Jump to ContentJump to Main Navigation
Conducting Research in Juvenile and Criminal Justice Settings$

Michael G. Vaughn, Carrie Pettus-Davis, and Jeffrey J. Shook

Print publication date: 2012

Print ISBN-13: 9780199782857

Published to Oxford Scholarship Online: May 2012

DOI: 10.1093/acprof:oso/9780199782857.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2017. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see http://www.oxfordscholarship.com/page/privacy-policy). Subscriber: null; date: 26 February 2017

(p.129) Appendix 3 Essential Components in Human Subjects Applications

(p.129) Appendix 3 Essential Components in Human Subjects Applications

Source:
Conducting Research in Juvenile and Criminal Justice Settings
Publisher:
Oxford University Press

  1. Purpose and rationale for a study usually including a literature review.

  2. Research questions and study aims.

  3. Detailed sample description.

    1. Inclusion and exclusion criteria.

  4. Full description of the study.

    1. Study design.

      1. For an extant and administrative study, full description of existing data including how the data were collected and stored.

    2. Methods for identifying and/or recruiting study participants.

      1. Procedures for obtaining participant consent.

      2. Costs to participants/partnering agency.

      3. Inducement for study participants.

    3. Detailed description of what participants will be asked to do as applicable.

      1. Includes frequency and duration of contact.

    4. Study measures.

      1. Data collection points.

      2. Psychometric properties.

  5. (p.130)
  6. Benefits of the study to participants and to society.

  7. Risks to participants (and research team as applicable).

    1. Discussion of how risks will be identified and measures taken to reduce those risks.

  8. Data collection and analysis plan.

  9. Participant identifiers.

  10. Confidentiality plan.

  11. Data sharing plan.

  12. Data security for storage and transmission.