Book contents
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Academic Cheating
- Part II Academic Excuses and Fairness
- Part III Authorship and Credit
- Part IV Confidentiality’s Limits
- Part V Data Analysis, Reporting, and Sharing
- Part VI Designing Research
- Part VII Fabricating Data
- 37 Beware the Serial Collaborator
- 38 My Ethical Dilemma
- 39 Data Not to Trust
- 40 When a Research Assistant (Maybe) Fabricates Data
- 41 The Pattern in the Data
- 42 It Is Never as Simple as It Seems
- 43 Commentary to Part VII
- Part VIII Human Subjects
- Part IX Personnel Decisions
- Part X Reviewing and Editing
- Part XI Science for Hire and Conflict of Interest
- Epilogue Why Is Ethical Behavior Challenging?
- Index
43 - Commentary to Part VII
Published online by Cambridge University Press: 05 February 2015
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Academic Cheating
- Part II Academic Excuses and Fairness
- Part III Authorship and Credit
- Part IV Confidentiality’s Limits
- Part V Data Analysis, Reporting, and Sharing
- Part VI Designing Research
- Part VII Fabricating Data
- 37 Beware the Serial Collaborator
- 38 My Ethical Dilemma
- 39 Data Not to Trust
- 40 When a Research Assistant (Maybe) Fabricates Data
- 41 The Pattern in the Data
- 42 It Is Never as Simple as It Seems
- 43 Commentary to Part VII
- Part VIII Human Subjects
- Part IX Personnel Decisions
- Part X Reviewing and Editing
- Part XI Science for Hire and Conflict of Interest
- Epilogue Why Is Ethical Behavior Challenging?
- Index
Summary
Faking by a collaborator – whether long-distance or nearby, powerful or subordinate (assistant, student) – is a betrayal. Data collection requires trust: trust in the participant to follow directions and respond as faithfully as possible, trust in the data collector, and trust in the data manager. When someone violates this trust, we feel justifiably betrayed and offended. The betrayal is most acute when the fabricator is a collaborator, someone who seemed to be on the same team, sharing the same goals, but who in fact rejected those goals for more self-serving or personally expedient goals. In most instances here, the betrayal of the field as a whole, rather than personal animus, motivated the authors to confront the suspected perpetrator and notify relevant authorities, where possible – clearly the right thing to do as an individual investigator responsible for the integrity of data we report.
How can we defend ourselves as a field? The fraud was discovered in each instance, first, by downstream collaborators’ attention to unusual data patterns, vigilance in investigating them, openness to reporting them, and willingness to withdraw suspect data. All these reactions are difficult because each flies in the face of human nature: We are set to believe what we see, eager to find answers, predisposed to trust collaborators, and committed to our time investments, not to mention our public pronouncements. As scientists, we must challenge our own human predispositions to accept appearances and to go with the flow.
- Type
- Chapter
- Information
- Ethical Challenges in the Behavioral and Brain SciencesCase Studies and Commentaries, pp. 128Publisher: Cambridge University PressPrint publication year: 2015