Building Ethics into the Research with Vulnerable groups
1. Building Ethics into the Research
with Vulnerable Groups
La Zhuo
University of Guelph
EDRD 6000: QUALITATIVE ANALYSIS
2. Overview of General Ethical Considerations
Consent
process
• Free
• Informed
• Ongoing
Sampling
Methodology
• Appropriate inclusion
• Avoid inappropriate
exclusion
Confidentiality
• Anonymity
• confidentiality
• privacy
• Safety
Research
Practice
• Concerns for welfare
• Respect for participants
• Justice
Ethics in
Research
Design
(TCPS2, 2010)
3. Understanding Vulnerability
4 dimensions of vulnerability:
1. Vulnerable individuals: children, women, the elderly, the mentally and physically disabled,
refugees.
2. Vulnerable groups and vulnerability through group membership: religious group, ethnic
group, minority group, institutional membership such as prisoners
3. Construction of vulnerability: vulnerability is the result of research activity such as
confirmation of stereotypes about the social group (homeless people, prostitutes, drug
addicts, single mothers, asylum seekers, the long-term unemployed, ethnic minorities, or
gay)
4. Vulnerable research environment: the environment that is intimidating or dangerous
(socially or physically) for participants.
(Biggs et al).
Vulnerability is often caused by limited capacity, or limited access to social
goods, such as rights, opportunities and power (TCPS2, 2010).
4. Sources of Vulnerability
Economic Status and Geographic Location
Health, Age, and Functional or Developmental Status
Communication Barriers
Unexplained Vulnerability Associated with Race, Ethnicity, Sex
5. Ethics in Research Design: Consent and Power
Ethically Preferred Consent Process Practical Difficulties
Seeking access from gate
keepers
Researchers need to gain
permissions from gatekeepers
(e.g. parents, guardians or
authorized third parties) before in
a position to seek the consent of
vulnerable individuals.
Relying on a third party or
agency that are already in the
field could ensure that the
process maintains ethical
integrity (Melrose, 2002).
Time consuming
It may require several layers of consent to access
to individuals. (Munro, Holmes & Ward, 2005).
Exclusion of individuals’ chances to
participate
Considering the well-being of the research
participants, the gate keepers decide whether it
is appropriate for one to participate. Such time
consuming procedure may exclude vulnerable
individuals with great willingness to participate.
Power issue
The exclusion of potential interested participant
may impose limitations on the final sample and
further impacts on the findings (Melrose, 2002).
The finding may serve the gate keeper‟s best.
6. Ethics in Research Design: Sampling Methodology
Opt-in sampling method:
Participants are asked to
actively volunteer to
participate by responding to
the recruitment. This includes
signing the consent form or
giving verbal consent.
Opt-out sampling method:
Participants are deemed to
have given consent and
excluded only when they
refuse to participate.
(The Research Ethics Guidebook)
7. Ethics in Research Design: Sampling Methodology
Ethically Preferred Sampling Methodology Practical Implications
Opt-in sampling
Ethics committees are more likely to expect
researchers to prefer opt-in sampling (The
Research Ethics Guidebook).
“The opt-in approach has ethical advantages
because consent is actively given by the
child/young person, following consent from a
range of adult gate-keepers and is often
preferred by policy makers and social service
managers” (Munro, Holmes & Ward, 2005).
Opt-in sampling method would make
researchers more reliant on local personnel to
facilitate access to children” (Munro, Holmes
& Ward, 2005).
Opt-in samples are small and less
representative. (Munro, Holmes & Ward, 2005).
When a participant seeks to opt-out, the data
collected from them may already have been
accessed and processed (The Research Ethics
Guidebook).
Equal opportunity for members to participate
within the community
“It challenges the researchers to develop
strategies to reach out to the broader
community members whilst still respecting and
acknowledging the status of the gatekeepers”
(Pittaway, Bartolomei, & Hugman, 2010).
8. Ethics in Research Design: Confidentiality and Trust
Ethics Implications
Protecting confidentiality as researcher’s duty
It is the researcher‟s duty to protect the
confidentiality of the sensitive personal
information.
Conflict of duties
If the participant is considered by the researcher to
be at risk, the researcher has the obligation to protect
and inform relevant authorities. This may require
certain level of exposure of information. (Melrose,
2002).
For example,in the situation which a young people‟s
life is threatened by ongoing abuse, the researcher
has forced duty to protect the participant by
breaking the confidentiality promise (Melrose, 2002).
Risks for vulnerable participants
Individuals participate in the research
involves sensitive issues may face higher level
of risks than other qualitative research.
Such risk may threaten individuals‟ welfare or
well-being, for example, abused women
participate in the research may be physically
threatened by the husband.
“While protecting the confidentiality, the researchers
in sensitive area should keep in mind that vulnerable
people, however, may be in greater danger from
NOT having participated and NOT having their story
told” (Biggs et al).
9. Ethics in Research Design: Research Practise
Research Settings and Design Implication
Presence of gate keepers
The gate keeper can play an important role in
ensuring the vulnerable individual is comfortable and
understands the research.
In the home setting, for example, parent can provide
children with particular communication or support
needs.
Violation of voluntariness
Individuals may feel inhibited to reveal personal
information or feel obliged to provide socially
acceptable responses (Shaw, Brady, & Davey, 2011).
Institutional setting
Special care is given to vulnerable groups in the
institutional settings in order to ensure the voluntariness
of participation. Such situation includes prisons, care
homes, school settings, or other situations where
individuals‟ welfare depends on the caregiver.
There is a deep-rooted dynamic of compliance
associated with the institutional care.
Violation of voluntariness
“In institutional settings, where conformity and
compliance are rewarded, people may not feel that
they have a real choice” (Biggs et al).
Due to the usual experiences of students in the school
setting, they may feel pressure to only provide the right
answer (Shaw, Brady, & Davey, 2011).
General level of researchers’ involvement
The researcher‟s duty is merely established upon
gathering data and ends once the research is
completed.
The trust with vulnerable group is formally established
in the process of consent and data collection (Biggs et
al).
Increase vulnerability
Participants may left vulnerable revealing feelings,
stories, and emotions.
Research may cause harm to participants by
Immediate involvement and recruitment through
confirmation of negative stereotypes (Pittaway,
Bartolomei, & Hugman, 2010).
10. Practical Tactics
Reporting back: vulnerable participants may be particularly sensitive with “hit
and run” situation. Researcher should extend the obligation beyond merely
gather data for own research.
Follow-up support: research can sometimes cause additional harm to
vulnerable people when individuals‟ feeling and emotion are fully exploited.
Narrative research method: with the research involves individuals experiencing
emotional crisis, direct questions are unethical, causing distress and anxious. The
narrative approach can be therapeutic for participants.
Disguise information: in some case researchers can disguise the information of
personal identities or research location in order to effectively protect
confidentiality.
Hidden involvement of participants: with the research may impose higher risks
for participants, it is important to ensure the participants are not seen or
contacted throughout the research.
11. References
Biggs, H, Clough, R, Esterhuizen, L., Hatton, C., Levitt, M, & Rennie, C. (n.d.). Vulnerable People and Groups.
Retrieved from http://www.lancaster.ac.uk/researchethics/4-3-infcons.html
Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council of Canada, and
Social Sciences and Humanities Research Council of Canada, Tri-Council Policy Statement: Ethical Conduct for
Research Involving Humans, December 2010.
Munro, E. R., Holmes, L., & Ward, H. (2005). Researching vulnerable groups: Ethical issues and the effective
conduct of research in local authorities. British Journal of Social Work, 35(7), 1023-1038.
Pittaway, E., Bartolomei, L., & Hugman, R. (2010). „Stop stealing our stories‟: The ethics of research with vulnerable
groups. Journal of Human Rights Practice, 2(2), 229-251.
Shaw, C., Brady, L. M., & Davey, C. (2011). Guidelines for research with children and young people. London:
National Children‟s Bureau Research Centre.
The Research Ethics Guidebook. (n.d.). Opt-in and opt-out sampling. Retrieved from
http://www.ethicsguidebook.ac.uk/Opt-in-and-opt-out-sampling-94