1 / 75

Ethics in Violence Research with Vulnerable Populations April 24, 2006

Ethics in Violence Research with Vulnerable Populations April 24, 2006. Sponsored by: Interdisciplinary Center for Research on Violence Criminal Justice Department Office on Protection of Research Subjects University of Illinois at Chicago. Purposes of Seminar.

elina
Télécharger la présentation

Ethics in Violence Research with Vulnerable Populations April 24, 2006

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethics in Violence Research with Vulnerable PopulationsApril 24, 2006 • Sponsored by: • Interdisciplinary Center for Research on Violence • Criminal Justice Department • Office on Protection of Research Subjects • University of Illinois at Chicago

  2. Purposes of Seminar • To present examples of sensitive practice in research and intervention with vulnerable populations • To discuss ethical dilemmas and methods of resolving them • To initiate a dialogue about these issues, especially in relation to violence research with vulnerable populations

  3. Panelists • Sarah Ullman, Ph.D., Professor of Criminal Justice: Overview of ethical practices & examples from sexual assault research • Larry Bennett, Ph.D., Assoc. Professor of Social Work: Human subjects protection in research with domestic violence perpetrators • Christine Helfrich, Ph.D., Asst. Professor of Occupational Therapy: Ethical issues in conducting research with domestic violence victims • Carl Bell, M. D., Professor of Psychiatry and Public Health: Cultural sensitivity in studying populations exposed to violence • Charles Hoehne, Assistant Director, Office for the Protection of Research Subjects: Safeguarding vulnerable populations in research – IRB viewpoints on certificates of confidentiality and mandatory reporting • Margaret Luft, Director of Counseling, Life Span Center for Legal Services and Counseling: Research and Service Providers: Can we establish a balance when worlds collide?

  4. Overview of Ethical Practices and Examples from Sexual Assault Research • Sarah Ullman • Department of Criminal Justice • Principal Investigator, UIC Interdisciplinary Center for Research on Violence

  5. What are Vulnerable Populations? • Categories include: • pregnant women • children • mentally ill • prisoners • economically disadvantaged • mentally/physically challenged • ** Also – victims, offenders, their families/social networks

  6. Weighing Risks vs. Benefits • Bias of researcher/IRB vs. those studied • Assess Risks: inadequate informed consent, confidentiality, safety concerns for violence survivors, revictimization or retraumatization during the research due to the study • Assess Benefits: private, safe disclosure of violence, community resource information, chance to help others, payment etc.

  7. Minimizing Risks • Recruitment tailored towards empowerment • Consider participatory/collaborative research • Going beyond paper/pencil survey methods • Pilot testing instruments with victims • Avoiding methods/populations that are more likely to retraumatize already vulnerable groups • Using feedback from participants to improve sensitivity of research methods/assessments • Responding to survivor’s requests if possible • Giving back to participants & community

  8. Other Methods to Protect Participants Include: • certificates of confidentiality • waiving parental consent for children in some cases • flexibility in research protocols to maximize participant safety • following up with participants to be sure they are safe/to give referrals/get consent on an ongoing basis if relevant

  9. Collaborate with Community/Participants • Consider qualitative research or a qualitative component • Protect researchers, participants, collaborators – vicarious trauma risks • Ask what community needs/wants • Develop safety plans • Give results back/collaborate in what is published/reported as appropriate • Assume you don’t know everything – check in with yourself, your participants, co-researchers etc!

  10. Securing Initial IRB Approval • Be patient – IRB should help you to identify biases you may be unaware of and risks you can minimize in your research plans. • Do a thorough and complete submission to the IRB of your research study plans. • Educate the IRB about your research & population, study team expertise, context of the research, and any information from the field/research documenting your plans are ethical and safe. • Get advice from others doing similar research and only do what you have the resources and experience to handle.

  11. Oh No, Not Another Deferral! • Violence research is almost always reviewed by the full board and should be. This protects you and your participants. • Don’t feel badly when your research initially gets deferred – this is typical, so expect it. • Communicate with the IRB and use them as allies. Call the OPRS with questions prior to and/or during the review process with questions, information to help the board etc. • Realize sometimes you cannot do exactly what you had planned and try to find another way

  12. Conclusions • Research is a learning process and doing violence research is challenging, but important. • Learn from your mistakes and those of others and try to do your best to be sure your work is both scientifically and ethically sound. • Fully consider perspectives from outside academia, especially those who are and who work with victimized populations.

  13. Human Subjects Protection in Research on Domestic Violence Perpetrators • Larry Bennett • Jane Addams College of Social Work

  14. Consent, Privacy, & Harm • Coercion of batterers and their partners • Batterer program v. researchers standards of confidentiality • Necessity of partner data v. partner safety • Created and detected risks • Follow-up v. stalking

  15. Coercion of Batterers and Their Partners • Prospect of return to court on a violation may subtly coerce batterers to participate • When possible, integrate research tools into agency assessment protocol • Partner may be coerced to participate by both batterer and by researcher • Fears both participation and non-participation • 50% of batterers not with index partner, 20% have new partners

  16. Conflicting Standards of Confidentiality • Batterer programs often request waiver of normal conditions of confidentiality • Researcher must articulate the differences between programmatic confidentiality and research confidentiality • To participants • To program staff • To advocates affiliated with batterer program

  17. Safety of the Batterer’s Partner(s) • Research on batterers usually requires data from partner for reliability • Partners are rarely in shelter, therefore at very high risk when providing data • Procedures to reduce risk: • Establish privacy • Funnel questions • Debrief

  18. Victim Contact: Always Assume • Batterer has full access to her (e)mail • Batterer is listening on another phone line • Batterer is standing in the room during your phone conversation with victim • Batterer will come home during your home interview • Batterer will check all her phone logs • (Sullivan & Cain, 2004)

  19. Created and Detected Risk • Created Risk: threat to victim from the research process • research process parallels abuse • n=465 women: • 20% report partner was listening during a follow-up interview • 10% report being questioned about the interview • Detected Risk: suicide, threat to victim, child abuse • Threat rate: 25 episodes/840 batterers (3%) • (Gondolf, 2000)

  20. Interviewer Acts: Explain consequences and alternatives Encourage him to contact the batterer program If refuse/non-comply: report threats to victim, program, police Duty to Protect • Interviewer Assesses: • How long has he felt this way? • Plans? • Drugs/alcohol use • Access to victim • Access to weapons

  21. When is Research Follow-up Like Stalking? • Follow-up may replicate batterer’s stalking/abuse • State coalitions of battered women’s services now train advocates on phone privacy techniques • Tracking Protocol, Phone Protocol needed • Do not use professional locators

  22. Ethical Issues in Conducting Research with Domestic Violence Victims • Christine Helfrich, PhD, OTR/L, FAOTA • Department of Occupational Therapy • College of Applied Health Sciences

  23. Research Paradigm • Principle of justice • Need to consult victims and advocates to ascertain risks when designing study • Emancipation Paradigm ensures beneficence and includes collaborative data collection methods to improve conditions for those studied

  24. Study Design • Study design must ensure safety and sometimes this means needing to alter desired study designs to do so. • Sample recruitment and retention is affected by safety issues • Abuser knowledge of study participation • Abuser/legal system use of study information

  25. Participation – Issues of Power and Coercion • Informed Consent process needs to minimize issues of coercion and not re-victimize the participants • Incentives should not be coercive and need to maintain confidentiality (ie. Cash or gift cards vs checks) • Longitudinal Involvement is desirable; however, safety and dependency issues must be considered

  26. Cultural Congruence Throughout the Research Process • Researcher must have cultural competence to go into the community and conduct ethical and effective research. • Recruitment and consent process must consider cultural aspects related to ethnicity and race, as well as the culture of the DV community. Issues of power and intimidation need to be carefully considered with this population. • Data analyses must consider the biases of where and how data was collected. • Dissemination process must carefully consider non-malfeasance in reporting results.

  27. Ensuring Safety When the Research Itself Engenders Danger • Safeguards for physical safety • Generic voice mail messages • Not identifying study name • Blocking caller ID • Pre-established code words to determine if safe to talk • Not leaving messages • Not giving out specific information regarding study to unknown callers • Resources for emotional/psychological safety • Established relationships with DV agencies, • Crises line phone numbers, • Referral sources

  28. Cultural Sensitivity in Studying Populations Exposed to Violence • Carl C. Bell, M.D., F.A.P.A., F.A.C.Psych. • C.E.O./President: Community Mental Health Council, Inc. • Professor of Psychiatry, Professor of Public Health, University of Illinois • carlcbell@pol.net

  29. Ethnocentric Multiculturalism • This aspect of Euro-American culture makes it difficult to appreciate cultural differences between different ethnic groups. • This aspect of Euro-American culture makes it difficult to appreciate diversity within racial groups.

  30. Ethnocentric Monoculturalism • An example is the food pyramid graphic recommended by the U. S. Department of Agriculture which has milk and dairy products as a consumer’s only source of calcium. • Lactose intolerance occurs in: • 70% of African Americans • 90% of Asian Americans • 74% of Native Americans • 53% of Mexican Americans • Only 15% of Whites are lactose intolerant

  31. Racism • Racism is the practice of racial discrimination, segregation, persecution, and domination based on a feeling of racial differences or antagonisms; especially with reference to supposed racial superiority, inferiority, or purity.

  32. Oppressed/Oppressor - Relationships • In any effective and efficient submission-dominance system, it is critical for the oppressor to monopolize the perception of the victim. • One is victimized in proportion to the quality of space, time, energy, and mobility that one must yield or has yielded to the oppressor. • Conversely, the more one regains or commands control of these elements the less one is victimized.

  33. Microinsults and Microaggressions • These mechanisms are nonverbal and kinetic, and they are well suited to control space, time, energy, and mobility of an African-American while at the same time producing feelings of degradation.

  34. Violence in Different Ethnic Groups - General • In most murder cases involving a white or black victim, the offender was of the same race of the victim. • Poverty and social infrastructure account for the vast differences in rates of violence between African-Americans and Whites. • African-American rates are six times & Latino rates are 2.3 times the Native America, Asian, & White rates of homicide.

  35. Violence in Different Ethnic Groups - African-American • Interpersonal Altercation violence is a major from of violence occurring in the African-American community • Domestic homicide continues to be a problem in the African American community, but African-American women are no longer killing more African American men than vice versa.

  36. Violence in Different Ethnic Groups - Latino • Gang-related violence is a major form of violence occurring in the Latino community • Latino men are not known to perpetrate domestic homicide. • Latino men tend to perpetuate violence in the street and, while gun violence predominates, there is a greater use of knifes.

  37. Violence in Different Ethnic Groups - Native American • Interpersonal altercation violence is a major form of violence in the Native American community. • Forty percent of Native American murder victims were killed by an offender who was not Native American • In 33% of the cases the offender was white.

  38. Violence in Different Ethnic Groups – Euro-American • Suicide is a major form of violence occurring in the Euro-American community • Euro-Americans are the majority of offenders in Anger/revenge & Domestic/romantic related mass murder • In Anger/revenge & Domestic/romantic related mass murder there is a significant suicide dynamic

  39. Lifetime Prevalence of CIDI Disorders in Fresno and National Comorbidity Survey (NCS)(Vega, Kolody, Aguilar-Gaxiola et al., 1998) 48.1 48.6 27.7 28.2 24.9 23.2 25 19.5 18.7 1.3 10.5 8 F r e s n o S t u d y

  40. Outcome of Acculturative Interaction Between Dominant and Nondominant Groups

  41. African-Based Populations • Pre-slavery Africans in America • Africans in America subjected to various degrees of slavery • Recent African Immigrants in America • Recent African Refugees in America

  42. Racism In Research • The history of research efforts in disadvantaged communities provides sufficient evidence of the ways in which African Americans have been exploited by both medical and research interventionists.

  43. Racism in Psychiatry • G. Stanley Hall also declared that the medical treatment of the races was a different "as the application of veterinary medicine for horses is from that applied to the oxen".

  44. Racism in Psychiatry • Carl Gustav Jung noted "The different strata of the mind correspond to the history of the races" and that the Negro "has probably a whole historical layer less" than the white man.

  45. Racism in Psychiatry • Another example of the racist use of race in psychiatry can be found in Lauretta Bender's work on "Behavior Problems in Negro Children" (1939). • She noted that the two most distinguishing characteristics of Negro children were their ability to dance and their capacity for laziness.

  46. Safeguarding vulnerable populations in research – IRB viewpoints on certificates of confidentiality and mandatory reporting • Charles Hoehne • Assistant Director, Office for the Protection of Research Subjects

  47. What Defines a “Vulnerable Population”? • Belmont Report: • “Respect for Persons” - Persons with diminished autonomy are entitled to protection • Research implications: • Acknowledge autonomy • Protect those with diminished autonomy

  48. What Defines a “Vulnerable Population”? • Belmont Report: • “Justice”: One special instance of injustice results from the involvement of vulnerable subjects. Certain groups, such asracial minorities, the economically disadvantaged, the very sick, and the institutionalized may continually be sought as research subjects, owing to their ready availability in settings where research is conducted. Given their dependent status and their frequently compromised capacity for free consent, they should be protected against the danger of being involved in research solely for administrative convenience, or because they are easy to manipulate as a result of their socioeconomic condition.

  49. What Defines a “Vulnerable Population”? • Examples of “vulnerable populations” commonly seen by the IRB: • Students (UIC Psychology Subject Pool, Use of Classroom Time, Teachers recruiting their own students, for example) • Employees • Children • Pregnant Women • Wards • Individuals with diminished/diminishing capacity • Individuals with service needs (health, social services, etc) • Economically disadvantaged • Racial minorities • Prisoners

  50. Protection of Vulnerable Populations (as per 45 CFR 46) • Subpart A: Basic Protection for all Human Subjects • Subpart B: Additional Protections for Pregnant Women, Human Fetuses, and Neonates • Subpart C: Additional Protections for Prisoners • Subpart D: Additional Protections for Children

More Related