ࡱ> !` TGbjbj\\ >>>RRRRRRR4hV2"y,~$1hRRR~RR~~R4RR`ք wȶ*r(~ϴ0F33<``3RylkdE M5 MRRRRRR  DATE \@ "M/d/yyyy h:mm am/pm" 11/19/2007 9:16 AM G. Comstock, NC State Instructors Guide OpenSeminar in Research Ethics I teach the OS in Research Ethics in 2 hour sessions, once a week, for 7 weeks. TWO WEEKS PRIOR to the first class I send an email to students instructing them to complete the Pre-test. Sample text: You are registered for PHI 816, "Introduction to Research Ethics." The main goal of the course is to welcome you into the community of research scholars at NC State. Our first meeting is Monday, Aug. 27 from 2:004:00 in Harrelson 107. PRIOR TO THAT DAY, you must complete the Pre-test. 1) Find the Pre-test here:  HYPERLINK "http://www.chass.ncsu.edu/langure/pretest.pdf" www.chass.ncsu.edu/langure/pretest.pdf 2) Print a copy. 3) Circle the best answer for each question. 4) Bring the test with you to the first class. Thanks. I look forward to meeting you on the 27th. Dr. Comstock Hour 1 Goal is to welcome students, help them to feel part of a scholarly community 1. Write outline of days activities on board (Syllabus; Introductions; Pre-test; OpenSeminar) 2. Introduce myself (3 min.) 3. Review syllabus (10 min.) 4. Self-introductions (40 min. for 30 students) Go around room state name, department, and a paragraph about your research. If A has previously identified themselves as being in Bs department, I ask B to go sit beside A. The intent is to insure everyone has met at least one person by the end of the class, making good on our promise to do all we can to help them feel part of community, right from the get-go. Two important side-effects: They already have a partner with whom to discuss the pre-test. And, if they take nothing else from the first day, theyve taken away one acquaintance, preferably someone from their department. 5. Discuss Pre-test with your partner (15 minutes) I do not give out the answers to the Pre-test initially, preferring to engage the students in discussion about them. I assign each team (2 students per team) a number, then instruct each team to determine the answer to the pre-test question corresponding to their teams number. This works for a class of 50 because there are 25 teams and 25 questions. For a smaller class, say, 26, I assign each team two questions, as follows. After youve finished discussing the first question, add 10 to the number of your question, and then determine the answer to that question. For example, the team discussing Pre-test question 1 adds 10, gets 11, and proceeds to discuss question 11; the team discussing question 2 takes question 12 and so on. Allow 10 minutes for teams to discuss their two questions. Allow 15 minutes to call on team 1, discuss their answer, team 2 for their answer, until question 25. If using the additional questions in the field-specific Pre-tests (e.g., Physics, Engineering), I leave sufficient numbers of answer sheets on my desk and instruct those students to pick them up after class. Hour 2 Note: Plan on only having 45 minutes if teaching class in 2-hr sessions 1. Now I provide the answers to the pre-test and we discuss them (30 minutes) 2. Explain how the online readings and quiz questions work on  HYPERLINK "http://openseminar.org/ethics/" OpenSeminar in Research Ethics (OS). (5 min). 3. Assignment for Hours 3 and 4: Read OS modules 1.0 1.4, namely: 1.0 My interests 1.1 Take the long view 1.2 Progress to degree 1.3 Report falsification 1.4 Avoid plagiarism Hour 3 Goals of todays class: Motivate students, and tackle theWho cares? question 1. Todays assignment: 1.0 My interests 1.1 Take the long view 1.2 Progress to degree 1.3 Report falsification 1.4 Avoid plagiarism 2. On board: 1. Review 2. Intro to Research Ethics 3. Report falsification BREAK 4. Plagiarism 5. My ethical method 3. Review: Last week we 1. Met each other (self-intros) 2. Syllabus (review) 3. Pre-test (review) 4. Openseminar.org (learned to navigate) 4. Intro to research ethics A PPT to guide discussion is here: G. Comstock, 0.0 Intro to course :  HYPERLINK "http://www.chass.ncsu.edu/langure/ethics/PHI816%20Fall%202007/modules/PHI%20816%20Opening%20session.ppt" \t "_blank" Opening session (ppt) (35 min.) I take 5 minutes to introduce the Mary Allen story because I find its a very effective way to introduce, and answer, the who cares? question. 5. Report falsification (10 minutes) OS module 1.3 My Reputation (p. 16 of 28) identifies a half dozen lessons in Mary Allens story. Break students into groups of 3. Identify the main 3 lessons you learned from the case. When finished, each group writes one lesson on the board. We then discuss the lessons. Hour 4 Note: Plan on only having 45 minutes if teaching class in 2-hr sessions 1. Plagiarism (30 minutes) - Work through the Plant Biology (or Physics or PA or ECE) online exercise. 2. My ethical method (10 min.) Groups of 3. What considerations do you take into account when making decisions in the areas of research, teaching, writing, mentoring? Write down as many ethical considerations as you can think of. Dont worry about systematizing them or trying to avoid having contradictory considerations. Sheer quantity wins! You have 5 minutes. After 5 minutes: Which group has most? Read your list. Do other groups have considerations to add? Conclusion: My ethical method: Mirror, Grandma, N&O [last 3 slides of ppt] 3. Assignments for Hours 5 and 6 (5 min.) 1. Print your professions code and bring to class. 2. Modules 1.5 - 1.7, and 2.0 2.4 1.0 My interests 1.5 Inquire critically 1.6 Strengthen the community 1.7 Egoisms weaknesses 2.0 Our interests 2.1 Contractarianism 2.2 Professional codes 2.3 Mentoring 2.4 Women and under-represented minorities Hour 5 Goals: Introduce critical inquiry and ethical theory, cover mentoring and URMs 1. Todays assignment: 1.0 My interests 1.5 Inquire critically 1.6 Strengthen the community 1.7 Egoisms weaknesses 2.0 Our interests 2.1 Contractarianism 2.2 Professional codes 2.3 Mentoring 2.4 Women and under-represented minorities 2. On board: Today: 1. Review 2. Critical inquiry 3. What is ethics? Egoism and contractarianism 4. Mentoring 5. Women and URMs 3. Review: Last week we covered: 1. Intro to Research Ethics; 2. Report falsification (Mary Allen); 3. Plagiarism; 4. My ethical method 4. Critical inquiry: Research official definition; asking questions; expectation bias; Lets Make a Deal applet 5. What is ethics? PPT: Module 1.5, G. Comstock,  HYPERLINK "http://www.chass.ncsu.edu/langure/ethics/PHI816%20Fall%202007/modules/1.5_Inquire_critically/PHI%20816%20Intro%20to%20ethics.ppt" \t "_blank" What is ethics? (30 min.) 6. What is a profession? Professional codes (20 minutes) Exercise: Professional codes 1. Find 2 partners. At least one of them preferably not in your department. 2. Find 3 rules that each of your codes share ("common" rules). 3. Write them on the board, or, if the rule is already on the board, place the name of your profession's code next to it. 4. Find 1 rule in your code not shared with your partner's codes. Write it on the board. 5. Discussion question: What is the value of professional codes? (See Varner) Hour 6 1. Mentoring; Women and under-represented minorities PPT: G. Comstock: OpenSeminar Module 2.4  HYPERLINK "http://www.chass.ncsu.edu/langure/documents/PHI816MentoringandWomenURMs.ppt" \t "_blank" Mentoring women and under-represented minorities in graduate education [PPT] ------- Assignments (Hours 7 and 8): 1. Read: 2.6 Authorship and peer review 2.7 Statistics and experimental design 2.8 Intellectual property 2.9 Conflicts of interests; collaborative research 2. Interview your mentor (supervisor, or dept. chair) A hard copy is at the end of this Instructors Guide, and here:  HYPERLINK "http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf" http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf Hour 7 Goals: Cover authorship, use of statistics, IP, and COI 1. On board: Today: 1. Review 2. Authorship 3. Interviews with PIs 3. Statistics 4. IP and COI 2. Review: Last week we covered: 1.5 Inquire critically 1.6 Strengthen the community 1.7 Egoisms weaknesses 2.1 Contractarianism 2.2 Professional codes 2.3 Mentoring 2.4 Women and under-represented minorities 3. Authorship and peer review (30 min) PPT: G. Comstock: OpenSeminar Module 2.5,  HYPERLINK "http://www.chass.ncsu.edu/langure/documents/PHI816Authorship_001.ppt" \t "_blank" Authorship [PPT] 4. Mentor interviews (10 min) Hour 8 1. Statistics (25 min) PPT: G. Comstock: OpenSeminar Module 2.7,  HYPERLINK "http://www.chass.ncsu.edu/langure/documents/PHI816ResponsibleUseofStatistics_000.ppt" \t "_blank" Responsible use of statistics [PPT] 2. IP and COI (10 min) ---------- 3. Assignment for hours 9 and 10: 2.95 Use of humans 3.0 All interests 3.1 Utilitarianism 3.2 Animals Hour 9 1. On board: Human subjects, animal subjects Milgram exercise. See Module 2.95 for instructions Hour 10 2. Human and animal subjects (Comstock, PPT) PPT: G. Comstock: OpenSeminar Module 2.95,  HYPERLINK "http://openseminar.org/ethics/courses/59/modules/1829/index/Use%20of%20animal%20and%20human%20subjects%20in%20research%20%5BPPT%5D" \t "_blank" Use of animal and human subjects in research [PPT] -------- 3. Assignment for hours 11 and 12: Read: 3.3 The environment 3.4 Social responsibilities of researchers 3.42 Social mission of universities Hours 11 & 12 1. Discipline-specific seminars. Students meet with faculty in their own departments or inform me of a seminar they will attend on ethical issues specific to their discipline. 2. Readings for hours 11 and 12: 3.3 The environment 3.4 Social responsibilities of researchers 3.42 Social mission of universities 3. Assignment for hours 13 and 14: Read: 3.5 Life-long learning Hour 13 1. Life-long learning PPT: G. Comstock: OpenSeminar Module 2.95,  HYPERLINK "http://openseminar.org/ethics/courses/59/modules/1829/index/Use%20of%20animal%20and%20human%20subjects%20in%20research%20%5BPPT%5D" \t "_blank" Use of animal and human subjects in research [PPT] Hour 14 2. Course evaluations Rob Streiffer exercises: -------- Exercise Relating Codes to Theories Of what practical use are theoretical considerations in research ethics? Find an example of a rule within your professional code and explain how different theories of ethics would direct us to different considerations in evaluating (either justifying or condemning) that rule. --------- Students identify Ethical issues in labs and work environments Divide into small groups of three people. One person should be designated as the note-taker and reporter. From the list, select the one issue that you think is the most common and the one issue that you think is the most serious. Drawing on the readings and class discussions so far, specify precisely what you think those issues are. For one of the two issues, describe two alternative strategies that a lab might adopt to minimize the occurrence of the issue and to respond to it when it occurs. Evaluate those strategies. Ethical issues facing the professions Divide into small groups of three people. One person should be designated as the note-taker and reporter. From the list, select the one issue that you think is the most common and the one issue that you think is the most serious. Drawing on the readings and class discussions so far, specify precisely what you think those issues are. For one of the two issues, describe two alternative strategies that the profession might adopt to minimize the occurrence of the issue and to deal with it when it occurs. Evaluate those strategies. Mentor Interview Working with your departmental partner, pick a research group in your department and interview the leader (or the leaders designee) about authorship practices and record-keeping. Record your findings and be prepared to discuss them in class. 1. Authorship Practices What criteria does the group use for determining who is an author on a paper? You might want to consider such possible contributions as: overall project design, project funding, design of individual experiments, data collection, data analysis, data interpretation, literature searches and review, writing, editing, and preparation of figures. What criteria does the group use for determining who is FIRST author? What criteria does the group use for determining who is LAST author? What criteria does the group use for determining who receives an acknowledgement? What practices does the group consider "courtesy authorship" and what is the group policy on courtesy authorship? Who in the group has the right to decide authorship? Have relationships ever been strained due to differing views on authorship? If so, without naming the persons involved, what happened? 2. Record-keeping 1. What classes of research records are maintained by the group (research notebooks, computer files, films, culture collection lists, etc.)? 2. What are the policies (explicit or assumed) of the group on how research notebooks are to be created and maintained? Include the following information: Any specific type of notebook (bound, loose-leaf, electronic)? If the notebook is bound, is there any particular style that the lab prefers? (If possible, bring an example to class.) Any particular type of writing instrument (ballpoint pen, India ink pen, pencil)? What type of information is to be kept in the notebook (dates, experiment number, title, purpose, approach, methods, protocols, results, data sheets, graphs, computer files, conclusions, suggestions for future experiments, signatures, etc.)? Any policies on how the above information is organized in the notebooks? Any policies on re-writing notes before putting them into a notebook? Who owns the notebooks? Who has access to the notebooks? How long must the notebooks be kept? Who must keep them? Any policies on removal of notebooks from the premises? Any policies on copying the notebooks? 3. Has the group ever suffered because of improperly or inadequately kept notes? [Based on worksheet by Charlotte Bronson, Iowa State University] 3. Education in Research Ethics Read this statement to your supervisor: The National Institutes of Health now requires education in responsible conduct of research (RCR) for all graduate students receiving support from NIH training grants. RCR includes the following topics: 1. Data acquisition, management, sharing, and ownership 2. Mentor/trainee responsibilities 3. Publication practices and responsible authorship 4. Peer review 5. Collaborative science 6. Human subjects 7. Research involving animals 8. Research misconduct 9. Conflict of interest and commitment 10. Social responsibilities of researchers 1. How is knowledge of these issues passed on in the lab? Is it mostly informal mentoring relationships? Or are there structured occasions, such as seminars or courses? 2. Is the PI satisfied that colleagues in the department are sufficiently communicating RCR to their graduate students? 3. If the answer to #2 is negative, what more does the PI think the department should be doing? 4. Is the PI aware of PHI 816, Introduction to Research Ethics? taught for 1.0 credit, typically on the first seven Monday or Tuesday afternoons of each term?  HYPERLINK "http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf" http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf Troubleshooting OpenSeminar problems: If you cannot access the server, send an email to John Jernigan at NC State University: jajerni2@unity.ncsu.edu     PAGE  PAGE 1  !345KL^_ao  & ) 2 6 ? A B C I O P ~vng h*sh#{h*she5h*shTI5h*shJ5 h&h*s h&h& h&h;0! h&hJ h&5 h*s5 hJ5h3h&hjh++hJhUhU5CJaJhj5CJaJh?I5CJaJmHnHuh15CJaJjh15CJUaJ(5KL`aB C P t  5 d dd[$\$^gd*s ^`gd*s^gd*s &dPgdjgdj$a$gdegdUFSG   # ) - = H S e s t v w x ü|ukuY|M|F h;0!5aJh0hJ0J5aJ"jh0hJ5UaJhJhJ5aJ hJ5aJjhJ5UaJ hg5aJ h85aJ h*15aJ h*s5aJh&h*15aJ h*sh*1 h*shg h*sh*s h*sh& h*sh#{h*sh#{6\h*sh316\h*sh#{6h*sh316h& h*sh31   ! " B G c d e m q  + \ a q s u { | } ۽}xsx}xni}x hu75 hz5heh5hhph(.56 h} >56 h(.56hHO heheh3h&hTI h*s5 hTI5h31h315H* h315 h&5 h0*5 h;0!5h*sh&5aJ hB'5aJ h;0!5aJ h*s5aJ) ] | OP^gd^gd++gde$a$gd(.$dd[$\$a$gd&dd[$\$^gd&$pdd[$\$^pa$gd*s$dd[$\$^a$gd*s}     O S a g w y "'(/0ABENOPmDb6ǽ hY5 h&5 h5 hz5heh5J!,6Vi&.:hkns!% hB'5 hY5 hb5heh5hehA5 hY56hphA56hphp56 h956 hp5 hphp hphAhb h]=5hhA5CJaJhh5CJaJ hA5 h++52OP67I`w$a$gdP6$a$gdBp^pgd>^gd3gdY$a$gdA^gdgde%-6<FOPQT,567IԺީޮ~wpwi hP656 hL56 hAc-56hB hB5h&h>CJaJhL@h35 h=!5 hV5 h35 h.xk5 h>5 hb0J5hbhB'0J5j7hbhb5Ujhb5U he5 h++5 hY5 hB'5 hb5hehY5).fm  ·ҪҥҠqg_[hOjhOUh.h"5aJhYQh"5B*aJph h"5aJh/Yh"56B*phh"56B*ph h"5 h 5hehO5 h95h&h CJaJhL@h 5heh++5 hO5 hAc-5 h++5hphP656 hAc-56 hb56 hL56#.E\u*KawgdO ^`gdO^gdOgd9p^pgd ^gd gd++$a$gdP6?@gh}<=^_^gdLgdP6gd $a$gdCI^gd9^gdV ^`gd"`gd"gdVgd9>@Z]ghqr!$)/13>CDEP_`bgo{}~ʾʾʾʾʾʾʾʾʾʩʢ h$ 56 hCI56 hCI5hCI hphCI hL5 h h9hYQ hhi5 hYQ5 hVhV h95 h=:5 hV5 h 5h"h 5aJ hO5hO hO0JjhOU5)*=S]mQa.degjkw{34KLPQR˼дІh;h35h&h=:CJaJh=:CJaJh&h>CJaJhL@h>5h>CJaJ h>5 h_|.5 hL@5 hh?5 h35 h(75 h=:5 h 5 h$ 5 hL5hehCI5hphCI564ef4LM`w ^`gd>^gd3^gd> 8^8`gd>8^8gd>`gd_|.gd3gdP6^gdLR_`)*DEW# $ !!(!)!B!U!!!!!!vkh;~56B*phhZ756B*ph hx^5 h h(7h(7h;h(75h(7CJaJh&h(7CJaJhL@h(75heh(75 h(75hph(756 h(756 h$ 56hCI hh?5 hZ5 h h3h3 h35h;h35'*+EWn$ % ^`gd(7^gd(7^gd(7 8^8`gd(7gd(7$a$gd(7$a$gdCIgde ^`gd % ; H ] *!@!A!!!"""""G## 7$8$H$^gdz*B*aJphh.h.5aJjh.h.5UaJ hZ75aJhYQhj5B*aJphhYQhZ75B*aJphhYQh.5B*aJphhYQh.56B*phhUx:56B*ph h.5 hZ5hZhZ5 hL@5 Q&m&&&&''''''''''((.(F(X(^gd4]gd4]$a$gd4]gdP6gdk+ $^a$gdz*?*񻰢}s}c}s^ZRhpzhP65hP6 hz*B*aJphhc@hc@5aJjhc@hc@5UaJ hc@5aJhYQhc@5B*aJphhYQhc@56B*phhc@56B*ph hc@5hpzh4]5 h h4]h4]h4]h4]CJaJh4]CJaJh&h4]CJaJ h4]5hph4]56X(g(h(((((())D)E)o)p)**4*<*=*V*W*++gdP6$a$gdP6$a$gdc@gdc@ ^`gd4]^gd4]gd4] ^`gd4]?*B*M*P*V*W*X*Y*]******+++++-+/+6+7+E+S+Y+[+g+i+|+}+++++ȹtphat\ hpz5 h;h~h!h~5h~h&h~CJaJ hL@5 h4]5hc@hc@5aJhc@hc@0J5hc@hc@5jhc@hc@5U hc@5aJhJhc@5B*aJphhJhc@56B*phhJhc@5B*phhJhP65B*ph hc@5 hn5 hP65"+6+7+8+9+D+E+h+i+|+}+++++++++++$,-,.,6,7,gd<$a$gd<gd~gd~gdL@gdP6+++++++,,,$,,,-,.,7,8,9,f,g,i,m,,,,5-6-h-i-j-k-v----þ񾬞yyiyd_Z hZ5 h~5 h5hc@hc@5>*B*aJphjhc@hc@5UaJ hc@5aJhJhc@5B*aJphhJhc@56B*phhc@hc@5aJhpzh<5 h<5 hh5 h756hSf=hL@56hhhL@56 hc@56 hL@56 hL@5h< h/5!7,g,i,j-k-l-u-v----- . ........ /6/[/\//gdUgdU$a$gdhgd~gdL@gdc@gd<------- . . . ........!.s.......//5/Z/[/`//////////////վվУ̛þ~w hU5aJhJhU5B*aJphhJhU56B*phhUhU5heh<5hUCJaJh&hUCJaJ hU5 h<5hL@h< hn5 hL@5h&hZCJaJh~CJaJhZCJaJh&h~CJaJ,////////000000011 114151J2K2U22gdgd9gdegdU$a$gd<gd<gd~gdL@//00000000000011111J2U2e2g222>3D3r3y3t5z55566667}}}}xmahk+hk+5CJaJhk+hk+CJ(aJ hk+5hh56aJh9h5hh5aJh9h95aJ hP65 h95 h5heh<5 hL@5hpzh<5 h~5h< h<5hc@hU5>*B*aJphhc@hU5aJjhc@hU5UaJ%2223444445566666677788 dx`gdk+dgdk+ $da$gdk+$a$gdk+gdhgde & Fgd & Fgdgd77888S89999h:}:r;;<<<<n@o@@@@@@'B(BrDDDDQESETEEEEEEE껴uib h{5aJhk+hu<0J5aJ"jhk+hu<5UaJhk+hu<5aJjhk+hu<5UaJhk+hh5aJhk+hk+5aJ hk+5aJhk+hk+5CJaJhk+hk+5CJaJhk+hk+CJaJhk+hk+5CJaJhk+hk+CJ(aJhk+hk+CJaJ&8`9a99999@:A:::::r;;;<<<<n= & F d^gdk+ $dxa$gdk+ dxgdk+ & F dxgdk+dgdk+ & F md^`mgdk+n=o===>>>?F?G?_?`???@@n@o@@@@@@$a$gdk+$d`a$gdk+dgdk+ & F d^gdk+ d^gdk+@@@AB)B^BnBBBBBB%CCCKDLDDDPESEEgdegdh dd[$\$^gdk+dd[$\$^gdk+ d^gdk+dgdk+EFFFoFFFFFFFFFFFFFFFFF G̻wfUD<8<8<8h80jh80U j h2cdh80<CJUaJ jV h2cdh80<CJUaJ jh2cdh80<CJUaJ j&h2cdh80<CJUaJ jh2cdh80<CJUaJ jh2cdh80<CJUaJ jdh2cdh80<CJUaJ jh2cdh80<CJUaJ j@h2cdh80<CJUaJh{h{5aJ h{5aJh{hu<aJh{h{aJEFFFFFFFFFFFFFFFFFFFFFFgdk+gdzG?GJGKGLGMGNGOGPGQGRGSGTG & F gd{gdTI &`#$gd/gd&9 0&P1h:pU/ =!"#$% 9 0&P1h:pU/ =!"#$% 9 0&P1h:pU/ =!"#$% 7DyK 'www.chass.ncsu.edu/langure/pretest.pdfyK thttp://www.chass.ncsu.edu/langure/pretest.pdfyX;H,]ą'cDyK yK Vhttp://openseminar.org/ethics/yX;H,]ą'cDyK Ehttp://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdfyK http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdfyX;H,]ą'cDyK Ehttp://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdfyK http://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdfyX;H,]ą'cDd F  3 "@@Dd F  3 "@@Dd R  3 bullet"@@Dd F  3 "@@Dd F  3 "@@Dd R  3 bullet"@@Dd F  3 "@@Dd F  3 "@@Dd R   3 bullet"@@D@D c@Normal5CJ_HaJ mH sH tH DA@D Default Paragraph FontRiR  Table Normal4 l4a (k(No List4U@4 O Hyperlink >*ph4 @4 ++Footer  !.)@. ++ Page Number4/"4 9Listh^h`HC2H 9Body Text Indenthx^h2BB2 9 Body TextxPMARP 9Body Text First Indent `TN1bT 9Body Text First Indent 2 `4r4 3Header  !J2@J 3List 27$8$H$^`5aJJ3@J 3List 387$8$H$^8`5aJFVF #{FollowedHyperlink >*B* phJ^@J & Normal (Web)dd[$\$5aJ*W* ZStrong5\"" 8`valueT?;v5KL`aBCPt5d]|OP O P 6 7 I ` w .E\u*Kaw?@gh}<=^_ef4LM`w*+EWn$%;H]*@AGZ(Qm  . F X g h !!D!E!o!p!""4"<"="V"W"##6#7#8#9#D#E#h#i#|#}###########$$-$.$6$7$g$i$j%k%l%u%v%%%%% & &&&&&&&& '6'['\'''''''''((((((()) ))4)5)J*K*U****+,,,,,5-......///00`1a11111@2A22222r3334444n5o5556667F7G7_7`77788n8o888888889:):^:n::::::%;;;K<L<<<P=S==>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>????????? ? ? ? ??????????????????? ?!?"?#?$?%?&?'?(?)?*?+?,?-?.?/?0?1?2?3?4?=?>???J?K?L?M?N?O?P?Q?R?U?000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 0 0 00000 0 0 0000000000 00 00 00 00 00 00 0000000 00 00 00 00 00 00 00 000000000000000000000000000000000 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000@0@0@0@0@0@0@0@0@0@0@0@000KL`aPtd]|OP P E\uKaw?g}<=^_efL*+EWn$*@AGZ  F X g h !!D!E!o!p!""4"<"="W"##6#E#h####$$.$6$7$g$i$j%v%%%%% & &&&&&&&& '6'[''''''''((((((()) ))4)5)J*K*U****+,,,,,5-.....///00`1a11111@2A22222r3334444n5o5556667F7G7_7`77788n8o88888889:):^:n::::::%;;;K<L<<P=S==>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>????????? ? ? ??????????????????? ?!?"?#?$?%?&?'?(?)?*?+?,?-?=?J?U?@0@00000000000000 00000 @0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@00 0!H0 0@0@0@0@0@00'0(0'00 00 00*0+$ 0*00*0@0@0@0000@0@0@0@0@0@0@0@0@00:0080@0@0@0080080000000090: 0900=0>, 0=0@0@0@0@0@0@00000000Q0Rh 0900900*00U0@00X0Y)0C00C0@00@0@0@0@0@00a0b)@0@00f00f00f0gT)0000g0@0@0@00k0l@0l0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@000d)0000000@0@0@0@0@0@0@00c00c00c00^0_@0@0@0@0@0@0@0000@00@00o0v0c00^00^00^00x0|@00s0o@0@0@00o0v0c00^00^00^00c00x0|@0@0@0@0@0@00@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0@ 0@ 0@0@0@0@0@ 0@ 0@ 0@0@0@0@0@0@0@0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@0@0@0@0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@ 0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@00101@000(@0@0@0@0@0@0@0@0@0@0@00 0(@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@00!0'"(M0!0'"(M0!0'"(M0!0'"(M0!0'"(M0!0'"(M@0@0@0@0@0@0@0@0@0@0@000{@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@00C0DbR0C0DbR0C0DbR0C0DbR0C0DbR0C0DbR@0@0@0@0@0@0@0@0@0@0@00#0x@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@00e0f0e0f0e0f0e0f0e0f0e0f@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 00()RR{ } %R!$&'?*+-/7E GTG$'(*+-.12479;<>@BDFJQ % #Q&X(+7,/28n=@EFFFFGG2GTG%),/03568:=?ACEGHIKLMNOPRSSG& 3 o!!"""#$5%h%'((S===T?XXXXXXXXXXX!!l,R$# >ׁ9v2b@0(  B S  ?T? _Hlt183185375 _Hlt183185376 OLE_LINK1 OLE_LINK2_PictureBulletse*e*>U?@@,,>U? ]U >>>>>>>>>> ? ?3?4?>>>>>>>>> ? ?3?4?>>>>>>>>> ? ? ? ?,?4?>>>>>>>>> ? ?3?4?R?U? /$TdZ OJ&.hGMP!Li r>N<*8BPsj*>oR<ִ-~iWɆaY8JPpȬcyPDF8{Th0^`0o(.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.^`CJOJQJo(hH^`CJOJQJo(hHopp^p`CJOJQJo(hH@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(h0^`0o(.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h^`ho(.P^`PB* OJQJo(^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`CJOJQJo(hH^`CJOJQJo(hHopp^p`CJOJQJo(hH@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo(^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.^`CJOJQJo(hH^`CJOJQJo(hHopp^p`CJOJQJo(hH@ @ ^@ `CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(^`CJOJQJo(PP^P`CJOJQJo( F8{ZPp*8BPhGMaY/$OJ~iW*>oR r>Ncy ȸ        ȸ                                                     YLtVgje+\Gn&Q?$Vgje8HVgjeT kW-n&k&i%Y^V)>1 Vgje(b#Vgje8+IN/CVgjeCW-\GDpG^4$LW-IN;68WVgje%YVgjeo4z ZpVgje'`yVgjeo4z c-5e73EQ=!.BY! j u ? hF \ = O t B +m&B 68VLE=VShg*1a k F*!.!;0!h!{$8%D%*&B' (EU)Yz)* *e,+F+k+,A-Ac-2-).dc._|./6/`z/:08H0R0Kj031b1c1=22?2 44#;4j4 5<5d5Hs5@6D6|6(7n=7u7 H9yX9=:H:Ux:<!=#=]=Sf=} > >ko?c@57ABB-C=CeD6F GF GKGHbKMO5OHO|OPQ"Q RW_JI_}_`3`8`|`0aObac>mcFd5fg%ijkWkFjkmk.xklm3mm,nnBnkpn1qUJqvq*s t"tCu&Qu vevGv}wHxey&y,2yezpzpz*,{}Cb}~lu<K]d9hi "h? Bp9{d L) !(S8u(lKU/Y[9\{=Raq\Az6r0*~+#yNY(fh2D`G8L>CIWc(^80SGTI="2dy7| 9sOd/Z7&& .Dp)TOZ:nT?I7?YovOe1gqsxy+Y|~z+~g 1bPAqk|K)>?[ipn2$ 7~(.39L@3pHlh:[4++VP64O /1G)dck %PO!+0Z4BMPXgjYQ9b-%w@RT? @UnknownGz Times New Roman5Symbol3& z Arial?5 z Courier New;Wingdings"1hP&P&m&V :5qV :5q!4dq>q>2qHX ?!42%RESEARCH ETHICS: In-class activities gary comstockCHASS<         Oh+'0   0< \ h t (RESEARCH ETHICS: In-class activities gary comstock Normal.dotCHASS2Microsoft Office Word@@Z@*@*V :5՜.+,D՜.+,` hp  NC State Universityqq>\ &RESEARCH ETHICS: In-class activities Title  8@ _PID_HLINKSA< B]D!Ehttp://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf x6shttp://openseminar.org/ethics/courses/59/modules/1829/index/Use of animal and human subjects in research %5BPPT%5D x6shttp://openseminar.org/ethics/courses/59/modules/1829/index/Use of animal and human subjects in research %5BPPT%5D u^Uhttp://www.chass.ncsu.edu/langure/documents/PHI816ResponsibleUseofStatistics_000.ppt IEhttp://www.chass.ncsu.edu/langure/documents/PHI816Authorship_001.ppt ]DEhttp://www.chass.ncsu.edu/langure/documents/InterviewPIworksheet.pdf 'Lhttp://www.chass.ncsu.edu/langure/documents/PHI816MentoringandWomenURMs.ppt  uhttp://www.chass.ncsu.edu/langure/ethics/PHI816 Fall 2007/modules/1.5_Inquire_critically/PHI 816 Intro to ethics.ppt  A ^http://www.chass.ncsu.edu/langure/ethics/PHI816 Fall 2007/modules/PHI 816 Opening session.ppt gjhttp://openseminar.org/ethics/ F.http://www.chass.ncsu.edu/langure/pretest.pdf   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTVWXYZ[\^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry Fȶ*Data U1Table]oWordDocumentSummaryInformation(DocumentSummaryInformation8CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q