The International Initiative for Impact Evaluation (3ie) provides information, databases, maps, multimedia products and publications in this website solely as a resource for our users. In addition, we publish the opinions of 3ie staff experts on various topics on our blog site.
Use of material appearing on the 3ie website
The materials and logos on this site belong to 3ie, or to our partners, members and donors. While we endeavour to keep the information available on our website up to date and accurate, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services or related graphics contained on the website for any purpose. Any reliance you place on such information is at your own risk. 3ie is not responsible for any errors, omissions or inadvertent alterations that may occur in the disclosure of content on our website. Unless stated otherwise, the findings, interpretations and conclusions expressed in the materials are of various grantees and are not those of 3ie or our Board of Commissioners. 3ie will not be liable in any capacity for damages or losses to the user that may result from the use of or reliance on the materials or any such advice, opinion, statement or other information.
Copyright notice
All materials, including publications, photographs, video and audio clips and other multimedia material, that appear on our website belong to 3ie unless otherwise indicated. 3ie encourages users to browse, view, copy, share, print and download content for personal use and non-commercial use. 3ie prohibits the misuse or commercial use of any of our material and we may take legal action if we find any 3ie material is being misused or used for commercial purposes. All 3ie publications are meant to be shared, read and built upon to add to the knowledge base on development priorities. If you are referencing any 3ie or 3ie-supported work, please use the suggested citation, which is found on the inside cover of our series reports, or the bottom of the last page of our briefs.
Linking to 3ie’s site and work
3ie encourages websites and blogs to link to our webpages. You can republish any content on our webpages or blogs without alteration and with the attribution ‘This [insert the correct item type, e.g. report, article, blog] was first published by the International Initiative for Impact Evaluation (3ie)’, and add a clickable link to the relevant page on 3ie’s website.
Appendix 1 Potential Risks, Harms, and Risk Mitigation Efforts
Risk | Example(s) of Harm/Advarse events | Risk Migration Efforts |
---|---|---|
NOTE: The risk can extend to PERCEPTION. When others PERCEIVE a violation of ethical principles, there remains a high risk to researchers, evaluators, and others for harms described. |
Example: A study in Nairobi examining effects of various mechanisms to increase payments for water supply, including cutting off water access, resulted in various discussions around the ethics of the study (see discussion on ethical considerations here). |
|
NOTE: The risk can extend to PERCEPTION. When others PERCEIVE a violation of ethical principles, there remains a high risk to researchers and others for harms described. |
|
|
|
|
|
|
|
|
|
|
|
|
Example: UNHCR shared detailed database of the Rohingya refugee population with Myanmar’s government. |
|
|
|
|
|
Example: On April 20, 2010, Arizona State University (ASU) agreed to pay $700,000 to 41 members of the Havasupai Indian tribe to settle legal claims that university researchers improperly used tribe members' blood samples in genetic research |
|
|
|
|
|
Example: Data obtained from an implementing partner used to inform influential study later identified as fraudulent data. |
|
11. Loss of confidentiality – with or without additional linkage to private, sensitive data – is a risk driven by several potential actions, including:
|
Example: UNHCR shared detailed database of the Rohingya refugee population with Myanmar’s government; Biometric data on Afghan security forces potentially available to the Taliban. |
|
Appendix 2: Taxonomy of Vulnerability
TABLE 4.1: Taxonomy of Vulnerability for Study Participants | |||
Vulnerability | Definition | Potential Causes | Ethical Research Practice |
---|---|---|---|
Cognitive Vulnerability | The research subject does not have the capacity to deliberate and decide whether to participate in the study | Immaturity (through age, other cause), dementia, certain types of mental illness, disability; educational deficits and unfamiliarity with the language; situational mental distress/crisis | Mitigated through proper Informed Consent plain-language, advance directives (where incapacity is anticipated), supplementary educational measures to ensure comprehension, and the proper use of surrogates and advocates |
Juridic Vulnerability | The research subject is liable to the authority of others who may have an independent interest in the research subject’s participation | Prisons and the military, where wardens and officers have legal authority over prisoners and enlistees; Children under the authority of their parents, Students subordinated to Professors, Institutionalized persons subject to the authority of custodians, women legally subject to their husbands; | Mitigated through proper Informed Consent devise a consent procedure that will insulate the research subject from the hierarchical system to which he or she is subject. This is particularly challenging if the researcher/project team is a part of the hierarchical system (so program beneficiaries who are surveyed by their benefactors). |
Deferential Vulnerability | The research subject exhibits patterns of deferential behavior that may mask an underlying unwillingness to participate | May be driven by social and political pressures to follow/defer to others despite own desire to not follow/defer (often present with juridic vulnerability) | Mitigated through Sample Recruitment/ Screening and Informed Consent Inclusion Criteria/Sample Selection may require input of local informants or consultants to devise a process that eliminates as much as possible the social pressures a research subject feels. Informed consent mitigation same as above. |
Allocational Vulnerability | The research subject is lacking in important social goods that will be provided because of participating in the research | When participation in the research can provide research subject a social good - money, housing, medical care, childcare, burial benefits, opportunities to benefit the community, freedom – that they otherwise do not have access to | Mitigated through Sample Recruitment/ Screening and Compensation The Inclusion Criteria/Sample Selection may require input of local informants to determine whether or not the offering of research participation may introduce undue influence; Project Teams must also carefully consider Compensation packages to limit their under or over-value and may need to consider not just their research sample, but also neighboring communities /individuals/households that are excluded and may feel resentment for the exclusion. |
Infrastructural Vulnerability | The political, organizational, economic, and social context of the research setting does not possess the integrity and resources needed to manage the study | Research subjects have access to research requirements (phone, transport); Project teams have access to research requirements (skills for specific biomarker tests, psychological tests, etc.; electricity, transport, safety) | Mitigated through Study Design: The study design/protocol should be carefully reviewed for local context and cultural sensitivities. |
Medical Vulnerability | The research subject has been selected, in part, because he or she has a serious health-related condition for which there are no satisfactory remedies | When (i) illness is severe and (ii) no safe, effective, and otherwise satisfactory treatments are available, patients can be primarily driven to participate based on false hope for benefits | Mitigated through Study Design and Informed Consent Given the interests and aspirations of both parties (and the poor bargaining position of the research subject) work toward fair division of the benefits and burdens of cooperation and design the study to maximize the likelihood of subject benefit based on medical intervention found to be safe and effective; communicate benefits and their probabilities for success through Informed Consent. |
Appendix 3 Adverse Events Reporting – Actual Risks and Potential and Actual Harms from Intervention and Study
Risk Description | Harm Description (Potential and Actual) |
Date(s) occurr | Who was notified and when? | What was the response(s) and when? |
---|---|---|---|---|