ࡱ> 8;7 `bjbjAA 4,++`$$$$$8888<t 8[[[)++++++$T0O$[[[[[O$$daaa[ $$)a[)aaIq O3Bte:az0i6.6q6$q[[a[[[[[OO[[[[[[[6[[[[[[[[[ : Anonymous versus confidential, comments from the 88 IRB (version: 18 Feb 10) Often the difference between the terms anonymous and confidential is not well understood when applied to research studies involving human participants. Yet, these concepts are very important for the protection of the subjects, and they need to be considered by researchers when designing a study and writing the protocol. During protocol review, the level of protection described will be evaluated by the IRB. Most studies will include some amount of protection of the subjects, as harm may come from revealing certain information, e.g., medical records, beliefs, or even school transcripts. In such cases, the studies need to be designed as either anonymous or confidential. No study can be both. However, to be technical, a study may include two different modes of data collection one an anonymous on-line survey and one a focus group interview - and so it could be described as both in this situation. That distinction is important when initially writing the protocol and then writing the materials and methods section of the thesis or published paper. A strictly anonymous study design is one in which it is impossible to trace data or information back to the research subject from whom it was obtained. In other words, the data cannot be identified to any particular research participant, not even by the researcher. There is total separation. No study design that involves the creation of a code linking the subjects identity to a pseudonym or a number can be termed an anonymous study, as the identity of the subject can be traced to the data. Additionally, when a written consent form is collected, this consent form has to be separated from the data that the subject provides. The PI (principal investigator) needs to describe in the protocol how this will be accomplished. Generally, on-line surveys (SurveyMonkey, Zoomerang, and others) are accomplished with anonymity. But, not always, as these examples show. The PI must assure the IRB in writing the protocol that the process does not collect IP (internet protocol) addresses which could identify the computer user. It is also possible that enough identifiers (gender, age, race, work-site, etc.) could identify a person in the dataset when downloaded. Imagine a survey of teachers at Cal Poly done by computer it is possible to associate responses from the female, aged 50-55, Asian-American professor in the ABC department who thought she had anonymity. Confidential research participation means that the data from the research subject(s) can potentially be identified or linked to a particular individual. Thus, any data collected face-to-face (consumer survey, focus groups, standing in front of a classroom, etc.) is automatically considered in the category of being confidential as opposed to anonymous. This is true even when the researcher assigns a coding number to the subjectand this number cannot be traced back to the subjectbecause the researcher him-/herself knows who provided the data. It is possible to de-identify data that have been collected by a confidential means. This happens when a PI aggregates individual responses into groups and report means and standard deviations. So, using the example above, a researcher could publish a table of teachers and indentify professors only by race and not include age, academic department, etc. This works as long as there is not an N=1 among the demographics. In a sense, then, this makes the data anonymous when it is processed, but it would be incorrect to say the data collection method is anonymous. Thus, where a study involves confidential participation by the subject(s), extra measures need to be taken for their protection. These would include at minimum: Securing the collected data (e.g., samples and information) in a locked file cabinet or similar environment, to which only the researcher and/or other trained assistants have access. If assigning subjects a key or code that connects them to the data, storing the key in a locked file cabinet separate from the data. Informing the research subjects of these measures to ensure confidentiality. The information provided should be included within the written consent form they sign. Further, it should include the plans to destroy the original data at some reasonable point after the research project is completed, typically five years after publication or immediately after transcriptions are done. Overall, these comments should not be interpreted to mean that a PI should not collect sensitive data. Rather, the Cal Poly IRB wants the PI to understand the fine and subtle details between anonymity and confidentiality, keep them in mind when writing the protocol and interacting with subjects and their data, and collect only the data necessary to fulfill the research objectives and answer the hypothesis of the study. &'DEMOPY[\f}̼̯̝viZKZKZ*CJOJQJaJht:CJOJQJaJhO\CJOJQJaJhO\hO\CJOJQJaJ"hGsh65>*CJOJQJaJh`S5CJOJQJaJhGsh65CJOJQJaJhGshO\5CJOJQJaJ"hGshj=5>*CJOJQJaJ"hGshtr5>*CJOJQJaJE[\ iV8`h`hgd`S & F L^`Lgd@th`hgdQ $h`ha$gdQ $h`ha$gdQ$a$gdQ  5 > ? M n   ! $ = > F _ g y { ӵӵĈyj[jėjjyyyh h7CJOJQJaJh heUCJOJQJaJh h?CJOJQJaJh h'9CJOJQJaJh hyFCJOJQJaJh h6CJOJQJaJh h0YCJOJQJaJh hCJOJQJaJh hVCJOJQJaJh hXYCJOJQJaJh hjvCJOJQJaJ#     # $ > D y ĵrrrrcrTrrTh h]1CJOJQJaJh hVX%CJOJQJaJh hjvCJOJQJaJh hXY5CJOJQJaJhGsCJOJQJaJhCJOJQJaJht:CJOJQJaJh hXYCJOJQJaJh htrCJOJQJaJh heUCJOJQJaJh hCJOJQJaJh h6CJOJQJaJ 0H~(hi"0@ABCDGYblĵөrrrӑfhQCJOJQJaJh hXY5CJOJQJaJht:ht:CJOJQJaJhGsCJOJQJaJh@tCJOJQJaJht:CJOJQJaJh hCJOJQJaJh h7CJOJQJaJh hXYCJOJQJaJh h]1CJOJQJaJh hjvCJOJQJaJ',ISTVWem,7pUV֩֝uufZKh hGsCJOJQJaJh$V`CJOJQJaJh$V`h$V`CJOJQJaJh@tCJOJQJaJhGshGs5CJOJQJaJhGsCJOJQJaJhXYCJOJQJaJh hVX%CJOJQJaJh hjvCJOJQJaJh h7CJOJQJaJh hCJOJQJaJh hXYCJOJQJaJh`SCJOJQJaJV4en7G`񦵗yyӦyyh hj=CJOJQJaJh hyFCJOJQJaJh h)CJOJQJaJh h?CJOJQJaJh h'9CJOJQJaJh hxCJOJQJaJh h]1CJOJQJaJh hjvCJOJQJaJh hXYCJOJQJaJ/`c}_`ĸh h`SCJOJQJaJh`SCJOJQJaJh$V`CJOJQJaJhXYCJOJQJaJh hj=CJOJQJaJh hXYCJOJQJaJh h?CJOJQJaJh h5CJOJQJaJ21h:pGs/ =!"#$% ^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List H@H ) Balloon TextCJOJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] `, V```8@0(  B S  ?bFM (b3333EZbPP\\( U^_bErh^`B*OJQJo(phhHh^`OJQJ^Jo(hHohpp^p`OJQJo(hHh@ @ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohPP^P`OJQJo(hHE#")>lQVX%11]1j=?`S0Y$V`Gs@tjv weUXYO\'976V~YyFxv.5 t:trB`b@`@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"hCgCg*| #| #!x24WWr 3qHP ?tr2!xx fStudies involving human research participants can either be  anonymous or  confidential but not bothJeffery Scott Mio Rocio Romero Oh+'0$ <H h t  hStudies involving human research participants can either be anonymous or confidential but not bothJeffery Scott MioNormalRocio Romero2Microsoft Office Word@@$@!t@!t|՜.+,0T hp  3CLASS# W gStudies involving human research participants can either be anonymous or confidential but not both Title  !"#$%&()*+,-.01234569:=Root Entry F#5Bt<1TableFWordDocument 4,SummaryInformation('DocumentSummaryInformation8/MsoDataStoreDBt O3Bt552I4ESF4==2kBt O3BtItem PropertiesUCompObj r   F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q