You are currently not logged in. Any progress made will be lost.

Vulnerability

For all types of data there may be participant sensitivities and vulnerabilities, and inclusive data can be particularly so.

Participant vulnerability is a complex, dynamic state that can affect anyone at any time for many different reasons. All participants are different, with a wide range of needs, abilities, and personal circumstances. These differences can place some in a position of vulnerability or greater risk of harm.

Some people’s ability to participate effectively in the research may be affected by certain individual characteristics. These can be short-term or long-term, might fluctuate over time, and may not be obvious. Participants may be vulnerable because their competence to give informed consent is uncertain, because socially they are in a position where it is difficult for them to give informed consent, or their circumstances may affect their decision to consent. Additionally, being involved in the research project can also increase participants’ potential vulnerability.

When collecting data from vulnerable or potential participants care needs to be taken. For example:

  • Technique for getting consent – make sure it is tailored to the individual concerned and any vulnerabilities which might need to be addressed e.g., approach to those with some mental health conditions and/or physical disabilities may be different in terms of format/ style of language used etc.; consider using a layered approach to gaining consent.
  • Permission for use of identifiable data - in seeking consent clearly explain what is intended with any identifiable data collected and how it will be used. This should allay concerns about why demographic data is collected
  • Respecting the right to decline – ensure that participants understand that they can decline or withdraw their consent at any time including during an exercise
  • Specifying the purpose – be clear about the purpose of projects and do not mislead participants about what may happen as a result of their participation.

For more detail see:

MRS Best Practice Guide: Research Participant Vulnerability