P.2: Week 4: Field Study, Methods, Ethics, and Data Management

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

Preparatory Stages

Before researchers can step into the field, they must undergo several __ stages that ensure their work is ethical, credible, and safe.

2
New cards

Institutional Approval

Every psychological study must first be reviewed and authorized by a governing body such as an Ethics Review Committee or Institutional Review Board (IRB).

3
New cards

Institutional Approval

Purpose: Ensures compliance with ethical/legal standards. Protects participants’ rights (esp. vulnerable groups). Confirms risks, benefits, and methods are well considered. Example: A psychology student studying stress in psychiatric patients must first obtain clearance from the hospital’s ethics committee.

4
New cards

Preparatory Stages of Planning Research

Institutional Approval, Informed Consent Form (ICF), Informed Consent in Intervention Experiments

5
New cards

Informed Consent

The cornerstone of ethical research—it ensures participants voluntarily agree to take part after being fully informed.

6
New cards

Key Provisions in an ICF

Purpose and Procedures, Freedom to Withdraw, Risks and Discomforts, Benefits, Confidentiality Limits, Incentives, Contact Information.

7
New cards

Purpose and Procedures

Participants must know what the study is about, what they will be asked to do, and how long it will take.

8
New cards

Freedom to Withdraw

They may refuse to join or stop participating anytime without penalty.

9
New cards

Risks and Discomforts

Any possible negative effects must be disclosed.

10
New cards

Benefits

Clarify potential contributions to science or community, and possible personal benefits.

11
New cards

Confidentiality Limits

Explain how data will be protected and when confidentiality might be broken (e.g., legal obligations, risk of harm)

12
New cards

Incentives

If participants receive compensation, it must be disclosed.

13
New cards

Contact Information

Give details of a researcher or supervisor who can answer questions.

14
New cards

Informed Consent in Intervention Experiments

Special ethical concerns arise in clinical or intervention research, where participants may or may not receive a potentially helpful treatment.

15
New cards

Informed Consent in Intervention Experiments

Requirements: 1. The experimental nature of treatments must be explained at the start. 2. Clearly state what services will not be available to the control group. 3. Method of assignment (e.g., randomization) must be explained. 4. Clarify what treatments or support are available for those who do not participate. 5. Financial aspects (costs, reimbursements, incentives) must be transparent.

16
New cards

Informed Consent in Intervention Experiments

Example: In a depression therapy trial, control group participants must be told they won’t get the new therapy but will still receive standard care.

17
New cards

Common Ethical Debates in Field Research

Deception, Potential Harm, Informed Consent Challenges, Confidentiality, Authorship & Plagiarism.

18
New cards

Deception

Sometimes researchers hide the true purpose of a study to prevent biased behavior.

19
New cards

Deception is Acceptable Only If

  1. No non-deceptive method is possible. 2. The study contributes significantly to knowledge. 3. It won’t cause serious harm or distress. 4. Participants are fully debriefed afterward. Example: A stress study where participants are told they’re doing a “memory test” to avoid altered responses.
20
New cards

Potential Harm

Researchers must minimize all risks, not only physical but also psychological (stress, embarrassment, stigma). Example: A survey on bullying must ensure anonymity to prevent stigma.

21
New cards

Informed Consent Challenges

In emergencies (e.g., disaster zones), formal consent may be difficult to obtain, but researchers must adapt while still respecting autonomy. Example: During disaster relief, verbal consent may be used when written consent is impractical.

22
New cards

Confidentiality

Protecting participant data while balancing legal/ethical duties to report (e.g., abuse disclosures). Example: A psychologist must report child abuse if revealed in an interview, even while ensuring other data remain confidential.

23
New cards

Authorship & Plagiarism

Researchers must not fabricate, falsify, or misuse data. Proper credit must be given in publications. Example: A field study report must acknowledge all contributors to avoid authorship disputes.

24
New cards

Debriefing Requirements for Use of Deception in Research

Explaining full research details to participants after their involvement. Purpose: Restores trust between researcher & participant, Clears misconceptions, Provides psychological support if needed. Example: After a stress experiment, participants must be told why stress tasks were used and reassured that their reactions were normal.

25
New cards

Data

Often called the “lifeblood of psychological research” because every conclusion, insight, and policy recommendation rests upon the information collected in the field.

26
New cards

Data

If __ is mishandled, it can compromise scientific integrity (producing flawed or fabricated findings) and violate participants’ rights (exposing them to harm, stigma, or loss of trust).

27
New cards

Proper Data Management

___ not simply a technical step—it is an ethical responsibility that reflects the credibility of both the researcher and the discipline.

28
New cards

Core Principles of Data Management

Consent, Confidentiality, Security, Retention and Disposal, Transparency and Accuracy.

29
New cards

Consent

Data must only be collected with the knowledge and voluntary agreement of participants.

30
New cards

Consent

Rule: Data cannot be repurposed for unrelated studies without renewed permission. Example: If participants consent to stress interviews, their responses cannot later be used for a study on family conflict unless they agree again.

31
New cards

Confidentiality

Protecting participant identities through anonymization (codes like “P1”) and removal of identifying details (e.g., school, barangay names). Example: Instead of reporting “Juan, a health worker from Brgy. San Pedro,” researchers use “Respondent A, a health worker.”

32
New cards

Security

It involves technological and physical safeguards: password-protected files, encrypted drives, secure cloud storage, or locked filing cabinets for handwritten notes.

33
New cards

Security

Methods: Password-protected files, encrypted drives, secure cloud storage, locked filing cabinets. Example: Field notes stored on an encrypted USB instead of an open laptop folder.

34
New cards

Data Breach

A __ breach could not only harm participants but also damage the researcher’s reputation and credibility.

35
New cards

Retention & Disposal

Keep data only as long as needed for analysis, verification, or per institutional rules. Dispose of it responsibly afterward.

36
New cards

Retention & Disposal

Methods: Shredding hard copies, permanently deleting digital files. Example: After 5 years (institutional policy), interview recordings are erased to prevent unauthorized reuse.

37
New cards

Transparency & Accuracy

Researchers should maintain detailed documentation, such as data logs and inventories, to track when, how, and by whom data was collected.

38
New cards

Transparency & Accuracy

This prevents errors, fabrication, or selective reporting of results. Transparent documentation also ensures that the research can be verified or replicated by others.

39
New cards

Transparency & Accuracy

Maintain detailed data logs and inventories to ensure accuracy, prevent fabrication, and allow replication.

40
New cards

Transparency & Accuracy

Example: A researcher keeps a record of each interview date, duration, and code (P1, P2, etc.) to ensure verifiability.