Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Vel quam elementum pulvinar etiam non quam lacus. Tortor dignissim convallis aenean et. Metus dictum at tempor commodo. Laoreet suspendisse interdum consectetur libero id faucibus nisl tincidunt. Leo urna molestie at elementum eu. Imperdiet sed euismod nisi porta. Est placerat in egestas erat imperdiet. Fermentum dui faucibus in ornare quam. Ornare massa eget egestas purus viverra. Id diam maecenas ultricies mi eget mauris pharetra et. Sit amet mauris commodo quis imperdiet massa. A iaculis at erat pellentesque adipiscing commodo. Netus et malesuada fames ac turpis egestas sed tempus. Placerat in egestas erat imperdiet.
Orci sagittis eu volutpat odio facilisis. Pellentesque id nibh tortor id aliquet lectus. Vitae congue eu consequat ac felis. Augue ut lectus arcu bibendum at varius. Tincidunt lobortis feugiat vivamus at. At quis risus sed vulputate odio ut. Sed viverra ipsum nunc aliquet. Vel orci porta non pulvinar neque laoreet suspendisse. Sodales neque sodales ut etiam sit amet. Odio tempor orci dapibus ultrices in iaculis nunc sed augue. Rhoncus mattis rhoncus urna neque viverra justo nec. Feugiat in fermentum posuere urna nec tincidunt praesent semper feugiat. Arcu felis bibendum ut tristique et egestas quis ipsum.
Viverra justo nec ultrices dui sapien. Facilisis mauris sit amet massa. Adipiscing elit duis tristique sollicitudin nibh sit amet commodo. Lacus viverra vitae congue eu consequat ac felis donec et. Arcu cursus euismod quis viverra nibh. Nunc faucibus a pellentesque sit amet. Potenti nullam ac tortor vitae purus faucibus. Semper quis lectus nulla at volutpat diam ut. Quis enim lobortis scelerisque fermentum dui. Curabitur gravida arcu ac tortor dignissim convallis aenean. Orci dapibus ultrices in iaculis nunc sed augue lacus. Aliquet nec ullamcorper sit amet risus. Etiam sit amet nisl purus in mollis nunc sed. Diam vulputate ut pharetra sit amet aliquam. Vitae elementum curabitur vitae nunc sed.
Dignissim convallis aenean et tortor at risus viverra adipiscing. Nullam vehicula ipsum a arcu cursus vitae congue mauris. Et malesuada fames ac turpis egestas sed tempus. Elementum integer enim neque volutpat ac. Blandit libero volutpat sed cras ornare. Eu lobortis elementum nibh tellus molestie nunc. Mi tempus imperdiet nulla malesuada pellentesque elit eget. Quis viverra nibh cras pulvinar. Tortor at risus viverra adipiscing at in tellus integer feugiat. Nec dui nunc mattis enim. Accumsan tortor posuere ac ut consequat semper. Ac feugiat sed lectus vestibulum mattis ullamcorper.
Egestas sed sed risus pretium quam vulputate dignissim suspendisse in. A lacus vestibulum sed arcu non odio. Facilisis mauris sit amet massa vitae tortor condimentum lacinia. Commodo viverra maecenas accumsan lacus. Ut placerat orci nulla pellentesque dignissim enim sit amet venenatis. At in tellus integer feugiat scelerisque varius morbi enim. Tellus pellentesque eu tincidunt tortor. Sit amet consectetur adipiscing elit ut aliquam purus sit. Lacus suspendisse faucibus interdum posuere lorem. Nunc scelerisque viverra mauris in aliquam sem fringilla ut morbi.
Appendix 1 Potential Risks, Harms, and Risk Mitigation Efforts
Risk | Example(s) of Harm/Advarse events | Risk Migration Efforts |
---|---|---|
NOTE: The risk can extend to PERCEPTION. When others PERCEIVE a violation of ethical principles, there remains a high risk to researchers, evaluators, and others for harms described. |
Example: A study in Nairobi examining effects of various mechanisms to increase payments for water supply, including cutting off water access, resulted in various discussions around the ethics of the study (see discussion on ethical considerations here). |
|
NOTE: The risk can extend to PERCEPTION. When others PERCEIVE a violation of ethical principles, there remains a high risk to researchers and others for harms described. |
|
|
|
|
|
|
|
|
|
|
|
|
Example: UNHCR shared detailed database of the Rohingya refugee population with Myanmar’s government. |
|
|
|
|
|
Example: On April 20, 2010, Arizona State University (ASU) agreed to pay $700,000 to 41 members of the Havasupai Indian tribe to settle legal claims that university researchers improperly used tribe members' blood samples in genetic research |
|
|
|
|
|
Example: Data obtained from an implementing partner used to inform influential study later identified as fraudulent data. |
|
11. Loss of confidentiality – with or without additional linkage to private, sensitive data – is a risk driven by several potential actions, including:
|
Example: UNHCR shared detailed database of the Rohingya refugee population with Myanmar’s government; Biometric data on Afghan security forces potentially available to the Taliban. |
|
Appendix 2: Taxonomy of Vulnerability
TABLE 4.1: Taxonomy of Vulnerability for Study Participants | |||
Vulnerability | Definition | Potential Causes | Ethical Research Practice |
---|---|---|---|
Cognitive Vulnerability | The research subject does not have the capacity to deliberate and decide whether to participate in the study | Immaturity (through age, other cause), dementia, certain types of mental illness, disability; educational deficits and unfamiliarity with the language; situational mental distress/crisis | Mitigated through proper Informed Consent plain-language, advance directives (where incapacity is anticipated), supplementary educational measures to ensure comprehension, and the proper use of surrogates and advocates |
Juridic Vulnerability | The research subject is liable to the authority of others who may have an independent interest in the research subject’s participation | Prisons and the military, where wardens and officers have legal authority over prisoners and enlistees; Children under the authority of their parents, Students subordinated to Professors, Institutionalized persons subject to the authority of custodians, women legally subject to their husbands; | Mitigated through proper Informed Consent devise a consent procedure that will insulate the research subject from the hierarchical system to which he or she is subject. This is particularly challenging if the researcher/project team is a part of the hierarchical system (so program beneficiaries who are surveyed by their benefactors). |
Deferential Vulnerability | The research subject exhibits patterns of deferential behavior that may mask an underlying unwillingness to participate | May be driven by social and political pressures to follow/defer to others despite own desire to not follow/defer (often present with juridic vulnerability) | Mitigated through Sample Recruitment/ Screening and Informed Consent Inclusion Criteria/Sample Selection may require input of local informants or consultants to devise a process that eliminates as much as possible the social pressures a research subject feels. Informed consent mitigation same as above. |
Allocational Vulnerability | The research subject is lacking in important social goods that will be provided because of participating in the research | When participation in the research can provide research subject a social good - money, housing, medical care, childcare, burial benefits, opportunities to benefit the community, freedom – that they otherwise do not have access to | Mitigated through Sample Recruitment/ Screening and Compensation The Inclusion Criteria/Sample Selection may require input of local informants to determine whether or not the offering of research participation may introduce undue influence; Project Teams must also carefully consider Compensation packages to limit their under or over-value and may need to consider not just their research sample, but also neighboring communities /individuals/households that are excluded and may feel resentment for the exclusion. |
Infrastructural Vulnerability | The political, organizational, economic, and social context of the research setting does not possess the integrity and resources needed to manage the study | Research subjects have access to research requirements (phone, transport); Project teams have access to research requirements (skills for specific biomarker tests, psychological tests, etc.; electricity, transport, safety) | Mitigated through Study Design: The study design/protocol should be carefully reviewed for local context and cultural sensitivities. |
Medical Vulnerability | The research subject has been selected, in part, because he or she has a serious health-related condition for which there are no satisfactory remedies | When (i) illness is severe and (ii) no safe, effective, and otherwise satisfactory treatments are available, patients can be primarily driven to participate based on false hope for benefits | Mitigated through Study Design and Informed Consent Given the interests and aspirations of both parties (and the poor bargaining position of the research subject) work toward fair division of the benefits and burdens of cooperation and design the study to maximize the likelihood of subject benefit based on medical intervention found to be safe and effective; communicate benefits and their probabilities for success through Informed Consent. |
Appendix 3 Adverse Events Reporting – Actual Risks and Potential and Actual Harms from Intervention and Study
Risk Description | Harm Description (Potential and Actual) |
Date(s) occurr | Who was notified and when? | What was the response(s) and when? |
---|---|---|---|---|