Chapter 3 Flashcards
Informed Consent
Meaning that research subjects understand the nature of the study and its potential risks
Basic Research
Research that seeks to advance knowledge purely for knowledge’s sake
Confidentiality
Means that the researcher knows the research subjects’ identities but ensures that this information is not shared with individuals outside the research team
Anonymity
Means that the researcher does not know the research subjects’ identities and that the research details cannot be combined in a manner that would reveal the subjects’ identities
P-hacking
A data manipulation practice in which researchers change their statistical models by selectively including or excluding variables in order to achieve statistically significant results.
Intellectual property
Ideas expressed in a research publication, a public presentation, or even a university lecture class
Experimental research
Research that involves the researcher intervening in some way to randomly assign some subjects to a treatment group and others to a control group before an event takes place.
Knowledge Mobilization
A term used to describe the practical social application of research.
Policy Analysis
The analysis of public policy processes or outcomes.
Privacy
According to the TCPS 2, an individual’s right to be free from intrusion or interference by others.
Tri-Council Policy Statement
Ethical Conduct for Research Involving Humans (TCPS 2): a document that establishes a framework of ethical guidelines for research on human subjects in Canada.
Big data
Content data from digital and social media
Secondary data
Data collected by other research
basic research
research that seeks to advance knowledge purely for knowledge’s sake
right to withdraw.
to leave the study
publication bias
in which quantitative research that provides support for a hypothesis in the form of statistically significant results is more likely to be accepted for peer review publication than research that does not present statistically significant results
preregistration:
researchers submit their research design, hypotheses, and data analysis plan to a registry prior to starting data collection, or prior to starting analysis of a pre-existing dataset.
According to the TCPS 2, the following is not a criterion for which a research ethics board (REB) may approve research that does not require standard consent procedures: ______.
The participant will be debriefed at a later time
The research involves no more than minimal risk
It is not possible to carry out the research if prior consent is required
The lack of consent is unlikely to affect the welfare of the participant
It is not possible to carry out the research if prior consent is required
In cases where full knowledge of the true purpose of the research may influence or condition participants’ answers to research questions, \_\_\_\_\_\_\_\_ may sometimes be justified. stigmatization refining the sample deception termination of the project
deception
Which one of these concerns is specific to ethical challenges in data storage?
How will you ensure a high enough response rate to your survey?
How will you ensure that the data you collect will be anonymous?
How will you prevent data on a cloud-based service from getting hacked?
How will you prevent data on a cloud-based service from getting hacked?
Research is likely to be deemed threatening when it ______.
gives research participants full disclosure
fails to receive funding
impinges on the vested interests of powerful persons
reports null results
impinges on the vested interests of powerful persons
The concept of \_\_\_\_\_\_ refers to the possibility that a particular data analysis may be used against the interests of the group from which respondents were drawn. betrayal confidentiality plagiarism knowledge mobilization
Betrayal
The following statement regarding ethical guidelines for social science research is not true: ______.
They are now more than normative
They are meant to muzzle the engagement of political scientists in public policy debate
They are generally embodied in specific institutional documents
They are generally policed by ethics review committees
They are meant to muzzle the engagement of political scientists in public policy debate
The most common form of dissemination for academic research is through \_\_\_\_\_\_. research reports general-interest website peer-reviewed scholarly publications the popular press
Peer-reviewed scholarly publications
In a research program involving __, TCPS 2 guidelines indicate that researchers should obtain both the informed consent of each research subject and of the community that is the subject of the study.
Aboriginal Peoples
Which one of these concerns is specific to ethical challenges in data storage?
cloud-based data could be hacked
The most common form of dissemination for academic research is through __.
peer-reviewed scholarly articles
In matters of questionnaire design, researchers must __.
ask only what they need to ask
The concept of __ refers to the possibility that a particular data analysis may be used against the interests of the group from which respondents were drawn.
betrayal
Research is likely to be deemed threatening when it __.
impinges on the vested interests of powerful persons
Many of the ethical guidelines currently employed in the social sciences find their roots in __ research.
medical
According to the TCPS 2, the following is not a criterion for which a research ethics board (REB) may approve research that does not require standard consent procedures: __.
It is possible to carry out the research if prior consent is required
The following statement regarding ethical guidelines for social science research is not true: __.
They are meant to muzzle the engagement of political scientists in public policy debate
In cases where full knowledge of the true purpose of the research may influence or condition participants’ answers to research questions, __ may sometimes be justified.
deception