ethics in b research
DESCRIPTION
business researchTRANSCRIPT
-
Fundamentals Of Research Methods
Ethics in Business Research
PresentedBy:ViqarA.Usmani 1
-
Learning Objectives
Understand . . .
What issues are covered in researchethics.
The goal of no harm for all researchactivities and what constitutes no harm for participant, researcher, and researchsponsor.
PresentedBy:ViqarA.Usmani 2
-
Learning Objectives
Understand . . .Differing ethical dilemmas and
responsibilities of researchers, sponsors,and research assistants.
Role of ethical codes of conduct in professional associations.
PresentedBy:ViqarA.Usmani 3
-
PulsePoint:Research Revelation
The percent of consumer PCs infected with spyware.
PresentedBy:ViqarA.Usmani 4
-
Data Collectors Face Responsibilities
[Privacy pragmatists are] often willing to allow people to have access to, and to use, their personal information where they understandthe reasons for its use, where they see tangible benefits for so doing, and when they believe care is taken to prevent the misuse of this information.
Humphrey Taylorchairman of The Harris Poll
Harris Interactive.
PresentedBy:ViqarA.Usmani 5
-
Ethics are norms or standards of behavior that guide moral choices about our behavior and our relationships with others.The goal of ethics in research is to ensure that no one is harmed or suffers adverse consequences from research activities.Unethical activities are pervasive and include many types of activities.Some of these are listed in the next slide.For some researchers, ethical and legal norms are the same.We feel that legal constraints are the minimum standard but not the ideal.
PresentedBy:ViqarA.Usmani 6
-
Types of Ethical Violations
Violating disclosure
agreements
Breaking confidentiality
Padded invoices
Misrepresenting results
Deceiving participants
Avoiding legal liability
PresentedBy:ViqarA.Usmani 7
-
Procter & Gamble
Admits to competitive intelligence gathering
Contracted BI firm took documents from
Unilever trash receptaclesOut-of-court
settlement rumored (and reported) at
$10m
PresentedBy:ViqarA.Usmani 8
-
In April 2001, Procter and Gamble notified its competitor Unilever that more than 80 discarded documents detailing Unilevers marketing plan for its hair care business had been collected by P&G information agents.Unilever sought financial restitution and restrictions on P&Gs marketing activities, but the two companies settled out of court.
PresentedBy:ViqarA.Usmani 9
-
Ethical Approaches
Ethical standards
Ethical RelativismDeontology
PresentedBy:ViqarA.Usmani 10
-
There is no single approach to ethics.
Deontology advocates that ethical behavior should be directed by duties regardless of the positive circumstances that might result from behavior that is in contradiction to the duty.An example might be Do not lie, even when lying might result in a positive outcome.Another approach is that of ethical relativism. Ethical relativism is based on an individuals sense of morality.Therefore, each person decides for his or herself what is ethical behavior.A middle ground is necessary and provided through ethical standards of behavior for researchers.
PresentedBy:ViqarA.Usmani 11
-
Ethical Approaches
Ethical RelativismDeontology
How would you assess the P&G case usingthe two ethical approaches?
PresentedBy:ViqarA.Usmani 12
-
Three organizations offering codes specifically for researchers are the : Marketing Research Association (MRA), The American Marketing Association
(AMA), and The Council for American Survey
Research Organizations (CASRO).
The logos in the next slide are linked to the respective organizations website where you can view the codes of ethics.
PresentedBy:ViqarA.Usmani 13
-
Ethical Codes of Conduct
PresentedBy:ViqarA.Usmani 14
-
PulsePoint:Research Revelation
The amount, in millions, that employers will lose this year due to employee fraud.
PresentedBy:ViqarA.Usmani 15
-
Ethical Issues at all Stages of the Research Process
PresentedBy:ViqarA.Usmani 16
-
Sponsored research activities may require access to information that is proprietary or otherwise considered by the sponsor to be privileged and confidential.Such information must be specifically identified by the sponsor and must be determined to be confidential
Sponsors usually require formal agreements prior to the exchange of confidential information (nondisclosure or secrecy agreements)
PresentedBy:ViqarA.Usmani 17
-
Business Research Methods
PresentedBy:ViqarA.Usmani 18
-
Sponsors Right to Quality ResearchAn important ethical consideration for the researcher and the sponsor is the sponsors right to quality research.This right entails:
Providing a research design appropriate for the research question.
Maximizing the sponsors value for the resources expended.
Providing data handling and reporting techniques appropriate for the data collected.
PresentedBy:ViqarA.Usmani 19
-
Sponsors Right of Purpose Non Disclosure
A research sponsor may be testing a new idea that is not yet patented and may not want to know of its plans:
It may be investigating employee complaints and may not want to spark union activity or
The sponsor might be contemplating a new public stock offering, where advance disclosure would spark the interest of authorities or cost the firm heavily.
PresentedBy:ViqarA.Usmani 20
-
Researchers Right to Absence of Sponsor CoercionSometimes researchers will be asked by sponsors to participate in unethical behavior.To avoid coercion by sponsor the researcher should:
Educate sponsor to the purpose of research Explain researchers role Explain how distortion of the truth leads to
future problems If necessary, terminate relationship with
sponsor
PresentedBy:ViqarA.Usmani 21
-
Participant Deception
Deception occurs when the participants are told only part of the truth or when the truth is fully compromised.Two reasons suggested for deception are:
1. To prevent biasing the participants before the survey or experiment; and
2. To protect the confidentiality of a third party (e.g., the sponsor)
PresentedBy:ViqarA.Usmani 22
-
Business Research Methods
to nform
'Y
PresentedBy:ViqarA.Usmani 23
-
Participants Right of informed Consent
Securing informed consent from participants is a matter of fully disclosing the procedures of the proposed survey or other research design before requesting permission to proceed with the study.
If there is a chance the data could harm the participant (offering only limited confidentiality, a signed form detailing the types of limits should be obtained.
For most business research, oral consent is sufficient.
PresentedBy:ViqarA.Usmani 24
-
Participants Right to Privacy (Refusal)Privacy is more than confidentiality.
A right to privacy means one has the right to refuse tobe interviewed or to refuse to answer any question inan interview.
To address these rights, ethical researchers do the following:
Inform participants of their right to refuse to answer any question or participate in the study.
Obtain permission to interview participants. Schedule field and phone interviews. Limit the time required for participation. Restrict observation to public behavior only.
PresentedBy:ViqarA.Usmani 25
-
Researchers Right to Safety
Safety Ethical behavior of assistants Protection of anonymityResearchers are bound by a code of ethics that includes the following protections for subjects
1.Protected from physical or psychological harm (including loss of dignity, loss of autonomy, and loss of self-esteem) 2.Protection of privacy and confidentiality3.Protection against unjustifiable deception4.The subject must give voluntary informed consent to participate in research.Guardians must give consent for minors to participate.In addition to guardian consent, minors over age 7 must also give their consent to participate.
PresentedBy:ViqarA.Usmani 26
-
Business Research Methods
PresentedBy:ViqarA.Usmani 27
-
Ethical Treatment of Participants
Explain study benefits
Explain participant rights and protections
Obtain informed consent
PresentedBy:ViqarA.Usmani 28
-
Research must be designed so that a participant does not suffer physical harm, discomfort, pain, embarrassment, or loss of privacy.The previous slide lists the three guidelines researchers should follow to protect participants.
When discussing benefits, the researcher should be careful not to overstate or understate the benefits. Informed consent means that the participant has given full consent to participation after receiving full disclosure of the procedures of the proposed study.
PresentedBy:ViqarA.Usmani 29
-
Begin data collection by explaining to the participant the benefits expected from the research
Explain to the participants that their rights and well-being will be adequately protected, and say how this will be done
Be certain that interviewers obtain the informed consent of the participant
PresentedBy:ViqarA.Usmani 30
-
Components ofInformed Consent
Identify researchersDescribe survey topicDescribe target sampleIdentify sponsorDescribe purpose of researchPromise anonymity and confidentiality
Give good-faith estimate of required time commitmentState participation is voluntaryState item-non response is acceptable
Ask for permission
The informed consent procedures used by the Indiana Center for Survey Research
PresentedBy:ViqarA.Usmani 31
-
Characteristics of Informed Consent
Elements
Competence
Informed
Knowledge Voluntary
PresentedBy:ViqarA.Usmani 32
-
Since 1966, all projects with federal funding are required to be reviewed by an Institutional Review Board (IRB).
An IRB evaluates the risks and benefits of proposed research.
The review requirement may be more relaxed for projects that are unlikely to be risky
such as marketing research projects. Many institutions require that all research whether funded or unfunded by the federal
Government be reviewed by a local IRB..
PresentedBy:ViqarA.Usmani 33
-
The IRBs concentrate on two areas.First is the guarantee of obtaining complete, informed consent
from participants.The second is the risk assessment and benefit analysis review.Complete informed consent has four characteristics and these are
named in the slide.1.The participant must be competent to give consent. 2.Consent must be voluntary, and free from coercion. 3.Participants must be adequately informed to make a decision. 4.Participants should know the possible risks or outcomes
associated with the research
PresentedBy:ViqarA.Usmani 34
-
Ethical Responsibilities
Special guidelines apply to children! Informed consentmeans parental
approval.
PresentedBy:ViqarA.Usmani 35
-
Special consideration is necessary whenresearching the behavior and attitudes ofchildren.Besides providing informed consent, parents are often interviewed during the selection process to ensure that the child is mature enough and has the verbal and physical capabilities necessary
PresentedBy:ViqarA.Usmani 36
-
Deception
Disguising non-research activities
Camouflaging trueresearch objectives
PresentedBy:ViqarA.Usmani 37
-
Debriefing
Explain any dec
Describe
Sh
eption
purpose
are results
Provide follow-up
PresentedBy:ViqarA.Usmani 38
-
In situations where participants are intentionally or accidentally deceived,they should be debriefed once the research is complete.Debriefing describes the goals of the research, as well as the truth and reasons for any deception.Results are shared after the study is complete. Participants who require any medical or psychological follow-up attention will receive it during the debriefing process.
PresentedBy:ViqarA.Usmani 39
-
Participant Confidentiality
Minimize instruments requiring ID
Non-disclosure of data subsets
Restrict access to ID
Obtain signed nondisclosure
Reveal only with written
consent
PresentedBy:ViqarA.Usmani 40
-
As discussed before;All individuals have a right to privacy, and
researchers must respect that right.Once a guarantee of confidentiality is given,
protecting that confidentiality is essential.Researchers protect participant confidentiality in
several ways.1.Obtaining signed nondisclosure documents
only researchers who have signed nondisclosure forms should be allowed access to the data.
2.Restricting access to participant identification.3.Revealing participant information only with written consent. 4.Restricting access to data instruments where the participant is
identified. 5.Nondisclosure of data subsets.
PresentedBy:ViqarA.Usmani 41
-
Methods 2-5 deal with minimizing the chance for a participant to identified and matched with his or her responses.
Links between data and identifying information must be minimized.
Interview response sheets should be inaccessible to everyone except the editors and data entry personnel.
Data collection instruments may be destroyed once data are in a data file.
For very small groups, data should not be made available if it would be easy to pinpoint a person in the group.
PresentedBy:ViqarA.Usmani 42
-
Right to refuse
Prior permission to interview
Limit time required
Right to Privacy
Prior permission tointerview
Limit time required
PresentedBy:ViqarA.Usmani 43
-
The U.S. Safe Harbor Agreement
Security
Notice Access
Enforcement
Choice
Onward Transfer
Data Integrity
PresentedBy:ViqarA.Usmani 44
-
The convenience of collecting data online has created new ethical issues.
Data mining offers infinite possibilities for research abuse.
The primary ethical data mining issues in cyberspace are privacy-related including consent to information collection and control of information dissemination.
Legitimate data miners publicly post their information security policies.
The EU countries have passed the European Commissions data protection directive.
Under the directive, commissioners can prosecute companies and block Web sites that fail to live up to its strict privacy standards.
PresentedBy:ViqarA.Usmani 45
-
Exhibit 2-3 identifies the seven basic principle that companies must comply with to be granted immunity from legal action under the EUs directive.
These seven principles are: Notice: Companies must notify consumers/participants about
what information is being collected, how that information will be used, who that information will be shared with, and how individuals can contact the organization with inquiries or complaints.
Choice: Consumers/participants must be provided with an opt-out mechanism for any secondary uses of data and for disclosures to third parties. For sensitive information, participants must opt in before providing data that will be shared.
Access: Individuals must have access to personal information that the organization holds and be able to correct, amend, or delete information where it is in accurate, except where the burden or expense of providing access would be disproportionate to the risks to the individuals privacy.
PresentedBy:ViqarA.Usmani 46
-
Security: Organizations must take reasonable precautions to protect personal information from loss, misuse, and unauthorized access, disclosure, alteration, and destruction.
Onward transfer: Companies disclosing personal data to a third party must adhere to the notice and choice principles. A third party must subscribe to the safe-harbor principles.
Data integrity: Reasonable steps must be taken to ensure that data collected are reliable, accurate, complete, and current.
Enforcement: Companies must ensure there are readily available and affordable independent mechanisms to investigate consumer complaints.
PresentedBy:ViqarA.Usmani 47
-
Sponsor Nondisclosure
Confidentiality
Purpose Nondisclosure
Findings Nondisclosure
PresentedBy:ViqarA.Usmani 48
-
What To Do If Coerced?
Educate on
purpose
Emphasize fact-finding
role
Explain problems
Terminate relationship
PresentedBy:ViqarA.Usmani 49
-
Occasionally, researchers may be asked by sponsors to participate in unethical behavior.
What can the researcher do to remain ethical? There are four suggestions provided in the slide. The researcher can attempt to1.educate the sponsor to the purpose of the research,2. explain the researchers role as a fact-finder,3.explain how distorting the truth or breaking faith will
lead to future problems, and4.if the others fail, terminate the relationship.
PresentedBy:ViqarA.Usmani 50
-
Effective Codes of Ethics
Enforceable
Specify Behavior
Regulate
Protect
PresentedBy:ViqarA.Usmani 51
-
Many organizations have codes of ethics.A code of ethics is an organizations codified set of norms or standards of behavior that guide moral choices about research behavior.Effective codes are those that1) are regulative,2) protect the public interest and the interests of the
profession served by the code,3) are behavior-specific, and4) are enforceable.Exhibit in previous slide provides additional sources for ethics resources.
PresentedBy:ViqarA.Usmani 52
-
Key Terms
Code of ethics Confidentiality Debriefing Deception Ethics Informed consent
Nondisclosure Findings Purpose Sponsor
Right to privacy Right to quality Right to safety
PresentedBy:ViqarA.Usmani 53