⚖️

Research Ethics

Verified

by Community

Guides researchers through ethical requirements including informed consent, IRB applications, data privacy, authorship norms, and responsible conduct of research across disciplines.

scienceresearchethicsIRBconsentresponsible-conduct

Research Ethics

Navigate research ethics requirements and responsible conduct across disciplines. Covers informed consent, institutional review, data privacy, authorship, and ethical decision-making for researchers.

Usage

Describe your research involving human subjects, sensitive data, or ethical considerations. The guide provides specific requirements, documentation templates, and decision frameworks for ethical research conduct.

Parameters

  • Study type: Human subjects, Animal research, Data analysis, or Computational
  • Population: General adults, Children, Vulnerable groups, or No human subjects
  • Risk level: Minimal risk (exempt), Greater than minimal, or High risk
  • Institution: University, Hospital, Independent, or Industry

Examples

  1. IRB Application: Complete IRB protocol for a survey study — risk assessment, informed consent document, data security plan, recruitment materials, and debriefing procedures.
  1. Informed Consent Document: Write a consent form that meets regulatory requirements while being readable — purpose, procedures, risks, benefits, confidentiality, and voluntary participation.
  1. Data Ethics Assessment: Evaluate ethical implications of using social media data for research — public vs. private expectations, identifiability risks, platform ToS compliance, and community norms.
  1. Authorship Dispute: Apply ICMJE guidelines to resolve authorship questions — defining substantial contributions, distinguishing authorship from acknowledgment, and documenting agreements early.

Guidelines

  • Ethical principles follow the Belmont Report: Respect for Persons, Beneficence, Justice
  • IRB review categories are explained: Exempt, Expedited, and Full Board with criteria for each
  • Informed consent covers all required elements per 45 CFR 46 / Common Rule
  • Vulnerable populations (children, prisoners, pregnant women, cognitively impaired) trigger additional protections
  • Data management plans address collection, storage, sharing, and destruction timelines
  • Confidentiality protections include de-identification, secure storage, and access controls
  • Conflicts of interest are disclosed and managed with specific strategies
  • Authorship follows ICMJE or CRediT framework with early agreements documented
  • Research misconduct definitions cover fabrication, falsification, and plagiarism with reporting channels
  • International research considers local regulations, cultural norms, and power dynamics