Human Research Protection Program (HRPP) of The New School (TNS) *** This is a primer, more information is found in the "Investigator Submissions and Procedures" document on the website, under the show/hide titled "Information for Researchers/Investigators" *** Human Subjects Research: Protocol Basics A protocol is a researcher's "how-to" manual for conducting the research study. The HRPP/IRB will review the protocol in accordance with applicable regulations and/or institutional policies. Providing a detailed protocol and all applicable attachments will result in the smoothest and fastest review possible. 1. Develop your human subjects protocol before filling in forms. Have a clear understanding of what you want to do, why you want to do it, and how you will do it. Your protocol will need to describe in detail the WHO, WHAT, WHEN, WHERE, WHY, and HOW of your project. 2. Appropriately assess and mitigate research risks, stresses, discomforts, and harms. As much as possible, researchers must try to minimize risks, stresses, discomforts, and harms that could negatively affect the welfare of subjects. Remember that harms may be social, behavioral, psychological, physical, economic, legal, or reputational. a. When unavoidable, researchers must plan their study to be scientifically sound to not unnecessarily expose subjects to the risks/harms. b. Researchers must explain why exposing subjects to these risks/harms is scientifically justifiable in relation to potential benefits (during the consent process). c. Generally, the principal risk of social and behavioral research is potential harm resulting from a breach of confidentiality. Researchers must ensure their data protection measures mitigate potential harms in the event of a breach (such as a lost or stolen laptop). i. The best measure to avoid harms from a breach is to not collect any identifiable data about the subject (even during consent) ii. When identifiable data must be collected, never having a link between the research data and identifiers is the next best option iii. If datasets must be correlated to the same subject over time, consider using a code that a subject self-generates based on instructions you provide at each time point (such as a survey every 3 months). Here is an example of a 6-digit code the subject can generate at each time point:  the second letter of your first name, the last letter of your last name, the first letter of your birth-month, the last number of your zip-code, your 2-digit birthday = enj528 3. Write a detailed description for each research procedure. Regardless of the methodology, describe how you will conduct your research procedures. Detailed information about each procedure must include: i. the types of data you will collect (specific variables and characteristics) ii. what data gathering format will be used (e.g. hand-written notes, checklists, photos, audio/video recordings, via the internet, etc.) iii. when flexibility in conducting a particular procedure is needed, the parameters you will stay within while collecting information must be clearly described (so that you only collect the pre-determined types of data) – this information is needed to appropriately assess the risks of the research iv. the consent process to adequately inform subjects of the research b. Additional Information about common Social and Behavioral research procedures: The following specific information must be provided in addition to the items in #3 (above), when describing these research procedures: Page 1 of 2

Human Research Protection Program (HRPP) of The New School (TNS)



Questionnaires and Surveys: in addition to the items in #3 (above): o How will you distribute the questionnaires/surveys, (oral, paper, online)? o How will you verify your targeted subject population is completing the questionnaires/surveys (such as verifying age with online surveys)?



Observations (ethnographic or otherwise): in addition to the items in #3 (above): o Will subjects know they are being observed? Why or why not? o Will descriptive or private information about the subjects be recorded in the research data?



Interviews (structured or semi-structured): in addition to the items in #3 (above): o Instructions the researcher will follow o Instructions for the subject (including what information they should not provide, and what will happen if they veer outside of the parameters you have set) o All pre-determined questions and follow-up prompts



Focus Groups (FG): in addition to the items in #3 (above): o Instructions for the FG-moderator (how to steer the discussion and ensure subjects do not share information that would be outside of the specified data parameters), o Instructions for the FG-subjects (ground rules, confidentiality and its limitations, types of info they should avoid sharing), o FG questions and follow-up prompts o The consent process/form must clearly inform subjects that the research team cannot guarantee that fellow subjects in the group sessions will refrain from revealing information discussed during the group sessions o The following link is provided as a resource: How to conduct a focus group

4. Copies of all data-collection tools are provided. Please also ensure that you describe any special equipment needed to conduct your research. (Note that in some circumstances, you may be asked to provide a manual of the specialized equipment/device for IRB review.)

Resources for using the INTERNET for human subjects research:  Association of Internet Researchers (AoIR): http://ethics.aoir.org/index.php?title=Main_Page  Article: Paolacci, G., J. Chandler, and P.G. Ipeirotis. "Running Experiments on Amazon Mechanical Turk," Judgment and Decision Making, Vol. 5, No. 5, August 2010, pp 411-419.

Confidentiality of Data • The research plan should make adequate provision to safeguard information to ensure ongoing protection of subjects, for the full life cycle of the data: its collection, use, dissemination, retention and/or disposal. Security measures include physical, administrative and technical safeguards.

Page 2 of 2

Protocol Basics for Human Subjects Research.pdf

There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Protocol Basics for Human Subjects Research.pdf. Protocol Basics for Human Subjects Research.pdf. Open. Extract.

570KB Sizes 0 Downloads 185 Views

Recommend Documents

AN INTERVIEW PROTOCOL OF EXPERIENCED HUMAN ...
AN INTERVIEW PROTOCOL OF EXPERIENCED HUMAN INTELLIGENCE.pdf. AN INTERVIEW PROTOCOL OF EXPERIENCED HUMAN INTELLIGENCE.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying AN INTERVIEW PROTOCOL OF EXPERIENCED HUMAN INTELLIGENCE.pdf. Page 1 of

Section III - Determining Research involving Human Subjects at The ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Section III - Determining Research involving Human S ... hool - HRPP Policies and Procedures_v.10.27.2015.pd

Section III - Determining Research involving Human Subjects at The ...
developed in accordance with Federal regulations, New York State law, and the Office for. Human Research Protections (OHRP) Guidance documents and Frequently ... Human S ... hool - HRPP Policies and Procedures_v.10.27.2015.pdf.

A Study on mescaline in human subjects
data concerning the physiology of the visual mechanism in response to .... recovery was plus or minus. 4 per cent. Methoxyl groups were never found in urines of ... rapid alternation, the effect is one of flicker. When the intensity of the two.

MES-English.com - flashcards - subjects
MES-English.com Flash Cards school subjects www.mes-english.com. Page 2. MES-English.com Flash Cards school subjects www.mes-english.com. + - x - ...

Complete Subjects and Predicates
Ms. Hale took a cab to the convention center. 3. ... The subways were nearly empty during the late night hours. 8. ..... What a close call that was .... Page 24 ...

Protocol for Common Branch Platform - GitHub
Analyze inter-variate relations. • No need to convert Unstructured to. Structured Data. • Advantages of Machine Learning and. Visualization in single step. • Discover hidden relationships and potentially mining oppurtunities. • Enhance to wor

(Can) Protocol
IJRIT International Journal of Research in Information Technology, Volume 3, .... The MCP2551 generates degree of difference send and receive capability for.

Energy-Efficient Protocol for Cooperative Networks - CiteSeerX
Apr 15, 2011 - model a cooperative transmission link in wireless networks as a transmitter cluster ... savings can be achieved for a grid topology, while for random node placement our ...... Comput., Pacific Grove, CA, Oct. 2006, pp. 814–818.

Protocol for Common Branch Platform - GitHub
Faults. Tolerance & Recovery. References. Outline. 1 Simulated Annealing. Boltzmann Equation. Algorithm. Distributed Simulated Annealing. 2 Faults. Design Faults. Operational Faults. Communication Faults. 3 Tolerance & Recovery. Tolerance. Recovery.

Odhar subjects 90_fqp.pdf
Page 1 of 2. PÀ£Á9lPÀ ̧ÀPÁ9gÀ. ¥ÀzÀ« ¥ÀÆaÀð 2PÀët E ̄ÁSÉ ¥ÀzÀ« ¥ÀÆaÀð 2PÀët E ̄ÁSÉ. Formative Assessment (Test)Question Papers Model Pattern.

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

Protocol Stack
GUI Tools for system/protocol modeling ... storage for sample files, e.g. modulation and terrain. ▫. /gui ... Define QUALNET_HOME and add GUI and path.

Human Genetics The Basics - Ricki Lewis.pdf
0 !# !# (. () (/) () () !"# !# !# !# !# !$# !# !# !# !# !%# !# !# !# !# !&# !# !# !# !# Page 2 of 2. Human Genetics The Basics - Ricki Lewis.pdf. Human Genetics The Basics - Ricki Lewis.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Hu