Social Research Methods: Qualitative and Quantitative Approaches

(Brent) #1
HOW TO REVIEW THE LITERATURE AND CONDUCT ETHICAL STUDIES

KEY TERMS
abstract
anonymity
citation
code of ethics
confidentiality
contract research

crossover design
informed consent
institutional review board
(IRB)
meta-analysis
nuremberg code

principle of voluntary
consent
research fraud
scientific misconduct
special population
whistle-blower

REVIEW QUESTIONS

1.What are the four major goals of a literature review?
2.Which outlets of research are easiest to locate and which are the most difficult?
3.How would you locate a Ph.D. dissertation?
4.What distinguishes a strong from a weak literature review?
5.What are the major advantages and disadvantages of using the Internet for social
research?
6.What is the primary defense against unethical conduct in research?
7.How do deceiving and coercing individuals to participate in research conflict with
the principle of voluntary consent?
8.Explain the ethical issues in the Milgram, Humphreys, and Zimbardo examples.
9.What is informed consent,and how does it protect research subjects?
10.What is the difference between anonymityand confidentiality?

NOTES


  1. See Hunt (1997) and Hunter and associates (1982).

  2. From Hargens (1988).

  3. Based on Hargens (1991).

  4. See Reynolds (1979:56–57) and Sieber (1993).

  5. See research fraud discussion in Broad and Wade
    (1982), Diener and Crandall (1978:154–158), and Wein-
    stein (1979). Also see Hearnshaw (1979) and Wade (1976)
    on Cyril Burt. Kusserow (1989) and the September 1, 1989,
    issue of the National Institutes of Health weekly Guide
    summarize some recent scientific misconduct issues.

  6. See “Noted Harvard Psychiatrist Resigns Post after
    Faculty Group Finds He Plagiarized,”Chronicle of
    Higher Education(December 7, 1988).

  7. See Blum (1989) and D’Antonio (1989) on this case
    of plagiarism.

  8. See “Doctor Is Accused of ‘Immoral’ Tests,’”New
    York Times(December 9, 1988). For a more general dis-
    cussion of power and trust, see Reynolds (1979:32).

  9. Lifton (1986) provided an account of Nazi medical
    experimentation.

  10. See Jones (1981) and Mitchell (1997) on the Bad
    Blood case.

  11. Diener and Crandall (1978:128) discuss these
    examples.

  12. See Warwick (1982) on types of harm to research
    participants. See Reynolds (1979:62–68) on rates of harm
    in biomedical research. Kelman (1982) discusses differ-
    ent types of harm from different types of research.

  13. College counselors report that anxiety and low self-
    esteem over dating are major problems among college
    women (Diener and Crandall, 1978:21–22). Also see
    Kidder and Judd (1986:481–484).

  14. See Dooley (1984:330) and Kidder and Judd (1986:
    477–484).

  15. See Hallowell (1985) and “Threat to Confidentiality
    of Fieldnotes,”ASA Footnotes,12:6.

Free download pdf