics of scientific research rc d ec 2014
researchcenterm
 
Lit Review Version 2.
Lit Review Version 2. Lit Review Version 2.
Lit Review Version 2. Mehak Amer
 
The nature and process of social research
The nature and process of social researchThe nature and process of social research
The nature and process of social research
ibrahimkoncak
 
Bias Presentation Extra (6 Jul 15)
Bias Presentation Extra (6 Jul 15)Bias Presentation Extra (6 Jul 15)
Bias Presentation Extra (6 Jul 15)Lisa Mears
 
Foreign policy analysis
Foreign policy analysisForeign policy analysis
Foreign policy analysis
Maniram Rai
 
Research ethics in Medicine
Research ethics in MedicineResearch ethics in Medicine
Research ethics in Medicine
Dr. Nehal S. Sawvad
 
dissertation report final2
dissertation report final2dissertation report final2
dissertation report final2Zulekha Nurein
 
Disability and society
Disability and societyDisability and society
Disability and society
githure eliud
 
Homophobic Bullying
Homophobic BullyingHomophobic Bullying
Homophobic Bullyingwindwalker64
 
Teaching foreign policy cases
Teaching foreign policy casesTeaching foreign policy cases
Teaching foreign policy cases
Akchayim
 

What's hot (14)

Cumulative knowledge in community studies by Professor Graham Crow
Cumulative knowledge in community studies by Professor Graham CrowCumulative knowledge in community studies by Professor Graham Crow
Cumulative knowledge in community studies by Professor Graham Crow
 
Ethics of scientific research rc d ec 2014
Ethics of scientific research rc d ec 2014Ethics of scientific research rc d ec 2014
Ethics of scientific research rc d ec 2014
 
Lit Review Version 2.
Lit Review Version 2. Lit Review Version 2.
Lit Review Version 2.
 
The nature and process of social research
The nature and process of social researchThe nature and process of social research
The nature and process of social research
 
Politics of research
Politics of researchPolitics of research
Politics of research
 
Bias Presentation Extra (6 Jul 15)
Bias Presentation Extra (6 Jul 15)Bias Presentation Extra (6 Jul 15)
Bias Presentation Extra (6 Jul 15)
 
Foreign policy analysis
Foreign policy analysisForeign policy analysis
Foreign policy analysis
 
Research ethics in Medicine
Research ethics in MedicineResearch ethics in Medicine
Research ethics in Medicine
 
dissertation report final2
dissertation report final2dissertation report final2
dissertation report final2
 
Disability and society
Disability and societyDisability and society
Disability and society
 
SEA Fundraising Workshop - Sarah Steward
SEA Fundraising Workshop - Sarah StewardSEA Fundraising Workshop - Sarah Steward
SEA Fundraising Workshop - Sarah Steward
 
Homophobic Bullying
Homophobic BullyingHomophobic Bullying
Homophobic Bullying
 
Poster
PosterPoster
Poster
 
Teaching foreign policy cases
Teaching foreign policy casesTeaching foreign policy cases
Teaching foreign policy cases
 

Viewers also liked

Political Science Beginning Research
Political Science Beginning ResearchPolitical Science Beginning Research
Political Science Beginning Researchannbee
 
The craft of political research, chapter 1
The craft of political research, chapter 1The craft of political research, chapter 1
The craft of political research, chapter 1
Maria Theresa Dalagan
 
Meaning and characteristics of research
Meaning and characteristics of researchMeaning and characteristics of research
Meaning and characteristics of research
jedliam
 
Research process
Research processResearch process
Research processaditi garg
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
sh_neha252
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of researchfadifm
 
Research Methods: Basic Concepts and Methods
Research Methods: Basic Concepts and MethodsResearch Methods: Basic Concepts and Methods
Research Methods: Basic Concepts and Methods
Ahmed-Refat Refat
 

Viewers also liked (8)

Political Science Beginning Research
Political Science Beginning ResearchPolitical Science Beginning Research
Political Science Beginning Research
 
The craft of political research, chapter 1
The craft of political research, chapter 1The craft of political research, chapter 1
The craft of political research, chapter 1
 
Presentation on types of research
Presentation on types of researchPresentation on types of research
Presentation on types of research
 
Meaning and characteristics of research
Meaning and characteristics of researchMeaning and characteristics of research
Meaning and characteristics of research
 
Research process
Research processResearch process
Research process
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
 
Definition and types of research
Definition and types of researchDefinition and types of research
Definition and types of research
 
Research Methods: Basic Concepts and Methods
Research Methods: Basic Concepts and MethodsResearch Methods: Basic Concepts and Methods
Research Methods: Basic Concepts and Methods
 

Similar to Irm ethical issues 2011 12

ethic in research.pptx
ethic in research.pptxethic in research.pptx
ethic in research.pptx
ArianeAseritLavado
 
Write a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docxWrite a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docx
helzerpatrina
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups la71
 
What we need to know by Paul Sturges
What we need to know by Paul SturgesWhat we need to know by Paul Sturges
How do you define research ethics? Discuss Ethics and the Research Process. ...
 How do you define research ethics? Discuss Ethics and the Research Process. ... How do you define research ethics? Discuss Ethics and the Research Process. ...
How do you define research ethics? Discuss Ethics and the Research Process. ...
Md. Sajjat Hossain
 
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docxCopyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
maxinesmith73660
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In Research
ali haider
 
- Government InvolvementBioethics Environmental Ethics.docx
- Government InvolvementBioethics Environmental Ethics.docx- Government InvolvementBioethics Environmental Ethics.docx
- Government InvolvementBioethics Environmental Ethics.docx
honey725342
 
Risks and research ethics
Risks and research ethicsRisks and research ethics
Risks and research ethics
Ghiath Alahmad
 
Behavioral Science Conference WRR TIBER Netspar Ministry of Finance
Behavioral Science Conference WRR TIBER Netspar Ministry of FinanceBehavioral Science Conference WRR TIBER Netspar Ministry of Finance
Behavioral Science Conference WRR TIBER Netspar Ministry of Finance
Scientific Council for Government Policy
 
Lecture 19 research ethics (2)
Lecture 19 research ethics (2)Lecture 19 research ethics (2)
Lecture 19 research ethics (2)
Dr Ghaiath Hussein
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups la71
 
Introduction of Research Integrity
 Introduction of Research Integrity Introduction of Research Integrity
Introduction of Research Integrity
RavindraDohle
 
Throughout The Study Of Diseases Researchers Have Developed
Throughout The Study Of Diseases Researchers Have DevelopedThroughout The Study Of Diseases Researchers Have Developed
Throughout The Study Of Diseases Researchers Have Developed
Kate Subramanian
 
Recruitment Consume Perspectives
Recruitment Consume PerspectivesRecruitment Consume Perspectives
Recruitment Consume PerspectivesMariaVyalkova
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
atrantham
 
Research or not research (jcb 17.11.21)
Research or not research (jcb 17.11.21)Research or not research (jcb 17.11.21)
Research or not research (jcb 17.11.21)
Dr Ghaiath Hussein
 
Research or not research (JCB 17.11.21).pptx
Research or not research (JCB 17.11.21).pptxResearch or not research (JCB 17.11.21).pptx
Research or not research (JCB 17.11.21).pptx
Dr Ghaiath Hussein
 

Similar to Irm ethical issues 2011 12 (20)

Communicating Science to Policymakers
Communicating Science to PolicymakersCommunicating Science to Policymakers
Communicating Science to Policymakers
 
ethic in research.pptx
ethic in research.pptxethic in research.pptx
ethic in research.pptx
 
Write a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docxWrite a critical analysis post discussing the following questions .docx
Write a critical analysis post discussing the following questions .docx
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
 
What we need to know by Paul Sturges
What we need to know by Paul SturgesWhat we need to know by Paul Sturges
What we need to know by Paul Sturges
 
How do you define research ethics? Discuss Ethics and the Research Process. ...
 How do you define research ethics? Discuss Ethics and the Research Process. ... How do you define research ethics? Discuss Ethics and the Research Process. ...
How do you define research ethics? Discuss Ethics and the Research Process. ...
 
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docxCopyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
Copyright © 2013, 2011, 2009 Pearson Education, Inc. All right.docx
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Ethics In Research
Ethics In ResearchEthics In Research
Ethics In Research
 
- Government InvolvementBioethics Environmental Ethics.docx
- Government InvolvementBioethics Environmental Ethics.docx- Government InvolvementBioethics Environmental Ethics.docx
- Government InvolvementBioethics Environmental Ethics.docx
 
Risks and research ethics
Risks and research ethicsRisks and research ethics
Risks and research ethics
 
Behavioral Science Conference WRR TIBER Netspar Ministry of Finance
Behavioral Science Conference WRR TIBER Netspar Ministry of FinanceBehavioral Science Conference WRR TIBER Netspar Ministry of Finance
Behavioral Science Conference WRR TIBER Netspar Ministry of Finance
 
Lecture 19 research ethics (2)
Lecture 19 research ethics (2)Lecture 19 research ethics (2)
Lecture 19 research ethics (2)
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
 
Introduction of Research Integrity
 Introduction of Research Integrity Introduction of Research Integrity
Introduction of Research Integrity
 
Throughout The Study Of Diseases Researchers Have Developed
Throughout The Study Of Diseases Researchers Have DevelopedThroughout The Study Of Diseases Researchers Have Developed
Throughout The Study Of Diseases Researchers Have Developed
 
Recruitment Consume Perspectives
Recruitment Consume PerspectivesRecruitment Consume Perspectives
Recruitment Consume Perspectives
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Research or not research (jcb 17.11.21)
Research or not research (jcb 17.11.21)Research or not research (jcb 17.11.21)
Research or not research (jcb 17.11.21)
 
Research or not research (JCB 17.11.21).pptx
Research or not research (JCB 17.11.21).pptxResearch or not research (JCB 17.11.21).pptx
Research or not research (JCB 17.11.21).pptx
 

Recently uploaded

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Irm ethical issues 2011 12

  • 1. Ethical Problems in Political Research Dr Justin Greaves Introduction to Research Methods
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.