đạo đức khoa học coursepoint - 1802
đạo đức khoa học coursepoint - 1802
đạo đức khoa học coursepoint - 1802
[eL CoRE]
Introduction
In our daily research activities, there are various situations that may
arise which can spawn improper conduct. Needless to say, no one with
a passion for research and high ethical standards would intentionally
engage in misconduct.
1
Copyright © 2016 JSPS All Rights Reserved.
Case studies to be explored in this course
2
Copyright © 2016 JSPS All Rights Reserved.
Understanding Research Ethics Through Case Examples
The Attitude of the Conscientious Scientist
Overview of Examples
Professor A, who is studying the effectiveness of various country's
economic policies, drafted a paper that included a unique analysis method
that had previously been reported in the Lab’s seminar by Doctoral
Student B, who studied under him.
Student B claimed that Professor A’s use of the analysis method was
plagiarism on his part. Professor A denied the accusation, stating that the
analytical method was his own original idea that he had previously
formulated and that Student B could not have devised without his help.
Not agreeing with the professor, Student B consulted with others
including Professor C of the department’s student consultation section,
who determined that it was not a case of plagiarism. Student B
understood her decision. Later, Professor C discussed the matter with
Professor A, and they agreed that if the student’s doctoral dissertation
were published in its current state, it may cause the reader a
misunderstanding, who could think that the idea originated with Student
B. Therefore, they agreed to give the relevant chapter of the dissertation
co-authorship. As a result, Professor A’s originality was preserved.
(a) Fabrication
Making up data or research results, etc.
(b) Falsification
Manipulating research materials, equipment, or processes to change data or
results obtained from research activities.
(c) Plagiarism
Appropriating the ideas, analyses, analytical methods, data, research results,
research paper(s), or words of other researchers without obtaining their
permission or giving them appropriate credit.
The above three types of misconduct are together abbreviated “FFP.”
3
Copyright © 2016 JSPS All Rights Reserved.
In the "Guidelines for Responding to Misconduct in Research" (August 26, 2014,
issued by the Ministry of Education, Culture, Sports, Science and Technology
(MEXT), FFP related to published research is defined as "Specific Research
Misconduct," and measures for addressing it are stipulated. Internationally, not
only is FFP considered to be research misconduct, but there is a trend to define
various other devious acts as also being problematic.
When using someone else’s research results, one must cite the source so that
the reader can reference it. Using someone else’s results without citing the
source constitutes plagiarism.
When citing sources, a scientist must clearly specify which parts are his/her own
and which parts belong to other scientists.
Plagiarism is not limited to taking ideas from published papers. When one uses
an idea or technique obtained through reviewing a paper or a grant application,
as with insider trading, such an act constitutes plagiarism.
4
Copyright © 2016 JSPS All Rights Reserved.
Even when attending a public lecture, if one later uses an idea presented by a
speaker without his/her proper permission, it may constitute plagiarism. In such
a case, it is wise to clearly credit the speaker as the source of the idea or obtain
the speaker’s permission in advance. When using a theory or an idea originated
in a discussion at a research workshop or conference, a similar step should be
taken from the standpoint of science ethics.
Overview of Examples
Professor A is recognized as a leading scientist in a basic research field.
He receives a call from a former student Lecturer B, who currently
belongs to a national university in another prefecture. Lecturer B had
listed Professor A as a co-author of his paper. He asked Professor A for his
approval to do so after the paper had been submitted. Professor A
acquiesced.
Knowing that Professor A is a leading scientist in the field, Lecturer B
thought that including his name would draw greater attention to the
paper, resulting in a higher evaluation of his work and of himself.
After the paper was published, a claim of fabrication was made on the
Internet regarding Lecturer B's paper. The investigation committee at his
university held a hearing that included Professor A, as he was listed as a
co-author, and found that he had not contributed to the actual research.
Reference:
International Committee of Medical Journal Editors (ICMJE), “Recommendations for the
Conduct, Reporting, Editing, and Publication of Scholarly Work in Medical Journals”,
Updated December 2013.
5
Copyright © 2016 JSPS All Rights Reserved.
List of Authors [Green Book: Section IV, Paragraph 2.5]
Gift authorship is a term referring to a practice in which the actual author, out
of kindness or favor, gives authorship to someone not deserving it.
Because the authors are persons held accountable for the research, it is not
permissible to list someone as an author who did not actually contribute
to the research. Such persons can be acknowledged for their cooperation, but
should not be listed as authors.
6
Copyright © 2016 JSPS All Rights Reserved.
Acknowledgements [Green Book: Section IV, Paragraph 4.4]
More specifically, this includes persons who secured funding for the research,
laboratory supervisors, principal investigators, persons who provided advice and
who helped the author in composing a draft or writing a paper in English or
other foreign language (persons who are not eligible to be included as authors).
If the research was funded by a research grant, that fact needs to be
acknowledged. This is to exercise accountability to the research-funding
organization. When the funding is provided by a private corporation, a statement
of the funding source is also necessary from a conflict-of-interest standpoint.
7
Copyright © 2016 JSPS All Rights Reserved.
Lesson 3 Improper Presentation Methods
Overview of Examples
Associate Professor A is planning to apply for a government grant. On
the application form, there is a box for "research achievements," in which
past achievements related to the proposed theme are entered. Up till now,
Associate Professor A had been doing this research below the surface, so
he had published few if any papers regarding it. Wondering what to do,
he decided to repost some papers he had previously published by just
changing their titles so as to enhance his record of research achievements.
Thus, he completed the grant application and submitted it.
In the grant selection meeting, it was found that Associate Professor A
had padded his achievements. As a result, he was not approved for the
grant.
The act of publishing one research study as multiple smaller studies (sliced out
of the main study) is referred to as “salami publishing” or “bologna publishing.”
Please remember that one excellent research paper abounding in originality
has greater impact than many unnecessarily divided papers, and can
better contribute to scientific advancement.
Salami publishing is also a problem because it’s a form of achievement padding.
Slicing up a paper makes it difficult to grasp the overall significance of the
research, while making other scientists spend unnecessary time and energy in
trying to evaluating it.
8
Copyright © 2016 JSPS All Rights Reserved.
Lesson 4 Usage of Written Works
Overview of Examples
After years of research, Lecturer A finally published a paper in an
academic journal. She wanted as many people as possible to read about
her work. After obtaining permission from the publisher, she scanned the
page of the journal and posted it on her blog.
After a while, she found that on the Internet there was a growing
suspicion that she had violated the copyright law. This was because she
failed to mention that she had received permission. She had to post an
apology on her blog for not having initially provided information about her
copyright usage.
Regarding the copyright of papers and articles posted in journals, those that
have the signature of the scientist or poster are considered to belong to the
author. If the author enters into an agreement to transfer the copyright to the
publisher, it will belong to that publishing company. In this case, when there is a
desire to use either in whole or part such papers or articles posted in a journal,
permission must, as a rule, be obtained from the publisher, even by the author.
When preparing a secondary work that copies or modifies someone else’s work,
generally one must first obtain permission from the copyright holder before
using the material.
9
Copyright © 2016 JSPS All Rights Reserved.
Secondary Use When No Permission of the Copyright Owner Is
Necessary [Green Book: Section IV, Paragraph 5.3]
・Quotations
If the following requirements are satisfied, permission from the copyright holder
is not necessary.
(1) the work being quoted has already been made public
(2) the quotation is necessary
(3) the portion being quoted is expressly indicated
(4) the work being quoted is not modified without permission
(5) the author’s work is primary while the quoted portion is secondary
(6) the source is clearly cited.
10
Copyright © 2016 JSPS All Rights Reserved.
Understanding Research Ethics Through Case Examples
The Attitude of the Conscientious Scientist
When public funds are used in research, usage rules are in place, along with
required paperwork, management methods and other aspects to ensure that the
funds are appropriately used to accomplish the objectives of the subject research.
Funding organizations and research institutions hold briefings, publish pamphlets
and conduct other activities so that when scientists carry out research they will
at least have the minimum required knowledge of funding usage rules. It is
important for scientists to take advantage of these opportunities so as to acquire
a firm grasp of the rules governing the proper use of research funds.
Some of these rules are revised every year. Therefore, scientists need to attend
briefing sessions on a regular basis and read the most recently issued pamphlets,
even if they had learned the rules a few years earlier.
If there is anything that scientists do not understand concerning the
interpretation or implementation of a rule, they should contact an administrative
official at their research institution.
11
Copyright © 2016 JSPS All Rights Reserved.
Even in cases when the entire amount of the improperly used money was not
spent by the researcher—for instance, by a student in the laboratory—ultimately
the principal investigator in charge of the publicly funded project is held
responsible for returning the money.
A refund may be ordered when a violation of the research-fund accounting rules
occurs, even if no problem is found with the purpose for which the money was
actually used.
Scientists who misuse the competitive funding system will be restricted from
applying for competitive funds for a set period of time (from 1 to 10 years). This
measure is based on the “Guidelines for Proper Execution of Competitive Funds”
(September 9, 2005), applied by government ministries and agencies
administering competitive funding systems.
When the funds improperly used are MEXT’s Kakenhi Grants-in-Aid, culpable
scientists can be banned from applying for any funds/grants in all of Japan’s
competitive funding systems, including those of other ministries and agencies.
If an assistant, for example, working in a support role under such a scientist is
found to have used funding improperly, while the scientist him/herself is not
guilty of any improper use, s/he is still subject to this measure—that is, the
scientist could become ineligible to apply for a grant from a competitive funding
system.
12
Copyright © 2016 JSPS All Rights Reserved.
Summary of Research Expenses
[Green Book: Section VI, Paragraph 5]
Just as with research misconduct, misuse of research funds can damage public
trust and aspiration in scientific research, potentially leading to reductions in
scientific research budgets. Whether due to actions of a handful of scientists or
just carelessness, misconduct of any kind can have a detrimental impact on the
entire Japanese scientific research community. It is, therefore, imperative to
exercise constant care in the proper use of research funds.
Rules are not there to constrain research. There are reasons and background for
them. It is not necessary to memorize all the rules related to research funding
and usage. When, however, you have a question, ask someone in your
university’s administrative office or the research-funding agency. An accurate
understanding of related rules will allow your research to proceed smoothly.
To carry out research activities most efficiently and effectively, it is important to
engage in dialogue with your institution’s administrative staff. And, when it is felt
that rule enhancements are needed, to request a review of those rules by the
funding agency.
This too is a responsibility of scientists.
13
Copyright © 2016 JSPS All Rights Reserved.
Misconduct through Fictitious Orders (deposits)
Overview of Examples
Professor A felt that the procedure for purchasing goods was too
cumbersome. He accepted a suggestion from Mr. B, a supplier of
laboratory instruments, to make a bogus purchase and pool the research
funds provided by the university in a deposit account with the supplier so
that he could use the funds for other purposes.
This manipulation was discovered in an audit by the regional tax bureau.
For this misconduct, penalties were imposed on Professor A by the
investigative committee of his university.
Measures taken
・ Researchers are ordered to return the funds.
・They are banned from applying for and participating in research with
competitive funding.
・ The supplier involved is suspended from any transaction for a certain period of
time.
・ Some personnel measures are taken within the research institution, such as
disciplinary actions.
14
Copyright © 2016 JSPS All Rights Reserved.
Misconduct through Fictitious Labor Costs
Overview of Examples
Professor A asked Student B to record more working hours than she
actually put in so that the lab could collect the extra amount of honoraria
to cover her travel expenses to attend an academic meeting. This scheme
was discovered when Student B, who felt a bit uneasy about the situation,
consulted the university's administration office.
It was Professor A’s claim that, since the money was not for personal use,
but for student, his action was not tantamount to misconduct. As,
however, his reasoning was not accepted, he received severe disciplinary
action.
The practice of logging more hours than collaborators actually worked and using
the excess for improper purposes.
Penalties enforced:
・ The researchers are ordered to return the funds.
・ They are banned from applying for or participating in research supported with
competitive funding.
・ Other disciplinary action is taken by the research institution.
15
Copyright © 2016 JSPS All Rights Reserved.
Misconduct through Fictitious Travel and Transportation Expenses
Overview of Examples
Associate Professor A submitted an application for an overnight business
trip. At the last minute, the event he was to attend on the second day
was cancelled. However, he did not change his trip schedule. Later, when
an internal audit was conducted, it was discovered that the travel
expenses he received did not match his actual trip itinerary.
The audit office considered the matter to be serious and reported it to
the comptroller along with a suggestion that the faculty be more
thoroughly informed of the need to submit proper evidence of trip
expenses. The comptroller asked the university president to develop
countermeasures, which initiated a discussion involving all the
departments on ways to improve compliance.
The practice of claiming research funds in an amount exceeding cost, and using
the extra money for improper purposes.
Penalties enforced:
・ The researchers are ordered to return their funds.
・ They are banned from applying for or participation in research supported with
competitive funding.
・ Other disciplinary action are taken by the research institution.
16
Copyright © 2016 JSPS All Rights Reserved.
Understanding Research Ethics Through Case Examples
The Attitude of the Conscientious Scientist
Overview of Examples
Dr. A is a scientist who participated in a clinical study to develop a new
drug. After the drug’s release, an issue was raised concerning its side
effects. Dr. A was asked to disclose some data from the clinical tests, but
she had mistakenly discarded them when moving her laboratory.
Even though she explained that it was not done intentionally, she was
still suspected of disposing of the data on purpose in order to hide
problems related to the drug’s side effects prior to its release.
Fabrication, falsification and plagiarism are not the only forms of intentional
misconduct in research, though they definitely impede scientific advancement
and societal development. Situated between research integrity and research
misconduct are so-called “questionable research practices” (QRPs), which can
also threaten research credibility.
The National Academy of Sciences in the US states the following about “QRPs.”
“A questionable research practice is a practice that violates the traditional values
of research activities, potentially resulting in harmful impacts on the research
process. These practices could damage trust in the honesty of the research
process, threaten a variety of traditional customs of science, affect research
results, waste time and resources, and weaken the education of young
scientists.”
Source:
National Academy of Sciences, Responsible Science: Ensuring the Integrity of the Research
Process, Vol. 1. Washington, D.C., National Academy Press p.28 (1992)
Data comprise “all types of information based on facts used for rational
deduction.” The importance of data in research is obvious; without data, there
could be no research.
With the exception of few special circumstances, the quality of all scientific
research is determined upon the assumption that the “data” were obtained using
the utmost care and rigor available at the time. Accordingly, scientists must
handle “data” with integrity in every phase of their research activities.
As shown in the "Example of a Questionable Research Practice," after research is
completed, important research data must be retained for a prescribed period of
time.
Reference:
Science Council of Japan (answer) "Improvements to the Soundness of Scientific
Research" March 6, 2015, "2 Consideration of Each Item for which Examination was
Requested," "(2) Basic Duties of Scientists, and Storage Periods and Methods for
Experiment Data, etc."
Overview of Examples
Following directions from Professor A, Assistant Professor B took an
inventory of the poison reagents managed by the laboratory. She
prepared an inventory report based on the poison-substances
management ledger recorded by the lab members. Later, inconsistencies
in the record were found by the university’s environmental committee.
The cause was determined to be mistakes in the numbers entered in the
ledger.
As a result of corrective action taken, the inventory status of the
reagents was reconfirmed and the management of poison substances
strengthened.
One should never forget that freedom in research is to be guaranteed only so far
as the research fulfills its responsibility of protecting those things that are to be
protected.
Science is expected to make contributions to the health and welfare of
humankind, safety and security within society, and the sustainability of the
global environment. When conducting research, therefore, these values are
expected to be protected. In other words, planning to do research that may
jeopardize the safety of society is not permitted
18
Copyright © 2016 JSPS All Rights Reserved.
The Kakenhi Grants-in-Aid application form stipulates the following as measures
that must be taken by researchers.
• Protection of human rights
• Informed consent
• Confidentiality of personal information
• Compliance with laws and regulations related to human life ethics
• Compliance with laws and regulations related to safety
• Approval of an ethics review committee
When preparing a research plan, one must pay attention to the safety of not
only oneself but also of the co-investigators and research collaborators including
students. Safety-related subjects and contents vary from field to field.
There are many safety risks involved in conducting research. Scientists may
handle materials or equipment with which they are not fully familiar, particularly
in carrying out interdisciplinary joint research projects.
It is, therefore, necessary at the research planning stage to discuss all potential
safety risks with members experienced in handling the subject
materials/equipment, including technical staffs, and to take appropriate
measures to mitigate risks and accidents.
19
Copyright © 2016 JSPS All Rights Reserved.
Lesson 3 Necessity of Informed Consent
Overview of Examples
Associate Professor A is conducting research in the field of psychology.
His project was selected for a Kakenhi grant. Having difficulty in
coordinating his schedule with that of his co-investigator Professor Y, he
asked students in the Psychology Department who were under his
influence to participate in a preliminary experiment in order to secure the
needed 150 subjects.
In addition to biasing the subjects, many of students said that they had
not received a sufficient explanation of their role. These points were taken
up as issues in an ethics review.
As a result, Associate Professor A was forced to make major changes to
his research plan just prior to project’s scheduled start. That left Professor
Y with no choice but to temporarily suspend his research.
The "Ethical Guidelines for Medical and Health Research Involving Human
Subjects" established by the Ministry of Education, Culture, Sports, Science and
Technology, and the Ministry of Health, Labour and Welfare state that informed
consent means "the consent to be given voluntarily by research subjects or their
legally acceptable representative, etc. to investigators, etc. or individuals
providing existing specimens or information, with respect to whether the
research shall be commenced or continued (including how specimens or
information shall be handled), having enough understanding after receiving
adequate prior information with regard to the purpose and significance of the
research, burdens on the research subjects and predicted results of the research
(including both risks and benefits), etc."
20
Copyright © 2016 JSPS All Rights Reserved.
Information [Green Book: Section III, Paragraph 2.2.1]
21
Copyright © 2016 JSPS All Rights Reserved.
Other [Green Book: Section III, Paragraph 2.2.4]
Overview of Examples
Professor A is an expert on energy technology. She received a request to
peer-review a paper authored by Processor C. After looking over the
paper, she realized that its contents were in competition with a paper she
is writing. So, she decided to withhold her review report until after her
own paper is published.
Some days later, Professor A's paper was published in an international
journal. Two months after that, the peer-reviewed paper authored by
Professor C was published in the journal of the academic society.
As both papers had similar conclusions, Professor A was suspected of
plagiarism. Though she claimed to be innocent, the investigation
committee of the society determined that she violated peer review ethics
because she had failed to declare a conflict of interest when accepting the
review request and because she had withheld her review report. As a
result, the society decided to suspend her from the list of peer reviewers
for a certain period of time.
22
Copyright © 2016 JSPS All Rights Reserved.
Confidentiality Contents of a paper to be peer-reviewed shall not be disclosed
to a third party. The reviewer shall not keep the submitted paper after the peer
review is completed, nor use the information obtained in the peer-review
process for purposes other than the peer review.
Constructive critique The reviewer shall laud the good points of a paper
subject to peer review while pointing out problems from a constructive
standpoint and suggest ways to improve the paper.
Competence The reviewer shall accept a peer-review assignment only if s/he
has sufficient expertise in the field to appropriately evaluate the paper.
Impartiality and integrity The reviewer shall exclude any bias or preconceived
notions, and review the paper from an objective and impartial standpoint. The
reviewer shall evaluate the paper solely on such grounds as its scientific
significance, originality, organization, and the fields covered by the academic
journal.
Disclosure of conflict of interest If any conflict of interest exists that could
impact the objectivity of the review, the reviewer shall disclose that fact to the
editor when the review is requested and, if necessary, decline to review the
paper.
23
Copyright © 2016 JSPS All Rights Reserved.
Understanding Research Ethics Through Case Examples
The Attitude of the Conscientious Scientist
Overview of Examples
Professor A is an expert in the field of neuroscience and is also working
as a consultant for a game machine company. He joined a research group
to compare the performance of game machines of different companies,
including the one he was working for.
Being very significant, the group’s research is attracting much attention.
So, Professor A went ahead and joined the research group without
disclosing the fact that he is working for one of the surveyed companies—
which was improper. As a result, the "objectivity" of the group’s research
paper was place in doubt.
Conflict of interest
as an individual
Conflict of interest
(in a narrow sense)
Conflict of an interest
Conflict of interest as a university (institution)
(in a broad sense)
Conflict of responsibilities
24
Copyright © 2016 JSPS All Rights Reserved.
There are many schools of thought regarding conflicts of interest, among them
guidelines issued by the Ministry of Health, Labour and Welfare state the
following:
A conflict of interest specifically refers to a situation wherein, due to a financially
profitable relationship with an outside entity (for example), fair and appropriate
judgment, which is necessary in doing public research, is compromised or
appears to be possibly compromised to a third person.
When fair and appropriate judgment is obstructed, data can be falsified, certain
corporations can get special treatment, research can continue despite reasons
to suspend it, and/or other results could follow.
Source: Ministry of Health, Labour and Welfare. Guidelines on the Management of COI in
Health and Labour Sciences Research
When planning a research project, one must ensure that there are no conflicts
of interest. Should a conflict of interest exist, appropriate action must be taken
to disclose that information in accordance with the rules and guidelines of one’s
affiliated institution. This is to give sufficient information to those who will read
his/her research paper to decide for themselves its value.
If a paper assigned to you for review is very close to your own research or in a
competitive relation with it, it is proper to refrain from reviewing it. Even if you
were to evaluate it fairly, you must think of how others may view the situation.
If you are asked to review or evaluate a research application of a person in a
project in which you are participating as a collaborator or co-investigator, you
should decline the request due to the clear-cut conflict of interest it would
involve.
"Conflicts of interest such as these are inherently bad, though some of them
may be impossible to prevent as science advances. For example, a particular
research field may have very few scientists who are qualified to conduct peer
reviews. In such a case, if a qualified scientist declines, the chance to conduct
the peer review, which is a process critical to scientific advancement, may be
lost. In situations like this, it is necessary to disclose the conflict of interest and
related problems to the journal editor or the research funding agency, and leave
the decision up to them."
25
Copyright © 2016 JSPS All Rights Reserved.
Lesson 2 Appropriate Handling of Personal Information
Overview of Examples
Associate Professor A participated in a large-scale survey related to
political thinking. He asked a student to help with the data collection and
tabulation. To process the large volume of data, the student input the
collected data into his own computer and worked on it at home.
Later, it was discovered that the data from the survey had leaked. The
source of the leakage was determined to be the student's computer,
which had been infected with a virus. Luckily, however, individual
respondents couldn’t be identified because their data had been
anonymized.
26
Copyright © 2016 JSPS All Rights Reserved.
As corporations and other organizations do not apply to a specific "individual,"
information related to corporations and other organizations is not considered
"personal information." (However, information related to executives and
employees is considered "personal information.") The term "individual" applies to
both Japanese citizens and foreigners.
Source: Guidelines on the Act on the Protection of Personal Information (General Rules)
(published by the Personal Information Protection Commission, November 2016), (2)
Definitions, (2-1) Personal information (pertaining to Article 2, Paragraph 1 of the Act on
the Protection of Personal Information)
Anonymizing
Source: Ethical Guidelines for Medical and Health Research Involving Human Subjects
(published by the Ministry of Education, Culture, Sports, Science and Technology and the
Ministry of Health, Labour and Welfare, December 22, 2014), Chapter 1, Part 2:
Definitions, (24) Anonymizing
27
Copyright © 2016 JSPS All Rights Reserved.
Lesson 3 Dialogue between Scientists and Society
Overview of Examples
Lecturer A is engaged in research on genetically modified plants. Having
successfully developed an innovative variety, he was interviewed about it
on a live TV program.
When asked by the media what he thought about arguments against
genetically modified foods, Lecturer A answered without hesitation, "I will
continue to develop more and more new varieties. That could solve the
world's food problems. No one will argue against genetic modification
when that happens." His remarks caused a controversy, which was
magnified over the Internet. Many people called the university to complain,
which interfered with its administrative work.
28
Copyright © 2016 JSPS All Rights Reserved.
In other words, scientists need to communicate, not just within the scientific
community, but also with people in society at large. In the past, these roles
and responsibilities were not strongly emphasized, so insufficient consideration
was given to them when nurturing scientists. In the present age, however,
when science exerts significant impact on society in a variety of ways,
scientists are expected to enhance their posture relative to their role in society.
29
Copyright © 2016 JSPS All Rights Reserved.