100 Activities for Teaching Research Ethics and Integrity
eBook - ePub

100 Activities for Teaching Research Ethics and Integrity

  1. 376 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

100 Activities for Teaching Research Ethics and Integrity

Book details
Table of contents
Citations

About This Book

This practical, user-friendly guide consists of 100 original activities that have been designed to inspire and support educators of research ethics and integrity at undergraduate and postgraduate level. Focussing on eight key areas, activities include: •Respecting human dignity, privacy and rights
•Obtaining informed consent in the digital world
•Capturing data on sexual orientation and gender identity
•Recognizing and addressing bias when collecting data
•Creating social change through research practice
•Assessing the ethical implications of data sharing. Complete with detailed teaching notes and downloadable student handouts, as well as guidance on the type and level of each activity, 100 Activities for Teaching Research Ethics and Integrity is an essential resource for both online and face-to-face teaching.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access 100 Activities for Teaching Research Ethics and Integrity by Catherine Dawson in PDF and/or ePUB format, as well as other popular books in Business & R&D. We have over one million books available in our catalogue for you to explore.

Information

Year
2022
ISBN
9781529785708
Edition
1
Subtopic
R&D

Table of contents

  1. Cover
  2. Half Title
  3. Publisher Note
  4. Title Page
  5. Copyright Page
  6. Contents
  7. Activity Level Index
  8. Activity Type Index (in alphabetical order)
  9. Online Resources
  10. About the Author
  11. Introduction
  12. Section 1 Moral and Social Imperatives
  13. Activity 1 Respecting Human Dignity, Privacy and Rights
  14. Activity 2 Discussing the Ethics of Consent and Purpose
  15. Activity 3 Assessing the Complexities and Tensions of Research Ethics
  16. Activity 3 Assessing the Complexities and Tensions of Research Ethics
  17. Activity 4 Meeting the Ethical Needs of Stakeholders
  18. Activity 4 Meeting the Ethical Needs of Stakeholders
  19. Activity 5 Assessing Research Accountability
  20. Activity 5 Assessing Research Accountability
  21. Activity 6 Aligning with the UN’s Sustainable Development Goals
  22. Activity 6 Aligning with the UN’s Sustainable Development Goals
  23. Activity 7 Promoting Social Good through Research Practice
  24. Activity 7 Promoting Social Good through Research Practice
  25. Activity 8 Conducting Discrimination-Aware and Fairness-Aware Research
  26. Activity 9 Discussing Privacy and Confidentiality in the Research Context
  27. Activity 9 Discussing Privacy and Confidentiality in the Research Context
  28. Activity 10 Working within the Principle of Beneficence
  29. Activity 11 Avoiding Harm to Others
  30. Activity 12 Comparing Codes of Ethics
  31. Activity 12 Comparing Codes of Ethics
  32. Activity 13 Creating Social Change Through Research Practice
  33. Activity 13 Creating Social Change Through Research Practice
  34. Activity 14 Working with Vulnerable People
  35. Activity 15 Conducting Research with Children
  36. Section 2 Researcher and Institution Conduct
  37. Activity 16 Discussing Epistemic Norms
  38. Activity 16 Discussing Epistemic Norms
  39. Activity 17 Cultivating Transparency and Openness
  40. Activity 18 Appraising Disciplinary Standards of Acceptable Academic Conduct
  41. Activity 18 Appraising Disciplinary Standards of Acceptable Academic Conduct
  42. Activity 19 Viewing Integrity as an Individual and Collective Responsibility
  43. Activity 20 Fostering Research Integrity Through Practice
  44. Activity 21 Developing a Resilient Integrity Culture
  45. Activity 22 Avoiding Research Misconduct
  46. Activity 22 Avoiding Research Misconduct
  47. Activity 23 Avoiding Plagiarism
  48. Activity 24 Critiquing Contract Cheating
  49. Activity 24 Critiquing Contract Cheating
  50. Activity 25 Recognizing Conflict of Interest
  51. Activity 25 Recognizing Conflict of Interest
  52. Activity 26 Ensuring Researcher Safety
  53. Activity 26 Ensuring Researcher Safety
  54. Activity 27 Carrying out a Risk Assessment
  55. Activity 28 Evaluating Biases with Reference to Equality, Diversity and Inclusion
  56. Activity 28 Evaluating Biases with Reference to Equality, Diversity and Inclusion
  57. Activity 29 Collaborating Ethically in Research
  58. Activity 29 Collaborating Ethically in Research
  59. Activity 30 Researching Cross-Culturally
  60. Activity 30 Researching Cross-Culturally
  61. Section 3 Compliance with Policy, Standard or Law
  62. Activity 31 Identifying and Complying with Local, Regional and National Law
  63. Activity 32 Understanding and Adhering to Relevant Human Rights Legislation
  64. Activity 32 Understanding and Adhering to Relevant Human Rights Legislation
  65. Activity 33 Knowing about the General Data Protection Regulation (Gdpr)
  66. Activity 34 Researching Illegal, Unlawful, Illicit or Dangerous Behaviour
  67. Activity 35 Seeking Permission with Regard to Data Ownership
  68. Activity 35 Seeking Permission with Regard to Data Ownership
  69. Activity 36 Working within the European Code of Conduct for Research Integrity
  70. Activity 37 Aligning with the Concordat to Support Research Integrity
  71. Activity 37 Aligning with the Concordat to Support Research Integrity
  72. Activity 38 Protecting Intellectual Property
  73. Activity 38 Protecting Intellectual Property
  74. Activity 39 Avoiding Copyright Infringement
  75. Activity 40 Understanding Digital Licences, Laws and Conventions
  76. Activity 41 Obtaining Ethical Approval
  77. Section 4 Digital Technology, Software and Tools
  78. Activity 42 Obtaining Informed Consent in the Digital World
  79. Activity 42 Obtaining Informed Consent in The Digital World
  80. Activity 43 Critiquing the Presentation of Self in Online Worlds
  81. Activity 43 Critiquing the Presentation of Self in Online Worlds
  82. Activity 44 Managing the Researcher’s Online Presence
  83. Activity 45 Designing Inclusive Data Systems
  84. Activity 45 Designing Inclusive Data Systems
  85. Activity 46 Reclaiming Datasets for Social Justice
  86. Activity 46 Reclaiming Datasets for Social Justice
  87. Activity 47 Evaluating Compliance of Software Companies and Third-Party Providers
  88. Activity 47 Evaluating Compliance of Software Companies and Third-Party Providers
  89. Activity 48 Assessing the Reliability of Digital Tools and Software
  90. Activity 49 Assessing the Ethical Implications of Data Mining
  91. Activity 49 Assessing the Ethical Implications of Data Mining
  92. Activity 50 Evaluating Privacy Policies of Software Companies and Third-Party Providers
  93. Activity 51 Assessing the Neutrality of Online Platforms, Tools and Data
  94. Activity 52 Assessing Bias in Search Tools
  95. Activity 52 Assessing Bias in Search Tools
  96. Activity 52 Assessing Bias in Search Tools
  97. Activity 52 Assessing Bias in Search Tools
  98. Activity 53 Overcoming Problems with Weak, Restricted, Non-Existent or Invisible Data Systems
  99. Activity 53 Overcoming Problems with Weak, Restricted, Non-Existent or Invisible Data Systems
  100. Activity 54 Understanding Problems Associated with Unequal Access to Data
  101. Activity 54 Understanding Problems Associated with Unequal Access to Data
  102. Activity 55 Assessing the Ethical Implications of Ownership and Use of Digital Technology
  103. Activity 55 Assessing the Ethical Implications of Ownership and Use of Digital Technology
  104. Activity 56 Citing Digital Tools and Software Correctly
  105. Section 5 Data Collection
  106. Activity 57 Seeking Informed Consent
  107. Activity 58 Cultivating Sensitivity in Method
  108. Activity 58 Cultivating Sensitivity in Method
  109. Activity 59 Critiquing Overt and Covert Methods
  110. Activity 59 Critiquing Overt and Covert Methods
  111. Activity 60 Collecting Personal Information Sensitively
  112. Activity 60 Collecting Personal Information Sensitively
  113. Activity 61 Capturing Data on Sexual Orientation and Gender Identity
  114. Activity 61 Capturing Data on Sexual Orientation and Gender Identity
  115. Activity 62 Addressing Issues of Anonymity and Confidentiality
  116. Activity 62 Addressing Issues of Anonymity and Confidentiality
  117. Activity 63 Recognizing and Addressing Bias when Collecting Data
  118. Activity 63 Recognizing and Addressing Bias when Collecting Data
  119. Activity 64 Avoiding Sampling Bias
  120. Activity 65 Assessing the Ethical Implications of Incentives and Rewards
  121. Activity 66 Reducing Participant Burden
  122. Activity 67 Identifying Unethical Practice when Collecting Data
  123. Activity 67 Identifying Unethical Practice when Collecting Data
  124. Activity 68 Collecting Images and Using Visual Methods Ethically
  125. Activity 68 Collecting Images and Using Visual Methods Ethically
  126. Activity 69 Assessing the Challenges and Potential Negative Effects of Fieldwork
  127. Activity 70 Critiquing Representation of the Researcher in Qualitative Research
  128. Section 6 Data Analysis
  129. Activity 71 Identifying Unethical Practice when Analysing Data
  130. Activity 71 Identifying Unethical Practice when Analysing Data
  131. Activity 72 Assessing Ethical Issues in Data Analytics
  132. Activity 72 Assessing Ethical Issues in Data Analytics
  133. Activity 72 Assessing Ethical Issues in Data Analytics
  134. Activity 73 Recognizing and Addressing Bias when Analysing Qualitative Data
  135. Activity 73 Recognizing and Addressing Bias when Analysing Qualitative Data
  136. Activity 74 Avoiding Bias in Quantitative Analyses
  137. Activity 75 Avoiding Wrong Conclusions
  138. Activity 75 Avoiding Wrong Conclusions
  139. Activity 76 Recognizing False, Fabricated or Misleading Analyses
  140. Activity 76 Recognizing False, Fabricated or Misleading Analyses
  141. Activity 76 Recognizing False, Fabricated or Misleading Analyses
  142. Activity 77 Critiquing the Origin and Provenance of Data
  143. Activity 77 Critiquing the Origin and Provenance of Data
  144. Activity 78 Assessing the Neutrality of Raw Data
  145. Activity 78 Assessing the Neutrality of Raw Data
  146. Activity 79 Discussing the Ethics, Integrity and Practice of Anonymization in Analysis, Secondary Analysis, Re-Analysis and Third-Party Analysis
  147. Activity 79 Discussing the Ethics, Integrity and Practice of Anonymization in Analysis, Secondary Analysis, Re-Analysis and Third-Party Analysis
  148. Activity 80 Avoiding Unethical or Inappropriate Action Resulting from Analyses
  149. Section 7 Data Management
  150. Activity 81 Producing a Data Management Plan
  151. Activity 82 Aligning with the FAIR Principles
  152. Activity 83 Producing a Data Access (or Availability) Statement
  153. Activity 84 Anonymizing Qualitative and Quantitative Data
  154. Activity 85 Keeping Research Data Protected and Secure
  155. Activity 85 Keeping Research Data Protected and Secure
  156. Activity 86 Protecting Research Data Against Hacking, Theft, Interception or Insertion of Rogue Data
  157. Activity 86 Protecting Research Data Against Hacking, Theft, Interception or Insertion of Rogue Data
  158. Activity 87 Assessing Short-Term Storage and Long-Term Data Preservation Strategies
  159. Activity 88 Discussing the Ethics of Data Ownership in the Research Context
  160. Activity 89 Assessing the Ethical Implications of Data Sharing
  161. Activity 89 Assessing the Ethical Implications of Data Sharing
  162. Activity 90 Critiquing the Misuse and Abuse of Research Data
  163. Section 8 Results and Outputs
  164. Activity 91 Building Trust in Inferences and Conclusions
  165. Activity 92 Repeating, Reproducing and Replicating Research
  166. Activity 92 Repeating, Reproducing and Replicating Research
  167. Activity 93 Debating the Replication Crisis
  168. Activity 93 Debating the Replication Crisis
  169. Activity 94 Ensuring Against Exploitation of Results and Outputs
  170. Activity 95 Knowing Where and How to Publish
  171. Activity 95 Knowing Where and How to Publish
  172. Activity 96 Discussing Open Research, Open Science and Open Access
  173. Activity 97 Recognizing Reporting Bias
  174. Activity 98 Understanding the Influence of Publication Bias
  175. Activity 98 Understanding the Influence of Publication Bias
  176. Activity 99 Communicating and Reporting Ethically
  177. Activity 100 Displaying and Publishing Images Ethically
  178. Index