Skip to main content
Social Sci LibreTexts

9.5: Ethically Analyzing and Sharing Co-generated Knowledge

  • Page ID
    76241
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)
    Learning Objectives

    By the end of this section, you will be able to:

    • Critically evaluate the epistemic power associated with knowledge production
    • Consider the ethical implications associated with publishing one’s research

    Given the differences in the way qualitative and quantitative scholars tend to approach political research, what constitutes ethical practice may seem to operate differently as well. For example, due to the reliance on statistics, many students of political science may mistakenly believe that the quantitative method is always transparent, objective and, therefore, ethical as opposed to the qualitative method where the reliance on human communications and interactions is thought to always be subjective. The quantification of political data involves human processes where there are plenty of opportunities for the product (i.e., dataset) to be biased, especially when such a process is not transparent. Conversely, a series of interviews for the purpose of data collection for qualitative scholars can be conducted in such a way to reduce potential biases in the processes. These claims about whether qualitative or qualitative approaches are better suited for minimizing biases and upholding the standard of objectivity may be rooted in the idea that the primary, and for some, only, purpose of political research is to make inferences about the political world.

    Smith (Smith and Renwick Monroe 2005) notes that part of the reason why there is this type of methodological dispute is because political scientists have not agreed on what makes good political science research. He argues that while inference testing is essential to political science research, such an endeavor requires substantively interesting questions and hypotheses about the political world. As such, political science, as a discipline, needs to reconsider the notion that both qualitative and quantitative approaches are essential, for the formation of substantively interesting hypotheses and questions and the improvement of our analytical technique are both critical in the advancement of the field. Because of the differences in the nature of both approaches, it is essential to approach the discussion on the standard of ethical practice accordingly as well. In other words, some ethical standards can be more or less relevant to each approach because of the differences in how data are collected and analyzed.

    As noted in the previous chapter, findings from political science research often become a basis for political and social changes that have serious real-life implications. Unless the practitioners of political research, whether they are qualitatively or quantitatively oriented, conduct their research in an ethical manner, the integrity of the discipline as well as policies being produced based on our research, for example, could face serious challenges. Because political scientists are thought to be experts on political and social problems to some extent, we have some perceived authority on these issues. As a result, when we make some claims about political and social issues in the public sphere, it may carry some weight than an individual’s opinion, for example, on various political issues.

    Academics have and reproduce what Audie Klutz and Cecelia Lynch (Klotz and Lynch 2007) refer to as “epistemic power,” through the knowledge we generate as researches and disseminate through writing and lecturing. Consequently, we can never be entirely value-neutral or eliminate our personal biases as we replicate or challenge the assumptions of our discipline through our scholarship and our individual methodological choices (Klotz and Lynch 2007). From using translators in the field to employing professional services to transcribe interviews, we must take great pains to consider the potential for bias to creep into our analysis, to not misrepresent our study’s participants, and to always consider their wellbeing.

    Therefore, when one begins to analyze what they have learned in the field and prepare to share their findings, it is important to offer reflections on instances where one’s fieldwork resulted in dissonance with their initial theoretical framework and where our interviewees challenged and/or enriched the initial line of inquiry (Yanow and Schwartz-Shea 2011). For example, the reflexive approach mentioned in the previous section is also useful when the researcher is analyzing their data. This includes strategies such as “member checking,” in which findings are discussed with those studied in the field. This does not deny or undermine the researcher’s epistemological role, but rather acts as a strategy for addressing the dynamics associated with a researcher’s subjectivities (i.e. confirmation bias). Ultimately this is your study, and it would be unwise to let your participants editorialize your findings. However, if a quote or the like might make them uncomfortable, misrepresent their meaning, or worse, we must take this under consideration.

    Lastly, when it comes to publication, it is argued that qualitative researchers in particular have an ethical reasonability to consider how this research will be used, given the trust, intimacy, and potential for human impact this chapter has addressed (Gibbs 2008). In this final stage of research, it is ethically important to reflect on how this information may impact those that made the researcher’s study possible in the first place. Indeed, many research agendas pertaining to sensitive topics that might put the researcher and/or their participants in danger. Therefore, many interviews and surveys must not only be conducted on the basis of anonymity, the original data stored in a secure location, but also evaluated now that all the pieces of the puzzle have come together and are almost ready for publication.

    For instance, publishing and sharing one’s findings may entail information and/or quotations for which the research is ethically unable to provide full citations based on confidential interviews, field, and participant observations. As subsequent researchers may therefore be unable to replicate our findings, effectively using quotes and accounts from anonymous subjects is often dependent on such data being shared by more than one person or sources. Another way to bolster the credibility of anonymous sources is triangulating their accounts and linking them in the analyses with contextual information (e.g. “according to several soldiers involved in the conflict”). Once again, being transparent as possible entails a delicate balance between protecting our human subjects and the integrity of our research.

    Congratulations, your study is published and the colleagues who cite your work continue to grow in number! Nevertheless, it is unlikely that the study’s participants that made your accolades possible subscribe to the American Journal of Political Science. Indeed, researchers are routinely criticized for failing to bring the study’s findings back to the individuals/community under investigation, if not providing it in such a way that they can understand, use, or verify. Ethically, we should avoid being parasitic with our work and strive to bring something of value back to the community and/or persons that made your study possible. This may seem like an onerous last step with little instrumental reward, but as this chapter as endeavored to point out, when you conduct and report your research ethically, “you join a community in search for some common good...you discover that research focused on the best interest of others is also your own” (Booth, Colomb, and Williams 2008).


    This page titled 9.5: Ethically Analyzing and Sharing Co-generated Knowledge is shared under a CC BY-NC 4.0 license and was authored, remixed, and/or curated by Josue Franco, Charlotte Lee, Kau Vue, Dino Bozonelos, Masahiro Omae, & Steven Cauchon (ASCCC Open Educational Resources Initiative (OERI)) via source content that was edited to the style and standards of the LibreTexts platform.

    • Was this article helpful?