Comprehending Permissions in Research.
The acquisition of relevant and necessary permissions is essential in ensuring and verifying coordination and cooperation between researchers and the organizations which they perform their research on (University of Phoenix, 2018). It therefore critical for researchers to seek permission from their subjects, even as in this case, when pertaining the acquisition of information, to ensure that the information acquired is not only accurate, but also updated. Additionally, seeing as research papers are intended for readers without the scope of the topic of research, it is of utmost importance for the researcher to validate information used for the research, creating relevance and validity to their research findings.
Ethical Considerations in Business Intelligence
Citing increased cases of cyber security and breach due to unethical practices by employees, ethical concerns about information security have been raised. In business intelligence, the main area of concern for both businesses and their clients is integrity, data and information security in addition to privacy (Masrom et al., 2011). Seeing to the sensitive nature of the industry, it is of paramount importance for the student to analyze the implications that the study would have on the business and image of the organization she works on. It would additionally result in a slander and defamation law suit citing breach in dissemination of classified information, that is derogative and detrimental to the organization’s image (Masrom et al., 2011).
Delegate your assignment to our experts and they will do the rest.
Use of Peer-Reviewed Sources and Acquisition of Permissions
Peer review ensures that, through objectivity and concise focus and expertise, professionals and trusted individuals are able review, recommend improvement and ensure standards and quality are adhered to (ICMJE, 2004). Relying on peer reviewed sources implies accuracy coupled with validity of the facts presented by the student intending to do the research. Additionally, the acquisition of permissions from the building’s manager implies validity of the data used to compute and present the results of the research. The research on the cost effectiveness of green buildings is supported by valid literature review in addition to valid data collection.
Handling of Participant Data
The sensitivity of private information and data since the advent of the intent has been on the rise, with the rise in cybercrimes and related crimes. Utmost security to research data is emphasized, with most institutions discouraging storage of data in other premises apart from on campus and institution compounds (University of South Australia, 2018). The storage of the data by the learner on an encrypted US drive, the learner has acted in accordance with IRB standards that demand data be stored in secure devices. Additionally, researchers are allowed to retain their data for periods lasting their research process and findings (USA, 2018). The data is then expected to be completely destroyed to ensure security of the data used. Seeing to adherence to standards, the learner should be allowed to undertake the research.
Research and the Importance of Informed Consent
The leaner should be allowed to undertake the research. Informed consent entails the voluntary dissemination of information vital to research subjects by researchers and the subsequent affirmation of the subject to participating in the research (Siegle, 2017). Informed consent is vital for a researcher seeing as the validity of research lies in the quality of its data and the subsequent reliability of the research subjects. Researchers additionally derive accuracy and focused responses from interviewers and subjects when all information vital to the research subjects is revealed, to enhance honesty and lack of bias from the participants (Siegle, 2017). Additionally, reliance on peer reviewed sources implies validity of the research problem.
References
International Committee of Medical Journal Editors (ICMJE), (2004). Uniform requirements for manuscripts submitted to biomedical journals: Writing and editing for biomedical publication. Updated October 2004. http://www.icmje.org
Masrom, M., Ismail, Z., Rashid, N. & Hussein, R. (2011). Analyzing accuracy and Accessibility in Information and Communication Technology Ethical Scenario Context; American Journal of Economics and Business Administration. Vol 3(2): Pp 370-376. Retrieved from http://thescipub.com/pdf/10.3844/ajebasp.2011.370.376
Siegle, D. (2017). Ethics and Informed Consent. Retrieved from https://researchbasics.education.uconn.edu/ethics-and-informed-consent/#
University of Phoenix (2018). Understanding Permissions in Research. Retrieved from https://research.phoenix.edu/news/irb-corner-understanding-permissions-research
University of South Australia (UOSA) (2018). Storing your Research Data. Retrieved from http://w3.unisa.edu.au/res/ethics/resources/storage.asp