Switch to: References

Add citations

You must login to add citations.
  1. Deceiving Research Participants: Is It Inconsistent With Valid Consent?David Wendler - 2022 - Journal of Medicine and Philosophy 47 (4):558-571.
    It is widely assumed that the use of deception in research is always inconsistent with obtaining valid consent. In addition, guidelines and regulations permit research without valid consent only when it poses no greater than minimal risk. Current practice thus prohibits studies that use deception and pose greater than minimal risk, including studies that rely on deceptive methods to evaluate experimental treatments. To assess whether these prohibitions are justified, the present paper evaluates five arguments that might be thought to support (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The ubiquity of deception and the ethics of deceptive research.Bryan Benham - 2008 - Bioethics 22 (3):147–156.
    ABSTRACT Does the fact that deception is widely practised – even though there is a general prohibition against deception – provide insight into the ethics of deceptive methods in research, especially for social‐behavioral research? I answer in the affirmative. The ubiquity of deception argument, as I will call it, points to the need for a concrete and nuanced understanding of the variety of deceptive practices, and thus promises an alternative route of analysis for why some deception may be permissible in (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  • Ethics and Phishing Experiments.David B. Resnik & Peter R. Finn - 2018 - Science and Engineering Ethics 24 (4):1241-1252.
    Phishing is a fraudulent form of email that solicits personal or financial information from the recipient, such as a password, username, or social security or bank account number. The scammer may use the illicitly obtained information to steal the victim’s money or identity or sell the information to another party. The direct costs of phishing on consumers are exceptionally high and have risen substantially over the past 12 years. Phishing experiments that simulate real world conditions can provide cybersecurity experts with (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations