Upload
abdulaziz-bahha
View
220
Download
2
Embed Size (px)
DESCRIPTION
In this research study, the researcher will obtain the email addresses of research participants by contacting the management offices of the company. A brief description of the research study will be provided to the management departments to obtain their informed consent.
Citation preview
Running head: AUDIO AND VIDEO ON DEMAND SYSTEM
1
AUDIO AND VIDEO ON DEMAND SYSTEM
Table of ContentsAudio and Video on Demand System: Ethics......................................................................5
Introduction......................................................................................................................5
Business Research Ethics................................................................................................5
Developing the vision and attitude of an ethical practitioner......................................6
Avoiding Plagiarism....................................................................................................7
Risk Assessment - No Harm........................................................................................7
Informed Consent........................................................................................................9
Privacy and Confidentiality.......................................................................................10
Data Handling and Reporting....................................................................................11
Mistakes and Negligence...........................................................................................12
Working with a mentor..............................................................................................13
Meeting requirements for IRB approval....................................................................14
Conclusion.....................................................................................................................14
References..........................................................................................................................16
2
AUDIO AND VIDEO ON DEMAND SYSTEM
Introduction
The researcher presented a research problem that relates to the practical applications of
audio and video on demand (AVOD) using peer-to-peer (P2P) networking protocols in the
previous discussions. This paper is focused on describing the ethical principles, approach, and
strategy that will be pursued by the researcher while completing this research study.
The paper is divided in three main sections. First section has introduced the paper and
described its purpose. Second section discusses the ethical principles, approach, and strategy of
the researcher that will be adopted in this research study. Third section and final section
summarizes the discussion and concludes the paper.
…
…
In this research study, the researcher will obtain the email addresses of research
participants by contacting the management offices of the company. A brief description of the
research study will be provided to the management departments to obtain their informed consent.
On receiving consent of management departments of cable companies, they will be requested to
provide the email addresses their IT engineers and network professional. After obtaining email
addresses, the research participants will be sent an initial email containing four documents: (1) a
brief description of the study, (2) permission from their management department to engage in
study, (3) request and cover letter highlighting their significance to engage in the study, and (4)
ethical undertakings. The respondents will be requested to respond back to the email if they wish
to engage in the interview. On receiving response, a second email will be sent to the willing
3
AUDIO AND VIDEO ON DEMAND SYSTEMparticipants asking them to provide their convenient free times to conduct the interviews. Then,
the researcher will personally visit the participants on their desired locations and time to
complete the interview. In this way, it will be ensured that the researcher will obtain an informed
consent of interviewees while engaging them in the research study.
It should be noted that the researcher will record the interviews while engaging research
participants. Informed consent of the research participants will be obtained before recording the
interviews.
Privacy and Confidentiality
It is the core ethical responsibility of the researcher to protect the private and confidential
information of the research participants. The privacy and confidentiality threats are the main
reason for incorrect responses from the researchers because social desirability bias in research
participants increase due to such reasons (Sekaran & Bougie, 2010). Therefore, the researcher
should focus on ‘not collecting’ the private and confidential information of the research
participants. If the researcher collects and gathers such information due to research study
requirements, he/she should effectively code this information into dummy data to protect the
privacy and confidentiality of the research participants. This information should be immediately
removed after use and it should not be published in the research study until or unless the
participants are willing to share such information. While collecting private and confidential
information, the researcher should acknowledge the participants and obtain their informed
consent. Moreover, the researcher should undertake that he/she will protect this information at
any costs and it will not be leaked or published. Moreover, the information will be deleted
immediately after the research use (Cooper & Schindler, 2014).
In this research study,
4
AUDIO AND VIDEO ON DEMAND SYSTEM …
…
Data Handling and Reporting
It should be noted that the researcher will have three kinds of data in the research study.
First data will be research articles, journal articles, and books that will be purchased or accessed
through online libraries. Such literature belongs to their authors and publishing companies and
they have strict copyright acts. Therefore, it becomes the primary responsibility of the researcher
to protect the literature data (Cooper & Schindler, 2014). Therefore, the researcher will store this
literature in its personal laptop only and such literature will not be published or shared with
anyone without obtaining the publishing rights and permission from the author and the
…
…
5
AUDIO AND VIDEO ON DEMAND SYSTEMReferences
American Psychological Association. (2014). Standard 3: Human Relations. Retrieved October
9, 2014, from American Psychological Association:
http://www.apa.org/ethics/code/index.aspx?item=6
Committee on Science, Engineering, and Public Policy, National Academy of Sciences, National
Academy of Engineering, and Institute of Medicine. (2009). A Guide to Responsible
Conduct in Research (3rd ed.). Washington, D.C.: The National Academic Press.
Cooper, D. R., & Schindler, P. S. (2014). Business Research Methods. New York: McGraw-Hill
Education.
Saunders, M. (2003). Research Methods for Business Students. New York: Pearson Education.
Sekaran, U., & Bougie, R. (2010). Research Methods for Business: A Skill Building Approach.
New York: John Wiley & Sons.
Veal, A. J., & Ticehurst, B. (2005). Business Research Methods: A Managerial Approach. New
York: Addison-Wesley Longman.
Zikmund, W., Babin, B., Carr, J., & Griffin, M. (2012). Business Research Methods. New York:
Cengage Learning.
6