SlideShare una empresa de Scribd logo
1 de 16
Network Study Design: Ethical Considerations
and Safeguards
Duke Network Analysis Center
Social Networks and Health
18 May 2016
The Belmont Report: Guiding Ethical Principles
to Social Science Research
Respect for Persons
Autonomy
Voluntariness
Informed Consent
Beneficence
Do not harm
Maximize possible benefits/Minimize Possible Harms
Justice
The risks and benefits of research should be
equitably distributed
1
Questions of Informed Consent and Privacy
Key Components of Informed Consent
Disclosing to potential research subjects information needed to
make an informed decision
Facilitating the understanding of what has been disclosed
Promoting the voluntariness of the decision about whether or not
to participate in the research.
2
Risks in Social Network Studies
In most social network research, the chief risk to respondents is that of
being stigmatized as a result of being identified as belonging to a
stigmatized category or group (e.g., sex workers, drug addicts), or from
adverse consequences resulting from revealing an individual’s role or
position in a social setting (e.g., discovering you are the least liked
individual in your organization).
Social network research shares these risks with other forms of survey-
based research that examine the impact of one’s social environment on
phenomena such as risk taking, mental health, and attitudes towards
medical providers.
However, there are some unique sources of risk.
3
Potential Risks Associated with Relational Data
Outing People
Minor: Mom Finds Out Mike Smokes
Major: Wife Finds Out that Her Husband Has Been Cheating
Legal Risks
If you trace a relationship between an adult and a child that
would be treated as contributing to the delinquency of a
minor, are you legally obligated to report the relationship?
If a known-to-be STD positive person names a partner, do
we inform the partner of the respondent’s STD status?
Detecting Fraud
Network analyses can reveal inconsistencies that suggest
fraud (very high degree, say, or sharing patients in a way
that is highly irregular
4
Privacy Challenges Associated with Relational
Data
Deductive Disclosure
The Confidentiality of Alters
5
Deductive Disclosure
Associated with roster study designs (e.g., studies of school,
hospital, or neighborhood populations)
Trinity College of
Arts and Sciences
1416
Sociology
Department
48
Arabic
Speakers
2
Other
Disciplines
Non-Arabic
Speakers
US Veteran
1
Civilians
and Service
Members
Lover of Unreasonably Sized Fortune Cookies 6
Deductive Disclosure: Add Health Example
Start with: 87
Black, Female, 12th Graders in Two parent Households:
Who have Never been Held Back:
77
And Smoke Regularly:
5
And Have 2 siblings
1
And are Catholic
1
7
The Confidentiality of Alters
A
B
C
A
B
C
A
B
C
A
B
C
D
A A A A
B B
B B
C C C C
D
8
Confidentiality of Alters
1
2
1
2
3
Adapted from Klovadhl 2005
1 2
3
4 5
Jon GM
Jake
Laura
Jim KC
KJ
LA
Jim KC
Laura Jon GM
Jake KJ
LA
9
Risk Mitigating Strategies
Data Agreements and Initial Precautions
Data Management Procedures
Training
10
Data Agreements
When collecting data establish:
Who owns the data
How will it be collected
Who stores and processes it
How long will identifying information be retained
Who has access to identifying information
The answers to these questions can help in determining whether you
believe the study can be conducted in an ethical manner. 11
Data Management Steps
Segment the data collection instrument to separate
identifying information from other kinds of information
Restrict the number of personnel who have access to
identifying information, and who process the raw data
Restrict the processing of data to safe environments
(e.g., administered internal networks)
Never transfer raw data over the internet, and never
transport encrypted data and passwords together
Secure raw, preferably encrypted, data and backups in a
secure location at the end of each day
12
Training
More than the perfunctory completion of
CITI/IRB training not only helps avoid
potentially hurtful mistakes but also saves time
by training you to think like the IRB
With the ability to quickly collect data on
emerging digital platforms (e.g., the Volunteer
Science Platform or Mechanical Turk), young
researchers have to start thinking like PIs even
sooner.
13
Concluding Thoughts
Social network studies are important, but they require
us to safeguard not only the privacy of our participants
but also of their alters.
Consequently, researchers conducting network studies
must be very explicit in communicating how the
study’s procedures effectively mitigate the risks posed
by relational data .
For IRBs less familiar with network methodologies,
this often requires building trust by meeting with IRB
administrators in face-to-face meetings.
14
Other Ethical Considerations/Questions?
Thoughts for the Group
15

Más contenido relacionado

Similar a 06 Network Study Design: Ethical Considerations and Safeguards (2016)

Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignmentMaiJoy
 
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docx
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docxRUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docx
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docxagnesdcarey33086
 
Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...Kristin Scheel
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 
Research Ethics
Research EthicsResearch Ethics
Research Ethicsatrantham
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfAsefaAdimasu2
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_conceptsMicah Altman
 
Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...ARDC
 
Introduction of Research Integrity
 Introduction of Research Integrity Introduction of Research Integrity
Introduction of Research IntegrityRavindraDohle
 
Ethical Issues Involved with Diagnosing
Ethical Issues Involved with DiagnosingEthical Issues Involved with Diagnosing
Ethical Issues Involved with DiagnosingJohn Gavazzi
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analyticsarchijain931
 
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docx
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docxReply week 8 reflection 1-leydina triana Chapter 12 is bas.docx
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docxchris293
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Trilateral Research
 

Similar a 06 Network Study Design: Ethical Considerations and Safeguards (2016) (20)

Research methodology ethical issues in research an assignment
Research methodology  ethical issues in research   an assignmentResearch methodology  ethical issues in research   an assignment
Research methodology ethical issues in research an assignment
 
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docx
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docxRUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docx
RUNNINGHEADERPROJECTANALYSIS1Corruption2Project Analys.docx
 
Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
JALWIN_ENDCHAPTER.pdf
JALWIN_ENDCHAPTER.pdfJALWIN_ENDCHAPTER.pdf
JALWIN_ENDCHAPTER.pdf
 
The Intersection of Social Media and Human Subjects Research
The Intersection of Social Media and Human Subjects ResearchThe Intersection of Social Media and Human Subjects Research
The Intersection of Social Media and Human Subjects Research
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
Confidential data management_key_concepts
Confidential data management_key_conceptsConfidential data management_key_concepts
Confidential data management_key_concepts
 
Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...Brisbane Health-y Data: What are health and sensitive data and why are they t...
Brisbane Health-y Data: What are health and sensitive data and why are they t...
 
Introduction of Research Integrity
 Introduction of Research Integrity Introduction of Research Integrity
Introduction of Research Integrity
 
Ethical Issues Involved with Diagnosing
Ethical Issues Involved with DiagnosingEthical Issues Involved with Diagnosing
Ethical Issues Involved with Diagnosing
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docx
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docxReply week 8 reflection 1-leydina triana Chapter 12 is bas.docx
Reply week 8 reflection 1-leydina triana Chapter 12 is bas.docx
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 

Más de Duke Network Analysis Center

01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security IssuesDuke Network Analysis Center
 
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...Duke Network Analysis Center
 
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)Duke Network Analysis Center
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network FunctionDuke Network Analysis Center
 
00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent VictimizationDuke Network Analysis Center
 
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...Duke Network Analysis Center
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...Duke Network Analysis Center
 

Más de Duke Network Analysis Center (20)

01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues
 
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
 
24 The Evolution of Network Thinking
24 The Evolution of Network Thinking24 The Evolution of Network Thinking
24 The Evolution of Network Thinking
 
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
 
20 Network Experiments
20 Network Experiments20 Network Experiments
20 Network Experiments
 
19 Electronic Medical Records
19 Electronic Medical Records19 Electronic Medical Records
19 Electronic Medical Records
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
17 Statistical Models for Networks
17 Statistical Models for Networks17 Statistical Models for Networks
17 Statistical Models for Networks
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
 
11 Respondent Driven Sampling
11 Respondent Driven Sampling11 Respondent Driven Sampling
11 Respondent Driven Sampling
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
04 Network Data Collection
04 Network Data Collection04 Network Data Collection
04 Network Data Collection
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function
 
00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization
 
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 

Último

Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Silpa
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfSumit Kumar yadav
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flyPRADYUMMAURYA1
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...Monika Rani
 
Chemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfChemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfSumit Kumar yadav
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingadibshanto115
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxDiariAli
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .Poonam Aher Patil
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceAlex Henderson
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bSérgio Sacani
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsOrtegaSyrineMay
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspectsmuralinath2
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxSuji236384
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptxSilpa
 
Introduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxIntroduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxrohankumarsinghrore1
 
Stages in the normal growth curve
Stages in the normal growth curveStages in the normal growth curve
Stages in the normal growth curveAreesha Ahmad
 

Último (20)

Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS  ESCORT SERVICE In Bhiwan...
Bhiwandi Bhiwandi ❤CALL GIRL 7870993772 ❤CALL GIRLS ESCORT SERVICE In Bhiwan...
 
Chemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfChemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdf
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mapping
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
Introduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptxIntroduction of DNA analysis in Forensic's .pptx
Introduction of DNA analysis in Forensic's .pptx
 
Stages in the normal growth curve
Stages in the normal growth curveStages in the normal growth curve
Stages in the normal growth curve
 

06 Network Study Design: Ethical Considerations and Safeguards (2016)

  • 1. Network Study Design: Ethical Considerations and Safeguards Duke Network Analysis Center Social Networks and Health 18 May 2016
  • 2. The Belmont Report: Guiding Ethical Principles to Social Science Research Respect for Persons Autonomy Voluntariness Informed Consent Beneficence Do not harm Maximize possible benefits/Minimize Possible Harms Justice The risks and benefits of research should be equitably distributed 1
  • 3. Questions of Informed Consent and Privacy Key Components of Informed Consent Disclosing to potential research subjects information needed to make an informed decision Facilitating the understanding of what has been disclosed Promoting the voluntariness of the decision about whether or not to participate in the research. 2
  • 4. Risks in Social Network Studies In most social network research, the chief risk to respondents is that of being stigmatized as a result of being identified as belonging to a stigmatized category or group (e.g., sex workers, drug addicts), or from adverse consequences resulting from revealing an individual’s role or position in a social setting (e.g., discovering you are the least liked individual in your organization). Social network research shares these risks with other forms of survey- based research that examine the impact of one’s social environment on phenomena such as risk taking, mental health, and attitudes towards medical providers. However, there are some unique sources of risk. 3
  • 5. Potential Risks Associated with Relational Data Outing People Minor: Mom Finds Out Mike Smokes Major: Wife Finds Out that Her Husband Has Been Cheating Legal Risks If you trace a relationship between an adult and a child that would be treated as contributing to the delinquency of a minor, are you legally obligated to report the relationship? If a known-to-be STD positive person names a partner, do we inform the partner of the respondent’s STD status? Detecting Fraud Network analyses can reveal inconsistencies that suggest fraud (very high degree, say, or sharing patients in a way that is highly irregular 4
  • 6. Privacy Challenges Associated with Relational Data Deductive Disclosure The Confidentiality of Alters 5
  • 7. Deductive Disclosure Associated with roster study designs (e.g., studies of school, hospital, or neighborhood populations) Trinity College of Arts and Sciences 1416 Sociology Department 48 Arabic Speakers 2 Other Disciplines Non-Arabic Speakers US Veteran 1 Civilians and Service Members Lover of Unreasonably Sized Fortune Cookies 6
  • 8. Deductive Disclosure: Add Health Example Start with: 87 Black, Female, 12th Graders in Two parent Households: Who have Never been Held Back: 77 And Smoke Regularly: 5 And Have 2 siblings 1 And are Catholic 1 7
  • 9. The Confidentiality of Alters A B C A B C A B C A B C D A A A A B B B B C C C C D 8
  • 10. Confidentiality of Alters 1 2 1 2 3 Adapted from Klovadhl 2005 1 2 3 4 5 Jon GM Jake Laura Jim KC KJ LA Jim KC Laura Jon GM Jake KJ LA 9
  • 11. Risk Mitigating Strategies Data Agreements and Initial Precautions Data Management Procedures Training 10
  • 12. Data Agreements When collecting data establish: Who owns the data How will it be collected Who stores and processes it How long will identifying information be retained Who has access to identifying information The answers to these questions can help in determining whether you believe the study can be conducted in an ethical manner. 11
  • 13. Data Management Steps Segment the data collection instrument to separate identifying information from other kinds of information Restrict the number of personnel who have access to identifying information, and who process the raw data Restrict the processing of data to safe environments (e.g., administered internal networks) Never transfer raw data over the internet, and never transport encrypted data and passwords together Secure raw, preferably encrypted, data and backups in a secure location at the end of each day 12
  • 14. Training More than the perfunctory completion of CITI/IRB training not only helps avoid potentially hurtful mistakes but also saves time by training you to think like the IRB With the ability to quickly collect data on emerging digital platforms (e.g., the Volunteer Science Platform or Mechanical Turk), young researchers have to start thinking like PIs even sooner. 13
  • 15. Concluding Thoughts Social network studies are important, but they require us to safeguard not only the privacy of our participants but also of their alters. Consequently, researchers conducting network studies must be very explicit in communicating how the study’s procedures effectively mitigate the risks posed by relational data . For IRBs less familiar with network methodologies, this often requires building trust by meeting with IRB administrators in face-to-face meetings. 14

Notas del editor

  1. The Belmont Report was drafted, in part, in response to landmark social science studies such as Milgram's Obedience to Authority study, Zimbardo's Stanford Prison Experiment, and Humphreys's Tearoom Trade study that demonstrated social and behavioral research can also carry risks of harm to participants/respondents. In particular, these studies highlighted the potential risks social science studies can have for psychological well-being , violations of autonomy and privacy, and reputational damage if safeguards are not taken.
  2. The possibility of deductive disclosure can not only pose potential privacy risks but also raise ethical questions, particularly in studies examining suicidal ideation or abuse. In addition, the tie structure itself can be a form of deductive disclosure (e.g., superior/subordinate relationships in organizational departments). In these cases, simply anonymizing the nodes may still leave employees at risk of adverse action.
  3. The tracking of privacy information is becoming its own research area (e.g., DataMap and AboutMyInfo), (http://thedatamap.org/) and http://aboutmyinfo.org/ respectively. Federal Certificate of Confidentiality: Protects subjects against data subpoenas and prosecution on the basis of research data.
  4. Local Network/Ego-network studies do not need identified alters. Local networks can be constructed by asking participants to list attributes of their alters, and characteristics of their alters. Participants can construct a two step ego-network by asking them to list connections between their alters. Note, alters can remain anonymous in this type of study because participants can use letters or numbers to refer to their friends when listing their attributes and the types of relationship between ego and alter. These studies can examine how the number of alters or the effect of risky relationships on pathogen spread.
  5. To identify the implications of the global structure of the network, participants must be able to name common alters, meaning during data collection and cleaning we must retain not only the identities of the participants but also their alters. For research questions examining the diffusion potential of a setting, this type of analysis is necessary. For example, the two networks imply two different diffusion potentials. Network 1, for example, requires more steps to diffuse a given disease (within 2 steps a pathogen could spread to 7/8ths of the network). Network 1’s structure would also imply a targeted intervention strategy, whereas network 2 has more redundant ties and would thus imply a more general intervention strategy.
  6. Waivers for consent for secondary subjects are possible if the meet the following conditions: 1) Minimal Risk (We can ensure this through good data practices and research design)? 2) Is it practicable to conduct the research without the waiver (not for Global Level Questions)? 3) Will waiving or altering informed consent adversely affect the subjects’ rights and welfare? 4) Will pertienent be provided to subjects later, if appropriate?
  7. How it will be collected includes the informed consent form or other consent agreements, guaranteeing the right of participants to not participate. the stimulus, debriefing where necessary (e.g., work on social support networks). In studies collecting data based on online artifacts, terms of service agreements are an important additional consideration that IRB may not catch.
  8. By thinking like a PI, I mean not only making smart safe data management choices but also communicating clearly expectations to other graduate students assisting in data collection.