Contamination of overt data with covert data Northumbria Research Link Citation: Pickles, James (2018) Contamination of overt data with covert data. Research Ethics, 14 (4). pp. 1-3. ISSN 1747-0161 Published by: SAGE URL: https://doi.org/10.1177/1747016117721281 This version was downloaded from Northumbria Research Link: http://nrl.northumbria.ac.uk/38070/ Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies of full items can be reproduced, displayed or performed, and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided the authors, title and full bibliographic details are given, as well as a hyperlink and/or URL to the original metadata page. The content must not be changed in any way. Full items must not be sold commercially in any format or medium without formal permission of the copyright holder. The full policy is available online: http://nrl.northumbria.ac.uk/pol i cies.html This document may differ from the final, published version of the research and has been made available online in accordance with publisher policies. To read and/or cite from the published version of the research, please visit the publisher’s website (a subscription may be required.) http://nrl.northumbria.ac.uk/policies.html https://doi.org/10.1177/1747016117721281 Research Ethics 2018, Vol. 14(4) 1–3 © The Author(s) 2017 Article reuse guidelines: sagepub.com/journals-permissions DOI: 10.1177/1747016117721281 journals.sagepub.com/home/rea Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 License (http://www.creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial use, reproduction and distribution of the work without further permission provided the original work is attributed as specified on the SAGE and Open Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage). Contamination of overt data with covert data James Pickles Northumbria University, UK Abstract A research project was conducted which explored LGBT (lesbian, gay, bisexual, transgender) hate crime. Participants were invited to share their narratives and personal experiences of hate crime, discrimination and violence through semi-structured interviews. The study helped us understand how people who experience ‘hate’ responded to, managed and reconciled the identities for which they were victimized. This case study focuses on a situation where a research participant requested a copy of an interview they gave for the hate crime project. The interview copy was to be used for the participant’s own personal purposes. The participant’s request potentially risked the contamination of ethical (overt) data collection, with their own covert data gathering. The ethical implications of this scenario raise many questions for ethicists and researchers to discuss. Keywords hate crime, LGBT, research ethics, research methods, research participants, sexuality research The participant agrees to take part in a semi-structured interview for a research project you are conducting. The standard procedure to take part is to read through an information sheet outlining how their interview will be used, and to sign a con- sent form acknowledging that they understand the purpose of participation. All Corresponding author: James Pickles, Northumbria University, Faculty of Arts, Design and Social Sciences, Lipman Building, PGR Office, NE1 8SB, UK. Email: james.pickles@northumbria.ac.uk 721281REA0010.1177/1747016117721281Research EthicsPickles research-article2017 Case Study https://uk.sagepub.com/en-gb/journals-permissions https://journals.sagepub.com/home/rea mailto:james.pickles@northumbria.ac.uk http://crossmark.crossref.org/dialog/?doi=10.1177%2F1747016117721281&domain=pdf&date_stamp=2017-07-13 2 Research Ethics 14(4) personal information is anonymized with pseudonyms to protect the identities of all participants. During the interview the participant describes and explains their experiences of discrimination and hate crime. Two weeks pass and then your par- ticipant asks for a copy of the interview recording (recording A). Nowhere on the consent form you both signed does it state that a participant can request of copy of their interview. However, as part of the Data Protection Act (1998) they have a right to request information that they have provided. They also disclose that they want to use this recording for a public art piece they are creating which will shed light on the discrimination they experience. The purpose of the interview record- ing is to shed light on the participant’s personal experiences of discrimination. However, the consent agreement, which you both signed, stated that the interview was only to be used for the LGBT hate crime research output. The recording was never meant to support an independent art piece, which was being created as part of a university degree programme. Consent agreements are conventionally used to reassure the participant that the researcher will not use the participant’s interview recording for additional purposes. In this case study, it was the participant who sought to use the recording for purposes the interview was never meant to support. The art project will play two separate recordings, concurrently, on a loop. The interview recording (recording A) is to be used alongside an additional audio recording, which the participant alone carried out covertly. The participant’s recording (recording B) is of a meeting between LGBT peers, at which you both were present, outside of your research parameters. During the meeting, the partici- pant was verbally discriminated against by their LGB peers. The use of recording A alongside the meeting recording B, which has been gathered without ethical consent procedures, challenges the ethics of how data are used and combined. Additionally, the participant’s request for the recording A, which they provided as part of the LGBT hate crime project, challenges the ownership of data you collect. This raises the question about whether your data will be tarnished if used in con- junction with ethically ambiguous data. Further, your voice is on both recordings, which risks revealing both of your identities if they are played concurrently. The participant argues that there are valid reasons for both of the recordings to be used together. The participant also notes that the art project on discrimination, of which both recordings will be used, is closely tied with the original LGBT hate crime project you are conducting. The covert meeting recording B and the overt interview recording A being used jointly has several purposes. Firstly, it is to highlight the participant’s experiences of discrimination within the LGBT community by their LGB peers. The request for recording A is so they can highlight this using their own voice captured in the recording. Secondly, it is to demonstrate this lived/experienced discrimination through their additional, covert recording B of the meeting. This is done by using Pickles 3 the examples of the participant being discriminated against at the meeting by LGB people. The combined use of both recordings being played concurrently will either ‘whistle blow’ the discrimination they experience from their LGB peers, and implement some change, or it will compromise your entire research project con- ducted on LGBT hate crime, which is separate from the participant’s artistic work. There is also the possibility that it will potentially do both of these things. Questions for discussion: •• Do you give them a requested copy of your data? •• Does this risk contaminating and compromising your entire research project? •• Would you design an agreement where you are anonymized in their work? •• Would you report them for obtaining data for their own research and profes- sional practice, as part of a university degree course, covertly? Declaration of conflicting interests The authors declared no potential conflicts of interest with respect to the research, authorship and/or publication of this article. Funding All articles in Research Ethics are published as open access. There are no submission charges and no Article Processing Charges as these are fully funded by institutions through Knowledge Unlatched, resulting in no direct charge to authors. For more information about Knowledge Unlatched please see here: http://www.knowledgeunlatched.org http://www.knowledgeunlatched.org