Switch to: References

Add citations

You must login to add citations.
  1. The importance of moral sensitivity when including persons with dementia in qualitative research.Anne Kari T. Heggestad, Per Nortvedt & Åshild Slettebø - 2013 - Nursing Ethics 20 (1):0969733012455564.
    The aim of this article is to show the importance of moral sensitivity when including persons with dementia in research. The article presents and discusses ethical challenges encountered when a total of 15 persons with dementia from two nursing homes and seven proxies were included in a qualitative study. The examples show that the ethical challenges may be unpredictable. As researchers, you participate with the informants in their daily life and in the interviews, and it is not possible to plan (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Ethics of psychotherapist deception.Drew A. Curtis & Leslie J. Kelley - 2020 - Ethics and Behavior 30 (8):601-616.
    Beneficence and integrity comprise two of the five principles of the American Psychological Association (American Psychological Association [APA], 2017) code of ethics. The connection between ethic...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Making pragmatism practicable for the institutional review board.Christopher Robertson - 2008 - American Journal of Bioethics 8 (4):49 – 51.
    Download  
     
    Export citation  
     
    Bookmark  
  • Exploring the ethics and psychological impact of deception in psychological research.M. H. Boynton, D. B. Portnoy & B. T. Johnson - 2013 - IRB: Ethics & Human Research 35 (2):7-13.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Ethics and Phishing Experiments.David B. Resnik & Peter R. Finn - 2018 - Science and Engineering Ethics 24 (4):1241-1252.
    Phishing is a fraudulent form of email that solicits personal or financial information from the recipient, such as a password, username, or social security or bank account number. The scammer may use the illicitly obtained information to steal the victim’s money or identity or sell the information to another party. The direct costs of phishing on consumers are exceptionally high and have risen substantially over the past 12 years. Phishing experiments that simulate real world conditions can provide cybersecurity experts with (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Enhancing ethics review of social and behavioral research: developing a review template in Ethiopia.Liya Wassie, Senkenesh Gebre-Mariam, Geremew Tarekegne & Stuart Rennie - 2019 - Research Ethics 15 (3-4):1-23.
    Background:Africa is increasingly becoming an important region for health research, mainly due to its heavy burden of disease, socioeconomic challenges, and inadequate health facilities. Regulatory...
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Deception in Sport: A New Taxonomy of Intra-Lusory Guiles.Adam G. Pfleegor & Danny Roesenberg - 2014 - Journal of the Philosophy of Sport 41 (2):209-231.
    Almost four decades ago, Kathleen Pearson examined deceptive practices in sport using a distinction between strategic and definitional deception. However, the complexity and dynamic nature of sport is not limited to this dual-categorization of deceptive acts and there are other features of deception in sport unaccounted for in Pearson's constructs. By employing Torres’s elucidation of the structure of skills and Suits's concept of the lusory-attitude, a more thorough taxonomy of in-contest sport deception will be presented. Despite the ubiquitous presence of (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • What's in a name?Bryan Benham - 2008 - American Journal of Bioethics 8 (4):47 – 49.
    Download  
     
    Export citation  
     
    Bookmark