must accept that randomization occurs to better understand the differences
between groups, particularly when it is not known if treatments are beneficial.
In blinded studies, nurses should not speculate with subjects or their families
about the intervention. When nurses are informed of RCTs, they are more
likely to assist researchers in recruiting, enrolling, and retaining participants
(Roll et al., 2013).
The Internet is an accepted source of data and method used to collect data;
therefore, it is important for nurses to be aware of some ethical considerations,
namely, privacy and confidentiality. Because Internet communications leave
a trail of archived records, privacy and confidentiality might be threatened.
There is growing debate about whether information on the Internet is private
or public. If the site is considered to be public, researchers may use informa-
tion without obtaining informed consent (Coons, 2014). Whenever collecting
data from the Internet, consideration should be given to questions such as:
“1) What is private?, 2) What is identifiable?, 3) How can IRBs and research-
ers protect subjects’ online privacy and confidentiality interests?, and 4) Can
they minimize risks when using sensitive online data?” (Coons, 2014, p. 77).
There is mounting concern that data collected via the Internet could be
sold to others, posing threats to individuals who are willing to meet via the
Internet and share health-related experiences. Additionally, data that cur-
rently are not linked to individuals may be identifiable in the future. When
online methods are used, individuals should access the Internet via a secure
site and use usernames and passwords. Security issues must be monitored
continuously throughout the data collection process, and researchers also
need to update and upgrade security measures frequently (Im & Chee,
2006). It is essential that researchers protect any personal data or IP ad-
dresses and comply with the Health Insurance Portability and Accountability
Act (HIPAA).
Regardless of how data are collected, researchers must implement strategies to
keep data secure. Attention to data collection methods is imperative to prevent
error. Researchers should not feel pressured to falsify or fabricate data because
there are statistical methods to address missing data. Security measures must
be in place to ensure that only authorized individuals have access to data. For
example, data should be kept in secured computer files that require passwords
to access. Codes, rather than names of subjects, must be used on data collection
instruments such as questionnaires and laboratory reports to ensure anonym-
ity. Raw data should be stored in locked cabinets, and audiotapes should be
destroyed after they are transcribed.
10.5 Keeping It Ethical 279