TEACHING AND LEARNING ETHICAL DATA MANAGEMENT

Similar documents
West Virginia University Research Integrity Procedure Approved by the Faculty Senate May 9, 2011

TiHo Guidelines for Good Scientific Practice: translation from the German Dec. 2011/Jan. 2012, jmca

APPENDIX I. Research Integrity Policy for Responding to Allegations of Scientific Misconduct

Associated Students of Boise State University Governing Code

Hoboken Public Schools. PLTW Introduction to Computer Science Curriculum

Evidence-based policy or policy-based evidence?

Tohoku University Code of Conduct for Fair Research Activities Supplementary Explanation

Associated Students of Boise State University Governing Code

Promoted by the European Confederation of Conservator-Restorers' Organisations and adopted by its General Assembly (Brussels 1 March 2002)

Review of Federal Agency Policies on Scientific Integrity

Key Considerations for Oversight Actors

AZUSA PACIFIC UNIVERSITY POLICIES AND PROCEDURES

Hoboken Public Schools. Environmental Science Honors Curriculum

GEORGE MASON UNIVERSITY AGENDA FOR THE FACULTY SENATE MEETING FEBRUARY 7, 2018 Robinson Hall B113, 3:00 4:15 p.m.

SAINT LOUIS UNIVERSITY RESEARCH INTEGRITY POLICY

Policy Number OHS.RES.015 Date of Issue March 2003 Review Dates October 2014 Policy Owner(s) Compliance and Privacy Research Administration

TERMS OF REFERENCE FOR SUBSIDIARY BODIES

J-1 professor/research Scholar category Is eligible for 5-yrs maximum stay in teaching or research.

GUIDELINE DISCOVERY AND LEGAL HOLD

UNIVERSITY SYSTEM OF MARYLAND

Statute Section Safeguarding Good Scientific Practice at the Medical University of Innsbruck. - Good Scientific Practice

The DG SANTE approach to evaluate food safety control systems in Member States and non EU countries

Key Considerations for Implementing Bodies and Oversight Actors

Definitions. Misconduct in Research

From Digital Literacy to Digital Wisdom

Assessment, Inquiry and Investigation Procedures

What is sustainable wealth?

UNITED NATIONS HIGH COMMISSIONER FOR REFUGEES POLICY DEVELOPMENT AND EVALUATION SERVICE. UNHCR s evaluation policy

This cartoon depicts the way that -- all too often -- evidence is used in the policymaking process. Our goal is to do better.

Hoboken Public Schools. Forensics Curriculum

RateForce, LLC Terms of Use Agreement

PA 311: Policy Analysis & Program Evaluation

Research Integrity Policy

INDIANA UNIVERSITY Policy and Procedures on Research Misconduct DRAFT Updated March 9, 2017

Elements of successful science-policy integration

The National Center of Intellectual Property Belarus. Contents

University of Pittsburgh

The UK s Migration Statistics Improvement Programme - exploiting administrative sources to improve migration estimates

Scientific Integrity: European Perspective

SUNY DOWNSTATE MEDICAL CENTER POLICY AND PROCEDURE

Terms of Use. 1. Limited Use

PROJECT DELIVERABLE. Contact details:

Intellectual Property. EMBL Summer Institute 2010 Dusty Gwinn WVURC

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

RULES OF PROCEDURE. The Scientific Committees on. Consumer Safety (SCCS) Health and Environmental Risks (SCHER)

INTELLECTUAL PROPERTY POLICY AND PROCEDURES. 1. Introduction This policy is designed to achieve the following objectives:

Green Freight Asia Privacy Policy

THE UNIVERSITY OF TEXAS M.D. ANDERSON CANCER CENTER TECHNOLOGY DEVELOPMENT PROGRAM MANUAL

Basing Rules on Empirical Evidence:! Transparency in Law Making!

Bylaws of the Society for Conservation Biology African Section

Misconduct in Research

SMITHSONIAN INSTITUTION RESEARCH ASSOCIATES

PRESIDENT HANDBOOK. Audience Presidents, Vice Presidents

Results report Missing Persons Act What was this engagement about? The Yukon Government was looking to develop legislation as a mechanism to assist

Last revised: 6 April 2018 By using the Agile Manager Website, you are agreeing to these Terms of Use.

DECLARATION OF JUDICIAL TRAINING PRINCIPLES

Fisheries and Aquaculture Standards Revision Process Procedures Contents

The Geological Society of London REGULATIONS CODES OF CONDUCT

Supporting Electronic Voting Research

RELEVANCE OF INTERNATIONAL LAW AND STANDARDS TO THE PILLARS OF MINE ACTION

Consultative Meeting on the Safe and Secure Management of Conventional Ammunition, Geneva (16-17 November 2015) CHAIR S SUMMARY

standards for appropriate ethical, responsible and professional behaviours

IOM International Organization for Migration OIM Organizaţia Internaţională pentru Migraţie

HEALTH AND SOCIAL SCIENCE RESEARCH IN THE ARCTIC: GUIDELINES AND PITFALLS

Research Misconduct Policy

Chapter 1: Computer Forensics and Investigations as a Profession

Increasing Your Impact with Social. Rebecca Vander Linde, Social Media Manager Rachel Weatherly, Director of Digital Communications Strategy

PLEASE SCROLL DOWN FOR ARTICLE. Full terms and conditions of use:

Eighth Grade American Studies Curriculum Social Studies

The Cybersleuth s Guide to Fast, Free, and Effective Investigative Internet Research

PPIC Statewide Survey Methodology

The EPO approach to Computer Implemented Inventions (CII) Yannis Skulikaris Director Operations, Information and Communications Technology

Math 140 Trigonometry CRN 30079

TERMS OF USE COPYRIGHT, TRADEMARK AND OTHER INTELLECTUAL PROPERTY RIGHTS

Steps to Success Bachelor of Arts, Justice

National Research Council Canada (NRC)

The Initiative for Responsible Mining Assurance (IRMA)

TAU LAMBDA RHO CIVIL ENGINEERING HONOR SOCIETY

Nordic Big Biomedical Data for Action. Davit Bzhalava, PhD Dept. of Laboratory Medicine, Karolinska Institutet, Sweden

GRADE Publications and Presentations

Community-Law Enforcement Mediation Program Standard Operating Procedures

LUDWIG INSTITUTE FOR CANCER RESEARCH LTD. SCIENTIFIC INTEGRITY POLICY Statement of Policy and Procedure (SPP) 203

Code of Good Governance. Mahidol University

The HC s Structured Dialogue Lebanon Workshops October 2015 Report Executive Summary Observations Key Recommendations

A guide to the new privacy landscape for the Commonwealth Government

Space Climate Observatory

COMCEC Funded Projects

POLICY_POL04_Data Breach DATA BREACH RESPONSE RATIONALE SCOPE RESPONSIBILITY DEFINITIONS POLICY. 1 TLC_policy_POL04_Data Breach_CBA_1.

Co-generation of Ecosystem Services by Nature and Indigenous Peoples / TKs Guidelines

PUBLIC ADMINISTRATION (PUAD)

Governing Solar Geoengineering and Carbon Removal Dr Arunabha Ghosh

North Carolina and the Federal Budget Crisis

PRIVACY STATEMENT - TERMS & CONDITIONS. For users of Princh printing, copying and scanning services PRIVACY STATEMENT

Conducting Effective Meetings

Department of Political Science Graduate Course Descriptions Fall 2018

CHARTER FOR DMCs: TEMPLATE

Research Article. ISSN (Print)

GSA Federal Advisory Committee Act Fundamentals

Patent Law of the Republic of Kazakhstan

The Handling of Human Remains and Information on the Dead in Situations relating to Armed Conflicts or Internal Violence and involving Missing Persons

Transcription:

TEACHING AND LEARNING ETHICAL DATA MANAGEMENT Xiaofeng Denver Tang (xut2@psu.edu) Penn State University Rock Ethics Institute Leonhard Center for Enhancement of Engineering Education

Statement about data management _1 From a graduate student: I am listed as a co-author of a paper for which I helped with the literature review. As I am not involved in the collection and analysis of research data, I bear no responsibility for verifying the results published in the paper, which has multiple co-authors.

Statement about data management_1 From a graduate student: I am listed as a co-author of a paper for which I helped with the literature review. As I am not involved in the collection and analysis of research data, I bear no responsibility for verifying the results published in the paper, which has multiple co-authors. Not understanding the shared responsibility for reporting verified, reproducible results in research publications.

Statement about data management_2 From a junior faculty member: My research is not supported by any extramural funding; therefore, I have no obligation to maintain procedural data as long as my results are valid.

Statement about data management_2 From a junior faculty member: My research is not supported by any extramural funding; therefore, I have no obligation to maintain procedural data as long as my results are valid. Deviating from commonly expected research practices (research norms). Neglecting the communal (reciprocal) aspect of research.

Statement about data management_3 From a PI: I have thoroughly informed my graduate students, lab technicians, and statisticians about the proper ways of handling data; therefore, I should not be hold accountable if issues about the credibility of research data arise in our co-authored publications.

Statement about data management_3 From a PI: I have thoroughly informed my graduate students, lab technicians, and statisticians about the proper ways of handling data; therefore, I should not be hold accountable if issues about the credibility of research data arise in our co-authored publications. The responsibility of leadership? Effective communication/monitoring? Collective review?

Statement about data management_4 From a PI: The volunteers who participated in my research have been paid of an amount they agreed. They should not have a say on how I proceed with my research based on the data I have collected from them.

Statement about data management_4 From a PI: The volunteers who participated in my research have been paid of an amount they agreed. They should not have a say on how I proceed with my research based on the data I have collected from them. The rights of research participants? Agreement on data ownership? Respect for participants?

Statement about data management_5 From a new graduate student: I repeated a part of the experiments my group have conducted and published before. My results included some outliers which I knew resulted from my lack of experience. Thus I deleted these obvious outliers from the final results I submitted to my advisor, I did mention the existence of outliers during the group research meeting.

Statement about data management_5 From a new graduate student: I repeated a part of the experiments my group have conducted and published before. My results included some outliers which I knew resulted from my lack of experience. Thus I deleted these obvious outliers from the final results I submitted to my advisor, I did mention the existence of outliers during the group research meeting. Effective/ineffective communication? Lack of proper training?

Statement about data management_6 From a computer engineer: I developed a browser plugin that makes suggestions to the users based on their search history. I made sure that the algorithm would blind any human actors, including our developer team, to the users search history.

Statement about data management_6 From a computer engineer: I developed a browser plugin that makes suggestions to the users based on their search history. I made sure that the algorithm would blind any human actors, including our developer team, to the users search history. Proper (adequate) protection? Informed consent (the right to collect data)?

Online Tutorial for Ethical Data Management Overall Lessons The ecology and lifecycle of data Research as a systematic and institutional activity Ethical concepts

Information Ecology This new approach, which I call information ecology, emphasizes an organization s entire information environment. It addresses all of a firm s values and beliefs about information (culture); how people actually use information and what they do with it (behavior and work processes); the pitfalls that can interfere with information sharing (politics); and what information systems are already in place (yes, finally, technology). Information Ecology: Mastering the Information and Knowledge Environment by Thomas H. Davenport (1997)

The Ecology of Data: Elements 1. Evolving System 2. Constraining Conditions 3. Selection Pressures 4. Info-diversity/Data diversity 5. Types/Groups/Forms 6. Data Niches 7. Resources 8. Interactions 9. Co-evolution/Co-adaptation Adapted from Treloar, A. 2012. Conceptualising Collaboration and Competition in the Changing Ecology of Research Data.

Ontology/States of Data Data Structured Collections Actors Unmanaged Managed Individuals Disconnected Connected Groups Invisible Findable Research Community Single use Reusable Society World Adapted from Treloar, A. 2012. Conceptualising Collaboration and Competition in the Changing Ecology of Research Data.

THE ECOLOGY OF DATA Mega data

Planning Using, sharing, and preserving Life Cycle of Data Management Generating Mega data Processing

Planning Using, sharing, and preserving Life Cycle of Data Management Generating Processing

Understanding Data and Research Ø Definitions of data Ø From data to facts Ø The system of data The life cycle of data management Ø The research process and actors Ø Ethical concepts Ø Overall strategies Planning Using, sharing, and preserving Life Cycle of Data Management Generating Processing

Using, sharing, and preserving Planning Life Cycle of Data Management Sources of data Generating and collecting data Ø Protocols and training Ø Lab notebook Ø Poor data practice Ø Collective review Human and animal subjects Ø Laws Ø Agencies Ø Consent and rights Generating Processing

Planning Using, sharing, and preserving Life Cycle of Data Management Generating Processing Statistical tools and outliers Representing and interpreting Ø Interest, uncertainty, and bias Ø Conflict of interest Falsification Ø Fishing or trimming Ø Image manipulation

Planning Data usage Ø Communal purposes of research Ø Principles Data ownership and access Ø IP Ø Transparency Ø Data policies Ø Open access Data storage and protection Ø Policies of journals and funding agencies Data storage and protection Ø Methods Ø Period Ø Security Using, sharing, and preserving Life Cycle of Data Management Processing Generating

Planning Big data Ø Meta data and data mining Cloud computing Mega data Using, sharing, and preserving Life Cycle of Data Management Generating Processing

Understanding Data and Research The life cycle of data management: an overview Big data Cloud computing Mega data Using, sharing, and preserving Planning Life Cycle of Data Management Generating Sources of data Generating and collecting data Human and animal subjects Data usage Data ownership and access Data storage and protection Processing Statistic tools Representing and interpreting Falsification

Resources for Teaching and Learning (1) Handbooks Ø On Being A Scientist Ø Guidelines for Responsible Data Management in Scientific Research Statistics Ø PSU STAT 500 Lab Notebooks Ø Exemplar lab notebook Data Policies Ø NSF ENG Data Management Plan Requirements Ø NIH Data Sharing Policy Ø Nature. Availability of data, material and methods Ø Science. Editorial policies Ø Please suggest important journals and funding agencies in your field.

Resources for Teaching and Learning (2) Ethical theories and concepts Bibliography Case studies and analysis Ø The Online Ethics Center (http://www.onlineethics.org/) All in the Interpretation A phish Tale Ø The STAP cells case Ø Data mining, national security, and privacy case Ø Potential materials for creating case studies Volkswagen defeat device for cheating on emission tests Mitsubishi cheating on fuel economy tests Who owns your gene?

What are the ethical issues? Prevent future problems Problem Definition Stakeholders Facts Values Reflect Ethical Integrity Gathering Information Possible and best options Generating, evaluating, and taking actions Applying Guiding Principles Consequences Rights/duties Virtues Relationships

Method for Ethical Case Analysis 1. Problem identification: what are the ethical issues? 2. Gathering information Ø Stakeholders Ø Facts Ø Values 3. Applying guiding principles Ø Consequences Ø Rights/duties Ø Virtues Ø Relationships 4. Generating, evaluating, and choosing options: possible and best actions 5. Reflecting: prevent problems in the future

The STAP Cells Haruko Obokata led a lab for the Riken Center for Developmental Biology. In 2014, Obokata and her collaborators published two articles in Nature claiming that they had discovered a simple way of making STAP cells. However, readers found some images in the articles had been inappropriately manipulated and some texts were copied from previous articles. Worse still, no other lab was able to replicate Obokata s results following the method she had reported. After a failed attempt to repeat her own experiments in a monitored environment, Obokata resigned from Riken. An investigation conducted by Riken concluded that the STAP cells claimed in Obokata s papers were embryonic stem cells taken from elsewhere.

Data Mining, National Security, and Privacy http://www.wnyc.org/story/terrorism-algorithmlegal/

Teaching Ethical Data Management Case analysis Discussion Ø News Ø Research practices Ø Cultural images Review and creating policies Ø Protocols Ø Communication maps Teaching and modeling ethical data practice in research settings Ø Reviewing data in research meetings Ø Asking questions about data handling during seminars