| Literature DB >> 35599646 |
Pramod Kumar Singh1, Vinay Kumar2, Shahul Ameen3, Sujit Sarkhel4, Samir Kumar Praharaj5, Vikas Menon6.
Abstract
Entities:
Year: 2022 PMID: 35599646 PMCID: PMC9122129 DOI: 10.4103/indianjpsychiatry.indianjpsychiatry_78_21
Source DB: PubMed Journal: Indian J Psychiatry ISSN: 0019-5545 Impact factor: 1.759
Case scenarios depicting possible ethical issues and solutions
| Case scenario | Ethical issues | Possible solutions |
|---|---|---|
| Spouse of a person with mental illness who lacks decision making capacity may coerce the patient to participate in a research project that provides financial incentives to its participants | Violation of patient autonomy and principle of nonexploitation[ | Financial incentives for participation must be a reasonable amount and not excessive so as to be inherently coercive |
| Possible conflict of interest for the investigator who has to balance the desire to recruit more study participants against the obligation to act in an unbiased manner[ | The patient may be asked to frame research advance directives to clarify whether or not he/she would like to participate in research at a later point in time or nominate a surrogate decision maker who may make decisions related to research participation on their behalf | |
| The decision-making capacity of the surrogate decision maker must also be assessed including their motivation to consent on behalf of the patient and understanding of the benefits of research | ||
| The investigator proposes a research question that is not relevant or does not sufficiently add to the state of knowledge in the field or poses risk of harm to the patients (e.g., adverse effects of a drug) | Violates the principle of essentiality in medical research - every proposed research should be deemed to be absolutely essential in order to add to the existing body of work and knowledge in the proposed area[ | IRB members need to co-opt members with specific expertise in the field when proposals related to mental health are discussed; if the proposed research does not sufficiently advance knowledge in the field, then it must not be approved |
| Patients need to be fully apprised about the associated risks and benefits of the study during the informed consent process; they should have the right to terminate the trial at any time during the study period without any prejudice to their ongoing care or treatment in any manner | There must be a provision to monitor patients regularly for adverse effects in any interventional trial and for withdrawal of participants from the study in case of adverse effects | |
| Any adverse event must be brought to the notice of the IRB immediately | ||
| Provision of DSMB for sponsored clinical trials; this board will monitor data integrity, periodically assess potential risks to participants, and recognize when the study needs to be stopped or revised | ||
| “There are no ethics committees in my institution. So, I can proceed without obtaining ethics approval” | The investigator may not know that he/she has other options available for obtaining ethical approval and may proceed to conduct the research assuming that since there is no such committee, no such approval is required | Such investigators may approach independent ethics committees of the nearest appropriate institution or private ethics committees to get their research proposal approved. Note that in both these options, the committees may charge a sitting fee for discussing the proposal |
| Serious ethical violations can lead to problems both for the investigator as well as his/her institution | The investigator may also constitute an independent ethics committee in accordance with the guidelines and mandates laid down by the ICMR for the constitution and functioning of ethics committees | |
| “I am doing a research using secondary data (for instance, data contained in publicly available clinical, administrative and national health databases such as cancer registries). Since I am not directly contacting anyone and collecting data, I do not need ethics approval” | The ethical issues involved are of three broad categories – issues related to the individual whose data is contained within the scrutinized records (e.g., privacy/confidentiality/harm); issues concerning the owner of the data (e.g., access and copyright) and finally, issues surrounding the accuracy and scientific validity of the data intended to be used (e.g., completeness, representativeness etc.)[ | Ultimately, it is the responsibility of every investigator to know what kind of projects require ethical clearance and what kind of projects do not |
| When in doubt, it is always safer to approach an ethics committee and get the proposal formally scrutinized | ||
| All medical faculty members of the independent ethics committee as well as aspiring researchers must undergo training in bioethics in order to facilitate a good grasp of ethical issues involved in various kinds of research projects | ||
| Due to the above issues, even such research requires scrutiny by an independent ethics committee |
IRB – Institutional review board; DSMB – Data safety monitoring boards; ICMR – Indian Council of Medical Research
Common myths associated with the process of informed consent in mental health research
| Myth | Reality | Recommendation |
|---|---|---|
| “All patients with mental illness are incompetent to make decisions about participation in research” | Impairment of cognitive faculties due to mental illness occurs on a spectrum and presence of some mental health symptoms is not incompatible with decision making | Assess every patient individually for his/her competence and decision-making ability |
| In addition to conversations or interviewing, provide research related information in various ways to the patient such as study information sheet, books, pamphlets, recorded videotapes of study information, and social media links to the study[28,29] | ||
| “Competence in decision making is stable over time in mental illness” | Competence in decision making is variable over the lifetime course of mental illness – there may be instances when the same patient is impaired to the extent of being unable to give consent and, at other times, recover sufficiently to regain competence in decision making[ | Investigators may need to reconsent patients during the course of a study; for instance, if a patient regains decision making ability with treatment during the course of a study, investigators may reconsent the patient although initial consent for the study may have been provided by the LAR. Investigators must note that subjects retain the right to refuse or revoke consent given by the LAR at any later point of time if they regain decisional capacity |
| Sometimes, continued consenting of patients may be necessary in situations where new information, that can potentially affect the safety and well-being of study subjects, emerges during the study | ||
| “If the patient is not competent to make decisions and there is no LAR to consent on behalf of the patient, such patients may need to be excluded from the study” | Such patients can be included without informed consent but with some caveats | In such cases, the investigator can proceed without obtaining informed consent “provided that the specific reasons for involving subjects with a condition that renders them unable to give informed consent have been stated in the research protocol and the study has been approved by a research ethics committee. Consent to remain in the research must be obtained as soon as possible from the subject or a legally authorized representative”[ |
| “If a patient is unable to consent but able to give assent, then obtaining informed consent from LAR is enough to proceed” | Assent of the patient, in addition to consent from LAR is necessary | Clause no 28 of the WMA 2008 guidelines for ethical research states that “When a potential research subject who is deemed incompetent is able to give assent to decisions about participation in research, the physician must obtain the assent in addition to the consent from LAR. The potential patient’s dissent must be respected”[ |
LAR – Legally accepted representative; WMA – World Medical Association
Types of safeguards to protect data confidentiality in research[8]
| Physical safeguards: These refer to steps taken to prevent unauthorized personnel from accessing confidential research data. Examples include securing the research or data room with access control lock, storing data in locked cabinets and keeping data away from common and easily accessible areas |
| Administrative safeguards: These refer to steps typically taken to specify the people who have access to the confidential research data. Generally, the more the number of people who have access to the private data, the more difficult it is to ensure confidentiality of sensitive participant data. Hence, only the requisite minimum number of research personnel must be allowed to access participant data |
| Technical safeguards: These involve the use of protective technological safeguards such as the use of firewalls and passwords, data encryption and other measures designed to prevent data hacking, theft and modification |
| Research design safeguards: These refer to measures that are inbuilt into the research design right from the planning and conceptualization stages to protect privacy of participant data. Examples of such measures include deidentification/anonymization of data, transcribing raw data on the same day or as soon as possible, destroying any paper copies of the data as soon as it is feasible and providing adequate training to data handlers to ensure compliance with these measures |
Types of research misconduct
| Research misconduct | Examples |
|---|---|
| Fabrication | |
| Falsification | |
| Plagiarism | |
| Redundant publication | Duplication, salami slicing |
| Selective or misleading reporting | Spin, hype |
| Authorship malpractice | Guest/ghost authorship, denying authorship |
| Funding disclosure | Failure to disclose, misreporting |
| Informed consent not taken | |
| Ethics committee approval not taken | |
| Miscellaneous | Peer review bias |
Examples of fabrication and falsification
| Research misconduct | Examples |
|---|---|
| Fabrication | Manufacturing research data |
| Creating datasheets without doing studies | |
| Creating graphs and images | |
| Creating informed consents | |
| Reporting studies that were never done | |
| Mentioning nonexistent studies in grant applications | |
| Falsification | Alterations in data values |
| Omitting outliers | |
| Image manipulations | |
| Changing the measurements |
Types of selective reporting practices[17]
| Selective reporting practices | Description/example |
|---|---|
| Misreporting the methods | |
| Changing objectives | Change objectives to suit the results |
| Reporting | Add hypotheses after seeing the results |
| Switching outcomes | Change the outcome measure |
| Switching analysis | Change the analysis |
| Masking protocol deviations | Not reporting changes in original protocol |
| Beautification | Report double-blind, but blinding is not credible |
| Misreporting results | |
| Selective reporting of outcomes and analysis | Reporting some outcomes or analysis but not others, favoring significant results, ignoring results that contradict the initial hypothesis |
| P-hacking (selectively choose to report or focus on positive results), cherry picking | Unplanned interim analysis, excluding outliers from analysis, combine or split groups, adjusting covariates, performing subgroup analysis, choosing the threshold for dichotomizing continuous outcomes |
| Misreporting results and figures | Misleading display of results through choice of metrics and figures (a break in the y axis, not adding statistical uncertainty, alter the images using image-processing software) |
| Misinterpretation of data | |
| Misinterpretations (HARKing, hypothesizing after results are known or JARKing, justifying after results are known) | Taking strong position based on opinion than actual results, inappropriate inference from a composite outcome, infer causality based on associations, extrapolate results beyond the data to a larger population, setting, or intervention, and provide recommendations for clinical practice |
| Rhetoric (using persuasive or impressive language) | Inflating the value (first time ever, clear answer, strong evidence), or deflating (inconsistent results, methodological flaws) in absence of evidence |
| Selective citing of references | To convey a desired message |
| Hype (inappropriate exaggeration) | Terms such as breakthrough, game changer, miracle, cure, revolutionary in conclusion, describing nonsignificant results as trends, underreporting adverse events, not acknowledging the major errors in study design |
Methods to reduce spin in research[17]
| Methods | Description |
|---|---|
| Spin should be considered as a form serious research misconduct | Researchers, institutions, editors, and funders should recognize this as serious |
| Increase awareness on misrepresentation or distortion of research in published reports | |
| Training of researchers to detect and avoid spin in published reports early in their research career | |
| Protocol registration | Essential information on study design, methods, statistical analysis plan should be part of all research protocol |
| All protocols must be registered in trial registry and accessible to public | |
| Protocols should be registered before the start of data collection, i.e., prospective registration | |
| Data availability | Data should be made available in data repositories or from the researchers on request |
| Raw data can be used to verify the results against the statistical analysis plan available in the protocol | |
| Reduce bias | Although new findings including unexpected results are welcome, one must be aware of the following bias |
| Apophia, i.e., the tendency to see patterns in random data | |
| Confirmation bias, i.e., the tendency to focus on evidence in line with expectations | |
| Hindsight bias, i.e., the tendency to see an event as being predictable only after it has occurred | |
| Reporting guidelines | Reporting guidelines developed by EQUATOR network (www.equator-network.org) helps in complete, accurate, and transparent reporting |
| Minimum set of information that should be systematically reported by authors for specific studies | |
| Endorsed by editors who require adherence to the guidelines for research publications | |
| Peer-review | Peer-review of manuscripts is a safeguard against spin |
| Specific peer-reviewer training may enhance the ability of novice reviewers to detect spin | |
| Tools may be made available to peer-reviewers and editors to facilitate the detection of spin | |
| Editors | Editors should be held accountable for the content of a published manuscript |
| The published research should be monitored regularly for spin through postpublication reviews as letters to the editors | |
| Changing the reward system | The number of publications and the journal impact factor, against which researchers are evaluated is fraught with problems |
| Transparent and open research which are more collaborative, than competitive, may reduce spin |
EUAQTOR – Enhancing the Quality and Transparency of Health Research
Ethical issues in publishing in predatory journals
| • Misinformation and misrepresentation: Predatory journals often present distorted information about their goals, roles, and services offered; often they prioritize self-interest at the cost of scientific rigor |
| • Deviation from global best practices in scholarly publishing: These journals lack mechanisms such as peer review and editing which may result in published work that is lacking in both scientific quality and ethical tenets |
| • Lack of transparency in journal policies: These journals often do not clearly and transparently display publishing fees, policies and procedures on their websites; this may mislead gullible authors |
| • Lack of recognition for published work: A published article in a predatory journal does not hold the same prestige as in other legitimate journals; this is a serious ethical issue that involves wastage and lack of due credit for funding and effort expended for the study |
| • Self-citations to boost impact: Many predatory journals explicitly encourage and often demand papers from their journal to be cited by authors submitting to them, presumably to bolster their impact factor. This undermines the confidence that the reader and the lay public have in the published literature |
| • Lack of archived content: Predatory journals rarely archive their content in third party sites, thus rendering their content inaccessible for future scrutiny |